Show filters
180 Total Results
Displaying 61-70 of 180
Sort by:
Attacker Value
Unknown

CVE-2020-16156

Disclosure Date: December 13, 2021 (last updated February 23, 2025)
CPAN 2.28 allows Signature Verification Bypass.
Attacker Value
Unknown

CVE-2021-24627

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The G Auto-Hyperlink WordPress plugin through 1.0.1 does not sanitise or escape an 'id' GET parameter before using it in a SQL statement, to select data to be displayed in the admin dashboard, leading to an authenticated SQL injection
Attacker Value
Unknown

CVE-2021-41121

Disclosure Date: October 06, 2021 (last updated February 23, 2025)
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0.
Attacker Value
Unknown

CVE-2021-41122

Disclosure Date: October 05, 2021 (last updated February 23, 2025)
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0.
0
Attacker Value
Unknown

CVE-2021-34559

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.
Attacker Value
Unknown

CVE-2021-34564

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.
Attacker Value
Unknown

CVE-2021-34562

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.
Attacker Value
Unknown

CVE-2021-34560

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.
0
Attacker Value
Unknown

CVE-2021-34563

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.
Attacker Value
Unknown

CVE-2021-34565

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.