Show filters
224 Total Results
Displaying 91-100 of 224
Sort by:
Attacker Value
Unknown

CVE-2020-36448

Disclosure Date: August 08, 2021 (last updated February 23, 2025)
An issue was discovered in the cache crate through 2020-11-24 for Rust. There are unconditional implementations of Send and Sync for Cache<K>.
Attacker Value
Unknown

CVE-2021-24452

Disclosure Date: July 19, 2021 (last updated February 23, 2025)
The W3 Total Cache WordPress plugin before 2.1.5 was affected by a reflected Cross-Site Scripting (XSS) issue within the "extension" parameter in the Extensions dashboard, when the 'Anonymously track usage to improve product quality' setting is enabled, as the parameter is output in a JavaScript context without proper escaping. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.
Attacker Value
Unknown

CVE-2021-24436

Disclosure Date: July 19, 2021 (last updated February 23, 2025)
The W3 Total Cache WordPress plugin before 2.1.4 was vulnerable to a reflected Cross-Site Scripting (XSS) security vulnerability within the "extension" parameter in the Extensions dashboard, which is output in an attribute without being escaped first. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.
Attacker Value
Unknown

CVE-2021-36740

Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
Attacker Value
Unknown

CVE-2021-24427

Disclosure Date: July 12, 2021 (last updated February 23, 2025)
The W3 Total Cache WordPress plugin before 2.1.3 did not sanitise or escape some of its CDN settings, allowing high privilege users to use JavaScript in them, which will be output in the page, leading to an authenticated Stored Cross-Site Scripting issue
Attacker Value
Unknown

CVE-2021-24312

Disclosure Date: June 01, 2021 (last updated February 22, 2025)
The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.
Attacker Value
Unknown

CVE-2021-24329

Disclosure Date: June 01, 2021 (last updated February 22, 2025)
The WP Super Cache WordPress plugin before 1.7.3 did not properly sanitise its wp_cache_location parameter in its settings, which could lead to a Stored Cross-Site Scripting issue.
Attacker Value
Unknown

CVE-2021-20714

Disclosure Date: April 27, 2021 (last updated February 22, 2025)
Directory traversal vulnerability in WP Fastest Cache versions prior to 0.9.1.7 allows a remote attacker with administrator privileges to delete arbitrary files on the server via unspecified vectors.
Attacker Value
Unknown

CVE-2021-24209

Disclosure Date: April 05, 2021 (last updated February 22, 2025)
The WP Super Cache WordPress plugin before 1.7.2 was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection.
Attacker Value
Unknown

CVE-2021-25903

Disclosure Date: January 26, 2021 (last updated February 22, 2025)
An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced.