Show filters
10,122 Total Results
Displaying 51-60 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
High
CVE-2020-7357
Disclosure Date: April 06, 2020 (last updated February 21, 2025)
Cayin CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the 'NTP_Server_IP' HTTP POST parameter in system.cgi page. This issue affects several branches and versions of the CMS application, including CME-SE, CMS-60, CMS-40, CMS-20, and CMS version 8.2, 8.0, and 7.5.
0
Attacker Value
Low
CVE-2020-8500
Disclosure Date: March 02, 2020 (last updated February 21, 2025)
In Artica Pandora FMS 7.42, Web Admin users can execute arbitrary code by uploading a .php file via the Updater or Extension component. NOTE: The vendor reports that this is intended functionality
0
Attacker Value
Moderate
CVE-2019-19195
Disclosure Date: February 10, 2020 (last updated November 27, 2024)
The Bluetooth Low Energy implementation on Microchip Technology BluSDK Smart through 6.2 for ATSAMB11 devices does not properly restrict link-layer data length on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet.
0
Attacker Value
Moderate
CVE-2020-8644
Disclosure Date: February 05, 2020 (last updated February 21, 2025)
PlaySMS before 1.4.3 does not sanitize inputs from a malicious string.
0
Attacker Value
Unknown
CVE-2019-5544 — ESXi OpenSLP remote code execution vulnerability
Disclosure Date: December 06, 2019 (last updated July 26, 2024)
OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
1
Attacker Value
Very Low
CVE-2019-5111
Disclosure Date: December 03, 2019 (last updated November 27, 2024)
Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_cat was confirmed to suffer from SQL injections and could be exploited by authenticated attackers. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.
0
Attacker Value
Very Low
CVE-2019-5112
Disclosure Date: December 03, 2019 (last updated November 27, 2024)
Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_status was confirmed to suffer from SQL injections and could be exploited by authenticated attackers. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.
0
Attacker Value
Unknown
CVE-2018-19465
Disclosure Date: June 07, 2019 (last updated November 27, 2024)
Maccms through 8.0 allows XSS via the site_keywords field to index.php?m=system-config because of tpl/module/system.php and tpl/html/system_config.html, related to template/paody/html/vod_index.html.
1
Attacker Value
Unknown
CVE-2019-0211
Disclosure Date: April 08, 2019 (last updated July 26, 2024)
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.
1
Attacker Value
Moderate
Nuuo Central Management Server Session Bruteforce
Disclosure Date: October 12, 2018 (last updated November 27, 2024)
NUUO CMS all versions 3.1 and prior, The application uses a session identification mechanism that could allow attackers to obtain the active session ID, which could allow arbitrary remote code execution.
0