Show filters
213 Total Results
Displaying 131-140 of 213
Sort by:
Attacker Value
Unknown
CVE-2023-26100
Disclosure Date: April 21, 2023 (last updated February 24, 2025)
In Progress Flowmon before 12.2.0, an application endpoint failed to sanitize user-supplied input. A threat actor could leverage a reflected XSS vulnerability to execute arbitrary code within the context of a Flowmon user's web browser.
0
Attacker Value
Unknown
CVE-2023-29376
Disclosure Date: April 10, 2023 (last updated February 24, 2025)
An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potential XSS by privileged users in Sitefinity to media libraries.
0
Attacker Value
Unknown
CVE-2023-29375
Disclosure Date: April 10, 2023 (last updated February 24, 2025)
An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potentially dangerous file upload through the SharePoint connector.
0
Attacker Value
Unknown
CVE-2022-27665
Disclosure Date: April 03, 2023 (last updated February 24, 2025)
Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands. For example, there is Client-Side Template Injection via subFolderPath to the ThinClient/WtmApiService.asmx/GetFileSubTree URI.
0
Attacker Value
Unknown
CVE-2023-24029
Disclosure Date: February 03, 2023 (last updated February 24, 2025)
In Progress WS_FTP Server before 8.8, it is possible for a host administrator to elevate their privileges via the administrative interface due to insufficient authorization controls applied on user modification workflows.
0
Attacker Value
Unknown
CVE-2022-42711
Disclosure Date: October 12, 2022 (last updated February 24, 2025)
In Progress WhatsUp Gold before 22.1.0, an SNMP MIB Walker application endpoint failed to adequately sanitize malicious input. This could allow an unauthenticated attacker to execute arbitrary code in a victim's browser.
0
Attacker Value
Unknown
CVE-2022-36968
Disclosure Date: August 02, 2022 (last updated February 24, 2025)
In Progress WS_FTP Server prior to version 8.7.3, forms within the administrative interface did not include a nonce to mitigate the risk of cross-site request forgery (CSRF) attacks.
0
Attacker Value
Unknown
CVE-2022-36967
Disclosure Date: August 02, 2022 (last updated February 24, 2025)
In Progress WS_FTP Server prior to version 8.7.3, multiple reflected cross-site scripting (XSS) vulnerabilities exist in the administrative web interface. It is possible for a remote attacker to inject arbitrary JavaScript into a WS_FTP administrator's web session. This would allow the attacker to execute code within the context of the victim's browser.
0
Attacker Value
Unknown
CVE-2022-29848
Disclosure Date: May 11, 2022 (last updated February 23, 2025)
In Progress Ipswitch WhatsUp Gold 17.0.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read sensitive operating-system attributes from a host that is accessible by the WhatsUp Gold system.
0
Attacker Value
Unknown
CVE-2022-29847
Disclosure Date: May 11, 2022 (last updated February 23, 2025)
In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.
0