Количество 323 339
Количество 323 339
GHSA-xwr9-j862-6mj9
A memory leakage vulnerability was reported in the 534D0140 DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables.
GHSA-xwr7-j9pf-gg7p
Cross-site scripting (XSS) vulnerability in nqt.php in Network Query Tool (NQT) 1.6 allows remote attackers to inject arbitrary web script or HTML via the portNum parameter.
GHSA-xwr5-mcxm-cm87
This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.
GHSA-xwr5-cx3m-rj3v
kishan0725 Hospital Management System has a Cross-Site Scripting (XSS) vulnerability in appsearch.php via the email parameter.
GHSA-xwr3-fmgj-mmfr
Exposure of Sensitive Information in bio-basespace-sdk
GHSA-xwr3-f5gh-9v6w
Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface.
GHSA-xwr3-6hhp-5cch
QSige statistics are affected by a remote SQLi vulnerability. It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application.
GHSA-xwr3-5rff-6h5p
In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830.
GHSA-xwr2-9ffc-64f7
The unlockKey character in a lock using Sciener firmware can be brute forced through repeated challenge requests, compromising the locks integrity.
GHSA-xwqx-x38c-cw95
Snipe-IT 6.0.2 vulnerable to Cross-site Scripting
GHSA-xwqx-rpjh-4w5r
delqueueask in rccp 0.9 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/cccp_tmp.txt temporary file.
GHSA-xwqx-m66h-v4hc
Heap-based buffer overflow in the kernel in NetBSD 3.0, certain versions of FreeBSD and OpenBSD, and possibly other BSD derived operating systems allows local users to have an unknown impact. NOTE: this information is based upon a vague pre-advisory with no actionable information. Details will be updated after 20070329.
GHSA-xwqx-h938-xp3h
The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison."
GHSA-xwqw-rf2q-xmhf
Cross-Site Scripting in buefy
GHSA-xwqw-68pp-fwpc
Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createStudents.php via the Id, firstname, and admissionNumber parameters.
GHSA-xwqv-pr7g-x8xf
SQL injection vulnerability in the Book Reviews (sk_bookreview) extension 0.0.12 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
GHSA-xwqr-xmgg-j69q
Integer overflow in solana_rbpf
GHSA-xwqp-mjjh-p3v2
David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_png_transform_scanline() in "/ok_png.c:533".
GHSA-xwqp-6c5w-h6q9
In the Linux kernel, the following vulnerability has been resolved: tipc: improve size validations for received domain records The function tipc_mon_rcv() allows a node to receive and process domain_record structs from peer nodes to track their views of the network topology. This patch verifies that the number of members in a received domain record does not exceed the limit defined by MAX_MON_DOMAIN, something that may otherwise lead to a stack overflow. tipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where we are reading a 32 bit message data length field into a uint16. To avert any risk of bit overflow, we add an extra sanity check for this in that function. We cannot see that happen with the current code, but future designers being unaware of this risk, may introduce it by allowing delivery of very large (> 64k) sk buffers from the bearer layer. This potential problem was identified by Eric Dumazet. This fixes CVE-2022-0435
GHSA-xwqj-8xp2-hxw6
Missing Authorization vulnerability in Ays Pro Easy Form easy-form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Form: from n/a through <= 2.7.8.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-xwr9-j862-6mj9 A memory leakage vulnerability was reported in the 534D0140 DXE driver that may allow a local attacker with elevated privileges to write to NVRAM variables. | CVSS3: 6.7 | 0% Низкий | больше 2 лет назад | |
GHSA-xwr7-j9pf-gg7p Cross-site scripting (XSS) vulnerability in nqt.php in Network Query Tool (NQT) 1.6 allows remote attackers to inject arbitrary web script or HTML via the portNum parameter. | 0% Низкий | почти 4 года назад | ||
GHSA-xwr5-mcxm-cm87 This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution. | CVSS3: 6.1 | 67% Средний | почти 4 года назад | |
GHSA-xwr5-cx3m-rj3v kishan0725 Hospital Management System has a Cross-Site Scripting (XSS) vulnerability in appsearch.php via the email parameter. | CVSS3: 6.1 | 0% Низкий | 4 месяца назад | |
