Show filters
109 Total Results
Displaying 1-10 of 109
Sort by:
Attacker Value
Unknown
CVE-2025-0430
Disclosure Date: January 17, 2025 (last updated January 18, 2025)
Belledonne Communications Linphone-Desktop
is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition.
0
Attacker Value
Unknown
CVE-2024-56012
Disclosure Date: December 16, 2024 (last updated January 27, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in Pearlbells Flash News / Post (Responsive), Pearlbells Post Title (TypeWriter) allows Privilege Escalation.This issue affects Flash News / Post (Responsive): from n/a through 4.1; Post Title (TypeWriter): from n/a through 4.1.
0
Attacker Value
Unknown
CVE-2024-50307
Disclosure Date: October 28, 2024 (last updated October 28, 2024)
Use of potentially dangerous function issue exists in Chatwork Desktop Application (Windows) versions prior to 2.9.2. If a user clicks a specially crafted link in the application, an arbitrary file may be downloaded from an external website and executed. As a result, arbitrary code may be executed on the device that runs Chatwork Desktop Application (Windows).
0
Attacker Value
Unknown
CVE-2024-5434
Disclosure Date: May 28, 2024 (last updated May 29, 2024)
The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.
0
Attacker Value
Unknown
CVE-2024-5433
Disclosure Date: May 28, 2024 (last updated May 29, 2024)
The Campbell Scientific CSI Web Server supports a command that will return the most recent file that matches a given expression. A specially crafted expression can lead to a path traversal vulnerability. This command combined with a specially crafted expression allows anonymous, unauthenticated access (allowed by default) by an attacker to files and directories outside of the webserver root directory they should be restricted to.
0
Attacker Value
Unknown
CVE-2024-33640
Disclosure Date: April 29, 2024 (last updated April 29, 2024)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LBell Pretty Google Calendar allows Stored XSS.This issue affects Pretty Google Calendar: from n/a through 1.7.2.
0
Attacker Value
Unknown
CVE-2023-42419
Disclosure Date: March 05, 2024 (last updated March 05, 2024)
Maintenance Server, in Cybellum's QCOW air-gapped distribution (China Edition), versions 2.15.5 through 2.27, was compiled with a hard-coded private cryptographic key.
An attacker with administrative privileges & access to the air-gapped server could potentially use this key to run commands on the server.
The issue was resolved in version 2.28.
Earlier versions, including all Cybellum 1.x versions, and distributions for the rest of the world remain unaffected.
0
Attacker Value
Unknown
CVE-2023-39444
Disclosure Date: January 08, 2024 (last updated January 12, 2024)
Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing functionality of GTKWave 3.3.115. A specially-crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the string copy loop.
0
Attacker Value
Unknown
CVE-2023-39443
Disclosure Date: January 08, 2024 (last updated January 12, 2024)
Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing functionality of GTKWave 3.3.115. A specially-crafted .lxt2 file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write perfomed by the prefix copy loop.
0
Attacker Value
Unknown
CVE-2023-39414
Disclosure Date: January 08, 2024 (last updated January 12, 2024)
Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_iter_radix shift operation functionality of GTKWave 3.3.115. A specially crafted .lxt2 file can lead to memory corruption. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the integer underflow when performing the right shift operation.
0