Show filters
40,676 Total Results
Displaying 111-120 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Very High

CVE-2021-38757

Disclosure Date: August 16, 2021 (last updated November 28, 2024)
Persistent cross-site scripting (XSS) in Hospital Management System targeted towards web admin through contact.php.
Attacker Value
Moderate

CVE-2021-38699

Disclosure Date: August 15, 2021 (last updated November 28, 2024)
TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and /admin/system_logs.
Attacker Value
Moderate

CVE-2021-38603

Disclosure Date: August 12, 2021 (last updated November 28, 2024)
PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Information field.
Attacker Value
Unknown

CVE-2021-35479

Disclosure Date: July 30, 2021 (last updated November 28, 2024)
Nagios Log Server before 2.1.9 contains Stored XSS in the custom column view for the alert history and audit log function through the affected pp parameter. This affects users who open a crafted link or third-party web page.
Attacker Value
High

CVE-2021-36976

Disclosure Date: July 20, 2021 (last updated March 28, 2024)
libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block).
Attacker Value
Moderate

CVE-2021-30554

Disclosure Date: July 02, 2021 (last updated November 08, 2023)
Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Moderate

CVE-2021-35501

Disclosure Date: June 25, 2021 (last updated November 28, 2024)
PandoraFMS <=7.54 allows Stored XSS by placing a payload in the name field of a visual console. When a user or an administrator visits the console, the XSS payload will be executed.
Attacker Value
Very High

CVE-2021-33041

Disclosure Date: May 17, 2021 (last updated November 28, 2024)
vmd through 1.34.0 allows 'div class="markdown-body"' XSS, as demonstrated by Electron remote code execution via require('child_process').execSync('calc.exe') on Windows and a similar attack on macOS.
Attacker Value
Moderate

CVE-2021-21224

Disclosure Date: April 26, 2021 (last updated November 08, 2023)
Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Attacker Value
Low

CVE-2021-21431

Disclosure Date: April 09, 2021 (last updated November 28, 2024)
sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX > 1.