Show filters
284 Total Results
Displaying 101-110 of 284
Sort by:
Attacker Value
Unknown

CVE-2021-32610

Disclosure Date: July 30, 2021 (last updated February 23, 2025)
In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193.
Attacker Value
Unknown

CVE-2021-28684

Disclosure Date: June 21, 2021 (last updated February 22, 2025)
The XML parser used in ConeXware PowerArchiver before 20.10.02 allows processing of external entities, which might lead to exfiltration of local files over the network (via an XXE attack).
Attacker Value
Unknown

CVE-2021-3504

Disclosure Date: May 11, 2021 (last updated February 22, 2025)
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-20532

Disclosure Date: April 24, 2021 (last updated February 22, 2025)
IBM Spectrum Protect Client 8.1.0.0 through 8.1.11.0 could allow a local user to escalate their privileges to take full control of the system due to insecure directory permissions. IBM X-Force ID: 198811.
Attacker Value
Unknown

CVE-2021-20692

Disclosure Date: April 07, 2021 (last updated February 22, 2025)
Directory traversal vulnerability in Archive collectively operation utility Ver.2.10.1.0 and earlier allows an attacker to create or overwrite files by leading a user to expand a malicious ZIP archives.
Attacker Value
Unknown

CVE-2020-1926

Disclosure Date: March 16, 2021 (last updated February 22, 2025)
Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8
Attacker Value
Unknown

CVE-2020-13949

Disclosure Date: February 12, 2021 (last updated February 22, 2025)
In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.
Attacker Value
Unknown

CVE-2020-36193

Disclosure Date: January 18, 2021 (last updated February 22, 2025)
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
Attacker Value
Unknown

CVE-2020-9417

Disclosure Date: October 20, 2020 (last updated February 22, 2025)
The Transaction Insight reporting component of TIBCO Software Inc.'s TIBCO Foresight Archive and Retrieval System, TIBCO Foresight Archive and Retrieval System Healthcare Edition, TIBCO Foresight Operational Monitor, TIBCO Foresight Operational Monitor Healthcare Edition, TIBCO Foresight Transaction Insight, and TIBCO Foresight Transaction Insight Healthcare Edition contains a vulnerability that theoretically allows an authenticated attacker to perform SQL injection. Affected releases are TIBCO Software Inc.'s TIBCO Foresight Archive and Retrieval System: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Archive and Retrieval System Healthcare Edition: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Operational Monitor: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Operational Monitor Healthcare Edition: versions 5.1.0 and below, version 5.2.0, TIBCO Foresight Transaction Insight: versions 5.1.0 and below, version 5.2.0, and TIBCO Foresight Transaction Insig…
Attacker Value
Unknown

CVE-2020-21674

Disclosure Date: October 15, 2020 (last updated February 22, 2025)
Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's official releases are unaffected.