Show filters
401 Total Results
Displaying 231-240 of 401
Sort by:
Attacker Value
Unknown

CVE-2021-30650

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A reflected cross-site scripting (XSS) vulnerability in the Symantec Layer7 API Management OAuth Toolkit (OTK) allows a remote attacker to craft a malicious URL for the OTK web UI and target OTK users with phishing attacks or other social engineering techniques. A successful attack allows injecting malicious code into the OTK web UI client application.
Attacker Value
Unknown

CVE-2021-22748

Disclosure Date: February 11, 2022 (last updated February 23, 2025)
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could allow a remote code execution when a file is saved. Affected Product: C-Bus Toolkit (V1.15.9 and prior), C-Gate Server (V2.11.7 and prior)
Attacker Value
Unknown

CVE-2021-25077

Disclosure Date: February 07, 2022 (last updated February 23, 2025)
The Store Toolkit for WooCommerce WordPress plugin before 2.3.2 does not sanitise and escape the tab parameter before outputting it back in an admin page in an error message, leading to a Reflected Cross-Site Scripting
Attacker Value
Unknown

CVE-2021-43892

Disclosure Date: December 15, 2021 (last updated December 28, 2023)
Microsoft BizTalk ESB Toolkit Spoofing Vulnerability
Attacker Value
Unknown

CVE-2021-44450

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V12.8.1.1), JTTK (All versions < V10.8.1.1). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15055, ZDI-CAN-14915, ZDI-CAN-14865)
Attacker Value
Unknown

CVE-2021-44449

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V12.8.1.1), JTTK (All versions < V10.8.1.1). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14830)
Attacker Value
Unknown

CVE-2021-44448

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-14843, ZDI-CAN-15051)
Attacker Value
Unknown

CVE-2021-44447

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products contains a use-after-free vulnerability that could be triggered while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14911)
Attacker Value
Unknown

CVE-2021-44446

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V13.0.3.0), JTTK (All versions < V11.0.3.0). JTTK library in affected products contains an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14828, ZDI-CAN-14898)
Attacker Value
Unknown

CVE-2021-44445

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15054)