Show filters
440 Total Results
Displaying 151-160 of 440
Sort by:
Attacker Value
Unknown
CVE-2021-30650
Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A reflected cross-site scripting (XSS) vulnerability in the Symantec Layer7 API Management OAuth Toolkit (OTK) allows a remote attacker to craft a malicious URL for the OTK web UI and target OTK users with phishing attacks or other social engineering techniques. A successful attack allows injecting malicious code into the OTK web UI client application.
0
Attacker Value
Unknown
CVE-2022-23008
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
On NGINX Controller API Management versions 3.18.0-3.19.0, an authenticated attacker with access to the "user" or "admin" role can use undisclosed API endpoints on NGINX Controller API Management to inject JavaScript code that is executed on managed NGINX data plane instances. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2021-36760
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
In accountrecoveryendpoint/recoverpassword.do in WSO2 Identity Server 5.7.0, it is possible to perform a DOM-Based XSS attack affecting the callback parameter modifying the URL that precedes the callback parameter. Once the username or password reset procedure is completed, the JavaScript code will be executed. (recoverpassword.do also has an open redirect issue for a similar reason.)
0
Attacker Value
Unknown
CVE-2021-43176
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 takes a user-supplied “action” parameter and appends a .php file extension to locate and load the correct PHP file to implement the API call. Vulnerable versions of GOautodial do not sanitize the user input that specifies the action. This permits an attacker to execute any PHP source file with a .php extension that is present on the disk and readable by the GOautodial web server process. Combined with CVE-2021-43175, it is possible for the attacker to do this without valid credentials. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
0
Attacker Value
Unknown
CVE-2021-43175
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 exposes an API router that accepts a username, password, and action that routes to other PHP files that implement the various API functions. Vulnerable versions of GOautodial validate the username and password incorrectly, allowing the caller to specify any values for these parameters and successfully authenticate. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
0
Attacker Value
Unknown
CVE-2021-33097
Disclosure Date: November 17, 2021 (last updated February 23, 2025)
Time-of-check time-of-use vulnerability in the Crypto API Toolkit for Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via network access.
0
Attacker Value
Unknown
CVE-2021-43494
Disclosure Date: November 12, 2021 (last updated February 23, 2025)
OpenCV-REST-API master branch as of commit 69be158c05d4dd5a4aff38fdc680a162dd6b9e49 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
0
Attacker Value
Unknown
CVE-2021-43549
Disclosure Date: November 09, 2021 (last updated February 23, 2025)
A remote authenticated attacker with write access to a PI Server could trick a user into interacting with a PI Web API endpoint and redirect them to a malicious website. As a result, a victim may disclose sensitive information to the attacker or be provided with false information.
0
Attacker Value
Unknown
CVE-2021-22930
Disclosure Date: October 07, 2021 (last updated February 23, 2025)
Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.
0
Attacker Value
Unknown
CVE-2021-21677
Disclosure Date: August 31, 2021 (last updated February 23, 2025)
Jenkins Code Coverage API Plugin 1.4.0 and earlier does not apply Jenkins JEP-200 deserialization protection to Java objects it deserializes from disk, resulting in a remote code execution vulnerability.
0