Original release date: November 8, 2021
High Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
aaptjs_project — aaptjs | An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | 2021-10-31 | 7.5 | CVE-2020-36380 MISC |
aaptjs_project — aaptjs | An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | 2021-10-31 | 7.5 | CVE-2020-36379 MISC |
aaptjs_project — aaptjs | An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | 2021-10-31 | 7.5 | CVE-2020-36376 MISC |
aaptjs_project — aaptjs | An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | 2021-10-31 | 7.5 | CVE-2020-36377 MISC |
aaptjs_project — aaptjs | An issue was discovered in the packageCmd function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | 2021-10-31 | 7.5 | CVE-2020-36378 MISC |
aaptjs_project — aaptjs | An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters. | 2021-10-31 | 7.5 | CVE-2020-36381 MISC |
aaptjs_project — aaptjs | An issue was discovered in the add function in Shenzhim AAPTJS 1.3.1 which allows attackers to execute arbitrary code via the filePath parameter. | 2021-10-31 | 7.5 | CVE-2020-26707 MISC |
apache — traffic_server | Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability in the stats-over-http plugin of Apache Traffic Server allows an attacker to overwrite memory. This issue affects Apache Traffic Server 9.1.0. | 2021-11-03 | 7.5 | CVE-2021-43082 MISC |
beckhoff — tf6100_firmware | TwinCAT OPC UA Server in TF6100 and TS6100 in product versions before 4.3.48.0 or with TcOpcUaServer versions below 3.2.0.194 are prone to a relative path traversal that allow administrators to create or delete any files on the system. | 2021-11-04 | 8.5 | CVE-2021-34594 CONFIRM |
church_management_system_project — church_management_system | Remote Code Execution (RCE) vulnerability exists in Sourcecodester Church Management System 1.0 via the image upload field. | 2021-10-29 | 7.5 | CVE-2021-41643 MISC |
cisco — anyconnect_secure_mobility_client | A vulnerability in the Network Access Manager (NAM) module of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to incorrect privilege assignment to scripts executed before user logon. An attacker could exploit this vulnerability by configuring a script to be executed before logon. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. | 2021-11-04 | 7.2 | CVE-2021-40124 CISCO |
cisco — catalyst_pon_switch_cgp-ont-1p_firmware | Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory. | 2021-11-04 | 7.5 | CVE-2021-34795 CISCO |
cisco — catalyst_pon_switch_cgp-ont-1p_firmware | Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory. | 2021-11-04 | 7.5 | CVE-2021-40113 CISCO |
cisco — ios_xr | A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system and execute them using root-level privileges. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as a user with root-level privileges. | 2021-11-04 | 9 | CVE-2021-40120 CISCO |
customer_relationship_management_system_project — customer_relationship_management_system | An SQL Injection vulnerability exists in Sourcecodester Customer Relationship Management System (CRM) 1.0 via the username parameter in customer/login.php. | 2021-11-03 | 10 | CVE-2021-43130 MISC |
dlink — dir-823g_firmware | An issue in the component /cgi-bin/upload_firmware.cgi of D-Link DIR-823G REVA1 1.02B05 allows attackers to cause a denial of service (DoS) via unspecified vectors. | 2021-11-04 | 8.5 | CVE-2020-25366 MISC MISC MISC |
dlink — dir-823g_firmware | A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the Captcha field to Login. | 2021-11-04 | 7.5 | CVE-2020-25367 MISC MISC MISC |
dotty_project — dotty | This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays. | 2021-11-03 | 7.5 | CVE-2021-23624 MISC MISC |
doyocms_project — doyocms | Arbitrary file upload vulnerability sysupload.php in millken doyocms 2.3 allows attackers to execute arbitrary code. | 2021-11-01 | 7.5 | CVE-2021-26740 MISC |
doyocms_project — doyocms | SQL Injection vulnerability in pay.php in millken doyocms 2.3, allows attackers to execute arbitrary code, via the attribute parameter. | 2021-11-01 | 7.5 | CVE-2021-26739 MISC |
duraspace — dspace | DSpace is an open source turnkey repository application. In version 7.0, any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only exists in 7.0 and does not impact 6.x or below. This issue is patched in version 7.1. As a workaround, users of 7.0 may temporarily disable the ability for community or collection administrators to manage permissions or workflows settings. | 2021-10-29 | 9 | CVE-2021-41189 MISC MISC CONFIRM MISC |
e-negosyo_system_project — e-negosyo_system | An SQL Injection vulnerability exists in Sourcecodester E-Negosyo System 1.0 via the user_email parameter in /admin/login.php. | 2021-10-29 | 7.5 | CVE-2021-41674 MISC MISC MISC |
eclipse — paho_mqtt_c/c++_client | In versions prior to 1.1 of the Eclipse Paho MQTT C Client, the client does not check rem_len size in readpacket. | 2021-11-03 | 7.5 | CVE-2021-41036 CONFIRM |
ed01-cms_project — ed01-cms | ED01-CMS v1.0 was discovered to contain a SQL injection in the component cposts.php via the cid parameter. | 2021-11-03 | 7.5 | CVE-2020-18262 MISC |
ed01-cms_project — ed01-cms | An arbitrary file upload vulnerability in the image upload function of ED01-CMS v1.0 allows attackers to execute arbitrary commands. | 2021-11-03 | 7.5 | CVE-2020-18261 MISC |
ericsson — network_location_mps_gmpc21 | In Ericsson Network Location MPS GMPC21, it is possible to inject commands via file_name in the export functionality. | 2021-11-03 | 7.5 | CVE-2021-43339 MISC MISC |
eyoucms — eyoucms | SQL Injection vulnerability in eyoucms cms v1.4.7, allows attackers to execute arbitrary code and disclose sensitive information, via the tid parameter to index.php. | 2021-11-03 | 7.5 | CVE-2020-24000 MISC |
fortinet — forticlient | An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates. | 2021-11-02 | 7.2 | CVE-2021-36183 CONFIRM |
fortinet — fortiweb | A stack-based buffer overflow in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests | 2021-11-02 | 7.5 | CVE-2021-36186 CONFIRM |
hp — futuresmart_3 | Certain HP Enterprise LaserJet, HP LaserJet Managed, HP Enterprise PageWide, HP PageWide Managed products may be vulnerable to potential buffer overflow. | 2021-11-03 | 7.5 | CVE-2021-39238 MISC |
hp — ilo_amplifier_pack | A remote unauthenticated directory traversal security vulnerability has been identified in HPE iLO Amplifier Pack versions 1.80, 1.81, 1.90 and 1.95. The vulnerability could be remotely exploited to allow an unauthenticated user to run arbitrary code leading complete impact to confidentiality, integrity, and availability of the iLO Amplifier Pack appliance. | 2021-11-01 | 10 | CVE-2021-29212 MISC MISC |
hp — laserjet_pro_j8h60a_firmware | Potential security vulnerabilities have been discovered on a certain HP LaserJet Pro printer that may allow a Denial of Service on the device. | 2021-11-01 | 7.8 | CVE-2021-3704 MISC |
hp — laserjet_pro_j8h61a_firmware | Potential security vulnerabilities have been discovered on a certain HP LaserJet Pro printer that may allow an unauthorized user to reconfigure, reset the device. | 2021-11-01 | 10 | CVE-2021-3705 MISC |
hpe — proliant_microserver_gen10_plus_firmware | A potential local bypass of security restrictions vulnerability has been identified in HPE ProLiant DL20 Gen10, HPE ProLiant ML30 Gen10, and HPE ProLiant MicroServer Gen10 Plus server’s system ROMs prior to version 2.52. The vulnerability could be locally exploited to cause disclosure of sensitive information, denial of service (DoS), and/or compromise system integrity. | 2021-11-01 | 7.2 | CVE-2021-29213 MISC |
json-ptr_project — json-ptr | This affects the package json-ptr before 3.0.0. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays. | 2021-11-03 | 7.5 | CVE-2021-23509 MISC MISC MISC MISC MISC |
jsonpointer_project — jsonpointer | This affects all versions of package json-pointer. A type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays. | 2021-11-03 | 7.5 | CVE-2021-23820 MISC MISC MISC |
jsonpointer_project — jsonpointer | This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. | 2021-11-03 | 7.5 | CVE-2021-23807 MISC MISC MISC MISC |
linux — linux_kernel | An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type. | 2021-11-02 | 7.5 | CVE-2021-43267 MISC MISC FEDORA FEDORA |
linux_network_project — linux_network_project | Buffer overflow vulnerability in Renleilei1992 Linux_Network_Project 1.0, allows attackers to execute arbitrary code, via the password field. | 2021-11-03 | 7.5 | CVE-2020-23679 MISC |
mahara — mahara | In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, the account associated with a web services token is vulnerable to being exploited and logged into, resulting in information disclosure (at a minimum) and often escalation of privileges. | 2021-11-03 | 7.5 | CVE-2021-40849 MISC MISC |
online_food_ordering_system_project — online_food_ordering_system | Remote Code Exection (RCE) vulnerability exists in Sourcecodester Online Food Ordering System 2.0 via a maliciously crafted PHP file that bypasses the image upload filters. | 2021-10-29 | 7.5 | CVE-2021-41644 MISC |
online_reviewer_system_project — online_reviewer_system | Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters.. | 2021-10-29 | 7.5 | CVE-2021-41646 MISC |
pharmacy_point_of_sale_system_project — pharmacy_point_of_sale_system | An SQL Injection vulnerabilty exists in the oretnom23 Pharmacy Point of Sale System 1.0 in the login function in actions.php. | 2021-10-29 | 7.5 | CVE-2021-41676 MISC MISC |
phone_shop_sales_management_system_project — phone_shop_sales_management_system | Phone Shop Sales Managements System using PHP with Source Code 1.0 is vulnerable to authentication bypass which leads to account takeover of the admin. | 2021-11-02 | 7.5 | CVE-2021-36560 MISC MISC |
phpok — phpok | Buffer overflow vulnerability in framework/init.php in qinggan phpok 5.1, allows attackers to execute arbitrary code. | 2021-11-02 | 7.5 | CVE-2020-18440 MISC |
simple_cashiering_system_project — simple_cashiering_system | Multiple SQL Injection vulnerabilities exist in Sourcecodester Simple Cashiering System (POS) 1.0 via the (1) Product Code in the pos page in cashiering. (2) id parameter in manage_products and the (3) t paramater in actions.php. | 2021-11-03 | 7.5 | CVE-2021-41492 MISC |
