Show filters
530 Total Results
Displaying 171-180 of 530
Sort by:
Attacker Value
Unknown
CVE-2020-28898
Disclosure Date: April 15, 2021 (last updated February 22, 2025)
In QED ResourceXpress through 4.9k, a large numeric or alphanumeric value submitted in specific URL parameters causes a server error in script execution due to insufficient input validation.
0
Attacker Value
Unknown
CVE-2021-23372
Disclosure Date: April 13, 2021 (last updated February 22, 2025)
All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash.
0
Attacker Value
Unknown
CVE-2021-26073
Disclosure Date: April 13, 2021 (last updated February 22, 2025)
Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions from 3.0.2 before 6.6.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
0
Attacker Value
Unknown
CVE-2021-1463
Disclosure Date: April 07, 2021 (last updated February 22, 2025)
A vulnerability in the web-based management interface of Cisco Unified Intelligence Center Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
0
Attacker Value
Unknown
CVE-2020-24391
Disclosure Date: March 30, 2021 (last updated November 28, 2024)
mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.
0
Attacker Value
Unknown
CVE-2021-27230
Disclosure Date: March 15, 2021 (last updated February 22, 2025)
ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.
0
Attacker Value
Unknown
CVE-2020-29238
Disclosure Date: March 10, 2021 (last updated February 22, 2025)
An integer buffer overflow in the Nginx webserver of ExpressVPN Router version 1 allows remote attackers to obtain sensitive information when the server running as reverse proxy via specially crafted request.
0
Attacker Value
Unknown
CVE-2020-25035
Disclosure Date: February 02, 2021 (last updated November 28, 2024)
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with root privileges using chroothole_client's PHP call, a related issue to CVE-2017-11322.
0
Attacker Value
Unknown
CVE-2021-21277
Disclosure Date: February 01, 2021 (last updated February 22, 2025)
angular-expressions is "angular's nicest part extracted as a standalone module for the browser and node". In angular-expressions before version 1.1.2 there is a vulnerability which allows Remote Code Execution if you call "expressions.compile(userControlledInput)" where "userControlledInput" is text that comes from user input. The security of the package could be bypassed by using a more complex payload, using a ".constructor.constructor" technique. In terms of impact: If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. This is fixed in version 1.1.2 of angular-expressions A temporary workaround might be either to disable user-controlled input that will be fed into angular-expressions in your application or allow only following characters in the us…
0
Attacker Value
Unknown
CVE-2021-26271
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted text into the Styles input of specific dialogs (in the Advanced Tab for Dialogs plugin).
0