Show filters
92 Total Results
Displaying 31-40 of 92
Sort by:
Attacker Value
Unknown

CVE-2022-0659

Disclosure Date: March 14, 2022 (last updated February 23, 2025)
The Sync QCloud COS WordPress plugin before 2.0.1 does not escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
Attacker Value
Unknown

CVE-2021-3657

Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution.
Attacker Value
Unknown

CVE-2021-3578

Disclosure Date: February 16, 2022 (last updated February 23, 2025)
A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client.
Attacker Value
Unknown

CVE-2021-44143

Disclosure Date: November 22, 2021 (last updated February 23, 2025)
A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution.
Attacker Value
Unknown

CVE-2021-41167

Disclosure Date: October 20, 2021 (last updated February 23, 2025)
modern-async is an open source JavaScript tooling library for asynchronous operations using async/await and promises. In affected versions a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. The problem has been patched in 1.0.4. There is no workaround.
0
Attacker Value
Unknown

CVE-2021-36512

Disclosure Date: October 19, 2021 (last updated February 23, 2025)
An issue was discovered in function scanallsubs in src/sbbs3/scansubs.cpp in Synchronet BBS, which may allow attackers to view sensitive information due to an uninitialized value.
Attacker Value
Unknown

CVE-2021-37694

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
@asyncapi/java-spring-cloud-stream-template generates a Spring Cloud Stream (SCSt) microservice. In versions prior to 0.7.0 arbitrary code injection was possible when an attacker controls the AsyncAPI document. An example is provided in GHSA-xj6r-2jpm-qvxp. There are no mitigations available and all users are advised to update.
Attacker Value
Unknown

CVE-2020-36462

Disclosure Date: August 08, 2021 (last updated February 23, 2025)
An issue was discovered in the syncpool crate before 0.1.6 for Rust. There is an unconditional implementation of Send for Bucket2.
Attacker Value
Unknown

CVE-2020-36444

Disclosure Date: August 08, 2021 (last updated February 23, 2025)
An issue was discovered in the async-coap crate through 2020-12-08 for Rust. Send and Sync are implemented for ArcGuard<RC, T> without trait bounds on RC.
Attacker Value
Unknown

CVE-2021-31671

Disclosure Date: April 27, 2021 (last updated February 22, 2025)
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.