Show filters
233 Total Results
Displaying 131-140 of 233
Sort by:
Attacker Value
Unknown
CVE-2021-24712
Disclosure Date: October 11, 2021 (last updated February 23, 2025)
The Appointment Hour Booking WordPress plugin before 1.3.17 does not properly sanitize values used when creating new calendars.
0
Attacker Value
Unknown
CVE-2020-22617
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
Ardour v5.12 contains a use-after-free vulnerability in the component ardour/libs/pbd/xml++.cc when using xmlFreeDoc and xmlXPathFreeContext.
0
Attacker Value
Unknown
CVE-2021-24673
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
The Appointment Hour Booking WordPress plugin before 1.3.16 does not escape some of the Calendar Form settings, allowing high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
0
Attacker Value
Unknown
CVE-2021-24547
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
The KN Fix Your Title WordPress plugin through 1.0.1 was vulnerable to Authenticated Stored XSS in the separator field.
0
Attacker Value
Unknown
CVE-2021-32783
Disclosure Date: July 23, 2021 (last updated February 23, 2025)
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy remotely (a denial of service), or to expose the existence of any Secret that Envoy is using for its configuration, including most notably TLS Keypairs. However, it *cannot* be used to get the *content* of those secrets. Since this attack allows access to the administration interface, a variety of administration options are available, such as shutting down the Envoy or draining traffic. In general, the Envoy admin interface cannot easily be used for making changes to the cluster, in-flight requests, or backend services, but it could be used to shut down or drain Envoy, change traffic routing, or to retrieve secret metadata, as mentioned above. The issue will be addressed in Contour v1.18.0 and…
0
Attacker Value
Unknown
CVE-2021-27545
Disclosure Date: April 15, 2021 (last updated February 22, 2025)
SQL Injection in the "add-services.php" component of PHPGurukul Beauty Parlour Management System v1.0 allows remote attackers to obtain sensitive database information by injecting SQL commands into the "sername" parameter.
0
Attacker Value
Unknown
CVE-2021-27544
Disclosure Date: April 15, 2021 (last updated February 22, 2025)
Cross Site Scripting (XSS) in the "add-services.php" component of PHPGurukul Beauty Parlour Management System v1.0 allows remote attackers to execute arbitrary code by injecting arbitrary HTML into the "sername" parameter.
0
Attacker Value
Unknown
CVE-2020-25241
Disclosure Date: March 15, 2021 (last updated February 22, 2025)
A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.
0
Attacker Value
Unknown
CVE-2020-10538
Disclosure Date: February 05, 2021 (last updated February 22, 2025)
An issue was discovered in Epikur before 20.1.1. It stores the secret passwords of the users as MD5 hashes in the database. MD5 can be brute-forced efficiently and should not be used for such purposes. Additionally, since no salt is used, rainbow tables can speed up the attack.
0
Attacker Value
Unknown
CVE-2020-10537
Disclosure Date: February 05, 2021 (last updated February 22, 2025)
An issue was discovered in Epikur before 20.1.1. A Glassfish 4.1 server with a default configuration is running on TCP port 4848. No password is required to access it with the administrator account.
0