Show filters
524 Total Results
Displaying 71-80 of 524
Sort by:
Attacker Value
Unknown

CVE-2022-4776

Disclosure Date: January 30, 2023 (last updated October 08, 2023)
The CC Child Pages WordPress plugin before 1.43 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Attacker Value
Unknown

CVE-2021-33642

Disclosure Date: January 20, 2023 (last updated February 24, 2025)
When a file is processed, an infinite loop occurs in next_inline() of the more_curly() function.
Attacker Value
Unknown

CVE-2021-33641

Disclosure Date: January 20, 2023 (last updated February 24, 2025)
When processing files, malloc stores the data of the current line. When processing comments, malloc incorrectly accesses the released memory (use after free).
Attacker Value
Unknown

CVE-2022-4621

Disclosure Date: January 17, 2023 (last updated February 24, 2025)
Panasonic Sanyo CCTV Network Cameras versions 1.02-05 and 2.03-0x are vulnerable to CSRFs that can be exploited to allow an attacker to perform changes with administrator level privileges.
Attacker Value
Unknown

CVE-2021-4304

Disclosure Date: January 05, 2023 (last updated February 24, 2025)
A vulnerability was found in eprintsug ulcc-core. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file cgi/toolbox/toolbox. The manipulation of the argument password leads to command injection. The attack can be launched remotely. The patch is named 811edaae81eb044891594f00062a828f51b22cb1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217447.
Attacker Value
Unknown

CVE-2020-12069

Disclosure Date: December 26, 2022 (last updated February 24, 2025)
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
Attacker Value
Unknown

CVE-2022-46143

Disclosure Date: December 13, 2022 (last updated February 24, 2025)
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.
Attacker Value
Unknown

CVE-2022-46142

Disclosure Date: December 13, 2022 (last updated February 24, 2025)
Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.
Attacker Value
Unknown

CVE-2022-46140

Disclosure Date: December 13, 2022 (last updated February 24, 2025)
Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.
Attacker Value
Unknown

CVE-2022-44731

Disclosure Date: December 13, 2022 (last updated February 24, 2025)
A vulnerability has been identified in SIMATIC WinCC OA V3.15 (All versions < V3.15 P038), SIMATIC WinCC OA V3.16 (All versions < V3.16 P035), SIMATIC WinCC OA V3.17 (All versions < V3.17 P024), SIMATIC WinCC OA V3.18 (All versions < V3.18 P014). The affected component allows to inject custom arguments to the Ultralight Client backend application under certain circumstances. This could allow an authenticated remote attacker to inject arbitrary parameters when starting the client via the web interface (e.g., open attacker chosen panels with the attacker's credentials or start a Ctrl script).