Show filters
204 topics marked with the following tags:
Displaying 171-180 of 204
Sort by:
Attacker Value
High
CVE-2020-0646
Disclosure Date: January 14, 2020 (last updated October 06, 2023)
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.
0
Attacker Value
Very High
eLearning V2(by: oretnom23) is vulnerable from remote SQL-Injection-Bypass-Auth…
Last updated September 06, 2021
## Description:
The eLearning V2(by: oretnom23) is vulnerable from remote SQL-Injection-Bypass-Authentication in 3 accounts of the system (admin, Faculty & Student) in app /elearning/classes/Login.php. remote SQL-Injection-Bypass-Authentication: https://portswigger.net/support/using-sql-injection-to-bypass-authentication. The parameter (username, faculty_id, and student_id) from the login form is not protected correctly and there is no security and escaping from malicious payloads. When the user will sending a malicious query or malicious payload to the MySQL server for those three accounts, he can bypass the login credentials and take control of these accounts.
1
Attacker Value
High
CVE-2021-31979
Disclosure Date: July 14, 2021 (last updated July 27, 2024)
Windows Kernel Elevation of Privilege Vulnerability
1
Attacker Value
Very High
CVE-2021-36942
Disclosure Date: August 12, 2021 (last updated July 27, 2024)
Windows LSA Spoofing Vulnerability
1
Attacker Value
High
CVE-2020-3153
Disclosure Date: February 20, 2020 (last updated October 06, 2023)
A vulnerability in the installer component of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated local attacker to copy user-supplied files to system level directories with system level privileges. The vulnerability is due to the incorrect handling of directory paths. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. An exploit could allow the attacker to copy malicious files to arbitrary locations with system level privileges. This could include DLL pre-loading, DLL hijacking, and other related attacks. To exploit this vulnerability, the attacker needs valid credentials on the Windows system.
4
Attacker Value
Very High
CVE-2022-41073
Disclosure Date: November 09, 2022 (last updated June 29, 2024)
Windows Print Spooler Elevation of Privilege Vulnerability
4
Attacker Value
Moderate
CVE-2020-35687
Disclosure Date: January 13, 2021 (last updated October 07, 2023)
PHPFusion version 9.03.90 is vulnerable to CSRF attack which leads to deletion of all shoutbox messages by the attacker on behalf of the logged in victim.
3
Attacker Value
Very High
CVE-2021-27065
Disclosure Date: March 03, 2021 (last updated July 26, 2024)
Microsoft Exchange Server Remote Code Execution Vulnerability
1
Attacker Value
Very High
SQL Injection - bypass login on B&E Tracker (by: oretnom23 ) v1.0
Last updated August 26, 2021
# Description:
The B&E Tracker (by: oretnom23 ) v1.0 is vulnerable
in the application /expense_budget/classes/Login.php which is called from /expense_budget/dist/js/script.js app.
The parameter (username) from the login form is not protected correctly and there is no security and escaping from malicious payloads.
When the user is sending a request to the MySQL server he can bypass the login credentials and take control of the administer account.
1
Attacker Value
Unknown
CVE-2020-8468
Disclosure Date: March 18, 2020 (last updated October 06, 2023)
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication.
1