Show filters
688 topics marked with the following tags:
Displaying 181-190 of 688
Sort by:
Attacker Value
Very High
CVE-2020-28871
Disclosure Date: February 10, 2021 (last updated January 27, 2024)
Remote code execution in Monitorr v1.7.6m in upload.php allows an unauthorized person to execute arbitrary code on the server-side via an insecure file upload.
2
Attacker Value
Very High
CVE-2020-14500
Last updated July 31, 2020
The discovered bug occurs due to improper handling of some of the HTTP request headers provided by the client. This could allow an attacker to remotely exploit GateManager to achieve remote code execution without any authentication required. If carried out successfully, such an attack could result in a complete security breach that grants full access to a customer’s internal network, along with the ability to decrypt all traffic that passes through the VPN.
0
Attacker Value
Very Low
CVE-2023-41056
Disclosure Date: January 10, 2024 (last updated January 23, 2024)
Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.
2
Attacker Value
Moderate
CVE-2020-8200
Disclosure Date: September 18, 2020 (last updated October 07, 2023)
Improper authentication in Citrix StoreFront Server < 1912.0.1000 allows an attacker who is authenticated on the same Microsoft Active Directory domain as a Citrix StoreFront server to read arbitrary files from that server.
3
Attacker Value
Moderate
CVE-2021-21300
Disclosure Date: March 09, 2021 (last updated November 08, 2023)
Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2.…
5
Attacker Value
Very High
CVE-2022-37393
Disclosure Date: August 16, 2022 (last updated October 08, 2023)
Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters. As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.
3
Attacker Value
High
CVE-2021-31799
Disclosure Date: July 30, 2021 (last updated January 06, 2024)
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
0
Attacker Value
High
Total.js requestcontinue Directory Traversal Vulnerability
Disclosure Date: February 18, 2019 (last updated November 13, 2019)
Total.js is prone to a directory traversal vulnerability. Attackers can exploit this issue and read files remotely.
1
Attacker Value
Very High
CVE-2020-1337
Disclosure Date: August 17, 2020 (last updated January 19, 2024)
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application.
The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.
6
Attacker Value
High
CVE-2022-2143
Disclosure Date: June 28, 2022 (last updated October 07, 2023)
The affected product is vulnerable to two instances of command injection, which may allow an attacker to remotely execute arbitrary code.
3