CVE-2020-25682
Summary: A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered in the way dnsmasq extract...
Summary: A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered in the way dnsmasq extract...
Summary: Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows for privilege escalation via configd. Reference Links(if available): https://www.tenable.com/security/research/tra-2021-04 CVSS...
Summary: A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media player 3.0.11 allows attackers to trigger a heap-based buffer overflow via...
Summary: The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended...
Summary: The CGE page with download function contains a Directory Traversal vulnerability. Attackers can use this loophole to download system...
Summary: The CGE property management system contains SQL Injection vulnerabilities. Remote attackers can inject SQL commands into the parameters in...
Summary: The EFM ipTIME C200 IP Camera is affected by a Command Injection vulnerability in /login.cgi?logout=1 script. To exploit this...
Summary: In the add_match function in libbb/lineedit.c in BusyBox through 1.27.2, the tab autocomplete feature of the shell, used to...
Summary: handler/ssl/OpenSslEngine.java in Netty 4.0.x before 4.0.37.Final and 4.1.x before 4.1.1.Final allows remote attackers to cause a denial of service...
Summary: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.922. User interaction...
Summary: An out-of-bounds write information disclosure vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free...
Summary: Some parsing functions in the affected product do not check the return value of malloc and the thread handling...
Summary: The affected product has uncontrolled resource consumption issues, which may allow an attacker to cause a denial-of-service condition on...
Summary: ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission...
Summary: A Cross-Site Request Forgery (CSRF) vulnerability exists in Star Practice Management Web version 2019.2.0.6, allowing an attacker to change...
Summary: TPEditor (v1.98 and prior) is vulnerable to two out-of-bounds write instances in the way it processes project files, allowing...
Summary: An untrusted pointer dereference has been identified in the way TPEditor(v1.98 and prior) processes project files, allowing an attacker...
Summary: An uninitialized pointer issue has been identified in the way the application processes project files, allowing an attacker to...
Summary: Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to...
Summary: This vulnerability allows remote attackers to disclose sensitive information on affected installations of CA Arcserve D2D 16.5. Authentication is...
Summary: This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from...
Summary: openjpeg: A heap-based buffer overflow flaw was found in the patch for CVE-2013-6045. A crafted j2k image could cause...
Summary: Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a...
Summary: Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access....