Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
psi vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2008-6393
PSI Jabber client prior to 0.12.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a file transfer request with a negative value in a SOCKS5 option, which bypasses a signed integer check and triggers an integer overflow an...
Psi-im Psi 0.9.2
Psi-im Psi 0.9.1
Psi-im Psi 0.1.0
Psi-im Psi 0.9.3
Psi-im Psi
Psi-im Psi 0.11
Psi-im Psi 0.8.6
Psi-im Psi 0.9
Psi-im Psi 0.8.7
1 EDB exploit
4.3
CVSSv2
CVE-2017-5593
An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote malicious user to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. Thi...
Psi-plus Psi\\+ 0.16.563.580
Psi-plus Psi\\+ 0.16.571.627
7.5
CVSSv2
CVE-2008-3598
Multiple SQL injection vulnerabilities in psipuss 1.0 allow remote malicious users to execute arbitrary SQL commands via (1) the Cid parameter to categories.php or (2) the Username parameter to login.php.
Psi-labs Psipuss 1.0
1 EDB exploit
4.3
CVSSv2
CVE-2019-20375
A cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) 3.1.4 allows remote malicious users to inject arbitrary web script or HTML via the value parameter in a localization (loc) command to elogd.c.
Psi Electronic Logbook 3.1.4
4.3
CVSSv2
CVE-2019-20376
A cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) 3.1.4 allows remote malicious users to inject arbitrary web script or HTML via a crafted SVG document to elogd.c.
Psi Electronic Logbook 3.1.4
5
CVSSv2
CVE-2020-8859
This vulnerability allows remote malicious users to create a denial-of-service condition on affected installations of ELOG Electronic Logbook 3.1.4-283534d. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of HTTP parame...
Psi Electronic Logbook 3.1.4-283534d
7.5
CVSSv2
CVE-2007-4881
SQL injection vulnerability in profile/myprofile.php in psi-labs.com social networking script (psisns), probably 1.0, allows remote malicious users to execute arbitrary SQL commands via the u parameter.
Psi-labs Social Networking Script Psisns 1.0
4.3
CVSSv2
CVE-2017-16723
A Cross-site Scripting issue exists in PHOENIX CONTACT FL COMSERVER BASIC 232/422/485, FL COMSERVER UNI 232/422/485, FL COMSERVER BAS 232/422/485-T, FL COMSERVER UNI 232/422/485-T, FL COM SERVER RS232, FL COM SERVER RS485, and PSI-MODEM/ETH (running firmware versions before 1.99,...
Phoenixcontact Fl Comserver Basic 232 Firmware 2.40
Phoenixcontact Fl Comserver Uni 422 Firmware 2.40
Phoenixcontact Fl Comserver Bas 485-t Firmware 2.40
Phoenixcontact Fl Com Server Rs232 Firmware 1.99
Phoenixcontact Fl Com Server Rs485 Firmware 1.99
Phoenixcontact Psi-modem\\/eth Firmware 2.20
Phoenixcontact Fl Comserver Basic 422 Firmware 2.40
Phoenixcontact Fl Comserver Basic 485 Firmware 2.40
Phoenixcontact Fl Comserver Uni 485-t Firmware 2.40
Phoenixcontact Fl Comserver Uni 485 Firmware 2.40
Phoenixcontact Fl Comserver Uni 232 Firmware 2.40
Phoenixcontact Fl Comserver Bas 422 Firmware 2.40
Phoenixcontact Fl Comserver Bas 232 Firmware 2.40
NA
CVE-2023-52722
An issue exists in Artifex Ghostscript up to and including 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
6.8
CVSSv2
CVE-2017-11714
psi/ztoken.c in Artifex Ghostscript 9.21 mishandles references to the scanner state structure, which allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bo...
Artifex Ghostscript 9.21
Debian Debian Linux 8.0
Debian Debian Linux 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »