Show filters
119 topics marked with the following tags:
Displaying 91-100 of 119
Sort by:
Attacker Value
High

CVE-2022-21907

Disclosure Date: January 11, 2022 (last updated November 28, 2024)
HTTP Protocol Stack Remote Code Execution Vulnerability
5
Attacker Value
High

CVE-2022-33891

Disclosure Date: July 18, 2022 (last updated November 29, 2024)
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.
Attacker Value
High

CVE-2020-0796 - SMBGhost

Disclosure Date: March 12, 2020 (last updated October 06, 2023)
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
Attacker Value
High

CVE-2023-28311

Disclosure Date: April 11, 2023 (last updated January 11, 2025)
Microsoft Word Remote Code Execution Vulnerability
Attacker Value
Very High

CVE-2021-42671

Disclosure Date: November 05, 2021 (last updated November 28, 2024)
An incorrect access control vulnerability exists in Sourcecodester Engineers Online Portal in PHP in nia_munoz_monitoring_system/admin/uploads. An attacker can leverage this vulnerability in order to bypass access controls and access all the files uploaded to the web server without the need of authentication or authorization.
Attacker Value
High

CVE-2023-24892

Disclosure Date: March 14, 2023 (last updated January 11, 2025)
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
Attacker Value
High

CVE-2021-31166

Disclosure Date: May 11, 2021 (last updated November 28, 2024)
HTTP Protocol Stack Remote Code Execution Vulnerability
8
Attacker Value
Moderate

CVE-2022-22947

Disclosure Date: March 03, 2022 (last updated November 29, 2024)
In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.
Attacker Value
High

CVE-2023-23398

Disclosure Date: March 14, 2023 (last updated May 29, 2024)
Microsoft Excel Spoofing Vulnerability
Attacker Value
High

CVE-2024-23334

Disclosure Date: January 29, 2024 (last updated February 06, 2024)
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.