Show filters
273 Total Results
Displaying 31-40 of 273
Sort by:
Attacker Value
Unknown
CVE-2021-26338
Disclosure Date: November 09, 2021 (last updated February 23, 2025)
Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources.
0
Attacker Value
Unknown
CVE-2021-22565
Disclosure Date: November 09, 2021 (last updated February 23, 2025)
An attacker could prematurely expire a verification code, making it unusable by the patient, making the patient unable to upload their TEKs to generate exposure notifications. We recommend upgrading the Exposure Notification server to V1.1.2 or greater.
0
Attacker Value
Unknown
CVE-2021-24816
Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The Phoenix Media Rename WordPress plugin before 3.4.4 does not have capability checks in its phoenix_media_rename AJAX action, which could allow users with Author roles to rename any uploaded media files, including ones they do not own.
0
Attacker Value
Unknown
CVE-2021-24801
Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The WP Survey Plus WordPress plugin through 1.0 does not have any authorisation and CSRF checks in place in its AJAX actions, allowing any user to call them and add/edit/delete Surveys. Furthermore, due to the lack of sanitization in the Surveys' Title, this could also lead to Stored Cross-Site Scripting issues
0
Attacker Value
Unknown
CVE-2021-24698
Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The Simple Download Monitor WordPress plugin before 3.9.6 allows users with a role as low as Contributor to remove thumbnails from downloads they do not own, even if they cannot normally edit the download.
0
Attacker Value
Unknown
CVE-2021-42359
Disclosure Date: November 05, 2021 (last updated February 23, 2025)
WP DSGVO Tools (GDPR) <= 3.1.23 had an AJAX action, ‘admin-dismiss-unsubscribe‘, which lacked a capability check and a nonce check and was available to unauthenticated users, and did not check the post type when deleting unsubscription requests. As such, it was possible for an attacker to permanently delete an arbitrary post or page on the site by sending an AJAX request with the “action” parameter set to “admin-dismiss-unsubscribe” and the “id” parameter set to the post to be deleted. Sending such a request would move the post to the trash, and repeating the request would permanently delete the post in question.
0
Attacker Value
Unknown
CVE-2021-25501
Disclosure Date: November 05, 2021 (last updated February 23, 2025)
An improper access control vulnerability in SCloudBnRReceiver in SecTelephonyProvider prior to SMR Nov-2021 Release 1 allows untrusted application to call some protected providers.
0
Attacker Value
Unknown
CVE-2021-35528
Disclosure Date: November 04, 2021 (last updated February 23, 2025)
Improper Access Control vulnerability in the application authentication and authorization of Hitachi Energy Retail Operations, Counterparty Settlement and Billing (CSB) allows an attacker to execute a modified signed Java Applet JAR file. A successful exploitation may lead to data extraction or modification of data inside the application. This issue affects: Hitachi Energy Retail Operations 5.7.3 and prior versions. Hitachi Energy Counterparty Settlement and Billing (CSB) 5.7.3 prior versions.
0
Attacker Value
Unknown
CVE-2021-34795
Disclosure Date: November 03, 2021 (last updated February 23, 2025)
Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
0
Attacker Value
Unknown
CVE-2021-40113
Disclosure Date: November 03, 2021 (last updated February 23, 2025)
Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.
0