Show filters
175 Total Results
Displaying 101-110 of 175
Sort by:
Attacker Value
Unknown
CVE-2021-25652
Disclosure Date: June 24, 2021 (last updated February 22, 2025)
An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Appliance Virtualization Platform Utilities (AVPU). This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects versions 8.0.0.0 through 8.1.3.1 of AVPU.
0
Attacker Value
Unknown
CVE-2021-25653
Disclosure Date: June 24, 2021 (last updated February 22, 2025)
A privilege escalation vulnerability was discovered in Avaya Aura Appliance Virtualization Platform Utilities (AVPU) that may potentially allow a local user to escalate privileges. Affects 8.0.0.0 through 8.1.3.1 versions of AVPU.
0
Attacker Value
Unknown
CVE-2021-25649
Disclosure Date: June 24, 2021 (last updated February 22, 2025)
An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Utility Services. This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects all 7.x versions of Avaya Aura Utility Services
0
Attacker Value
Unknown
CVE-2021-24299
Disclosure Date: May 17, 2021 (last updated February 22, 2025)
The ReDi Restaurant Reservation WordPress plugin before 21.0426 provides the functionality to let users make restaurant reservations. These reservations are stored and can be listed on an 'Upcoming' page provided by the plugin. An unauthenticated user can fill in the form to make a restaurant reservation. The form to make a restaurant reservation field called 'Comment' does not use proper input validation and can be used to store XSS payloads. The XSS payloads will be executed when the plugin user goes to the 'Upcoming' page, which is an external website https://upcoming.reservationdiary.eu/ loaded in an iframe, and the stored reservation with XSS payload is loaded.
0
Attacker Value
Unknown
CVE-2021-25899
Disclosure Date: April 23, 2021 (last updated February 22, 2025)
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1.
0
Attacker Value
Unknown
CVE-2021-25898
Disclosure Date: April 23, 2021 (last updated February 22, 2025)
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. Passwords are stored in unencrypted source-code text files. This was noted when accessing the svc-login.php file. The value is used to authenticate a high-privileged user upon authenticating with the server.
0
Attacker Value
Unknown
CVE-2020-7035
Disclosure Date: April 23, 2021 (last updated February 22, 2025)
An XML External Entities (XXE)vulnerability in the web-based user interface of Avaya Aura Orchestration Designer could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system. The affected versions of Orchestration Designer includes all 7.x versions before 7.2.3.
0
Attacker Value
Unknown
CVE-2020-29045
Disclosure Date: March 11, 2021 (last updated February 22, 2025)
The food-and-drink-menu plugin through 2.2.0 for WordPress allows remote attackers to execute arbitrary code because of an unserialize operation on the fdm_cart cookie in load_cart_from_cookie in includes/class-cart-manager.php.
0
Attacker Value
Unknown
CVE-2020-26773
Disclosure Date: January 07, 2021 (last updated February 22, 2025)
Restaurant Reservation System 1.0 suffers from an authenticated SQL injection vulnerability, which allows a remote, authenticated attacker to execute arbitrary SQL commands via the date parameter in includes/reservation.inc.php.
0
Attacker Value
Unknown
CVE-2020-29284
Disclosure Date: December 02, 2020 (last updated February 22, 2025)
The file view-chair-list.php in Multi Restaurant Table Reservation System 1.0 does not perform input validation on the table_id parameter which allows unauthenticated SQL Injection. An attacker can send malicious input in the GET request to /dashboard/view-chair-list.php?table_id= to trigger the vulnerability.
0