Show filters
498 topics marked with the following tags:
Displaying 211-220 of 498
Sort by:
Attacker Value
Very High
CVE-2020-3952 - VMware vCenter Server vmdir Information Disclosure
Disclosure Date: April 10, 2020 (last updated October 06, 2023)
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
9
Attacker Value
Moderate
CVE-2023-36745
Disclosure Date: September 12, 2023 (last updated December 14, 2023)
Microsoft Exchange Server Remote Code Execution Vulnerability
3
Attacker Value
Very High
CVE-2021-42668
Disclosure Date: November 05, 2021 (last updated October 07, 2023)
A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server.
3
Attacker Value
Very High
CVE-2022-0609
Disclosure Date: April 05, 2022 (last updated October 07, 2023)
Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
5
Attacker Value
Very High
CVE-2020-8196
Disclosure Date: July 10, 2020 (last updated October 07, 2023)
Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 resulting in limited information disclosure to low privileged users.
3
Attacker Value
Moderate
CVE-2020-9484 — PersistentManager Java deserialization vulnerability
Disclosure Date: May 20, 2020 (last updated July 24, 2020)
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
0
Attacker Value
Moderate
CVE-2021-31201
Disclosure Date: June 08, 2021 (last updated July 30, 2024)
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
3
Attacker Value
Very High
CVE-2020-5410
Disclosure Date: June 01, 2020 (last updated October 06, 2023)
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
1
Attacker Value
Very High
Pre-Auth Takeover of Build Pipelines in GoCD (CVE-2021-43287)
Last updated December 08, 2021
Please see https://blog.sonarsource.com/gocd-pre-auth-pipeline-takeover.
3
Attacker Value
Moderate
CVE-2023-6933
Disclosure Date: February 05, 2024 (last updated February 15, 2024)
The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
2