Количество 323 419
Количество 323 419
GHSA-25h4-xpfg-774m
Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.
GHSA-25h4-w2qr-hmpx
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7355.
GHSA-25h3-mw3p-w8r7
Dolibarr CRM allows Privilege Escalation
GHSA-25h2-xj4x-29h3
Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow in the function GetParentControlInfo.
GHSA-25gx-x37c-7pph
OpenClaw's andbox browser noVNC observer lacked VNC authentication
GHSA-25gx-qr96-f826
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nurelm Get Posts allows Stored XSS. This issue affects Get Posts: from n/a through 0.6.
GHSA-25gx-7w99-7j35
In the Linux kernel, the following vulnerability has been resolved: RDMA/efa: Fix wrong resources deallocation order When trying to destroy QP or CQ, we first decrease the refcount and potentially free memory regions allocated for the object and then request the device to destroy the object. If the device fails, the object isn't fully destroyed so the user/IB core can try to destroy the object again which will lead to underflow when trying to decrease an already zeroed refcount. Deallocate resources in reverse order of allocating them to safely free them.
GHSA-25gw-vwhh-r379
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter The 'acpiid' buffer in the parse_ivrs_acpihid function may overflow, because the string specifier in the format string sscanf() has no width limitation. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.
GHSA-25gw-crq8-3qhc
An Out-of-Bounds Write vulnerability exists when reading a DXF file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF files. Crafted data in a DXF file (an invalid number of properties) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
GHSA-25gw-4v5m-94pp
In the Linux kernel, the following vulnerability has been resolved: ALSA: scarlett2: Fix buffer overflow in config retrieval The scarlett2_usb_get_config() function has a logic error in the endianness conversion code that can cause buffer overflows when count > 1. The code checks `if (size == 2)` where `size` is the total buffer size in bytes, then loops `count` times treating each element as u16 (2 bytes). This causes the loop to access `count * 2` bytes when the buffer only has `size` bytes allocated. Fix by checking the element size (config_item->size) instead of the total buffer size. This ensures the endianness conversion matches the actual element type.
GHSA-25gw-4pcc-45cf
Deserialization of Untrusted Data in Apache Batik
GHSA-25gv-wg6f-6frp
Centreon SQL Injection vulnerability via esc_name parameter
GHSA-25gv-mvm7-5h3h
Jeecg-boot vulnerable to SQL injection via /sys/user/putRecycleBin
GHSA-25gv-jrjg-43pj
A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been classified as critical. Affected is an unknown function of the file /pages/product_add.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
GHSA-25gv-fvh4-vpcx
Privilege escalation in 'upload.php' in FrogCMS SentCMS v0.9.5 allows attacker to execute arbitrary code via crafted php file.
GHSA-25gv-85m9-qg67
Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF).This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3.1.
GHSA-25gv-4h88-97v2
A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to overwrite arbitrary files.
GHSA-25gr-ph8w-33hc
Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.
GHSA-25gr-fx9v-whc8
In SWFTools 2013-04-09-1007 on Windows, png2swf allows remote attackers to execute arbitrary code or cause a denial of service via a crafted file, related to a "User Mode Write AV near NULL starting at wow64!Wow64NotifyDebugger+0x000000000000001d."
