Show filters
52,180 Total Results
Displaying 101-110 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
High
CVE-2023-25135
Disclosure Date: February 03, 2023 (last updated February 24, 2025)
vBulletin before 5.6.9 PL1 allows an unauthenticated remote attacker to execute arbitrary code via a crafted HTTP request that triggers deserialization. This occurs because verify_serialized checks that a value is serialized by calling unserialize and then checking for errors. The fixed versions are 5.6.7 PL1, 5.6.8 PL1, and 5.6.9 PL1.
2
Attacker Value
Unknown
CVE-2022-40674
Disclosure Date: September 14, 2022 (last updated February 24, 2025)
libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
3
Attacker Value
Moderate
CVE-2022-31129
Disclosure Date: July 06, 2022 (last updated February 24, 2025)
moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provided strings without sanity length checks to moment constructor are vulnerable to (Re)DoS attacks. The problem is patched in 2.29.4, the patch can be applied to all affected versions with minimal tweaking. Users are advised to upgrade. Users unable to upgrade should consider limiting date lengths accepted from user input.
2
Attacker Value
Very High
CVE-2021-28544
Disclosure Date: April 12, 2022 (last updated February 23, 2025)
Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal 'copyfrom' paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the 'copyfrom' path of the original. This also reveals the fact that the node was copied. Only the 'copyfrom' path is revealed; not its contents. Both httpd and svnserve servers are vulnerable.
2
Attacker Value
Very High
CVE-2021-43420
Disclosure Date: January 24, 2022 (last updated February 23, 2025)
SQL injection vulnerability in Login.php in Sourcecodester Online Payment Hub v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter.
2
Attacker Value
Low
CVE-2021-38759
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
Raspberry Pi OS through 5.10 has the raspberry default password for the pi account. If not changed, attackers can gain administrator privileges.
1
Attacker Value
Very High
CVE-2021-42667
Disclosure Date: November 05, 2021 (last updated February 23, 2025)
A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server.
2
Attacker Value
Very High
CVE-2021-43140
Disclosure Date: November 03, 2021 (last updated February 23, 2025)
SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login.
2
Attacker Value
High
CVE-2021-37975
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
2
Attacker Value
Very High
CVE-2020-16846 — SaltStack Unauthenticated Shell Injection
Disclosure Date: November 06, 2020 (last updated February 22, 2025)
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
1