Show filters
555 topics marked with the following tags:
Displaying 161-170 of 555
Sort by:
Attacker Value
Very High

Multiple vulnerabilities in HP Device Manager

Last updated October 06, 2020
HP published an advisory for three vulnerabilities in its Device Manager software, which lets IT admins remotely manage HP thin clients. CVEs included in the advisory are CVE-2020-6925 (weak cipher), CVE-2020-6926 (remote method invocation), and CVE-2020-6927 (local privilege escalation). Some of these vulnerabilities can be chained together to allow an unauthenticated, remote attacker to gain local SYSTEM privileges on a vulnerable target. HP advisory: https://support.hp.com/us-en/document/c06921908
3
Attacker Value
Moderate

CVE-2020-15612 — CentOS Web Panel Authentication Bypass/RCE

Disclosure Date: July 28, 2020 (last updated November 28, 2024)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_ftp_manager.php. When parsing the userLogin parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9737.
Attacker Value
Low

CVE-2020-0605

Disclosure Date: January 14, 2020 (last updated November 27, 2024)
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0606.
Attacker Value
Very High
Multiple vulnerabilities have been discovered in Citrix ADC (formerly known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler Gateway) and Citrix SD-WAN WANOP appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could result in a number of security issues .
5
Attacker Value
Moderate

CVE-2020-5284

Disclosure Date: March 30, 2020 (last updated November 27, 2024)
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
Attacker Value
High

CVE-2022-22956

Disclosure Date: April 13, 2022 (last updated October 07, 2023)
VMware Workspace ONE Access has two authentication bypass vulnerabilities (CVE-2022-22955 & CVE-2022-22956) in the OAuth2 ACS framework. A malicious actor may bypass the authentication mechanism and execute any operation due to exposed endpoints in the authentication framework.
Attacker Value
High

CVE-2020-27955 — Git Large File Storage / Git LFS (git-lfs) - Remote Code Execu…

Disclosure Date: November 05, 2020 (last updated November 28, 2024)
Git LFS 2.12.0 allows Remote Code Execution.
Attacker Value
Very High

CVE-2020-24186

Disclosure Date: August 24, 2020 (last updated November 28, 2024)
A Remote Code Execution vulnerability exists in the gVectors wpDiscuz plugin 7.0 through 7.0.4 for WordPress, which allows unauthenticated users to upload any type of file, including PHP files via the wmuUploadFiles AJAX action.
Attacker Value
Moderate

CVE-2019-8903

Disclosure Date: February 18, 2019 (last updated October 06, 2023)
index.js in Total.js Platform before 3.2.3 allows path traversal.
1
Attacker Value
Very High

CVE-2020-25223

Last updated September 23, 2020
A remote code execution vulnerability in the WebAdmin of SG UTM was recently discovered and responsibly disclosed to Sophos. It was reported via the Sophos bug bounty program by an external security researcher. The vulnerability has been fixed. Sophos would like to thank Łukasz Rupala for responsibly disclosing this issue to Sophos. The remediation prevented users from remotely executing arbitrary code. There was no evidence that the vulnerability was exploited and to our knowledge no customers are impacted. Fix included in SG UTM v9.705 MR5, v9.607 MR7, and v9.511 MR11 on September 17, 2020 Users of older versions of SG UTM are required to upgrade to receive this fix Workaround Customers can protect themselves by ensuring their WebAdmin is not exposed to WAN. This can be achieved by keeping Internal (LAN) (Network) or another internal-only network definition as the sole entry in Management→WebAdmin Settings→WebAdmin Access Configuration→Allowed Networks.
3