Show filters
164 Total Results
Displaying 41-50 of 164
Sort by:
Attacker Value
Unknown

CVE-2021-31521

Disclosure Date: June 17, 2021 (last updated February 22, 2025)
Trend Micro InterScan Web Security Virtual Appliance version 6.5 was found to have a reflected cross-site scripting (XSS) vulnerability in the product's Captive Portal.
Attacker Value
Unknown

CVE-2021-20025

Disclosure Date: May 13, 2021 (last updated February 22, 2025)
SonicWall Email Security Virtual Appliance version 10.0.9 and earlier versions contain a default username and a password that is used at initial setup. An attacker could exploit this transitional/temporary user account from the trusted domain to access the Virtual Appliance remotely only when the device is freshly installed and not connected to Mysonicwall.
Attacker Value
Unknown

CVE-2021-23276

Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit the vulnerability. Successful exploitation of this vulnerability can allow attackers to add users in the data base.
Attacker Value
Unknown

CVE-2021-23278

Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file delete vulnerability induced due to improper input validation at server/maps_srv.js with action removeBackground and server/node_upgrade_srv.js with action removeFirmware. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
Attacker Value
Unknown

CVE-2021-23280

Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability.
Attacker Value
Unknown

CVE-2021-23277

Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands.
Attacker Value
Unknown

CVE-2021-23279

Disclosure Date: April 01, 2021 (last updated February 22, 2025)
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
Attacker Value
Unknown

CVE-2021-21531

Disclosure Date: March 24, 2021 (last updated February 22, 2025)
Dell Unisphere for PowerMax versions prior to 9.2.1.6 contain an Authorization Bypass Vulnerability. A local authenticated malicious user with monitor role may exploit this vulnerability to perform unauthorized actions.
Attacker Value
Unknown

CVE-2021-25252

Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
Attacker Value
Unknown

CVE-2021-1271

Disclosure Date: January 20, 2021 (last updated February 22, 2025)
A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.