Show filters
389 Total Results
Displaying 31-40 of 389
Sort by:
Attacker Value
Unknown

CVE-2021-38873

Disclosure Date: November 23, 2021 (last updated February 23, 2025)
IBM Planning Analytics 2.0 is potentially vulnerable to CSV Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 208396.
Attacker Value
Unknown

CVE-2021-26614

Disclosure Date: November 22, 2021 (last updated February 23, 2025)
ius_get.cgi in IpTime C200 camera allows remote code execution. A remote attacker may send a crafted parameters to the exposed vulnerable web service interface which invokes the arbitrary shell command.
Attacker Value
Unknown

CVE-2021-34419

Disclosure Date: November 12, 2021 (last updated February 23, 2025)
In the Zoom Client for Meetings for Ubuntu Linux before version 5.1.0, there is an HTML injection flaw when sending a remote control request to a user in the process of in-meeting screen sharing. This could allow meeting participants to be targeted for social engineering attacks.
Attacker Value
Unknown

CVE-2021-43350

Disclosure Date: November 11, 2021 (last updated February 23, 2025)
An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter.
Attacker Value
Unknown

CVE-2021-25980

Disclosure Date: November 11, 2021 (last updated February 23, 2025)
In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
Attacker Value
Unknown

CVE-2021-43185

Disclosure Date: November 09, 2021 (last updated February 23, 2025)
JetBrains YouTrack before 2021.3.23639 is vulnerable to Host header injection.
Attacker Value
Unknown

CVE-2021-41170

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
neoan3-apps/template is a neoan3 minimal template engine. Versions prior to 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. Version 1.1.1 has addressed this vulnerability. Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade.
0
Attacker Value
Unknown

CVE-2021-36697

Disclosure Date: November 03, 2021 (last updated February 23, 2025)
With an admin account, the .htaccess file in Artica Pandora FMS <=755 can be overwritten with the File Manager component. The new .htaccess file contains a Rewrite Rule with a type definition. A normal PHP file can be uploaded with this new "file type" and the code can be executed with an HTTP request.
Attacker Value
Unknown

CVE-2021-36322

Disclosure Date: November 03, 2021 (last updated February 23, 2025)
Dell Networking X-Series firmware versions prior to 3.0.1.8 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary host header values to poison the web-cache or trigger redirections.
Attacker Value
Unknown

CVE-2021-41232

Disclosure Date: November 02, 2021 (last updated February 23, 2025)
Thunderdome is an open source agile planning poker tool in the theme of Battling for points. In affected versions there is an LDAP injection vulnerability which affects instances with LDAP authentication enabled. The provided username is not properly escaped. This issue has been patched in version 1.16.3. If users are unable to update they should disable the LDAP feature if in use.