Show filters
145 Total Results
Displaying 81-90 of 145
Sort by:
Attacker Value
Unknown

CVE-2020-35340

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
A local file inclusion vulnerability in ExpertPDF 9.5.0 through 14.1.0 allows attackers to read the file contents from files that the running ExpertPDF process has access to read.
Attacker Value
Unknown

CVE-2021-32833

Disclosure Date: September 09, 2021 (last updated February 23, 2025)
Emby Server is a personal media server with apps on many devices. In Emby Server on Windows there is a set of arbitrary file read vulnerabilities. This vulnerability is known to exist in version 4.6.4.0 and may not be patched in later versions. Known vulnerable routes are /Videos/Id/hls/PlaylistId/SegmentId.SegmentContainer, /Images/Ratings/theme/name and /Images/MediaInfo/theme/name. For more details including proof of concept code, refer to the referenced GHSL-2021-051. This issue may lead to unauthorized access to the system especially when Emby Server is configured to be accessible from the Internet.
0
Attacker Value
Unknown

CVE-2021-34765

Disclosure Date: September 01, 2021 (last updated February 23, 2025)
A vulnerability in the web UI for Cisco Nexus Insights could allow an authenticated, remote attacker to view and download files related to the web application. The attacker requires valid device credentials. This vulnerability exists because proper role-based access control (RBAC) filters are not applied to file download actions. An attacker could exploit this vulnerability by logging in to the application and then navigating to the directory listing and download functions. A successful exploit could allow the attacker to download sensitive files that should be restricted, which could result in disclosure of sensitive information.
Attacker Value
Unknown

CVE-2021-36233

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
The function AdminGetFirstFileContentByFilePath in MIK.starlight 7.9.5.24363 allows (by design) an authenticated attacker to read arbitrary files from the filesystem by specifying the file path.
Attacker Value
Unknown

CVE-2021-39316

Disclosure Date: August 30, 2021 (last updated February 23, 2025)
The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter.
0
Attacker Value
Unknown

CVE-2020-25351

Disclosure Date: August 20, 2021 (last updated February 23, 2025)
An information disclosure vulnerability in rConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote authenticated attackers to read files on the system via a crafted request sent to to the /lib/crud/configcompare.crud.php script.
Attacker Value
Unknown

CVE-2020-22124

Disclosure Date: August 18, 2021 (last updated February 23, 2025)
A vulnerability in the \inc\config.php component of joyplus-cms v1.6 allows attackers to access sensitive information.
Attacker Value
Unknown

CVE-2021-38711

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
In gitit before 0.15.0.0, the Export feature can be exploited to leak information from files.
Attacker Value
Unknown

CVE-2021-37348

Disclosure Date: August 13, 2021 (last updated February 23, 2025)
Nagios XI before version 5.8.5 is vulnerable to local file inclusion through improper limitation of a pathname in index.php.
Attacker Value
Unknown

CVE-2021-29969

Disclosure Date: August 05, 2021 (last updated February 23, 2025)
If Thunderbird was configured to use STARTTLS for an IMAP connection, and an attacker injected IMAP server responses prior to the completion of the STARTTLS handshake, then Thunderbird didn't ignore the injected data. This could have resulted in Thunderbird showing incorrect information, for example the attacker could have tricked Thunderbird to show folders that didn't exist on the IMAP server. This vulnerability affects Thunderbird < 78.12.