Show filters
524 Total Results
Displaying 71-80 of 524
Sort by:
Attacker Value
Unknown
CVE-2022-4776
Disclosure Date: January 30, 2023 (last updated October 08, 2023)
The CC Child Pages WordPress plugin before 1.43 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
0
Attacker Value
Unknown
CVE-2021-33642
Disclosure Date: January 20, 2023 (last updated February 24, 2025)
When a file is processed, an infinite loop occurs in next_inline() of the more_curly() function.
0
Attacker Value
Unknown
CVE-2021-33641
Disclosure Date: January 20, 2023 (last updated February 24, 2025)
When processing files, malloc stores the data of the current line. When processing comments, malloc incorrectly accesses the released memory (use after free).
0
Attacker Value
Unknown
CVE-2022-4621
Disclosure Date: January 17, 2023 (last updated February 24, 2025)
Panasonic Sanyo CCTV Network Cameras versions 1.02-05 and 2.03-0x are
vulnerable to CSRFs that can be exploited to allow an attacker to
perform changes with administrator level privileges.
0
Attacker Value
Unknown
CVE-2021-4304
Disclosure Date: January 05, 2023 (last updated February 24, 2025)
A vulnerability was found in eprintsug ulcc-core. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file cgi/toolbox/toolbox. The manipulation of the argument password leads to command injection. The attack can be launched remotely. The patch is named 811edaae81eb044891594f00062a828f51b22cb1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217447.
0
Attacker Value
Unknown
CVE-2020-12069
Disclosure Date: December 26, 2022 (last updated February 24, 2025)
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
0
Attacker Value
Unknown
CVE-2022-46143
Disclosure Date: December 13, 2022 (last updated February 24, 2025)
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.
0
Attacker Value
Unknown
CVE-2022-46142
Disclosure Date: December 13, 2022 (last updated February 24, 2025)
Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.
0
Attacker Value
Unknown
CVE-2022-46140
Disclosure Date: December 13, 2022 (last updated February 24, 2025)
Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.
0
Attacker Value
Unknown
CVE-2022-44731
Disclosure Date: December 13, 2022 (last updated February 24, 2025)
A vulnerability has been identified in SIMATIC WinCC OA V3.15 (All versions < V3.15 P038), SIMATIC WinCC OA V3.16 (All versions < V3.16 P035), SIMATIC WinCC OA V3.17 (All versions < V3.17 P024), SIMATIC WinCC OA V3.18 (All versions < V3.18 P014). The affected component allows to inject custom arguments to the Ultralight Client backend application under certain circumstances.
This could allow an authenticated remote attacker to inject arbitrary parameters when starting the client via the web interface (e.g., open attacker chosen panels with the attacker's credentials or start a Ctrl script).
0