Show filters
541 Total Results
Displaying 1-10 of 541
Sort by:
Attacker Value
Unknown

CVE-2019-9082

Disclosure Date: February 24, 2019 (last updated November 27, 2024)
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
Attacker Value
Moderate

CVE-2022-23642

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
Sourcegraph is a code search and navigation engine. Sourcegraph prior to version 3.37 is vulnerable to remote code execution in the `gitserver` service. The service acts as a git exec proxy, and fails to properly restrict calling `git config`. This allows an attacker to set the git `core.sshCommand` option, which sets git to use the specified command instead of ssh when they need to connect to a remote system. Exploitation of this vulnerability depends on how Sourcegraph is deployed. An attacker able to make HTTP requests to internal services like gitserver is able to exploit it. This issue is patched in Sourcegraph version 3.37. As a workaround, ensure that requests to gitserver are properly protected.
Attacker Value
Unknown

CVE-2022-35689

Disclosure Date: August 09, 2022 (last updated October 08, 2023)
Adobe Commerce versions 2.4.4-p1 (and earlier) and 2.4.5 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the availability of a user's minor feature. Exploitation of this issue does not require user interaction.
Attacker Value
Unknown

CVE-2020-11023

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
Attacker Value
Very Low

CVE-2020-10560

Disclosure Date: March 30, 2020 (last updated February 21, 2025)
An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user-controlled file path with a weak cryptographic rand() can be used to read any file with the permissions of the webserver. This can lead to further compromise. The attacker must conduct a brute-force attack against the SiteKey to insert into a crafted URL for components/OssnComments/ossn_com.php and/or libraries/ossn.lib.upgrade.php.
Attacker Value
Unknown

CVE-2024-36262

Disclosure Date: February 12, 2025 (last updated February 13, 2025)
Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown

CVE-2023-49618

Disclosure Date: February 12, 2025 (last updated February 13, 2025)
Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown

CVE-2023-49615

Disclosure Date: February 12, 2025 (last updated February 13, 2025)
Improper input validation in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown

CVE-2023-49603

Disclosure Date: February 12, 2025 (last updated February 13, 2025)
Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown

CVE-2023-48366

Disclosure Date: February 12, 2025 (last updated February 13, 2025)
Race condition in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable information disclosure via local access.
0