Show filters
192 Total Results
Displaying 41-50 of 192
Sort by:
Attacker Value
Unknown
CVE-2023-34153
Disclosure Date: May 30, 2023 (last updated October 08, 2023)
A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding.
0
Attacker Value
Unknown
CVE-2023-34151
Disclosure Date: May 30, 2023 (last updated December 21, 2024)
A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546).
0
Attacker Value
Unknown
CVE-2023-30944
Disclosure Date: May 02, 2023 (last updated April 19, 2024)
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
0
Attacker Value
Unknown
CVE-2023-30943
Disclosure Date: May 02, 2023 (last updated April 19, 2024)
The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.
0
Attacker Value
Unknown
CVE-2023-1906
Disclosure Date: April 12, 2023 (last updated October 08, 2023)
A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
0
Attacker Value
Unknown
CVE-2023-0056
Disclosure Date: March 23, 2023 (last updated October 08, 2023)
An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
0
Attacker Value
Unknown
CVE-2023-1289
Disclosure Date: March 23, 2023 (last updated October 08, 2023)
A vulnerability was discovered in ImageMagick where a specially created SVG file loads itself and causes a segmentation fault. This flaw allows a remote attacker to pass a specially crafted SVG file that leads to a segmentation fault, generating many trash files in "/tmp," resulting in a denial of service. When ImageMagick crashes, it generates a lot of trash files. These trash files can be large if the SVG file contains many render actions. In a denial of service attack, if a remote attacker uploads an SVG file of size t, ImageMagick generates files of size 103*t. If an attacker uploads a 100M SVG, the server will generate about 10G.
0
Attacker Value
Unknown
CVE-2022-4170
Disclosure Date: December 09, 2022 (last updated February 24, 2025)
The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.
0
Attacker Value
Unknown
CVE-2022-4144
Disclosure Date: November 29, 2022 (last updated February 24, 2025)
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.
0
Attacker Value
Unknown
CVE-2022-45152
Disclosure Date: November 25, 2022 (last updated February 24, 2025)
A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
0