GHSA-xwr3-fmgj-mmfr Exposure of Sensitive Information in bio-basespace-sdk | 0% Низкий | больше 8 лет назад | ||
GHSA-xwr3-f5gh-9v6w Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface. | CVSS3: 8.8 | 23% Средний | больше 1 года назад | |
GHSA-xwr3-6hhp-5cch QSige statistics are affected by a remote SQLi vulnerability. It has been identified that the web application does not correctly filter input parameters, allowing SQL injections, DoS or information disclosure. As a prerequisite, it is necessary to log into the application. | CVSS3: 8.8 | 0% Низкий | больше 2 лет назад | |
GHSA-xwr3-5rff-6h5p In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830. | CVSS3: 6.8 | 0% Низкий | около 4 лет назад | |
GHSA-xwr2-9ffc-64f7 The unlockKey character in a lock using Sciener firmware can be brute forced through repeated challenge requests, compromising the locks integrity. | CVSS3: 9.1 | 0% Низкий | около 2 лет назад | |
GHSA-xwqx-x38c-cw95 Snipe-IT 6.0.2 vulnerable to Cross-site Scripting | CVSS3: 4.8 | 0% Низкий | больше 3 лет назад | |
GHSA-xwqx-rpjh-4w5r delqueueask in rccp 0.9 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/cccp_tmp.txt temporary file. | 0% Низкий | почти 4 года назад | ||
GHSA-xwqx-m66h-v4hc Heap-based buffer overflow in the kernel in NetBSD 3.0, certain versions of FreeBSD and OpenBSD, and possibly other BSD derived operating systems allows local users to have an unknown impact. NOTE: this information is based upon a vague pre-advisory with no actionable information. Details will be updated after 20070329. | 0% Низкий | почти 4 года назад | ||
GHSA-xwqx-h938-xp3h The TNS Listener, as used in Oracle Database 11g 11.1.0.7, 11.2.0.2, and 11.2.0.3, and 10g 10.2.0.3, 10.2.0.4, and 10.2.0.5, as used in Oracle Fusion Middleware, Enterprise Manager, E-Business Suite, and possibly other products, allows remote attackers to execute arbitrary database commands by performing a remote registration of a database (1) instance or (2) service name that already exists, then conducting a man-in-the-middle (MITM) attack to hijack database connections, aka "TNS Poison." | 91% Критический | почти 4 года назад | ||
GHSA-xwqw-rf2q-xmhf Cross-Site Scripting in buefy | больше 5 лет назад | |||
GHSA-xwqw-68pp-fwpc Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createStudents.php via the Id, firstname, and admissionNumber parameters. | CVSS3: 8.8 | 0% Низкий | 8 месяцев назад | |
GHSA-xwqv-pr7g-x8xf SQL injection vulnerability in the Book Reviews (sk_bookreview) extension 0.0.12 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | 0% Низкий | почти 4 года назад | ||
GHSA-xwqr-xmgg-j69q Integer overflow in solana_rbpf | CVSS3: 7.5 | 1% Низкий | около 4 лет назад | |
GHSA-xwqp-mjjh-p3v2 David Brackeen ok-file-formats 203defd is vulnerable to Buffer Overflow. When the function of the ok-file-formats project is used, a heap-buffer-overflow occurs in function ok_png_transform_scanline() in "/ok_png.c:533". | CVSS3: 7.8 | 0% Низкий | около 4 лет назад | |
GHSA-xwqp-6c5w-h6q9 In the Linux kernel, the following vulnerability has been resolved: tipc: improve size validations for received domain records The function tipc_mon_rcv() allows a node to receive and process domain_record structs from peer nodes to track their views of the network topology. This patch verifies that the number of members in a received domain record does not exceed the limit defined by MAX_MON_DOMAIN, something that may otherwise lead to a stack overflow. tipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where we are reading a 32 bit message data length field into a uint16. To avert any risk of bit overflow, we add an extra sanity check for this in that function. We cannot see that happen with the current code, but future designers being unaware of this risk, may introduce it by allowing delivery of very large (> 64k) sk buffers from the bearer layer. This potential problem was identified by Eric Dumazet. This fixes CVE-2022-0435 | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
GHSA-xwqj-8xp2-hxw6 Missing Authorization vulnerability in Ays Pro Easy Form easy-form allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Form: from n/a through <= 2.7.8. | CVSS3: 7.5 | 0% Низкий | 3 месяца назад |
Уязвимостей на страницу