Количество 314 458
Количество 314 458
GHSA-2j77-qrh4-5xjr
Libspiro through 20190731 has a stack-based buffer overflow in the spiro_to_bpath0() function in spiro.c.
GHSA-2j77-cvpx-rp5h
In prepare_response_locked of lwis_transaction.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
GHSA-2j77-c722-99hh
A SQL injection vulnerability at a tpf URI in Loway QueueMetrics before 19.10.21 allows remote authenticated attackers to execute arbitrary SQL commands via the TPF_XPAR1 parameter.
GHSA-2j77-34rv-wx26
IBM RELM 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126862.
GHSA-2j76-jpwv-99mp
Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link
GHSA-2j76-52j5-65g4
Buffer overflow in the Apple Minimal SLP v2 Service Agent (slpd) in Mac OS X 10.4.11 and earlier, including 10.4.8, allows local users, and possibly remote attackers, to gain privileges and possibly execute arbitrary code via a registration request with an invalid attr-list field.
GHSA-2j76-26qq-7rvv
MoinMoin cross-site scripting (XSS) vulnerability
GHSA-2j74-qxpq-23qj
The JustClick registration plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 0.1. This is due to insufficient input sanitization and output escaping on the `PHP_SELF` server variable. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
GHSA-2j74-fvxg-qf8v
Cross-site scripting (XSS) vulnerability in members/profileCommentsResponse.php in Rayzz Photoz allows remote attackers to inject arbitrary web script or HTML via the profileCommentTextArea parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
GHSA-2j74-3g9x-9cw4
This vulnerability exists in Shilpi Client Dashboard due to improper handling of multiple parameters in the API endpoint. An authenticated remote attacker could exploit this vulnerability by including multiple “userid” parameters in the API request body leading to unauthorized access of sensitive information belonging to other users.
GHSA-2j72-xfgv-gj26
The mod_pagespeed module before 0.10.22.6 for the Apache HTTP Server does not properly verify its host name, which allows remote attackers to trigger HTTP requests to arbitrary hosts via unspecified vectors, as demonstrated by requests to intranet servers.
GHSA-2j72-qjq6-2xh9
The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
GHSA-2j72-pp8c-5p7c
The Productive Style plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's display_productive_breadcrumb shortcode in all versions up to, and including, 1.1.23 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
GHSA-2j6x-6qc7-3mw5
The Simple Membership WordPress plugin before 4.2.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.
GHSA-2j6v-xpf3-xvrv
Use of Externally-Controlled Format String in wire-avs
GHSA-2j6v-g7j5-4gww
The "Reply to message" feature in Mahara 1.3.x and 1.4.x before 1.4.1 allows remote authenticated users to read the messages of a different user via a modified replyto parameter.
GHSA-2j6v-89gr-9crm
Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally.
GHSA-2j6v-829g-885q
Magento Improper Access Control
GHSA-2j6r-x87g-9p2g
Unspecified vulnerability in the Outside In Technology component in Oracle Application Server 8.2.2 and 8.3.0 allows local users to affect confidentiality, integrity, and availability, related to HTML, a different vulnerability than CVE-2009-1010.
