Количество 314 375
Количество 314 375
GHSA-3rx9-3f42-rqvh
Use-after-free vulnerability in the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving movement of a SCRIPT element across documents.
GHSA-3rx8-r3v3-xqwp
PhpMyFaq 1.5.1 allows remote attackers to obtain sensitive information via a LANGCODE parameter that does not exist, which reveals the path in an error message.
GHSA-3rx8-q5x6-m56j
A vulnerability classified as problematic has been found in Rotem Dynamics Rotem CRM up to 20230729. This affects an unknown part of the file /LandingPages/api/otp/send?id=[ID][ampersand]method=sms of the component OTP URI Interface. The manipulation leads to information exposure through discrepancy. It is possible to initiate the attack remotely. The identifier VDB-233253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
GHSA-3rx7-xcvr-j7v2
Multiple PHP remote file inclusion vulnerabilities in Mazen's PHP Chat 3.0.0 allow remote attackers to execute arbitrary PHP code via a URL in the basepath parameter to (1) ITX.php, (2) IT_Error.php, or (3) IT.php in include/pear/.
GHSA-3rx7-fmcf-hpgr
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DataFlowX Technology DataDiodeX allows Path Traversal.This issue affects DataDiodeX: before v3.5.0.
GHSA-3rx6-q2qg-r8cc
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5069.
GHSA-3rx6-5vvp-hhgq
A cross-site scripting (XSS) vulnerability in BoltWire v7.10 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the name and lastname parameters.
GHSA-3rx5-gfw3-66w3
SafeNet Authentication Service Windows Logon Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module, a different vulnerability than CVE-2015-7965.
GHSA-3rx5-2rm5-fvhx
An endpoint of the Agent running on the BOSH Director VM with stemcell versions prior to 3232.6 and 3146.13 may allow unauthenticated clients to read or write blobs or cause a denial of service attack on the Director VM. This vulnerability requires that the unauthenticated clients guess or find a URL matching an existing GUID.
GHSA-3rx2-x6mx-grj3
Cross-site scripting in Apache JSPWiki
GHSA-3rwx-rphm-m3g7
In fillMainDataBuf of pvmp3_framedecoder.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-173473906
GHSA-3rwx-3vwh-mwxc
Jenkins Vulnerable to Denial of Service (DoS)
GHSA-3rww-fm75-jc23
The wp-file-download WordPress plugin before 6.2.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
GHSA-3rww-7g94-g9qj
Creolabs Gravity version 1.0 is vulnerable to a stack overflow in the string_repeat() function.
GHSA-3rwv-jrrg-99x3
The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Denial of Service in all versions up to, and including, 1.2.5. This is due to direct access of the backuply/restore_ins.php file and. This makes it possible for unauthenticated attackers to make excessive requests that result in the server running out of resources.
GHSA-3rwv-g3jc-r7cc
An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c
GHSA-3rwr-fq47-78qj
A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/v1/link/edit. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected. The vendor was contacted early about this disclosure but did not respond in any way.
GHSA-3rwq-vmr7-cggq
Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the PPPOEPassword parameter in the formQuickIndex function.
GHSA-3rwq-pxmh-pw55
An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region.
