Show filters
1,713 Total Results
Displaying 11-20 of 1,713
Sort by:
Attacker Value
Unknown

CVE-2023-28700

Disclosure Date: May 30, 2023 (last updated October 08, 2023)
OMICARD EDM backend system’s file uploading function does not restrict upload of file with dangerous type. A local area network attacker with administrator privileges can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
Attacker Value
Unknown

CVE-2021-44076

Disclosure Date: September 15, 2022 (last updated October 08, 2023)
An issue was discovered in CrushFTP 9. The creation of a new user through the /WebInterface/UserManager/ interface allows an attacker, with access to the administration panel, to perform Stored Cross-Site Scripting (XSS). The payload can be executed in multiple scenarios, for example when the user's page appears in the Most Visited section of the page.
Attacker Value
Unknown

CVE-2018-10916

Disclosure Date: August 01, 2018 (last updated November 27, 2024)
It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal of all files in the current working directory of the victim's system.
1
Attacker Value
Unknown

CVE-2015-7871

Disclosure Date: August 07, 2017 (last updated November 26, 2024)
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
Attacker Value
Unknown

CVE-2013-5211

Disclosure Date: January 02, 2014 (last updated November 02, 2023)
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
1
Attacker Value
Unknown

Light HTTPd 0.1 (Windows) - Remote Buffer Overflow

Disclosure Date: March 31, 2003 (last updated February 22, 2025)
Buffer overflow in Light HTTPd (lhttpd) 0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request.
0
Attacker Value
Unknown

CVE-2025-0822

Disclosure Date: February 15, 2025 (last updated February 16, 2025)
Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Attacker Value
Unknown

CVE-2025-0821

Disclosure Date: February 14, 2025 (last updated February 14, 2025)
Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Attacker Value
Unknown

CVE-2024-13791

Disclosure Date: February 14, 2025 (last updated February 14, 2025)
Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the downloadResponseFile() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Attacker Value
Unknown

CVE-2025-25901

Disclosure Date: February 13, 2025 (last updated February 19, 2025)
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11, triggered by the dnsserver1 and dnsserver2 parameters at /userRpm/WanSlaacCfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.