Show filters
688 topics marked with the following tags:
Displaying 121-130 of 688
Sort by:
Attacker Value
Very Low
TCP SACK PANIC
Last updated February 13, 2020
A Linux kernel vulnerability in TCP networking could allow DoS
> CVE-2019-11477 is considered an Important severity, whereas CVE-2019-11478 and CVE-2019-11479 are considered a Moderate severity. The first two are related to the Selective Acknowledgement (SACK) packets combined with Maximum Segment Size (MSS), the third solely with the Maximum Segment Size (MSS).
Vulnerable code exists in https://github.com/torvalds/linux/blob/master/include/linux/skbuff.h
This might stick around in various embedded hardware, which could be more disasterous if DoS'ed, but it's too early to tell.
0
Attacker Value
Very High
CVE-2013-3576
Disclosure Date: June 14, 2013 (last updated October 05, 2023)
ginkgosnmp.inc in HP System Management Homepage (SMH) allows remote authenticated users to execute arbitrary commands via shell metacharacters in the PATH_INFO to smhutil/snmpchp.php.en.
0
Attacker Value
Very Low
CVE-2022-0540
Disclosure Date: April 20, 2022 (last updated October 07, 2023)
A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.
4
Attacker Value
High
CVE-2020-7460
Disclosure Date: August 06, 2020 (last updated October 07, 2023)
In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation.
0
Attacker Value
Low
CVE-2018-1211
Disclosure Date: March 23, 2018 (last updated October 06, 2023)
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a path traversal vulnerability in its Web server's URI parser which could be used to obtain specific sensitive data without authentication. A remote unauthenticated attacker may be able to read configuration settings from the iDRAC by querying specific URI strings.
2
Attacker Value
Very High
CVE-2023-35885
Disclosure Date: June 20, 2023 (last updated October 08, 2023)
CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
2
Attacker Value
Moderate
CVE-2022-43939
Disclosure Date: April 03, 2023 (last updated October 08, 2023)
Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.2, including 8.3.x contain security restrictions using non-canonical URLs which can be circumvented.
2
Attacker Value
Very High
CVE-2015-4335 — Redis EVAL Lua Sandbox Escape
Disclosure Date: June 09, 2015 (last updated June 08, 2020)
Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.
0
Attacker Value
Moderate
CVE-2020-14295
Disclosure Date: June 17, 2020 (last updated November 08, 2023)
A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.
3
Attacker Value
Moderate
CVE-2022-0482
Disclosure Date: March 09, 2022 (last updated October 07, 2023)
Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository alextselegidis/easyappointments prior to 1.4.3.
1