Show filters
440 Total Results
Displaying 171-180 of 440
Sort by:
Attacker Value
Unknown

CVE-2021-22516

Disclosure Date: June 04, 2021 (last updated February 22, 2025)
Insertion of Sensitive Information into Log File vulnerability in Micro Focus Secure API Manager (SAPIM) product, affecting version 2.0.0. The vulnerability could lead to sensitive information being in a log file.
Attacker Value
Unknown

CVE-2020-14388

Disclosure Date: June 02, 2021 (last updated February 22, 2025)
A flaw was found in the Red Hat 3scale API Management Platform, where member permissions for an API's admin portal were not properly enforced. This flaw allows an authenticated user to bypass normal account restrictions and access API services where they do not have permission.
Attacker Value
Unknown

CVE-2021-3412

Disclosure Date: June 01, 2021 (last updated February 22, 2025)
It was found that all versions of 3Scale developer portal lacked brute force protections. An attacker could use this gap to bypass login controls, and access privileged information, or possibly conduct further attacks.
Attacker Value
Unknown

CVE-2020-25634

Disclosure Date: May 26, 2021 (last updated February 22, 2025)
A flaw was found in Red Hat 3scale’s API docs URL, where it is accessible without credentials. This flaw allows an attacker to view sensitive information or modify service APIs. Versions before 3scale-2.10.0-ER1 are affected.
Attacker Value
Unknown

CVE-2020-15522

Disclosure Date: May 20, 2021 (last updated February 22, 2025)
Bouncy Castle BC Java before 1.66, BC C# .NET before 1.8.7, BC-FJA before 1.0.1.2, 1.0.2.1, and BC-FNA before 1.0.1.1 have a timing issue within the EC math library that can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.
Attacker Value
Unknown

CVE-2020-17453

Disclosure Date: April 05, 2021 (last updated February 22, 2025)
WSO2 Management Console through 5.10 allows XSS via the carbon/admin/login.jsp msgId parameter.
Attacker Value
Unknown

CVE-2021-21409

Disclosure Date: March 30, 2021 (last updated February 22, 2025)
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.61.Final there is a vulnerability that enables request smuggling. The content-length header is not correctly validated if the request only uses a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1. This is a followup of GHSA-wm47-8v5p-wjpj/CVE-2021-21295 which did miss to fix this one case. This was fixed as part of 4.1.61.Final.
Attacker Value
Unknown

CVE-2021-23274

Disclosure Date: March 23, 2021 (last updated February 22, 2025)
The Config UI component of TIBCO Software Inc.'s TIBCO API Exchange Gateway and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO API Exchange Gateway: versions 2.3.3 and below and TIBCO API Exchange Gateway Distribution for TIBCO Silver Fabric: versions 2.3.3 and below.
Attacker Value
Unknown

CVE-2019-14852

Disclosure Date: March 18, 2021 (last updated February 22, 2025)
A flaw was found in 3scale’s APIcast gateway that enabled the TLS 1.0 protocol. An attacker could target traffic using this weaker protocol and break its encryption, gaining access to unauthorized information. Version shipped in Red Hat 3scale API Management Platform is vulnerable to this issue.
Attacker Value
Unknown

CVE-2021-24148

Disclosure Date: March 18, 2021 (last updated February 22, 2025)
A business logic issue in the MStore API WordPress plugin, versions before 3.2.0, had an authentication bypass with Sign In With Apple allowing unauthenticated users to recover an authentication cookie with only an email address.