Show filters
213 Total Results
Displaying 131-140 of 213
Sort by:
Attacker Value
Unknown

CVE-2023-26100

Disclosure Date: April 21, 2023 (last updated October 08, 2023)
In Progress Flowmon before 12.2.0, an application endpoint failed to sanitize user-supplied input. A threat actor could leverage a reflected XSS vulnerability to execute arbitrary code within the context of a Flowmon user's web browser.
Attacker Value
Unknown

CVE-2023-29376

Disclosure Date: April 10, 2023 (last updated October 08, 2023)
An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potential XSS by privileged users in Sitefinity to media libraries.
Attacker Value
Unknown

CVE-2023-29375

Disclosure Date: April 10, 2023 (last updated October 08, 2023)
An issue was discovered in Progress Sitefinity 13.3 before 13.3.7647, 14.0 before 14.0.7736, 14.1 before 14.1.7826, 14.2 before 14.2.7930, and 14.3 before 14.3.8025. There is potentially dangerous file upload through the SharePoint connector.
Attacker Value
Unknown

CVE-2022-27665

Disclosure Date: April 03, 2023 (last updated October 12, 2023)
Reflected XSS (via AngularJS sandbox escape expressions) exists in Progress Ipswitch WS_FTP Server 8.6.0. This can lead to execution of malicious code and commands on the client due to improper handling of user-provided input. By inputting malicious payloads in the subdirectory searchbar or Add folder filename boxes, it is possible to execute client-side commands. For example, there is Client-Side Template Injection via subFolderPath to the ThinClient/WtmApiService.asmx/GetFileSubTree URI.
Attacker Value
Unknown

CVE-2023-24029

Disclosure Date: February 03, 2023 (last updated February 24, 2025)
In Progress WS_FTP Server before 8.8, it is possible for a host administrator to elevate their privileges via the administrative interface due to insufficient authorization controls applied on user modification workflows.
Attacker Value
Unknown

CVE-2022-42711

Disclosure Date: October 12, 2022 (last updated February 24, 2025)
In Progress WhatsUp Gold before 22.1.0, an SNMP MIB Walker application endpoint failed to adequately sanitize malicious input. This could allow an unauthenticated attacker to execute arbitrary code in a victim's browser.
Attacker Value
Unknown

CVE-2022-36968

Disclosure Date: August 02, 2022 (last updated February 24, 2025)
In Progress WS_FTP Server prior to version 8.7.3, forms within the administrative interface did not include a nonce to mitigate the risk of cross-site request forgery (CSRF) attacks.
Attacker Value
Unknown

CVE-2022-36967

Disclosure Date: August 02, 2022 (last updated February 24, 2025)
In Progress WS_FTP Server prior to version 8.7.3, multiple reflected cross-site scripting (XSS) vulnerabilities exist in the administrative web interface. It is possible for a remote attacker to inject arbitrary JavaScript into a WS_FTP administrator's web session. This would allow the attacker to execute code within the context of the victim's browser.
Attacker Value
Unknown

CVE-2022-29848

Disclosure Date: May 11, 2022 (last updated February 23, 2025)
In Progress Ipswitch WhatsUp Gold 17.0.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read sensitive operating-system attributes from a host that is accessible by the WhatsUp Gold system.
Attacker Value
Unknown

CVE-2022-29847

Disclosure Date: May 11, 2022 (last updated February 23, 2025)
In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.