Show filters
68 Total Results
Displaying 51-60 of 68
Sort by:
Attacker Value
Unknown

CVE-2020-9433

Disclosure Date: February 27, 2020 (last updated February 21, 2025)
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
Attacker Value
Unknown

CVE-2020-9434

Disclosure Date: February 27, 2020 (last updated February 21, 2025)
openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
Attacker Value
Unknown

CVE-2014-2875

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
The session.lua library in CGILua 5.2 alpha 1 and 5.2 alpha 2 uses weak session IDs generated based on OS time, which allows remote attackers to hijack arbitrary sessions via a brute force attack. NOTE: CVE-2014-10399 and CVE-2014-10400 were SPLIT from this ID.
Attacker Value
Unknown

CVE-2014-10400

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
The session.lua library in CGILua 5.0.x uses sequential session IDs, which makes it easier for remote attackers to predict the session ID and hijack arbitrary sessions. NOTE: this vulnerability was SPLIT from CVE-2014-2875.
Attacker Value
Unknown

CVE-2014-10399

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
The session.lua library in CGILua 5.1.x uses the same ID for each session, which allows remote attackers to hijack arbitrary sessions. NOTE: this vulnerability was SPLIT from CVE-2014-2875.
Attacker Value
Unknown

CVE-2019-19391

Disclosure Date: November 29, 2019 (last updated November 08, 2023)
In LuaJIT through 2.0.5, as used in Moonjit before 2.1.2 and other products, debug.getinfo has a type confusion issue that leads to arbitrary memory write or read operations, because certain cases involving valid stack levels and > options are mishandled. NOTE: The LuaJIT project owner states that the debug libary is unsafe by definition and that this is not a vulnerability. When LuaJIT was originally developed, the expectation was that the entire debug library had no security guarantees and thus it made no sense to assign CVEs. However, not all users of later LuaJIT derivatives share this perspective
Attacker Value
Unknown

CVE-2018-18758

Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Open Faculty Evaluation System 7 for PHP 7 allows submit_feedback.php SQL Injection, a different vulnerability than CVE-2018-18757.
0
Attacker Value
Unknown

CVE-2018-18757

Disclosure Date: June 19, 2019 (last updated November 27, 2024)
Open Faculty Evaluation System 5.6 for PHP 5.6 allows submit_feedback.php SQL Injection, a different vulnerability than CVE-2018-18758.
0
Attacker Value
Unknown

CVE-2019-6706

Disclosure Date: January 23, 2019 (last updated November 27, 2024)
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.
Attacker Value
Unknown

CVE-2018-18803

Disclosure Date: November 16, 2018 (last updated November 27, 2024)
Curriculum Evaluation System 1.0 allows SQL Injection via the login screen, related to frmCourse.vb and includes/user.vb.
0