Show filters
502 Total Results
Displaying 241-250 of 502
Sort by:
Attacker Value
Unknown
CVE-2021-29029
Disclosure Date: March 24, 2021 (last updated February 22, 2025)
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/edit_personal_page.php URI.
0
Attacker Value
Unknown
CVE-2021-29027
Disclosure Date: March 24, 2021 (last updated February 22, 2025)
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/index.php URI.
0
Attacker Value
Unknown
CVE-2021-29026
Disclosure Date: March 24, 2021 (last updated February 22, 2025)
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/permissions.php URI.
0
Attacker Value
Unknown
CVE-2021-29030
Disclosure Date: March 24, 2021 (last updated February 22, 2025)
A cross-site scripting (XSS) vulnerability in Bitweaver version 3.1.0 allows remote attackers to inject JavaScript via the /users/admin/index.php URI.
0
Attacker Value
Unknown
CVE-2021-21491
Disclosure Date: March 10, 2021 (last updated February 22, 2025)
SAP Netweaver Application Server Java (Applications based on WebDynpro Java) versions 7.00, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
0
Attacker Value
Unknown
CVE-2021-21481
Disclosure Date: March 09, 2021 (last updated February 22, 2025)
The MigrationService, which is part of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform an authorization check. This might allow an unauthorized attacker to access configuration objects, including such that grant administrative privileges. This could result in complete compromise of system confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2021-21488
Disclosure Date: March 09, 2021 (last updated February 22, 2025)
Knowledge Management versions 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 allows a remote attacker with basic privileges to deserialize user-controlled data without verification, leading to insecure deserialization which triggers the attacker’s code, therefore impacting Availability.
0
Attacker Value
Unknown
CVE-2021-21055
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Adobe Dreamweaver versions 21.0 (and earlier) and 20.2 (and earlier) is affected by an untrusted search path vulnerability that could result in information disclosure. An attacker with physical access to the system could replace certain configuration files and dynamic libraries that Dreamweaver references, potentially resulting in information disclosure.
0
Attacker Value
Unknown
CVE-2021-21475
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Under specific circumstances SAP Master Data Management, versions - 710, 710.750, allows an unauthorized attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs. Due to this Directory Traversal vulnerability the attacker could read content of arbitrary files on the remote server and expose sensitive data.
0
Attacker Value
Unknown
CVE-2020-26278
Disclosure Date: January 20, 2021 (last updated February 22, 2025)
Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and enables their automatic discovery. Weave Net before version 2.8.0 has a vulnerability in which can allow an attacker to take over any host in the cluster. Weave Net is supplied with a manifest that runs pods on every node in a Kubernetes cluster, which are responsible for managing network connections for all other pods in the cluster. This requires a lot of power over the host, and the manifest sets `privileged: true`, which gives it that power. It also set `hostPID: true`, which gave it the ability to access all other processes on the host, and write anywhere in the root filesystem of the host. This setting was not necessary, and is being removed. You are only vulnerable if you have an additional vulnerability (e.g. a bug in Kubernetes) or misconfiguration that allows an attacker to run code inside the Weave Net pod, No such bug is known at the time of release, …
0