Page 48 of 254 results (0.018 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The XClientMessageEvent struct used in certain components of X.Org 6.8.2 and earlier, possibly including (1) the X server and (2) Xlib, uses a "long" specifier for elements of the l array, which results in inconsistent sizes in the struct on 32-bit versus 64-bit platforms, and might allow attackers to cause a denial of service (application crash) and possibly conduct other attacks. • http://www.securityfocus.com/archive/1/421256/100/0/threaded •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

The MasterDataCD::createImage function in masterdatacd.cpp for SimpleCDR-X 1.3.3 creates the .temp temporary directory with insecure permissions, which allows local users to read sensitive ISO images. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037174.html http://secunia.com/advisories/16835 http://www.securityfocus.com/bid/14855 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Gravity Board X (GBX) 1.1 allow remote attackers to inject arbitrary web script or HTML via (1) the board_id parameter to deletethread.php or (2) the template. • http://marc.info/?l=bugtraq&m=112351740803443&w=2 http://securitytracker.com/alerts/2005/Aug/1014631.html http://www.securityfocus.com/bid/14497 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

SQL injection vulnerability in Gravity Board X (GBX) 1.1 allows remote attackers to execute arbitrary SQL commands and bypass authentication via the login field. • https://www.exploit-db.com/exploits/26106 http://marc.info/?l=bugtraq&m=112351740803443&w=2 http://securitytracker.com/alerts/2005/Aug/1014631.html http://www.securityfocus.com/bid/14497 https://exchange.xforce.ibmcloud.com/vulnerabilities/21740 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Gravity Board X (GBX) 1.1 allows remote attackers to obtain sensitive information via (1) a 1 in the perm parameter to deletethread.php or a direct request to (2) ban.php, (3) addnews.php, (4) banned.php, (5) boardstats.php, (6) adminform.php, (7) /forms/admininfo.php, (8) /forms/announcements.php, (9) forms/banform.php, or (10) other pages in the /forms directory, which reveal the path in an error message. • http://marc.info/?l=bugtraq&m=112351740803443&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/21746 •