Show filters
774 Total Results
Displaying 141-150 of 774
Sort by:
Attacker Value
Unknown

CVE-2023-2629

Disclosure Date: May 10, 2023 (last updated February 24, 2025)
Improper Neutralization of Formula Elements in a CSV File in GitHub repository pimcore/customer-data-framework prior to 3.3.9.
Attacker Value
Unknown

CVE-2023-22729

Disclosure Date: April 26, 2023 (last updated February 24, 2025)
Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, an attacker can display a link to a third party website on a login screen by convincing a legitimate content author to follow a specially crafted link. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue.
Attacker Value
Unknown

CVE-2023-22728

Disclosure Date: April 26, 2023 (last updated February 24, 2025)
Silverstripe Framework is the Model-View-Controller framework that powers the Silverstripe content management system. Prior to version 4.12.15, the GridField print view incorrectly validates the permission of DataObjects potentially allowing a content author to view records they are not authorised to access. Users should upgrade to Silverstripe Framework 4.12.15 or above to address the issue.
Attacker Value
Unknown

CVE-2022-40482

Disclosure Date: April 25, 2023 (last updated February 24, 2025)
The authentication method in Laravel 8.x through 9.x before 9.32.0 was discovered to be vulnerable to user enumeration via timeless timing attacks with HTTP/2 multiplexing. This is caused by the early return inside the hasValidCredentials method in the Illuminate\Auth\SessionGuard class when a user is found to not exist.
Attacker Value
Unknown

CVE-2023-20863

Disclosure Date: April 13, 2023 (last updated February 24, 2025)
In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.
Attacker Value
Unknown

CVE-2023-29111

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
The SAP AIF (ODATA service) - versions 755, 756, discloses more detailed information than is required. An authorized attacker can use the collected information possibly to exploit the component. As a result, an attacker can cause a low impact on the confidentiality of the application.
Attacker Value
Unknown

CVE-2023-29110

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.
Attacker Value
Unknown

CVE-2023-29109

Disclosure Date: April 11, 2023 (last updated February 24, 2025)
The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.
Attacker Value
Unknown

CVE-2020-29312

Disclosure Date: April 04, 2023 (last updated February 24, 2025)
An issue found in Zend Framework v.3.1.3 and before allow a remote attacker to execute arbitrary code via the unserialize function. Note: This has been disputed by third parties as incomplete and incorrect. The framework does not have a version that surpasses 2.x.x and was deprecated in early 2020.
Attacker Value
Unknown

CVE-2023-20860

Disclosure Date: March 27, 2023 (last updated October 08, 2023)
Spring Framework running version 6.0.0 - 6.0.6 or 5.3.0 - 5.3.25 using "**" as a pattern in Spring Security configuration with the mvcRequestMatcher creates a mismatch in pattern matching between Spring Security and Spring MVC, and the potential for a security bypass.