simple_subscription_website_project — simple_subscription_website | SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login. | 2021-11-03 | 7.5 | CVE-2021-43140 MISC |
spacewalk_project — spacewalk | Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn’t sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use –option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1. | 2021-11-01 | 9.3 | CVE-2021-40348 MISC CONFIRM |
symonics — libmysofa | libmysofa is vulnerable to Heap-based Buffer Overflow | 2021-10-29 | 7.5 | CVE-2021-3756 MISC CONFIRM |
tendacn — ac10u_firmware | Stack-based buffer overflow in Tenda AC-10U AC1200 Router US_AC10UV1.0RTL_V15.03.06.48_multi_TDE01 allows remote attackers to execute arbitrary code via the timeZone parameter to goform/SetSysTimeCfg. | 2021-10-29 | 7.5 | CVE-2020-22079 MISC MISC |
thunderdome — planning_poker | Thunderdome is an open source agile planning poker tool in the theme of Battling for points. In affected versions there is an LDAP injection vulnerability which affects instances with LDAP authentication enabled. The provided username is not properly escaped. This issue has been patched in version 1.16.3. If users are unable to update they should disable the LDAP feature if in use. | 2021-11-02 | 7.5 | CVE-2021-41232 CONFIRM MISC MISC |
unicode — unicode | An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logical ordering of tokens ingested by compilers and interpreters. Adversaries can leverage this to encode source code for compilers accepting Unicode such that targeted vulnerabilities are introduced invisibly to human reviewers. | 2021-11-01 | 7.5 | CVE-2021-42574 MISC MISC MLIST MLIST MLIST MLIST MLIST FEDORA FEDORA |
unicode — unicode | An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies invoked deceptively in downstream software. | 2021-11-01 | 7.5 | CVE-2021-42694 MISC MISC MLIST MLIST |
vtimecn — 188jianzhan | SQL Injection vulnerability in 188Jianzhan v2.1.0, allows attackers to execute arbitrary code and gain escalated privileges, via the username parameter to login.php. | 2021-11-02 | 7.5 | CVE-2020-23685 MISC |
zohocorp — manageengine_applications_manager | An issue was found in /showReports.do Zoho ManageEngine Applications Manager up to 14550, allows attackers to gain escalated privileges via the resourceid parameter. | 2021-11-03 | 7.5 | CVE-2020-24743 MISC |
zohocorp — manageengine_log360 | ManageEngine Log360 Builds < 5235 are affected by an improper access control vulnerability allowing database configuration overwrite. An unauthenticated remote attacker can send a specially crafted message to Log360 to change its backend database to an attacker-controlled database and to force Log360 to restart. An attacker can leverage this vulnerability to achieve remote code execution by replacing files executed by Log360 on startup. | 2021-11-01 | 7.5 | CVE-2021-20136 MISC |
Medium Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
akka — http_server | Akka HTTP 10.1.x and 10.2.x before 10.2.7 can encounter stack exhaustion while parsing HTTP headers, which allows a remote attacker to conduct a Denial of Service attack by sending a User-Agent header with deeply nested comments. | 2021-11-02 | 5 | CVE-2021-42697 MISC MISC MISC |
alibaba — druid | In Druid 1.2.3, visiting the path with parameter in a certain function can lead to directory traversal. | 2021-11-03 | 5 | CVE-2021-33800 MISC |
antennahouse — office_server_document_converter | Office Server Document Converter V7.2MR4 and earlier and V7.1MR7 and earlier allows a remote unauthenticated attacker to conduct an XML External Entity (XXE) attack to cause a denial of service (DoS) condition by processing a specially crafted XML document. | 2021-11-01 | 5 | CVE-2021-20838 MISC MISC |
antennahouse — office_server_document_converter | Office Server Document Converter V7.2MR4 and earlier and V7.1MR7 and earlier allows a remote unauthenticated attacker to conduct an XML External Entity (XXE) attack to cause a denial of service (DoS) condition to the other servers by processing a specially crafted XML document. | 2021-11-01 | 4.3 | CVE-2021-20839 MISC MISC |
apache — dolphinscheduler | In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password) | 2021-11-01 | 6 | CVE-2021-27644 MISC MLIST MLIST |
apache — mina | In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater. | 2021-11-01 | 4.3 | CVE-2021-41973 MISC MLIST MLIST |
apache — traffic_server | Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.0.1. | 2021-11-03 | 5 | CVE-2021-37148 MISC |
apache — traffic_server | Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0. | 2021-11-03 | 5 | CVE-2021-37147 MISC |
apache — traffic_server | Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0. | 2021-11-03 | 5 | CVE-2021-37149 MISC |
apache — traffic_server | Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0. | 2021-11-03 | 5 | CVE-2021-41585 MISC |
apache — traffic_server | Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8. | 2021-11-03 | 6.8 | CVE-2021-38161 MISC |
artica — pandora_fms | With an admin account, the .htaccess file in Artica Pandora FMS <=755 can be overwritten with the File Manager component. The new .htaccess file contains a Rewrite Rule with a type definition. A normal PHP file can be uploaded with this new “file type” and the code can be executed with an HTTP request. | 2021-11-03 | 4.6 | CVE-2021-36697 MISC MISC MISC |
atlassian — data_center | Affected versions of Atlassian Jira Server and Data Center allow a remote attacker who has had their access revoked from Jira Service Management to enable and disable Issue Collectors on Jira Service Management projects via an Improper Authentication vulnerability in the /secure/ViewCollectors endpoint. The affected versions are before version 8.19.1. | 2021-11-03 | 5 | CVE-2021-41312 MISC |
atlassian — jira_software_data_center | Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.21.0. | 2021-11-01 | 4 | CVE-2021-41313 N/A |
atlassian — jira_software_data_center | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Associated Projects feature (/secure/admin/AssociatedProjectsForCustomField.jspa). The affected versions are before version 8.5.19, from version 8.6.0 before 8.13.11, and from version 8.14.0 before 8.19.1. | 2021-11-01 | 4.3 | CVE-2021-41310 MISC |
automatorwp — automatorwp | The AutomatorWP WordPress plugin before 1.7.6 does not perform capability checks which allows users with Subscriber roles to enumerate automations, disclose title of private posts or user emails, call functions, or perform privilege escalation via Ajax actions. | 2021-11-01 | 6.5 | CVE-2021-24717 MISC |
baijiacms_project — baijiacms | A directory traversal vulnerability in the component system/manager/class/web/database.php was discovered in Baijiacms V4 which allows attackers to arbitrarily delete folders on the server via the “id” parameter. | 2021-10-29 | 4 | CVE-2020-25873 MISC |
bootstrap_table_project — bootstrap_table | This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set. | 2021-11-03 | 4.3 | CVE-2021-23472 MISC MISC MISC MISC MISC MISC |
budget_and_expense_tracker_system_project — budget_and_expense_tracker_system | Remote Code Execution (RCE) vulnerability exists in Sourcecodester Budget and Expense Tracker System 1.0 that allows a remote malicious user to inject arbitrary code via the image upload field. . | 2021-10-29 | 6.5 | CVE-2021-41645 MISC |
c-http_project — c-http | Buffer overflow vulnerability in YotsuyaNight c-http v0.1.0, allows attackers to cause a denial of service via a long url request which is passed to the delimitedread function. | 2021-11-02 | 5 | CVE-2020-21574 MISC |
chamilo — chamilo_lms | Chamilo LMS version 1.11.10 contains an XSS vulnerability in the personal profile edition form, affecting the user him/herself and social network friends. | 2021-11-03 | 4.3 | CVE-2020-23126 MISC |
cisco — catalyst_pon_switch_cgp-ont-1p_firmware | Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory. | 2021-11-04 | 5 | CVE-2021-40112 CISCO |
cisco — collaboration_meeting_rooms | A vulnerability in the web-based management interface of Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the URL parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. Attackers may use this type of vulnerability, known as an open redirect attack, as part of a phishing attack to persuade users to unknowingly visit malicious sites. | 2021-11-04 | 5.8 | CVE-2021-1500 CISCO |
cisco — collaboration_meeting_rooms | A vulnerability in Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. | 2021-11-04 | 4.3 | CVE-2021-40115 CISCO |
cisco — common_services_platform_collector | A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to access sensitive data on an affected system. This vulnerability exists because the application does not sufficiently protect sensitive data when responding to a specific API request. An attacker could exploit the vulnerability by sending a crafted HTTP request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the users of the application, including security questions and answers. To exploit this vulnerability an attacker would need valid Administrator credentials. Cisco expects to release software updates that address this vulnerability. | 2021-11-04 | 4 | CVE-2021-34774 CISCO |
cisco — umbrella | A vulnerability in the web-based dashboard of Cisco Umbrella could allow an authenticated, remote attacker to perform an email enumeration attack against the Umbrella infrastructure. This vulnerability is due to an overly descriptive error message on the dashboard that appears when a user attempts to modify their email address when the new address already exists in the system. An attacker could exploit this vulnerability by attempting to modify the user’s email address. A successful exploit could allow the attacker to enumerate email addresses of users in the system. | 2021-11-04 | 4 | CVE-2021-40126 CISCO |
cisco — unified_communications_manager | A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected device. This vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. These actions could include modifying the device configuration and deleting (but not creating) user accounts. | 2021-11-04 | 4.3 | CVE-2021-34773 CISCO |
cisco — unified_communications_manager | A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an authenticated, remote attacker to access sensitive data on an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system. | 2021-11-04 | 4 | CVE-2021-34701 CISCO |
