Original release date: August 9, 2021
High Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
basic_shopping_cart_project — basic_shopping_cart | A SQL Injection vulnerability in Sourcecodester Basic Shopping Cart 1.0 allows a remote attacker to Bypass Authentication and become Admin. | 2021-07-30 | 7.5 | CVE-2021-34165 MISC |
ectouch — ectouch | SQL Injection Vulnerability in ECTouch v2 via the shop page in index.php.. | 2021-07-30 | 7.5 | CVE-2020-21806 MISC |
huawei — magic_ui | There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection. | 2021-08-02 | 7.5 | CVE-2021-22444 MISC |
huawei — magic_ui | There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands. | 2021-08-02 | 7.5 | CVE-2021-22387 MISC |
huawei — magic_ui | There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. | 2021-08-02 | 7.5 | CVE-2021-22388 MISC |
huawei — magic_ui | There is a Permission Control Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. | 2021-08-02 | 7.5 | CVE-2021-22389 MISC |
huawei — magic_ui | There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. | 2021-08-02 | 7.5 | CVE-2021-22390 MISC |
huawei — magic_ui | There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. | 2021-08-02 | 7.5 | CVE-2021-22438 MISC |
ibm — aix | IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in Korn Shell (ksh) to gain root privileges. IBM X-Force ID: 201478. | 2021-08-02 | 7.2 | CVE-2021-29741 CONFIRM XF |
ibm — partner_engagement_manager | IBM Partner Engagement Manager 2.0 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization flaw. By sending specially-crafted data, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 203091. | 2021-07-30 | 7.5 | CVE-2021-29781 XF CONFIRM |
learning_management_system_project — learning_management_system | Arbitrary file upload vulnerability in SourceCodester Learning Management System v 1.0 allows attackers to execute arbitrary code, via the file upload to lmsstudent_avatar.php. | 2021-07-30 | 7.5 | CVE-2021-25200 MISC |
metinfo — metinfo | SQL Injection vulnerability in Metinfo 6.1.3 via a dosafety_emailadd action in basic.php. | 2021-07-30 | 7.5 | CVE-2020-18175 MISC |
nukeviet — nukeviet | SQL Injection vulnerability in NukeViet CMS 4.0.10 – 4.3.07 via:the topicsid parameter in modules/news/admin/addtotopics.php. | 2021-07-30 | 7.5 | CVE-2020-21808 MISC MISC MISC |
nukeviet — nukeviet | SQL Injection vulnerability in NukeViet CMS module Shops 4.0.29 and 4.3 via the (1) listid parameter in detail.php and the (2) group_price or groupid parameters in search_result.php. | 2021-07-30 | 7.5 | CVE-2020-21809 MISC MISC MISC MISC |
online_pet_shop_we_app_project — online_pet_shop_we_app | Online Pet Shop We App 1.0 is vulnerable to Union SQL Injection in products.php (aka p=products) via the c or s parameter. | 2021-07-30 | 7.5 | CVE-2021-35458 MISC MISC |
phone_shop_sales_managements_system_project — phone_shop_sales_managements_system | Sourcecodester Phone Shop Sales Managements System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. | 2021-07-30 | 7.5 | CVE-2021-36624 MISC |
replaysorcery_project — replaysorcery | replay-sorcery-kms in Replay Sorcery 0.6.0 allows a local attacker to gain root privileges via a symlink attack on /tmp/replay-sorcery or /tmp/replay-sorcery/device.sock. | 2021-07-30 | 7.2 | CVE-2021-36983 MISC MISC |
ruby-lang — rdoc | In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. | 2021-07-30 | 7.5 | CVE-2021-31799 MISC MISC |
simple_food_website_project — simple_food_website | A SQL INJECTION vulnerability in Sourcecodester Simple Food Website 1.0 allows a remote attacker to Bypass Authentication and become Admin. | 2021-07-30 | 7.5 | CVE-2021-34166 MISC |
vscode-phpmd_project — vscode-phpmd | The unofficial vscode-phpmd (aka PHP Mess Detector) extension before 1.3.0 for Visual Studio Code allows remote attackers to execute arbitrary code via a crafted phpmd.command value in a workspace folder. | 2021-07-30 | 7.5 | CVE-2021-30124 MISC MISC MISC |
whatsns — whatsns | SQL Injextion vulnerability exists in Whatsns 4.0 via the ip parameter in index.php?admin_banned/add.htm. | 2021-07-30 | 7.5 | CVE-2020-18013 MISC |
Medium Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
acronis — agent | A logic bug in system monitoring driver of Acronis Agent after 12.5.21540 and before 12.5.23094 allowed to bypass Windows memory protection and access sensitive data. | 2021-07-30 | 5 | CVE-2020-14999 MISC |
adobe — indesign | Adobe InDesign version 16.0 (and earlier) is affected by an Out-of-bounds Write vulnerability in the CoolType library. An unauthenticated attacker could leverage this vulnerability to achieve remote code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2021-07-30 | 6.8 | CVE-2021-36004 MISC |
digium — asterisk | An issue was discovered in PJSIP in Asterisk before 16.19.1 and before 18.5.1. To exploit, a re-INVITE without SDP must be received after Asterisk has sent a BYE request. | 2021-07-30 | 4 | CVE-2021-31878 MISC FULLDISC MISC MISC MISC |
digium — asterisk | An issue was discovered in Sangoma Asterisk 13.x before 13.38.3, 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before 18.5.1, and Certified Asterisk before 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported media format, a crash can occur. | 2021-07-30 | 5 | CVE-2021-32558 MISC FULLDISC MISC MISC MLIST |
egain — chat | eGain Chat 15.5.5 allows XSS via the Name (aka full_name) field. | 2021-07-30 | 4.3 | CVE-2020-15948 MISC |
flatpress — flatpress | Cross Site Request Forgery (CSRF) vulnerability in FlatPress 1.1 via the DeleteFile function in flat/admin.php. | 2021-07-30 | 6.8 | CVE-2020-22761 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14025. | 2021-08-04 | 6.8 | CVE-2021-34843 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14013. | 2021-08-04 | 6.8 | CVE-2021-34853 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13929. | 2021-08-04 | 6.8 | CVE-2021-34852 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14016. | 2021-08-04 | 6.8 | CVE-2021-34851 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14529. | 2021-08-04 | 6.8 | CVE-2021-34850 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14531. | 2021-08-04 | 6.8 | CVE-2021-34849 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14270. | 2021-08-04 | 6.8 | CVE-2021-34847 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14120. | 2021-08-04 | 6.8 | CVE-2021-34846 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14034. | 2021-08-04 | 6.8 | CVE-2021-34845 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14033. | 2021-08-04 | 6.8 | CVE-2021-34844 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14532. | 2021-08-04 | 6.8 | CVE-2021-34848 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14024. | 2021-08-04 | 6.8 | CVE-2021-34842 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14022. | 2021-08-04 | 6.8 | CVE-2021-34841 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14021. | 2021-08-04 | 6.8 | CVE-2021-34840 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14020. | 2021-08-04 | 6.8 | CVE-2021-34839 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14019. | 2021-08-04 | 6.8 | CVE-2021-34838 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14018. | 2021-08-04 | 6.8 | CVE-2021-34837 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14017. | 2021-08-04 | 6.8 | CVE-2021-34836 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14015. | 2021-08-04 | 6.8 | CVE-2021-34835 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14014. | 2021-08-04 | 6.8 | CVE-2021-34834 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14023. | 2021-08-04 | 6.8 | CVE-2021-34833 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the delay property. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13928. | 2021-08-04 | 6.8 | CVE-2021-34832 MISC MISC |
foxitsoftware — pdf_editor | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.4.37651. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Document objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13741. | 2021-08-04 | 6.8 | CVE-2021-34831 MISC MISC |
groupsession — groupsession | Open redirect vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack via a specially crafted URL. | 2021-07-30 | 5.8 | CVE-2021-20789 MISC MISC |
groupsession — groupsession | Cross-site request forgery (CSRF) vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote attacker to hijack the authentication of administrators via a specially crafted URL. | 2021-07-30 | 4.3 | CVE-2021-20786 MISC MISC |
groupsession — groupsession | Server-side request forgery (SSRF) vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote authenticated attacker to conduct a port scan from the product and/or obtain information from the internal Web server. | 2021-07-30 | 4 | CVE-2021-20788 MISC MISC |
huawei — magic_ui | There is a Configuration Defect Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability. | 2021-08-02 | 6.4 | CVE-2021-22435 MISC |
huawei — magic_ui | There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 2021-08-02 | 5 | CVE-2021-22391 MISC |
huawei — magic_ui | There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random address access. | 2021-08-02 | 5 | CVE-2021-22443 MISC |
huawei — magic_ui | There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. | 2021-08-02 | 6.8 | CVE-2021-22384 MISC |
huawei — magic_ui | There is an Improper Validation of Integrity Check Value Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 2021-08-02 | 5 | CVE-2021-22442 MISC |
huawei — magic_ui | There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses. | 2021-08-02 | 5 | CVE-2021-22392 MISC |
