Show filters
400 Total Results
Displaying 91-100 of 400
Sort by:
Attacker Value
Unknown
CVE-2023-36514
Disclosure Date: July 17, 2023 (last updated February 25, 2025)
Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Shipping Multiple Addresses plugin <= 3.8.5 versions.
0
Attacker Value
Unknown
CVE-2023-33193
Disclosure Date: May 30, 2023 (last updated February 25, 2025)
Emby Server is a user-installable home media server which stores and organizes a user's media files of virtually any format and makes them available for viewing at home and abroad on a broad range of client devices. This vulnerability may allow administrative access to an Emby Server system, depending on certain user account settings. By spoofing certain headers which are intended for interoperation with reverse proxy servers, it may be possible to affect the local/non-local network determination to allow logging in without password or to view a list of user accounts which may have no password configured. Impacted are all Emby Server system which are publicly accessible and where the administrator hasn't tightened the account login configuration for administrative users. This issue has been patched in Emby Server Beta version 4.8.31 and Emby Server version 4.7.12.
0
Attacker Value
Unknown
CVE-2023-33185
Disclosure Date: May 26, 2023 (last updated February 25, 2025)
Django-SES is a drop-in mail backend for Django. The django_ses library implements a mail backend for Django using AWS Simple Email Service. The library exports the `SESEventWebhookView class` intended to receive signed requests from AWS to handle email bounces, subscriptions, etc. These requests are signed by AWS and are verified by django_ses, however the verification of this signature was found to be flawed as it allowed users to specify arbitrary public certificates. This issue was patched in version 3.5.0.
0
Attacker Value
Unknown
CVE-2023-29491
Disclosure Date: April 14, 2023 (last updated February 24, 2025)
ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
0
Attacker Value
Unknown
CVE-2023-30638
Disclosure Date: April 14, 2023 (last updated February 24, 2025)
Atos Unify OpenScape SBC 10 before 10R3.1.3, OpenScape Branch 10 before 10R3.1.2, and OpenScape BCF 10 before 10R10.7.0 allow remote authenticated admins to inject commands.
0
Attacker Value
Unknown
CVE-2023-20866
Disclosure Date: April 13, 2023 (last updated February 24, 2025)
In Spring Session version 3.0.0, the session id can be logged to the standard output stream. This vulnerability exposes sensitive information to those who have access to the application logs and can be used for session hijacking. Specifically, an application is vulnerable if it is using HeaderHttpSessionIdResolver.
0
Attacker Value
Unknown
CVE-2023-26923
Disclosure Date: March 28, 2023 (last updated February 24, 2025)
Musescore 3.0 to 4.0.1 has a stack buffer overflow vulnerability that occurs when reading misconfigured midi files. If attacker can additional information, attacker can execute arbitrary code.
0
Attacker Value
Unknown
CVE-2023-0865
Disclosure Date: March 20, 2023 (last updated October 08, 2023)
The WooCommerce Multiple Customer Addresses & Shipping WordPress plugin before 21.7 does not ensure that the address to add/update/retrieve/delete and duplicate belong to the user making the request, or is from a high privilege users, allowing any authenticated users, such as subscriber to add/update/duplicate/delete as well as retrieve addresses of other users.
0
Attacker Value
Unknown
CVE-2020-36659
Disclosure Date: January 27, 2023 (last updated February 24, 2025)
In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
0
Attacker Value
Unknown
CVE-2020-36658
Disclosure Date: January 27, 2023 (last updated February 24, 2025)
In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
0