Show filters
529 Total Results
Displaying 281-290 of 529
Sort by:
Attacker Value
Unknown
CVE-2019-20005
Disclosure Date: December 26, 2019 (last updated November 27, 2024)
An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_decode, while parsing a crafted XML file, performs incorrect memory handling, leading to a heap-based buffer over-read while running strchr() starting with a pointer after a '\0' character (where the processing of a string was finished).
0
Attacker Value
Unknown
CVE-2019-20006
Disclosure Date: December 26, 2019 (last updated November 27, 2024)
An issue was discovered in ezXML 0.8.3 through 0.8.6. The function ezxml_char_content puts a pointer to the internal address of a larger block as xml->txt. This is later deallocated (using free), leading to a segmentation fault.
0
Attacker Value
Unknown
CVE-2019-20007
Disclosure Date: December 26, 2019 (last updated November 27, 2024)
An issue was discovered in ezXML 0.8.2 through 0.8.6. The function ezxml_str2utf8, while parsing a crafted XML file, performs zero-length reallocation in ezxml.c, leading to returning a NULL pointer (in some compilers). After this, the function ezxml_parse_str does not check whether the s variable is not NULL in ezxml.c, leading to a NULL pointer dereference and crash (segmentation fault).
0
Attacker Value
Unknown
CVE-2019-18608
Disclosure Date: October 29, 2019 (last updated November 27, 2024)
Cezerin v0.33.0 allows unauthorized order-information modification because certain internal attributes can be overwritten via a conflicting name when processing order requests. Hence, a malicious customer can manipulate an order (e.g., its payment status or shipping fee) by adding additional attributes to user-input during the PUT /ajax/cart operation for a checkout, because of getValidDocumentForUpdate in api/server/services/orders/orders.js.
0
Attacker Value
Unknown
CVE-2019-13518
Disclosure Date: September 04, 2019 (last updated November 27, 2024)
An attacker could use a specially crafted project file to overflow the buffer and execute code under the privileges of the EZ Touch Editor Versions 2.1.0 and prior.
0
Attacker Value
Unknown
CVE-2019-13522
Disclosure Date: September 04, 2019 (last updated November 27, 2024)
An attacker could use a specially crafted project file to corrupt the memory and execute code under the privileges of the EZ PLC Editor Versions 1.8.41 and prior.
0
Attacker Value
Unknown
CVE-2018-20985
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
The wp-payeezy-pay plugin before 2.98 for WordPress has local file inclusion in pay.php, donate.php, donate-rec, and pay-rec.
0
Attacker Value
Unknown
CVE-2019-14353
Disclosure Date: August 08, 2019 (last updated November 27, 2024)
On Trezor One devices before 1.8.2, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: this CVE applies exclusively to the Trezor One, and does not refer to any issues with OLED displays on other devices.
0
Attacker Value
Unknown
CVE-2019-14731
Disclosure Date: August 07, 2019 (last updated November 27, 2024)
An issue was discovered in ZenTao 11.5.1. There is an XSS (stored) vulnerability that leads to the capture of other people's cookies via the Rich Text Box.
0
Attacker Value
Unknown
CVE-2019-12960
Disclosure Date: June 25, 2019 (last updated November 27, 2024)
LiveZilla Server before 8.0.1.1 is vulnerable to SQL Injection in functions.internal.build.inc.php via the parameter p_dt_s_d.
0