Show filters
133 Total Results
Displaying 1-10 of 133
Sort by:
Attacker Value
Unknown
CVE-2024-13537
Disclosure Date: February 21, 2025 (last updated February 23, 2025)
The C9 Blocks plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.7.7. This is due the plugin containing a publicly accessible composer-setup.php file with error display enabled. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
0
Attacker Value
Unknown
CVE-2021-4177
Disclosure Date: December 28, 2021 (last updated February 23, 2025)
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information
0
Attacker Value
Unknown
CVE-2021-44155
Disclosure Date: December 13, 2021 (last updated February 23, 2025)
An issue was discovered in /goform/login_process in Reprise RLM 14.2. When an attacker attempts to login, the response if a username is valid includes Login Failed, but does not include this string if the username is invalid. This allows an attacker to enumerate valid users.
0
Attacker Value
Unknown
CVE-2021-43542
Disclosure Date: December 08, 2021 (last updated February 23, 2025)
Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
0
Attacker Value
Unknown
CVE-2021-38980
Disclosure Date: November 22, 2021 (last updated February 23, 2025)
IBM Tivoli Key Lifecycle Manager (IBM Security Guardium Key Lifecycle Manager) 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212786.
0
Attacker Value
Unknown
CVE-2021-38981
Disclosure Date: November 12, 2021 (last updated February 23, 2025)
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212788.
0
Attacker Value
Unknown
CVE-2021-40126
Disclosure Date: November 03, 2021 (last updated February 23, 2025)
A vulnerability in the web-based dashboard of Cisco Umbrella could allow an authenticated, remote attacker to perform an email enumeration attack against the Umbrella infrastructure. This vulnerability is due to an overly descriptive error message on the dashboard that appears when a user attempts to modify their email address when the new address already exists in the system. An attacker could exploit this vulnerability by attempting to modify the user's email address. A successful exploit could allow the attacker to enumerate email addresses of users in the system.
0
Attacker Value
Unknown
CVE-2021-35060
Disclosure Date: October 11, 2021 (last updated February 23, 2025)
/way4acs/enroll in OpenWay WAY4 ACS before 1.2.278-2693 allows unauthenticated attackers to leverage response differences to discover whether a specific payment card number is stored in the system.
0
Attacker Value
Unknown
CVE-2021-20552
Disclosure Date: October 06, 2021 (last updated February 23, 2025)
IBM Sterling File Gateway 6.0.0.0 through 6.1.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 199170.
0
Attacker Value
Unknown
CVE-2021-1546
Disclosure Date: September 22, 2021 (last updated February 23, 2025)
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to access sensitive information. This vulnerability is due to improper protections on file access through the CLI. An attacker could exploit this vulnerability by running a CLI command that targets an arbitrary file on the local system. A successful exploit could allow the attacker to return portions of an arbitrary file, possibly resulting in the disclosure of sensitive information.
0