Show filters
204 topics marked with the following tags:
Displaying 101-110 of 204
Sort by:
Attacker Value
Low

OneDrive DLL hijack privilege escalation

Last updated July 31, 2020
There exists a dll hijacking vulnerability in Onedrive versions after 20.073.
1
Attacker Value
High

CVE-2020-1170

Disclosure Date: June 09, 2020 (last updated October 06, 2023)
An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1163.
Attacker Value
Very High

CVE-2017-16921

Disclosure Date: December 08, 2017 (last updated October 05, 2023)
In OTRS 6.0.x up to and including 6.0.1, OTRS 5.0.x up to and including 5.0.24, and OTRS 4.0.x up to and including 4.0.26, an attacker who is logged into OTRS as an agent can manipulate form parameters (related to PGP) and execute arbitrary shell commands with the permissions of the OTRS or web server user.
Attacker Value
Very High

CVE-2020-2037

Disclosure Date: September 09, 2020 (last updated October 07, 2023)
An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3.
Attacker Value
Moderate

CVE-2020-25557

Disclosure Date: November 13, 2020 (last updated October 07, 2023)
In CMSuno 1.6.2, an attacker can inject malicious PHP code as a "username" while changing his/her username & password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server.
Attacker Value
High

CVE-2021-28482

Disclosure Date: April 13, 2021 (last updated December 29, 2023)
Microsoft Exchange Server Remote Code Execution Vulnerability
Attacker Value
Very High

CVE-2021-21983

Disclosure Date: March 31, 2021 (last updated October 07, 2023)
Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.
Attacker Value
Very High

CVE-2020-14144

Disclosure Date: October 16, 2020 (last updated November 08, 2023)
The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides.
Attacker Value
Moderate

CVE-2023-0315

Disclosure Date: January 16, 2023 (last updated October 08, 2023)
Command Injection in GitHub repository froxlor/froxlor prior to 2.0.8.
Attacker Value
High

CVE-2019-1415

Disclosure Date: November 12, 2019 (last updated October 06, 2023)
An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.To exploit the vulnerability, an attacker would require unprivileged execution on the victim system, aka 'Windows Installer Elevation of Privilege Vulnerability'.