Show filters
69 Total Results
Displaying 21-30 of 69
Sort by:
Attacker Value
Unknown

CVE-2021-43697

Disclosure Date: November 29, 2021 (last updated February 23, 2025)
Workerman-ThinkPHP-Redis (last update Mar 16, 2018) is affected by a Cross Site Scripting (XSS) vulnerability. In file Controller.class.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET{C('VAR_JSONP_HANDLER')] then there is a XSS vulnerability.
Attacker Value
Unknown

CVE-2021-36311

Disclosure Date: October 11, 2021 (last updated February 23, 2025)
Dell EMC Networker versions prior to 19.5 contain an Improper Authorization vulnerability. Any local malicious user with networker user privileges may exploit this vulnerability to upload malicious file to unauthorized locations and execute it.
Attacker Value
Unknown

CVE-2021-21570

Disclosure Date: September 02, 2021 (last updated February 23, 2025)
Dell NetWorker, versions 18.x and 19.x contain an Information disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information.
Attacker Value
Unknown

CVE-2021-21569

Disclosure Date: September 02, 2021 (last updated February 23, 2025)
Dell NetWorker, versions 18.x and 19.x contain a Path traversal vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information.
Attacker Value
Unknown

CVE-2021-21600

Disclosure Date: July 20, 2021 (last updated February 23, 2025)
Dell EMC NetWorker, 19.4 or older, contain an uncontrolled resource consumption flaw in its API service. An authorized API user could potentially exploit this vulnerability via the web and desktop user interfaces, leading to denial of service in the manageability path.
Attacker Value
Unknown

CVE-2021-21559

Disclosure Date: May 13, 2021 (last updated February 22, 2025)
Dell EMC NetWorker, versions 18.x, 19.1.x, 19.2.x 19.3.x, 19.4, and 19.4.0.1 contain an Improper Certificate Validation vulnerability in the client (NetWorker Management Console) components which uses SSL encrypted connection in order to communicate with the application server. An unauthenticated attacker in the same network collision domain as the NetWorker Management Console client could potentially exploit this vulnerability to perform man-in-the-middle attacks to intercept and tamper the traffic between the client and the application server.
Attacker Value
Unknown

CVE-2021-21558

Disclosure Date: May 13, 2021 (last updated February 22, 2025)
Dell EMC NetWorker, 18.x, 19.1.x, 19.2.x 19.3.x, 19.4 and 19.4.0.1, contains an Information Disclosure vulnerability. A local administrator of the gstd system may potentially exploit this vulnerability to read LDAP credentials from local logs and use the stolen credentials to make changes to the network domain.
Attacker Value
Unknown

CVE-2021-21546

Disclosure Date: February 25, 2021 (last updated February 23, 2025)
Dell EMC NetWorker versions 18.x,19.x prior to 19.3.0.4 and 19.4.0.0 contain an Information Disclosure in Log Files vulnerability. A local low-privileged user of the Networker server could potentially exploit this vulnerability to read plain-text credentials from server log files.
Attacker Value
Unknown

CVE-2020-26183

Disclosure Date: October 15, 2020 (last updated February 22, 2025)
Dell EMC NetWorker versions prior to 19.3.0.2 contain an improper authorization vulnerability. Certain remote users with low privileges may exploit this vulnerability to perform 'nsrmmdbd' operations in an unintended manner.
Attacker Value
Unknown

CVE-2020-26182

Disclosure Date: October 14, 2020 (last updated February 22, 2025)
Dell EMC NetWorker versions prior to 19.3.0.2 contain an incorrect privilege assignment vulnerability. A non-LDAP remote user with low privileges may exploit this vulnerability to perform 'saveset' related operations in an unintended manner. The vulnerability is not exploitable by users authenticated via LDAP.