Show filters
11,866 Total Results
Displaying 71-80 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown
CVE-2023-30602
Disclosure Date: May 02, 2023 (last updated February 25, 2025)
Hitron Technologies CODA-5310’s Telnet function transfers sensitive data in plaintext. An unauthenticated remote attacker can exploit this vulnerability to access credentials of normal users and administrator.
1
Attacker Value
Unknown
CVE-2021-38398
Disclosure Date: September 30, 2021 (last updated February 23, 2025)
The affected device uses off-the-shelf software components that contain unpatched vulnerabilities. A malicious attacker with physical access to the affected device could exploit these vulnerabilities.
1
Attacker Value
Moderate
CVE-2021-22652
Disclosure Date: February 11, 2021 (last updated February 22, 2025)
Access to the Advantech iView versions prior to v5.7.03.6112 configuration are missing authentication, which may allow an unauthorized attacker to change the configuration and obtain code execution.
0
Attacker Value
Very High
CVE-2020-8243
Disclosure Date: September 30, 2020 (last updated February 22, 2025)
A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution.
0
Attacker Value
Unknown
CVE-2020-8204
Disclosure Date: July 30, 2020 (last updated February 21, 2025)
A cross site scripting (XSS) vulnerability exists in Pulse Connect Secure <9.1R5 on the PSAL Page.
1
Attacker Value
Moderate
CVE-2020-15612 — CentOS Web Panel Authentication Bypass/RCE
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_ftp_manager.php. When parsing the userLogin parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9737.
0
Attacker Value
High
CVE-2020-7357
Disclosure Date: April 06, 2020 (last updated February 21, 2025)
Cayin CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the 'NTP_Server_IP' HTTP POST parameter in system.cgi page. This issue affects several branches and versions of the CMS application, including CME-SE, CMS-60, CMS-40, CMS-20, and CMS version 8.2, 8.0, and 7.5.
0
Attacker Value
Very High
CVE-2020-9463
Disclosure Date: February 28, 2020 (last updated February 21, 2025)
Centreon 19.10 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the server_ip field in JSON data in an api/internal.php?object=centreon_configuration_remote request.
0
Attacker Value
Very Low
CVE-2020-9340
Disclosure Date: February 22, 2020 (last updated February 21, 2025)
fauzantrif eLection 2.0 has SQL Injection via the admin/ajax/op_kandidat.php id parameter.
0
Attacker Value
Unknown
CVE-2019-12102
Disclosure Date: May 22, 2019 (last updated November 08, 2023)
Kentico 11 through 12 lets attackers upload and explore files without authentication via the cmsmodules/medialibrary/formcontrols/liveselectors/insertimageormedia/tabs_media.aspx URI. NOTE: The vendor disputes the report because the researcher did not configure the media library permissions correctly. The vendor states that by default all users can read/modify/upload files, and it’s up to the administrator to decide who should have access to the media library and set the permissions accordingly. See the vendor documentation in the references for more information
1