huawei — magic_ui | There is an Integer Underflow (Wrap or Wraparound) Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS of Samgr. | 2021-08-02 | 5 | CVE-2021-22379 MISC |
huawei — magic_ui | There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS. | 2021-08-02 | 5 | CVE-2021-22381 MISC |
ibm — cloud_pak_for_security | IBM Cloud Pak for Security (CP4S) 1.5.0.0, 1.5.1.0, 1.6.0.0, 1.6.1.0, 1.7.0.0, and 1.7.1.0 could disclose sensitive information to an unauthorized user through HTTP GET requests. This information could be used in further attacks against the system. IBM X-Force ID: 198920. | 2021-08-02 | 5 | CVE-2021-20539 CONFIRM XF |
ibm — cloud_pak_for_security | IBM Cloud Pak for Security (CP4S) 1.5.0.0, 1.5.1.0, 1.6.0.0, 1.6.1.0, 1.7.0.0, and 1.7.1.0 could disclose sensitive information to an unauthorized user through HTTP GET requests. This information could be used in further attacks against the system. IBM X-Force ID: 198923. | 2021-08-02 | 5 | CVE-2021-20540 CONFIRM XF |
ibm — cloud_pak_for_security | IBM Cloud Pak for Security (CP4S) 1.5.0.0, 1.5.1.0, 1.6.0.0, 1.6.1.0, 1.7.0.0, and 1.7.1.0 could disclose sensitive information to an unauthorized user through HTTP GET requests. This information could be used in further attacks against the system. IBM X-Force ID: 198927. | 2021-08-02 | 5 | CVE-2021-20541 CONFIRM XF |
ibm — qradar_user_behavior_analytics | IBM QRadar User Behavior Analytics 4.1.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 202168. | 2021-08-02 | 6.8 | CVE-2021-29757 CONFIRM XF |
ibm — websphere_application_server | IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote user to gain elevated privileges on the system. IBM X-Force ID: 201300. | 2021-07-30 | 6.5 | CVE-2021-29736 XF CONFIRM |
isomorphic-git — isomorphic-git | isomorphic-git before 1.8.2 allows Directory Traversal via a crafted repository. | 2021-07-30 | 5 | CVE-2021-30483 MISC MISC MISC |
joplin_project — joplin | Joplin before 2.0.9 allows XSS via button and form in the note body. | 2021-08-03 | 4.3 | CVE-2021-37916 MISC MISC |
maxsite — maxsite_cms | A reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page. | 2021-08-03 | 4.3 | CVE-2021-35265 MISC MISC |
metinfo — metinfo | Cross Site Request Forgery (CSRF) vulnerability in MetInfo 6.1.3 via a doaddsave action in admin/index.php. | 2021-07-30 | 6.8 | CVE-2020-18157 MISC |
neo4j — graph_databse | A failure in resetting the security context in some transaction actions in Neo4j Graph Database 4.2 and 4.3 could allow authenticated users to execute commands with elevated privileges. | 2021-07-30 | 6.5 | CVE-2021-34802 MISC MISC |
nukeviet — nukeviet | Cross Site Scripting (XSS) vulnerability in NukeViet cms 4.4.0 via the editor in the News module. | 2021-07-30 | 4.3 | CVE-2020-22765 MISC |
objectplanet — opinio | ObjectPlanet Opinio before 7.14 allows reflected XSS via the survey/admin/surveyAdmin.do?action=viewSurveyAdmin query string. (There is also stored XSS if input to survey/admin/*.do is accepted from untrusted users.) | 2021-07-30 | 4.3 | CVE-2020-26563 MISC CONFIRM |
powerdns — authoritative_server | PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception. | 2021-07-30 | 5 | CVE-2021-36754 MLIST CONFIRM MISC |
replicated — replicated_classic | Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console. | 2021-07-30 | 5 | CVE-2020-10590 CONFIRM MISC MISC |
ruby-lang — ruby | In Ruby through 3.0 on Windows, a remote attacker can submit a crafted path when a Web application handles a parameter with TmpDir. | 2021-07-30 | 5 | CVE-2021-28966 MISC |
s-cms — s-cms | A remote code execution (RCE) vulnerability in /1.com.php of S-CMS PHP v3.0 allows attackers to getshell via modification of a PHP file. | 2021-07-30 | 6.5 | CVE-2020-20698 MISC |
solarwinds — orion_platform | The node management page in SolarWinds Orion Platform before 2020.2.5 HF1 allows an attacker to create or delete a node (outside of the attacker’s perimeter) via an account with write permissions. This occurs because node IDs are predictable (with incrementing numbers) and the access control on Services/NodeManagement.asmx/DeleteObjNow is incorrect. To exploit this, an attacker must be authenticated and must have node management rights associated with at least one valid group on the platform. | 2021-07-30 | 5.5 | CVE-2021-28674 MISC CONFIRM |
tecnick — tcexam | When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which included sensitive database backup files. | 2021-07-30 | 5 | CVE-2021-20114 MISC |
tecnick — tcexam | An exposure of sensitive information vulnerability exists in TCExam <= 14.8.1. If a password reset request was made for an email address that was not registered with a user then we would be presented with an ‘unknown email’ error. If an email is given that is registered with a user then this error will not appear. A malicious actor could abuse this to enumerate the email addresses of | 2021-07-30 | 5 | CVE-2021-20113 MISC |
thimpress — learnpress | The LearnPress plugin before 3.2.6.9 for WordPress allows remote attackers to escalate the privileges of any user to LP Instructor via the accept-to-be-teacher action parameter. | 2021-07-30 | 6.8 | CVE-2020-11511 MISC MISC MISC |
tidesec — wdscanner | Cross Site Scripting vulnerabiity exists in WDScanner 1.1 in the system management page. | 2021-07-30 | 4.3 | CVE-2020-21854 MISC |
Low Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
engineercms_project — engineercms | engineercms 1.03 is vulnerable to Cross Site Scripting (XSS). There is no escaping in the nickname field on the user list page. When viewing this page, the JavaScript code will be executed in the user’s browser. | 2021-07-30 | 3.5 | CVE-2021-36605 MISC |
groupsession — groupsession | Cross-site scripting vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote attacker to inject an arbitrary script by sending a specially crafted request to a specific URL. | 2021-07-30 | 3.5 | CVE-2021-20785 MISC MISC |
groupsession — groupsession | Cross-site scripting vulnerability in GroupSession (GroupSession Free edition from ver2.2.0 to the version prior to ver5.1.0, GroupSession byCloud from ver3.0.3 to the version prior to ver5.1.0, and GroupSession ZION from ver3.0.3 to the version prior to ver5.1.0) allows a remote attacker to inject an arbitrary script by sending a specially crafted request to a specific URL. | 2021-07-30 | 3.5 | CVE-2021-20787 MISC MISC |
hucart — hucart | Cross Site Scripting (XSS) vulnerability in HuCart 5.7.4 via nickname in index.php. | 2021-07-30 | 3.5 | CVE-2020-18158 MISC |
misp — misp | app/View/Elements/GalaxyClusters/view_relation_tree.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster relationships. | 2021-07-30 | 3.5 | CVE-2021-37742 MISC |
misp — misp | app/View/GalaxyElements/ajax/index.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster elements in JSON format. | 2021-07-30 | 3.5 | CVE-2021-37743 MISC |
naigos — nagios_log_server | Nagios Log Server before 2.1.9 contains Reflected XSS in the dropdown box for the alert history and audit log function. All parameters used for filtering are affected. This affects users who open a crafted link or third-party web page. | 2021-07-30 | 3.5 | CVE-2021-35478 MISC MISC MISC |
naigos — nagios_log_server | Nagios Log Server before 2.1.9 contains Stored XSS in the custom column view for the alert history and audit log function through the affected pp parameter. This affects users who open a crafted link or third-party web page. | 2021-07-30 | 3.5 | CVE-2021-35479 MISC MISC MISC |
php — archive_tar | In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193. | 2021-07-30 | 3.6 | CVE-2021-32610 MISC MLIST CONFIRM MISC FEDORA FEDORA |
s-cms — s-cms | A cross site scripting (XSS) vulnerability in S-CMS PHP v3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the Copyright text box under Basic Settings. | 2021-07-30 | 3.5 | CVE-2020-20699 MISC |
s-cms — s-cms | A stored cross site scripting (XSS) vulnerability in /app/form_add/of S-CMS PHP v3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the Title Entry text box. | 2021-07-30 | 3.5 | CVE-2020-20700 MISC |
s-cms — s-cms | A stored cross site scripting (XSS) vulnerability in /app/config/of S-CMS PHP v3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | 2021-07-30 | 3.5 | CVE-2020-20701 MISC |
tecnick — tcexam | A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_filemanager.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_filemanager.php could upload a malicious javascript payload which would be triggered when another user views the file. | 2021-07-30 | 3.5 | CVE-2021-20111 MISC |
tecnick — tcexam | A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_select_mediafile.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_select_mediafile.php could upload a malicious javascript payload which would be triggered when another user views the file. | 2021-07-30 | 3.5 | CVE-2021-20112 MISC |
yzmcms — yzmcms | Cross Site Scripting (XSS) vulnerabiity in YzmCMS 5.2 via the site_code parameter in admin/index/init.html. | 2021-07-30 | 3.5 | CVE-2020-19118 MISC |
Severity Not Yet Assigned
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
acronis — true_image | Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 1 of 2). | 2021-08-05 | not yet calculated | CVE-2021-32576 MISC |
acronis — true_image |
Acronis True Image prior to 2021 Update 4 for Windows and Acronis True Image prior to 2021 Update 5 for macOS allowed an unauthenticated attacker (who has a local code execution ability) to tamper with the micro-service API. | 2021-08-05 | not yet calculated | CVE-2021-32579 MISC MISC |