GHSA-3rwq-2648-vg59
Memory corruption due to improper validation of array index in User Identity Module when APN TLV length is greater than command length.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-3rx9-3f42-rqvh Use-after-free vulnerability in the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving movement of a SCRIPT element across documents. | 2% Низкий | больше 3 лет назад | ||
GHSA-3rx8-r3v3-xqwp PhpMyFaq 1.5.1 allows remote attackers to obtain sensitive information via a LANGCODE parameter that does not exist, which reveals the path in an error message. | 0% Низкий | почти 4 года назад | ||
GHSA-3rx8-q5x6-m56j A vulnerability classified as problematic has been found in Rotem Dynamics Rotem CRM up to 20230729. This affects an unknown part of the file /LandingPages/api/otp/send?id=[ID][ampersand]method=sms of the component OTP URI Interface. The manipulation leads to information exposure through discrepancy. It is possible to initiate the attack remotely. The identifier VDB-233253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | CVSS3: 5.3 | 0% Низкий | больше 2 лет назад | |
GHSA-3rx7-xcvr-j7v2 Multiple PHP remote file inclusion vulnerabilities in Mazen's PHP Chat 3.0.0 allow remote attackers to execute arbitrary PHP code via a URL in the basepath parameter to (1) ITX.php, (2) IT_Error.php, or (3) IT.php in include/pear/. | 63% Средний | почти 4 года назад | ||
GHSA-3rx7-fmcf-hpgr Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DataFlowX Technology DataDiodeX allows Path Traversal.This issue affects DataDiodeX: before v3.5.0. | CVSS3: 7.5 | 0% Низкий | больше 1 года назад | |
GHSA-3rx6-q2qg-r8cc The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5069. | CVSS3: 3.1 | 1% Низкий | больше 3 лет назад | |
GHSA-3rx6-5vvp-hhgq A cross-site scripting (XSS) vulnerability in BoltWire v7.10 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the name and lastname parameters. | CVSS3: 6.1 | 3% Низкий | почти 4 года назад | |
GHSA-3rx5-gfw3-66w3 SafeNet Authentication Service Windows Logon Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module, a different vulnerability than CVE-2015-7965. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-3rx5-2rm5-fvhx An endpoint of the Agent running on the BOSH Director VM with stemcell versions prior to 3232.6 and 3146.13 may allow unauthenticated clients to read or write blobs or cause a denial of service attack on the Director VM. This vulnerability requires that the unauthenticated clients guess or find a URL matching an existing GUID. | CVSS3: 9 | 1% Низкий | больше 3 лет назад | |
GHSA-3rx2-x6mx-grj3 Cross-site scripting in Apache JSPWiki | CVSS3: 6.1 | 4% Низкий | больше 6 лет назад | |
GHSA-3rwx-rphm-m3g7 In fillMainDataBuf of pvmp3_framedecoder.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-173473906 | 0% Низкий | больше 3 лет назад | ||
GHSA-3rwx-3vwh-mwxc Jenkins Vulnerable to Denial of Service (DoS) | 0% Низкий | больше 3 лет назад | ||
GHSA-3rww-fm75-jc23 The wp-file-download WordPress plugin before 6.2.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting | CVSS3: 7.1 | 0% Низкий | 8 месяцев назад | |
GHSA-3rww-7g94-g9qj Creolabs Gravity version 1.0 is vulnerable to a stack overflow in the string_repeat() function. | CVSS3: 9.8 | 1% Низкий | больше 3 лет назад | |
GHSA-3rwv-jrrg-99x3 The Backuply – Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to Denial of Service in all versions up to, and including, 1.2.5. This is due to direct access of the backuply/restore_ins.php file and. This makes it possible for unauthenticated attackers to make excessive requests that result in the server running out of resources. | CVSS3: 7.5 | 0% Низкий | почти 2 года назад | |
GHSA-3rwv-g3jc-r7cc An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c | 0% Низкий | больше 3 лет назад | ||
GHSA-3rwr-fq47-78qj A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/v1/link/edit. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected. The vendor was contacted early about this disclosure but did not respond in any way. | CVSS3: 3.5 | 0% Низкий | 10 месяцев назад | |
GHSA-3rwq-vmr7-cggq Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability via the PPPOEPassword parameter in the formQuickIndex function. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
GHSA-3rwq-pxmh-pw55 An unvalidated input in Silicon Labs TrustZone implementation in v4.3.x and earlier of the Gecko SDK allows an attacker to access the trusted region of memory from the untrusted region. | CVSS3: 9.3 | 0% Низкий | около 2 лет назад | |
GHSA-3rwq-2648-vg59 Memory corruption due to improper validation of array index in User Identity Module when APN TLV length is greater than command length. | CVSS3: 7.8 | 0% Низкий | почти 3 года назад |
Уязвимостей на страницу