Show filters
43 Total Results
Displaying 21-30 of 43
Sort by:
Attacker Value
Unknown

CVE-2022-45188

Disclosure Date: November 12, 2022 (last updated February 24, 2025)
Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution via a crafted .appl file. This provides remote root access on some platforms such as FreeBSD (used for TrueNAS).
Attacker Value
Unknown

CVE-2022-22995

Disclosure Date: March 25, 2022 (last updated February 23, 2025)
The combination of primitives offered by SMB and AFP in their default configuration allows the arbitrary writing of files. By exploiting these combination of primitives, an attacker can execute arbitrary code.
Attacker Value
Unknown

CVE-2022-24784

Disclosure Date: March 25, 2022 (last updated February 23, 2025)
Statamic is a Laravel and Git powered CMS. Before versions 3.2.39 and 3.3.2, it is possible to confirm a single character of a user's password hash using a specially crafted regular expression filter in the users endpoint of the REST API. Multiple such requests can eventually uncover the entire hash. The hash is not present in the response, however the presence or absence of a result confirms if the character is in the right position. The API has throttling enabled by default, making this a time intensive task. Both the REST API and the users endpoint need to be enabled, as they are disabled by default. The issue has been fixed in versions 3.2.39 and above, and 3.3.2 and above.
Attacker Value
Unknown

CVE-2021-45364

Disclosure Date: February 10, 2022 (last updated November 08, 2023)
A Code Execution vulnerability exists in Statamic Version through 3.2.26 via SettingsController.php. NOTE: the vendor indicates that there was an error in publishing this CVE Record, and that all parties agree that the affected code was not used in any Statamic product
Attacker Value
Unknown

CVE-2021-40909

Disclosure Date: January 24, 2022 (last updated February 23, 2025)
Cross site scripting (XSS) vulnerability in sourcecodester PHP CRUD without Refresh/Reload using Ajax and DataTables Tutorial v1 by oretnom23, allows remote attackers to execute arbitrary code via the first_name, last_name, and email parameters to /ajax_crud.
Attacker Value
Unknown

CVE-2021-23445

Disclosure Date: September 27, 2021 (last updated February 23, 2025)
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.
Attacker Value
Unknown

CVE-2021-31439

Disclosure Date: May 21, 2021 (last updated February 22, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.
Attacker Value
Unknown

CVE-2021-26754

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
wpDataTables before 3.4.1 mishandles order direction for server-side tables, aka admin-ajax.php?action=get_wdtable order[0][dir] SQL injection.
Attacker Value
Unknown

CVE-2020-28458

Disclosure Date: December 16, 2020 (last updated February 22, 2025)
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
Attacker Value
Unknown

CVE-2018-1160

Disclosure Date: December 20, 2018 (last updated January 15, 2025)
Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
0