Show filters
545 Total Results
Displaying 81-90 of 545
Sort by:
Attacker Value
Unknown

CVE-2023-31061

Disclosure Date: April 24, 2023 (last updated February 24, 2025)
Repetier Server through 1.4.10 does not have CSRF protection.
Attacker Value
Unknown

CVE-2023-31060

Disclosure Date: April 24, 2023 (last updated October 08, 2023)
Repetier Server through 1.4.10 executes as SYSTEM. This can be leveraged in conjunction with CVE-2023-31059 for full compromise.
Attacker Value
Unknown

CVE-2023-31059

Disclosure Date: April 24, 2023 (last updated February 24, 2025)
Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.
Attacker Value
Unknown

CVE-2023-28444

Disclosure Date: March 24, 2023 (last updated February 24, 2025)
angular-server-side-configuration helps configure an angular application at runtime on the server or in a docker container via environment variables. angular-server-side-configuration detects used environment variables in TypeScript (.ts) files during build time of an Angular CLI project. The detected environment variables are written to a ngssc.json file in the output directory. During deployment of an Angular based app, the environment variables based on the variables from ngssc.json are inserted into the apps index.html (or defined index file). With version 15.0.0 the environment variable detection was widened to the entire project, relative to the angular.json file from the Angular CLI. In a monorepo setup, this could lead to environment variables intended for a backend/service to be detected and written to the ngssc.json, which would then be populated and exposed via index.html. This has NO IMPACT, in a plain Angular project that has no backend component. This vulnerability has b…
Attacker Value
Unknown

CVE-2023-1270

Disclosure Date: March 08, 2023 (last updated February 24, 2025)
Cross-site Scripting in GitHub repository btcpayserver/btcpayserver prior to 1.8.3.
Attacker Value
Unknown

CVE-2023-1149

Disclosure Date: March 02, 2023 (last updated February 24, 2025)
Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.8.0.
Attacker Value
Unknown

CVE-2015-10086

Disclosure Date: February 28, 2023 (last updated February 24, 2025)
A vulnerability, which was classified as critical, was found in OpenCycleCompass server-php. Affected is an unknown function of the file api1/login.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The name of the patch is fa0d9bcf81c711a88172ad0d37a842f029ac3782. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-221808.
Attacker Value
Unknown

CVE-2023-26104

Disclosure Date: February 25, 2023 (last updated February 24, 2025)
All versions of the package lite-web-server are vulnerable to Denial of Service (DoS) when an attacker sends an HTTP request and includes control characters that the decodeURI() function is unable to parse.
Attacker Value
Unknown

CVE-2014-125089

Disclosure Date: February 21, 2023 (last updated February 24, 2025)
A vulnerability was found in cention-chatserver 3.8.0-rc1. It has been declared as problematic. Affected by this vulnerability is the function _formatBody of the file lib/InternalChatProtocol.fe. The manipulation of the argument body leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.9 is able to address this issue. The identifier of the patch is c4c0258bbd18f6915f97f91d5fee625384096a26. It is recommended to upgrade the affected component. The identifier VDB-221497 was assigned to this vulnerability.
Attacker Value
Unknown

CVE-2021-33948

Disclosure Date: February 17, 2023 (last updated February 24, 2025)
SQL injection vulnerability in FantasticLBP Hotels Server v1.0 allows attacker to execute arbitrary code via the username parameter.