Show filters
148 Total Results
Displaying 71-80 of 148
Sort by:
Attacker Value
Unknown

CVE-2019-19470

Disclosure Date: December 30, 2019 (last updated November 27, 2024)
Unsafe usage of .NET deserialization in Named Pipe message processing allows privilege escalation to NT AUTHORITY\SYSTEM for a local attacker. Affected product is TinyWall, all versions up to and including 2.1.12. Fixed in version 2.1.13.
Attacker Value
Unknown

CVE-2019-1010091

Disclosure Date: July 17, 2019 (last updated November 27, 2024)
tinymce 4.7.11, 4.7.12 is affected by: CWE-79: Improper Neutralization of Input During Web Page Generation. The impact is: JavaScript code execution. The component is: Media element. The attack vector is: The victim must paste malicious content to media element's embed tab.
Attacker Value
Unknown

CVE-2019-13144

Disclosure Date: July 05, 2019 (last updated November 27, 2024)
myTinyTodo 1.3.3 through 1.4.3 allows CSV Injection. This is fixed in 1.5.
Attacker Value
Unknown

CVE-2019-12495

Disclosure Date: May 31, 2019 (last updated November 27, 2024)
An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to a one-byte out-of-bounds write in the gsym_addr function in x86_64-gen.c. This occurs because tccasm.c mishandles section switches.
0
Attacker Value
Unknown

CVE-2019-10012

Disclosure Date: March 25, 2019 (last updated November 08, 2023)
Jenzabar JICS (aka Internet Campus Solution) before 9 allows remote attackers to upload and execute arbitrary .aspx code by placing it in a ZIP archive and using the MoxieManager (for .NET) plugin before 2.1.4 in the moxiemanager directory within the installation folder ICS\ICS.NET\ICSFileServer.
Attacker Value
Unknown

CVE-2019-9754

Disclosure Date: March 13, 2019 (last updated November 27, 2024)
An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. Compiling a crafted source file leads to an 1 byte out of bounds write in the end_macro function in tccpp.c.
0
Attacker Value
Unknown

CVE-2019-9748

Disclosure Date: March 13, 2019 (last updated November 27, 2024)
In tinysvcmdns through 2018-01-16, an mDNS server processing a crafted packet can perform arbitrary data read operations up to 16383 bytes from the start of the buffer. This can lead to a segmentation fault in uncompress_nlabel in mdns.c and a crash of the server (depending on the memory protection of the CPU and the operating system), or disclosure of memory content via error messages or a server response. NOTE: the product's web site states "This project is un-maintained, and has been since 2013. ... There are known vulnerabilities ... You are advised to NOT use this library for any new projects / products."
0
Attacker Value
Unknown

CVE-2019-9747

Disclosure Date: March 13, 2019 (last updated November 27, 2024)
In tinysvcmdns through 2018-01-16, a maliciously crafted mDNS (Multicast DNS) packet triggers an infinite loop while parsing an mDNS query. When mDNS compressed labels point to each other, the function uncompress_nlabel goes into an infinite loop trying to analyze the packet with an mDNS query. As a result, the mDNS server hangs after receiving the malicious mDNS packet. NOTE: the product's web site states "This project is un-maintained, and has been since 2013. ... There are known vulnerabilities ... You are advised to NOT use this library for any new projects / products."
0
Attacker Value
Unknown

CVE-2019-9002

Disclosure Date: February 22, 2019 (last updated November 27, 2024)
An issue was discovered in Tiny Issue 1.3.1 and pixeline Bugs through 1.3.2c. install/config-setup.php allows remote attackers to execute arbitrary PHP code via the database_host parameter if the installer remains present in its original directory after installation is completed.
0
Attacker Value
Unknown

CVE-2018-20652

Disclosure Date: January 01, 2019 (last updated November 27, 2024)
An attempted excessive memory allocation was discovered in the function tinyexr::AllocateImage in tinyexr.h in tinyexr v0.9.5. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted input, which leads to an out-of-memory exception.
0