GHSA-2j6r-9vv4-6gf5
github.com/bincyber/go-sqlcrypter vulnerable to IV collision
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-2j77-qrh4-5xjr Libspiro through 20190731 has a stack-based buffer overflow in the spiro_to_bpath0() function in spiro.c. | 0% Низкий | больше 3 лет назад | ||
GHSA-2j77-cvpx-rp5h In prepare_response_locked of lwis_transaction.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | CVSS3: 7.8 | 0% Низкий | больше 1 года назад | |
GHSA-2j77-c722-99hh A SQL injection vulnerability at a tpf URI in Loway QueueMetrics before 19.10.21 allows remote authenticated attackers to execute arbitrary SQL commands via the TPF_XPAR1 parameter. | 0% Низкий | больше 3 лет назад | ||
GHSA-2j77-34rv-wx26 IBM RELM 4.0, 5.0, and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 126862. | CVSS3: 5.4 | 0% Низкий | больше 3 лет назад | |
GHSA-2j76-jpwv-99mp Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link | 0% Низкий | больше 3 лет назад | ||
GHSA-2j76-52j5-65g4 Buffer overflow in the Apple Minimal SLP v2 Service Agent (slpd) in Mac OS X 10.4.11 and earlier, including 10.4.8, allows local users, and possibly remote attackers, to gain privileges and possibly execute arbitrary code via a registration request with an invalid attr-list field. | 1% Низкий | почти 4 года назад | ||
GHSA-2j76-26qq-7rvv MoinMoin cross-site scripting (XSS) vulnerability | CVSS3: 6.1 | 1% Низкий | больше 3 лет назад | |
GHSA-2j74-qxpq-23qj The JustClick registration plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 0.1. This is due to insufficient input sanitization and output escaping on the `PHP_SELF` server variable. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | CVSS3: 6.1 | 0% Низкий | 15 дней назад | |
GHSA-2j74-fvxg-qf8v Cross-site scripting (XSS) vulnerability in members/profileCommentsResponse.php in Rayzz Photoz allows remote attackers to inject arbitrary web script or HTML via the profileCommentTextArea parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | 0% Низкий | больше 3 лет назад | ||
GHSA-2j74-3g9x-9cw4 This vulnerability exists in Shilpi Client Dashboard due to improper handling of multiple parameters in the API endpoint. An authenticated remote attacker could exploit this vulnerability by including multiple “userid” parameters in the API request body leading to unauthorized access of sensitive information belonging to other users. | CVSS3: 6.5 | 0% Низкий | больше 1 года назад | |
GHSA-2j72-xfgv-gj26 The mod_pagespeed module before 0.10.22.6 for the Apache HTTP Server does not properly verify its host name, which allows remote attackers to trigger HTTP requests to arbitrary hosts via unspecified vectors, as demonstrated by requests to intranet servers. | 0% Низкий | больше 3 лет назад | ||
GHSA-2j72-qjq6-2xh9 The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | CVSS3: 9.8 | 3% Низкий | около 1 года назад | |
GHSA-2j72-pp8c-5p7c The Productive Style plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's display_productive_breadcrumb shortcode in all versions up to, and including, 1.1.23 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | CVSS3: 6.4 | 0% Низкий | 5 месяцев назад | |
GHSA-2j6x-6qc7-3mw5 The Simple Membership WordPress plugin before 4.2.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin. | CVSS3: 5.4 | 0% Низкий | около 3 лет назад | |
GHSA-2j6v-xpf3-xvrv Use of Externally-Controlled Format String in wire-avs | CVSS3: 9.8 | 1% Низкий | почти 4 года назад | |
GHSA-2j6v-g7j5-4gww The "Reply to message" feature in Mahara 1.3.x and 1.4.x before 1.4.1 allows remote authenticated users to read the messages of a different user via a modified replyto parameter. | 0% Низкий | больше 3 лет назад | ||
GHSA-2j6v-89gr-9crm Incorrect privilege assignment in Windows Hello allows an unauthorized attacker to perform tampering locally. | CVSS3: 7.7 | 0% Низкий | 26 дней назад | |
GHSA-2j6v-829g-885q Magento Improper Access Control | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад | |
GHSA-2j6r-x87g-9p2g Unspecified vulnerability in the Outside In Technology component in Oracle Application Server 8.2.2 and 8.3.0 allows local users to affect confidentiality, integrity, and availability, related to HTML, a different vulnerability than CVE-2009-1010. | 0% Низкий | почти 4 года назад | ||
GHSA-2j6r-9vv4-6gf5 github.com/bincyber/go-sqlcrypter vulnerable to IV collision | CVSS3: 3.7 | больше 1 года назад |
Уязвимостей на страницу