Show filters
71,677 Total Results
Displaying 981-990 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Moderate

Remote Desktop Client remote code execution vulnerability

Disclosure Date: January 14, 2020 (last updated November 27, 2024)
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server, aka 'Remote Desktop Client Remote Code Execution Vulnerability'.
Attacker Value
Very Low

CVE-2020-5308

Disclosure Date: January 07, 2020 (last updated November 15, 2023)
PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to XSS, as demonstrated by the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName parameter in add-product.php.
Attacker Value
Moderate

CVE-2020-5307

Disclosure Date: January 07, 2020 (last updated November 15, 2023)
PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php.
Attacker Value
Unknown

CVE-2019-5544 — ESXi OpenSLP remote code execution vulnerability

Disclosure Date: December 06, 2019 (last updated July 26, 2024)
OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
Attacker Value
Very High

Automatic macro execution bug in Office Mac _when_ macros are disabled

Disclosure Date: November 12, 2019 (last updated November 27, 2024)
A security feature bypass vulnerability exists in Microsoft Office software by not enforcing macro settings on an Excel document, aka 'Microsoft Office Excel Security Feature Bypass'.
Attacker Value
Moderate

C4G BLIS Improper Access Control

Disclosure Date: November 06, 2019 (last updated November 27, 2024)
Computing For Good's Basic Laboratory Information System (also known as C4G BLIS) version 3.5 and earlier suffers from an instance of CWE-284, "Improper Access Control." As a result, an unauthenticated user may alter several facets of a user account, including promoting any user to an administrator.
Attacker Value
Moderate

Backport of the fix for CVE-2017-3137 leads to assertion failure in validator.c…

Disclosure Date: October 30, 2019 (last updated November 27, 2024)
The Debian backport of the fix for CVE-2017-3137 leads to assertion failure in validator.c:1858; Affects Debian versions 9.9.5.dfsg-9+deb8u15; 9.9.5.dfsg-9+deb8u18; 9.10.3.dfsg.P4-12.3+deb9u5; 9.11.5.P4+dfsg-5.1 No ISC releases are affected. Other packages from other distributions who did similar backports for the fix for 2017-3137 may also be affected.
Attacker Value
Very Low

Kubectl/API Server YAML parsing vulnerable to "Billion Laughs" Attack

Disclosure Date: October 17, 2019 (last updated November 08, 2023)
Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.
Attacker Value
Unknown

CVE-2019-17059

Disclosure Date: October 11, 2019 (last updated November 27, 2024)
A shell injection vulnerability on the Sophos Cyberoam firewall appliance with CyberoamOS before 10.6.6 MR-6 allows remote attackers to execute arbitrary commands via the Web Admin and SSL VPN consoles.
Attacker Value
Moderate

iTerm2 with tmux integration is vulnerable to remote command execution

Disclosure Date: October 09, 2019 (last updated November 08, 2023)
A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.