Show filters
1,713 Total Results
Displaying 11-20 of 1,713
Sort by:
Attacker Value
Unknown
CVE-2023-28700
Disclosure Date: May 30, 2023 (last updated October 08, 2023)
OMICARD EDM backend system’s file uploading function does not restrict upload of file with dangerous type. A local area network attacker with administrator privileges can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service.
1
Attacker Value
Unknown
CVE-2021-44076
Disclosure Date: September 15, 2022 (last updated October 08, 2023)
An issue was discovered in CrushFTP 9. The creation of a new user through the /WebInterface/UserManager/ interface allows an attacker, with access to the administration panel, to perform Stored Cross-Site Scripting (XSS). The payload can be executed in multiple scenarios, for example when the user's page appears in the Most Visited section of the page.
1
Attacker Value
Unknown
CVE-2018-10916
Disclosure Date: August 01, 2018 (last updated November 27, 2024)
It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal of all files in the current working directory of the victim's system.
1
Attacker Value
Unknown
CVE-2015-7871
Disclosure Date: August 07, 2017 (last updated November 26, 2024)
Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
1
Attacker Value
Unknown
CVE-2013-5211
Disclosure Date: January 02, 2014 (last updated November 02, 2023)
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
1
Attacker Value
Unknown
Light HTTPd 0.1 (Windows) - Remote Buffer Overflow
Disclosure Date: March 31, 2003 (last updated February 22, 2025)
Buffer overflow in Light HTTPd (lhttpd) 0.1 allows remote attackers to execute arbitrary code via a long HTTP GET request.
0
Attacker Value
Unknown
CVE-2025-0822
Disclosure Date: February 15, 2025 (last updated February 16, 2025)
Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
0
Attacker Value
Unknown
CVE-2025-0821
Disclosure Date: February 14, 2025 (last updated February 14, 2025)
Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
0
Attacker Value
Unknown
CVE-2024-13791
Disclosure Date: February 14, 2025 (last updated February 14, 2025)
Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the downloadResponseFile() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
0
Attacker Value
Unknown
CVE-2025-25901
Disclosure Date: February 13, 2025 (last updated February 19, 2025)
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11, triggered by the dnsserver1 and dnsserver2 parameters at /userRpm/WanSlaacCfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
0