Show filters
1,297 Total Results
Displaying 261-270 of 1,297
Sort by:
Attacker Value
Unknown
CVE-2021-46061
Disclosure Date: January 20, 2022 (last updated February 23, 2025)
An SQL Injection vulnerability exists in Sourcecodester Computer and Mobile Repair Shop Management system (RSMS) 1.0 via the code parameter in /rsms/ node app.
0
Attacker Value
Unknown
CVE-2021-45230
Disclosure Date: January 20, 2022 (last updated October 07, 2023)
In Apache Airflow prior to 2.2.0. This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for dags that they don't have "edit" permissions for.
0
Attacker Value
Unknown
CVE-2021-43410
Disclosure Date: December 09, 2021 (last updated February 23, 2025)
Apache Airavata Django Portal allows CRLF log injection because of lack of escaping log statements. In particular, some HTTP request parameters are logged without first being escaped. Versions affected: master branch before commit 3c5d8c7 [1] of airavata-django-portal [1] https://github.com/apache/airavata-django-portal/commit/3c5d8c72bfc3eb0af8693a655a5d60f9273f8170
0
Attacker Value
Unknown
CVE-2021-43564
Disclosure Date: November 10, 2021 (last updated February 23, 2025)
An issue was discovered in the jobfair (aka Job Fair) extension before 1.0.13 and 2.x before 2.0.2 for TYPO3. The extension fails to protect or obfuscate filenames of uploaded files. This allows unauthenticated users to download files with sensitive data by simply guessing the filename of uploaded files (e.g., uploads/tx_jobfair/cv.pdf).
0
Attacker Value
Unknown
CVE-2020-23041
Disclosure Date: October 22, 2021 (last updated February 23, 2025)
Dropouts Technologies LLP Air Share v1.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the path parameter of the `list` and `download` exception-handling. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted GET request.
0
Attacker Value
Unknown
CVE-2020-36489
Disclosure Date: October 22, 2021 (last updated February 23, 2025)
Dropouts Technologies LLP Air Share v1.2 was discovered to contain a cross-site scripting (XSS) vulnerability in the devicename parameter. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the devicename information.
0
Attacker Value
Unknown
CVE-2020-23043
Disclosure Date: October 22, 2021 (last updated February 23, 2025)
Tran Tu Air Sender v1.0.2 was discovered to contain an arbitrary file upload vulnerability in the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted file.
0
Attacker Value
Unknown
CVE-2021-41117
Disclosure Date: October 11, 2021 (last updated February 23, 2025)
keypair is a a RSA PEM key generator written in javascript. keypair implements a lot of cryptographic primitives on its own or by borrowing from other libraries where possible, including node-forge. An issue was discovered where this library was generating identical RSA keys used in SSH. This would mean that the library is generating identical P, Q (and thus N) values which, in practical terms, is impossible with RSA-2048 keys. Generating identical values, repeatedly, usually indicates an issue with poor random number generation, or, poor handling of CSPRNG output. Issue 1: Poor random number generation (`GHSL-2021-1012`). The library does not rely entirely on a platform provided CSPRNG, rather, it uses it's own counter-based CMAC approach. Where things go wrong is seeding the CMAC implementation with "true" random data in the function `defaultSeedFile`. In order to seed the AES-CMAC generator, the library will take two different approaches depending on the JavaScript execution enviro…
0
Attacker Value
Unknown
CVE-2021-41591
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
ACINQ Eclair before 0.6.3 allows loss of funds because of dust HTLC exposure.
0
Attacker Value
Unknown
CVE-2021-1419
Disclosure Date: September 22, 2021 (last updated February 23, 2025)
A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user.
0