Vulnerability Summary for the Week of November 15, 2021

Released
Nov 22, 2021
Document ID
SB21-326

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. NVD is sponsored by CISA. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High: vulnerabilities with a CVSS base score of 7.0–10.0
  • Medium: vulnerabilities with a CVSS base score of 4.0–6.9
  • Low: vulnerabilities with a CVSS base score of 0.0–3.9

Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. 

 

High Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
adobe -- after_effectsAdobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-11-189.3CVE-2021-40759
MISC
adobe -- after_effectsAdobe After Effects version 18.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-11-189.3CVE-2021-40752
MISC
adobe -- after_effectsAdobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-11-189.3CVE-2021-40760
MISC
adobe -- after_effectsAdobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-11-189.3CVE-2021-40758
MISC
adobe -- after_effectsAdobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-11-189.3CVE-2021-40757
MISC
adobe -- after_effectsAdobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SGI file in the DoReadContinue function, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-11-189.3CVE-2021-40755
MISC
adobe -- after_effectsAdobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-11-189.3CVE-2021-40753
MISC
adobe -- after_effectsAdobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-11-189.3CVE-2021-40754
MISC
adobe -- after_effectsAdobe After Effects version 18.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-11-189.3CVE-2021-40751
MISC
adobe -- animateAdobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .psd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-11-189.3CVE-2021-40733
MISC
adobe -- animateAdobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file.2021-11-189.3CVE-2021-42271
MISC
adobe -- animateAdobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file.2021-11-189.3CVE-2021-42524
MISC
adobe -- animateAdobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file.2021-11-189.3CVE-2021-42272
MISC
adobe -- animateAdobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious FLA file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-11-189.3CVE-2021-42266
MISC
adobe -- animateAdobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious FLA file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-11-189.3CVE-2021-42267
MISC
adobe -- animateAdobe Animate version 21.0.9 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed FLA file that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-11-189.3CVE-2021-42269
MISC
adobe -- animateAdobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file.2021-11-189.3CVE-2021-42270
MISC
adobe -- indesignAdobe InDesign versions 16.4 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-11-169.3CVE-2021-42731
MISC
adobe -- media_encoderAdobe Media Encoder version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.2021-11-169.3CVE-2021-42721
MISC
adobe -- media_encoderAdobe Media Encoder version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.2021-11-169.3CVE-2021-42726
MISC
adobe -- media_encoderAdobe Media Encoder version 15.4.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-11-169.3CVE-2021-43013
MISC
adobe -- preludeAdobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.2021-11-169.3CVE-2021-43011
MISC
adobe -- preludeAdobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.2021-11-169.3CVE-2021-43012
MISC
adobe -- premiere_proAdobe Premiere Pro version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.2021-11-169.3CVE-2021-42723
MISC
amd -- epyc_7003_firmwareImproper input and range checking in the Platform Security Processor (PSP) boot loader image header may allow for an attacker to use attack-controlled values prior to signature validation potentially resulting in arbitrary code execution.2021-11-167.2CVE-2021-26335
MISC
amd -- epyc_7003_firmwareAMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution.2021-11-167.2CVE-2021-26331
MISC
amd -- epyc_7232p_firmwareFailure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity.2021-11-167.2CVE-2021-26326
MISC
amd -- epyc_7f72_firmwareImproper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources.2021-11-167.8CVE-2021-26338
MISC
amd -- radeon_softwareAn insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.2021-11-157.2CVE-2020-12963
MISC
apache -- ozoneIn Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.2021-11-197.5CVE-2021-36372
MISC
MLIST
apache -- shenyuA flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.02021-11-167.5CVE-2021-37580
MISC
MLIST
