Show filters
555 topics marked with the following tags:
Displaying 151-160 of 555
Sort by:
Attacker Value
Very High
CVE-2020-35234
Disclosure Date: December 14, 2020 (last updated November 28, 2024)
The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. If an attacker can list the wp-content/plugins/easy-wp-smtp/ directory, then they can discover a log file (such as #############_debug_log.txt) that contains all password-reset links. The attacker can request a reset of the Administrator password and then use a link found there.
3
Attacker Value
Very High
CVE-2024-5806
Disclosure Date: June 25, 2024 (last updated July 01, 2024)
Improper Authentication vulnerability in Progress MOVEit Transfer (SFTP module) can lead to Authentication Bypass.This issue affects MOVEit Transfer: from 2023.0.0 before 2023.0.11, from 2023.1.0 before 2023.1.6, from 2024.0.0 before 2024.0.2.
4
Attacker Value
Very High
CVE-2021-3007
Disclosure Date: January 04, 2021 (last updated March 21, 2024)
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
1
Attacker Value
Moderate
CVE-2020-8467
Last updated April 14, 2020
Remote code execution vulnerability against Trend Micro Apex One (2019) and OfficeScan XG
1
Attacker Value
Moderate
CVE-2020-13167
Disclosure Date: May 19, 2020 (last updated November 27, 2024)
Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.
0
Attacker Value
High
CVE-2023-21931
Disclosure Date: April 18, 2023 (last updated October 08, 2023)
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
4
Attacker Value
Unknown
CVE-2024-26026
Disclosure Date: May 08, 2024 (last updated December 21, 2024)
An SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI). Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
2
Attacker Value
Very High
CVE-2024-21893
Disclosure Date: January 31, 2024 (last updated December 21, 2024)
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
8
Attacker Value
Very High
CVE-2024-29510
Disclosure Date: July 03, 2024 (last updated July 04, 2024)
Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
2
Attacker Value
Very High
WordPress File Manager Plugin < 6.9 Arbitrary File Upload
Last updated September 04, 2020
[We noticed] multiple cases where WordPress sites were breached using 0-day in wp-file-manager (confirmed with v6.8, which was the latest version available in wordpress.org).
File lib/php/connector.minimal.php can be by default opened directly, and this file loads lib/php/elFinderConnector.class.php which reads POST/GET variables, and then allows executing some internal features, like uploading files. PHP is allowed, thus this leads to unauthenticated arbitrary file upload and remote code execution.
0