Количество 300 093
Количество 300 093
GHSA-22x3-2qf6-f5mp
** UNSUPPORTED WHEN ASSIGNED ** Stored cross-site scripting vulnerability in Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G all versions allows a network-adjacent authenticated attacker to inject an arbitrary script. NOTE: This vulnerability only affects products that are no longer supported by the developer.
GHSA-22wx-h7xw-m85j
An issue was discovered in TitanHQ WebTitan before 5.18. It has a sudoers file that enables low-privilege users to execute a vast number of commands as root, including mv, chown, and chmod. This can be trivially exploited to gain root privileges by an attacker with access.
GHSA-22ww-35pw-64c4
Nagios XI 2024R1.2.2 is vulnerable to a Cross-Site Request Forgery (CSRF) attack through the Favorites component, enabling POST-based Cross-Site Scripting (XSS).
GHSA-22wv-f9f6-xwwm
FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.
GHSA-22wv-3ghq-5h5v
The Date & Time Pref Pane component in Apple OS X before 10.12 mishandles the .GlobalPreferences file, which allows attackers to discover a user's location via a crafted app.
GHSA-22wr-xr3p-42c4
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check phantom_stream before it is used dcn32_enable_phantom_stream can return null, so returned value must be checked before used. This fixes 1 NULL_RETURNS issue reported by Coverity.
GHSA-22wq-q86m-83fh
svg-sanitizer Bypasses Attribute Sanitization
GHSA-22wp-7v7w-gjjr
Rejected reason: Not used
GHSA-22wm-vgh4-2j44
Yealink phones through 2019-08-04 do not properly check user roles in POST requests. Consequently, the default User account (with a password of user) can make admin requests via HTTP.
GHSA-22wm-h2wq-6vm3
A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6.
GHSA-22wm-6r58-545p
In the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being being validated / updated prior to message authentication.
GHSA-22wm-233j-cq8q
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_facet() fh->boundary_entry_objects SLoop_of.
GHSA-22wj-vpf8-3m9x
An issue was discovered in Open Ticket Request System (OTRS) 6.0.x through 6.0.9, 5.0.x through 5.0.28, and 4.0.x through 4.0.30. An attacker who is logged into OTRS as an agent may escalate their privileges by accessing a specially crafted URL.
GHSA-22wj-vp2m-rxhc
DevExpress before 23.1.3 allows arbitrary TypeConverter conversion.
GHSA-22wj-vf5f-wrvj
Password exposure in H2 Database
GHSA-22wj-5rv2-cqf6
An issue was discovered in Telindus Apsal 3.14.2022.235 b. Unauthorized actions that could modify the application behaviour may not be blocked.
GHSA-22wj-58v7-9wh8
Revive Adserver before 3.2.5 and 4.0.0 suffers from Reflected XSS. The Revive Adserver web installer scripts were vulnerable to a reflected XSS attack via the dbHost, dbUser, and possibly other parameters. It has to be noted that the window for such attack vectors to be possible is extremely narrow and it is very unlikely that such an attack could be actually effective.
GHSA-22wh-wq8h-xvf8
An information disclosure vulnerability exists in the WiFi Smart Mesh functionality of D-LINK DIR-3040 1.13B03. A specially-crafted network request can lead to command execution. An attacker can connect to the MQTT service to trigger this vulnerability.