acronis — true_image |
Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to DLL hijacking. | 2021-08-05 | not yet calculated | CVE-2021-32580 MISC |
acronis — true_image |
Acronis True Image prior to 2021 Update 4 for Windows, Acronis True Image prior to 2021 Update 5 for Mac, Acronis Agent prior to build 26653, Acronis Cyber Protect prior to build 27009 did not implement SSL certificate validation. | 2021-08-05 | not yet calculated | CVE-2021-32581 MISC MISC MISC |
acronis — true_image |
Acronis True Image prior to 2021 Update 5 for Windows allowed local privilege escalation due to insecure folder permissions. | 2021-08-05 | not yet calculated | CVE-2021-32577 MISC |
acronis — true_image |
Acronis True Image prior to 2021 Update 4 for Windows allowed local privilege escalation due to improper soft link handling (issue 2 of 2). | 2021-08-05 | not yet calculated | CVE-2021-32578 MISC |
advantech — r-seenev |
An OS Command Injection vulnerability exists in the ping.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary OS command execution. An attacker can send a crafted HTTP request to trigger this vulnerability. | 2021-08-05 | not yet calculated | CVE-2021-21805 MISC |
akaunting — akaunting | Akaunting version 2.1.12 and earlier suffers from a code injection issue in the Money.php component of the application. A POST sent to /{company_id}/sales/invoices/{invoice_id} with an items[0][price] that includes a PHP callable function is executed directly. This issue was fixed in version 2.1.13 of the product. | 2021-08-04 | not yet calculated | CVE-2021-36800 MISC |
akaunting — akaunting |
Akaunting version 2.1.12 and earlier suffers from an authentication bypass issue in the user-controllable field, companies[0]. This issue was fixed in version 2.1.13 of the product. | 2021-08-04 | not yet calculated | CVE-2021-36801 MISC |
akaunting — akaunting |
Akaunting version 2.1.12 and earlier suffers from a persistent (type II) cross-site scripting (XSS) vulnerability in processing user-supplied avatar images. This issue was fixed in version 2.1.13 of the product. | 2021-08-04 | not yet calculated | CVE-2021-36803 MISC |
akaunting — akaunting |
Akaunting version 2.1.12 and earlier suffers from a denial-of-service issue that is triggered by setting a malformed ‘locale’ variable and sending it in an otherwise normal HTTP POST request. This issue was fixed in version 2.1.13 of the product. | 2021-08-04 | not yet calculated | CVE-2021-36802 MISC |
akaunting — akaunting |
Akaunting version 2.1.12 and earlier suffers from a password reset spoofing vulnerability, wherein an attacker can proxy password reset requests through a running Akaunting instance, if that attacker knows the target’s e-mail address. This issue was fixed in version 2.1.13 of the product. Please note that this issue is ultimately caused by the defaults provided by the Laravel framework, specifically how proxy headers are handled with respect to multi-tenant implementations. In other words, while this is not technically a vulnerability in Laravel, this default configuration is very likely to lead to practically identical identical vulnerabilities in Laravel projects that implement multi-tenant applications. | 2021-08-04 | not yet calculated | CVE-2021-36804 MISC MISC MISC |
akaunting — akaunting |
Akaunting version 2.1.12 and earlier suffers from a persistent (type II) cross-site scripting (XSS) vulnerability in the sales invoice processing component of the application. This issue was fixed in version 2.1.13 of the product. | 2021-08-04 | not yet calculated | CVE-2021-36805 MISC |
argo — experssion_templates |
In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated. | 2021-08-03 | not yet calculated | CVE-2021-37914 MISC MISC |
asylo — messagereader |
An untrusted memory read vulnerability in Asylo versions up to 0.6.1 allows an untrusted attacker to pass a syscall number in MessageReader that is then used by sysno() and can bypass validation. This can allow the attacker to read memory from within the secure enclave. We recommend updating to Asylo 0.6.3 or past https://github.com/google/asylo/commit/90d7619e9dd99bcdb6cd28c7649d741d254d9a1a | 2021-08-02 | not yet calculated | CVE-2021-22552 MISC |
atlassian — confluence_server |
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3. | 2021-08-03 | not yet calculated | CVE-2021-26085 N/A |
atlassian — jira |
The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6.6, 4.0.12, 5.0.5; for Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; for Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; and for Fisheye 2.5.9. | 2021-08-02 | not yet calculated | CVE-2021-37843 MISC |
atlassian — jira_server |
The DefaultOSWorkflowConfigurator class in Jira Server and Jira Data Center before version 8.18.1 allows remote attackers who can trick a system administrator to import their malicious workflow to execute arbitrary code via a Remote Code Execution (RCE) vulnerability. The vulnerability allowed for various problematic OSWorkflow classes to be used as part of workflows. The fix for this issue blocks usage of unsafe conditions, validators, functions and registers that are build-in into OSWorkflow library and other Jira dependencies. Atlassian-made functions or functions provided by 3rd party plugins are not affected by this fix. | 2021-08-02 | not yet calculated | CVE-2017-18113 MISC |
atomicparseley — atomicparseley |
A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check. | 2021-08-04 | not yet calculated | CVE-2021-37231 MISC MISC |
atomicparseley — atomicparseley |
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64. | 2021-08-04 | not yet calculated | CVE-2021-37232 MISC MISC |
bento4 — bento4 |
An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the function AP4_StszAtom::WriteFields located in Ap4StszAtom.cpp. It allows an attacker to cause a denial of service (DOS). | 2021-08-05 | not yet calculated | CVE-2021-35306 MISC |
bento4 — bento4 |
An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the AP4_DescriptorFinder::Test component located in /Core/Ap4Descriptor.h. It allows an attacker to cause a denial of service (DOS). | 2021-08-05 | not yet calculated | CVE-2021-35307 MISC |
bootperformancetable — bootperformancetable |
BootPerformanceTable pointer is read from an NVRAM variable in PEI. Recommend setting PcdFirmwarePerformanceDataTableS3Support to FALSE. | 2021-08-05 | not yet calculated | CVE-2021-28216 MISC |
bosch — ip_cameras |
A vulnerability in the web-based interface allows an unauthenticated remote attacker to trigger actions on an affected system on behalf of another user (CSRF – Cross Site Request Forgery). This requires the victim to be tricked into clicking a malicious link or opening a malicious website while being logged in into the camera. | 2021-08-05 | not yet calculated | CVE-2021-23849 CONFIRM |
btrbk — btrbk |
Btrbk before 0.31.2 allows command execution because of the mishandling of remote hosts filtering SSH commands using ssh_filter_btrbk.sh in authorized_keys. | 2021-08-07 | not yet calculated | CVE-2021-38173 MISC CONFIRM |
care2x — open_source_hospital_information_management |
SQL Injection Vulnerability in Care2x Open Source Hospital Information Management 2.7 Alpha via the (1) pday, (2) pmonth, and (3) pyear parameters in GET requests sent to /modules/nursing/nursing-station.php. | 2021-08-06 | not yet calculated | CVE-2021-36351 MISC MISC |
centreon — centreon | A SQL injection vulnerability in image generation in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote authenticated (but low-privileged) attackers to execute arbitrary SQL commands via the include/views/graphs/generateGraphs/generateImage.php index parameter. | 2021-08-03 | not yet calculated | CVE-2021-37557 MISC MISC |
centreon — centreon |
A SQL injection vulnerability in reporting export in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote authenticated (but low-privileged) attackers to execute arbitrary SQL commands via the include/reporting/dashboard/csvExport/csv_HostGroupLogs.php start and end parameters. | 2021-08-03 | not yet calculated | CVE-2021-37556 MISC MISC |
chikitsa — chikitsa_patient_management_system |
index.php/appointment/insert_patient_add_appointment in Chikitsa Patient Management System 2.0.0 allows XSS. | 2021-08-06 | not yet calculated | CVE-2021-38152 MISC MISC |
chikitsa — chikitsa_patient_management_system |
index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS. | 2021-08-06 | not yet calculated | CVE-2021-38149 MISC MISC |
chikitsa — chikitsa_patient_management_system |
index.php/appointment/todos in Chikitsa Patient Management System 2.0.0 allows XSS. | 2021-08-06 | not yet calculated | CVE-2021-38151 MISC MISC |
cisco — connected_mobile_experiences |
A vulnerability in the change password API of Cisco Connected Mobile Experiences (CMX) could allow an authenticated, remote attacker to alter their own password to a value that does not comply with the strong authentication requirements that are configured on an affected device. This vulnerability exists because a password policy check is incomplete at the time a password is changed at server side using the API. An attacker could exploit this vulnerability by sending a specially crafted API request to the affected device. A successful exploit could allow the attacker to change their own password to a value that does not comply with the configured strong authentication requirements. | 2021-08-04 | not yet calculated | CVE-2021-1522 CISCO |
cisco — evolved_programmable_network_manager |
A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application. | 2021-08-04 | not yet calculated | CVE-2021-34707 CISCO |
cisco — multiple_small_business_routers |
Multiple vulnerabilities in the web-based management interface of the Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an attacker to do the following: Execute arbitrary code Cause a denial of service (DoS) condition Execute arbitrary commands For more information about these vulnerabilities, see the Details section of this advisory. | 2021-08-04 | not yet calculated | CVE-2021-1609 CISCO |
cisco — multiple_small_business_routers |
Multiple vulnerabilities in the web-based management interface of the Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an attacker to do the following: Execute arbitrary code Cause a denial of service (DoS) condition Execute arbitrary commands For more information about these vulnerabilities, see the Details section of this advisory. | 2021-08-04 | not yet calculated | CVE-2021-1610 CISCO |
cisco — multiple_small_business_routers |
A vulnerability in the web-based management interface of Cisco Small Business RV160, RV160W, RV260, RV260P, and RV260W VPN Routers could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device using root-level privileges. Due to the nature of the vulnerability, only commands without parameters can be executed. | 2021-08-04 | not yet calculated | CVE-2021-1602 CISCO |
cisco — packet_tracer |
A vulnerability in Cisco Packet Tracer for Windows could allow an authenticated, local attacker to perform a DLL injection attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by inserting a configuration file in a specific path on the system, which can cause a malicious DLL file to be loaded when the application starts. A successful exploit could allow an attacker with normal user privileges to execute arbitrary code on the affected system with the privileges of another user’s account. | 2021-08-04 | not yet calculated | CVE-2021-1593 CISCO |
citrix — adc_and_gateway |
A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session. | 2021-08-05 | not yet calculated | CVE-2021-22927 MISC |
citrix — multiple_products |
A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed. | 2021-08-05 | not yet calculated | CVE-2021-22919 MISC |
citrix — multiple_products |
A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to a phishing attack through a SAML authentication hijack to steal a valid user session. | 2021-08-05 | not yet calculated | CVE-2021-22920 MISC |
citrix — virtual_apps_and_desktops |
A vulnerability has been identified in Citrix Virtual Apps and Desktops that could, if exploited, allow a user of a Windows VDA that has either Citrix Profile Management or Citrix Profile Management WMI Plugin installed to escalate their privilege level on that Windows VDA to SYSTEM. | 2021-08-05 | not yet calculated | CVE-2021-22928 MISC |
cms_simple_made — cms_simple_made |
CMS Made Simple (CMSMS) 2.2.14 allows stored XSS via the Extensions > Fie Picker.. | 2021-08-05 | not yet calculated | CVE-2020-22732 MISC |
cmsuno — cmsuno |
CMSuno 1.7 is vulnerable to an authenticated stored cross site scripting in modifying the filename parameter (tgo) while updating the theme. | 2021-08-03 | not yet calculated | CVE-2021-36654 MISC |
codesys — control_runtime |
CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow. | 2021-08-03 | not yet calculated | CVE-2021-33485 CONFIRM |
codesys — development_system | A unsafe deserialization vulnerability exists in the ObjectManager.plugin ProfileInformation.ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability. | 2021-08-02 | not yet calculated | CVE-2021-21866 MISC CONFIRM |
codesys — development_system |
A unsafe deserialization vulnerability exists in the ComponentModel Profile.FromFile() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability. | 2021-08-05 | not yet calculated | CVE-2021-21863 MISC |
codesys — development_system |
A unsafe deserialization vulnerability exists in the ComponentModel ComponentManager.StartupCultureSettings functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability. | 2021-08-02 | not yet calculated | CVE-2021-21864 MISC CONFIRM |
codesys — development_system |
A unsafe deserialization vulnerability exists in the PackageManagement.plugin ExtensionMethods.Clone() functionality of CODESYS GmbH CODESYS Development System 3.5.16. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability. | 2021-08-02 | not yet calculated | CVE-2021-21865 MISC CONFIRM |
codesys — ethernetip |
In CODESYS EtherNetIP before 4.1.0.0, specific EtherNet/IP requests may cause a null pointer dereference in the downloaded vulnerable EtherNet/IP stack that is executed by the CODESYS Control runtime system. | 2021-08-04 | not yet calculated | CVE-2021-36765 CONFIRM |
codesys — gateway |
In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference. Crafted communication requests may cause a Null pointer dereference in the affected CODESYS products and may result in a denial-of-service condition. | 2021-08-04 | not yet calculated | CVE-2021-36764 CONFIRM |
codesys — gateway |
In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties. | 2021-08-03 | not yet calculated | CVE-2021-36763 CONFIRM |
codesys — runtime_toolkit |
All versions of the CODESYS V3 Runtime Toolkit for VxWorks from version V3.5.8.0 and before version V3.5.17.10 have Improper Handling of Exceptional Conditions. | 2021-08-03 | not yet calculated | CVE-2021-33486 MISC |
comelit — app-leios_de_casa |
An issue was discovered in Comelit “App lejos de casa (web)” 2.8.0. It allows privilege escalation via modified domus and logged fields, related to js/bridge.min.js and login.json. For example, an attacker can achieve high privileges (installer or administrator) for the graphical interface via a 1C000000000S value for domus, in conjunction with a zero value for logged. | 2021-08-03 | not yet calculated | CVE-2019-14453 MISC |
confd — confd |
A vulnerability in ConfD could allow an authenticated, local attacker to execute arbitrary commands at the level of the account under which ConfD is running, which is commonly root. To exploit this vulnerability, an attacker must have a valid account on an affected device. The vulnerability exists because the affected software incorrectly runs the SFTP user service at the privilege level of the account that was running when the ConfD built-in Secure Shell (SSH) server for CLI was enabled. If the ConfD built-in SSH server was not enabled, the device is not affected by this vulnerability. An attacker with low-level privileges could exploit this vulnerability by authenticating to an affected device and issuing a series of commands at the SFTP interface. A successful exploit could allow the attacker to elevate privileges to the level of the account under which ConfD is running, which is commonly root. Note: Any user who can authenticate to the built-in SSH server may exploit this vulnerability. By default, all ConfD users have this access if the server is enabled. Software updates that address this vulnerability have been released. | 2021-08-04 | not yet calculated | CVE-2021-1572 CISCO |
corero — securewatch_managed_services |
Corero SecureWatch Managed Services 9.7.2.0020 is affected by a Path Traversal vulnerability via the snap_file parameter in the /it-IT/splunkd/__raw/services/get_snapshot HTTP API endpoint. A ‘low privileged’ attacker can read any file on the target host. | 2021-08-06 | not yet calculated | CVE-2021-38136 MISC MISC |
corero — securewatch_managed_services |
Corero SecureWatch Managed Services 9.7.2.0020 does not correctly check swa-monitor and cns-monitor user’s privileges, allowing a user to perform actions not belonging to his role. | 2021-08-06 | not yet calculated | CVE-2021-38137 MISC MISC |
crossbeam-deque — crossbeam-deque |
crossbeam-deque is a package of work-stealing deques for building task schedulers when programming in Rust. In versions prior to 0.7.4 and 0.8.0, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. This has been fixed in crossbeam-deque 0.8.1 and 0.7.4. | 2021-08-02 | not yet calculated | CVE-2021-32810 CONFIRM |
d-link — dir-615 |
A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution. | 2021-08-06 | not yet calculated | CVE-2021-37388 MISC MISC |
def_con — 27 |
The DEF CON 27 badge allows remote attackers to exploit a buffer overflow by sending an oversized packet via the NFMI (Near Field Magnetic Induction) protocol. | 2021-08-04 | not yet calculated | CVE-2021-38111 MISC |
dell — emc_idrac9 |
Dell EMC iDRAC9 versions prior to 4.40.40.00 contain a DOM-based cross-site scripting vulnerability. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victim’s browser by tricking a victim in to following a specially crafted link. | 2021-08-03 | not yet calculated | CVE-2021-21576 MISC |
dell — emc_idrac9 |
Dell EMC iDRAC9 versions prior to 5.00.00.00 contain a cross-site scripting vulnerability. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victim’s browser by tricking a victim in to following a specially crafted link. | 2021-08-03 | not yet calculated | CVE-2021-21581 MISC |
dell — emc_idrac9 |
Dell EMC iDRAC8 versions prior to 2.80.80.80 & Dell EMC iDRAC9 versions prior to 5.00.00.00 contain a Content spoofing / Text injection, where a malicious URL can inject text to present a customized message on the application that can phish users into believing that the message is legitimate. | 2021-08-03 | not yet calculated | CVE-2021-21580 MISC |
dell — emc_idrac9 |
Dell EMC iDRAC9 versions prior to 4.40.40.00 contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. | 2021-08-03 | not yet calculated | CVE-2021-21579 MISC |
dell — emc_idrac9 |
Dell EMC iDRAC9 versions prior to 4.40.40.00 contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. | 2021-08-03 | not yet calculated | CVE-2021-21578 MISC |
dell — emc_idrac9 |
Dell EMC iDRAC9 versions prior to 4.40.40.00 contain a DOM-based cross-site scripting vulnerability. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victim’s browser by tricking a victim in to following a specially crafted link. | 2021-08-03 | not yet calculated | CVE-2021-21577 MISC |
dell — emc_powerscale_onefs |
Dell EMC PowerScale OneFS versions 8.1.2-9.1.0.x contain an Improper Check for Unusual or Exceptional Conditions in its auditing component.This can lead to an authenticated user with low-privileges to trigger a denial of service event. | 2021-08-03 | not yet calculated | CVE-2021-21563 MISC |
dell — emc_powerscale_onefs |
Dell PowerScale OneFS versions 9.1.0.3 and earlier contain a denial of service vulnerability. SmartConnect had an error condition that may be triggered to loop, using CPU and potentially preventing other SmartConnect DNS responses. | 2021-08-03 | not yet calculated | CVE-2021-21565 MISC |
dell — emc_powerscale_onefs |
Dell EMC PowerScale OneFS contains an untrusted search path vulnerability. This vulnerability allows a user with (ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE) and (ISI_PRIV_SYS_UPGRADE or ISI_PRIV_AUDIT) to provide an untrusted path which can lead to run resources that are not under the application’s direct control. | 2021-08-03 | not yet calculated | CVE-2021-21562 MISC |
dell — powerscale_onefs |
Dell PowerScale OneFS versions 8.1.0-9.1.0 contain an Incorrect User Management vulnerability.under some specific conditions, this can allow the CompAdmin user to elevate privileges and break out of Compliance mode. This is a critical vulnerability and Dell recommends upgrading at the earliest. | 2021-08-03 | not yet calculated | CVE-2021-21553 MISC |
demuxer — demuxer |
Prior to ffmpeg version 4.3, the tty demuxer did not have a ‘read_probe’ function assigned to it. By crafting a legitimate “ffconcat” file that references an image, followed by a file the triggers the tty demuxer, the contents of the second file will be copied into the output file verbatim (as long as the `-vcodec copy` option is passed to ffmpeg). | 2021-08-05 | not yet calculated | CVE-2021-3566 MISC |
devexpress — xtrareports |
DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization. | 2021-08-04 | not yet calculated | CVE-2021-36483 MISC |
drogon — drogon |
A path traversal vulnerability in the static router for Drogon from 1.0.0-beta14 to 1.6.0 could allow an unauthenticated, remote attacker to arbitrarily read files. The vulnerability is due to lack of proper input validation for requested path. An attacker could exploit this vulnerability by sending crafted HTTP request with specific path to read. Successful exploitation could allow the attacker to read files that should be restricted. | 2021-08-04 | not yet calculated | CVE-2021-35397 MISC MISC MISC MISC |
ecobee3 — lite_4.5.81.200_device |
Hardcoded default root credentials exist on the ecobee3 lite 4.5.81.200 device. This allows a threat actor to gain access to the password-protected bootloader environment through the serial console. | 2021-08-03 | not yet calculated | CVE-2021-27952 MISC |
entando — admin_console |
A Server Side Template Injection in the Entando Admin Console 6.3.9 and before allows a user with privileges to execute FreeMarker template with command execution via freemarker.template.utility.Execute | 2021-08-02 | not yet calculated | CVE-2021-35450 MISC MISC |
espocrm — espocrm |
EspoCRM 6.1.6 and prior suffers from a persistent (type II) cross-site scripting (XSS) vulnerability in processing user-supplied avatar images. This issue was fixed in version 6.1.7 of the product. | 2021-08-04 | not yet calculated | CVE-2021-3539 MISC |
ethereum — erc20 |
A security flaw in the ‘owned’ function of a smart contract implementation for RobotCoin (RBTC), a tradeable Ethereum ERC20 token, allows attackers to hijack victim accounts and arbitrarily increase the digital supply of assets. | 2021-08-03 | not yet calculated | CVE-2021-34272 MISC |
ethereum — erc20 |
An integer overflow in the transfer function of a smart contract implementation for Lancer Token, an Ethereum ERC20 token, allows the owner to cause unexpected financial losses between two large accounts during a transaction. | 2021-08-03 | not yet calculated | CVE-2021-33403 MISC MISC |
ethereum — erc20 |
An integer overflow in the mintToken function of a smart contract implementation for Doftcoin Token, an Ethereum ERC20 token, allows the owner to cause unexpected financial losses. | 2021-08-03 | not yet calculated | CVE-2021-34270 MISC |
ethereum — erc20 |
A security flaw in the ‘owned’ function of a smart contract implementation for BTC2X (B2X), a tradeable Ethereum ERC20 token, allows attackers to hijack victim accounts and arbitrarily increase the digital supply of assets. | 2021-08-03 | not yet calculated | CVE-2021-34273 MISC |
ezpdfreader — ezpdfreader |
An improper input validation vulnerability in the service of ezPDFReader allows attacker to execute arbitrary command. This issue occurred when the ezPDF launcher received and executed crafted input values through JSON-RPC communication. | 2021-08-05 | not yet calculated | CVE-2021-26605 MISC |
fedoraproject — fedora33 | curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application. | 2021-08-05 | not yet calculated | CVE-2021-22925 MISC |
fedoraproject — fedora33 |
When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk. | 2021-08-05 | not yet calculated | CVE-2021-22922 MISC |
fedoraproject — fedora33 |
When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user’s expectations and intentions and without telling the user it happened. | 2021-08-05 | not yet calculated | CVE-2021-22923 MISC |
ffmpeg — ffmpeg |
libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868. | 2021-08-04 | not yet calculated | CVE-2021-38114 MISC MISC |
fortinet — fortieportal |
A Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) in Fortinet FortiPortal 6.x before 6.0.5, FortiPortal 5.3.x before 5.3.6 and any FortiPortal before 6.2.5 allows authenticated attacker to disclosure information via crafted GET request with malicious parameter values. | 2021-08-04 | not yet calculated | CVE-2021-36168 CONFIRM |
fortinet — fortimanager_and_fortianalyser |
Multiple improper neutralization of input during web page generation (CWE-79) in FortiManager and FortiAnalyzer versions 7.0.0, 6.4.5 and below, 6.2.7 and below user interface, may allow a remote authenticated attacker to perform a Stored Cross Site Scripting attack (XSS) by injecting malicious payload in GET parameters. | 2021-08-06 | not yet calculated | CVE-2021-32597 CONFIRM |
fortinet — fortimanager_and_fortianalyzer |
An improper access control vulnerability in FortiManager and FortiAnalyzer GUI interface 7.0.0, 6.4.5 and below, 6.2.8 and below, 6.0.11and below, 5.6.11and below may allow a remote and authenticated attacker with restricted user profile to retrieve the list of administrative users of other ADOMs and their related configuration. | 2021-08-06 | not yet calculated | CVE-2021-32587 CONFIRM |
fortinet — fortimanager_fortianalyser |
A server-side request forgery (SSRF) (CWE-918) vulnerability in FortiManager and FortiAnalyser GUI 7.0.0, 6.4.5 and below, 6.2.7 and below, 6.0.11 and below, 5.6.11 and below may allow a remote and authenticated attacker to access unauthorized files and services on the system via specifically crafted web requests. | 2021-08-05 | not yet calculated | CVE-2021-32603 CONFIRM |
fortinet — fortimanager_fortianalyser |
An improper neutralization of CRLF sequences in HTTP headers (‘HTTP Response Splitting’) vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response. | 2021-08-05 | not yet calculated | CVE-2021-32598 CONFIRM |
fortinet — fortios | A buffer underwrite vulnerability in the firmware verification routine of FortiOS before 7.0.1 may allow an attacker located in the adjacent network to potentially execute arbitrary code via a specifically crafted firmware image. | 2021-08-04 | not yet calculated | CVE-2021-24018 CONFIRM |
fortinet — fortiportal | Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiPortal 6.0.0 through 6.0.4, 5.3.0 through 5.3.5, 5.2.0 through 5.2.5, and 4.2.2 and earlier may allow an attacker with regular user’s privileges to execute arbitrary commands on the underlying SQL database via specifically crafted HTTP requests. | 2021-08-04 | not yet calculated | CVE-2021-32590 CONFIRM |
fortinet — fortiportal |
An unrestricted file upload vulnerability in the web interface of FortiPortal 6.0.0 through 6.0.4, 5.3.0 through 5.3.5, 5.2.0 through 5.2.5, and 4.2.2 and earlier may allow a low-privileged user to potentially tamper with the underlying system’s files via the upload of specifically crafted files. | 2021-08-04 | not yet calculated | CVE-2021-32594 CONFIRM |
fortinet — fortiportal |
A use of one-way hash with a predictable salt vulnerability in the password storing mechanism of FortiPortal 6.0.0 through 6.04 may allow an attacker already in possession of the password store to decrypt the passwords by means of precomputed tables. | 2021-08-04 | not yet calculated | CVE-2021-32596 CONFIRM |
fortinet — fortisandbox |
Improper limitation of a pathname to a restricted directory vulnerabilities in FortiSandbox 3.2.0 through 3.2.2, and 3.1.0 through 3.1.4 may allow an authenticated user to obtain unauthorized access to files and data via specifially crafted web requests. | 2021-08-04 | not yet calculated | CVE-2021-24010 CONFIRM |
fortinet — fortisandbox |
Multiple instances of improper neutralization of input during web page generation vulnerabilities in FortiSandbox before 4.0.0 may allow an unauthenticated attacker to perform an XSS attack via specifically crafted request parameters. | 2021-08-04 | not yet calculated | CVE-2021-24014 CONFIRM |
fortinet — fortisandbox |
An instance of small space of random values in the RPC API of FortiSandbox before 4.0.0 may allow an attacker in possession of a few information pieces about the state of the device to possibly predict valid session IDs. | 2021-08-04 | not yet calculated | CVE-2021-26098 CONFIRM |
fortinet — fortisandbox |
An improper neutralization of special elements used in an OS Command vulnerability in FortiSandbox 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6 may allow an authenticated attacker with access to the web GUI to execute unauthorized code or commands via specifically crafted HTTP requests. | 2021-08-04 | not yet calculated | CVE-2021-26097 CONFIRM |
fortinet — fortisandbox |
Multiple instances of heap-based buffer overflow in the command shell of FortiSandbox before 4.0.0 may allow an authenticated attacker to manipulate memory and alter its content by means of specifically crafted command line arguments. | 2021-08-04 | not yet calculated | CVE-2021-26096 CONFIRM |
fortinet — fortisandbox |
Instances of SQL Injection vulnerabilities in the checksum search and MTA-quarantine modules of FortiSandbox 3.2.0 through 3.2.2, and 3.1.0 through 3.1.4 may allow an authenticated attacker to execute unauthorized code on the underlying SQL interpreter via specifically crafted HTTP requests. | 2021-08-04 | not yet calculated | CVE-2020-29011 CONFIRM |
fortinet — fortisandbox |
An uncontrolled resource consumption (denial of service) vulnerability in the login modules of FortiSandbox 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6; and FortiAuthenticator before 6.0.6 may allow an unauthenticated attacker to bring the device into an unresponsive state via specifically-crafted long request parameters. | 2021-08-04 | not yet calculated | CVE-2021-22124 CONFIRM |
foxit — software_pdf_reader |
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.0.0.49893. A specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. | 2021-08-05 | not yet calculated | CVE-2021-21893 MISC |
foxit — software_pdf_reader |
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.4.37651. A specially crafted PDF document can trigger the reuse of previously free memory, which can lead to arbitrary code execution. An attacker needs to trick the user into opening a malicious file or site to trigger this vulnerability if the browser plugin extension is enabled. | 2021-08-05 | not yet calculated | CVE-2021-21870 MISC |
foxit — software_pdf_reader |
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.3.37598. A specially crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. | 2021-08-05 | not yet calculated | CVE-2021-21831 MISC |
gd — graphics_library |
read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file. | 2021-08-04 | not yet calculated | CVE-2021-38115 MISC MISC |
gestionale — amica_prodigy |
A vulnerability was found in CIR 2000 / Gestionale Amica Prodigy v1.7. The Amica Prodigy’s executable “RemoteBackup.Service.exe” has incorrect permissions, allowing a local unprivileged user to replace it with a malicious file that will be executed with “LocalSystem” privileges. | 2021-08-06 | not yet calculated | CVE-2021-35312 MISC |
getsimple_cms — getsimple_cms |
A stored cross site scripting (XSS) vulnerability in /admin/snippets.php of GetSimple CMS 3.4.0a allows attackers to execute arbitrary web scripts or HTML via crafted payload in the Edit Snippets module. | 2021-08-06 | not yet calculated | CVE-2020-21353 MISC |
gitlab — ce/ee |
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0. It was possible to exploit a stored cross-site-scripting via a specifically crafted default branch name. | 2021-08-05 | not yet calculated | CVE-2021-22241 MISC MISC CONFIRM |
gitlab — ce/ee |
Improper access control in GitLab EE versions 13.11.6, 13.12.6, and 14.0.2 allows users to be created via single sign on despite user cap being enabled | 2021-08-05 | not yet calculated | CVE-2021-22240 MISC MISC CONFIRM |
gitlab — ce/ee |
An issue has been discovered in GitLab CE/EE affecting all versions starting with 13.11, 13.12 and 14.0. A specially crafted design image allowed attackers to read arbitrary files on the server. | 2021-08-05 | not yet calculated | CVE-2021-22234 CONFIRM MISC MISC |
go — go | In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive’s header) can cause a NewReader or OpenReader panic. | 2021-08-02 | not yet calculated | CVE-2021-33196 MISC MISC |
go — go | In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers. | 2021-08-02 | not yet calculated | CVE-2021-33197 MISC MISC |
go — go |
In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method. | 2021-08-02 | not yet calculated | CVE-2021-33198 MISC MISC |
go — go |
Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format. | 2021-08-02 | not yet calculated | CVE-2021-33195 MISC MISC |
google — chrome | Stack buffer overflow in Printing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit stack corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30566 MISC MISC |
google — chrome | Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30573 MISC MISC |
google — chrome | Out of bounds write in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30575 MISC MISC |
google — chrome | Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30560 MISC MISC |
google — chrome | Uninitialized use in Media in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30578 MISC MISC |
google — chrome |
Use after free in sensor handling in Google Chrome on Windows prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30585 MISC MISC |
google — chrome |
Insufficient validation of untrusted input in Sharing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to bypass navigation restrictions via a crafted click-to-call link. | 2021-08-03 | not yet calculated | CVE-2021-30589 MISC MISC |
google — chrome |
Out of bounds write in Tab Groups in Google Chrome on Linux and ChromeOS prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30565 MISC MISC |
google — chrome |
Use after free in UI framework in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30579 MISC MISC |
google — chrome |
Insufficient policy enforcement in Installer in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to perform local privilege escalation via a crafted file. | 2021-08-03 | not yet calculated | CVE-2021-30577 MISC MISC |
google — chrome |
Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30576 MISC MISC |
google — chrome |
Use after free in protocol handling in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30574 MISC MISC |
google — chrome |
Use after free in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30572 MISC MISC |
google — chrome |
Insufficient policy enforcement in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30571 MISC MISC |
google — chrome |
Use after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30569 MISC MISC |
google — chrome |
Heap buffer overflow in WebGL in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30568 MISC MISC |
google — chrome |
Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to open DevTools to potentially exploit heap corruption via specific user gesture. | 2021-08-03 | not yet calculated | CVE-2021-30567 MISC MISC |
google — chrome |
Heap buffer overflow in WebXR in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30564 MISC MISC |
google — chrome |
Type confusion in V8 in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30588 MISC MISC |
google — chrome |
Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30563 MISC MISC |
google — chrome |
Use after free in WebSerial in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30562 MISC MISC |
google — chrome |
Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30561 MISC MISC |
google — chrome |
Use after free in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30541 MISC MISC |
google — chrome |
Inappropriate implementation in Animation in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30582 MISC MISC |
google — chrome |
Insufficient policy enforcement in image handling in iOS in Google Chrome on iOS prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30583 MISC MISC |
google — chrome |
Incorrect security UI in Downloads in Google Chrome on Android prior to 92.0.4515.107 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30584 MISC MISC |
google — chrome |
Use after free in dialog box handling in Windows in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30586 MISC MISC |
google — chrome |
Inappropriate implementation in Compositing in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30587 MISC MISC |
google — chrome |
Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30559 MISC MISC |
google — chrome |
Insufficient policy enforcement in Android intents in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious application to obtain potentially sensitive information via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30580 MISC MISC |
google — chrome |
Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | 2021-08-03 | not yet calculated | CVE-2021-30581 MISC MISC |
gpac — gpac |
The gf_dash_segmenter_probe_input function in GPAC v0.8 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | 2021-08-04 | not yet calculated | CVE-2020-22352 MISC |
gpac — gpac |
An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS). | 2021-08-05 | not yet calculated | CVE-2021-36584 MISC |
grafana — cortex |
An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.) | 2021-08-03 | not yet calculated | CVE-2021-36157 MISC MISC |
grafana — loki |
An issue was discovered in Grafana Loki through 2.2.1. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Loki will attempt to parse a rules file at that location and include some of the contents in the error message. | 2021-08-03 | not yet calculated | CVE-2021-36156 MISC MISC |
graylog — graylog |
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID). | 2021-07-31 | not yet calculated | CVE-2021-37759 MISC |
graylog — graylog |
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID). | 2021-07-31 | not yet calculated | CVE-2021-37760 MISC |
harmonyos — harmonyos | A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow. | 2021-08-03 | not yet calculated | CVE-2021-22423 MISC |
harmonyos — harmonyos | A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. | 2021-08-03 | not yet calculated | CVE-2021-22422 MISC |
harmonyos — harmonyos | A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Memory Leakage. | 2021-08-03 | not yet calculated | CVE-2021-22417 MISC |
harmonyos — harmonyos | A component of the HarmonyOS has a Insufficient Verification of Data Authenticity vulnerability. Local attackers may exploit this vulnerability to cause persistent dos. | 2021-08-03 | not yet calculated | CVE-2021-22419 MISC |
harmonyos — harmonyos |
A component of the HarmonyOS has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevating Privileges. | 2021-08-03 | not yet calculated | CVE-2021-22425 MISC |
harmonyos — harmonyos |
A component of the HarmonyOS has a Kernel Memory Leakage Vulnerability. Local attackers may exploit this vulnerability to cause Kernel Denial of Service. | 2021-08-03 | not yet calculated | CVE-2021-22424 MISC |
harmonyos — harmonyos |
A component of the HarmonyOS has a permission bypass vulnerability. Local attackers may exploit this vulnerability to cause the device to hang due to the page error OsVmPageFaultHandler. | 2021-08-06 | not yet calculated | CVE-2021-22295 MISC |
harmonyos — harmonyos |
A component of the HarmonyOS has a Improper Privilege Management vulnerability. Local attackers may exploit this vulnerability to cause further Elevation of Privileges. | 2021-08-03 | not yet calculated | CVE-2021-22421 MISC |
harmonyos — harmonyos |
A component of the HarmonyOS has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause the underlying trust of the application trustlist mechanism is missing.. | 2021-08-03 | not yet calculated | CVE-2021-22420 MISC |
harmonyos — harmonyos |
A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. | 2021-08-03 | not yet calculated | CVE-2021-22418 MISC |
harmonyos — harmonyos |
A component of the HarmonyOS has a Data Processing Errors vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. | 2021-08-03 | not yet calculated | CVE-2021-22416 MISC |
hdcms — hdcms |
An arbitrary file upload vulnerability in /fileupload.php of hdcms 5.7 allows attackers to execute arbitrary code via a crafted file. | 2021-08-03 | not yet calculated | CVE-2020-19303 MISC |
hewlett_packard_enterprises — edgeline_infrastructure_management_software |
A potential security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to disclose sensitive information. HPE has made software updates available to resolve the vulnerability in the HPE Edgeline Infrastructure Manager (EIM). | 2021-08-05 | not yet calculated | CVE-2021-26586 MISC |
homekit — wireless_access_control |
A NULL pointer dereference vulnerability exists on the ecobee3 lite 4.5.81.200 device in the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to cause a denial of service, forcing the device to reboot via a crafted HTTP request. | 2021-08-03 | not yet calculated | CVE-2021-27953 MISC |
homekit — wireless_access_control |
A heap-based buffer overflow vulnerability exists on the ecobee3 lite 4.5.81.200 device in the HKProcessConfig function of the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to force the device to connect to a SSID or cause a denial of service. | 2021-08-03 | not yet calculated | CVE-2021-27954 MISC |
hotel_druid — hotel_druid |
A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands. | 2021-08-03 | not yet calculated | CVE-2021-37833 MISC MISC |
hotel_druid — hotel_druid |
A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite is being used as the application database. A malicious attacker can issue SQL commands to the SQLite database through the vulnerable idappartamenti parameter. | 2021-08-03 | not yet calculated | CVE-2021-37832 MISC MISC |
htmly — htmly |
The “blog title” field in the “Settings” menu “config” page of “dashboard” in htmly 2.8.1 has a storage cross site scripting (XSS) vulnerability. It allows remote attackers to send an authenticated post HTTP request to admin/config and inject arbitrary web script or HTML through a special website name. | 2021-08-03 | not yet calculated | CVE-2021-36703 MISC |
htmly — htmly |
The “content” field in the “regular post” page of the “add content” menu under “dashboard” in htmly 2.8.1 has a storage cross site scripting (XSS) vulnerability. It allows remote attackers to send authenticated post-http requests to add / content and inject arbitrary web scripts or HTML through special content. | 2021-08-03 | not yet calculated | CVE-2021-36702 MISC |
htmly — htmly |
In htmly version 2.8.1, is vulnerable to an Arbitrary File Deletion on the local host when delete backup files. The vulnerability may allow a remote attacker to delete arbitrary know files on the host. | 2021-08-03 | not yet calculated | CVE-2021-36701 MISC |
huawei — digital_balance |
There is a logic error vulnerability in several smartphones. The software does not properly restrict certain operation when the Digital Balance function is on. Successful exploit could allow the attacker to bypass the Digital Balance limit after a series of operations. Affected product versions include: Hulk-AL00C 9.1.1.201(C00E201R8P1);Jennifer-AN00C 10.1.1.171(C00E170R6P3);Jenny-AL10B 10.1.0.228(C00E220R5P1) and OxfordPL-AN10B 10.1.0.116(C00E110R2P1). | 2021-08-02 | not yet calculated | CVE-2021-22398 MISC |
huawei — manageone |
There is a privilege escalation vulnerability in Huawei ManageOne 8.0.0. External parameters of some files are lack of verification when they are be called. Attackers can exploit this vulnerability by performing these files to cause privilege escalation attack. This can compromise normal service. | 2021-08-02 | not yet calculated | CVE-2021-22397 MISC |
huawei — multiple_products |
There is a privilege escalation vulnerability in some Huawei products. Due to improper privilege management, a local attacker with common privilege may access some specific files in the affected products. Successful exploit will cause privilege escalation.Affected product versions include:eCNS280_TD V100R005C00,V100R005C10;eSE620X vESS V100R001C10SPC200,V100R001C20SPC200. | 2021-08-02 | not yet calculated | CVE-2021-22396 MISC |
huawei — smartphones | There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random kernel address access. | 2021-08-02 | not yet calculated | CVE-2021-22412 MISC |
huawei — smartphones |
Some Huawei Smartphones has an insufficient input validation vulnerability due to the lack of parameter validation. An attacker may trick a user into installing a malicious APP. The app can modify specific parameters, causing the system to crash. Affected product include:OxfordS-AN00A 10.0.1.10(C00E10R1P1),10.0.1.105(C00E103R3P3),10.0.1.115(C00E110R3P3),10.0.1.123(C00E121R3P3),10.0.1.135(C00E130R3P3),10.0.1.135(C00E130R4P1),10.0.1.152(C00E140R4P1),10.0.1.160(C00E160R4P1),10.0.1.167(C00E166R4P1),10.0.1.173(C00E172R5P1),10.0.1.178(C00E175R5P1) and 10.1.0.202(C00E79R5P1). | 2021-08-03 | not yet calculated | CVE-2021-22400 MISC |
huawei — smartphones |
There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 2021-08-02 | not yet calculated | CVE-2021-22413 MISC |
huawei — smartphones |
There is a Memory Buffer Errors Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 2021-08-02 | not yet calculated | CVE-2021-22414 MISC |
huawei — smartphones |
There is an Incorrect Calculation of Buffer Size Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause kernel exceptions with the code. | 2021-08-02 | not yet calculated | CVE-2021-22415 MISC |
huawei — smartphones |
There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. | 2021-08-02 | not yet calculated | CVE-2021-22428 MISC |
huawei — smartphones |
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 2021-08-02 | not yet calculated | CVE-2021-22445 MISC |
huawei — smartphones |
There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. | 2021-08-02 | not yet calculated | CVE-2021-22427 MISC |
huawei — smartphones |
There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 2021-08-02 | not yet calculated | CVE-2021-22446 MISC |
huawei — smartphones |
There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. | 2021-08-02 | not yet calculated | CVE-2021-22447 MISC |
hubs_cloud — hubs_cloud |
Hubs Cloud allows users to download shared content, specifically HTML and JS, which could allow javascript execution in the Hub Cloud instance’s primary hosting domain.*. This vulnerability affects Hubs Cloud < mozillareality/reticulum/1.0.1/20210618012634. | 2021-08-02 | not yet calculated | CVE-2021-29979 MISC MISC |
ibm — api_connect |