cisco — webex_meetings | A vulnerability in the account activation feature of Cisco Webex Meetings could allow an unauthenticated, remote attacker to send an account activation email with an activation link that points to an arbitrary domain. This vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by sending a crafted HTTP request to the account activation page of Cisco Webex Meetings. A successful exploit could allow the attacker to send to any recipient an account activation email that contains a tampered activation link, which could direct the user to an attacker-controlled website. | 2021-11-04 | 5 | CVE-2021-40128 CISCO |
connections-pro — connections_business_directory | The Connections Business Directory WordPress plugin before 9.7 does not validate or sanitise some connections’ fields, which could lead to a CSV injection issue | 2021-11-01 | 6 | CVE-2020-36503 MISC MISC |
d-link — dir-868lw_firmware | Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to obtain users’ DNS query history. | 2021-10-31 | 5 | CVE-2021-33259 MISC MISC MISC MISC |
datalust — seq.app.emailplus | Datalust Seq.App.EmailPlus (aka seq-app-htmlemail) 3.1.0-dev-00148, 3.1.0-dev-00170, and 3.1.0-dev-00176 can use cleartext SMTP on port 25 in some cases where encryption on port 465 was intended. | 2021-11-02 | 5 | CVE-2021-43270 MISC |
delete_all_comments_easily_project — delete_all_comments_easily | The Delete All Comments Easily WordPress plugin through 1.3 is lacking Cross-Site Request Forgery (CSRF) checks, which could result in an unauthenticated attacker making a logged in admin delete all comments from the blog. | 2021-11-01 | 4.3 | CVE-2020-36505 MISC MISC |
deltaww — dialink | Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an attacker to be positioned between the traffic and perform a machine-in-the-middle attack to access information without authorization. | 2021-11-03 | 4.3 | CVE-2021-38418 MISC |
deltaww — dialink | Delta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, which may allow an attacker to have extensive access to the application directory and escalate privileges. | 2021-11-03 | 4.6 | CVE-2021-38422 MISC |
deltaww — dialink | The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application. | 2021-11-03 | 6.8 | CVE-2021-38424 MISC |
deltaww — dialink | Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files. | 2021-11-03 | 4.6 | CVE-2021-38420 MISC |
deltaww — dialink | Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an attacker to use DLL hijacking and takeover the system where the software is installed. | 2021-11-03 | 4.4 | CVE-2021-38416 MISC |
dhis2 — dhis_2 | DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL injection security vulnerability has been found in specific versions of DHIS2. This vulnerability affects the API endpoints for /api/trackedEntityInstances and api/events in DHIS2. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. However, we strongly recommend that all DHIS2 implementations using versions 2.32, 2.33, 2.34, 2.35 and 2.36 install these patches as soon as possible. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the /api/trackedEntityInstance and /api/events endpoints as a temporary workaround while waiting to upgrade. | 2021-11-01 | 6.5 | CVE-2021-41187 CONFIRM |
dhis2 — dhis_2 | DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL Injection vulnerability in the Tracker component in DHIS2 Server allows authenticated remote attackers to execute arbitrary SQL commands via unspecified vectors. This vulnerability affects the `/api/trackedEntityInstances` and `/api/trackedEntityInstances/query` API endpoints in all DHIS2 versions 2.34, 2.35, and 2.36. It also affects versions 2.32 and 2.33 which have reached _end of support_ – exceptional security updates have been added to the latest *end of support* builds for these versions. Versions 2.31 and older are unaffected. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. The vulnerability is not exposed to a non-malicious user – the vulnerability requires a conscious attack to be exploited. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. Security patches are available in DHIS2 versions 2.32-EOS, 2.33-EOS, 2.34.7, 2.35.7, and 2.36.4. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the `/api/trackedEntityInstances`, and `/api/trackedEntityInstances/query` endpoints as a temporary workaround while waiting to upgrade. | 2021-10-29 | 6.5 | CVE-2021-39179 CONFIRM MISC MISC |
e-negosyo_system_project — e-negosyo_system | A Remote Code Execution (RCE) vulnerabilty exists in Sourcecodester E-Negosyo System 1.0 in /admin/produts/controller.php via the doInsert function, which validates images with getImageSizei. . | 2021-10-29 | 6.5 | CVE-2021-41675 MISC |
ec_cloud_e-commerce_system_project — ec_cloud_e-commerce_system | EC Cloud E-Commerce System v1.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add admin accounts via /admin.html?do=user&act=add. | 2021-11-04 | 4.3 | CVE-2020-21139 MISC |
ed01-cms_project — ed01-cms | ED01-CMS v1.0 was discovered to contain a reflective cross-site scripting (XSS) vulnerability in the component sposts.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload inserted into the Post title or Post content fields. | 2021-11-03 | 4.3 | CVE-2020-18259 MISC |
elkarbackup — elkarbackup | Cross Site Scripting (XSS) vulnerability in ElkarBackup 1.3.3, allows attackers to execute arbitrary code via the name parameter to the add client feature. | 2021-11-02 | 4.3 | CVE-2020-35249 MISC |
ericsson — network_location_mps_gmpc21 | In Ericsson Network Location MPS GMPC21, it is possible to creates a new admin user with a SQL Query for file_name in the export functionality. | 2021-11-03 | 6.5 | CVE-2021-43338 MISC MISC |
fimer — aurora_vision | An issue was discovered in Fimer Aurora Vision before 2.97.10. An attacker can (in the WebUI) obtain plant information without authentication by reading the response of APIs from a kiosk view of a plant. | 2021-11-03 | 4.3 | CVE-2021-33210 MISC MISC |
fimer — aurora_vision | An issue was discovered in Fimer Aurora Vision before 2.97.10. The response to a failed login attempt discloses whether the username or password is wrong, helping an attacker to enumerate usernames. This can make a brute-force attack easier. | 2021-11-03 | 5 | CVE-2021-33209 MISC MISC |
flat_preloader_project — flat_preloader | The Flat Preloader WordPress plugin before 1.5.4 does not enforce nonce checks when saving its settings, as well as does not sanitise and escape them, which could allow attackers to a make logged in admin change them with a Cross-Site Scripting payload (triggered either in the frontend or backend depending on the payload) | 2021-11-01 | 5 | CVE-2021-24685 MISC |
fluentd — fluentd | Fluentd collects events from various data sources and writes them to files to help unify logging infrastructure. The parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack. This issue is patched in version 1.14.2 There are two workarounds available. Either don’t use parser_apache2 for parsing logs (which cannot guarantee generated by Apache), or put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `–plugin` option of fluentd). | 2021-10-29 | 5 | CVE-2021-41186 MISC MISC CONFIRM |
fortinet — fortiadc | A cleartext storage of sensitive information in GUI in FortiADC versions 5.4.3 and below, 6.0.0 and below may allow a remote authenticated attacker to retrieve some sensitive information such as users LDAP passwords and RADIUS shared secret by deobfuscating the passwords entry fields. | 2021-11-02 | 4 | CVE-2020-15935 CONFIRM |
fortinet — fortimanager | An improper access control vulnerability [CWE-284] in FortiManager versions 6.4.4 and 6.4.5 may allow an authenticated attacker with a restricted user profile to modify the VPN tunnel status of other VDOMs using VPN Manager. | 2021-11-02 | 4 | CVE-2021-26107 CONFIRM MISC |
fortinet — fortios | An improper validation of certificate with host mismatch [CWE-297] vulnerability in FortiOS versions 6.4.6 and below may allow the connection to a malicious LDAP server via options in GUI, leading to disclosure of sensitive information, such as AD credentials. | 2021-11-02 | 4.3 | CVE-2021-41019 CONFIRM |
fortinet — fortiportal | Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests. | 2021-11-02 | 4 | CVE-2021-32595 CONFIRM |
fortinet — fortiportal | An improper restriction of XML external entity reference vulnerability in the parser of XML responses of FortiPortal before 6.0.6 may allow an attacker who controls the producer of XML reports consumed by FortiPortal to trigger a denial of service or read arbitrary files from the underlying file system by means of specifically crafted XML documents. | 2021-11-02 | 6.4 | CVE-2021-36172 CONFIRM |
fortinet — fortiportal | Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests. | 2021-11-02 | 4.3 | CVE-2021-36176 CONFIRM |
fortinet — fortiportal | A memory allocation with excessive size value vulnerability in the license verification function of FortiPortal before 6.0.6 may allow an attacker to perform a denial of service attack via specially crafted license blobs. | 2021-11-02 | 5 | CVE-2021-36174 CONFIRM |
fortinet — fortisiem | A improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts | 2021-11-02 | 4.6 | CVE-2021-41022 CONFIRM |
fortinet — fortiweb | A uncontrolled resource consumption in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to cause a denial of service for webserver daemon via crafted HTTP requests | 2021-11-02 | 5 | CVE-2021-36187 CONFIRM |
fortinet — fortiwlm | A improper neutralization of Special Elements used in an SQL Command (‘SQL Injection’) in Fortinet FortiWLM version 8.6.1 and below allows attacker to disclosure device, users and database information via crafted HTTP requests. | 2021-11-02 | 4 | CVE-2021-36184 CONFIRM |
fortinet — fortiwlm | A improper neutralization of special elements used in an OS command (‘OS Command Injection’) in Fortinet FortiWLM version 8.6.1 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests. | 2021-11-02 | 6.5 | CVE-2021-36185 CONFIRM |
frogcms_project — frogcms | A vulnerability exists within the FileManagerController.php function in FrogCMS 0.9.5 which allows an attacker to perform a directory traversal attack via a GET request urlencode parameter. | 2021-10-29 | 4 | CVE-2020-25872 MISC |