broadcom -- emulex_hba_managerBroadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, have a buffer overflow vulnerability in the remote firmware download feature that could allow remote unauthenticated users to perform various attacks. In non-secure mode, the user is unauthenticated.2021-11-127.5CVE-2021-42774
MISC
CONFIRM
canonical -- accountsserviceUbuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1.2021-11-177.2CVE-2021-3939
MISC
MISC
darwin -- factorIn Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover.2021-11-167.5CVE-2021-25985
MISC
MISC
dell -- alienware_13_r3_firmwareDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.2021-11-127.2CVE-2021-36325
MISC
dell -- emc_powerscale_nodes_a100_firmwareDell EMC PowerScale Nodes contain a hardware design flaw. This may allow a local unauthenticated user to escalate privileges. This also affects Compliance mode and for Compliance mode clusters, is a critical vulnerability. Dell EMC recommends applying the workaround at your earliest opportunity.2021-11-127.2CVE-2021-36315
MISC
extremenetworks -- aerohive_netconfigThe NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file.2021-11-1410CVE-2020-16152
MISC
MISC
facade -- ignitionThe Ignition component before 1.16.15, and 2.0.x before 2.0.6, for Laravel has a "fix variable names" feature that can lead to incorrect access control.2021-11-177.5CVE-2021-43996
MISC
MISC
MISC
fluxcd -- kustomize-controllerkustomize-controller is a Kubernetes operator, specialized in running continuous delivery pipelines for infrastructure and workloads defined with Kubernetes manifests and assembled with Kustomize. Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing an authenticated Kubernetes user to gain cluster admin privileges. In affected versions multitenant environments where non-admin users have permissions to create Flux Kustomization objects are affected by this issue. This vulnerability was fixed in kustomize-controller v0.15.0 (included in flux2 v0.18.0) released on 2021-10-08. Starting with v0.15, the kustomize-controller no longer executes shell commands on the container OS and the `kubectl` binary has been removed from the container image. To prevent the creation of Kubernetes Service Accounts with `secrets` in namespaces owned by tenants, a Kubernetes validation webhook such as Gatekeeper OPA or Kyverno can be used.2021-11-129CVE-2021-41254
CONFIRM
google -- androidIn apusys, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05664273; Issue ID: ALPS05664273.2021-11-187.2CVE-2021-0671
MISC
google -- androidIn apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05654663; Issue ID: ALPS05654663.2021-11-187.2CVE-2021-0670
MISC
google -- androidIn apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05681550; Issue ID: ALPS05681550.2021-11-187.2CVE-2021-0669
MISC
google -- androidIn apusys, there is a possible memory corruption due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05670521; Issue ID: ALPS05670521.2021-11-187.2CVE-2021-0668
MISC
google -- androidIn mdlactl driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05776625; Issue ID: ALPS05776625.2021-11-187.2CVE-2021-0629
MISC
ibm -- system_x3550_m3_firmwareA command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session.2021-11-129CVE-2021-3723
CONFIRM
intel -- nuc_hdmi_firmware_update_toolIncorrect default permissionsin the software installer for the Intel(R) NUC HDMI Firmware Update Tool for NUC10i3FN, NUC10i5FN, NUC10i7FN before version 1.78.2.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-177.2CVE-2021-33090
MISC
intel -- nuc_m15_laptop_kit_audio_driver_packInsecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit audio driver pack before version 1.3 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-177.2CVE-2021-33091
MISC
intel -- nuc_m15_laptop_kit_hid_event_filter_driver_packIncorrect default permissions in the installer for the Intel(R) NUC M15 Laptop Kit HID Event Filter driver pack before version 2.2.1.383 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-177.2CVE-2021-33092
MISC
intel -- nuc_m15_laptop_kit_integrated_sensor_hub_driver_packIncorrect default permissions in the installer for the Intel(R) NUC M15 Laptop Kit Integrated Sensor Hub driver pack before version 5.4.1.4449 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-177.2CVE-2021-33088
MISC
intel -- nuc_m15_laptop_kit_keyboard_led_service_driver_packUnquoted search path in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-177.2CVE-2021-33095
MISC
intel -- nuc_m15_laptop_kit_keyboard_led_service_driver_packInsecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit Keyboard LED Service driver pack before version 1.0.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-177.2CVE-2021-33094
MISC
intel -- nuc_m15_laptop_kit_serial_io_driver_packInsecure inherited permissions in the installer for the Intel(R) NUC M15 Laptop Kit Serial IO driver pack before version 30.100.2104.1 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-177.2CVE-2021-33093
