Show filters
41 Total Results
Displaying 21-30 of 41
Sort by:
Attacker Value
Unknown
CVE-2023-26860
Disclosure Date: April 10, 2023 (last updated October 08, 2023)
SQL injection vulnerability found in PrestaShop Igbudget v.1.0.3 and before allow a remote attacker to gain privileges via the LgBudgetBudgetModuleFrontController::displayAjaxGenerateBudget component.
0
Attacker Value
Unknown
CVE-2021-32961
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
A getfile function in MDT AutoSave versions prior to v6.02.06 enables a user to supply an optional parameter, resulting in the processing of a request in a special manner. This can result in the execution of an unzip command and place a malicious .exe file in one of the locations the function looks for and get execution capabilities.
0
Attacker Value
Unknown
CVE-2021-32957
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
A function in MDT AutoSave versions prior to v6.02.06 is used to retrieve system information for a specific process, and this information collection executes multiple commands and summarizes the information into an XML. This function and subsequent process gives full path to the executable and is therefore vulnerable to binary hijacking.
0
Attacker Value
Unknown
CVE-2021-32953
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
An attacker could utilize SQL commands to create a new user MDT AutoSave versions prior to v6.02.06 and update the user’s permissions, granting the attacker the ability to login.
0
Attacker Value
Unknown
CVE-2021-32949
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
An attacker could utilize a function in MDT AutoSave versions prior to v6.02.06 that permits changing a designated path to another path and traversing the directory, allowing the replacement of an existing file with a malicious file.
0
Attacker Value
Unknown
CVE-2021-32945
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
An attacker could decipher the encryption and gain access to MDT AutoSave versions prior to v6.02.06.
0
Attacker Value
Unknown
CVE-2021-32937
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
An attacker can gain knowledge of a session temporary working folder where the getfile and putfile commands are used in MDT AutoSave versions prior to v6.02.06. An attacker can leverage this knowledge to provide a malicious command to the working directory where the read and write activity can be initiated.
0
Attacker Value
Unknown
CVE-2021-32933
Disclosure Date: April 01, 2022 (last updated February 23, 2025)
An attacker could leverage an API to pass along a malicious file that could then manipulate the process creation command line in MDT AutoSave versions prior to v6.02.06 and run a command line argument. This could then be leveraged to run a malicious process.
0
Attacker Value
Unknown
CVE-2021-24333
Disclosure Date: June 01, 2021 (last updated February 22, 2025)
The Content Copy Protection & Prevent Image Save WordPress plugin through 1.3 does not check for CSRF when saving its settings, not perform any validation and sanitisation on them, allowing attackers to make a logged in administrator set arbitrary XSS payloads in them.
0
Attacker Value
Unknown
CVE-2020-15135
Disclosure Date: August 04, 2020 (last updated February 21, 2025)
save-server (npm package) before version 1.05 is affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version version 1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing Double submit. The CSRF attack would require you to navigate to a malicious site while you have an active session with Save-Server (Session key stored in cookies). The malicious user would then be able to perform some actions, including uploading/deleting files and adding redirects. If you are logged in as root, this attack is significantly more severe. They can in addition create, delete and update users. If they updated the password of a user, that user's files would then be available. If the root password is updated, all files would be visible if they logged in with the new password. Note that due to the same origin policy malicious actors cannot view the gallery or the response of any of the methods, nor be s…
0