Show filters
561 Total Results
Displaying 131-140 of 561
Sort by:
Attacker Value
Unknown
CVE-2022-38191
Disclosure Date: June 28, 2022 (last updated February 24, 2025)
There is an HTML injection issue in Esri Portal for ArcGIS versions 10.9.0 and below which may allow a remote, authenticated attacker to inject HTML into some locations in the home application.
0
Attacker Value
Unknown
CVE-2022-31088
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the user name field at login could be used to enumerate LDAP data. This is only the case for LDAP search configuration. This issue has been fixed in version 8.0.
0
Attacker Value
Unknown
CVE-2022-31087
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the tmp directory, which is accessible by /lam/tmp/, allows interpretation of .php (and .php5/.php4/.phpt/etc) files. An attacker capable of writing files under www-data privileges can write a web-shell into this directory, and gain a Code Execution on the host. This issue has been fixed in version 8.0. Users unable to upgrade should disallow executing PHP scripts in (/var/lib/ldap-account-manager/)tmp directory.
0
Attacker Value
Unknown
CVE-2022-31086
Disclosure Date: June 27, 2022 (last updated February 24, 2025)
LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 incorrect regular expressions allow to upload PHP scripts to config/templates/pdf. This vulnerability could lead to a Remote Code Execution if the /config/templates/pdf/ directory is accessible for remote users. This is not a default configuration of LAM. This issue has been fixed in version 8.0. There are no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2022-25167
Disclosure Date: June 14, 2022 (last updated February 23, 2025)
Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol.
0
Attacker Value
Unknown
CVE-2020-36531
Disclosure Date: June 07, 2022 (last updated February 23, 2025)
A vulnerability, which was classified as critical, has been found in SevOne Network Management System up to 5.7.2.22. This issue affects the Device Manager Page. An injection leads to privilege escalation. The attack may be initiated remotely.
0
Attacker Value
Unknown
CVE-2022-29631
Disclosure Date: June 06, 2022 (last updated February 23, 2025)
Jodd HTTP v6.0.9 was discovered to contain multiple CLRF injection vulnerabilities via the components jodd.http.HttpRequest#set and `jodd.http.HttpRequest#send. These vulnerabilities allow attackers to execute Server-Side Request Forgery (SSRF) via a crafted TCP payload.
0
Attacker Value
Unknown
CVE-2020-28246
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
A Server-Side Template Injection (SSTI) was discovered in Form.io 2.0.0. This leads to Remote Code Execution during deletion of the default Email template URL. NOTE: the email templating service was removed after 2020. Additionally, the vendor disputes this issue indicating this is sandboxed and only executable by admins.
0
Attacker Value
Unknown
CVE-2022-30991
Disclosure Date: May 18, 2022 (last updated February 23, 2025)
HTML injection via report name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 29240
0
Attacker Value
Unknown
CVE-2022-23068
Disclosure Date: May 17, 2022 (last updated February 23, 2025)
ToolJet versions v0.6.0 to v1.10.2 are vulnerable to HTML injection where an attacker can inject malicious code inside the first name and last name field while inviting a new user which will be reflected in the invitational e-mail.
0