Show filters
144 Total Results
Displaying 21-30 of 144
Sort by:
Attacker Value
Unknown
CVE-2024-0771
Disclosure Date: January 21, 2024 (last updated January 30, 2024)
A vulnerability has been found in Nsasoft Product Key Explorer 4.0.9 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Registration Handler. The manipulation of the argument Name/Key leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251671. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2023-4932
Disclosure Date: December 12, 2023 (last updated December 16, 2023)
SAS application is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in the `_program` parameter of the the `/SASStoredProcess/do` endpoint allows arbitrary JavaScript to be executed when specially crafted URL is opened by an authenticated user. The attack is possible from a low-privileged user. Only versions 9.4_M7 and 9.4_M8 were tested and confirmed to be vulnerable, status of others is unknown. For above mentioned versions hot fixes were published.
0
Attacker Value
Unknown
CVE-2023-47440
Disclosure Date: December 07, 2023 (last updated December 13, 2023)
Gladys Assistant v4.27.0 and prior is vulnerable to Directory Traversal. The patch of CVE-2023-43256 was found to be incomplete, allowing authenticated attackers to extract sensitive files in the host machine.
0
Attacker Value
Unknown
CVE-2023-43256
Disclosure Date: September 25, 2023 (last updated October 08, 2023)
A path traversal in Gladys Assistant v4.26.1 and below allows authenticated attackers to extract sensitive files in the host machine by exploiting a non-sanitized user input.
0
Attacker Value
Unknown
CVE-2022-43358
Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Stack overflow vulnerability in ast_selectors.cpp: in function Sass::ComplexSelector::has_placeholder in libsass:3.6.5-8-g210218, which can be exploited by attackers to cause a denial of service (DoS).
0
Attacker Value
Unknown
CVE-2022-43357
Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Stack overflow vulnerability in ast_selectors.cpp in function Sass::CompoundSelector::has_real_parent_ref in libsass:3.6.5-8-g210218, which can be exploited by attackers to causea denial of service (DoS). Also affects the command line driver for libsass, sassc 3.6.2.
0
Attacker Value
Unknown
CVE-2022-26592
Disclosure Date: August 22, 2023 (last updated October 08, 2023)
Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function.
0
Attacker Value
Unknown
CVE-2023-24724
Disclosure Date: April 03, 2023 (last updated October 08, 2023)
A stored cross site scripting (XSS) vulnerability was discovered in the user management module of the SAS 9.4 Admin Console, due to insufficient validation and sanitization of data input into the user creation and editing form fields. The product name is SAS Web Administration interface (SASAdmin). For the product release, the reported version is 9.4_M2 and the fixed version is 9.4_M3. For the SAS release, the reported version is 9.4 TS1M2 and the fixed version is 9.4 TS1M3.
0
Attacker Value
Unknown
CVE-2023-0029
Disclosure Date: January 01, 2023 (last updated October 08, 2023)
A vulnerability was found in Multilaser RE708 RE1200R4GC-2T2R-V3_v3411b_MUL029B. It has been rated as problematic. This issue affects some unknown processing of the component Telnet Service. The manipulation leads to denial of service. The attack may be initiated remotely. The identifier VDB-217169 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2022-25898
Disclosure Date: July 01, 2022 (last updated October 07, 2023)
The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.
0