Show filters
518 Total Results
Displaying 11-20 of 518
Sort by:
Attacker Value
Unknown

CVE-2021-44028

Disclosure Date: December 22, 2021 (last updated February 23, 2025)
XXE can occur in Quest KACE Desktop Authority before 11.2 because the log4net configuration file might be controlled by an attacker, a related issue to CVE-2018-1285.
Attacker Value
Unknown

CVE-2021-45290

Disclosure Date: December 21, 2021 (last updated February 23, 2025)
A Denial of Service vulnerability exits in Binaryen 103 due to an assertion abort in wasm::handle_unreachable.
Attacker Value
Unknown

CVE-2021-43844

Disclosure Date: December 20, 2021 (last updated February 23, 2025)
MSEdgeRedirect is a tool to redirect news, search, widgets, weather, and more to a user's default browser. MSEdgeRedirect versions before 0.5.0.1 are vulnerable to Remote Code Execution via specifically crafted URLs. This vulnerability requires user interaction and the acceptance of a prompt. With how MSEdgeRedirect is coded, parameters are impossible to pass to any launched file. However, there are two possible scenarios in which an attacker can do more than a minor annoyance. In Scenario 1 (confirmed), a user visits an attacker controlled webpage; the user is prompted with, and downloads, an executable payload; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and RCE executes the payload the user previously downloaded, if the download path is successfully guessed. In Scenario 2 (not yet confirmed), a user visits an attacked controlled webpage; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and a payload on a remote, attac…
0
Attacker Value
Unknown

CVE-2021-45096

Disclosure Date: December 16, 2021 (last updated February 23, 2025)
KNIME Analytics Platform before 4.5.0 is vulnerable to XXE (external XML entity injection) via a crafted workflow file (.knwf), aka AP-17730.
Attacker Value
Unknown

CVE-2021-1003

Disclosure Date: December 15, 2021 (last updated February 23, 2025)
In adjustStreamVolume of AudioService.java, there is a possible way for unprivileged app to change audio stream volume due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-189857506
Attacker Value
Unknown

CVE-2021-44041

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
UiPath Assistant 21.4.4 will load and execute attacker controlled data from the file path supplied to the --dev-widget argument of the URI handler for uipath-assistant://. This allows an attacker to execute code on a victim's machine or capture NTLM credentials by supplying a networked or WebDAV file path.
Attacker Value
Unknown

CVE-2021-3836

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
dbeaver is vulnerable to Improper Restriction of XML External Entity Reference
Attacker Value
Unknown

CVE-2021-23463

Disclosure Date: December 10, 2021 (last updated February 23, 2025)
The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
Attacker Value
Unknown

CVE-2020-27416

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
Mahavitaran android application 7.50 and prior are affected by account takeover due to improper OTP validation, allows remote attackers to control a users account.
Attacker Value
Unknown

CVE-2021-44557

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
National Library of the Netherlands multiNER <= c0440948057afc6e3d6b4903a7c05e666b94a3bc is affected by an XML External Entity (XXE) vulnerability in multiNER/ner.py. Since XML parsing resolves external entities, a malicious XML stream could leak internal files and/or cause a DoS.