getsymphony — symphony | A XML External Entity (XXE) vulnerability was discovered in symphonylibtoolkitclass.xmlelement.php in Symphony 2.7.10 which can lead to an information disclosure or denial of service (DOS). | 2021-10-31 | 6.4 | CVE-2020-25912 MISC MISC |
gilcc_project — gilcc | Buffer overflow vulnerability in function src_parser_trans_stage_1_2_3 trgil gilcc before commit 803969389ca9c06237075a7f8eeb1a19e6651759, allows attackers to cause a denial of service. | 2021-11-02 | 5 | CVE-2020-21572 MISC MISC |
google — angle | Out of bounds read in ANGLE allowed a remote attacker to obtain sensitive data via a crafted HTML page. | 2021-11-02 | 4.3 | CVE-2020-16048 MISC |
google — chrome | Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows. | 2021-11-02 | 4.3 | CVE-2021-37980 MISC MISC FEDORA |
google — chrome | Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page. | 2021-11-02 | 4.3 | CVE-2021-37989 MISC MISC |
google — chrome | Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | 2021-11-02 | 4.3 | CVE-2021-37994 MISC MISC |
google — chrome | Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | 2021-11-02 | 4.3 | CVE-2021-37995 MISC MISC |
google — chrome | Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file. | 2021-11-02 | 4.3 | CVE-2021-37996 MISC MISC |
google — chrome | Insufficient policy enforcement in USB in Google Chrome on Windows prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. | 2021-11-02 | 4.3 | CVE-2018-6125 MISC |
google — chrome | Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app. | 2021-11-02 | 4.3 | CVE-2021-37990 MISC MISC |
google — chrome | Type confusion in WebAssembly in Google Chrome prior to 66.0.3359.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2018-6122 MISC |
google — chrome | Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37982 MISC MISC |
google — chrome | Heap buffer overflow in Blink in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37978 MISC MISC FEDORA |
google — chrome | Use after free in Dev Tools in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37983 MISC MISC |
google — chrome | Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37984 MISC MISC |
google — chrome | Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 5.1 | CVE-2021-37991 MISC MISC |
google — chrome | Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37985 MISC MISC |
google — chrome | Heap buffer overflow in Skia in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37981 MISC MISC |
google — chrome | Heap buffer overflow in Settings in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to engage with Dev Tools to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37986 MISC MISC |
google — chrome | Use after free in Garbage Collection in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37977 MISC MISC FEDORA |
google — chrome | Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37987 MISC MISC |
google — chrome | Use after free in Profiles in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who convinced a user to engage in specific gestures to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37988 MISC MISC |
google — chrome | Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37992 MISC MISC |
google — chrome | Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37993 MISC MISC |
google — chrome | Use after free in ANGLE in Google Chrome prior to 83.0.4103.97 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2020-6492 MISC MISC |
google — chrome | heap buffer overflow in WebRTC in Google Chrome prior to 94.0.4606.81 allowed a remote attacker who convinced a user to browse to a malicious website to potentially exploit heap corruption via a crafted HTML page. | 2021-11-02 | 6.8 | CVE-2021-37979 MISC MISC FEDORA |
grafana — grafana | Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim’s browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(‘alert(1)’)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path. | 2021-11-03 | 4.3 | CVE-2021-41174 MISC MISC MISC CONFIRM |
hangfire — hangfire | Hangfire is an open source system to perform background job processing in a .NET or .NET Core applications. No Windows Service or separate process required. Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings. However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed. If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted. If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted. Patched versions (1.7.26) are available both on Nuget.org and as a tagged release on the github repo. Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue. For users who are unable to upgrade it is possible to mitigate the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI. | 2021-11-02 | 5 | CVE-2021-41238 MISC CONFIRM |
hashthemes — hashthemes_demo_importer | The Hashthemes Demo Importer Plugin <= 1.1.1 for WordPress contained several AJAX functions which relied on a nonce which was visible to all logged-in users for access control, allowing them to execute a function that truncated nearly all database tables and removed the contents of wp-content/uploads. | 2021-11-01 | 5.5 | CVE-2021-39333 MISC |
hp — hp_smart | HP Print and Scan Doctor, an application within the HP Smart App for Windows, is potentially vulnerable to local elevation of privilege. | 2021-11-01 | 4.6 | CVE-2021-3440 MISC |
hp — print_and_scan_doctor | HP Print and Scan Doctor may potentially be vulnerable to local elevation of privilege. | 2021-11-03 | 4.6 | CVE-2020-6931 MISC |
htmldoc_project — htmldoc | Buffer overflow vulnerability in htmldoc before 1.9.12, allows attackers to cause a denial of service via a crafted BMP image to image_load_bmp. | 2021-11-03 | 4.3 | CVE-2021-40985 MISC MISC |
ibm — infosphere_information_server | IBM InfoSphere Information Server 11.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 207123. | 2021-11-02 | 6.8 | CVE-2021-29888 XF CONFIRM |
ibm — infosphere_information_server | IBM InfoSphere Data Flow Designer (IBM InfoSphere Information Server 11.7 ) is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 201302. | 2021-11-02 | 5.5 | CVE-2021-29738 XF CONFIRM |
ibm — infosphere_information_server | IBM InfoSphere Information Server 11.7 could allow an attacker to obtain sensitive information due to a insecure third party domain access vulnerability. IBM X-Force ID: 206572. | 2021-11-02 | 5 | CVE-2021-29875 XF CONFIRM |
ibm — infosphere_information_server | IBM InfoSphere Data Flow Designer Engine (IBM InfoSphere Information Server 11.7 ) component has improper validation of the REST API server certificate. IBM X-Force ID: 201301. | 2021-11-02 | 5 | CVE-2021-29737 XF CONFIRM |
ibm — infosphere_information_server | IBM InfoSphere Information Server 11.7 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 211402. | 2021-11-02 | 6.4 | CVE-2021-38948 CONFIRM XF |
image-processing_project — image-processing | An issue was discoverered in in abhijitnathwani image-processing v0.1.0, allows local attackers to cause a denial of service via a crafted image file. | 2021-11-02 | 4.3 | CVE-2020-21573 MISC |
imagesourcecontrol — image_source_control | The Image Source Control WordPress plugin before 2.3.1 allows users with a role as low as Contributor to change arbitrary post meta fields of arbitrary posts (even those they should not be able to edit) | 2021-11-01 | 4 | CVE-2021-24781 MISC CONFIRM |
jenkins — jenkins | The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo). | 2021-11-04 | 5 | CVE-2021-21688 CONFIRM |
kodi — kodi | Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream. | 2021-11-01 | 4.3 | CVE-2021-42917 MISC MISC MISC MISC |
kubernetes — ingress-nginx | A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the custom snippets feature to obtain all secrets in the cluster. | 2021-10-29 | 5.5 | CVE-2021-25742 MLIST CONFIRM |
learndash — learndash | The LearnDash LMS WordPress plugin before 2.5.4 does not have any authorisation and validation of the file to be uploaded in the learndash_assignment_process_init() function, which could allow unauthenticated users to upload arbitrary files to the web server | 2021-11-01 | 5 | CVE-2018-25019 MISC MISC |
libiec_iccp_mod_project — libiec_iccp_mod | Buffer overflow vulnerability in fcovatti libiec_iccp_mod v1.5, allows attackers to cause a denial of service via an unexpected packet while trying to connect. | 2021-11-02 | 5 | CVE-2020-20657 MISC |
libiec_iccp_mod_project — libiec_iccp_mod | Buffer overflow vulnerability in fcovatti libiec_iccp_mod v1.5, allows attackers to cause a denail of service when trying to calloc an unexpectiedly large space. | 2021-11-02 | 5 | CVE-2020-20658 MISC |
librenms — librenms | LibreNMS through 21.10.2 allows XSS via a widget title. | 2021-11-03 | 4.3 | CVE-2021-43324 MISC |
libxls_project — libxls | An issue was discoverered in in function xls_getWorkSheet in xls.c in libxls 1.6.2, allows attackers to cause a denial of service, via a crafted XLS file. | 2021-11-03 | 4.3 | CVE-2021-27836 MISC |
linux — linux_kernel | A vulnerability was found in Linux kernel, where a use-after-frees in nouveau’s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if “unbind” the driver). | 2021-11-03 | 4.7 | CVE-2020-27820 MISC MISC MISC MISC |
linux — linux_kernel | Insufficient data validation in waitid allowed an user to escape sandboxes on Linux. | 2021-11-02 | 4.6 | CVE-2017-5123 MISC MISC |
llhttp — llhttp | The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk extensions when parsing the body of chunked requests. This leads to HTTP Request Smuggling (HRS) under certain conditions. | 2021-11-03 | 5.8 | CVE-2021-22960 MISC |
mahara — mahara | In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, exporting collections via PDF export could lead to code execution via shell metacharacters in a collection name. | 2021-11-02 | 4.6 | CVE-2021-43266 MISC MISC |
mahara — mahara | In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, exported CSV files could contain characters that a spreadsheet program could interpret as a command, leading to execution of a malicious string locally on a device, aka CSV injection. | 2021-11-03 | 6.8 | CVE-2021-40848 MISC MISC |
mcafee — data_loss_prevention_endpoint | SQL injection vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.7.100 allows a remote attacker logged into ePO as an administrator to inject arbitrary SQL into the ePO database through the user management section of the DLP ePO extension. | 2021-11-01 | 6.5 | CVE-2021-31849 MISC |
