Show filters
70 Total Results
Displaying 41-50 of 70
Sort by:
Attacker Value
Unknown
CVE-2021-40978
Disclosure Date: October 07, 2021 (last updated February 23, 2025)
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1
0
Attacker Value
Unknown
CVE-2021-32661
Disclosure Date: June 03, 2021 (last updated February 22, 2025)
Backstage is an open platform for building developer portals. In versions of Backstage's Techdocs Plugin (`@backstage/plugin-techdocs`) prior to 0.9.5, a malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.9.5` release of `@backstage/plugin-techdocs`.
0
Attacker Value
Unknown
CVE-2021-32660
Disclosure Date: June 03, 2021 (last updated February 22, 2025)
Backstage is an open platform for building developer portals, and techdocs-common contains common functionalities for Backstage's TechDocs. In versions of `@backstage/tehdocs-common` prior to 0.6.4, a malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same origin as the Backstage app or other backend plugins, this may give access to sensitive data. The ability to upload malicious content may be limited by internal code review processes, unless the chosen TechDocs deployment method is to use an object store and the actor has access to upload files directly to that store. The vulnerability is patched in the `0.6.4` release of `@backstage/techdocs-common`.
0
Attacker Value
Unknown
CVE-2021-30074
Disclosure Date: April 02, 2021 (last updated February 22, 2025)
docsify 4.12.1 is affected by Cross Site Scripting (XSS) because the search component does not appropriately encode Code Blocks and mishandles the " character.
0
Attacker Value
Unknown
CVE-2021-23342
Disclosure Date: February 19, 2021 (last updated February 22, 2025)
This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters
0
Attacker Value
Unknown
CVE-2020-35467
Disclosure Date: December 15, 2020 (last updated February 22, 2025)
The Docker Docs Docker image through 2020-12-14 contains a blank password for the root user. Systems deployed using affected versions of the Docker Docs container may allow a remote attacker to achieve root access with a blank password.
0
Attacker Value
Unknown
CVE-2020-7680
Disclosure Date: July 20, 2020 (last updated February 21, 2025)
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
0
Attacker Value
Unknown
CVE-2019-16142
Disclosure Date: September 09, 2019 (last updated November 27, 2024)
An issue was discovered in the renderdoc crate before 0.5.0 for Rust. Multiple exposed methods take self by immutable reference, which is incompatible with a multi-threaded application.
0
Attacker Value
Unknown
CVE-2019-8461
Disclosure Date: August 29, 2019 (last updated November 27, 2024)
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user.
0
Attacker Value
Unknown
CVE-2019-13175
Disclosure Date: July 02, 2019 (last updated November 27, 2024)
Read the Docs before 3.5.1 has an Open Redirect if certain user-defined redirects are used. This affects private instances of Read the Docs (in addition to the public readthedocs.org web sites).
0