Show filters
219 Total Results
Displaying 121-130 of 219
Sort by:
Attacker Value
Unknown

CVE-2018-9182

Disclosure Date: June 08, 2018 (last updated November 26, 2024)
Twonky Server before 8.5.1 has XSS via a modified "language" parameter in the Language section.
0
Attacker Value
Unknown

CVE-2018-7171

Disclosure Date: March 30, 2018 (last updated November 26, 2024)
Directory traversal vulnerability in Twonky Server 7.0.11 through 8.5 allows remote attackers to share the contents of arbitrary directories via a .. (dot dot) in the contentbase parameter to rpc/set_all.
0
Attacker Value
Unknown

CVE-2018-7203

Disclosure Date: March 30, 2018 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in Twonky Server 7.0.11 through 8.5 allows remote attackers to inject arbitrary web script or HTML via the friendlyname parameter to rpc/set_all.
0
Attacker Value
Unknown

CVE-2018-7719

Disclosure Date: March 25, 2018 (last updated November 26, 2024)
Acrolinx Server before 5.2.5 on Windows allows Directory Traversal.
0
Attacker Value
Unknown

CVE-2014-5002

Disclosure Date: January 10, 2018 (last updated November 26, 2024)
The lynx gem before 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.
0
Attacker Value
Unknown

CVE-2017-1000211

Disclosure Date: November 17, 2017 (last updated November 26, 2024)
Lynx before 2.8.9dev.16 is vulnerable to a use after free in the HTML parser resulting in memory disclosure, because HTML_put_string() can append a chunk onto itself.
0
Attacker Value
Unknown

CVE-2015-8299

Disclosure Date: August 29, 2017 (last updated November 26, 2024)
Buffer overflow in the Group messages monitor (Falcon) in KNX ETS 4.1.5 (Build 3246) allows remote attackers to execute arbitrary code via a crafted KNXnet/IP UDP packet.
0
Attacker Value
Unknown

CVE-2017-7936

Disclosure Date: August 07, 2017 (last updated November 26, 2024)
A stack-based buffer overflow issue was discovered in NXP i.MX 50, i.MX 53, i.MX 6ULL, i.MX 6UltraLite, i.MX 6SoloLite, i.MX 6Solo, i.MX 6DualLite, i.MX 6SoloX, i.MX 6Dual, i.MX 6Quad, i.MX 6DualPlus, i.MX 6QuadPlus, Vybrid VF3xx, Vybrid VF5xx, and Vybrid VF6xx. When the device is configured in security enabled configuration, SDP could be used to download a small section of code to an unprotected region of memory.
0
Attacker Value
Unknown

CVE-2017-7932

Disclosure Date: August 07, 2017 (last updated November 26, 2024)
An improper certificate validation issue was discovered in NXP i.MX 28 i.MX 50, i.MX 53, i.MX 7Solo i.MX 7Dual Vybrid VF3xx, Vybrid VF5xx, Vybrid VF6xx, i.MX 6ULL, i.MX 6UltraLite, i.MX 6SoloLite, i.MX 6Solo, i.MX 6DualLite, i.MX 6SoloX, i.MX 6Dual, i.MX 6Quad, i.MX 6DualPlus, and i.MX 6QuadPlus. When the device is configured in security enabled configuration, under certain conditions it is possible to bypass the signature verification by using a specially crafted certificate leading to the execution of an unsigned image.
0
Attacker Value
Unknown

CVE-2016-8357

Disclosure Date: February 13, 2017 (last updated November 26, 2024)
An issue was discovered in Lynxspring JENEsys BAS Bridge versions 1.1.8 and older. A user with read-only access can send commands to the software and the application will accept those commands. This would allow an attacker with read-only access to make changes within the application.
0