modx — modx_revolution | A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS). | 2021-10-31 | 6.4 | CVE-2020-25911 MISC MISC |
mozilla — firefox | Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2. | 2021-11-03 | 4.3 | CVE-2021-38497 MISC MISC MISC MISC |
mozilla — firefox | Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox < 91.0.1 and Thunderbird < 91.0.1. | 2021-11-03 | 5.8 | CVE-2021-29991 MISC MISC |
mozilla — firefox | Firefox for Android allowed navigations through the `intent://` protocol, which could be used to cause crashes and UI spoofs. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92. | 2021-11-03 | 5.8 | CVE-2021-29993 MISC MISC |
mozilla — firefox | Mixed-content checks were unable to analyze opaque origins which led to some mixed content being loaded. This vulnerability affects Firefox < 92. | 2021-11-03 | 4.3 | CVE-2021-38491 MISC MISC |
mozilla — firefox | During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93. | 2021-11-03 | 6.8 | CVE-2021-38496 MISC MISC MISC MISC MISC MISC |
mozilla — firefox | Mozilla developers reported memory safety bugs present in Firefox 92. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93. | 2021-11-03 | 6.8 | CVE-2021-38499 MISC MISC |
mozilla — firefox | Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93. | 2021-11-03 | 6.8 | CVE-2021-38500 MISC MISC MISC MISC MISC MISC |
mozilla — firefox | When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1. | 2021-11-03 | 4.3 | CVE-2021-38492 MISC MISC MISC MISC MISC MISC |
mozilla — firefox | Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.14, Thunderbird < 78.14, and Firefox < 92. | 2021-11-03 | 6.8 | CVE-2021-38493 MISC MISC MISC MISC |
mozilla — firefox | Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2. | 2021-11-03 | 6.8 | CVE-2021-38501 MISC MISC MISC MISC |
mozilla — firefox | Mozilla developers reported memory safety bugs present in Firefox 91. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 92. | 2021-11-03 | 6.8 | CVE-2021-38494 MISC MISC |
mozilla — firefox | During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2. | 2021-11-03 | 5 | CVE-2021-38498 MISC MISC MISC MISC |
mozilla — firefox_esr | Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.1 and Firefox ESR < 91.1. | 2021-11-03 | 6.8 | CVE-2021-38495 MISC MISC MISC |
mozilla — thunderbird | Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2. | 2021-11-03 | 4.3 | CVE-2021-38502 MISC MISC |
mybb — mybb | MyBB before 1.8.29 allows Remote Code Injection by an admin with the “Can manage settings?” permission. The Admin CP’s Settings management module does not validate setting types correctly on insertion and update, making it possible to add settings of supported type “php” with PHP code, executed on Change Settings pages. | 2021-11-04 | 6.5 | CVE-2021-43281 CONFIRM |
navercorp — whale | Whale browser for iOS before 1.14.0 has an inconsistent user interface issue that allows an attacker to obfuscate the address bar which may lead to address bar spoofing. | 2021-11-02 | 5 | CVE-2021-33593 CONFIRM |
netapp — ontap_system_manager | Clustered Data ONTAP versions 9.6 and higher prior to 9.6P16, 9.7P16, 9.8P7 and 9.9.1P3 are susceptible to a vulnerability which could allow a remote attacker to cause a crash of the httpd server. | 2021-11-01 | 5 | CVE-2021-27005 MISC |
nextscripts — social_networks_auto_poster | The NextScripts: Social Networks Auto-Poster <= 4.3.20 WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the $_REQUEST[‘page’] parameter which is echoed out on inc/nxs_class_snap.php by supplying the appropriate value ‘nxssnap-post’ to load the page in $_GET[‘page’] along with malicious JavaScript in $_POST[‘page’]. | 2021-11-01 | 4.3 | CVE-2021-38356 MISC |
nsasoft — spotauditor | An issue was discovered in Nsasoft US LLC SpotAuditor 5.3.5. The program can be crashed by entering 300 bytes char data into the “Key” or “Name” field while registering. | 2021-11-02 | 5 | CVE-2021-27722 MISC MISC |
nvidia — virtual_gpu | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where a string provided by the guest OS may not be properly null terminated. The guest OS or attacker has no ability to push content to the plugin through this vulnerability, which may lead to information disclosure, data tampering, unauthorized code execution, and denial of service. | 2021-10-29 | 4.6 | CVE-2021-1120 CONFIRM |
nvidia — virtual_gpu | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where there is the potential to execute privileged operations by the guest OS, which may lead to information disclosure, data tampering, escalation of privileges, and denial of service | 2021-10-29 | 4.6 | CVE-2021-1118 CONFIRM |
optinmonster — optinmonster | The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4. | 2021-11-01 | 6.4 | CVE-2021-39341 MISC MISC MISC |
php-cms_project — php-cms | PHP-CMS v1.0 was discovered to contain a SQL injection vulnerability in the component search.php via the search parameter. This vulnerability allows attackers to access sensitive database information. | 2021-11-03 | 5 | CVE-2020-18263 MISC |
php-fusion — phpfusion | Cross Site Scripting (XSS) vulnerability in infusions/member_poll_panel/poll_admin.php in PHP-Fusion 9.03.50, allows attackers to execute arbitrary code, via the polls feature. | 2021-11-02 | 6.8 | CVE-2020-23754 MISC MISC MISC |
phpok — phpok | Directory traversal vulnerability in qinggan phpok 5.1, allows attackers to disclose sensitive information, via the title parameter to admin.php. | 2021-11-02 | 5 | CVE-2020-18438 MISC |
phpok — phpok | An issue was discoverered in in function edit_save_f in framework/admin/tpl_control.php in qinggan phpok 5.1, allows attackers to write arbitrary files or get a shell. | 2021-11-02 | 6.4 | CVE-2020-18439 MISC |
playtuber_project — playtuber | An issue was discoverered in in customercentric-selling-poland PlayTube, allows authenticated attackers to execute arbitrary code via the purchace code to the config.php. | 2021-11-03 | 6.5 | CVE-2021-26786 MISC |
portainer — portainer | An Incorrect Access Control issue exists in all versions of Portainer.via an unauthorized access vulnerability. The vulnerability is also CNVD-2021-49547 | 2021-10-29 | 5 | CVE-2021-41748 MISC |
portainer — portainer | An unauthorized access vulnerabiitly exists in all versions of Portainer, which could let a malicious user obtain sensitive information. | 2021-10-29 | 5 | CVE-2021-41874 MISC |
publify_project — publify | In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only. | 2021-11-02 | 6.5 | CVE-2021-25973 MISC MISC |
pypi — easyxml | The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows for an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input. | 2021-10-31 | 6.4 | CVE-2020-26705 MISC |
radiustheme — logo_slider_and_showcase | The Logo Slider and Showcase WordPress plugin before 1.3.37 allows Editor users to update the plugin’s settings via the rtWLSSettings AJAX action because it uses a nonce for authorisation instead of a capability check. | 2021-11-01 | 4 | CVE-2021-24742 MISC |
ranko — rkcms | A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file. | 2021-10-29 | 4.3 | CVE-2020-25881 MISC MISC MISC |
replicated — replicated_classic | An open redirect vulnerability exists in Replicated Classic versions prior to 2.53.1 that could lead to spoofing. To exploit this vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link, redirecting the user to an untrusted site. | 2021-11-01 | 5.8 | CVE-2021-43058 MISC |
s-cart — s-cart | S-Cart v6.4.1 and below was discovered to contain an arbitrary file upload vulnerability in the Editor module on the Admin panel. This vulnerability allows attackers to execute arbitrary code via a crafted IMG file. | 2021-11-01 | 6.5 | CVE-2021-38847 MISC |
simple_subscription_website_project — simple_subscription_website | Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0 via the id parameter in plan_application. | 2021-11-03 | 4.3 | CVE-2021-43141 MISC |
siren — investigate | In Siren Investigate before 11.1.4, when enabling the cluster feature of the Siren Alert application, TLS verifications are disabled globally in the Siren Investigate main process. | 2021-11-02 | 6.8 | CVE-2021-36794 MISC MISC MISC |
solarwinds — kiwi_syslog_server | A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server. | 2021-10-29 | 4.3 | CVE-2021-35237 MISC MISC |
sonatype — nexus_repository_manager | Sonatype Nexus Repository Manager 3.x before 3.36.0 allows a remote authenticated attacker to potentially perform network enumeration via Server Side Request Forgery (SSRF). | 2021-11-04 | 4 | CVE-2021-43293 CONFIRM |
sophos — sophos_secure_workspace | A local attacker could bypass the app password using a race condition in Sophos Secure Workspace for Android before version 9.7.3115. | 2021-10-30 | 4.4 | CVE-2021-36808 CONFIRM |
struktur — libheif | Buffer overflow vulnerability in function convert_colorspace in heif_colorconversion.cc in libheif v1.6.2, allows attackers to cause a denial of service and disclose sensitive information, via a crafted HEIF file. | 2021-11-03 | 5.8 | CVE-2020-23109 MISC |
stylishpricelist — stylish_price_list | The Stylish Price List WordPress plugin before 6.9.0 does not perform capability checks in its spl_upload_ser_img AJAX action (available to both unauthenticated and authenticated users), which could allow unauthenticated users to upload images. | 2021-11-01 | 5 | CVE-2021-24757 MISC |
stylishpricelist — stylish_price_list | The Stylish Price List WordPress plugin before 6.9.1 does not perform capability checks in its spl_upload_ser_img AJAX action (available to authenticated users), which could allow any authenticated users, such as subscriber, to upload arbitrary images. | 2021-11-01 | 4 | CVE-2021-24770 MISC |
sysaid — sysaid | SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication. | 2021-10-29 | 4.3 | CVE-2021-31862 MISC MISC |
tempura_project — tempura | This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability. | 2021-11-03 | 4.3 | CVE-2021-23784 MISC MISC MISC |
tenable — nessus | Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in Nessus 10.0.0. The installation files can be obtained from the Tenable Downloads Portal (https://www.tenable.com/downloads/nessus). | 2021-11-03 | 4.6 | CVE-2021-20135 MISC |
tendacn — ac9_firmware | Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the index parameter. | 2021-10-29 | 5.8 | CVE-2021-31627 MISC MISC |
