Show filters
20,401 Total Results
Displaying 61-70 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Very High
CVE-2022-27518
Disclosure Date: December 13, 2022 (last updated February 24, 2025)
Unauthenticated remote arbitrary code execution
1
Attacker Value
Very High
CVE-2022-37061
Disclosure Date: August 18, 2022 (last updated February 24, 2025)
All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are vulnerable to Remote Command Injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the root privileges.
1
Attacker Value
Unknown
CVE-2022-29953
Disclosure Date: July 26, 2022 (last updated February 24, 2025)
The Bently Nevada 3700 series of condition monitoring equipment through 2022-04-29 has a maintenance interface on port 4001/TCP with undocumented, hardcoded credentials. An attacker capable of connecting to this interface can thus trivially take over its functionality.
1
Attacker Value
Unknown
CVE-2022-30075
Disclosure Date: June 09, 2022 (last updated October 07, 2023)
In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation.
1
Attacker Value
Unknown
CVE-2022-25064
Disclosure Date: February 25, 2022 (last updated February 23, 2025)
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a remote code execution (RCE) vulnerability via the function oal_wan6_setIpAddr.
1
Attacker Value
Very High
CVE-2021-3723
Disclosure Date: November 12, 2021 (last updated February 23, 2025)
A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session.
1
Attacker Value
Unknown
CVE-2021-43267
Disclosure Date: November 02, 2021 (last updated February 23, 2025)
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
1
Attacker Value
Unknown
CVE-2021-34787
Disclosure Date: October 27, 2021 (last updated February 23, 2025)
A vulnerability in the identity-based firewall (IDFW) rule processing feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass security protections. This vulnerability is due to improper handling of network requests by affected devices configured to use object group search. An attacker could exploit this vulnerability by sending a specially crafted network request to an affected device. A successful exploit could allow the attacker to bypass access control list (ACL) rules on the device, bypass security protections, and send network traffic to unauthorized hosts.
1
Attacker Value
Moderate
CVE-2021-22947
Disclosure Date: September 29, 2021 (last updated February 23, 2025)
When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.
1
Attacker Value
Very High
CVE-2021-33045
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
1