Show filters
547 Total Results
Displaying 371-380 of 547
Sort by:
Attacker Value
Unknown

Cloud Foundry Stratos contains a Session Collision Vulnerability

Disclosure Date: March 07, 2019 (last updated November 27, 2024)
Cloud Foundry Stratos, versions prior to 2.3.0, contains an insecure session that can be spoofed. When deployed on cloud foundry with multiple instances using the default embedded SQLite database, a remote authenticated malicious user can switch sessions to another user with the same session id.
0
Attacker Value
Unknown

Cloud Foundry Stratos Deploys With Public Default Session Store Secret

Disclosure Date: March 07, 2019 (last updated November 27, 2024)
Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user.
Attacker Value
Unknown

CVE-2015-4615

Disclosure Date: February 15, 2019 (last updated November 27, 2024)
Vulnerability in Easy2map-photos WordPress Plugin v1.09 allows SQL Injection via unsanitized mapTemplateName, mapName, mapSettingsXML, parentCSSXML, photoCSSXML, mapCSSXML, mapHTML,mapID variables
0
Attacker Value
Unknown

CVE-2015-4617

Disclosure Date: February 15, 2019 (last updated November 27, 2024)
Vulnerability in Easy2map-photos WordPress Plugin v1.09 MapPinImageUpload.php and MapPinIconSave.php allows path traversal when specifying file names creating files outside of the upload directory.
0
Attacker Value
Unknown

CVE-2018-16598

Disclosure Date: December 06, 2018 (last updated November 27, 2024)
An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. In xProcessReceivedUDPPacket and prvParseDNSReply, any received DNS response is accepted, without confirming it matches a sent DNS request.
0
Attacker Value
Unknown

CVE-2018-16524

Disclosure Date: December 06, 2018 (last updated November 27, 2024)
Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow information disclosure during parsing of TCP options in prvCheckOptions.
0
Attacker Value
Unknown

CVE-2018-16526

Disclosure Date: December 06, 2018 (last updated November 27, 2024)
Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow remote attackers to leak information or execute arbitrary code because of a Buffer Overflow during generation of a protocol checksum in usGenerateProtocolChecksum and prvProcessIPPacket.
0
Attacker Value
Unknown

CVE-2018-16525

Disclosure Date: December 06, 2018 (last updated November 27, 2024)
Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow remote attackers to execute arbitrary code or leak information because of a Buffer Overflow during parsing of DNS\LLMNR packets in prvParseDNSReply.
0
Attacker Value
Unknown

CVE-2018-16601

Disclosure Date: December 06, 2018 (last updated November 27, 2024)
An issue was discovered in Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component. A crafted IP header triggers a full memory space copy in prvProcessIPPacket, leading to denial of service and possibly remote code execution.
0
Attacker Value
Unknown

CVE-2018-16528

Disclosure Date: December 06, 2018 (last updated November 27, 2024)
Amazon Web Services (AWS) FreeRTOS through 1.3.1 allows remote attackers to execute arbitrary code because of mbedTLS context object corruption in prvSetupConnection and GGD_SecureConnect_Connect in AWS TLS connectivity modules.
0