Show filters
40 Total Results
Displaying 31-40 of 40
Sort by:
Attacker Value
Unknown
CVE-2021-27856
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 includes an account named "cmuser" that has administrative privileges and no password. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA002.
0
Attacker Value
Unknown
CVE-2021-27858
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote attacker to access at least the URL "/fpui/jsp/index.jsp" leading to unknown impact, presumably some violation of confidentiality. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA004.
0
Attacker Value
Unknown
CVE-2021-27859
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows an authenticated, remote attacker with read-only privileges to create an account with administrative privileges. Older versions of FatPipe software may also be vulnerable. This does not appear to be a CSRF vulnerability. The FatPipe advisory identifier for this vulnerability is FPSA005.
0
Attacker Value
Unknown
CVE-2021-27857
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, unauthenticated attacker to download a configuration archive. The attacker needs to know or correctly guess the hostname of the target system since the hostname is used as part of the configuration archive file name. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA003.
0
Attacker Value
Unknown
CVE-2020-35152
Disclosure Date: December 11, 2020 (last updated February 22, 2025)
Cloudflare WARP for Windows allows privilege escalation due to an unquoted service path. A malicious user or process running with non-administrative privileges can become an administrator by abusing the unquoted service path issue. Since version 1.2.2695.1, the vulnerability was fixed by adding quotes around the service's binary path. This issue affects Cloudflare WARP for Windows, versions prior to 1.2.2695.1.
0
Attacker Value
Unknown
CVE-2020-8512
Disclosure Date: February 01, 2020 (last updated February 21, 2025)
In IceWarp Webmail Server through 11.4.4.1, there is XSS in the /webmail/ color parameter.
0
Attacker Value
Unknown
CVE-2008-7011
Disclosure Date: August 19, 2009 (last updated October 04, 2023)
The Unreal engine, as used in Unreal Tournament 3 1.3, Unreal Tournament 2003 and 2004, Dead Man's Hand, Pariah, WarPath, Postal2, and Shadow Ops, allows remote authenticated users to cause a denial of service (server exit) via multiple file downloads from the server, which triggers an assertion failure when the Closing flag in UnChan.cpp is set.
0
Attacker Value
Unknown
CVE-2008-0218
Disclosure Date: January 10, 2008 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in admin/index.html in Merak IceWarp Mail Server allows remote attackers to inject arbitrary web script or HTML via the message parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
0
Attacker Value
Unknown
CVE-2007-0864
Disclosure Date: February 09, 2007 (last updated October 04, 2023)
SQL injection vulnerability in register.php in LushiWarPlaner 1.0 allows remote attackers to inject arbitrary SQL commands via the id parameter.
0
Attacker Value
Unknown
CVE-2025-0651
Last updated January 23, 2025
Improper Privilege Management vulnerability in Cloudflare WARP on Windows allows File Manipulation.
User with a low system privileges can create a set of symlinks inside the C:\ProgramData\Cloudflare\warp-diag-partials folder. After triggering the 'Reset all settings" option the WARP service will delete the files that the symlink was pointing to. Given the WARP service operates with System privileges this might lead to deleting files owned by the System user.
This issue affects WARP: before 2024.12.492.0.
0