Show filters
79 Total Results
Displaying 31-40 of 79
Sort by:
Attacker Value
Unknown

CVE-2021-45693

Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string_primitive may read from uninitialized memory locations.
Attacker Value
Unknown

CVE-2021-45692

Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_extension_others may read from uninitialized memory locations.
Attacker Value
Unknown

CVE-2021-45691

Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string may read from uninitialized memory locations.
Attacker Value
Unknown

CVE-2021-45690

Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_binary may read from uninitialized memory locations.
Attacker Value
Unknown

CVE-2021-24535

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
The Light Messages WordPress plugin through 1.0 is lacking CSRF check when updating it's settings, and is not sanitising its Message Content in them (even with the unfiltered_html disallowed). As a result, an attacker could make a logged in admin update the settings to arbitrary values, and set a Cross-Site Scripting payload in the Message Content. Depending on the options set, the XSS payload can be triggered either in the backend only (in the plugin's settings), or both frontend and backend.
Attacker Value
Unknown

CVE-2020-7389

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
Sage X3 System CHAINE Variable Script Command Injection. An authenticated user with developer access can pass OS commands via this variable used by the web application. Note, this developer configuration should not be deployed in production.
Attacker Value
Unknown

CVE-2020-7387

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
Sage X3 Installation Pathname Disclosure. A specially crafted packet can elicit a response from the AdxDSrv.exe component that reveals the installation directory of the product. Note that this vulnerability can be combined with CVE-2020-7388 to achieve full RCE. This issue was fixed in AdxAdmin 93.2.53, which ships with updates for on-premises versions of Sage X3 Version 9 (components shipped with Syracuse 9.22.7.2 and later), Sage X3 HR & Payroll Version 9 (those components that ship with Syracuse 9.24.1.3), Version 11 (components shipped with Syracuse 11.25.2.6 and later), and Version 12 (components shipped with Syracuse 12.10.2.8 and later) of Sage X3. Other on-premises versions of Sage X3 are unsupported by the vendor.
Attacker Value
Unknown

CVE-2020-7390

Disclosure Date: July 07, 2021 (last updated February 23, 2025)
Sage X3 Stored XSS Vulnerability on ‘Edit’ Page of User Profile. An authenticated user can pass XSS strings the "First Name," "Last Name," and "Email Address" fields of this web application component. Updates are available for on-premises versions of Version 12 (components shipped with Syracuse 12.10.0 and later) of Sage X3. Other on-premises versions of Sage X3 are unaffected or unsupported by the vendor.
Attacker Value
Unknown

CVE-2021-23380

Disclosure Date: April 18, 2021 (last updated February 22, 2025)
This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Attacker Value
Unknown

CVE-2021-26917

Disclosure Date: February 08, 2021 (last updated November 08, 2023)
PyBitmessage through 0.6.3.2 allows attackers to write screen captures to Potentially Unwanted Directories via a crafted apinotifypath value. NOTE: the discoverer states "security mitigation may not be necessary as there is no evidence yet that these screen intercepts are actually transported away from the local host." NOTE: it is unclear whether there are any common use cases in which apinotifypath is controlled by an attacker