Show filters
174 Total Results
Displaying 61-70 of 174
Sort by:
Attacker Value
Unknown
CVE-2020-28502
Disclosure Date: March 05, 2021 (last updated February 22, 2025)
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
0
Attacker Value
Unknown
CVE-2020-13482
Disclosure Date: May 25, 2020 (last updated February 21, 2025)
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
0
Attacker Value
Unknown
CVE-2020-7646
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
curlrequest through 1.0.1 allows reading any file by populating the file parameter with user input.
0
Attacker Value
Unknown
CVE-2013-3323
Disclosure Date: February 18, 2020 (last updated February 21, 2025)
A Privilege Escalation Vulnerability exists in IBM Maximo Asset Management 7.5, 7.1, and 6.2, when WebSeal with Basic Authentication is used, due to a failure to invalidate the authentication session, which could let a malicious user obtain unauthorized access.
0
Attacker Value
Unknown
CVE-2019-17201
Disclosure Date: January 23, 2020 (last updated November 27, 2024)
FastTrack Admin By Request 6.1.0.0 supports group policies that are supposed to allow only a select range of users to elevate to Administrator privilege at will. When a user requests elevation using the AdminByRequest.exe interface, the interface communicates with the underlying service (Audckq32.exe) using a .NET named pipe. If the underlying service responds that a user is permitted access to the elevation feature, the client then reinitiates communication with the underlying service and requests elevation. This elevation request has no local checks in the service, and depends on client-side validation in the AdminByRequest.exe interface, i.e., it is a vulnerable exposed functionality in the service. By communicating directly with the underlying service, any user can request elevation and obtain Administrator privilege regardless of group policies or permissions.
0
Attacker Value
Unknown
CVE-2014-8650
Disclosure Date: December 15, 2019 (last updated November 27, 2024)
python-requests-Kerberos through 0.5 does not handle mutual authentication
0
Attacker Value
Unknown
CVE-2019-16251
Disclosure Date: October 31, 2019 (last updated November 27, 2024)
plugin-fw/lib/yit-plugin-panel-wc.php in the YIT Plugin Framework through 3.3.8 for WordPress allows authenticated options changes.
0
Attacker Value
Unknown
CVE-2019-1010206
Disclosure Date: July 23, 2019 (last updated November 27, 2024)
OSS Http Request (Apache Cordova Plugin) 6 is affected by: Missing SSL certificate validation. The impact is: certificate spoofing. The component is: use this library when https communication. The attack vector is: certificate spoofing.
0
Attacker Value
Unknown
CVE-2019-17202
Disclosure Date: April 18, 2019 (last updated February 21, 2025)
FastTrack Admin By Request 6.1.0.0 supports group policies that are supposed to allow only a select range of users to elevate to Administrator privilege at will. If a user does not have direct access to the elevation feature through group policies, they are prompted to enter a PIN code in a challenge-response manner upon attempting to elevate privileges. The challenge's response uses a simple algorithm that can be easily emulated via data (customer ID and device name) available to all users, and thus any user can elevate to Administrator privilege.
0
Attacker Value
Unknown
CVE-2018-18862
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
BMC Remedy Mid-Tier 7.1.00 and 9.1.02.003 for BMC Remedy AR System has Incorrect Access Control in ITAM forms, as demonstrated by TLS%3APLR-Configuration+Details/Default+Admin+View/, AST%3AARServerConnection/Default+Admin+View/, and AR+System+Administration%3A+Server+Information/Default+Admin+View/.
0