Show filters
198 Total Results
Displaying 51-60 of 198
Sort by:
Attacker Value
Unknown

CVE-2021-45692

Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_extension_others may read from uninitialized memory locations.
Attacker Value
Unknown

CVE-2021-45691

Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string may read from uninitialized memory locations.
Attacker Value
Unknown

CVE-2021-45690

Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_binary may read from uninitialized memory locations.
Attacker Value
Unknown

CVE-2021-43840

Disclosure Date: December 17, 2021 (last updated February 23, 2025)
message_bus is a messaging bus for Ruby processes and web clients. In versions prior to 3.3.7 users who deployed message bus with diagnostics features enabled (default off) are vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. This issue has been patched in version 3.3.7. Users unable to upgrade should ensure that MessageBus::Diagnostics is disabled.
Attacker Value
Unknown

CVE-2021-22095

Disclosure Date: November 30, 2021 (last updated February 23, 2025)
In Spring AMQP versions 2.2.0 - 2.2.19 and 2.3.0 - 2.3.11, the Spring AMQP Message object, in its toString() method, will create a new String object from the message body, regardless of its size. This can cause an OOM Error with a large message
Attacker Value
Unknown

CVE-2021-24809

Disclosure Date: November 01, 2021 (last updated February 23, 2025)
The BP Better Messages WordPress plugin before 1.9.9.41 does not check for CSRF in multiple of its AJAX actions: bp_better_messages_leave_chat, bp_better_messages_join_chat, bp_messages_leave_thread, bp_messages_mute_thread, bp_messages_unmute_thread, bp_better_messages_add_user_to_thread, bp_better_messages_exclude_user_from_thread. This could allow attackers to make logged in users do unwanted actions
Attacker Value
Unknown

CVE-2021-24808

Disclosure Date: November 01, 2021 (last updated February 23, 2025)
The BP Better Messages WordPress plugin before 1.9.9.41 sanitise (with sanitize_text_field) but does not escape the 'subject' parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue
Attacker Value
Unknown

CVE-2021-22097

Disclosure Date: October 28, 2021 (last updated February 23, 2025)
In Spring AMQP versions 2.2.0 - 2.2.18 and 2.3.0 - 2.3.10, the Spring AMQP Message object, in its toString() method, will deserialize a body for a message with content type application/x-java-serialized-object. It is possible to construct a malicious java.util.Dictionary object that can cause 100% CPU usage in the application if the toString() method is called.
Attacker Value
Unknown

CVE-2021-21742

Disclosure Date: September 25, 2021 (last updated February 23, 2025)
There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.
Attacker Value
Unknown

CVE-2021-24535

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
The Light Messages WordPress plugin through 1.0 is lacking CSRF check when updating it's settings, and is not sanitising its Message Content in them (even with the unfiltered_html disallowed). As a result, an attacker could make a logged in admin update the settings to arbitrary values, and set a Cross-Site Scripting payload in the Message Content. Depending on the options set, the XSS payload can be triggered either in the backend only (in the plugin's settings), or both frontend and backend.