Show filters
398 Total Results
Displaying 221-230 of 398
Sort by:
Attacker Value
Unknown

CVE-2020-7780

Disclosure Date: November 27, 2020 (last updated February 22, 2025)
This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with an empty X-XSRF-TOKEN header and an empty XSRF-TOKEN cookie.
Attacker Value
Unknown

CVE-2020-24227

Disclosure Date: November 23, 2020 (last updated February 22, 2025)
Playground Sessions v2.5.582 (and earlier) for Windows, stores the user credentials in plain text allowing anyone with access to UserProfiles.sol to extract the email and password.
Attacker Value
Unknown

CVE-2019-17566

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
Attacker Value
Unknown

CVE-2020-25374

Disclosure Date: October 28, 2020 (last updated February 22, 2025)
CyberArk Privileged Session Manager (PSM) 10.9.0.15 allows attackers to discover internal pathnames by reading an error popup message after two hours of idle time.
Attacker Value
Unknown

CVE-2020-27216

Disclosure Date: October 23, 2020 (last updated February 22, 2025)
In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
Attacker Value
Unknown

CVE-2020-26876

Disclosure Date: October 07, 2020 (last updated February 22, 2025)
The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).
Attacker Value
Unknown

CVE-2020-13168

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
SysAid 20.1.11b26 allows reflected XSS via the ForgotPassword.jsp accountid parameter.
Attacker Value
Unknown

CVE-2020-4607

Disclosure Date: September 28, 2020 (last updated February 22, 2025)
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
Attacker Value
Unknown

CVE-2020-24750

Disclosure Date: September 17, 2020 (last updated February 22, 2025)
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
Attacker Value
Unknown

CVE-2020-5421

Disclosure Date: September 17, 2020 (last updated November 08, 2023)
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.