CVE-2022-0772
Cross-site Scripting (XSS) – Stored in GitHub repository librenms/librenms prior to 22.2.2. Devamını Oku Kaynak: NIST
Cross-site Scripting (XSS) – Stored in GitHub repository librenms/librenms prior to 22.2.2. Devamını Oku Kaynak: NIST
In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This…
In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This…
The Job Composer app in Ohio Supercomputer Center Open OnDemand before 1.7.19 and 1.8.x before 1.8.18 allows remote authenticated users to provide crafted input in a job template. Devamını Oku
An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session. Devamını Oku
The package karma before 6.3.16 are vulnerable to Open Redirect due to missing validation of the return_url query parameter. Devamını Oku
A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name. Devamını Oku
The interface of a certain HarmonyOS module has an invalid address access vulnerability. Successful exploitation of this vulnerability may lead to kernel crash. Devamını Oku
The interface of a certain HarmonyOS module has an integer overflow vulnerability. Successful exploitation of this vulnerability may lead to heap memory overflow. Devamını Oku
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability. Devamını Oku
This issues due to insufficient verification of the various input values from user’s input. The vulnerability allows remote attackers to execute malicious code in Firstmall via navercheckout_add function. Devamını Oku
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity. Devamını Oku