Количество 314 375
Количество 314 375
GHSA-33c5-cxgm-mjpc
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.
GHSA-33c5-9fx5-fvjm
Privilege Escalation in Kubernetes
GHSA-33c4-r3r9-gr9g
Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922.
GHSA-33c4-f7cm-95m7
Tenda F1203 V2.0.1.6, FH1203 V2.0.1.6 and FH1205 V2.0.0.7(775) were discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function.
GHSA-33c4-c7ch-qm8j
Landray EIS 2001 through 2006 allows Message/fi_message_receiver.aspx?replyid= SQL injection.
GHSA-33c4-33mw-wm8j
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33775, CVE-2021-33776, CVE-2021-33777, CVE-2021-33778.
GHSA-33c3-x8f5-62m8
bug_report.php in MantisBT before 1.2.18 allows remote attackers to assign arbitrary issues via the handler_id parameter.
GHSA-33c3-8653-qmxw
Directory traversal vulnerability in WebCalendar 1.2.7 and earlier allows authenticated attackers to read arbitrary files via unspecified vectors.
GHSA-33c2-986r-8vm4
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.
GHSA-33c2-32m9-q3cg
An issue was discovered in Veritas NetBackup through 8.2 and related Veritas products. An attacker with local access can send a crafted packet to pbx_exchange during registration and cause a NULL pointer exception, effectively crashing the pbx_exchange process.
GHSA-339x-wfph-g72p
IBM TRIRIGA Application Platform 3.5.3 and 3.6.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 159129.
GHSA-339w-gwg3-jg86
Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability.
GHSA-339w-8rqf-f9p6
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details.
GHSA-339w-6r43-vjh2
The application sends user credentials as URL parameters instead of POST bodies, making it vulnerable to information gathering.
GHSA-339v-wcxr-4xwf
IBM Tivoli Federated Identity Manager (TFIM) and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.1.1, 6.2.0, and 6.2.1 do not properly handle signature validations based on SAML 1.0, 1.1, and 2.0, which allows remote attackers to bypass intended authentication or authorization requirements via a non-conforming SAML signature.
GHSA-339v-pgj2-77h7
Drawings SDK (All versions prior to 2022.4) are vulnerable to an out-of-bounds read due to parsing of DWG files resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allows attackers to cause a denial-of service condition or read sensitive information from memory.
GHSA-339v-jgw2-82mh
Buffer overflow in the win-c-sample program (win-c-sample.exe) in the WebSite web server 1.1e allows remote attackers to execute arbitrary code via a long query string.
GHSA-339v-9xv2-qg2w
Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should not have. This attack appears to be exploitable via container execution. This vulnerability appears to have been fixed in 1.9.
GHSA-339r-g45r-g8f6
A vulnerability was found in code-projects Hostel Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /contact.php. The manipulation of the argument hostel_name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
GHSA-339r-cjv9-x78g
LlamaIndex Retrievers Integration: DuckDBRetriever SQL Injection
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-33c5-cxgm-mjpc A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105. | CVSS3: 8.8 | 42% Средний | больше 3 лет назад | |
GHSA-33c5-9fx5-fvjm Privilege Escalation in Kubernetes | CVSS3: 6.8 | 60% Средний | почти 2 года назад | |
GHSA-33c4-r3r9-gr9g Unspecified vulnerability in the SunRPC inspection feature on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), and 8.2 before 8.2(2) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via crafted SunRPC UDP packets, aka Bug ID CSCtc79922. | 1% Низкий | больше 3 лет назад | ||
GHSA-33c4-f7cm-95m7 Tenda F1203 V2.0.1.6, FH1203 V2.0.1.6 and FH1205 V2.0.0.7(775) were discovered to contain a stack overflow via the ssid parameter in the form_fast_setting_wifi_set function. | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад | |
GHSA-33c4-c7ch-qm8j Landray EIS 2001 through 2006 allows Message/fi_message_receiver.aspx?replyid= SQL injection. | CVSS3: 4.3 | 0% Низкий | около 1 года назад | |
GHSA-33c4-33mw-wm8j HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33775, CVE-2021-33776, CVE-2021-33777, CVE-2021-33778. | CVSS3: 7.8 | 5% Низкий | больше 3 лет назад | |
GHSA-33c3-x8f5-62m8 bug_report.php in MantisBT before 1.2.18 allows remote attackers to assign arbitrary issues via the handler_id parameter. | 0% Низкий | больше 3 лет назад | ||
GHSA-33c3-8653-qmxw Directory traversal vulnerability in WebCalendar 1.2.7 and earlier allows authenticated attackers to read arbitrary files via unspecified vectors. | CVSS3: 4.9 | 2% Низкий | больше 3 лет назад | |
GHSA-33c2-986r-8vm4 A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device. | 1% Низкий | больше 3 лет назад | ||
GHSA-33c2-32m9-q3cg An issue was discovered in Veritas NetBackup through 8.2 and related Veritas products. An attacker with local access can send a crafted packet to pbx_exchange during registration and cause a NULL pointer exception, effectively crashing the pbx_exchange process. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
GHSA-339x-wfph-g72p IBM TRIRIGA Application Platform 3.5.3 and 3.6.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 159129. | CVSS3: 7.1 | 0% Низкий | больше 3 лет назад | |
GHSA-339w-gwg3-jg86 Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability. | CVSS3: 5.3 | 20% Средний | больше 3 лет назад | |
GHSA-339w-8rqf-f9p6 An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote authenticated attacker to inject and execute arbitrary script code. See SEL Service Bulletin dated 2022-11-15 for more details. | CVSS3: 4.3 | 0% Низкий | больше 2 лет назад | |
GHSA-339w-6r43-vjh2 The application sends user credentials as URL parameters instead of POST bodies, making it vulnerable to information gathering. | CVSS3: 5.3 | 0% Низкий | 8 месяцев назад | |
GHSA-339v-wcxr-4xwf IBM Tivoli Federated Identity Manager (TFIM) and Tivoli Federated Identity Manager Business Gateway (TFIMBG) 6.1.1, 6.2.0, and 6.2.1 do not properly handle signature validations based on SAML 1.0, 1.1, and 2.0, which allows remote attackers to bypass intended authentication or authorization requirements via a non-conforming SAML signature. | 0% Низкий | больше 3 лет назад | ||
GHSA-339v-pgj2-77h7 Drawings SDK (All versions prior to 2022.4) are vulnerable to an out-of-bounds read due to parsing of DWG files resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allows attackers to cause a denial-of service condition or read sensitive information from memory. | CVSS3: 7.1 | 0% Низкий | больше 3 лет назад | |
GHSA-339v-jgw2-82mh Buffer overflow in the win-c-sample program (win-c-sample.exe) in the WebSite web server 1.1e allows remote attackers to execute arbitrary code via a long query string. | 7% Низкий | почти 4 года назад | ||
GHSA-339v-9xv2-qg2w Kubernetes CRI-O version prior to 1.9 contains a Privilege Context Switching Error (CWE-270) vulnerability in the handling of ambient capabilities that can result in containers running with elevated privileges, allowing users abilities they should not have. This attack appears to be exploitable via container execution. This vulnerability appears to have been fixed in 1.9. | CVSS3: 8.8 | 1% Низкий | больше 3 лет назад | |
GHSA-339r-g45r-g8f6 A vulnerability was found in code-projects Hostel Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /contact.php. The manipulation of the argument hostel_name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 7.3 | 0% Низкий | 8 месяцев назад | |
GHSA-339r-cjv9-x78g LlamaIndex Retrievers Integration: DuckDBRetriever SQL Injection | CVSS3: 9.8 | 1% Низкий | 11 месяцев назад |
Уязвимостей на страницу