Show filters
213 Total Results
Displaying 121-130 of 213
Sort by:
Attacker Value
Unknown
CVE-2023-35759
Disclosure Date: June 23, 2023 (last updated October 08, 2023)
In Progress WhatsUp Gold before 23.0.0, an SNMP-related application endpoint failed to adequately sanitize malicious input. This could allow an unauthenticated attacker to execute arbitrary code in a victim's browser, aka XSS.
0
Attacker Value
Unknown
CVE-2023-34203
Disclosure Date: June 23, 2023 (last updated October 08, 2023)
In Progress OpenEdge OEM (OpenEdge Management) and OEE (OpenEdge Explorer) before 12.7, a remote user (who has any OEM or OEE role) could perform a URL injection attack to change identity or role membership, e.g., escalate to admin. This affects OpenEdge LTS before 11.7.16, 12.x before 12.2.12, and 12.3.x through 12.6.x before 12.7.
0
Attacker Value
Unknown
CVE-2023-35708
Disclosure Date: June 16, 2023 (last updated October 08, 2023)
In Progress MOVEit Transfer before 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content. These are fixed versions of the DLL drop-in: 2020.1.10 (12.1.10), 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3).
0
Attacker Value
Unknown
CVE-2023-26133
Disclosure Date: June 12, 2023 (last updated October 08, 2023)
All versions of the package progressbar.js are vulnerable to Prototype Pollution via the function extend() in the file utils.js.
0
Attacker Value
Unknown
CVE-2023-35036
Disclosure Date: June 12, 2023 (last updated October 08, 2023)
In Progress MOVEit Transfer before 2021.0.7 (13.0.7), 2021.1.5 (13.1.5), 2022.0.5 (14.0.5), 2022.1.6 (14.1.6), and 2023.0.2 (15.0.2), SQL injection vulnerabilities have been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content.
0
Attacker Value
Unknown
CVE-2023-34364
Disclosure Date: June 09, 2023 (last updated October 08, 2023)
A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
0
Attacker Value
Unknown
CVE-2023-34363
Disclosure Date: June 09, 2023 (last updated October 08, 2023)
An issue was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. When using Oracle Advanced Security (OAS) encryption, if an error is encountered initializing the encryption object used to encrypt data, the code falls back to a different encryption mechanism that uses an insecure random number generator to generate the private key. It is possible for a well-placed attacker to predict the output of this random number generator, which could lead to an attacker decrypting traffic between the driver and the database server. The vulnerability does not exist if SSL / TLS encryption is used.
0
Attacker Value
Unknown
CVE-2023-23699
Disclosure Date: May 29, 2023 (last updated October 08, 2023)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Chris Reynolds Progress Bar plugin <= 2.2.1 versions.
0
Attacker Value
Unknown
CVE-2023-33313
Disclosure Date: May 28, 2023 (last updated October 08, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in ThemeinProgress WIP Custom Login plugin <= 1.2.9 versions.
0
Attacker Value
Unknown
CVE-2023-26101
Disclosure Date: April 21, 2023 (last updated October 08, 2023)
In Progress Flowmon Packet Investigator before 12.1.0, a Flowmon user with access to Flowmon Packet Investigator could leverage a path-traversal vulnerability to retrieve files on the Flowmon appliance's local filesystem.
0