| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| docker-credential-helpers before 0.6.3 has a double free in the List functions. |
| parse-server before 3.6.0 allows account enumeration. |
| parse-server before 3.4.1 allows DoS after any POST to a volatile class. |
| SmokeDetector intentionally does automatic deployments of updated copies of SmokeDetector without server operator authority. |
| Misskey before 10.102.4 allows hijacking a user's token. |
| Fleet before 2.1.2 allows exposure of SMTP credentials. |
| stacktable.js before 1.0.4 allows XSS. |
| Dependency-Track before 3.5.1 allows XSS. |
| invenio-app before 1.1.1 allows host header injection. |
| invenio-communities before 1.0.0a20 allows XSS. |
| Tridactyl before 1.16.0 allows fake key events. |
| invenio-records before 1.2.2 allows XSS. |
| Pterodactyl before 0.7.14 with 2FA allows credential sniffing. |
| yard before 0.9.20 allows path traversal. |
| WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe. |
| WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b. |
| pyxtrlock 0.3 and earlier is affected by: Incorrect Access Control. The impact is: False locking impression when run in a non-X11 session. The fixed version is: 0.4. |
| WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc. |
| Gitea 1.7.2, 1.7.3 is affected by: Cross Site Scripting (XSS). The impact is: execute JavaScript in victim's browser, when the vulnerable repo page is loaded. The component is: repository's description. The attack vector is: victim must navigate to public and affected repo page. |
| GLPI GLPI Product 9.3.1 is affected by: Frame and Form tags Injection allowing admins to phish users by putting code in reminder description. The impact is: Admins can phish any user or group of users for credentials / credit cards. The component is: Tools > Reminder > Description .. Set the description to any iframe/form tags and apply. The attack vector is: The attacker puts a login form, the user fills it and clicks on submit .. the request is sent to the attacker domain saving the data. The fixed version is: 9.4.1. |