Show filters
71,212 Total Results
Displaying 371-380 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Low
CVE-2021-33331
Disclosure Date: August 03, 2021 (last updated November 28, 2024)
Open redirect vulnerability in the Notifications module in Liferay Portal 7.0.0 through 7.3.1, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19 and 7.2 before fix pack 8, allows remote attackers to redirect users to arbitrary external URLs via the 'redirect' parameter.
2
Attacker Value
Low
CVE-2021-33326
Disclosure Date: August 03, 2021 (last updated November 28, 2024)
Cross-site scripting (XSS) vulnerability in the Frontend JS module in Liferay Portal 7.3.4 and earlier, and Liferay DXP 7.0 before fix pack 96, 7.1 before fix pack 20 and 7.2 before fix pack 9, allows remote attackers to inject arbitrary web script or HTML via the title of a modal window.
2
Attacker Value
Very High
CVE-2021-35458
Disclosure Date: July 30, 2021 (last updated November 28, 2024)
Online Pet Shop We App 1.0 is vulnerable to Union SQL Injection in products.php (aka p=products) via the c or s parameter.
2
Attacker Value
Very High
CVE-2021-33470
Disclosure Date: May 26, 2021 (last updated November 15, 2023)
COVID19 Testing Management System 1.0 is vulnerable to SQL Injection via the admin panel.
2
Attacker Value
High
CVE-2021-1499
Disclosure Date: May 05, 2021 (last updated November 08, 2023)
A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to upload files to an affected device. This vulnerability is due to missing authentication for the upload function. An attacker could exploit this vulnerability by sending a specific HTTP request to an affected device. A successful exploit could allow the attacker to upload files to the affected device with the permissions of the tomcat8 user.
1
Attacker Value
Moderate
CVE-2021-21978
Disclosure Date: March 03, 2021 (last updated November 28, 2024)
VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
1
Attacker Value
Very High
CVE-2021-26822
Disclosure Date: February 15, 2021 (last updated November 15, 2023)
Teachers Record Management System 1.0 is affected by a SQL injection vulnerability in 'searchteacher' POST parameter in search-teacher.php. This vulnerability can be exploited by a remote unauthenticated attacker to leak sensitive information and perform code execution attacks.
2
Attacker Value
Unknown
CVE-2021-3129
Disclosure Date: January 12, 2021 (last updated November 28, 2024)
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
2
Attacker Value
Very High
CVE-2021-3007
Disclosure Date: January 04, 2021 (last updated March 21, 2024)
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
1
Attacker Value
Very High
CVE-2020-35665
Disclosure Date: December 23, 2020 (last updated November 28, 2024)
An unauthenticated command-execution vulnerability exists in TerraMaster TOS through 4.2.06 via shell metacharacters in the Event parameter in include/makecvs.php during CSV creation.
2