Show filters
70 Total Results
Displaying 11-20 of 70
Sort by:
Attacker Value
Unknown

CVE-2023-25305

Disclosure Date: April 04, 2023 (last updated October 08, 2023)
PolyMC Launcher <= 1.4.3 is vulnerable to Directory Traversal. A mrpack file can be maliciously crafted to create arbitrary files outside of the installation directory.
Attacker Value
Unknown

CVE-2023-28846

Disclosure Date: March 30, 2023 (last updated November 08, 2023)
Unpoly is a JavaScript framework for server-side web applications. There is a possible Denial of Service (DoS) vulnerability in the `unpoly-rails` gem that implements the Unpoly server protocol for Rails applications. This issues affects Rails applications that operate as an upstream of a load balancer's that uses passive health checks. The `unpoly-rails` gem echoes the request URL as an `X-Up-Location` response header. By making a request with exceedingly long URLs (paths or query string), an attacker can cause unpoly-rails to write a exceedingly large response header. If the response header is too large to be parsed by a load balancer downstream of the Rails application, it may cause the load balancer to remove the upstream from a load balancing group. This causes that application instance to become unavailable until a configured timeout is reached or until an active healthcheck succeeds. This issue has been fixed and released as version 2.7.2.2 which is available via RubyGems and …
Attacker Value
Unknown

CVE-2023-24282

Disclosure Date: March 08, 2023 (last updated October 08, 2023)
An arbitrary file upload vulnerability in Poly Trio 8800 7.2.2.1094 allows attackers to execute arbitrary code via a crafted ringtone file.
Attacker Value
Unknown

CVE-2022-4169

Disclosure Date: November 28, 2022 (last updated October 08, 2023)
The Theme and plugin translation for Polylang is vulnerable to authorization bypass in versions up to, and including, 3.2.16 due to missing capability checks in the process_polylang_theme_translation_wp_loaded() function. This makes it possible for unauthenticated attackers to update plugin and theme translation settings and to import translation strings.
Attacker Value
Unknown

CVE-2022-26482

Disclosure Date: July 17, 2022 (last updated October 07, 2023)
An issue was discovered in Poly EagleEye Director II before 2.2.2.1. os.system command injection can be achieved by an admin.
Attacker Value
Unknown

CVE-2022-26481

Disclosure Date: July 17, 2022 (last updated October 07, 2023)
An issue was discovered in Poly Studio before 3.7.0. Command Injection can occur via the CN field of a Create Certificate Signing Request (CSR) action.
Attacker Value
Unknown

CVE-2022-26479

Disclosure Date: July 17, 2022 (last updated October 07, 2023)
An issue was discovered in Poly EagleEye Director II before 2.2.2.1. Existence of a certain file (which can be created via an rsync backdoor) causes all API calls to execute as admin without authentication.
Attacker Value
Unknown

CVE-2018-17875

Disclosure Date: December 28, 2021 (last updated October 07, 2023)
A remote code execution issue in the ping command on Poly Trio 8800 5.7.1.4145 devices allows remote authenticated users to execute commands via unspecified vectors.
Attacker Value
Unknown

CVE-2021-41322

Disclosure Date: October 04, 2021 (last updated February 23, 2025)
Poly VVX 400/410 5.3.1 allows low-privileged users to change the Admin password by modifying a POST parameter to 120 during the password reset process.
Attacker Value
Unknown

CVE-2021-37145

Disclosure Date: September 07, 2021 (last updated February 23, 2025)
A command-injection vulnerability in an authenticated Telnet connection in Poly (formerly Polycom) CX5500 and CX5100 1.3.5 leads an attacker to Privilege Escalation and Remote Code Execution capability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer