cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-22503,https://securityvulnerability.io/vulnerability/CVE-2021-22503,eDirectory Web Page Generation Vulnerability,"A vulnerability has been identified in OpenText™ eDirectory, specifically relating to improper neutralization of input during web page generation. This issue, present in version 9.2.3.0000, could allow an attacker to exploit the application through inadequately sanitized data inputs, potentially leading to unexpected behaviors in the web application, including security breaches and data manipulation risks.",Opentext,Edirectory,6.1,MEDIUM,0.0004600000102072954,false,false,false,false,,false,false,2024-09-12T12:44:45.771Z,0 CVE-2021-22532,https://securityvulnerability.io/vulnerability/CVE-2021-22532,Possible NLDAP Denial of Service Vulnerability Discovered in eDirectory,"OpenText™ eDirectory is susceptible to a denial of service attack via the NLDAP interface, which may result in service disruption and hinder proper user access. The vulnerability exists in versions prior to 9.2.4.0000, posing risks to organizations relying on this directory service for essential operations. It is crucial for users of OpenText™ eDirectory to monitor updates and apply necessary patches to maintain the integrity and availability of their network infrastructure.",Opentext,Edirectory,7.5,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-09-12T12:44:20.724Z,0 CVE-2021-22533,https://securityvulnerability.io/vulnerability/CVE-2021-22533,Possible Insertion of Sensitive Information into Log File Vulnerability,"A vulnerability in OpenText™ eDirectory allows for the potential insertion of sensitive information into log files, which may lead to unintended data exposure. This flaw could compromise the confidentiality and integrity of sensitive data stored within the affected system. Organizations using OpenText eDirectory version 9.2.4.0000 should be aware of this vulnerability and consider implementing protective measures to mitigate the risk of unauthorized access to confidential information.",Opentext,Edirectory,9.1,CRITICAL,0.000910000002477318,false,false,false,false,,false,false,2024-09-12T12:43:51.734Z,0 CVE-2021-38131,https://securityvulnerability.io/vulnerability/CVE-2021-38131,Possible Cross-Site Scripting (XSS) Vulnerability in eDirectory,"A Cross-Site Scripting (XSS) vulnerability has been identified in OpenText eDirectory 9.2.5.0000. This security flaw allows attackers to inject malicious scripts into web pages viewed by other users, potentially compromising sensitive information and user accounts. If exploited, this vulnerability could lead to unauthorized actions on behalf of users, making it crucial for organizations to address this issue promptly and implement necessary security measures.",Opentext,Edirectory,6.1,MEDIUM,0.0004600000102072954,false,false,false,false,,false,false,2024-09-12T12:42:36.704Z,0 CVE-2021-38132,https://securityvulnerability.io/vulnerability/CVE-2021-38132,Possible External Service Interaction Attack in eDirectory,"An external service interaction vulnerability has been identified in OpenText eDirectory, allowing potential attackers to exploit this weakness in versions preceding 9.2.6.0000. Organizations using affected versions are advised to apply patches to mitigate the risks associated with this vulnerability, as it may enable malicious actors to interact with external services in an unintended manner.",Opentext,Edirectory,9.8,CRITICAL,0.000910000002477318,false,false,false,false,,false,false,2024-09-12T12:42:19.675Z,0 CVE-2021-38133,https://securityvulnerability.io/vulnerability/CVE-2021-38133,eDirectory Under Attack: Possible External Service Interaction Vulnerability,"An external service interaction vulnerability exists in OpenText eDirectory, affecting all versions prior to 9.2.6.0000. This vulnerability could potentially allow malicious actors to exploit the software, leading to unauthorized access or manipulation of user data. System administrators should apply the latest updates to safeguard against potential threats and ensure the integrity of their directory services.",Opentext,Edirectory,6.5,MEDIUM,0.0008699999889358878,false,false,false,false,,false,false,2024-09-12T12:41:46.807Z,0