tendacn — ac9_firmware | Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the urls parameter. | 2021-10-29 | 5.8 | CVE-2021-31624 MISC MISC |
text2pdf_project — text2pdf | An issue was discovered in function StartPage in text2pdf.c in pdfcorner text2pdf 1.1, allows attackers to cause denial of service or possibly other undisclosed impacts. | 2021-11-03 | 6.8 | CVE-2020-23680 MISC MISC |
tipsandtricks-hq — far_future_expiry_header | The Far Future Expiry Header WordPress plugin before 1.5 does not have CSRF check when saving its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. | 2021-11-01 | 4.3 | CVE-2021-24799 MISC |
vaadin — vaadin | Missing output sanitization in test sources in org.webjars.bowergithub.vaadin:vaadin-menu-bar versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL | 2021-11-02 | 4.3 | CVE-2021-33611 CONFIRM CONFIRM |
validator_project — validator | validator.js is vulnerable to Inefficient Regular Expression Complexity | 2021-11-02 | 5 | CVE-2021-3765 CONFIRM MISC |
vmware — installbuilder | Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers. | 2021-10-29 | 4.4 | CVE-2021-22037 MISC |
vmware — installbuilder | On Windows, the uninstaller binary copies itself to a fixed temporary location, which is then executed (the originally called uninstaller exits, so it does not block the installation directory). This temporary location is not randomized and does not restrict access to Administrators only so a potential attacker could plant a binary to replace the copied binary right before it gets called, thus gaining Administrator privileges (if the original uninstaller was executed as Administrator). The vulnerability only affects Windows installers. | 2021-10-29 | 6.5 | CVE-2021-22038 MISC |
wdja — wdja_cms | Cross Site Scripting (XSS) vulnerability in shadoweb wdja v1.5.1, allows attackers to execute arbitrary code and gain escalated privileges, via the backurl parameter to /php/passport/index.php. | 2021-11-03 | 6.8 | CVE-2020-20982 MISC |
wordplus — bp_better_messages | The BP Better Messages WordPress plugin before 1.9.9.41 sanitise (with sanitize_text_field) but does not escape the ‘subject’ parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue | 2021-11-01 | 4.3 | CVE-2021-24808 MISC CONFIRM |
wordplus — bp_better_messages | The BP Better Messages WordPress plugin before 1.9.9.41 does not check for CSRF in multiple of its AJAX actions: bp_better_messages_leave_chat, bp_better_messages_join_chat, bp_messages_leave_thread, bp_messages_mute_thread, bp_messages_unmute_thread, bp_better_messages_add_user_to_thread, bp_better_messages_exclude_user_from_thread. This could allow attackers to make logged in users do unwanted actions | 2021-11-01 | 6.8 | CVE-2021-24809 CONFIRM MISC |
wp-pro-quiz_project — wp-pro-quiz | The WP-Pro-Quiz WordPress plugin through 0.37 does not have CSRF check in place when deleting a quiz, which could allow an attacker to make a logged in admin delete arbitrary quiz on the blog | 2021-11-01 | 4.3 | CVE-2020-36504 MISC MISC |
wp-stats_project — wp-stats | The WP-Stats WordPress plugin before 2.52 does not have CSRF check when saving its settings, and did not escape some of them when outputting them, allowing attacker to make logged in high privilege users change them and set Cross-Site Scripting payloads | 2021-11-01 | 4.3 | CVE-2015-10001 MISC MISC |
wp_attachment_export_project — wp_attachment_export | The WP Attachment Export WordPress plugin before 0.2.4 does not have proper access controls, allowing unauthenticated users to download the XML data that holds all the details of attachments/posts on a WordPress | 2021-11-01 | 5 | CVE-2015-20067 MISC MISC MISC |
wpplugin — accept_donations_with_paypal | The Accept Donations with PayPal WordPress plugin before 1.3.1 offers a function to create donation buttons, which internally are posts. The process to create a new button is lacking a CSRF check. An attacker could use this to make an authenticated admin create a new button. Furthermore, one of the Button field is not escaped before being output in an attribute when editing a Button, leading to a Stored Cross-Site Scripting issue as well. | 2021-11-01 | 4.3 | CVE-2021-24570 MISC CONFIRM |
wpplugin — accept_donations_with_paypal | The Accept Donations with PayPal WordPress plugin before 1.3.1 provides a function to create donation buttons which are internally stored as posts. The deletion of a button is not CSRF protected and there is no control to check if the deleted post was a button post. As a result, an attacker could make logged in admins delete arbitrary posts | 2021-11-01 | 4.3 | CVE-2021-24572 MISC |
youyou — turbocrm | SQL Injection vulnerability exists in all versions of Yonyou TurboCRM.via the orgcode parameter in changepswd.php. Attackers can use the vulnerabilities to obtain sensitive database information. | 2021-10-29 | 5 | CVE-2021-41746 MISC MISC |
zibbs_project — zibbs | Cross site scripting (XSS) vulnerability in application/controllers/AdminController.php in xujinliang zibbs 1.0, allows attackers to execute arbitrary code via the bbsmeta parameter. | 2021-11-02 | 6.8 | CVE-2020-23719 MISC |
zibbs_project — zibbs | Cross site scripting (XSS) vulnerability in xujinliang zibbs 1.0, allows attackers to execute arbitrary code via the route parameter to index.php. | 2021-11-02 | 6.8 | CVE-2020-23718 MISC |
Low Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
artica — pandora_fms | Pandora FMS through 755 allows XSS via a new Event Filter with a crafted name. | 2021-11-03 | 3.5 | CVE-2021-36698 MISC MISC MISC |
bracketspace — notification | The Notification WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/src/classes/Utils/Settings.php file which made it possible for attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 7.2.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | 2021-11-01 | 2.1 | CVE-2021-39340 MISC MISC MISC |
cisco — evolved_programmable_network_manager | A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | 2021-11-04 | 3.5 | CVE-2021-34784 CISCO |
cisco — prime_access_registrar | A vulnerability in the web-based management interface of Cisco Prime Access Registrar could allow an authenticated, remote attacker to perform a stored cross-site scripting attack on an affected system. This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials. Cisco expects to release software updates that address this vulnerability. | 2021-11-04 | 3.5 | CVE-2021-34731 CISCO |
connections-pro — connections_business_directory | The Connections Business Directory WordPress plugin before 10.4.3 does not escape the Address settings when creating an Entry, which could allow high privilege users to perform Cross-Site Scripting when the unfiltered_html capability is disallowed. | 2021-11-01 | 3.5 | CVE-2021-24794 MISC |
content_text_slider_on_post_project — content_text_slider_on_post | The Content text slider on post WordPress plugin before 6.9 does not sanitise and escape the Title and Message/Content settings, which could lead to Cross-Site Scripting issues | 2021-11-01 | 3.5 | CVE-2015-20019 MISC CONFIRM MISC |
dazzlersoftware — coming_soon,_under_construction_&_maintenance_mode_by_dazzler | The Coming Soon, Under Construction & Maintenance Mode By Dazzler WordPress plugin before 1.6.7 does not sanitise or escape its description setting when outputting it in the frontend when the Coming Soon mode is enabled, even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue | 2021-11-01 | 2.1 | CVE-2021-24539 MISC |
deltaww — dialink | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API schedule, which may allow an attacker to remotely execute code. | 2021-11-03 | 3.5 | CVE-2021-38428 MISC |
deltaww — dialink | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter deviceName of the API modbusWriter-Reader, which may allow an attacker to remotely execute code. | 2021-11-03 | 3.5 | CVE-2021-38411 MISC |
deltaww — dialink | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter supplier of the API maintenance, which may allow an attacker to remotely execute code. | 2021-11-03 | 3.5 | CVE-2021-38403 MISC |
deltaww — dialink | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter comment of the API events, which may allow an attacker to remotely execute code. | 2021-11-03 | 3.5 | CVE-2021-38488 MISC |
deltaww — dialink | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code. | 2021-11-03 | 3.5 | CVE-2021-38407 MISC |
dynpg — dynpg | Cross Site Scripting (XSS) vulnerability in DynPG 4.9.1, allows authenticated attackers to execute arbitrary code via the groupname. | 2021-11-02 | 3.5 | CVE-2020-27406 MISC MISC |
e-dynamics — events_made_easy | The Events Made Easy WordPress plugin before 2.2.24 does not sanitise and escape Custom Field Names, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | 2021-11-01 | 3.5 | CVE-2021-24813 CONFIRM MISC |
etruel — wpematico_rss_feed_fetcher | The WPeMatico RSS Feed Fetcher WordPress plugin before 2.6.12 does not escape the Feed URL added to a campaign before outputting it in an attribute, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | 2021-11-01 | 3.5 | CVE-2021-24793 MISC |
flat_preloader_project — flat_preloader | The Flat Preloader WordPress plugin before 1.5.5 does not escape some of its settings when outputting them in attribute in the frontend, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed | 2021-11-01 | 3.5 | CVE-2021-24789 MISC |
fortinet — fortianalyzer | A improper neutralization of input during web page generation (‘cross-site scripting’) in Fortinet FortiAnalyzer version 6.0.6 and below, version 6.4.4 allows attacker to execute unauthorized code or commands via specifically crafted requests to the web GUI. | 2021-11-02 | 3.5 | CVE-2020-12814 CONFIRM |
fortinet — forticlient | An improper control of generation of code vulnerability [CWE-94] in FortiClientMacOS versions 7.0.0 and below and 6.4.5 and below may allow an authenticated attacker to hijack the MacOS camera without the user permission via the malicious dylib file. | 2021-11-02 | 3.5 | CVE-2021-42754 CONFIRM |
fortinet — forticlient_enterprise_management_server | An improper neutralization of input vulnerability [CWE-79] in FortiClientEMS versions 6.4.1 and below and 6.2.9 and below may allow a remote authenticated attacker to inject malicious script/tags via the name parameter of various sections of the server. | 2021-11-02 | 3.5 | CVE-2020-15940 CONFIRM |
