Show filters
555 topics marked with the following tags:
Displaying 21-30 of 555
Sort by:
Attacker Value
Very High
CVE-2022-29110
Disclosure Date: May 10, 2022 (last updated November 29, 2024)
Microsoft Excel Remote Code Execution Vulnerability
3
Attacker Value
High
CVE-2020-7373
Disclosure Date: October 30, 2020 (last updated November 28, 2024)
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is the preferred CVE ID to track this vulnerability.
1
Attacker Value
Very Low
CVE-2022-35737
Disclosure Date: August 03, 2022 (last updated March 28, 2024)
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
2
Attacker Value
Very High
CVE-2020-8010 Nimbus protocol allows unauth read/write/execute
Disclosure Date: February 18, 2020 (last updated November 27, 2024)
CA Unified Infrastructure Management (Nimsoft/UIM) 20.1, 20.3.x, and 9.20 and below contains an improper ACL handling vulnerability in the robot (controller) component. A remote attacker can execute commands, read from, or write to the target system.
1
Attacker Value
Very High
Junos Space: Malicious HTTP packets sent to Junos Space allow an attacker to vi…
Disclosure Date: January 15, 2020 (last updated November 27, 2024)
A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an attacker to view all files on the target when the device receives malicious HTTP packets. This issue affects: Juniper Networks Junos Space versions prior to 19.4R1.
0
Attacker Value
Moderate
CVE-2019-20361
Disclosure Date: January 08, 2020 (last updated November 27, 2024)
There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability).
1
Attacker Value
Moderate
CVE-2023-38548
Disclosure Date: November 07, 2023 (last updated November 10, 2023)
A vulnerability in Veeam ONE allows an unprivileged user who has access to the Veeam ONE Web Client the ability to acquire the NTLM hash of the account used by the Veeam ONE Reporting Service.
8
Attacker Value
Very High
CVE-2019-10149
Last updated May 28, 2020
Exim unauthenticated RCE with reports that it's been used by [Sandworm since August 2019](CVE-2019-10149)
3
Attacker Value
Very High
CVE-2023-2989
Disclosure Date: June 22, 2023 (last updated October 08, 2023)
Fortra Globalscape EFT versions before 8.1.0.16 suffer from an out of bounds memory read in their administration server, which can allow an attacker to crash the service or bypass authentication if successfully exploited
3
Attacker Value
Moderate
CVE-2018-1207
Disclosure Date: March 23, 2018 (last updated November 26, 2024)
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code.
2