Show filters
545 Total Results
Displaying 121-130 of 545
Sort by:
Attacker Value
Unknown

CVE-2022-39221

Disclosure Date: September 21, 2022 (last updated February 24, 2025)
McWebserver mod runs a simple HTTP server alongside the Minecraft server in seperate threads. Path traversal in McWebserver Minecraft Mod for Fabric and Quilt up to and including 0.1.2.1 and McWebserver Minecraft Mod for Forge up to and including 0.1.1 allows all files, accessible by the program, to be read by anyone via HTTP request. Version 0.2.0 with patches are released to both platforms (Fabric and Quilt, Forge). As a workaround, the McWebserver mod can be disabled by removing the file from the `mods` directory.
Attacker Value
Unknown

CVE-2020-29260

Disclosure Date: September 02, 2022 (last updated February 24, 2025)
libvncclient v0.9.13 was discovered to contain a memory leak via the function rfbClientCleanup().
Attacker Value
Unknown

CVE-2022-36565

Disclosure Date: August 30, 2022 (last updated February 24, 2025)
Incorrect access control in the install directory (C:\Wamp64) of Wamp v3.2.6 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.
Attacker Value
Unknown

CVE-2020-26938

Disclosure Date: August 29, 2022 (last updated February 24, 2025)
In oauth2-server (aka node-oauth2-server) through 3.1.1, the value of the redirect_uri parameter received during the authorization and token request is checked against an incorrect URI pattern ("[a-zA-Z][a-zA-Z0-9+.-]+:") before making a redirection. This allows a malicious client to pass an XSS payload through the redirect_uri parameter while making an authorization request. NOTE: this vulnerability is similar to CVE-2020-7741.
Attacker Value
Unknown

CVE-2022-36226

Disclosure Date: August 26, 2022 (last updated February 24, 2025)
SiteServerCMS 5.X has a Remote-download-Getshell-vulnerability via /SiteServer/Ajax/ajaxOtherService.aspx.
Attacker Value
Unknown

CVE-2022-34037

Disclosure Date: July 22, 2022 (last updated February 24, 2025)
An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI. Note: This has been disputed as a bug, not a security vulnerability, in the Caddy web server that emerged when an administrator's bad configuration containing a malformed request URI caused the server to return an empty reply instead of a valid HTTP response to the client.
Attacker Value
Unknown

CVE-2022-31582

Disclosure Date: July 11, 2022 (last updated February 24, 2025)
The shaolo1/VideoServer repository through 2019-09-21 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Attacker Value
Unknown

CVE-2022-31558

Disclosure Date: July 11, 2022 (last updated February 24, 2025)
The tooxie/shiva-server repository through 0.10.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Attacker Value
Unknown

CVE-2022-31556

Disclosure Date: July 11, 2022 (last updated February 24, 2025)
The rusyasoft/TrainEnergyServer repository through 2017-08-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
Attacker Value
Unknown

CVE-2022-31530

Disclosure Date: July 11, 2022 (last updated February 24, 2025)
The csm-aut/csm repository through 3.5 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.