Show filters
204 topics marked with the following tags:
Displaying 171-180 of 204
Sort by:
Attacker Value
High

CVE-2020-0646

Disclosure Date: January 14, 2020 (last updated October 06, 2023)
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
Attacker Value
Very High
## Description: The eLearning V2(by: oretnom23) is vulnerable from remote SQL-Injection-Bypass-Authentication in 3 accounts of the system (admin, Faculty & Student) in app /elearning/classes/Login.php. remote SQL-Injection-Bypass-Authentication: https://portswigger.net/support/using-sql-injection-to-bypass-authentication. The parameter (username, faculty_id, and student_id) from the login form is not protected correctly and there is no security and escaping from malicious payloads. When the user will sending a malicious query or malicious payload to the MySQL server for those three accounts, he can bypass the login credentials and take control of these accounts.
1
Attacker Value
High

CVE-2021-31979

Disclosure Date: July 14, 2021 (last updated July 27, 2024)
Windows Kernel Elevation of Privilege Vulnerability
Attacker Value
Very High

CVE-2021-36942

Disclosure Date: August 12, 2021 (last updated July 27, 2024)
Windows LSA Spoofing Vulnerability
Attacker Value
High

CVE-2020-3153

Disclosure Date: February 20, 2020 (last updated October 06, 2023)
A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.
Attacker Value
Very High

CVE-2022-41073

Disclosure Date: November 09, 2022 (last updated June 29, 2024)
Windows Print Spooler Elevation of Privilege Vulnerability
Attacker Value
Moderate

CVE-2020-35687

Disclosure Date: January 13, 2021 (last updated October 07, 2023)
PHPFusion version 9.03.90 is vulnerable to CSRF attack which leads to deletion of all shoutbox messages by the attacker on behalf of the logged in victim.
Attacker Value
Very High

CVE-2021-27065

Disclosure Date: March 03, 2021 (last updated July 26, 2024)
Microsoft Exchange Server Remote Code Execution Vulnerability
Attacker Value
Very High
# Description: The B&E Tracker (by: oretnom23 ) v1.0 is vulnerable in the application /expense_budget/classes/Login.php which is called from /expense_budget/dist/js/script.js app. The parameter (username) from the login form is not protected correctly and there is no security and escaping from malicious payloads. When the user is sending a request to the MySQL server he can bypass the login credentials and take control of the administer account.
1
Attacker Value
Unknown

CVE-2020-8468

Disclosure Date: March 18, 2020 (last updated October 06, 2023)
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication.