Show filters
684 Total Results
Displaying 11-20 of 684
Sort by:
Attacker Value
Unknown

CVE-2023-50782

Disclosure Date: February 05, 2024 (last updated September 06, 2024)
A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
Attacker Value
Unknown

CVE-2024-0889

Disclosure Date: January 25, 2024 (last updated February 03, 2024)
A vulnerability was found in Kmint21 Golden FTP Server 2.02b and classified as problematic. This issue affects some unknown processing of the component PASV Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252041 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2024-0732

Disclosure Date: January 19, 2024 (last updated January 27, 2024)
A vulnerability was found in PCMan FTP Server 2.0.7 and classified as problematic. This issue affects some unknown processing of the component STOR Command Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251555.
Attacker Value
Unknown

CVE-2024-0731

Disclosure Date: January 19, 2024 (last updated January 27, 2024)
A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as problematic. This vulnerability affects unknown code of the component PUT Command Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251554 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2024-0693

Disclosure Date: January 18, 2024 (last updated February 01, 2024)
A vulnerability classified as problematic was found in EFS Easy File Sharing FTP 2.0. Affected by this vulnerability is an unknown functionality. The manipulation of the argument username leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251479. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Attacker Value
Unknown

CVE-2021-4433

Disclosure Date: January 18, 2024 (last updated January 25, 2024)
A vulnerability was found in Karjasoft Sami HTTP Server 2.0. It has been classified as problematic. Affected is an unknown function of the component HTTP HEAD Rrequest Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250836.
Attacker Value
Unknown

CVE-2021-4432

Disclosure Date: January 16, 2024 (last updated January 24, 2024)
A vulnerability was found in PCMan FTP Server 2.0.7. It has been classified as problematic. This affects an unknown part of the component USER Command Handler. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250719.
Attacker Value
Unknown

CVE-2024-0056

Disclosure Date: January 09, 2024 (last updated January 12, 2025)
Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
Attacker Value
Unknown

CVE-2023-50639

Disclosure Date: December 20, 2023 (last updated December 22, 2023)
Cross Site Scripting (XSS) vulnerability in CuteHttpFileServer v.1.0 and v.2.0 allows attackers to obtain sensitive information via the file upload function in the home page.
Attacker Value
Unknown

CVE-2023-40309

Disclosure Date: September 12, 2023 (last updated September 28, 2024)
SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.