Show filters
373 Total Results
Displaying 141-150 of 373
Sort by:
Attacker Value
Unknown

CVE-2021-33001

Disclosure Date: August 17, 2021 (last updated February 23, 2025)
xArrow SCADA versions 7.2 and prior is vulnerable to cross-site scripting due to parameter ‘bdate’ of the resource xhisvalue.htm, which may allow an unauthorized attacker to execute arbitrary code.
Attacker Value
Unknown

CVE-2021-25957

Disclosure Date: August 17, 2021 (last updated February 23, 2025)
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
Attacker Value
Unknown

CVE-2021-25956

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name.
Attacker Value
Unknown

CVE-2021-25955

Disclosure Date: August 10, 2021 (last updated February 23, 2025)
In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account takeover of the admin and due to other vulnerability (Improper Access Control on Private notes) a low privileged user can update the private notes which could lead to privilege escalation.
Attacker Value
Unknown

CVE-2021-38197

Disclosure Date: August 08, 2021 (last updated February 23, 2025)
unarr.go in go-unarr (aka Go bindings for unarr) 0.1.1 allows Directory Traversal via ../ in a pathname within a TAR archive.
Attacker Value
Unknown

CVE-2020-36452

Disclosure Date: August 08, 2021 (last updated February 23, 2025)
An issue was discovered in the array-tools crate before 0.3.2 for Rust. FixedCapacityDequeLike::clone() has a drop of uninitialized memory.
Attacker Value
Unknown

CVE-2020-36465

Disclosure Date: August 08, 2021 (last updated November 29, 2024)
An issue was discovered in the generic-array crate before 0.13.3 for Rust. It violates soundness by using the arr! macro to extend lifetimes.
Attacker Value
Unknown

CVE-2021-25954

Disclosure Date: August 06, 2021 (last updated February 23, 2025)
In “Dolibarr” application, 2.8.1 to 13.0.4 don’t restrict or incorrectly restricts access to a resource from an unauthorized actor. A low privileged attacker can modify the Private Note which only an administrator has rights to do, the affected field is at “/adherents/note.php?id=1” endpoint.
Attacker Value
Unknown

CVE-2021-0276

Disclosure Date: July 14, 2021 (last updated February 23, 2025)
A stack-based Buffer Overflow vulnerability in Juniper Networks SBR Carrier with EAP (Extensible Authentication Protocol) authentication configured, allows an attacker sending specific packets causing the radius daemon to crash resulting with a Denial of Service (DoS) or leading to remote code execution (RCE). By continuously sending this specific packets, an attacker can repeatedly crash the radius daemon, causing a sustained Denial of Service (DoS). This issue affects Juniper Networks SBR Carrier: 8.4.1 versions prior to 8.4.1R19; 8.5.0 versions prior to 8.5.0R10; 8.6.0 versions prior to 8.6.0R4.
0
Attacker Value
Unknown

CVE-2020-6950

Disclosure Date: June 02, 2021 (last updated February 22, 2025)
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.