Show filters
23 Total Results
Displaying 11-20 of 23
Sort by:
Attacker Value
Unknown
CVE-2020-36277
Disclosure Date: March 11, 2021 (last updated February 22, 2025)
Leptonica before 1.80.0 allows a denial of service (application crash) via an incorrect left shift in pixConvert2To8 in pixconv.c.
0
Attacker Value
Unknown
CVE-2014-3809
Disclosure Date: January 31, 2020 (last updated February 21, 2025)
Cross-site scripting (XSS) vulnerability in the management interface in Alcatel-Lucent 1830 Photonic Service Switch (PSS) 6.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the myurl parameter to menu/pop.html.
0
Attacker Value
Unknown
CVE-2018-9090
Disclosure Date: September 24, 2019 (last updated November 27, 2024)
CoreOS Tectonic 1.7.x and 1.8.x before 1.8.7-tectonic.2 deploys the Grafana web application using default credentials (admin/admin) for the administrator account located at grafana-credentials secret. This occurs because CoreOS does not randomize the administrative password to later be configured by Tectonic administrators. An attacker can insert an XSS payload into the dashboards.
0
Attacker Value
Unknown
CVE-2019-11504
Disclosure Date: April 24, 2019 (last updated November 27, 2024)
Zotonic before version 0.47 has mod_admin XSS.
0
Attacker Value
Unknown
CVE-2018-5256
Disclosure Date: May 18, 2018 (last updated November 26, 2024)
CoreOS Tectonic 1.7.x before 1.7.9-tectonic.4 and 1.8.x before 1.8.4-tectonic.3 mounts a direct proxy to the kubernetes cluster at /api/kubernetes/ which is accessible without authentication to Tectonic and allows an attacker to directly connect to the kubernetes API server. Unauthenticated users are able to list all Namespaces through the Console, resulting in an information disclosure. Tectonic's exposure of an unauthenticated API endpoint containing information regarding the internal state of the cluster can provide an attacker with information that may assist in other attacks against the cluster. For example, an attacker may not have the permissions required to list all namespaces in the cluster but can instead leverage this vulnerability to enumerate the namespaces and then begin to check each namespace for weak authorization policies that may allow further escalation of privileges.
0
Attacker Value
Unknown
CVE-2018-3836
Disclosure Date: April 24, 2018 (last updated November 26, 2024)
An exploitable command injection vulnerability exists in the gplotMakeOutput function of Leptonica 1.74.4. A specially crafted gplot rootname argument can cause a command injection resulting in arbitrary code execution. An attacker can provide a malicious path as input to an application that passes attacker data to this function to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2018-7442
Disclosure Date: February 23, 2018 (last updated December 19, 2023)
An issue was discovered in Leptonica through 1.75.3. The gplotMakeOutput function does not block '/' characters in the gplot rootname argument, potentially leading to path traversal and arbitrary file overwrite.
0
Attacker Value
Unknown
CVE-2018-7441
Disclosure Date: February 23, 2018 (last updated December 19, 2023)
Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.
0
Attacker Value
Unknown
CVE-2017-18196
Disclosure Date: February 23, 2018 (last updated December 19, 2023)
Leptonica 1.74.4 constructs unintended pathnames (containing duplicated path components) when operating on files in /tmp subdirectories, which might allow local users to bypass intended file restrictions by leveraging access to a directory located deeper within the /tmp directory tree, as demonstrated by /tmp/ANY/PATH/ANY/PATH/input.tif.
0
Attacker Value
Unknown
CVE-2018-7440
Disclosure Date: February 23, 2018 (last updated December 19, 2023)
An issue was discovered in Leptonica through 1.75.3. The gplotMakeOutput function allows command injection via a $(command) approach in the gplot rootname argument. This issue exists because of an incomplete fix for CVE-2018-3836.
0