Security
Headlines
HeadlinesLatestCVEs

Tag

#xss

CVE-2021-44790: Apache HTTP Server 2.4 vulnerabilities

A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.

CVE
#xss#vulnerability#web#ios#mac#windows#google#dos#apache#oracle#php#rce#ldap#ssrf#buffer_overflow#auth#ibm#zero_day#ssl
CVE-2021-44916: Release Notes for Open-AudIT v4.3.0 - Open-AudIT

Opmantek Open-AudIT Community 4.2.0 (Fixed in 4.3.0) is affected by a Cross Site Scripting (XSS) vulnerability. If a bad value is passed to the routine via a URL, malicious JavaScript code can be executed in the victim's browser.

CVE-2021-44163: 程曦資訊整合 文字客服 - Reflected XSS

Chain Sea ai chatbot backend has improper filtering of special characters in URL parameters, which allows a remote attacker to perform JavaScript injection for XSS (reflected Cross-site scripting) attack without authentication.

CVE-2021-45041: 8.0 Releases

SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection.

CVE-2021-32499: The SICK Product Security Incident Response Team (SICK PSIRT)

SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the command line arguments to pass in any value to the Emulator executable.

CVE-2020-18078: vul/back_password_reset.md at master · cve-vul/vul

A vulnerability in /include/web_check.php of SEMCMS v3.8 allows attackers to reset the Administrator account's password.

CVE-2021-44145: Apache NiFi Security Reports

In the TransformXML processor of Apache NiFi before 1.15.1 an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information.

CVE-2021-41843: OpenEMR 6.0.0 / 6.1.0-dev SQL Injection ≈ Packet Storm

An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI.