Show filters
210 Total Results
Displaying 21-30 of 210
Sort by:
Attacker Value
Unknown

CVE-2019-18643

Disclosure Date: January 07, 2021 (last updated November 28, 2024)
Rock RMS versions before 8.10 and versions 9.0 through 9.3 fails to properly validate files uploaded in the application. The only protection mechanism is a file-extension blacklist that can be bypassed by adding multiple spaces and periods after the file name. This could allow an attacker to upload ASPX code and gain remote code execution on the application. The application typically runs as LocalSystem as mandated in the installation guide. Patched in versions 8.10 and 9.4.
Attacker Value
Unknown

CVE-2019-18642

Disclosure Date: January 07, 2021 (last updated November 28, 2024)
Rock RMS version before 8.6 is vulnerable to account takeover by tampering with the user ID parameter in the profile update feature. The lack of validation and use of sequential user IDs allows any user to change account details of any other user. This vulnerability could be used to change the email address of another account, even the administrator account. Upon changing another account's email address, performing a password reset to the new email address could allow an attacker to take over any account.
Attacker Value
Unknown

CVE-2020-27187

Disclosure Date: October 26, 2020 (last updated November 28, 2024)
An issue was discovered in KDE Partition Manager 4.1.0 before 4.2.0. The kpmcore_externalcommand helper contains a logic flaw in which the service invoking D-Bus is not properly checked. An attacker on the local machine can replace /etc/fstab, and execute mount and other partitioning related commands, while KDE Partition Manager is running. the mount command can then be used to gain full root privileges.
Attacker Value
Unknown

CVE-2020-26164

Disclosure Date: October 07, 2020 (last updated November 28, 2024)
In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
Attacker Value
Unknown

CVE-2020-24654

Disclosure Date: September 02, 2020 (last updated November 08, 2023)
In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory.
Attacker Value
Unknown

CVE-2020-16116

Disclosure Date: August 03, 2020 (last updated November 08, 2023)
In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.
Attacker Value
Unknown

CVE-2020-15954

Disclosure Date: July 27, 2020 (last updated November 28, 2024)
KDE KMail 19.12.3 (aka 5.13.3) engages in unencrypted POP3 communication during times when the UI indicates that encryption is in use.
Attacker Value
Unknown

CVE-2020-13152

Disclosure Date: May 20, 2020 (last updated November 27, 2024)
A remote user can create a specially crafted M3U file, media playlist file that when loaded by the target user, will trigger a memory leak, whereby Amarok 2.8.0 continue to waste resources over time, eventually allows attackers to cause a denial of service.
Attacker Value
Unknown

CVE-2020-12755

Disclosure Date: May 09, 2020 (last updated November 27, 2024)
fishProtocol::establishConnection in fish/fish.cpp in KDE kio-extras through 20.04.0 makes a cacheAuthentication call even if the user had not set the keepPassword option. This may lead to unintended KWallet storage of a password.
Attacker Value
Unknown

CVE-2020-11880

Disclosure Date: April 17, 2020 (last updated February 21, 2025)
An issue was discovered in KDE KMail before 19.12.3. By using the proprietary (non-RFC6068) "mailto?attach=..." parameter, a website (or other source of mailto links) can make KMail attach local files to a composed email message without showing a warning to the user, as demonstrated by an attach=.bash_history value.