Show filters
563 Total Results
Displaying 331-340 of 563
Sort by:
Attacker Value
Unknown

CVE-2020-14492

Disclosure Date: July 02, 2020 (last updated February 21, 2025)
OpenClinic GA 5.09.02 and 5.89.05b does not properly neutralize user-controllable input, which may allow the execution of malicious code within the user’s browser.
Attacker Value
Unknown

CVE-2020-14493

Disclosure Date: July 02, 2020 (last updated February 21, 2025)
A low-privilege user may use SQL syntax to write arbitrary files to the OpenClinic GA 5.09.02 and 5.89.05b server, which may allow the execution of arbitrary commands.
Attacker Value
Unknown

CVE-2020-13867

Disclosure Date: June 05, 2020 (last updated February 21, 2025)
Open-iSCSI targetcli-fb through 2.1.52 has weak permissions for /etc/target (and for the backup directory and backup files).
Attacker Value
Unknown

CVE-2020-11021

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
Actions Http-Client (NPM @actions/http-client) before version 1.0.8 can disclose Authorization headers to incorrect domain in certain redirect scenarios. The conditions in which this happens are if consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname Then the authorization header will get passed to the other domain. The problem is fixed in version 1.0.8.
Attacker Value
Unknown

CVE-2020-10699

Disclosure Date: April 15, 2020 (last updated February 21, 2025)
A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.
Attacker Value
Unknown

CVE-2020-7633

Disclosure Date: April 06, 2020 (last updated February 21, 2025)
apiconnect-cli-plugins through 6.0.1 is vulnerable to Command Injection.It allows execution of arbitrary commands via the pluginUri argument.
Attacker Value
Unknown

CVE-2020-10689

Disclosure Date: April 03, 2020 (last updated February 21, 2025)
A flaw was found in the Eclipse Che up to version 7.8.x, where it did not properly restrict access to workspace pods. An authenticated user can exploit this flaw to bypass JWT proxy and gain access to the workspace pods of another user. Successful exploitation requires knowledge of the service name and namespace of the target pod.
Attacker Value
Unknown

CVE-2019-17636

Disclosure Date: March 10, 2020 (last updated February 21, 2025)
In Eclipse Theia versions 0.3.9 through 0.15.0, one of the default pre-packaged Theia extensions is "Mini-Browser", published as "@theia/mini-browser" on npmjs.com. This extension, for its own needs, exposes a HTTP endpoint that allows to read the content of files on the host's filesystem, given their path, without restrictions on the requester's origin. This design is vulnerable to being exploited remotely through a DNS rebinding attack or a drive-by download of a carefully crafted exploit.
Attacker Value
Unknown

CVE-2020-9354

Disclosure Date: February 23, 2020 (last updated February 21, 2025)
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) saveFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL allows an unauthenticated attacker to overwrite files via vectors involving an XML comment and /.. path traversal.
Attacker Value
Unknown

CVE-2020-9353

Disclosure Date: February 23, 2020 (last updated February 21, 2025)
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) loadFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL is affected by unauthenticated Local File Inclusion via directory-traversal sequences in the elem XML element in the _transaction parameter. NOTE: the documentation states "These tools are, by default, available to anyone ... so they should only be deployed into a trusted environment. Alternately, the tools can easily be restricted to administrators or end users by protecting the tools path with normal authentication and authorization mechanisms on the web server."