Show filters
563 Total Results
Displaying 301-310 of 563
Sort by:
Attacker Value
Unknown

CVE-2021-27185

Disclosure Date: February 10, 2021 (last updated February 22, 2025)
The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.
Attacker Value
Unknown

CVE-2020-27222

Disclosure Date: February 03, 2021 (last updated February 22, 2025)
In Eclipse Californium version 2.3.0 to 2.6.0, the certificate based (x509 and RPK) DTLS handshakes accidentally fails, because the DTLS server side sticks to a wrong internal state. That wrong internal state is set by a previous certificate based DTLS handshake failure with TLS parameter mismatch. The DTLS server side must be restarted to recover this. This allow clients to force a DoS.
Attacker Value
Unknown

CVE-2020-27221

Disclosure Date: January 21, 2021 (last updated February 22, 2025)
In Eclipse OpenJ9 up to and including version 0.23, there is potential for a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding.
Attacker Value
Unknown

CVE-2020-35217

Disclosure Date: January 20, 2021 (last updated February 22, 2025)
Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
Attacker Value
Unknown

CVE-2020-27219

Disclosure Date: January 14, 2021 (last updated February 22, 2025)
In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client.
Attacker Value
Unknown

CVE-2020-27220

Disclosure Date: January 14, 2021 (last updated February 22, 2025)
The Eclipse Hono AMQP and MQTT protocol adapters do not check whether an authenticated gateway device is authorized to receive command & control messages when it has subscribed only to commands for a specific device. The missing check involves verifying that the command target device is configured giving permission for the gateway device to act on its behalf. This means an authenticated device of a certain tenant, notably also a non-gateway device acting like a gateway, may receive command & control messages targeted at a different device of the same tenant without corresponding permissions getting checked.
Attacker Value
Unknown

CVE-2020-26759

Disclosure Date: January 06, 2021 (last updated February 22, 2025)
clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, due to a buffer overflow.
Attacker Value
Unknown

CVE-2020-14368

Disclosure Date: December 14, 2020 (last updated February 22, 2025)
A flaw was found in Eclipse Che in versions prior to 7.14.0 that impacts CodeReady Workspaces. When configured with cookies authentication, Theia IDE doesn't properly set the SameSite value, allowing a Cross-Site Request Forgery (CSRF) and consequently allowing a cross-site WebSocket hijack on Theia IDE. This flaw allows an attacker to gain full access to the victim's workspace through the /services endpoint. To perform a successful attack, the attacker conducts a Man-in-the-middle attack (MITM) and tricks the victim into executing a request via an untrusted link, which performs the CSRF and the Socket hijack. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Attacker Value
Unknown

CVE-2020-28937

Disclosure Date: December 03, 2020 (last updated February 22, 2025)
OpenClinic version 0.8.2 is affected by a missing authentication vulnerability that allows unauthenticated users to access any patient's medical test results, possibly resulting in disclosure of Protected Health Information (PHI) stored in the application, via a direct request for the /tests/ URI.
Attacker Value
Unknown

CVE-2020-28939

Disclosure Date: December 03, 2020 (last updated February 22, 2025)
OpenClinic version 0.8.2 is affected by a medical/test_new.php insecure file upload vulnerability. This vulnerability allows authenticated users (with substantial privileges) to upload malicious files, such as PHP web shells, which can lead to arbitrary code execution on the application server.