Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-0793 | 1 Phpmyfaq | 1 Phpmyfaq | 2023-02-23 | N/A | 8.8 HIGH |
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | |||||
CVE-2023-0790 | 1 Phpmyfaq | 1 Phpmyfaq | 2023-02-23 | N/A | 8.8 HIGH |
Uncaught Exception in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | |||||
CVE-2023-25152 | 1 Pterodactyl | 1 Wings | 2023-02-23 | N/A | 8.8 HIGH |
Wings is Pterodactyl's server control plane. Affected versions are subject to a vulnerability which can be used to create new files and directory structures on the host system that previously did not exist, potentially allowing attackers to change their resource allocations, promote their containers to privileged mode, or potentially add ssh authorized keys to allow the attacker access to a remote shell on the target machine. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by the Wings Daemon. This vulnerability has been resolved in version `v1.11.3` of the Wings Daemon, and has been back-ported to the 1.7 release series in `v1.7.3`. Anyone running `v1.11.x` should upgrade to `v1.11.3` and anyone running `v1.7.x` should upgrade to `v1.7.3`. There are no known workarounds for this vulnerability. ### Workarounds None at this time. | |||||
CVE-2023-0792 | 1 Phpmyfaq | 1 Phpmyfaq | 2023-02-23 | N/A | 5.4 MEDIUM |
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11. | |||||
CVE-2023-24576 | 1 Dell | 1 Emc Networker | 2023-02-23 | N/A | 9.8 CRITICAL |
EMC NetWorker may potentially be vulnerable to an unauthenticated remote code execution vulnerability in the NetWorker Client execution service (nsrexecd) irrespective of any auth used. | |||||
CVE-2019-16891 | 1 Liferay | 1 Liferay Portal | 2023-02-23 | 7.5 HIGH | 9.8 CRITICAL |
Liferay Portal CE 6.2.5 allows remote command execution because of deserialization of a JSON payload. | |||||
CVE-2018-1636 | 1 Ibm | 1 Informix Dynamic Server | 2023-02-23 | 7.2 HIGH | 6.7 MEDIUM |
Stack-based buffer overflow in oninit in IBM Informix Dynamic Server Enterprise Edition 12.1 allows an authenticated user to execute predefined code with root privileges, such as escalating to a root shell. IBM X-Force ID: 144441. | |||||
CVE-2018-1635 | 1 Ibm | 1 Informix Dynamic Server | 2023-02-23 | 7.2 HIGH | 6.7 MEDIUM |
Stack-based buffer overflow in oninit in IBM Informix Dynamic Server Enterprise Edition 12.1 allows an authenticated user to execute predefined code with root privileges, such as escalating to a root shell. IBM X-Force ID: 144439. | |||||
CVE-2019-4253 | 1 Ibm | 1 Informix Dynamic Server | 2023-02-23 | 7.2 HIGH | 7.8 HIGH |
IBM Informix Dynamic Server Enterprise Edition 12.1 could allow a local privileged Informix user to load a malicious shared library and gain root access privileges. IBM X-Force ID: 159941. | |||||
CVE-2018-1796 | 1 Ibm | 1 Informix Dynamic Server | 2023-02-23 | 7.2 HIGH | 7.8 HIGH |
IBM Informix Dynamic Server Enterprise Edition 12.1 could allow a local user to load malicious libraries and gain root privileges. IBM X-Force ID: 149426. | |||||
CVE-2018-1634 | 1 Ibm | 1 Informix Dynamic Server | 2023-02-23 | 7.2 HIGH | 6.7 MEDIUM |
IBM Informix Dynamic Server Enterprise Edition 12.1 could allow a local user logged in with database administrator user to gain root privileges through a symbolic link vulnerability in infos.DBSERVERNAME. IBM X-Force ID: 144437. | |||||
CVE-2018-1633 | 1 Ibm | 1 Informix Dynamic Server | 2023-02-23 | 7.2 HIGH | 6.7 MEDIUM |
IBM Informix Dynamic Server Enterprise Edition 12.1 could allow a local user logged in with database administrator user to gain root privileges through a symbolic link vulnerability in onsrvapd. IBM X-Force ID: 144434. | |||||
CVE-2018-1632 | 1 Ibm | 1 Informix Dynamic Server | 2023-02-23 | 7.2 HIGH | 6.7 MEDIUM |
IBM Informix Dynamic Server Enterprise Edition 12.1 could allow a local user logged in with database administrator user to gain root privileges through a symbolic link vulnerability in .infxdirs. IBM X-Force ID: 144432. | |||||
CVE-2022-42706 | 1 Sangoma | 2 Asterisk, Certified Asterisk | 2023-02-23 | N/A | 4.9 MEDIUM |
An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal. | |||||
CVE-2022-42705 | 1 Sangoma | 2 Asterisk, Certified Asterisk | 2023-02-23 | N/A | 6.5 MEDIUM |
A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription. | |||||
CVE-2022-37325 | 1 Sangoma | 1 Asterisk | 2023-02-23 | N/A | 7.5 HIGH |
In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash. | |||||
CVE-2022-39269 | 1 Pjsip | 1 Pjsip | 2023-02-23 | N/A | 9.1 CRITICAL |
PJSIP is a free and open source multimedia communication library written in C. When processing certain packets, PJSIP may incorrectly switch from using SRTP media transport to using basic RTP upon SRTP restart, causing the media to be sent insecurely. The vulnerability impacts all PJSIP users that use SRTP. The patch is available as commit d2acb9a in the master branch of the project and will be included in version 2.13. Users are advised to manually patch or to upgrade. There are no known workarounds for this vulnerability. | |||||
CVE-2022-39244 | 1 Pjsip | 1 Pjsip | 2023-02-23 | N/A | 9.8 CRITICAL |
PJSIP is a free and open source multimedia communication library written in C. In versions of PJSIP prior to 2.13 the PJSIP parser, PJMEDIA RTP decoder, and PJMEDIA SDP parser are affeced by a buffer overflow vulnerability. Users connecting to untrusted clients are at risk. This issue has been patched and is available as commit c4d3498 in the master branch and will be included in releases 2.13 and later. Users are advised to upgrade. There are no known workarounds for this issue. | |||||
CVE-2022-31031 | 1 Teluu | 1 Pjsip | 2023-02-23 | 6.8 MEDIUM | 9.8 CRITICAL |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is available in commit 450baca which should be included in the next release. There are no known workarounds for this issue. | |||||
CVE-2020-12279 | 2 Debian, Libgit2 | 2 Debian Linux, Libgit2 | 2023-02-23 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. checkout.c mishandles equivalent filenames that exist because of NTFS short names. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1353. |