Show filters
146 Total Results
Displaying 61-70 of 146
Sort by:
Attacker Value
Unknown

CVE-2021-41471

Disclosure Date: January 24, 2022 (last updated February 23, 2025)
SQL injection vulnerability in Sourcecodester South Gate Inn Online Reservation System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the email and Password parameters.
Attacker Value
Unknown

CVE-2021-43832

Disclosure Date: January 04, 2022 (last updated February 23, 2025)
Spinnaker is an open source, multi-cloud continuous delivery platform. Spinnaker has improper permissions allowing pipeline creation & execution. This lets an arbitrary user with access to the gate endpoint to create a pipeline and execute it without authentication. If users haven't setup Role-based access control (RBAC) with-in spinnaker, this enables remote execution and access to deploy almost any resources on any account. Patches are available on the latest releases of the supported branches and users are advised to upgrade as soon as possible. Users unable to upgrade should enable RBAC on ALL accounts and applications. This mitigates the ability of a pipeline to affect any accounts. Block application access unless permission are enabled. Users should make sure ALL application creation is restricted via appropriate wildcards.
Attacker Value
Unknown

CVE-2021-39143

Disclosure Date: January 04, 2022 (last updated February 23, 2025)
Spinnaker is an open source, multi-cloud continuous delivery platform. A path traversal vulnerability was discovered in uses of TAR files by AppEngine for deployments. This uses a utility to extract files locally for deployment without validating the paths in that deployment don't override system files. This would allow an attacker to override files on the container, POTENTIALLY introducing a MITM type attack vector by replacing libraries or injecting wrapper files. Users are advised to update as soon as possible. For users unable to update disable Google AppEngine deployments and/or disable artifacts that provide TARs.
Attacker Value
Unknown

CVE-2021-44538

Disclosure Date: December 14, 2021 (last updated February 23, 2025)
The olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olm_session_describe. Furthermore, safe buffer sizes were undocumented. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits. The known affected products are Element Web And SchildiChat Web.
Attacker Value
Unknown

CVE-2021-34596

Disclosure Date: October 25, 2021 (last updated February 23, 2025)
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.
Attacker Value
Unknown

CVE-2021-34595

Disclosure Date: October 25, 2021 (last updated February 23, 2025)
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.
Attacker Value
Unknown

CVE-2021-34593

Disclosure Date: October 25, 2021 (last updated February 23, 2025)
In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.
0
Attacker Value
Unknown

CVE-2021-38365

Disclosure Date: August 10, 2021 (last updated November 28, 2024)
Winner (aka ToneWinner) desktop speakers through 2021-08-09 allow remote attackers to recover speech signals from the power-indicator LED via a telescope and an electro-optical sensor, aka a "Glowworm" attack.
Attacker Value
Unknown

CVE-2021-30186

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow.
Attacker Value
Unknown

CVE-2021-30195

Disclosure Date: May 25, 2021 (last updated February 22, 2025)
CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation.