Show filters
38 Total Results
Displaying 11-20 of 38
Sort by:
Attacker Value
Unknown
CVE-2020-15175
Disclosure Date: October 07, 2020 (last updated February 22, 2025)
In GLPI before version 9.5.2, the `pluginimage.send.php` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in “/files/”. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.
0
Attacker Value
Unknown
CVE-2020-25636
Disclosure Date: October 05, 2020 (last updated February 22, 2025)
A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.
0
Attacker Value
Unknown
CVE-2020-13953
Disclosure Date: September 30, 2020 (last updated February 22, 2025)
In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.
0
Attacker Value
Unknown
CVE-2020-11641
Disclosure Date: September 29, 2020 (last updated February 22, 2025)
A local file inclusion vulnerability in B&R SiteManager versions <9.2.620236042 allows authenticated users to read sensitive files from SiteManager instances.
0
Attacker Value
Unknown
CVE-2020-11642
Disclosure Date: September 29, 2020 (last updated February 22, 2025)
The local file inclusion vulnerability present in B&R SiteManager versions <9.2.620236042 allows authenticated users to impact availability of SiteManager instances.
0
Attacker Value
Unknown
CVE-2020-3476
Disclosure Date: September 24, 2020 (last updated February 22, 2025)
A vulnerability in the CLI implementation of a specific command of Cisco IOS XE Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying host file system. The vulnerability is due to insufficient validation of the parameters of a specific CLI command. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of any arbitrary file that resides on the underlying host file system.
0
Attacker Value
Unknown
CVE-2020-24312
Disclosure Date: August 26, 2020 (last updated February 22, 2025)
mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken.
0
Attacker Value
Unknown
CVE-2020-11976
Disclosure Date: August 11, 2020 (last updated February 21, 2025)
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5
0
Attacker Value
Unknown
CVE-2020-4075
Disclosure Date: July 07, 2020 (last updated February 21, 2025)
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4.
0
Attacker Value
Unknown
CVE-2020-5356
Disclosure Date: June 22, 2020 (last updated February 21, 2025)
Dell PowerProtect Data Manager (PPDM) versions prior to 19.4 and Dell PowerProtect X400 versions prior to 3.2 contain an improper authorization vulnerability. A remote authenticated malicious user may download any file from the affected PowerProtect virtual machines.
0