Show filters
144 Total Results
Displaying 31-40 of 144
Sort by:
Attacker Value
Unknown

CVE-2022-25256

Disclosure Date: February 19, 2022 (last updated February 23, 2025)
SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.
Attacker Value
Unknown

CVE-2021-43327

Disclosure Date: December 02, 2021 (last updated October 07, 2023)
An issue was discovered on Renesas RX65 and RX65N devices. With a VCC glitch, an attacker can extract the security ID key from the device. Then, the protected firmware can be extracted.
Attacker Value
Unknown

CVE-2021-41569

Disclosure Date: November 19, 2021 (last updated February 23, 2025)
SAS/Intrnet 9.4 build 1520 and earlier allows Local File Inclusion. The samples library (included by default) in the appstart.sas file, allows end-users of the application to access the sample.webcsf1.sas program, which contains user-controlled macro variables that are passed to the DS2CSF macro. Users can escape the context of the configured user-controllable variable and append additional functions native to the macro but not included as variables within the library. This includes a function that retrieves files from the host OS.
Attacker Value
Unknown

CVE-2021-27722

Disclosure Date: November 02, 2021 (last updated February 23, 2025)
An issue was discovered in Nsasoft US LLC SpotAuditor 5.3.5. The program can be crashed by entering 300 bytes char data into the "Key" or "Name" field while registering.
Attacker Value
Unknown

CVE-2021-35475

Disclosure Date: June 25, 2021 (last updated February 22, 2025)
SAS Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.
Attacker Value
Unknown

CVE-2020-4039

Disclosure Date: April 30, 2021 (last updated February 22, 2025)
SUSI.AI is an intelligent Open Source personal assistant. SUSI.AI Server before version d27ed0f has a directory traversal vulnerability due to insufficient input validation. Any admin config and file readable by the app can be retrieved by the attacker. Furthermore, some files can also be moved or deleted.
Attacker Value
Unknown

CVE-2021-30246

Disclosure Date: April 07, 2021 (last updated February 22, 2025)
In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack.
Attacker Value
Unknown

CVE-2021-28956

Disclosure Date: March 22, 2021 (last updated November 08, 2023)
The unofficial vscode-sass-lint (aka Sass Lint) extension through 1.0.7 for Visual Studio Code allows attackers to execute arbitrary binaries if the user opens a crafted workspace. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Attacker Value
Unknown

CVE-2020-24025

Disclosure Date: January 11, 2021 (last updated February 22, 2025)
Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.
Attacker Value
Unknown

CVE-2020-7667

Disclosure Date: June 24, 2020 (last updated February 21, 2025)
In package github.com/sassoftware/go-rpmutils/cpio before version 0.1.0, the CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note: the fixing commit was applied to all affected versions which were re-released.