Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown
CVE-2023-2789
Disclosure Date: May 18, 2023 (last updated February 25, 2025)
A vulnerability was found in GNU cflow 1.7. It has been rated as problematic. This issue affects the function func_body/parse_variable_declaration of the file parser.c. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-229373 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2020-23856
Disclosure Date: May 18, 2021 (last updated February 22, 2025)
Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
0
Attacker Value
Unknown
CVE-2020-13260
Disclosure Date: September 17, 2020 (last updated February 22, 2025)
A vulnerability in the web-based management interface of RAD SecFlow-1v through 2020-05-21 could allow an authenticated attacker to upload a JavaScript file, with a stored XSS payload, that will remain stored in the system as an OVPN file in Configuration-Services-Security-OpenVPN-Config or as the static key file in Configuration-Services-Security-OpenVPN-Static Keys. This payload will execute each time a user opens an affected web page. This could be exploited in conjunction with CVE-2020-13259.
0
Attacker Value
Unknown
CVE-2020-13259
Disclosure Date: September 16, 2020 (last updated February 22, 2025)
A vulnerability in the web-based management interface of RAD SecFlow-1v os-image SF_0290_2.3.01.26 could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. This could be exploited in conjunction with CVE-2020-13260.
0
Attacker Value
Unknown
CVE-2019-16166
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
GNU cflow through 1.6 has a heap-based buffer over-read in the nexttoken function in parser.c.
0
Attacker Value
Unknown
CVE-2019-16165
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
GNU cflow through 1.6 has a use-after-free in the reference function in parser.c.
0
Attacker Value
Unknown
CVE-2019-10335
Disclosure Date: June 11, 2019 (last updated October 26, 2023)
A stored cross site scripting vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier allowed attackers able to configure jobs in Jenkins or control the output of the ElectricFlow API to inject arbitrary HTML and JavaScript in the plugin-provided output on build status pages.
0
Attacker Value
Unknown
CVE-2019-10332
Disclosure Date: June 11, 2019 (last updated October 26, 2023)
A missing permission check in Jenkins ElectricFlow Plugin 1.1.5 and earlier in Configuration#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials.
0
Attacker Value
Unknown
CVE-2019-10333
Disclosure Date: June 11, 2019 (last updated October 26, 2023)
Missing permission checks in Jenkins ElectricFlow Plugin 1.1.5 and earlier in various HTTP endpoints allowed users with Overall/Read access to obtain information about the Jenkins ElectricFlow Plugin configuration and configuration of connected ElectricFlow instances.
0
Attacker Value
Unknown
CVE-2019-10331
Disclosure Date: June 11, 2019 (last updated October 26, 2023)
A cross-site request forgery vulnerability in Jenkins ElectricFlow Plugin 1.1.5 and earlier in Configuration#doTestConnection allowed attackers to connect to an attacker-specified URL using attacker-specified credentials.
0