Show filters
6,505 Total Results
Displaying 11-20 of 6,505
Sort by:
Attacker Value
Moderate

CVE-2021-41947

Disclosure Date: October 08, 2021 (last updated October 16, 2021)
A SQL injection vulnerability exists in Subrion CMS v4.2.1 in the visual-mode.
Attacker Value
Moderate

CVE-2021-38603

Disclosure Date: August 12, 2021 (last updated August 17, 2021)
PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Information field.
Attacker Value
Very High

CVE-2021-20022

Disclosure Date: April 09, 2021 (last updated April 15, 2021)
SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host.
Attacker Value
Low

CVE-2021-21431

Disclosure Date: April 09, 2021 (last updated April 22, 2021)
sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX > 1.
Attacker Value
Moderate

CVE-2020-17144

Disclosure Date: December 10, 2020 (last updated February 22, 2021)
Microsoft Exchange Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17117, CVE-2020-17132, CVE-2020-17141, CVE-2020-17142.
Attacker Value
Very High

CVE-2020-15867

Disclosure Date: October 16, 2020 (last updated November 09, 2020)
The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution. There can be a privilege escalation if access to this hook feature is granted to a user who does not have administrative privileges. NOTE: because this is mentioned in the documentation but not in the UI, it could be considered a "Product UI does not Warn User of Unsafe Actions" issue.
Attacker Value
Very High

CVE-2020-14144

Disclosure Date: October 16, 2020 (last updated November 09, 2020)
** DISPUTED ** The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides."
Attacker Value
Very High

CVE-2020-8218

Disclosure Date: July 30, 2020 (last updated September 01, 2020)
A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface.
Attacker Value
Unknown

CVE-2021-34343

Disclosure Date: September 10, 2021 (last updated September 24, 2021)
A stack buffer overflow vulnerability has been reported to affect QNAP device running QTS, QuTScloud, QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QTS, QuTScloud, QuTS hero: QTS 4.5.4.1715 build 20210630 and later QTS 5.0.0.1716 build 20210701 and later QuTScloud c4.5.6.1755 and later QuTS hero h4.5.4.1771 build 20210825 and later
Attacker Value
Very High

CVE-2021-21983

Disclosure Date: March 31, 2021 (last updated April 06, 2021)
Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.