Show filters
57 Total Results
Displaying 1-10 of 57
Sort by:
Attacker Value
Unknown
CVE-2024-34066
Disclosure Date: May 03, 2024 (last updated February 23, 2025)
Pterodactyl wings is the server control plane for Pterodactyl Panel. If the Wings token is leaked either by viewing the node configuration or posting it accidentally somewhere, an attacker can use it to gain arbitrary file write and read access on the node the token is associated to. This issue has been addressed in version 1.11.12 and users are advised to upgrade. Users unable to upgrade may enable the `ignore_panel_config_updates` option as a workaround.
0
Attacker Value
Unknown
CVE-2021-29969
Disclosure Date: August 05, 2021 (last updated February 23, 2025)
If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.
0
Attacker Value
Unknown
CVE-2021-36763
Disclosure Date: August 03, 2021 (last updated February 23, 2025)
In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties.
0
Attacker Value
Unknown
CVE-2021-32688
Disclosure Date: July 12, 2021 (last updated February 23, 2025)
Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading.
0
Attacker Value
Unknown
CVE-2021-32752
Disclosure Date: July 09, 2021 (last updated February 23, 2025)
Ether Logs is a package that allows one to check one's logs in the Craft 3 utilities section. A vulnerability was found in versions prior to 3.0.4 that allowed authenticated admin users to access any file on the server. The vulnerability has been fixed in version 3.0.4. As a workaround, one may disable the plugin if untrustworthy sources have admin access.
0
Attacker Value
Unknown
CVE-2021-22769
Disclosure Date: June 11, 2021 (last updated February 22, 2025)
A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Easergy T300 with firmware V2.7.1 and older that could expose files or directory content when access from an attacker is not restricted or incorrectly restricted.
0
Attacker Value
Unknown
CVE-2021-33359
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
A vulnerability exists in gowitness < 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file.
0
Attacker Value
Unknown
CVE-2021-31831
Disclosure Date: June 03, 2021 (last updated February 22, 2025)
Incorrect access to deleted scripts vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote authenticated attacker to gain access to signed SQL scripts which have been marked as deleted or expired within the administrative console. This access was only available through the REST API.
0
Attacker Value
Unknown
CVE-2018-10867
Disclosure Date: May 26, 2021 (last updated February 22, 2025)
Files are accessible without restrictions from the /update/results page of redhat-certification 7 package, allowing an attacker to remove any file accessible by the apached user.
0
Attacker Value
Unknown
CVE-2018-10863
Disclosure Date: May 26, 2021 (last updated February 22, 2025)
It was discovered that redhat-certification 7 is not properly configured and it lists all files and directories in the /var/www/rhcert/store/transfer directory, through the /rhcert-transfer URL. An unauthorized attacker may use this flaw to gather sensible information.
0