Show filters
732 Total Results
Displaying 221-230 of 732
Sort by:
Attacker Value
Unknown

CVE-2022-3505

Disclosure Date: October 14, 2022 (last updated February 24, 2025)
A vulnerability was found in SourceCodester Sanitization Management System. It has been classified as problematic. Affected is an unknown function of the file /php-sms/admin/. The manipulation of the argument page leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-210840.
Attacker Value
Unknown

CVE-2022-3504

Disclosure Date: October 14, 2022 (last updated February 24, 2025)
A vulnerability was found in SourceCodester Sanitization Management System and classified as critical. This issue affects some unknown processing of the file /php-sms/?p=services/view_service. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-210839.
Attacker Value
Unknown

CVE-2021-40166

Disclosure Date: October 07, 2022 (last updated February 24, 2025)
A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code.
Attacker Value
Unknown

CVE-2021-40165

Disclosure Date: October 07, 2022 (last updated February 24, 2025)
A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
Attacker Value
Unknown

CVE-2021-40164

Disclosure Date: October 07, 2022 (last updated February 24, 2025)
A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
Attacker Value
Unknown

CVE-2021-40163

Disclosure Date: October 07, 2022 (last updated February 24, 2025)
A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component.
Attacker Value
Unknown

CVE-2021-40162

Disclosure Date: October 07, 2022 (last updated February 24, 2025)
A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
Attacker Value
Unknown

CVE-2022-23006

Disclosure Date: September 27, 2022 (last updated February 24, 2025)
A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.
Attacker Value
Unknown

CVE-2022-21169

Disclosure Date: September 26, 2022 (last updated February 24, 2025)
The package express-xss-sanitizer before 1.1.3 are vulnerable to Prototype Pollution via the allowedTags attribute, allowing the attacker to bypass xss sanitization.
Attacker Value
Unknown

CVE-2022-36020

Disclosure Date: September 13, 2022 (last updated February 24, 2025)
The typo3/html-sanitizer package is an HTML sanitizer, written in PHP, aiming to provide XSS-safe markup based on explicitly allowed tags, attributes and values. Due to a parsing issue in the upstream package `masterminds/html5`, malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This allows for a bypass of the cross-site scripting mechanism of `typo3/html-sanitizer`. This issue has been addressed in versions 1.0.7 and 2.0.16 of the `typo3/html-sanitizer` package. Users are advised to upgrade. There are no known workarounds for this issue.