Tiki Wiki CMS Groupware 5.2 has Local File Inclusion
Max CVSS
9.8
EPSS Score
3.45%
Published
2019-10-28
Updated
2019-10-29
The vulnerability is limited to the installers of Dell Encryption Enterprise versions prior to 10.4.0 and Dell Endpoint Security Suite Enterprise versions prior to 2.4.0. This issue is exploitable only during the installation of the product by an administrator. A local authenticated low privileged user potentially could exploit this vulnerability by staging a malicious DLL in the search path of the installer prior to its execution by a local administrator. This would cause loading of the malicious DLL, which would allow the attacker to execute arbitrary code in the context of an administrator.
Max CVSS
7.3
EPSS Score
0.04%
Published
2019-10-07
Updated
2019-10-11
An exploitable SQL injection vulnerability exist in YouPHPTube 7.7. When the "VideoTags" plugin is enabled, a specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. An attacker can send an HTTP request to trigger this vulnerability.
Max CVSS
8.9
EPSS Score
0.15%
Published
2019-10-31
Updated
2022-06-27
An exploitable SQL injection vulnerability exist in YouPHPTube 7.7. A specially crafted unauthenticated HTTP request can cause a SQL injection, possibly leading to denial of service, exfiltration of the database and local file inclusion, which could potentially further lead to code execution. An attacker can send an HTTP request to trigger this vulnerability.
Max CVSS
10.0
EPSS Score
0.17%
Published
2019-10-31
Updated
2022-06-27
A Local File Inclusion (LFI) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to read sensitive files via a simple HTTP Request.
Max CVSS
6.5
EPSS Score
0.25%
Published
2019-10-17
Updated
2021-07-21
JetBrains Rider before 2019.1.2 was using an unsigned JetBrains.Rider.Unity.Editor.Plugin.Repacked.dll file.
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-10-01
Updated
2019-10-08
Local file inclusion in brokerPerformance.php in Centreon Web before 2.8.28 allows attackers to disclose information or perform a stored XSS attack on a user.
Max CVSS
6.1
EPSS Score
0.08%
Published
2019-10-08
Updated
2019-10-15
The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
Max CVSS
7.5
EPSS Score
0.17%
Published
2019-10-21
Updated
2019-10-23
Avira Software Updater before 2.0.6.21094 allows a DLL side-loading attack. NOTE: The vendor thinks that this vulnerability is invalid because exploiting it would require at least administrator privileges and would gain only SYSTEM privileges
Max CVSS
6.7
EPSS Score
0.04%
Published
2019-10-10
Updated
2024-04-11
NSA Ghidra through 9.0.4 uses a potentially untrusted search path. When executing Ghidra from a given path, the Java process working directory is set to this path. Then, when launching the Python interpreter via the "Ghidra Codebrowser > Window > Python" option, Ghidra will try to execute the cmd.exe program from this working directory.
Max CVSS
7.8
EPSS Score
0.06%
Published
2019-10-16
Updated
2019-10-21
A DLL side loading vulnerability in the Windows Service in TeamViewer versions up to 11.0.133222 (fixed in 11.0.214397), 12.0.181268 (fixed in 12.0.214399), 13.2.36215 (fixed in 13.2.36216), and 14.6.4835 (fixed in 14.7.1965) on Windows could allow an attacker to perform code execution on a target system via a service restart where the DLL was previously installed with administrative privileges. Exploitation requires that an attacker be able to create a new file in the TeamViewer application directory; directory permissions restrict that by default.
Max CVSS
6.9
EPSS Score
0.04%
Published
2019-10-24
Updated
2019-11-18
11 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!