Show filters
75 Total Results
Displaying 41-50 of 75
Sort by:
Attacker Value
Unknown

CVE-2022-2334

Disclosure Date: August 17, 2022 (last updated February 24, 2025)
The application searches for a library dll that is not found. If an attacker can place a dll with this name, then the attacker can leverage it to execute arbitrary code on the targeted Softing Secure Integration Server V1.22.
Attacker Value
Unknown

CVE-2022-1748

Disclosure Date: August 17, 2022 (last updated February 24, 2025)
Softing OPC UA C++ Server SDK, Secure Integration Server, edgeConnector, edgeAggregator, OPC Suite, and uaGate are affected by a NULL pointer dereference vulnerability.
Attacker Value
Unknown

CVE-2022-1373

Disclosure Date: August 17, 2022 (last updated February 24, 2025)
The “restore configuration” feature of Softing Secure Integration Server V1.22 is vulnerable to a directory traversal vulnerability when processing zip files. An attacker can craft a zip file to load an arbitrary dll and execute code. Using the "restore configuration" feature to upload a zip file containing a path traversal file may cause a file to be created and executed upon touching the disk.
Attacker Value
Unknown

CVE-2022-1069

Disclosure Date: August 17, 2022 (last updated February 24, 2025)
A crafted HTTP packet with a large content-length header can create a denial-of-service condition in Softing Secure Integration Server V1.22.
Attacker Value
Unknown

CVE-2022-0552

Disclosure Date: April 11, 2022 (last updated February 23, 2025)
A flaw was found in the original fix for the netty-codec-http CVE-2021-21409, where the OpenShift Logging openshift-logging/elasticsearch6-rhel8 container was incomplete. The vulnerable netty-codec-http maven package was not removed from the image content. This flaw affects origin-aggregated-logging versions 3.11.
Attacker Value
Unknown

CVE-2022-0189

Disclosure Date: February 28, 2022 (last updated February 23, 2025)
The WP RSS Aggregator WordPress plugin before 4.20 does not sanitise and escape the id parameter in the wprss_fetch_items_row_action AJAX action before outputting it back in the response, leading to a Reflected Cross-Site Scripting
Attacker Value
Unknown

CVE-2021-24988

Disclosure Date: December 27, 2021 (last updated February 23, 2025)
The WP RSS Aggregator WordPress plugin before 4.19.3 does not sanitise and escape data before outputting it in the System Info admin dashboard, which could lead to a Stored XSS issue due to the wprss_dismiss_addon_notice AJAX action missing authorisation and CSRF checks, allowing any authenticated users, such as subscriber to call it and set a malicious payload in the addon parameter.
Attacker Value
Unknown

CVE-2021-24768

Disclosure Date: November 29, 2021 (last updated February 23, 2025)
The WP RSS Aggregator WordPress plugin before 4.19.2 does not properly sanitise and escape the URL to Blacklist field, allowing malicious HTML to be inserted by high privilege users even when the unfiltered_html capability is disallowed, which could lead to Cross-Site Scripting issues.
Attacker Value
Unknown

CVE-2021-1619

Disclosure Date: September 22, 2021 (last updated February 23, 2025)
A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS.
Attacker Value
Unknown

CVE-2021-27188

Disclosure Date: February 12, 2021 (last updated February 22, 2025)
The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended for five hours) by making five invalid login attempts to a victim's account.