Show filters
222 Total Results
Displaying 61-70 of 222
Sort by:
Attacker Value
Unknown
CVE-2022-23121
Disclosure Date: March 28, 2023 (last updated November 23, 2023)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.
0
Attacker Value
Unknown
CVE-2022-0194
Disclosure Date: March 28, 2023 (last updated November 23, 2023)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15876.
0
Attacker Value
Unknown
CVE-2023-27054
Disclosure Date: March 22, 2023 (last updated October 08, 2023)
A cross-site scripting (XSS) vulnerability in MiroTalk P2P before commit f535b35 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter under the settings module.
0
Attacker Value
Unknown
CVE-2023-26041
Disclosure Date: February 27, 2023 (last updated November 08, 2023)
Nextcloud Talk is a fully on-premises audio/video and chat communication service. When cron jobs were misconfigured and therefore messages are not expired, the API would still return them while they were then hidden by the frontend code. It is recommended that the Nextcloud Talk is upgraded to 15.0.3. There are no workaround available.
0
Attacker Value
Unknown
CVE-2023-22473
Disclosure Date: January 09, 2023 (last updated November 08, 2023)
Talk-Android enables users to have video & audio calls through Nextcloud on Android. Due to passcode bypass, an attacker is able to access the user's Nextcloud files and view conversations. To exploit this the attacker needs to have physical access to the target's device. There are currently no known workarounds available. It is recommended that the Nextcloud Talk Android app is upgraded to 15.0.2.
0
Attacker Value
Unknown
CVE-2022-41971
Disclosure Date: December 01, 2022 (last updated February 24, 2025)
Nextcould Talk android is a video and audio conferencing app for Nextcloud. Prior to versions 12.2.8, 13.0.10, 14.0.6, and 15.0.0, guests can continue to receive video streams from a call after being removed from a conversation. An attacker would be able to see videos on a call in a public conversation after being removed from that conversation, provided that they were removed while being in the call. Versions 12.2.8, 13.0.10, 14.0.6, and 15.0.0 contain patches for the issue. No known workarounds are available.
0
Attacker Value
Unknown
CVE-2022-41926
Disclosure Date: November 25, 2022 (last updated February 24, 2025)
Nextcould talk android is the android OS implementation of the nextcloud talk chat system. In affected versions the receiver is not protected by broadcastPermission allowing malicious apps to monitor communication. It is recommended that the Nextcloud Talk Android is upgraded to 14.1.0. There are no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2022-45188
Disclosure Date: November 12, 2022 (last updated February 24, 2025)
Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution via a crafted .appl file. This provides remote root access on some platforms such as FreeBSD (used for TrueNAS).
0
Attacker Value
Unknown
CVE-2022-38744
Disclosure Date: October 27, 2022 (last updated February 24, 2025)
An unauthenticated attacker with network access to a victim's Rockwell Automation FactoryTalk Alarm and
Events service could open a connection, causing the service to fault and become unavailable. The affected port
could be used as a server ping port and uses messages structured with XML.
0
Attacker Value
Unknown
CVE-2022-3158
Disclosure Date: October 17, 2022 (last updated February 24, 2025)
Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an input validation vulnerability. The FactoryTalk VantagePoint SQL Server lacks input validation when users enter SQL statements to retrieve information from the back-end database. If successfully exploited, this could allow a user with basic user privileges to perform remote code execution on the server.
0