Show filters
287 Total Results
Displaying 121-130 of 287
Sort by:
Attacker Value
Unknown
CVE-2021-34985
Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley ContextCapture 10.18.0.232. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14785.
0
Attacker Value
Unknown
CVE-2021-34984
Disclosure Date: January 13, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley ContextCapture 10.18.0.232. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of OBJ files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-14784.
0
Attacker Value
Unknown
CVE-2021-43113
Disclosure Date: December 15, 2021 (last updated February 23, 2025)
iTextPDF in iText 7 and up to (excluding 4.4.13.3) 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java.
0
Attacker Value
Unknown
CVE-2021-24607
Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The Storefront Footer Text WordPress plugin through 1.0.1 does not sanitize and escape the "Footer Credit Text" added to pages, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered-html capability is disallowed.
0
Attacker Value
Unknown
CVE-2020-23680
Disclosure Date: November 03, 2021 (last updated November 29, 2024)
An issue was discovered in function StartPage in text2pdf.c in pdfcorner text2pdf 1.1, allows attackers to cause denial of service or possibly other undisclosed impacts.
0
Attacker Value
Unknown
CVE-2015-20019
Disclosure Date: November 01, 2021 (last updated February 23, 2025)
The Content text slider on post WordPress plugin before 6.9 does not sanitise and escape the Title and Message/Content settings, which could lead to Cross-Site Scripting issues
0
Attacker Value
Unknown
CVE-2021-24485
Disclosure Date: October 25, 2021 (last updated February 23, 2025)
The Special Text Boxes WordPress plugin before 5.9.110 does not sanitise or escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.
0
Attacker Value
Unknown
CVE-2021-38353
Disclosure Date: September 09, 2021 (last updated February 23, 2025)
The Dropdown and scrollable Text WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the content parameter found in the ~/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.
0
Attacker Value
Unknown
CVE-2021-28001
Disclosure Date: August 19, 2021 (last updated February 23, 2025)
A cross-site scripting vulnerability was discovered in the Comments parameter in Textpattern CMS 4.8.4 which allows remote attackers to execute arbitrary code via a crafted payload entered into the URL field. The vulnerability is triggered by users visiting https://site.com/articles/welcome-to-your-site#comments-head.
0
Attacker Value
Unknown
CVE-2021-28002
Disclosure Date: August 19, 2021 (last updated February 23, 2025)
A persistent cross-site scripting vulnerability was discovered in the Excerpt parameter in Textpattern CMS 4.9.0 which allows remote attackers to execute arbitrary code via a crafted payload entered into the URL field. The vulnerability is triggered by users visiting the 'Articles' page.
0