GHSA-22wg-vcp5-frcc
A vulnerability was determined in Swatadru Exam-Seating-Arrangement up to 97335ccebf95468d92525f4255a2241d2b0b002f. Affected is an unknown function of the file /student.php of the component Student Login. Executing manipulation of the argument email can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
GHSA-22wf-v4rq-wv6g
Google Mini 4.4.102.M.36 and earlier allows remote attackers to obtain sensitive information via a direct request for /search with an invalid client parameter, which reveals the path in an error message.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-22x3-2qf6-f5mp ** UNSUPPORTED WHEN ASSIGNED ** Stored cross-site scripting vulnerability in Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G all versions allows a network-adjacent authenticated attacker to inject an arbitrary script. NOTE: This vulnerability only affects products that are no longer supported by the developer. | CVSS3: 5.2 | 0% Низкий | больше 2 лет назад | |
GHSA-22wx-h7xw-m85j An issue was discovered in TitanHQ WebTitan before 5.18. It has a sudoers file that enables low-privilege users to execute a vast number of commands as root, including mv, chown, and chmod. This can be trivially exploited to gain root privileges by an attacker with access. | CVSS3: 7.8 | 0% Низкий | больше 3 лет назад | |
GHSA-22ww-35pw-64c4 Nagios XI 2024R1.2.2 is vulnerable to a Cross-Site Request Forgery (CSRF) attack through the Favorites component, enabling POST-based Cross-Site Scripting (XSS). | CVSS3: 6.1 | 2% Низкий | 9 месяцев назад | |
GHSA-22wv-f9f6-xwwm FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
GHSA-22wv-3ghq-5h5v The Date & Time Pref Pane component in Apple OS X before 10.12 mishandles the .GlobalPreferences file, which allows attackers to discover a user's location via a crafted app. | CVSS3: 3.3 | 0% Низкий | больше 3 лет назад | |
GHSA-22wr-xr3p-42c4 In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check phantom_stream before it is used dcn32_enable_phantom_stream can return null, so returned value must be checked before used. This fixes 1 NULL_RETURNS issue reported by Coverity. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
GHSA-22wq-q86m-83fh svg-sanitizer Bypasses Attribute Sanitization | 0% Низкий | 3 месяца назад | ||
GHSA-22wp-7v7w-gjjr Rejected reason: Not used | 8 месяцев назад | |||
GHSA-22wm-vgh4-2j44 Yealink phones through 2019-08-04 do not properly check user roles in POST requests. Consequently, the default User account (with a password of user) can make admin requests via HTTP. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
GHSA-22wm-h2wq-6vm3 A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6. | CVSS3: 9.8 | 2% Низкий | больше 3 лет назад | |
GHSA-22wm-6r58-545p In the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being being validated / updated prior to message authentication. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-22wm-233j-cq8q Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_facet() fh->boundary_entry_objects SLoop_of. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
GHSA-22wj-vpf8-3m9x An issue was discovered in Open Ticket Request System (OTRS) 6.0.x through 6.0.9, 5.0.x through 5.0.28, and 4.0.x through 4.0.30. An attacker who is logged into OTRS as an agent may escalate their privileges by accessing a specially crafted URL. | CVSS3: 8.8 | 1% Низкий | больше 3 лет назад | |
GHSA-22wj-vp2m-rxhc DevExpress before 23.1.3 allows arbitrary TypeConverter conversion. | CVSS3: 3.5 | 0% Низкий | 6 месяцев назад | |
GHSA-22wj-vf5f-wrvj Password exposure in H2 Database | CVSS3: 7.8 | 0% Низкий | почти 3 года назад | |
GHSA-22wj-5rv2-cqf6 An issue was discovered in Telindus Apsal 3.14.2022.235 b. Unauthorized actions that could modify the application behaviour may not be blocked. | CVSS3: 8.4 | 0% Низкий | больше 2 лет назад | |
GHSA-22wj-58v7-9wh8 Revive Adserver before 3.2.5 and 4.0.0 suffers from Reflected XSS. The Revive Adserver web installer scripts were vulnerable to a reflected XSS attack via the dbHost, dbUser, and possibly other parameters. It has to be noted that the window for such attack vectors to be possible is extremely narrow and it is very unlikely that such an attack could be actually effective. | CVSS3: 5.4 | 0% Низкий | больше 3 лет назад | |
GHSA-22wh-wq8h-xvf8 An information disclosure vulnerability exists in the WiFi Smart Mesh functionality of D-LINK DIR-3040 1.13B03. A specially-crafted network request can lead to command execution. An attacker can connect to the MQTT service to trigger this vulnerability. | CVSS3: 9.8 | 1% Низкий | больше 3 лет назад | |
GHSA-22wg-vcp5-frcc A vulnerability was determined in Swatadru Exam-Seating-Arrangement up to 97335ccebf95468d92525f4255a2241d2b0b002f. Affected is an unknown function of the file /student.php of the component Student Login. Executing manipulation of the argument email can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way. | CVSS3: 7.3 | 0% Низкий | 2 месяца назад | |
GHSA-22wf-v4rq-wv6g Google Mini 4.4.102.M.36 and earlier allows remote attackers to obtain sensitive information via a direct request for /search with an invalid client parameter, which reveals the path in an error message. | 5% Низкий | больше 3 лет назад |
Уязвимостей на страницу