Total
284 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-4075 | 1 Electronjs | 1 Electron | 2024-02-28 | 2.1 LOW | 7.5 HIGH |
In Electron before versions 7.2.4, 8.2.4, and 9.0.0-beta21, arbitrary local file read is possible by defining unsafe window options on a child window opened via window.open. As a workaround, ensure you are calling `event.preventDefault()` on all new-window events where the `url` or `options` is not something you expect. This is fixed in versions 9.0.0-beta.21, 8.2.4 and 7.2.4. | |||||
CVE-2020-5289 | 1 Elide | 1 Elide | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
In Elide before 4.5.14, it is possible for an adversary to "guess and check" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the returned collection can be used to reconstruct the value of the inaccessible field. Resolved in Elide 4.5.14 and greater. | |||||
CVE-2020-12470 | 1 Mono | 1 Monox | 2024-02-28 | 6.5 MEDIUM | 7.2 HIGH |
MonoX through 5.1.40.5152 allows administrators to execute arbitrary code by modifying an ASPX template. | |||||
CVE-2019-13941 | 1 Siemens | 4 Ozw672, Ozw672 Firmware, Ozw772 and 1 more | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
A vulnerability has been identified in OZW672 (All versions < V10.00), OZW772 (All versions < V10.00). Vulnerable versions of OZW Web Server use predictable path names for project files that legitimately authenticated users have created by using the application's export function. By accessing a specific uniform resource locator on the web server, a remote attacker could be able to download a project file without prior authentication. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected system. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises the confidentiality of the targeted system. | |||||
CVE-2019-14273 | 1 Silverstripe | 1 Silverstripe | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
In SilverStripe assets 4.0, there is broken access control on files. | |||||
CVE-2020-5250 | 1 Prestashop | 1 Prestashop | 2024-02-28 | 4.9 MEDIUM | 6.3 MEDIUM |
In PrestaShop before version 1.7.6.4, when a customer edits their address, they can freely change the id_address in the form, and thus steal someone else's address. It is the same with CustomerForm, you are able to change the id_customer and change all information of all accounts. The problem is patched in version 1.7.6.4. | |||||
CVE-2019-4398 | 1 Ibm | 2 Cloud Orchestrator, Cloud Orchestrator Enterprise | 2024-02-28 | 2.1 LOW | 3.3 LOW |
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5 through 2.5.0.9 and 2.4 through 2.4.0.5 could allow a local user to obtain sensitive information from SessionManagement cookies. IBM X-Force ID: 162259. | |||||
CVE-2020-3927 | 2 Changingtec, Microsoft | 2 Servisign, Windows | 2024-02-28 | 8.5 HIGH | 7.5 HIGH |
An arbitrary-file-access vulnerability exists in ServiSign security plugin, as long as the attackers learn the specific API function, they may access arbitrary files on target system via crafted API parameter. | |||||
CVE-2020-10105 | 1 Zammad | 1 Zammad | 2024-02-28 | 5.0 MEDIUM | 5.3 MEDIUM |
An issue was discovered in Zammad 3.0 through 3.2. It returns source code of static resources when submitting an OPTIONS request, rather than a GET request. Disclosure of source code allows for an attacker to formulate more precise attacks. Source code was disclosed for the file 404.html (/zammad/public/404.html) | |||||
CVE-2019-17221 | 1 Phantomjs | 1 Phantomjs | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
PhantomJS through 2.1.1 has an arbitrary file read vulnerability, as demonstrated by an XMLHttpRequest for a file:// URI. The vulnerability exists in the page.open() function of the webpage module, which loads a specified URL and calls a given callback. An attacker can supply a specially crafted HTML file, as user input, that allows reading arbitrary files on the filesystem. For example, if page.render() is the function callback, this generates a PDF or an image of the targeted file. NOTE: this product is no longer developed. | |||||
CVE-2019-17130 | 1 Vbulletin | 1 Vbulletin | 2024-02-28 | 6.4 MEDIUM | 6.5 MEDIUM |
vBulletin through 5.5.4 mishandles external URLs within the /core/vb/vurl.php file and the /core/vb/vurl directories. | |||||
CVE-2020-3926 | 2 Changingtec, Microsoft | 2 Servisign, Windows | 2024-02-28 | 7.8 HIGH | 7.5 HIGH |
An arbitrary-file-access vulnerability exists in ServiSign security plugin, as long as the attackers learn the specific API function, they may access arbitrary files on target system via crafted API parameter. | |||||
CVE-2019-19018 | 1 Titanhq | 1 Webtitan | 2024-02-28 | 4.0 MEDIUM | 2.7 LOW |
An issue was discovered in TitanHQ WebTitan before 5.18. It exposes a database configuration file under /include/dbconfig.ini in the web administration interface, revealing what database the web application is using. | |||||
CVE-2019-17112 | 1 Zohocorp | 1 Manageengine Datasecurity Plus | 2024-02-28 | 4.0 MEDIUM | 4.3 MEDIUM |
An issue was discovered in Zoho ManageEngine DataSecurity Plus before 5.0.1 5012. An exposed service allows a basic user ("Operator" access level) to access the configuration file of the mail server (except for the password). | |||||
CVE-2020-1726 | 2 Libpod Project, Redhat | 3 Libpod, Enterprise Linux, Openshift Container Platform | 2024-02-28 | 5.8 MEDIUM | 5.9 MEDIUM |
A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0. | |||||
CVE-2015-4715 | 1 Owncloud | 1 Owncloud | 2024-02-28 | 4.0 MEDIUM | 4.9 MEDIUM |
The fetch function in OAuth/Curl.php in Dropbox-PHP, as used in ownCloud Server before 6.0.8, 7.x before 7.0.6, and 8.x before 8.0.4 when an external Dropbox storage has been mounted, allows remote administrators of Dropbox.com to read arbitrary files via an @ (at sign) character in unspecified POST values. | |||||
CVE-2019-0381 | 1 Sap | 3 Dynamic Tier, Sap Iq, Sql Anywhere | 2024-02-28 | 2.1 LOW | 5.5 MEDIUM |
A binary planting in SAP SQL Anywhere, before version 17.0, SAP IQ, before version 16.1, and SAP Dynamic Tier, before versions 1.0 and 2.0, can result in the inadvertent access of files located in directories outside of the paths specified by the user. | |||||
CVE-2019-19843 | 1 Ruckuswireless | 17 C110, E510, H320 and 14 more | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
Incorrect access control in the web interface in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote credential fetch via an unauthenticated HTTP request involving a symlink with /tmp and web/user/wps_tool_cache. | |||||
CVE-2019-13140 | 1 Intenogroup | 2 Eg200, Eg200 Firmware | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
Inteno EG200 EG200-WU7P1U_ADAMO3.16.4-190226_1650 routers have a JUCI ACL misconfiguration that allows the "user" account to extract the 3DES key via JSON commands to ubus. The 3DES key is used to decrypt the provisioning file provided by Adamo Telecom on a public URL via cleartext HTTP. | |||||
CVE-2019-12375 | 1 Ivanti | 1 Landesk Management Suite | 2024-02-28 | 4.1 MEDIUM | 6.3 MEDIUM |
Open directories in Ivanti LANDESK Management Suite (LDMS, aka Endpoint Manager) 10.0.1.168 Service Update 5 may lead to remote information disclosure and arbitrary code execution. |