Show filters
92 Total Results
Displaying 31-40 of 92
Sort by:
Attacker Value
Unknown
CVE-2022-0659
Disclosure Date: March 14, 2022 (last updated February 23, 2025)
The Sync QCloud COS WordPress plugin before 2.0.1 does not escape some of its settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
0
Attacker Value
Unknown
CVE-2021-3657
Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A flaw was found in mbsync versions prior to 1.4.4. Due to inadequate handling of extremely large (>=2GiB) IMAP literals, malicious or compromised IMAP servers, and hypothetically even external email senders, could cause several different buffer overflows, which could conceivably be exploited for remote code execution.
0
Attacker Value
Unknown
CVE-2021-3578
Disclosure Date: February 16, 2022 (last updated February 23, 2025)
A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client.
0
Attacker Value
Unknown
CVE-2021-44143
Disclosure Date: November 22, 2021 (last updated February 23, 2025)
A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution.
0
Attacker Value
Unknown
CVE-2021-41167
Disclosure Date: October 20, 2021 (last updated February 23, 2025)
modern-async is an open source JavaScript tooling library for asynchronous operations using async/await and promises. In affected versions a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. The problem has been patched in 1.0.4. There is no workaround.
0
Attacker Value
Unknown
CVE-2021-36512
Disclosure Date: October 19, 2021 (last updated February 23, 2025)
An issue was discovered in function scanallsubs in src/sbbs3/scansubs.cpp in Synchronet BBS, which may allow attackers to view sensitive information due to an uninitialized value.
0
Attacker Value
Unknown
CVE-2021-37694
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
@asyncapi/java-spring-cloud-stream-template generates a Spring Cloud Stream (SCSt) microservice. In versions prior to 0.7.0 arbitrary code injection was possible when an attacker controls the AsyncAPI document. An example is provided in GHSA-xj6r-2jpm-qvxp. There are no mitigations available and all users are advised to update.
0
Attacker Value
Unknown
CVE-2020-36462
Disclosure Date: August 08, 2021 (last updated February 23, 2025)
An issue was discovered in the syncpool crate before 0.1.6 for Rust. There is an unconditional implementation of Send for Bucket2.
0
Attacker Value
Unknown
CVE-2020-36444
Disclosure Date: August 08, 2021 (last updated February 23, 2025)
An issue was discovered in the async-coap crate through 2020-12-08 for Rust. Send and Sync are implemented for ArcGuard<RC, T> without trait bounds on RC.
0
Attacker Value
Unknown
CVE-2021-31671
Disclosure Date: April 27, 2021 (last updated February 22, 2025)
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.
0