Количество 315 253
Количество 315 253
GHSA-36xw-xp2j-w52g
Directory traversal vulnerability in index.php in BNCwi 1.04 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the newlanguage parameter.
GHSA-36xw-hgfv-jwm7
Multiple security issues including data race, buffer overflow, and uninitialized memory drop in arr
GHSA-36xw-fx78-c5r4
containerd-shim API Exposed to Host Network Containers
GHSA-36xv-rp4j-w277
Memory leak in eServ 2.9x allows remote attackers to cause a denial of service (memory exhaustion) via a large number of connections, whose memory is not freed when the connection is terminated.
GHSA-36xv-45pm-m623
Microsoft Publisher 2003 SP3, and 2007 SP2 and SP3, does not properly manage memory allocations for function pointers, which allows user-assisted remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Function Pointer Overwrite Vulnerability."
GHSA-36xr-hxmp-hqwm
Mutt mail client allows a remote attacker to execute commands via shell metacharacters.
GHSA-36xr-8q52-r359
A vulnerability was found in xujeff tianti 天梯 up to 2.3. It has been rated as problematic. This issue affects the function exportOrder of the file /tianti-module-admin/user/ajax/save of the component com.jeff.tianti.controller. The manipulation leads to csv injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
GHSA-36xr-52f8-hmpq
Gadu-Gadu build 155 and earlier allows remote attackers to cause a denial of service (infinite loop) via a message that contains an image whose filename does not start with restricted characters.
GHSA-36xr-4x2f-cfj9
Deserialization of Untrusted Data in Apache Camel SQL
GHSA-36xq-7w8w-xp68
Magento affected by a blind SSRF vulnerability in the bundled dotmailer extension
GHSA-36xp-mvwg-23pf
IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.3, and 3.5 before 3.5.0.1 allows remote authenticated users to read or modify arbitrary reports by leveraging an incorrect grant of access. IBM X-Force ID: 111783.
GHSA-36xp-gf7g-mgvq
XSS in Telligent Community 5.6.583.20496 via a flash file and related to the allowScriptAccess parameter.
GHSA-36xm-wx7c-g2hq
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or ...
GHSA-36xm-w97x-vmwh
In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, B450 Version 2.X, B650 Version 1.X, B650 Version 2.X, B850 Version 1.X, B850 Version 2.X, a vulnerability in the software update mechanism allows an authenticated attacker to upload arbitrary files on the system through a crafted update package.
GHSA-36xm-f9vf-c2w5
Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command.
GHSA-36xm-ch76-gv9j
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SaurabhSharma WP Post Modules for Elementor allows Reflected XSS. This issue affects WP Post Modules for Elementor: from n/a through 2.5.0.
GHSA-36xm-4j44-qpm8
On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ak, which has a size of 16 bytes. An attacker can send an arbitrarily long "ak" parameter in order to exploit this vulnerability.
GHSA-36xm-35qq-795w
Inventory exposes reference to non-Sync data to an arbitrary thread
GHSA-36xj-qg9x-f33m
The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().
GHSA-36xj-gx8g-m5fr
The goTenna Pro series allows unauthenticated attackers to remotely update the local public keys used for P2P and Group messages.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-36xw-xp2j-w52g Directory traversal vulnerability in index.php in BNCwi 1.04 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the newlanguage parameter. | 3% Низкий | больше 3 лет назад | ||
GHSA-36xw-hgfv-jwm7 Multiple security issues including data race, buffer overflow, and uninitialized memory drop in arr | CVSS3: 9.8 | 0% Низкий | больше 4 лет назад | |
GHSA-36xw-fx78-c5r4 containerd-shim API Exposed to Host Network Containers | CVSS3: 5.2 | 11% Средний | больше 4 лет назад | |
GHSA-36xv-rp4j-w277 Memory leak in eServ 2.9x allows remote attackers to cause a denial of service (memory exhaustion) via a large number of connections, whose memory is not freed when the connection is terminated. | 13% Средний | почти 4 года назад | ||
GHSA-36xv-45pm-m623 Microsoft Publisher 2003 SP3, and 2007 SP2 and SP3, does not properly manage memory allocations for function pointers, which allows user-assisted remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Function Pointer Overwrite Vulnerability." | 28% Средний | больше 3 лет назад | ||
GHSA-36xr-hxmp-hqwm Mutt mail client allows a remote attacker to execute commands via shell metacharacters. | 1% Низкий | почти 4 года назад | ||
GHSA-36xr-8q52-r359 A vulnerability was found in xujeff tianti 天梯 up to 2.3. It has been rated as problematic. This issue affects the function exportOrder of the file /tianti-module-admin/user/ajax/save of the component com.jeff.tianti.controller. The manipulation leads to csv injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | CVSS3: 4.3 | 0% Низкий | 6 месяцев назад | |
GHSA-36xr-52f8-hmpq Gadu-Gadu build 155 and earlier allows remote attackers to cause a denial of service (infinite loop) via a message that contains an image whose filename does not start with restricted characters. | 1% Низкий | почти 4 года назад | ||
GHSA-36xr-4x2f-cfj9 Deserialization of Untrusted Data in Apache Camel SQL | CVSS3: 7.8 | 5% Низкий | почти 2 года назад | |
GHSA-36xq-7w8w-xp68 Magento affected by a blind SSRF vulnerability in the bundled dotmailer extension | CVSS3: 8 | 3% Низкий | больше 3 лет назад | |
GHSA-36xp-mvwg-23pf IBM TRIRIGA Application Platform 3.3 before 3.3.2.6, 3.4 before 3.4.2.3, and 3.5 before 3.5.0.1 allows remote authenticated users to read or modify arbitrary reports by leveraging an incorrect grant of access. IBM X-Force ID: 111783. | CVSS3: 5.4 | 0% Низкий | больше 3 лет назад | |
GHSA-36xp-gf7g-mgvq XSS in Telligent Community 5.6.583.20496 via a flash file and related to the allowScriptAccess parameter. | 0% Низкий | почти 4 года назад | ||
GHSA-36xm-wx7c-g2hq Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or ... | CVSS3: 7.4 | 0% Низкий | почти 4 года назад | |
GHSA-36xm-w97x-vmwh In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, B450 Version 2.X, B650 Version 1.X, B650 Version 2.X, B850 Version 1.X, B850 Version 2.X, a vulnerability in the software update mechanism allows an authenticated attacker to upload arbitrary files on the system through a crafted update package. | 0% Низкий | больше 3 лет назад | ||
GHSA-36xm-f9vf-c2w5 Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command. | 74% Высокий | почти 4 года назад | ||
GHSA-36xm-ch76-gv9j Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SaurabhSharma WP Post Modules for Elementor allows Reflected XSS. This issue affects WP Post Modules for Elementor: from n/a through 2.5.0. | CVSS3: 7.1 | 0% Низкий | 9 месяцев назад | |
GHSA-36xm-4j44-qpm8 On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ak, which has a size of 16 bytes. An attacker can send an arbitrarily long "ak" parameter in order to exploit this vulnerability. | CVSS3: 8.8 | 1% Низкий | почти 4 года назад | |
GHSA-36xm-35qq-795w Inventory exposes reference to non-Sync data to an arbitrary thread | больше 2 лет назад | |||
GHSA-36xj-qg9x-f33m The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print(). | CVSS3: 9.8 | 2% Низкий | почти 4 года назад | |
GHSA-36xj-gx8g-m5fr The goTenna Pro series allows unauthenticated attackers to remotely update the local public keys used for P2P and Group messages. | CVSS3: 6.5 | 0% Низкий | больше 1 года назад |
Уязвимостей на страницу