Show filters
9,277 Total Results
Displaying 61-70 of 9,277
Sort by:
Attacker Value
Unknown

CVE-2021-44142

Disclosure Date: January 31, 2022 (last updated February 23, 2025)
The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root.
Attacker Value
Very High

CVE-2021-44529

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).
Attacker Value
Very High

CVE-2021-37928

Disclosure Date: October 07, 2021 (last updated February 23, 2025)
Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.
Attacker Value
Moderate

CVE-2021-38648

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
Open Management Infrastructure Elevation of Privilege Vulnerability
1
Attacker Value
High

CVE-2021-28169

Disclosure Date: June 09, 2021 (last updated February 22, 2025)
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
Attacker Value
Unknown

CVE-2021-3537

Disclosure Date: May 14, 2021 (last updated February 22, 2025)
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
Attacker Value
Very Low

CVE-2020-28198

Disclosure Date: May 06, 2021 (last updated February 22, 2025)
The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Attacker Value
High

CVE-2021-3287

Disclosure Date: April 22, 2021 (last updated February 22, 2025)
Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.
Attacker Value
High

CVE-2020-28653

Disclosure Date: February 03, 2021 (last updated November 28, 2024)
Zoho ManageEngine OpManager Stable build before 125203 (and Released build before 125233) allows Remote Code Execution via the Smart Update Manager (SUM) servlet.
Attacker Value
Very Low

CVE-2020-28054

Disclosure Date: November 19, 2020 (last updated November 28, 2024)
JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authorization Bypass because the Collector component is not properly validating an authenticated session with the Viewer. If the Viewer has been modified (binary patched) and the Bypass Login functionality is being used, an attacker can request every Collector's functionality as if they were a properly logged-in user: administrating connected instances, reviewing logs, editing configurations, accessing the instances' consoles, accessing hardware configurations, etc.Exploiting this vulnerability won't grant an attacker access nor control on remote ISP servers as no credentials is sent with the request.