Количество 312 573
Количество 312 573
GHSA-3gv3-62jc-35qm
The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
GHSA-3gv3-4f8p-xmjx
CORE/HDD/src/wlan_hdd_wext.c in the Qualcomm Wi-Fi driver in Android before 2016-10-05 on Nexus 5X and Android One devices allows attackers to obtain sensitive information via a crafted application that makes an iw_set_priv ioctl call, aka Android internal bug 29982678 and Qualcomm internal bug CR 1048052.
GHSA-3gv3-3m2j-wpx7
A cross-site request forgery (CSRF) vulnerability in Zucchetti InfoBusiness before and including 4.4.1 allows arbitrary file upload.
GHSA-3gv2-v3jx-r9fh
Chall-Manager is vulnerable to Path Traversal when extracting/decoding a zip archive
GHSA-3gv2-2xxr-9jgq
HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm.
GHSA-3gv2-29qc-v67m
Symfony vulnerable to Session Fixation of CSRF tokens
GHSA-3grx-qfww-j73p
The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
GHSA-3grx-q7gc-c986
In SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014), a specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow at Version/Instance 0x0005 and 0x0016. An attacker can entice the victim to open a document to trigger this vulnerability.
GHSA-3grx-cccr-q3vw
osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content.
GHSA-3grx-945c-q563
An Information Exposure Through Log Files issue was discovered in Citrix SD-WAN 10.1.0 and NetScaler SD-WAN 9.3.x before 9.3.6 and 10.0.x before 10.0.4.
GHSA-3grw-qxgw-wjcv
Buffer overflow in the G_Printf function in Star Wars Jedi Knight: Jedi Academy 1.011 and earlier allows remote attackers to execute arbitrary code via a long message using commands such as (1) say and (2) tell.
GHSA-3grw-4p5f-54jg
A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall prior to 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local attacker to execute arbitrary code.
GHSA-3grr-x99p-wpc4
libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_example1.c.
GHSA-3grp-cvxg-88g7
In Bluetooth, there is a possible memory corruption due to a logic error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06142410; Issue ID: ALPS06142410.
GHSA-3grp-9cmg-wp24
Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under (a) action=add or action=edit within managemilestone.php file and (b) action=addpro within admin.php file.
GHSA-3grp-7h7h-xcr6
Authorization Bypass Through User-Controlled Key, CWE - 862 - Missing Authorization, – Improper Authorization vulnerability in Bimser Solution Software Trade Inc. EBA Document and Workflow Management System allows – Exploitation of Trusted Identifiers, – Exploitation of Authorization, – Variable Manipulation.This issue affects eBA Document and Workflow Management System: from 6.7.164 before 6.7.166.
GHSA-3grp-6v62-v4vr
Exponent CMS before 2.6.0 has improper input validation in purchaseOrderController.php.
GHSA-3grm-jxf7-fmfq
An open redirect vulnerability exposes OpenCATS to template injection due to improper validation of user-supplied GET parameters.
GHSA-3grm-5x3c-hp2m
Directory traversal vulnerability in rar 2.02 and earlier allows attackers to overwrite arbitrary files during archive extraction via a .. (dot dot) attack on archived filenames.
