Show filters
119 topics marked with the following tags:
Displaying 31-40 of 119
Sort by:
Attacker Value
High
CVE-2023-4220
Disclosure Date: November 28, 2023 (last updated December 05, 2023)
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
1
Attacker Value
Low
CVE-2024-8069
Disclosure Date: November 12, 2024 (last updated November 13, 2024)
Limited remote code execution with privilege of a NetworkService Account access in Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server
1
Attacker Value
Low
CVE-2022-42889
Disclosure Date: October 13, 2022 (last updated January 20, 2024)
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators…
5
Attacker Value
Very High
FortiGate SSL VPN "Breaching the Fort"
Last updated September 25, 2020
Security researchers at SAM Seamless Network [published a blog post](https://securingsam.com/breaching-the-fort/) on September 24, 2020 stating that 200,000 businesses were exposed to Man-in-the-Middle (MITM) attacks against FortiGate SSL VPNs due to the VPN client's failure to properly verify the server's certificate out of the box. Instead, FortiGate customers must take the extra step of configuring their SSL VPNs with a certificate signed by a trusted CA.
3
Attacker Value
Very Low
CVE-2020-15466
Disclosure Date: July 05, 2020 (last updated November 08, 2023)
In Wireshark 3.2.0 to 3.2.4, the GVCP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-gvcp.c by ensuring that an offset increases in all situations.
1
Attacker Value
Very High
CVE-2019-16097
Disclosure Date: September 08, 2019 (last updated November 27, 2024)
core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP.
0
Attacker Value
High
CVE-2020-11100
Disclosure Date: April 02, 2020 (last updated November 08, 2023)
In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.
0
Attacker Value
High
CVE-2023-50164
Disclosure Date: December 07, 2023 (last updated December 21, 2023)
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
6
Attacker Value
High
CVE-2023-25690
Disclosure Date: March 07, 2023 (last updated January 03, 2024)
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.
Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
or ProxyPassMatch in which a non-specific pattern matches
some portion of the user-supplied request-target (URL) data and is then
re-inserted into the proxied request-target using variable
substitution. For example, something like:
RewriteEngine on
RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ http://example.com:8080/
Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
10
Attacker Value
High
CVE-2021-27077
Disclosure Date: March 11, 2021 (last updated November 28, 2024)
Windows Win32k Elevation of Privilege Vulnerability
1