2024
-
Statamic CMS — Path traversal vulnerability
A vulnerability in the file upload system on Statamic CMS could allow an unauthenticated, remote attacker to place files in a location different than what was configured and potentially overwrite existing files.View advisory -
Microsoft — Authenticated Account Takeover
A privilege escalation vulnerability within Microsoft's account management flow allows an attacker with a valid session to takeover a victims account without knowledge of their password. This escalation path works on both accounts with multi-factor authentication (MFA) enabled, as well as accounts without MFA enabled.View advisory -
Silverstripe — Cross Site Scripting (XSS) vulnerability
A cross-site scripting vulnerability in Silverstripe allows a lower privileged user to inject a malicious payload into content blocks, that could execute within the context of an administrators browser.View advisory -
Passwordstate — Authentication Bypass vulnerability
An account takeover vulnerability was found in various authentication options for Passwordstate that could allow a malicious individual to take over victim user accounts simply by knowing their usernames. This could allow an attacker, armed only with knowledge of victim usernames, to take over their user accounts and access associated passwords.View advisory -
FarCry Core framework — Multiple issues
Multiple vulnerabilities were discovered in the FarCry Core framework which could allow an unauthenticated user to arbitrarily upload files and perform remote code execution on the underlying server.View advisory
2023
-
Security Feature Bypass In Zitadel — Race Condition
Zitadel was found to be vulnerable to a race condition, leading to the application processing numerous successful brute-force login attempts before triggering an account lockout.View advisory -
Zitadel one click silent account takeover — Multiple issues
The avatar upload functionality was found to be vulnerable to stored cross-site scripting via SVG's.View advisory -
Security Feature Bypass In ASP.NET and Visual Studio — Race Condition
The SignInManager in ASP.NET was found to be vulnerable to a Race Condition leading to thousands of successful brute-force login attempts before triggering an account lockout.View advisory -
Kramer VIA GO² — Multiple issues
The Kramer VIA GO² is a "Compact & Secure 4K Wireless Presentation Device", which was found to have multiple high risk security issues.View advisory -
perfSONAR — Multiple issues
Multiple vulnerabilities were found in perfSONAR that could allow a malicious individual to scan the internal network and read arbitrary files on the server.View advisory
2022
-
Spectrum Spatial Analyst 20.1 — Multiple issues
Precisely Spectrum Spatial Analyst 2020.1.0 S44 was found to be vulnerable to Server-Side Request Forgery (SSRF) and a Path Traversal sequence vulnerability.View advisory -
Genero Enterprise — Multiple issues
A number of vulnerabilities were discovered in the suite of applications bundled as Genero Enterprise including RCE in the Genero Mobile for Android framework, and a lack of certificate validation across the suite.View advisory -
Wiris MathType — Path traversal vulnerability
The Wiris MathType library (v7.28.0 and lower) was discovered to contain a path traversal vulnerability in the resourceFile parameter. This vulnerability is exploited via a crafted request to the resource handler.View advisory
2021
-
Accellion kiteworks — Privilege escalation vulnerability
A malicious user could gain shell access to the Accellion kiteworks application, complete with root privileges.View advisory -
Ruby Dragonfly — Argument Injection vulnerability
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled.View advisory -
Silverstripe — Cross Site Scripting (XSS) vulnerability
A Cross Site Scripting vulnerability in Silverstripe allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL.View advisory
2020
-
VMWare vCloud API — Access Control vulnerability
Access control vulnerabilities were identified within the VMware vCloud Director API (prior to v9.5.0.5). An organisation administrator can create, remove or revert snapshot operations against vApps and VMS located in other organisation VDCs.View advisory -
Cisco CWS — SQL Injection vulnerability
A vulnerability in the web UI of Cisco Cloud Web Security (CWS) could allow an authenticated, remote attacker to execute arbitrary SQL queries.View advisory -
TelStrat Engage — Multiple issues
Multiple vulnerabilities where identified within the TelStrat Engage (v5.6.1) application, including unauthenticated access to cleartext passwords.View advisory -
RSA Archer — Multiple issues
RSA Archer contains multiple security vulnerabilities that could potentially be exploited by malicious users to compromise the affected system.View advisory
2019
-
SolarWinds SERV-U — CSRF vulnerability
A CSRF vulnerability was identified in SolarWinds' file upload functionality.View advisory -
Squiz Matrix CMS — Multiple issues
Multiple vulnerabilities were found in the Squiz Matrix CMS that could result in arbitrary file deletion, information disclosure, and remote code execution.View advisory -
ASP.NET Boilerplate — Input Validation vulnerability
An input validation issue was discovered in the ASP.NET Boilerplate that could lead to significant client-side security vulnerabilities.View advisory -
Teracue ENC-400 — Multiple issues
Multiple vulnerabilities were identified within Teracue ENC-400, including broken authentication and command injection.View advisory