GHSA-3grj-j83x-crr8
Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-3gv3-62jc-35qm The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak). | CVSS3: 5.9 | 0% Низкий | больше 3 лет назад | |
GHSA-3gv3-4f8p-xmjx CORE/HDD/src/wlan_hdd_wext.c in the Qualcomm Wi-Fi driver in Android before 2016-10-05 on Nexus 5X and Android One devices allows attackers to obtain sensitive information via a crafted application that makes an iw_set_priv ioctl call, aka Android internal bug 29982678 and Qualcomm internal bug CR 1048052. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-3gv3-3m2j-wpx7 A cross-site request forgery (CSRF) vulnerability in Zucchetti InfoBusiness before and including 4.4.1 allows arbitrary file upload. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
GHSA-3gv2-v3jx-r9fh Chall-Manager is vulnerable to Path Traversal when extracting/decoding a zip archive | CVSS3: 9.1 | 0% Низкий | 7 месяцев назад | |
GHSA-3gv2-2xxr-9jgq HireVue Hiring Platform V1.0 suffers from Use of a Broken or Risky Cryptographic Algorithm. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-3gv2-29qc-v67m Symfony vulnerable to Session Fixation of CSRF tokens | CVSS3: 6.3 | 0% Низкий | около 3 лет назад | |
GHSA-3grx-qfww-j73p The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. | 0% Низкий | больше 3 лет назад | ||
GHSA-3grx-q7gc-c986 In SoftMaker Software GmbH SoftMaker Office PlanMaker 2021 (Revision 1014), a specially crafted document can cause the document parser to copy data from a particular record type into a static-sized buffer within an object that is smaller than the size used for the copy, which will cause a heap-based buffer overflow at Version/Instance 0x0005 and 0x0016. An attacker can entice the victim to open a document to trigger this vulnerability. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-3grx-cccr-q3vw osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content. | CVSS3: 9.8 | 36% Средний | больше 3 лет назад | |
GHSA-3grx-945c-q563 An Information Exposure Through Log Files issue was discovered in Citrix SD-WAN 10.1.0 and NetScaler SD-WAN 9.3.x before 9.3.6 and 10.0.x before 10.0.4. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-3grw-qxgw-wjcv Buffer overflow in the G_Printf function in Star Wars Jedi Knight: Jedi Academy 1.011 and earlier allows remote attackers to execute arbitrary code via a long message using commands such as (1) say and (2) tell. | 10% Средний | почти 4 года назад | ||
GHSA-3grw-4p5f-54jg A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall prior to 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local attacker to execute arbitrary code. | 0% Низкий | почти 4 года назад | ||
GHSA-3grr-x99p-wpc4 libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_example1.c. | 0% Низкий | больше 3 лет назад | ||
GHSA-3grp-cvxg-88g7 In Bluetooth, there is a possible memory corruption due to a logic error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06142410; Issue ID: ALPS06142410. | 0% Низкий | почти 4 года назад | ||
GHSA-3grp-9cmg-wp24 Collabtive 3.1 is vulnerable to Cross-site scripting (XSS) via the name parameter under (a) action=add or action=edit within managemilestone.php file and (b) action=addpro within admin.php file. | CVSS3: 5.4 | 0% Низкий | больше 1 года назад | |
GHSA-3grp-7h7h-xcr6 Authorization Bypass Through User-Controlled Key, CWE - 862 - Missing Authorization, – Improper Authorization vulnerability in Bimser Solution Software Trade Inc. EBA Document and Workflow Management System allows – Exploitation of Trusted Identifiers, – Exploitation of Authorization, – Variable Manipulation.This issue affects eBA Document and Workflow Management System: from 6.7.164 before 6.7.166. | CVSS3: 6.4 | 0% Низкий | 5 месяцев назад | |
GHSA-3grp-6v62-v4vr Exponent CMS before 2.6.0 has improper input validation in purchaseOrderController.php. | 1% Низкий | больше 3 лет назад | ||
GHSA-3grm-jxf7-fmfq An open redirect vulnerability exposes OpenCATS to template injection due to improper validation of user-supplied GET parameters. | CVSS3: 5.4 | 8% Низкий | почти 3 года назад | |
GHSA-3grm-5x3c-hp2m Directory traversal vulnerability in rar 2.02 and earlier allows attackers to overwrite arbitrary files during archive extraction via a .. (dot dot) attack on archived filenames. | 0% Низкий | почти 4 года назад | ||
GHSA-3grj-j83x-crr8 Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event. | 5% Низкий | больше 3 лет назад |
Уязвимостей на страницу