Show filters
496 Total Results
Displaying 271-280 of 496
Sort by:
Attacker Value
Unknown

CVE-2021-43783

Disclosure Date: November 29, 2021 (last updated February 23, 2025)
@backstage/plugin-scaffolder-backend is the backend for the default Backstage software templates. In affected versions a malicious actor with write access to a registered scaffolder template is able to manipulate the template in a way that writes files to arbitrary paths on the scaffolder-backend host instance. This vulnerability can in some situation also be exploited through user input when executing a template, meaning you do not need write access to the templates. This method will not allow the attacker to control the contents of the injected file however, unless the template is also crafted in a specific way that gives control of the file contents. This vulnerability is fixed in version `0.15.14` of the `@backstage/plugin-scaffolder-backend`. This attack is mitigated by restricting access and requiring reviews when registering or modifying scaffolder templates.
Attacker Value
Unknown

CVE-2021-24899

Disclosure Date: November 29, 2021 (last updated February 23, 2025)
The Media-Tags WordPress plugin through 3.2.0.2 does not sanitise and escape any of its Labels settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_htnl capability is disallowed.
Attacker Value
Unknown

CVE-2020-28419

Disclosure Date: November 09, 2021 (last updated October 07, 2023)
During installation with certain driver software or application packages an arbitrary code execution could occur.
Attacker Value
Unknown

CVE-2021-24682

Disclosure Date: November 01, 2021 (last updated February 23, 2025)
The Cool Tag Cloud WordPress plugin before 2.26 does not escape the style attribute of the cool_tag_cloud shortcode, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks.
Attacker Value
Unknown

CVE-2021-41151

Disclosure Date: October 18, 2021 (last updated February 23, 2025)
Backstage is an open platform for building developer portals. In affected versions A malicious actor could read sensitive files from the environment where Scaffolder Tasks are run. The attack is executed by crafting a custom Scaffolder template with a `github:publish:pull-request` action and a particular source path. When the template is executed the sensitive files would be included in the published pull request. This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request. The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`.
Attacker Value
Unknown

CVE-2021-39356

Disclosure Date: October 18, 2021 (last updated February 23, 2025)
The Content Staging WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via several parameters that are echo'd out via the ~/templates/settings.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.0.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
Attacker Value
Unknown

CVE-2021-20831

Disclosure Date: October 13, 2021 (last updated February 23, 2025)
Cross-site request forgery (CSRF) vulnerability in OG Tags versions prior to 2.0.2 allows a remote attacker to hijack the authentication of administrators and unintended operation may be performed via unspecified vectors.
Attacker Value
Unknown

CVE-2021-34665

Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The WP SEO Tags WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the saq_txt_the_filter parameter in the ~/wp-seo-tags.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2.7.
Attacker Value
Unknown

CVE-2021-34663

Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The jQuery Tagline Rotator WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/jquery-tagline-rotator.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.5.
Attacker Value
Unknown

CVE-2021-32696

Disclosure Date: June 18, 2021 (last updated February 22, 2025)
The npm package "striptags" is an implementation of PHP's strip_tags in Typescript. In striptags before version 3.2.0, a type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. This can lead to a XSS.