Show filters
401 Total Results
Displaying 231-240 of 401
Sort by:
Attacker Value
Unknown
CVE-2021-30650
Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A reflected cross-site scripting (XSS) vulnerability in the Symantec Layer7 API Management OAuth Toolkit (OTK) allows a remote attacker to craft a malicious URL for the OTK web UI and target OTK users with phishing attacks or other social engineering techniques. A successful attack allows injecting malicious code into the OTK web UI client application.
0
Attacker Value
Unknown
CVE-2021-22748
Disclosure Date: February 11, 2022 (last updated February 23, 2025)
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could allow a remote code execution when a file is saved. Affected Product: C-Bus Toolkit (V1.15.9 and prior), C-Gate Server (V2.11.7 and prior)
0
Attacker Value
Unknown
CVE-2021-25077
Disclosure Date: February 07, 2022 (last updated February 23, 2025)
The Store Toolkit for WooCommerce WordPress plugin before 2.3.2 does not sanitise and escape the tab parameter before outputting it back in an admin page in an error message, leading to a Reflected Cross-Site Scripting
0
Attacker Value
Unknown
CVE-2021-43892
Disclosure Date: December 15, 2021 (last updated December 28, 2023)
Microsoft BizTalk ESB Toolkit Spoofing Vulnerability
0
Attacker Value
Unknown
CVE-2021-44450
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V12.8.1.1), JTTK (All versions < V10.8.1.1). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15055, ZDI-CAN-14915, ZDI-CAN-14865)
0
Attacker Value
Unknown
CVE-2021-44449
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V12.8.1.1), JTTK (All versions < V10.8.1.1). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14830)
0
Attacker Value
Unknown
CVE-2021-44448
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-14843, ZDI-CAN-15051)
0
Attacker Value
Unknown
CVE-2021-44447
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products contains a use-after-free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14911)
0
Attacker Value
Unknown
CVE-2021-44446
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14828, ZDI-CAN-14898)
0
Attacker Value
Unknown
CVE-2021-44445
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15054)
0