ASKEY RTF3505VW-N1 Privilege Escalation
ASKEY routers version RTF3505VW-N1 suffer from a local privilege escalation vulnerability.
ASKEY routers version RTF3505VW-N1 suffer from a local privilege escalation vulnerability.
wolfSSL versions prior to 5.5.2 suffer from a heap buffer over-read with WOLFSSL_CALLBACKS and can be triggered with a single Client Hello message.
NetChess version 2.1 suffers from a buffer overflow vulnerability.
OpenText Extended ECM versions 16.2.2 through 22.3 suffer from arbitrary file deletion, information disclosure, local file inclusion, and privilege escalation vulnerabilities.
Patient Record Management System version 1.0 suffers from an authentication bypass vulnerability during account recovery.
Multiple vulnerabilities have been discovered across Common Desktop Environment version 1.6, Motif version 2.1, and X.Org libXpm versions prior to 3.5.15 on Oracle Solaris 10 that can be chained together to achieve root.
Solaris 10 CDE local privilege escalation exploit that achieves root by injecting a fake printer via lpstat and uses a buffer overflow in libXM ParseColors().
SLIMS version 9.5.2 suffers from a cross site scripting vulnerability.
KesionCMS X version 1.5 suffers from a direct access add administrator vulnerability.
Yazilimi Jettweb Haber version 3 suffers from a remote SQL injection vulnerability that allows for authentication bypass.