Show filters
496 Total Results
Displaying 281-290 of 496
Sort by:
Attacker Value
Unknown

CVE-2021-33881

Disclosure Date: June 06, 2021 (last updated February 22, 2025)
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
Attacker Value
Unknown

CVE-2021-32662

Disclosure Date: June 03, 2021 (last updated February 22, 2025)
Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In `@backstage/techdocs-common` versions prior to 0.6.3, a malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API. The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.
Attacker Value
Unknown

CVE-2021-32661

Disclosure Date: June 03, 2021 (last updated February 22, 2025)
Backstage is an open platform for building developer portals. In versions of Backstage's Techdocs Plugin (`@backstage/plugin-techdocs`) prior to 0.9.5, a malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`.
Attacker Value
Unknown

CVE-2021-32660

Disclosure Date: June 03, 2021 (last updated February 22, 2025)
Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In versions of `@backstage/tehdocs-common` prior to 0.6.4, a malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`.
Attacker Value
Unknown

CVE-2020-25715

Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in pki-core 10.9.0. A specially crafted POST request can be used to reflect a DOM-based cross-site scripting (XSS) attack to inject code into the search query form which can get automatically executed. The highest threat from this vulnerability is to data integrity.
Attacker Value
Unknown

CVE-2020-1721

Disclosure Date: April 30, 2021 (last updated February 22, 2025)
A flaw was found in the Key Recovery Authority (KRA) Agent Service in pki-core 10.10.5 where it did not properly sanitize the recovery ID during a key recovery request, enabling a reflected cross-site scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.
Attacker Value
Unknown

CVE-2021-20179

Disclosure Date: March 15, 2021 (last updated February 22, 2025)
A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity.
Attacker Value
Unknown

CVE-2021-3165

Disclosure Date: January 26, 2021 (last updated February 22, 2025)
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
Attacker Value
Unknown

CVE-2020-29243

Disclosure Date: December 28, 2020 (last updated February 22, 2025)
dhowden tag before 2020-11-19 allows "panic: runtime error: index out of range" via readAPICFrame.
Attacker Value
Unknown

CVE-2020-29242

Disclosure Date: December 28, 2020 (last updated February 22, 2025)
dhowden tag before 2020-11-19 allows "panic: runtime error: index out of range" via readPICFrame.