Show filters
68 Total Results
Displaying 51-60 of 68
Sort by:
Attacker Value
Unknown
CVE-2020-9433
Disclosure Date: February 27, 2020 (last updated February 21, 2025)
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
0
Attacker Value
Unknown
CVE-2020-9434
Disclosure Date: February 27, 2020 (last updated February 21, 2025)
openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
0
Attacker Value
Unknown
CVE-2014-2875
Disclosure Date: February 06, 2020 (last updated February 21, 2025)
The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID.
0
Attacker Value
Unknown
CVE-2014-10400
Disclosure Date: February 06, 2020 (last updated February 21, 2025)
The session.lua library in CGILua 5.0.x uses sequential session IDs, which makes it easier for remote attackers to predict the session ID and hijack arbitrary sessions. NOTE: this vulnerability was SPLIT from CVE-2014-2875.
0
Attacker Value
Unknown
CVE-2014-10399
Disclosure Date: February 06, 2020 (last updated February 21, 2025)
The session.lua library in CGILua 5.1.x uses the same ID for each session, which allows remote attackers to hijack arbitrary sessions. NOTE: this vulnerability was SPLIT from CVE-2014-2875.
0
Attacker Value
Unknown
CVE-2019-19391
Disclosure Date: November 29, 2019 (last updated November 08, 2023)
In LuaJIT through 2.0.5, as used in Moonjit before 2.1.2 and other products, debug.getinfo has a type confusion issue that leads to arbitrary memory write or read operations, because certain cases involving valid stack levels and > options are mishandled. NOTE: The LuaJIT project owner states that the debug libary is unsafe by definition and that this is not a vulnerability. When LuaJIT was originally developed, the expectation was that the entire debug library had no security guarantees and thus it made no sense to assign CVEs. However, not all users of later LuaJIT derivatives share this perspective
0
Attacker Value
Unknown
CVE-2018-18758
Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Open Faculty Evaluation System 7 for PHP 7 allows submit_feedback.php SQL Injection, a different vulnerability than CVE-2018-18757.
0
Attacker Value
Unknown
CVE-2018-18757
Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Open Faculty Evaluation System 5.6 for PHP 5.6 allows submit_feedback.php SQL Injection, a different vulnerability than CVE-2018-18758.
0
Attacker Value
Unknown
CVE-2019-6706
Disclosure Date: January 23, 2019 (last updated November 27, 2024)
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.
0
Attacker Value
Unknown
CVE-2018-18803
Disclosure Date: November 16, 2018 (last updated November 27, 2024)
Curriculum Evaluation System 1.0 allows SQL Injection via the login screen, related to frmCourse.vb and includes/user.vb.
0