Show filters
529 Total Results
Displaying 241-250 of 529
Sort by:
Attacker Value
Unknown
CVE-2016-15003
Disclosure Date: July 18, 2022 (last updated February 24, 2025)
A vulnerability has been found in FileZilla Client 3.17.0.0 and classified as problematic. This vulnerability affects unknown code of the file C:\Program Files\FileZilla FTP Client\uninstall.exe of the component Installer. The manipulation leads to unquoted search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2015-10003
Disclosure Date: July 17, 2022 (last updated February 24, 2025)
A vulnerability, which was classified as problematic, was found in FileZilla Server up to 0.9.50. This affects an unknown part of the component PORT Handler. The manipulation leads to unintended intermediary. It is possible to initiate the attack remotely. Upgrading to version 0.9.51 is able to address this issue. It is recommended to upgrade the affected component.
0
Attacker Value
Unknown
CVE-2022-29620
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
FileZilla v3.59.0 allows attackers to obtain cleartext passwords of connected SSH or FTP servers via a memory dump.- NOTE: the vendor does not consider this a vulnerability
0
Attacker Value
Unknown
CVE-2022-29249
Disclosure Date: May 24, 2022 (last updated February 23, 2025)
JavaEZ is a library that adds new functions to make Java easier. A weakness in JavaEZ 1.6 allows force decryption of locked text by unauthorized actors. The issue is NOT critical for non-secure applications, however may be critical in a situation where the highest levels of security are required. This issue ONLY affects v1.6 and does not affect anything pre-1.6. The vulnerability has been patched in release 1.7. Currently, there is no way to fix the issue without upgrading.
0
Attacker Value
Unknown
CVE-2022-30045
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap out-of-bounds read.
0
Attacker Value
Unknown
CVE-2022-24813
Disclosure Date: April 04, 2022 (last updated February 23, 2025)
CreateWiki is Miraheze's MediaWiki extension for requesting & creating wikis. Without the patch for this issue, anonymous comments can be made using Special:RequestWikiQueue when sent directly via POST. A patch for this issue is available in the `master` branch of CreateWiki's GitHub repository.
0
Attacker Value
Unknown
CVE-2022-0680
Disclosure Date: March 28, 2022 (last updated February 23, 2025)
The Plezi WordPress plugin before 1.0.3 has a REST endpoint allowing unauthenticated users to update the plz_configuration_tracker_enable option, which is then displayed in the admin panel without sanitisation and escaping, leading to a Stored Cross-Site Scripting issue
0
Attacker Value
Unknown
CVE-2022-0204
Disclosure Date: March 10, 2022 (last updated February 23, 2025)
A heap overflow vulnerability was found in bluez in versions prior to 5.63. An attacker with local network access could pass specially crafted files causing an application to halt or crash, leading to a denial of service.
0
Attacker Value
Unknown
CVE-2021-3658
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
bluetoothd from bluez incorrectly saves adapters' Discoverable status when a device is powered down, and restores it when powered up. If a device is powered down while discoverable, it will be discoverable when powered on again. This could lead to inadvertent exposure of the bluetooth stack to physically nearby attackers.
0
Attacker Value
Unknown
CVE-2019-8921
Disclosure Date: November 29, 2021 (last updated February 23, 2025)
An issue was discovered in bluetoothd in BlueZ through 5.48. The vulnerability lies in the handling of a SVC_ATTR_REQ by the SDP implementation. By crafting a malicious CSTATE, it is possible to trick the server into returning more bytes than the buffer actually holds, resulting in leaking arbitrary heap data. The root cause can be found in the function service_attr_req of sdpd-request.c. The server does not check whether the CSTATE data is the same in consecutive requests, and instead simply trusts that it is the same.
0