![]() ![]() (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in James Lao's Simple Video Embedder plugin " in an MKV file, which triggers heap memory corruption, as demonstrated using refined-australia-blu720p-sample.mkv. Improper Authentication vulnerability in ABB Symphony Plus S+ Operations.This issue affects Symphony Plus S+ Operations: from 2.X through 2.1 SP2, 2.2, from 3.X through 3.3 SP1, 3.3 SP2.Īuth. This issue affects Yugabyte DB: Lesser then 2.2. This vulnerability is associated with program files backup.Py. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. The identifier VDB-220053 was assigned to this vulnerability.Įxternal Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. It is possible to initiate the attack remotely. The manipulation leads to information disclosure. This affects an unknown part of the file / of the component Backup File Handler. Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.Ī vulnerability, which was classified as critical, was found in Multilaser RE057 and RE170 2.1/2.2. The associated identifier of this vulnerability is VDB-221735. The exploit has been disclosed to the public and may be used. The manipulation of the argument file_path leads to path traversal. This issue affects some unknown processing of the file index.php. ![]() VDB-221802 is the identifier assigned to this vulnerability.Ī vulnerability, which was classified as problematic, has been found in MuYuCMS 2.2. It is possible to launch the attack remotely. The manipulation of the argument dir_path leads to relative path traversal. Affected is an unknown function of the file /editor/index.php. The associated identifier of this vulnerability is VDB-221803.Ī vulnerability was found in MuYuCMS 2.2. The manipulation of the argument file_path leads to relative path traversal. Affected by this vulnerability is an unknown functionality of the file /editor/index.php. The identifier of this vulnerability is VDB-221804.Ī vulnerability was found in MuYuCMS 2.2. The manipulation of the argument filedelur leads to relative path traversal. Affected by this issue is some unknown functionality of the file /admin.php/accessory/filesdel.html. The identifier VDB-221805 was assigned to this vulnerability.Ī vulnerability was found in MuYuCMS 2.2. ![]() The manipulation of the argument url leads to server-side request forgery. This affects an unknown part of the file /admin.php/update/getFile.html. Integer overflow vulnerability in function Q_DecCoordOnUnitSphere file bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master.Ī vulnerability classified as critical has been found in MuYuCMS 2.2. GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a memory leak in lsr_read_rare_full function. There is no available information about whether any later version is affected. NOTE: 2.x versions are no longer supported. A single-line file might contain credentials, such as "machine login daniel password qwerty" in the documentation example for the. A handler thread can use an overwritten context->FileName.īlueCat Device Registration Portal 2.2 allows XXE attacks that exfiltrate single-line files. A race condition in LightFTP through 2.2 allows an attacker to achieve path traversal via a malformed FTP request.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |