The wordexp function in the glibc may crash or read arbitrary memory in parse_param when called with an untrusted pattern
Reporter | Title | Published | Views | Family All 151 |
---|---|---|---|---|
![]() | Home Download Photon OS User Documentation FAQ Security Advisories Related Information Lightwave - PHSA-2021-1.0-0422 | 5 Aug 202100:00 | – | photon |
![]() | Home Download Photon OS User Documentation FAQ Security Advisories Related Information Lightwave - PHSA-2021-2.0-0377 | 6 Aug 202100:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2021-0422 | 5 Aug 202100:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2021-0281 | 9 Aug 202100:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2021-0077 | 9 Aug 202100:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2021-3.0-0281 | 10 Aug 202100:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2021-4.0-0077 | 10 Aug 202100:00 | – | photon |
![]() | NewStart CGSL CORE 5.04 / MAIN 5.04 : glibc Vulnerability (NS-SA-2022-0016) | 9 May 202200:00 | – | nessus |
![]() | EulerOS 2.0 SP5 : compat-glibc (EulerOS-SA-2021-2653) | 11 Nov 202100:00 | – | nessus |
![]() | EulerOS 2.0 SP8 : glibc (EulerOS-SA-2021-2461) | 24 Sep 202100:00 | – | nessus |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
order_by | query param | /wolves/ | Django SQL injection vulnerability allows attackers to manipulate SQL queries via unsanitized input in the order_by parameter. | CWE-89 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo