Show filters
498 topics marked with the following tags:
Displaying 151-160 of 498
Sort by:
Attacker Value
Very High
CVE-2020-13379
Disclosure Date: June 03, 2020 (last updated August 03, 2020)
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
4
Attacker Value
High
CVE-2020-16898 aka Bad Neighbor / Ping of Death Redux
Disclosure Date: October 16, 2020 (last updated January 01, 2024)
<p>A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.</p>
<p>To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer.</p>
<p>The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets.</p>
29
Attacker Value
Unknown
CVE-2019-5591
Disclosure Date: August 14, 2020 (last updated October 24, 2024)
A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.
1
Attacker Value
High
CVE-2021-26411
Disclosure Date: March 11, 2021 (last updated December 30, 2023)
Internet Explorer Memory Corruption Vulnerability
4
Attacker Value
High
CVE-2024-23897
Disclosure Date: January 24, 2024 (last updated March 08, 2024)
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
7
Attacker Value
Moderate
CVE-2021-24088
Disclosure Date: February 25, 2021 (last updated December 30, 2023)
Windows Local Spooler Remote Code Execution Vulnerability
1
Attacker Value
Unknown
CVE-2022-38028
Disclosure Date: October 11, 2022 (last updated May 24, 2024)
Windows Print Spooler Elevation of Privilege Vulnerability
0
Attacker Value
Very High
CVE-2020-14750 — Oracle WebLogic Remote Unauthenticated Remote Code Execution (…
Disclosure Date: November 02, 2020 (last updated October 07, 2023)
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
4
Attacker Value
Moderate
CVE-2020-0662
Disclosure Date: February 11, 2020 (last updated October 06, 2023)
A remote code execution vulnerability exists in the way that Windows handles objects in memory, aka 'Windows Remote Code Execution Vulnerability'.
0
Attacker Value
Very High
CVE-2020-2037
Disclosure Date: September 09, 2020 (last updated October 07, 2023)
An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3.
0