fortinet — fortimanager | An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiManager 7.0.1 and below, 6.4.6 and below, 6.2.x, 6.0.x, 5.6.0 may allow a FortiGate user to see scripts from other ADOMS. | 2021-11-03 | 2.1 | CVE-2021-36192 CONFIRM |
fortinet — fortiportal | A concurrent execution using shared resource with improper Synchronization vulnerability (‘Race Condition’) in the customer database interface of FortiPortal before 6.0.6 may allow an authenticated, low-privilege user to bring the underlying database data into an inconsistent state via specific coordination of web requests. | 2021-11-02 | 3.5 | CVE-2021-36181 CONFIRM |
fortinet — fortisiem | A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files | 2021-11-02 | 2.1 | CVE-2021-41023 CONFIRM |
gitlab — gitlab | A stored Cross-Site Scripting vulnerability in the DataDog integration in GitLab CE/EE version 13.7 and above allows an attacker to execute arbitrary JavaScript code on the victim’s behalf | 2021-11-05 | 3.5 | CVE-2021-22260 CONFIRM MISC MISC |
hp — futuresmart_3 | Certain HP LaserJet, HP LaserJet Managed, HP PageWide, and HP PageWide Managed printers may be vulnerable to potential information disclosure. | 2021-11-03 | 2.1 | CVE-2021-39237 MISC |
hp — futuresmart_4 | Certain HP Enterprise LaserJet and PageWide MFPs may be vulnerable to stored cross site scripting (XSS). | 2021-10-29 | 3.5 | CVE-2021-3662 MISC |
hp — officejet_7110_firmware | A potential security vulnerability has been identified for the HP OfficeJet 7110 Wide Format ePrinter that enables Cross-Site Scripting (XSS). | 2021-10-29 | 3.5 | CVE-2021-3441 MISC |
ibm — infosphere_information_server | IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | 2021-11-02 | 3.5 | CVE-2021-29771 CONFIRM XF |
jupyter — nbdime | nbdime provides tools for diffing and merging of Jupyter Notebooks. In affected versions a stored cross-site scripting (XSS) issue exists within the Jupyter-owned nbdime project. It appears that when reading the file name and path from disk, the extension does not sanitize the string it constructs before returning it to be displayed. The diffNotebookCheckpoint function within nbdime causes this issue. When attempting to display the name of the local notebook (diffNotebookCheckpoint), nbdime appears to simply append .ipynb to the name of the input file. The NbdimeWidget is then created, and the base string is passed through to the request API function. From there, the frontend simply renders the HTML tag and anything along with it. Users are advised to patch to the most recent version of the affected product. | 2021-11-03 | 3.5 | CVE-2021-41134 MISC CONFIRM |
libjxl_project — libjxl | Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757 | 2021-11-01 | 3.6 | CVE-2021-22563 CONFIRM CONFIRM |
libjxl_project — libjxl | For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256×256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775 | 2021-11-01 | 2.1 | CVE-2021-22564 CONFIRM CONFIRM |
mahara — mahara | In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, adjusting the path component for the page help file allows attackers to bypass the intended access control for HTML files via directory traversal. It replaces the – character with the / character. | 2021-11-02 | 2.1 | CVE-2021-43264 MISC MISC |
mahara — mahara | In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, certain tag syntax could be used for XSS, such as via a SCRIPT element. | 2021-11-02 | 3.5 | CVE-2021-43265 MISC MISC |
mcafee — data_loss_prevention_endpoint | Cross site scripting (XSS) vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.7.100 allows a remote attacker to highjack an active DLP ePO administrator session by convincing the logged in administrator to click on a carefully crafted link in the case management part of the DLP ePO extension. | 2021-11-01 | 3.5 | CVE-2021-31848 MISC |
motopress — restaurant_menu | The Restaurant Menu by MotoPress WordPress plugin through 2.4.0 does not properly sanitize or escape inputs when creating new menu items, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | 2021-11-01 | 3.5 | CVE-2021-24722 MISC |
netapp — ontap_system_manager | System Manager 9.x versions 9.7 and higher prior to 9.7P16, 9.8P7 and 9.9.1P2 are susceptible to a vulnerability which could allow a local attacker to discover plaintext iSCSI CHAP credentials. | 2021-11-01 | 1.7 | CVE-2021-27004 MISC |
nvidia — virtual_gpu | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager kernel driver, where a vGPU can cause resource starvation among other vGPUs hosted on the same GPU, which may lead to denial of service. | 2021-10-29 | 2.1 | CVE-2021-1121 CONFIRM |
nvidia — virtual_gpu | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can dereference a NULL pointer, which may lead to denial of service. | 2021-10-29 | 2.1 | CVE-2021-1122 CONFIRM |
nvidia — virtual_gpu | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can deadlock, which may lead to denial of service. | 2021-10-29 | 2.1 | CVE-2021-1123 CONFIRM |
nvidia — virtual_gpu | NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it can double-free a pointer, which may lead to denial of service. This flaw may result in a write-what-where condition, allowing an attacker to execute arbitrary code impacting integrity and availability. | 2021-10-29 | 3.6 | CVE-2021-1119 CONFIRM |
online_event_booking_and_reservation_system_project — online_event_booking_and_reservation_system | A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more. | 2021-11-05 | 3.5 | CVE-2021-42662 MISC MISC MISC |
snowsoftware — snow_inventory_agent | A vulnerability in Snow Snow Agent for Windows allows a non-admin user to cause arbitrary deletion of files. This issue affects: Snow Snow Agent for Windows version 5.0.0 to 6.7.1 on Windows. | 2021-11-03 | 3.6 | CVE-2021-41562 MISC |
sonaar — mp3_audio_player_for_music,_radio_&_podcast | The MP3 Audio Player for Music, Radio & Podcast by Sonaar WordPress plugin before 2.4.2 does not properly sanitize or escape data in some of its Playlist settings, allowing high privilege users to perform Cross-Site Scripting attacks | 2021-11-01 | 3.5 | CVE-2021-24624 MISC |
supsystic — easy_google_maps | The Google Maps Easy WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/modules/marker_groups/views/tpl/mgrEditMarkerGroup.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.9.33. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | 2021-11-01 | 2.1 | CVE-2021-39346 MISC MISC MISC |
webnus — modern_events_calendar_lite | The Modern Events Calendar Lite WordPress plugin before 5.22.3 does not properly sanitize or escape values set by users with access to adjust settings withing wp-admin. | 2021-11-01 | 3.5 | CVE-2021-24716 MISC |
wp_sitemap_page_project — wp_sitemap_page | The WP Sitemap Page WordPress plugin before 1.7.0 does not properly sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | 2021-11-01 | 3.5 | CVE-2021-24715 MISC |
wpdownloadmanager — wordpress_download_manager | The WordPress Download Manager WordPress plugin before 3.2.16 does not escape some of the Download settings when outputting them, allowing high privilege users to perform XSS attacks even when the unfiltered_html capability is disallowed | 2021-11-01 | 3.5 | CVE-2021-24773 MISC |
wpkube — cool_tag_cloud | The Cool Tag Cloud WordPress plugin before 2.26 does not escape the style attribute of the cool_tag_cloud shortcode, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. | 2021-11-01 | 3.5 | CVE-2021-24682 MISC |
wpreactions — wp_reactions_lite | The WP Reactions Lite WordPress plugin before 1.3.6 does not properly sanitize inputs within wp-admin pages, allowing users with sufficient access to inject XSS payloads within /wp-admin/ pages. | 2021-11-01 | 3.5 | CVE-2021-24723 MISC |
xenforo — xenforo | In XenForo through 2.2.7, a threat actor with access to the admin panel can create a new Advertisement via the Advertising function, and save an XSS payload in the body of the HTML document. This payload will execute globally on the client side. | 2021-11-03 | 3.5 | CVE-2021-43032 MISC MISC |
Severity Not Yet Assigned
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
android — samsung | Improper privilege management vulnerability in API Key used in SmartThings prior to 1.7.73.22 allows an attacker to abuse the API key without limitation. | 2021-11-05 | not yet calculated | CVE-2021-25508 MISC |
android — samsung | An improper access control vulnerability in SCloudBnRReceiver in SecTelephonyProvider prior to SMR Nov-2021 Release 1 allows untrusted application to call some protected providers. | 2021-11-05 | not yet calculated | CVE-2021-25501 MISC |
android — samsung | AVideo/YouPHPTube 10.0 and prior is affected by Insecure file write. An administrator privileged user is able to write files on filesystem using flag and code variables in file save.php. | 2021-11-01 | not yet calculated | CVE-2021-25877 MISC MISC MISC |
android — samsung | A vulnerability of storing sensitive information insecurely in Property Settings prior to SMR Nov-2021 Release 1 allows attackers to read ESN value without priviledge. | 2021-11-05 | not yet calculated | CVE-2021-25502 MISC |
android — samsung | Intent redirection vulnerability in Group Sharing prior to 10.8.03.2 allows attacker to access contact information. | 2021-11-05 | not yet calculated | CVE-2021-25504 MISC |
android — samsung |
AVideo/YouPHPTube 10.0 and prior has multiple reflected Cross Script Scripting vulnerabilities via the u parameter which allows a remote attacker to steal administrators’ session cookies or perform actions as an administrator. | 2021-11-01 | not yet calculated | CVE-2021-25876 MISC MISC MISC |
android — samsung |
A cross-site scripting (XSS) vulnerability in Power Admin PA Server Monitor 8.2.1.1 allows remote attackers to inject arbitrary web script or HTML via Console.exe. | 2021-11-05 | not yet calculated | CVE-2021-26844 MISC MISC |
android — samsung |
AVideo/YouPHPTube 10.0 and prior is affected by multiple reflected Cross Script Scripting vulnerabilities via the videoName parameter which allows a remote attacker to steal administrators’ session cookies or perform actions as an administrator. | 2021-11-01 | not yet calculated | CVE-2021-25878 MISC MISC MISC |
android — samsung |
A missing input validation in HDCP LDFW prior to SMR Nov-2021 Release 1 allows attackers to overwrite TZASC allowing TEE compromise. | 2021-11-05 | not yet calculated | CVE-2021-25500 MISC |
android — samsung |
