Show filters
224 Total Results
Displaying 1-10 of 224
Sort by:
Attacker Value
Very High
CVE-2020-6364 — OS Command Injection Vulnerability in CA Introscope Enterprise …
Disclosure Date: October 15, 2020 (last updated February 22, 2025)
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an attacker to modify a cookie in a way that OS commands can be executed and potentially gain control over the host running the CA Introscope Enterprise Manager,leading to Code Injection. With this, the attacker is able to read and modify all system files and also impact system availability.
0
Attacker Value
Unknown
CVE-2013-1668
Disclosure Date: May 23, 2014 (last updated December 06, 2023)
The uploadFile function in upload/index.php in CosCMS before 1.822 allows remote administrators to execute arbitrary commands via shell metacharacters in the name of an uploaded file.
0
Attacker Value
Unknown
CVE-2024-11337
Disclosure Date: January 07, 2025 (last updated January 07, 2025)
The Horoscope And Tarot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'divine_horoscope' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2024-54296
Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Authentication Bypass Using an Alternate Path or Channel vulnerability in Codexpert, Inc CoSchool LMS allows Authentication Bypass.This issue affects CoSchool LMS: from n/a through 1.2.
0
Attacker Value
Unknown
CVE-2024-6876
Disclosure Date: September 10, 2024 (last updated September 24, 2024)
Out-of-Bounds read vulnerability in OSCAT Basic Library allows an local, unprivileged attacker to access limited internal data of the PLC which may lead to a crash of the affected service.
0
Attacker Value
Unknown
CVE-2024-7941
Disclosure Date: August 27, 2024 (last updated October 31, 2024)
An HTTP parameter may contain a URL value and could cause
the web application to redirect the request to the specified URL.
By modifying the URL value to a malicious site, an attacker may
successfully launch a phishing scam and steal user credentials.
0
Attacker Value
Unknown
CVE-2024-7940
Disclosure Date: August 27, 2024 (last updated August 29, 2024)
The product exposes a service that is intended for local only to
all network interfaces without any authentication.
0
Attacker Value
Unknown
CVE-2024-4872
Disclosure Date: August 27, 2024 (last updated October 31, 2024)
A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability
an attacker must have a valid credential.
0
Attacker Value
Unknown
CVE-2024-3982
Disclosure Date: August 27, 2024 (last updated August 29, 2024)
An attacker with local access to machine where MicroSCADA X
SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level
is not enabled and only users with administrator rights can enable it.
0
Attacker Value
Unknown
CVE-2024-3980
Disclosure Date: August 27, 2024 (last updated October 31, 2024)
The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names
that are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or
other files that are critical to the application.
0