Show filters
27 Total Results
Displaying 21-27 of 27
Sort by:
Attacker Value
Unknown

CVE-2018-16551

Disclosure Date: September 05, 2018 (last updated November 27, 2024)
LavaLite 5.5 has XSS via a /edit URI, as demonstrated by client/job/job/Zy8PWBekrJ/edit.
0
Attacker Value
Unknown

CVE-2018-12565

Disclosure Date: June 19, 2018 (last updated November 26, 2024)
An issue was discovered in Linaro LAVA before 2018.5.post1. Because of use of yaml.load() instead of yaml.safe_load() when parsing user data, remote code execution can occur.
Attacker Value
Unknown

CVE-2018-12563

Disclosure Date: June 19, 2018 (last updated November 26, 2024)
An issue was discovered in Linaro LAVA before 2018.5.post1. Because of support for file: URLs, a user can force lava-server-gunicorn to download any file from the filesystem if it's readable by lavaserver and valid yaml.
0
Attacker Value
Unknown

CVE-2018-12564

Disclosure Date: June 19, 2018 (last updated November 26, 2024)
An issue was discovered in Linaro LAVA before 2018.5.post1. Because of support for URLs in the submit page, a user can forge an HTTP request that will force lava-server-gunicorn to return any file on the server that is readable by lavaserver and valid yaml.
0
Attacker Value
Unknown

CVE-2017-1000467

Disclosure Date: January 03, 2018 (last updated November 26, 2024)
LavaLite version 5.2.4 is vulnerable to stored cross-site scripting vulnerability, within the blog creation page, which can result in disruption of service and execution of javascript code.
0
Attacker Value
Unknown

CVE-2007-2607

Disclosure Date: May 11, 2007 (last updated October 04, 2023)
PHP remote file inclusion vulnerability in views/print/printbar.php in LaVague 0.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the views_path parameter.
0
Attacker Value
Unknown

CVE-2006-3697

Disclosure Date: July 21, 2006 (last updated October 04, 2023)
Agnitum Outpost Firewall Pro 3.51.759.6511 (462), as used in (1) Lavasoft Personal Firewall 1.0.543.5722 (433) and (2) Novell BorderManager Novell Client Firewall 2.0, does not properly restrict user activities in application windows that run in a LocalSystem context, which allows local users to gain privileges and execute commands (a) via the "open folder" option when no instance of explorer.exe is running, possibly related to the ShellExecute API function; or (b) by overwriting a batch file through the "Save Configuration As" option. NOTE: this might be a vulnerability in Microsoft Windows and explorer.exe instead of the firewall.
0