IBM API Connect 5.0.0.0 through 5.0.8.11 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187370. | 2021-08-04 | not yet calculated | CVE-2020-4707 CONFIRM XF |
ibm — cloud_pak_for_security |
IBM Cloud Pak for Security (CP4S) 1.5.0.0, 1.5.1.0, 1.6.0.0, 1.6.1.0, 1.7.0.0, and 1.7.1.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. | 2021-08-02 | not yet calculated | CVE-2021-29696 CONFIRM XF |
ibm — cloud_pak_for_security |
IBM Cloud Pak for Security (CP4S) 1.5.0.0, 1.5.1.0, 1.6.0.0, 1.6.1.0, 1.7.0.0, and 1.7.1.0 could allow a remote authenticated attacker to obtain sensitive information through HTTP requests that could be used in further attacks against the system. | 2021-08-02 | not yet calculated | CVE-2021-29697 CONFIRM XF |
ibm — powervm_hypervisor_fw940_and_fw950 |
IBM PowerVM Hypervisor FW940 and FW950 could allow an attacker to obtain sensitive information if they gain service access to the FSP. IBM X-Force ID: 202476. | 2021-08-04 | not yet calculated | CVE-2021-29765 CONFIRM XF |
ignitedcms — ignitedcms |
Cross Site Request Forgery (CSRF) in IgnitedCMS v1.0 allows remote attackers to obtain sensitive information and gain privilege via the component “/admin/profile/save_profile”. | 2021-08-06 | not yet calculated | CVE-2020-18694 MISC |
iobit — advanced_systemcare_ultimate | An information disclosure vulnerability exists in the the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O read requests. A specially crafted I/O request packet (IRP) can lead to privileged reads in the context of a driver which can result in sensitive information disclosure from the kernel. The IN instruction can read two bytes from the given I/O device, potentially leaking sensitive device data to unprivileged users. | 2021-08-05 | not yet calculated | CVE-2021-21791 MISC |
iobit — advanced_systemcare_ultimate |
An information disclosure vulnerability exists in the IOCTL 0x9c40a148 handling of IOBit Advanced SystemCare Ultimate 14.2.0.220. A specially crafted I/O request packet (IRP) can lead to a disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability. | 2021-08-05 | not yet calculated | CVE-2021-21785 MISC |
iobit — advanced_systemcare_ultimate |
An information disclosure vulnerability exists in the the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O read requests. A specially crafted I/O request packet (IRP) can lead to privileged reads in the context of a driver which can result in sensitive information disclosure from the kernel. The IN instruction can read two bytes from the given I/O device, potentially leaking sensitive device data to unprivileged users. | 2021-08-05 | not yet calculated | CVE-2021-21790 MISC |
iobit — advanced_systemcare_ultimate |
An information disclosure vulnerability exists in the the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O read requests. A specially crafted I/O request packet (IRP) can lead to privileged reads in the context of a driver which can result in sensitive information disclosure from the kernel. The IN instruction can read four bytes from the given I/O device, potentially leaking sensitive device data to unprivileged users. | 2021-08-05 | not yet calculated | CVE-2021-21792 MISC |
jeecg-boot_cms — jeecg-boot_cms |
A SQL injection vulnerability in /jeecg boot/sys/dict/loadtreedata of jeecg-boot CMS 2.3 allows attackers to access sensitive database information. | 2021-08-06 | not yet calculated | CVE-2020-28087 MISC |
jeecg-boot_cms — jeecg-boot_cms |
An arbitrary file upload vulnerability in /jeecg-boot/sys/common/upload of jeecg-boot CMS 2.3 allows attackers to execute arbitrary code. | 2021-08-06 | not yet calculated | CVE-2020-28088 MISC |
jetbrains — hub |
In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible. | 2021-08-06 | not yet calculated | CVE-2021-37541 MISC |
jetbrains — hub |
In JetBrains Hub before 2021.1.13389, account takeover was possible during password reset. | 2021-08-06 | not yet calculated | CVE-2021-36209 MISC |
jetbrains — hub |
In JetBrains Hub before 2021.1.13262, a potentially insufficient CSP for the Widget deployment feature was used. | 2021-08-06 | not yet calculated | CVE-2021-37540 MISC |
jetbrains — rubymine |
In JetBrains RubyMine before 2021.1.1, code execution without user confirmation was possible for untrusted projects. | 2021-08-06 | not yet calculated | CVE-2021-37543 MISC |
jetbrains — teamcity |
In JetBrains TeamCity before 2021.1, an insecure key generation mechanism for encrypted properties was used. | 2021-08-06 | not yet calculated | CVE-2021-37546 MISC |
jetbrains — teamcity |
In JetBrains TeamCity before 2020.2.4, insufficient checks during file uploading were made. | 2021-08-06 | not yet calculated | CVE-2021-37547 MISC |
jetbrains — teamcity |
In JetBrains TeamCity before 2021.1.1, insufficient authentication checks for agent requests were made. | 2021-08-06 | not yet calculated | CVE-2021-37545 MISC |
jetbrains — teamcity |
In JetBrains TeamCity before 2020.2.4, there was an insecure deserialization. | 2021-08-06 | not yet calculated | CVE-2021-37544 MISC |
jetbrains — teamcity |
In JetBrains TeamCity before 2020.2.3, XSS was possible. | 2021-08-06 | not yet calculated | CVE-2021-37542 MISC |
jetbrains — youtrack | In JetBrains YouTrack before 2021.2.17925, stored XSS was possible. | 2021-08-06 | not yet calculated | CVE-2021-37552 MISC |
jetbrains — youtrack |
In JetBrains YouTrack before 2021.3.21051, a user could see boards without having corresponding permissions. | 2021-08-06 | not yet calculated | CVE-2021-37554 MISC |
jetbrains — youtrack |
In JetBrains YouTrack before 2021.2.16363, an insecure PRNG was used. | 2021-08-06 | not yet calculated | CVE-2021-37553 MISC |
jetbrains — youtrack |
In JetBrains YouTrack before 2021.2.16363, system user passwords were hashed with SHA-256. | 2021-08-06 | not yet calculated | CVE-2021-37551 MISC |
jetbrains — youtrack |
In JetBrains YouTrack before 2021.2.16363, time-unsafe comparisons were used. | 2021-08-06 | not yet calculated | CVE-2021-37550 MISC |
jetbrains — youtrack |
In JetBrains YouTrack before 2021.1.11111, sandboxing in workflows was insufficient. | 2021-08-06 | not yet calculated | CVE-2021-37549 MISC |
jetbrains — youtrack |
In JetBrains TeamCity before 2021.1, passwords in cleartext sometimes could be stored in VCS. | 2021-08-06 | not yet calculated | CVE-2021-37548 MISC |
jump — soap |
An issue was discovered in JUMP AMS 3.6.0.04.009-2487. A JUMP SOAP endpoint permitted the listing of the content of the remote file system. This can be used to identify the complete server filesystem structure, i.e., identifying all the directories and files. | 2021-08-03 | not yet calculated | CVE-2021-32017 MISC |
jump — soap |
An issue was discovered in JUMP AMS 3.6.0.04.009-2487. The JUMP SOAP API was vulnerable to arbitrary file reading due to an improper limitation of file loading on the server filesystem, aka directory traversal. | 2021-08-03 | not yet calculated | CVE-2021-32018 MISC |
jump — soap |
An issue was discovered in JUMP AMS 3.6.0.04.009-2487. A JUMP SOAP endpoint permitted the writing of arbitrary files to a user-controlled location on the remote filesystem (with user-controlled content) via directory traversal, potentially leading to remote code and command execution. | 2021-08-03 | not yet calculated | CVE-2021-32016 MISC |
leostream — connection_broker |
** UNSUPPORTED WHEN ASSIGNED ** LeoStream Connection Broker 9.x before 9.0.34.3 allows Unauthenticated Reflected XSS via the /index.pl user parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | 2021-08-06 | not yet calculated | CVE-2021-38157 MISC MISC MISC MISC |
libcurl — libcurl |
libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`–cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name – using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake. | 2021-08-05 | not yet calculated | CVE-2021-22926 MISC |
libcurl — libcurl |
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take ‘issuercert’ into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn’t include the ‘issuer cert’ which a transfer can setto qualify how to verify the server certificate. | 2021-08-05 | not yet calculated | CVE-2021-22924 MISC |
libelfin — libelfin |
A vulnerability in the elf::section::as_strtab function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file. | 2021-08-04 | not yet calculated | CVE-2020-24826 MISC MISC |
libelfin — libelfin |
A vulnerability in the line_table::line_table function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file. | 2021-08-04 | not yet calculated | CVE-2020-24825 MISC MISC |
libelfin — libelfin |
A global buffer overflow issue in the dwarf::line_table::line_table function of Libelfin v0.3 allows attackers to cause a denial of service (DOS). | 2021-08-04 | not yet calculated | CVE-2020-24824 MISC MISC |
libelfin — libelfin |
A vulnerability in the dwarf::cursor::skip_form function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file. | 2021-08-04 | not yet calculated | CVE-2020-24821 MISC MISC |
libelfin — libelfin |
A vulnerability in the dwarf::cursor::uleb function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file. | 2021-08-04 | not yet calculated | CVE-2020-24822 MISC MISC |
libelfin — libelfin |
A vulnerability in the dwarf::to_string function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file. | 2021-08-04 | not yet calculated | CVE-2020-24823 MISC MISC |
libelfin — libelfin |
A vulnerability in the dwarf::cursor::skip_form function of Libelfin v0.3 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted ELF file. | 2021-08-04 | not yet calculated | CVE-2020-24827 MISC MISC |
libfetch — libfetch |
libfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the ‘ |