Show filters
106 topics marked with the following tags:
Displaying 31-40 of 106
Sort by:
Attacker Value
High
CVE-2021-31799
Disclosure Date: July 30, 2021 (last updated January 06, 2024)
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
0
Attacker Value
Low
CVE-2020-5260
Disclosure Date: April 14, 2020 (last updated November 08, 2023)
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be t…
1
Attacker Value
Moderate
CVE-2024-47176
Disclosure Date: September 26, 2024 (last updated October 02, 2024)
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
3
Attacker Value
Low
CVE-2019-19908
Disclosure Date: June 19, 2019 (last updated October 06, 2023)
phpMyChat-Plus 1.98 is vulnerable to reflected XSS via JavaScript injection into the password reset URL. In the URL, the pmc_username parameter to pass_reset.php is vulnerable.
0
Attacker Value
Very Low
CVE-2020-1094
Disclosure Date: April 15, 2020 (last updated October 06, 2023)
An elevation of privilege vulnerability exists when the Windows Work Folder Service improperly handles file operations, aka 'Windows Work Folder Service Elevation of Privilege Vulnerability'.
0
Attacker Value
High
CVE-2022-21874
Disclosure Date: January 11, 2022 (last updated December 21, 2023)
Windows Security Center API Remote Code Execution Vulnerability
1
Attacker Value
Moderate
CVE-2021-35501
Disclosure Date: June 25, 2021 (last updated October 07, 2023)
PandoraFMS <=7.54 allows Stored XSS by placing a payload in the name field of a visual console. When a user or an administrator visits the console, the XSS payload will be executed.
1
Attacker Value
Very High
CVE-2020-9758
Disclosure Date: March 09, 2020 (last updated October 06, 2023)
An issue was discovered in chat.php in LiveZilla Live Chat 8.0.1.3 (Helpdesk). A blind JavaScript injection lies in the name parameter. Triggering this can fetch the username and passwords of the helpdesk employees in the URI. This leads to a privilege escalation, from unauthenticated to user-level access, leading to full account takeover. The attack fetches multiple credentials because they are stored in the database (stored XSS). This affects the mobile/chat URI via the lgn and psswrd parameters.
0
Attacker Value
Very Low
CVE-2020-5308
Disclosure Date: January 07, 2020 (last updated November 15, 2023)
PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to XSS, as demonstrated by the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName parameter in add-product.php.
0
Attacker Value
Moderate
CVE-2023-25950
Disclosure Date: April 11, 2023 (last updated October 08, 2023)
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
2