Show filters
733 Total Results
Displaying 281-290 of 733
Sort by:
Attacker Value
Unknown
CVE-2020-10938
Disclosure Date: March 24, 2020 (last updated February 21, 2025)
GraphicsMagick before 1.3.35 has an integer overflow and resultant heap-based buffer overflow in HuffmanDecodeImage in magick/compress.c.
0
Attacker Value
Unknown
CVE-2020-10682
Disclosure Date: March 20, 2020 (last updated February 21, 2025)
The Filemanager in CMS Made Simple 2.2.13 allows remote code execution via a .php.jpegd JPEG file, as demonstrated by m1_files[] to admin/moduleinterface.php. The file should be sent as application/octet-stream and contain PHP code (it need not be a valid JPEG file).
0
Attacker Value
Unknown
CVE-2020-10681
Disclosure Date: March 20, 2020 (last updated February 21, 2025)
The Filemanager in CMS Made Simple 2.2.13 has stored XSS via a .pxd file, as demonstrated by m1_files[] to admin/moduleinterface.php.
0
Attacker Value
Unknown
CVE-2019-12921
Disclosure Date: March 18, 2020 (last updated February 21, 2025)
In GraphicsMagick before 1.3.32, the text filename component allows remote attackers to read arbitrary files via a crafted image because of TranslateTextEx for SVG.
0
Attacker Value
Unknown
CVE-2020-9380
Disclosure Date: March 05, 2020 (last updated February 21, 2025)
IPTV Smarters WEB TV PLAYER through 2020-02-22 allows attackers to execute OS commands by uploading a script.
0
Attacker Value
Unknown
CVE-2020-9354
Disclosure Date: February 23, 2020 (last updated February 21, 2025)
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) saveFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL allows an unauthenticated attacker to overwrite files via vectors involving an XML comment and /.. path traversal.
0
Attacker Value
Unknown
CVE-2020-9353
Disclosure Date: February 23, 2020 (last updated February 21, 2025)
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) loadFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL is affected by unauthenticated Local File Inclusion via directory-traversal sequences in the elem XML element in the _transaction parameter. NOTE: the documentation states "These tools are, by default, available to anyone ... so they should only be deployed into a trusted environment. Alternately, the tools can easily be restricted to administrators or end users by protecting the tools path with normal authentication and authorization mechanisms on the web server."
0
Attacker Value
Unknown
CVE-2020-9352
Disclosure Date: February 23, 2020 (last updated February 21, 2025)
An issue was discovered in SmartClient 12.0. Unauthenticated exploitation of blind XXE can occur in the downloadWSDL feature by sending a POST request to /tools/developerConsoleOperations.jsp with a valid payload in the _transaction parameter. NOTE: the documentation states "These tools are, by default, available to anyone ... so they should only be deployed into a trusted environment. Alternately, the tools can easily be restricted to administrators or end users by protecting the tools path with normal authentication and authorization mechanisms on the web server."
0
Attacker Value
Unknown
CVE-2020-9351
Disclosure Date: February 23, 2020 (last updated February 21, 2025)
An issue was discovered in SmartClient 12.0. If an unauthenticated attacker makes a POST request to /tools/developerConsoleOperations.jsp or /isomorphic/IDACall with malformed XML data in the _transaction parameter, the server replies with a verbose error showing where the application resides (the absolute path). NOTE: the documentation states "These tools are, by default, available to anyone ... so they should only be deployed into a trusted environment. Alternately, the tools can easily be restricted to administrators or end users by protecting the tools path with normal authentication and authorization mechanisms on the web server."
0
Attacker Value
Unknown
CVE-2019-12180
Disclosure Date: February 05, 2020 (last updated November 27, 2024)
An issue was discovered in SmartBear ReadyAPI through 2.8.2 and 3.0.0 and SoapUI through 5.5. When opening a project, the Groovy "Load Script" is automatically executed. This allows an attacker to execute arbitrary Groovy Language code (Java scripting language) on the victim machine by inducing it to open a malicious Project. The same issue is present in the "Save Script" function, which is executed automatically when saving a project.
0