Show filters
112 Total Results
Displaying 51-60 of 112
Sort by:
Attacker Value
Unknown

CVE-2023-33281

Disclosure Date: May 22, 2023 (last updated February 25, 2025)
The remote keyfob system on Nissan Sylphy Classic 2021 sends the same RF signal for each door-open request, which allows for a replay attack. NOTE: the vendor's position is that this cannot be reproduced with genuine Nissan parts: for example, the combination of keyfob and door handle shown in the exploit demonstration does not match any technology that Nissan provides to customers.
Attacker Value
Unknown

CVE-2022-25987

Disclosure Date: February 16, 2023 (last updated February 24, 2025)
Improper handling of Unicode encoding in source code to be compiled by the Intel(R) C++ Compiler Classic before version 2021.6 for Intel(R) oneAPI Toolkits before version 2022.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Attacker Value
Unknown

CVE-2021-43329

Disclosure Date: August 25, 2022 (last updated February 24, 2025)
A SQL injection vulnerability in license_update.php in Mumara Classic through 2.93 allows a remote unauthenticated attacker to execute arbitrary SQL commands via the license parameter.
Attacker Value
Unknown

CVE-2021-43058

Disclosure Date: November 01, 2021 (last updated February 23, 2025)
An open redirect vulnerability exists in Replicated Classic versions prior to 2.53.1 that could lead to spoofing. To exploit this vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link, redirecting the user to an untrusted site.
Attacker Value
Unknown

CVE-2021-39271

Disclosure Date: August 30, 2021 (last updated November 28, 2024)
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
Attacker Value
Unknown

CVE-2021-36359

Disclosure Date: August 30, 2021 (last updated February 23, 2025)
OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
Attacker Value
Unknown

CVE-2020-10590

Disclosure Date: July 30, 2021 (last updated November 28, 2024)
Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.
Attacker Value
Unknown

CVE-2021-21009

Disclosure Date: January 12, 2021 (last updated February 22, 2025)
Adobe Campaign Classic Gold Standard 10 (and earlier), 20.3.1 (and earlier), 20.2.3 (and earlier), 20.1.3 (and earlier), 19.2.3 (and earlier) and 19.1.7 (and earlier) are affected by a server-side request forgery (SSRF) vulnerability. Successful exploitation could allow an attacker to use the Campaign instance to issue unauthorized requests to internal or external resources.
0
Attacker Value
Unknown

CVE-2020-24246

Disclosure Date: October 07, 2020 (last updated November 28, 2024)
Peplink Balance before 8.1.0rc1 allows an unauthenticated attacker to download PHP configuration files (/filemanager/php/connector.php) from Web Admin.
Attacker Value
Unknown

CVE-2020-16244

Disclosure Date: September 23, 2020 (last updated February 22, 2025)
GE Digital APM Classic, Versions 4.4 and prior. Salt is not used for hash calculation of passwords, making it possible to decrypt passwords. This design flaw, along with the IDOR vulnerability, puts the entire platform at high risk because an authenticated user can retrieve all user account data and then retrieve the actual passwords.