GHSA-25gq-jvx2-vg9x
Silverstripe X-Forwarded-Host request hostname injection
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-25h4-xpfg-774m Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643. | CVSS3: 7.3 | 0% Низкий | почти 4 года назад | |
GHSA-25h4-w2qr-hmpx This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7355. | CVSS3: 6.5 | 1% Низкий | почти 4 года назад | |
GHSA-25h3-mw3p-w8r7 Dolibarr CRM allows Privilege Escalation | CVSS3: 6.5 | 0% Низкий | почти 4 года назад | |
GHSA-25h2-xj4x-29h3 Tenda AX1803 v1.0.0.1 was discovered to contain a heap overflow in the function GetParentControlInfo. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-25gx-x37c-7pph OpenClaw's andbox browser noVNC observer lacked VNC authentication | 27 дней назад | |||
GHSA-25gx-qr96-f826 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in nurelm Get Posts allows Stored XSS. This issue affects Get Posts: from n/a through 0.6. | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
GHSA-25gx-7w99-7j35 In the Linux kernel, the following vulnerability has been resolved: RDMA/efa: Fix wrong resources deallocation order When trying to destroy QP or CQ, we first decrease the refcount and potentially free memory regions allocated for the object and then request the device to destroy the object. If the device fails, the object isn't fully destroyed so the user/IB core can try to destroy the object again which will lead to underflow when trying to decrease an already zeroed refcount. Deallocate resources in reverse order of allocating them to safely free them. | 0% Низкий | 3 месяца назад | ||
GHSA-25gw-vwhh-r379 In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter The 'acpiid' buffer in the parse_ivrs_acpihid function may overflow, because the string specifier in the format string sscanf() has no width limitation. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE. | 0% Низкий | 3 месяца назад | ||
GHSA-25gw-crq8-3qhc An Out-of-Bounds Write vulnerability exists when reading a DXF file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF files. Crafted data in a DXF file (an invalid number of properties) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. | CVSS3: 7.8 | 0% Низкий | почти 4 года назад | |
GHSA-25gw-4v5m-94pp In the Linux kernel, the following vulnerability has been resolved: ALSA: scarlett2: Fix buffer overflow in config retrieval The scarlett2_usb_get_config() function has a logic error in the endianness conversion code that can cause buffer overflows when count > 1. The code checks `if (size == 2)` where `size` is the total buffer size in bytes, then loops `count` times treating each element as u16 (2 bytes). This causes the loop to access `count * 2` bytes when the buffer only has `size` bytes allocated. Fix by checking the element size (config_item->size) instead of the total buffer size. This ensures the endianness conversion matches the actual element type. | CVSS3: 7.8 | 0% Низкий | около 2 месяцев назад | |
GHSA-25gw-4pcc-45cf Deserialization of Untrusted Data in Apache Batik | CVSS3: 9.8 | 2% Низкий | почти 4 года назад | |
GHSA-25gv-wg6f-6frp Centreon SQL Injection vulnerability via esc_name parameter | CVSS3: 8.8 | 1% Низкий | больше 3 лет назад | |
GHSA-25gv-mvm7-5h3h Jeecg-boot vulnerable to SQL injection via /sys/user/putRecycleBin | CVSS3: 4.3 | 0% Низкий | больше 3 лет назад | |
GHSA-25gv-jrjg-43pj A vulnerability was found in Campcodes Sales and Inventory System 1.0. It has been classified as critical. Affected is an unknown function of the file /pages/product_add.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | CVSS3: 7.3 | 0% Низкий | 9 месяцев назад | |
GHSA-25gv-fvh4-vpcx Privilege escalation in 'upload.php' in FrogCMS SentCMS v0.9.5 allows attacker to execute arbitrary code via crafted php file. | 1% Низкий | почти 4 года назад | ||
GHSA-25gv-85m9-qg67 Cross-Site Request Forgery (CSRF) vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF).This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3.1. | CVSS3: 4.3 | 0% Низкий | около 2 лет назад | |
GHSA-25gv-4h88-97v2 A path handling issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to overwrite arbitrary files. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
GHSA-25gr-ph8w-33hc Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation. | CVSS3: 9.8 | 2% Низкий | почти 4 года назад | |
GHSA-25gr-fx9v-whc8 In SWFTools 2013-04-09-1007 on Windows, png2swf allows remote attackers to execute arbitrary code or cause a denial of service via a crafted file, related to a "User Mode Write AV near NULL starting at wow64!Wow64NotifyDebugger+0x000000000000001d." | CVSS3: 8.8 | 1% Низкий | почти 4 года назад | |
GHSA-25gq-jvx2-vg9x Silverstripe X-Forwarded-Host request hostname injection | CVSS3: 7.2 | почти 2 года назад |
Уязвимостей на страницу