Show filters
320 Total Results
Displaying 61-70 of 320
Sort by:
Attacker Value
Unknown

CVE-2023-25620

Disclosure Date: April 19, 2023 (last updated February 24, 2025)
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause denial of service of the controller when a malicious project file is loaded onto the controller by an authenticated user.
Attacker Value
Unknown

CVE-2023-25619

Disclosure Date: April 19, 2023 (last updated February 24, 2025)
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause denial of service of the controller when communicating over the Modbus TCP protocol.
Attacker Value
Unknown

CVE-2023-0325

Disclosure Date: April 04, 2023 (last updated February 24, 2025)
Uvdesk version 1.1.1 allows an unauthenticated remote attacker to exploit a stored XSS in the application. This is possible because the application does not correctly validate the message sent by the clients in the ticket.
Attacker Value
Unknown

CVE-2023-0265

Disclosure Date: April 04, 2023 (last updated February 24, 2025)
Uvdesk version 1.1.1 allows an authenticated remote attacker to execute commands on the server. This is possible because the application does not properly validate profile pictures uploaded by customers.
Attacker Value
Unknown

CVE-2022-44742

Disclosure Date: March 23, 2023 (last updated February 24, 2025)
Auth. (admin+) Stored Cross-Site Scripting vulnerability in Yannick Lefebvre Community Events plugin <= 1.4.8 versions.
Attacker Value
Unknown

CVE-2023-1197

Disclosure Date: March 06, 2023 (last updated February 24, 2025)
Cross-site Scripting (XSS) - Stored in GitHub repository uvdesk/community-skeleton prior to 1.1.0.
Attacker Value
Unknown

CVE-2022-22564

Disclosure Date: February 14, 2023 (last updated February 24, 2025)
Dell EMC Unity versions before 5.2.0.0.5.173 , use(es) broken cryptographic algorithm. A remote unauthenticated attacker could potentially exploit this vulnerability by performing MitM attacks and let attackers obtain sensitive information.
Attacker Value
Unknown

CVE-2021-4266

Disclosure Date: December 21, 2022 (last updated February 24, 2025)
A vulnerability classified as problematic has been found in Webdetails cpf up to 9.5.0.0-80. Affected is an unknown function of the file core/src/main/java/pt/webdetails/cpf/packager/DependenciesPackage.java. The manipulation of the argument baseUrl leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 9.5.0.0-81 is able to address this issue. The name of the patch is 3bff900d228e8cae3af256b447c5d15bdb03c174. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216468.
Attacker Value
Unknown

CVE-2022-20752

Disclosure Date: July 06, 2022 (last updated February 24, 2025)
A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to perform a timing attack. This vulnerability is due to insufficient protection of a system password. An attacker could exploit this vulnerability by observing the time it takes the system to respond to various queries. A successful exploit could allow the attacker to determine a sensitive system password.
Attacker Value
Unknown

CVE-2022-20859

Disclosure Date: July 06, 2022 (last updated February 24, 2025)
A vulnerability in the Disaster Recovery framework of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P), and Cisco Unity Connection could allow an authenticated, remote attacker to perform certain administrative actions they should not be able to. This vulnerability is due to insufficient access control checks on the affected device. An attacker with read-only privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to perform a set of administrative actions they should not be able to.