Show filters
48 Total Results
Displaying 21-30 of 48
Sort by:
Attacker Value
Unknown
CVE-2020-16259
Disclosure Date: October 28, 2020 (last updated November 28, 2024)
Winston 1.5.4 devices have an SSH user account with access from bastion hosts. This is undocumented in device documents and is not announced to the user.
0
Attacker Value
Unknown
CVE-2020-16256
Disclosure Date: October 28, 2020 (last updated February 22, 2025)
The API on Winston 1.5.4 devices is vulnerable to CSRF.
0
Attacker Value
Unknown
CVE-2020-16263
Disclosure Date: October 28, 2020 (last updated February 22, 2025)
Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins.
0
Attacker Value
Unknown
CVE-2020-16260
Disclosure Date: October 28, 2020 (last updated February 22, 2025)
Winston 1.5.4 devices do not enforce authorization. This is exploitable from the intranet, and can be combined with other vulnerabilities for remote exploitation.
0
Attacker Value
Unknown
CVE-2020-16257
Disclosure Date: October 28, 2020 (last updated February 22, 2025)
Winston 1.5.4 devices are vulnerable to command injection via the API.
0
Attacker Value
Unknown
CVE-2020-15590
Disclosure Date: September 14, 2020 (last updated February 22, 2025)
A vulnerability in the Private Internet Access (PIA) VPN Client for Linux 1.5 through 2.3+ allows remote attackers to bypass an intended VPN kill switch mechanism and read sensitive information via intercepting network traffic. Since 1.5, PIA has supported a “split tunnel” OpenVPN bypass option. The PIA killswitch & associated iptables firewall is designed to protect you while using the Internet. When the kill switch is configured to block all inbound and outbound network traffic, privileged applications can continue sending & receiving network traffic if net.ipv4.ip_forward has been enabled in the system kernel parameters. For example, a Docker container running on a host with the VPN turned off, and the kill switch turned on, can continue using the internet, leaking the host IP (CWE 200). In PIA 2.4.0+, policy-based routing is enabled by default and is used to direct all forwarded packets to the VPN interface automatically.
0
Attacker Value
Unknown
CVE-2015-5483
Disclosure Date: January 28, 2020 (last updated February 21, 2025)
Multiple cross-site request forgery (CSRF) vulnerabilities in the Private Only plugin 3.5.1 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add users, (2) delete posts, or (3) modify PHP files via unspecified vectors, or (4) conduct cross-site scripting (XSS) attacks via the po_logo parameter in the privateonly.php page to wp-admin/options-general.php.
0
Attacker Value
Unknown
Persistent XSS vulnerability in filename of attached file in PrivateBin
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
In PrivateBin versions 1.2.0 before 1.2.2, and 1.3.0 before 1.3.2, a persistent XSS attack is possible. Under certain conditions, a user provided attachment file name can inject HTML leading to a persistent Cross-site scripting (XSS) vulnerability. The vulnerability has been fixed in PrivateBin v1.3.2 & v1.2.2. Admins are urged to upgrade to these versions to protect the affected users.
0
Attacker Value
Unknown
mount.ecrpytfs_private sets group owner of /etc/mtab to user's primary group
Disclosure Date: April 22, 2019 (last updated November 27, 2024)
When mount.ecrpytfs_private before version 87-0ubuntu1.2 calls setreuid() it doesn't also set the effective group id. So when it creates the new version, mtab.tmp, it's created with the group id of the user running mount.ecryptfs_private.
0
Attacker Value
Unknown
CVE-2018-1000809
Disclosure Date: October 08, 2018 (last updated November 27, 2024)
privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2.
0