Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
psi vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-6393
PSI Jabber client prior to 0.12.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a file transfer request with a negative value in a SOCKS5 option, which bypasses a signed integer check and triggers an integer overflow an...
Psi-im Psi 0.9.2
Psi-im Psi 0.9.1
Psi-im Psi 0.1.0
Psi-im Psi 0.9.3
Psi-im Psi
Psi-im Psi 0.11
Psi-im Psi 0.8.6
Psi-im Psi 0.9
Psi-im Psi 0.8.7
1 EDB exploit
5.9
CVSSv3
CVE-2017-5593
An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote malicious user to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. Thi...
Psi-plus Psi\\+ 0.16.563.580
Psi-plus Psi\\+ 0.16.571.627
NA
CVE-2008-3598
Multiple SQL injection vulnerabilities in psipuss 1.0 allow remote malicious users to execute arbitrary SQL commands via (1) the Cid parameter to categories.php or (2) the Username parameter to login.php.
Psi-labs Psipuss 1.0
1 EDB exploit
6.1
CVSSv3
CVE-2019-20375
A cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) 3.1.4 allows remote malicious users to inject arbitrary web script or HTML via the value parameter in a localization (loc) command to elogd.c.
Psi Electronic Logbook 3.1.4
6.1
CVSSv3
CVE-2019-20376
A cross-site scripting (XSS) vulnerability in Electronic Logbook (ELOG) 3.1.4 allows remote malicious users to inject arbitrary web script or HTML via a crafted SVG document to elogd.c.
Psi Electronic Logbook 3.1.4
7.5
CVSSv3
CVE-2020-8859
This vulnerability allows remote malicious users to create a denial-of-service condition on affected installations of ELOG Electronic Logbook 3.1.4-283534d. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of HTTP parame...
Psi Electronic Logbook 3.1.4-283534d
NA
CVE-2007-4881
SQL injection vulnerability in profile/myprofile.php in psi-labs.com social networking script (psisns), probably 1.0, allows remote malicious users to execute arbitrary SQL commands via the u parameter.
Psi-labs Social Networking Script Psisns 1.0
6.1
CVSSv3
CVE-2017-16723
A Cross-site Scripting issue exists in PHOENIX CONTACT FL COMSERVER BASIC 232/422/485, FL COMSERVER UNI 232/422/485, FL COMSERVER BAS 232/422/485-T, FL COMSERVER UNI 232/422/485-T, FL COM SERVER RS232, FL COM SERVER RS485, and PSI-MODEM/ETH (running firmware versions before 1.99,...
Phoenixcontact Fl Comserver Basic 232 Firmware 2.40
Phoenixcontact Fl Comserver Uni 422 Firmware 2.40
Phoenixcontact Fl Comserver Bas 485-t Firmware 2.40
Phoenixcontact Fl Com Server Rs232 Firmware 1.99
Phoenixcontact Fl Com Server Rs485 Firmware 1.99
Phoenixcontact Psi-modem\\/eth Firmware 2.20
Phoenixcontact Fl Comserver Basic 422 Firmware 2.40
Phoenixcontact Fl Comserver Basic 485 Firmware 2.40
Phoenixcontact Fl Comserver Uni 485-t Firmware 2.40
Phoenixcontact Fl Comserver Uni 485 Firmware 2.40
Phoenixcontact Fl Comserver Uni 232 Firmware 2.40
Phoenixcontact Fl Comserver Bas 422 Firmware 2.40
Phoenixcontact Fl Comserver Bas 232 Firmware 2.40
NA
CVE-2023-52722
An issue exists in Artifex Ghostscript up to and including 10.01.0. psi/zmisc1.c, when SAFER mode is used, allows eexec seeds other than the Type 1 standard.
7.8
CVSSv3
CVE-2017-11714
psi/ztoken.c in Artifex Ghostscript 9.21 mishandles references to the scanner state structure, which allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PostScript document, related to an out-of-bo...
Artifex Ghostscript 9.21
Debian Debian Linux 8.0
Debian Debian Linux 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »