Show filters
145 Total Results
Displaying 101-110 of 145
Sort by:
Attacker Value
Unknown
CVE-2022-0164
Disclosure Date: February 21, 2022 (last updated February 23, 2025)
The Coming soon and Maintenance mode WordPress plugin before 3.5.3 does not have authorisation and CSRF checks in its coming_soon_send_mail AJAX action, allowing any authenticated users, with a role as low as subscriber to send arbitrary emails to all subscribed users
0
Attacker Value
Unknown
CVE-2021-43106
Disclosure Date: February 14, 2022 (last updated February 23, 2025)
A Header Injection vulnerability exists in Compass Plus TranzWare Online FIMI Web Interface Tranzware Online (TWO) 5.3.33.3 F38 and FIMI 4.2.19.4 25.The HTTP host header can be manipulated and cause the application to behave in unexpected ways. Any changes made to the header would just cause the request to be sent to a completely different Domain/IP address. This is due to that the server implicitly trusts the Host header, and fails to validate or escape it properly. An attacker can use this input to redirect target users to a malicious domain/web page. This would result in expanding the potential to further attacks and malicious actions.
0
Attacker Value
Unknown
CVE-2021-44746
Disclosure Date: February 01, 2022 (last updated October 07, 2023)
UNIVERGE DT 820 V3.2.7.0 and prior, UNIVERGE DT 830 V5.2.7.0 and prior, UNIVERGE DT 930 V2.4.0.0 and prior, IP Phone Manager V8.9.1 and prior, Data Maintenance Tool for DT900 Series V5.3.0.0 and prior, Data Maintenance Tool for DT800 Series V4.2.0.0 and prior allows a remote attacker who can access to the internal network, the configuration information may be obtained.
0
Attacker Value
Unknown
CVE-2021-44464
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 contains service credentials likely to be common across all instances. An attacker in possession of the password may gain privileges on all installations of this software.
0
Attacker Value
Unknown
CVE-2021-43355
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 allows user input to be validated on the client side without authentication by the server. The server should not rely on the correctness of the data because users might not support or block JavaScript or intentionally bypass the client-side checks. An attacker with knowledge of the service user could circumvent the client-side control and login with service privileges.
0
Attacker Value
Unknown
CVE-2021-41835
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Fresenius Kabi Agilia Link + version 3.0 does not enforce transport layer encryption. Therefore, transmitted data may be sent in cleartext. Transport layer encryption is offered on Port TCP/443, but the affected service does not perform an automated redirect from the unencrypted service on Port TCP/80 to the encrypted service.
0
Attacker Value
Unknown
CVE-2021-33848
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 is vulnerable to reflected cross-site scripting attacks. An attacker could inject JavaScript in a GET parameter of HTTP requests and perform unauthorized actions such as stealing internal information and performing actions in context of an authenticated user.
0
Attacker Value
Unknown
CVE-2021-33846
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Fresenius Kabi Vigilant Software Suite (Mastermed Dashboard) version 2.0.1.3 issues authentication tokens to authenticated users that are signed with a symmetric encryption key. An attacker in possession of the key can issue valid JWTs and impersonate arbitrary users.
0
Attacker Value
Unknown
CVE-2021-31562
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
The SSL/TLS configuration of Fresenius Kabi Agilia Link + version 3.0 has serious deficiencies that may allow an attacker to compromise SSL/TLS sessions in different ways. An attacker may be able to eavesdrop on transferred data, manipulate data allegedly secured by SSL/TLS, and impersonate an entity to gain access to sensitive information.
0
Attacker Value
Unknown
CVE-2021-23236
Disclosure Date: January 21, 2022 (last updated February 23, 2025)
Requests may be used to interrupt the normal operation of the device. When exploited, Fresenius Kabi Agilia Link+ version 3.0 must be rebooted via a hard reset triggered by pressing a button on the rack system.
0