Show filters
224 Total Results
Displaying 1-10 of 224
Sort by:
Attacker Value
Very High

CVE-2020-6364 — OS Command Injection Vulnerability in CA Introscope Enterprise …

Disclosure Date: October 15, 2020 (last updated February 22, 2025)
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an attacker to modify a cookie in a way that OS commands can be executed and potentially gain control over the host running the CA Introscope Enterprise Manager,leading to Code Injection. With this, the attacker is able to read and modify all system files and also impact system availability.
Attacker Value
Unknown

CVE-2013-1668

Disclosure Date: May 23, 2014 (last updated December 06, 2023)
The uploadFile function in upload/index.php in CosCMS before 1.822 allows remote administrators to execute arbitrary commands via shell metacharacters in the name of an uploaded file.
0
Attacker Value
Unknown

CVE-2024-11337

Disclosure Date: January 07, 2025 (last updated January 07, 2025)
The Horoscope And Tarot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'divine_horoscope' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2024-54296

Disclosure Date: December 13, 2024 (last updated December 18, 2024)
Authentication Bypass Using an Alternate Path or Channel vulnerability in Codexpert, Inc CoSchool LMS allows Authentication Bypass.This issue affects CoSchool LMS: from n/a through 1.2.
0
Attacker Value
Unknown

CVE-2024-6876

Disclosure Date: September 10, 2024 (last updated September 24, 2024)
Out-of-Bounds read vulnerability in OSCAT Basic Library allows an local, unprivileged attacker to access limited internal data of the PLC which may lead to a crash of the affected service.
Attacker Value
Unknown

CVE-2024-7941

Disclosure Date: August 27, 2024 (last updated October 31, 2024)
An HTTP parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
Attacker Value
Unknown

CVE-2024-7940

Disclosure Date: August 27, 2024 (last updated August 29, 2024)
The product exposes a service that is intended for local only to all network interfaces without any authentication.
Attacker Value
Unknown

CVE-2024-4872

Disclosure Date: August 27, 2024 (last updated October 31, 2024)
A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability an attacker must have a valid credential.
Attacker Value
Unknown

CVE-2024-3982

Disclosure Date: August 27, 2024 (last updated August 29, 2024)
An attacker with local access to machine where MicroSCADA X SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level is not enabled and only users with administrator rights can enable it.
Attacker Value
Unknown

CVE-2024-3980

Disclosure Date: August 27, 2024 (last updated October 31, 2024)
The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names that are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or other files that are critical to the application.