Improper input validation vulnerability in HDCP prior to SMR Nov-2021 Release 1 allows attackers to arbitrary code execution. | 2021-11-05 | not yet calculated | CVE-2021-25503 MISC |
android — samsung |
Improper authentication in Samsung Pass prior to 3.0.02.4 allows to use app without authentication when lockscreen is unlocked. | 2021-11-05 | not yet calculated | CVE-2021-25505 MISC |
android — samsung |
Non-existent provider in Samsung Health prior to 6.19.1.0001 allows attacker to access it via malicious content provider or lead to denial of service. | 2021-11-05 | not yet calculated | CVE-2021-25506 MISC |
android — samsung |
Improper authorization vulnerability in Samsung Flow mobile application prior to 4.8.03.5 allows Samsung Flow PC application connected with user device to access part of notification data in Secure Folder without authorization. | 2021-11-05 | not yet calculated | CVE-2021-25507 MISC |
android — samsung |
A missing input validation in Samsung Flow Windows application prior to Version 4.8.5.0 allows attackers to overwrite abtraty file in the Windows known folders. | 2021-11-05 | not yet calculated | CVE-2021-25509 MISC |
android — samsung |
AVideo/YouPHPTube AVideo/YouPHPTube 10.0 and prior is affected by a SQL Injection SQL injection in the catName parameter which allows a remote unauthenticated attacker to retrieve databases information such as application passwords hashes. | 2021-11-01 | not yet calculated | CVE-2021-25874 MISC MISC MISC |
android — samsung |
AVideo/YouPHPTube AVideo/YouPHPTube 10.0 and prior has multiple reflected Cross Script Scripting vulnerabilities via the searchPhrase parameter which allows a remote attacker to steal administrators’ session cookies or perform actions as an administrator. | 2021-11-01 | not yet calculated | CVE-2021-25875 MISC MISC MISC |
ayacms — ayacms |
Cross site request forgery (CSRF) vulnerability in AyaCMS 3.1.2 allows attackers to change an administrators password or other unspecified impacts. | 2021-11-02 | not yet calculated | CVE-2020-23686 MISC |
azeotech — daqfactory | An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an attacker to obtain credentials and take over the user’s cloud account. | 2021-11-05 | not yet calculated | CVE-2021-42701 MISC |
azeotech — daqfactory |
The affected application uses specific functions that could be abused through a crafted project file, which could lead to code execution, system reboot, and system shutdown. | 2021-11-05 | not yet calculated | CVE-2021-42543 MISC |
azeotech — daqfactory |
Project files are stored memory objects in the form of binary serialized data that can later be read and deserialized again to instantiate the original objects in memory. Malicious manipulation of these files may allow an attacker to corrupt memory. | 2021-11-05 | not yet calculated | CVE-2021-42698 MISC |
azeotech — daqfactory |
The affected product is vulnerable to cookie information being transmitted as cleartext over HTTP. An attacker can capture network traffic, obtain the user’s cookie and take over the account. | 2021-11-05 | not yet calculated | CVE-2021-42699 MISC |
bluez — bluez |
An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call. | 2021-11-04 | not yet calculated | CVE-2021-43400 MISC |
bookstack — bookstack |
bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) | 2021-11-05 | not yet calculated | CVE-2021-3916 CONFIRM MISC |
cisco — asyncos |
A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition. | 2021-11-04 | not yet calculated | CVE-2021-34741 CISCO |
cisco — multiple_products |
A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an unauthenticated, remote attacker to render the web-based management interface unusable, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause a permanent invalid redirect for requests sent to the web-based management interface of the device, resulting in a DoS condition. | 2021-11-04 | not yet calculated | CVE-2021-40127 CISCO |
cisco — policy_suite |
A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user. This vulnerability is due to the re-use of static SSH keys across installations. An attacker could exploit this vulnerability by extracting a key from a system under their control. A successful exploit could allow the attacker to log in to an affected system as the root user. | 2021-11-04 | not yet calculated | CVE-2021-40119 CISCO |
cisco — small_business_series_switches |
A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges. | 2021-11-04 | not yet calculated | CVE-2021-34739 CISCO |
couchbase — server |
Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the “@” user credentials of the node processing the UI request. | 2021-11-02 | not yet calculated | CVE-2021-42763 MISC MISC |
couchbase — server |
metakv in Couchbase Server 7.0.0 uses Cleartext for Storage of Sensitive Information. Remote Cluster XDCR credentials can get leaked in debug logs. Config key tombstone purging was added in Couchbase Server 7.0.0. This issue happens when a config key, which is being logged, has a tombstone purger time-stamp attached to it. | 2021-11-02 | not yet calculated | CVE-2021-37842 MISC MISC |
crypto++ — crypto++ |
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. | 2021-11-04 | not yet calculated | CVE-2021-43398 MISC MISC |
d-link — dir-823g_devices |
A command injection vulnerability was discovered in the HNAP1 protocol in D-Link DIR-823G devices with firmware V1.0.2B05. An attacker is able to execute arbitrary web scripts via shell metacharacters in the PrivateLogin field to Login. | 2021-11-04 | not yet calculated | CVE-2020-25368 MISC MISC MISC |
fusionpbx — fusionpbx |
An issue was discovered in FusionPBX before 4.5.30. The fax_post_size may have risky characters (it is not constrained to preset values). | 2021-11-05 | not yet calculated | CVE-2021-43406 MISC |
fusionpbx — fusionpbx |
An issue was discovered in FusionPBX before 4.5.30. The FAX file name may have risky characters. | 2021-11-05 | not yet calculated | CVE-2021-43404 MISC |
fusionpbx — fusionpbx |
An issue was discovered in FusionPBX before 4.5.30. The fax_extension may have risky characters (it is not constrained to be numeric). | 2021-11-05 | not yet calculated | CVE-2021-43405 MISC |
gitlab — ce/ee | In all versions of GitLab CE/EE since version 10.6, a project export leaks the external webhook token value which may allow access to the project which it was exported from. | 2021-11-05 | not yet calculated | CVE-2021-39898 MISC CONFIRM MISC |
gitlab — ce/ee | In all versions of GitLab CE/EE since version 13.0, a privileged user, through an API call, can change the visibility level of a group or a project to a restricted option even after the instance administrator sets that visibility option as restricted in settings. | 2021-11-04 | not yet calculated | CVE-2021-39903 MISC CONFIRM MISC |
gitlab — ce/ee | Improper validation of ipynb files in GitLab CE/EE version 13.5 and above allows an attacker to execute arbitrary JavaScript code on the victim’s behalf. | 2021-11-05 | not yet calculated | CVE-2021-39906 MISC CONFIRM MISC |
gitlab — ce/ee | A potential DOS vulnerability was discovered in GitLab CE/EE starting with version 13.7. The stripping of EXIF data from certain images resulted in high CPU usage. | 2021-11-05 | not yet calculated | CVE-2021-39907 MISC CONFIRM MISC |
gitlab — ce/ee | An improper access control flaw in GitLab CE/EE since version 13.9 exposes private email address of Issue and Merge Requests assignee to Webhook data consumers | 2021-11-05 | not yet calculated | CVE-2021-39911 MISC CONFIRM |
gitlab — ce/ee | A regular expression denial of service issue in GitLab versions 8.13 to 14.2.5, 14.3.0 to 14.3.3 and 14.4.0 could cause excessive usage of resources when a specially crafted username was used when provisioning a new user | 2021-11-04 | not yet calculated | CVE-2021-39914 MISC CONFIRM |
gitlab — ce/ee |
In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting owner imports that project, pipelines are active by default on that project. Under specialized conditions, this may lead to information disclosure if the project is imported from an untrusted source. | 2021-11-05 | not yet calculated | CVE-2021-39895 MISC CONFIRM MISC |
gitlab — ce/ee |
Improper access control in GitLab CE/EE version 10.5 and above allowed subgroup members with inherited access to a project from a parent group to still have access even after the subgroup is transferred | 2021-11-05 | not yet calculated | CVE-2021-39897 MISC CONFIRM MISC |
gitlab — ce/ee |
In all versions of GitLab CE/EE since version 11.10, an admin of a group can see the SCIM token of that group by visiting a specific endpoint. | 2021-11-05 | not yet calculated | CVE-2021-39901 MISC CONFIRM MISC |
gitlab — ce/ee |
An Improper Access Control vulnerability in the GraphQL API in GitLab CE/EE since version 13.1 allows a Merge Request creator to resolve discussions and apply suggestions after a project owner has locked the Merge Request | 2021-11-05 | not yet calculated | CVE-2021-39904 CONFIRM MISC MISC |
gitlab — ce/ee |
A potential DoS vulnerability was discovered in GitLab CE/EE starting with version 13.7. Using a malformed TIFF images was possible to trigger memory exhaustion. | 2021-11-05 | not yet calculated | CVE-2021-39912 CONFIRM MISC MISC |
gitlab — ce/ee |
Accidental logging of system root password in the migration log in all versions of GitLab CE/EE allows an attacker with local file system access to obtain system root-level privileges | 2021-11-05 | not yet calculated | CVE-2021-39913 CONFIRM MISC |
gitlab — ce/ee |
Incorrect Authorization in GitLab CE/EE 13.4 or above allows a user with guest membership in a project to modify the severity of an incident. | 2021-11-04 | not yet calculated | CVE-2021-39902 MISC MISC CONFIRM |
gitlab — ce/ee |
An information disclosure vulnerability in the GitLab CE/EE API since version 8.9.6 allows a user to see basic information on private groups that a public project has been shared with | 2021-11-05 | not yet calculated | CVE-2021-39905 MISC CONFIRM MISC |
gitlab — ee/ee |
Lack of email address ownership verification in the CODEOWNERS feature in all versions of GitLab EE since version 11.3 allows an attacker to bypass CODEOWNERS Merge Request approval requirement under rare circumstances | 2021-11-05 | not yet calculated | CVE-2021-39909 MISC MISC CONFIRM |
gnu_library — glibc |
In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious ‘ |