Show filters
198 Total Results
Displaying 21-30 of 198
Sort by:
Attacker Value
Unknown
CVE-2021-45887
Disclosure Date: March 13, 2022 (last updated October 07, 2023)
An issue was discovered in PONTON X/P Messenger before 3.11.2. Due to path traversal in private/SchemaSetUpload.do for uploaded ZIP files, an executable script can be uploaded by web application administrators, giving the attacker remote code execution on the underlying server via an imgs/*.jsp URI.
0
Attacker Value
Unknown
CVE-2021-45886
Disclosure Date: March 13, 2022 (last updated October 07, 2023)
An issue was discovered in PONTON X/P Messenger before 3.11.2. Anti-CSRF tokens are globally valid, making the web application vulnerable to a weakened version of CSRF, where an arbitrary token of a low-privileged user (such as operator) can be used to confirm actions of higher-privileged ones (such as xpadmin).
0
Attacker Value
Unknown
CVE-2020-27853
Disclosure Date: October 27, 2020 (last updated February 22, 2025)
Wire before 2020-10-16 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a format string. This affects Wire AVS (Audio, Video, and Signaling) 5.3 through 6.x before 6.4, the Wire Secure Messenger application before 3.49.918 for Android, and the Wire Secure Messenger application before 3.61 for iOS. This occurs via the value parameter to sdp_media_set_lattr in peerflow/sdp.c.
0
Attacker Value
Unknown
CVE-2020-17476
Disclosure Date: August 10, 2020 (last updated February 21, 2025)
Mibew Messenger before 3.2.7 allows XSS via a crafted user name.
0
Attacker Value
Unknown
CVE-2019-18252
Disclosure Date: June 29, 2020 (last updated February 21, 2025)
BIOTRONIK CardioMessenger II, The affected products allow credential reuse for multiple authentication purposes. An attacker with adjacent access to the CardioMessenger can disclose its credentials used for connecting to the BIOTRONIK Remote Communication infrastructure.
0
Attacker Value
Unknown
CVE-2019-18246
Disclosure Date: June 29, 2020 (last updated February 21, 2025)
BIOTRONIK CardioMessenger II, The affected products do not properly enforce mutual authentication with the BIOTRONIK Remote Communication infrastructure.
0
Attacker Value
Unknown
CVE-2019-18256
Disclosure Date: June 29, 2020 (last updated February 21, 2025)
BIOTRONIK CardioMessenger II, The affected products use individual per-device credentials that are stored in a recoverable format. An attacker with physical access to the CardioMessenger can use these credentials for network authentication and decryption of local data in transit.
0
Attacker Value
Unknown
CVE-2019-18254
Disclosure Date: June 29, 2020 (last updated February 21, 2025)
BIOTRONIK CardioMessenger II, The affected products do not encrypt sensitive information while at rest. An attacker with physical access to the CardioMessenger can disclose medical measurement data and the serial number from the implanted cardiac device the CardioMessenger is paired with.
0
Attacker Value
Unknown
CVE-2019-18248
Disclosure Date: June 29, 2020 (last updated February 21, 2025)
BIOTRONIK CardioMessenger II, The affected products transmit credentials in clear-text prior to switching to an encrypted communication channel. An attacker can disclose the product’s client credentials for connecting to the BIOTRONIK Remote Communication infrastructure.
0
Attacker Value
Unknown
CVE-2020-12713
Disclosure Date: June 11, 2020 (last updated February 21, 2025)
An issue was discovered in CipherMail Community Gateway and Professional/Enterprise Gateway 1.0.1 through 4.7.1-0 and CipherMail Webmail Messenger 1.1.1 through 3.1.1-0. Attackers with administrative access to the web interface have multiple options to escalate their privileges to the Unix root account.
0