MISC
ipack -- scada_automationDue to improper sanitization iPack SCADA Automation software suffers from a remote SQL injection vulnerability. An unauthenticated attacker with the web access is able to extract critical information from the system.2021-11-167.5CVE-2021-3958
MISC
jamf -- jamfThe server in Jamf Pro before 10.32.0 has a vulnerability affecting integrity and availability, aka PI-006352. NOTE: Jamf Nation will also publish an article about this vulnerability.2021-11-127.5CVE-2021-39303
MISC
CONFIRM
json-schema_project -- json-schemajson-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')2021-11-137.5CVE-2021-3918
MISC
CONFIRM
laravel -- frameworkLaravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. NOTE: this CVE Record is for Laravel Framework, and is unrelated to any reports concerning incorrectly written user applications for image upload.2021-11-147.5CVE-2021-43617
MISC
MISC
MISC
lenovo -- thinkcentre_e93_firmwareA potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code.2021-11-127.2CVE-2021-3719
CONFIRM
meddata -- hbysDue to improper sanitization MedData HBYS software suffers from a remote SQL injection vulnerability. An unauthenticated attacker with the web access is able to extract critical information from the system.2021-11-167.5CVE-2021-43362
CONFIRM
meddata -- hbysDue to improper sanitization MedData HBYS software suffers from a remote SQL injection vulnerability. An unauthenticated attacker with the web access is able to extract critical information from the system.2021-11-167.5CVE-2021-43361
CONFIRM
montala -- resourcespaceA SQL injection issue in pages/edit_fields/9_ajax/add_keyword.php of ResourceSpace 9.5 and 9.6 < rev 18274 allows remote unauthenticated attackers to execute arbitrary SQL commands via the k parameter. This allows attackers to uncover the full contents of the ResourceSpace database, including user session cookies. An attacker who gets an admin user session cookie can use the session cookie to execute arbitrary code on the server.2021-11-157.5CVE-2021-41765
MISC
MISC
netgear -- ex3700_firmwareThis vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP service, which listens on TCP port 5000 by default. When parsing the uuid request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14110.2021-11-158.3CVE-2021-34991
MISC
MISC
nim-lang -- nimNim is a systems programming language with a focus on efficiency, expressiveness, and elegance. In affected versions the uri.parseUri function which may be used to validate URIs accepts null bytes in the input URI. This behavior could be used to bypass URI validation. For example: parseUri("http://localhost\0hello").hostname is set to "localhost\0hello". Additionally, httpclient.getContent accepts null bytes in the input URL and ignores any data after the first null byte. Example: getContent("http://localhost\0hello") makes a request to localhost:80. An attacker can use a null bytes to bypass the check and mount a SSRF attack.2021-11-127.5CVE-2021-41259
CONFIRM
npmjs -- npmThe npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json.2021-11-137.5CVE-2021-43616
MISC
MISC
MISC
online_learning_system_project -- online_learning_systemSourcecodester Online Learning System 2.0 is vunlerable to sql injection authentication bypass in admin login file (/admin/login.php) and authenticated file upload in (Master.php) file , we can craft these two vunlerablities to get unauthenticated remote command execution.2021-11-157.5CVE-2021-42580
MISC
MISC
opendesign -- oda_viewerAn improper handling of exceptional conditions vulnerability exists in Open Design Alliance ODA Viewer sample before 2022.11. ODA Viewer continues to process invalid or malicious DWF files instead of stopping upon an exception. An attacker can leverage this vulnerability to execute code in the context of the current process.2021-11-147.5CVE-2021-43272
MISC
openzeppelin -- contractsOpenZeppelin Contracts is a library for smart contract development. In affected versions upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. For users unable to upgrade; initialize implementation contracts using `UUPSUpgradeable` by invoking the initializer function (usually called `initialize`). An example is provided [in the forum](https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301).2021-11-127.5CVE-2021-41264
MISC
CONFIRM
MISC
qnap -- multimedia_consoleA stack buffer overflow vulnerability has been reported to affect QNAP NAS running Multimedia Console. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Multimedia Console: Multimedia Console 1.4.3 ( 2021/10/05 ) and later Multimedia Console 1.5.3 ( 2021/10/05 ) and later2021-11-137.5CVE-2021-38684
MISC
qualcomm -- apq8009_firmwarePossible buffer overflow due to improper input validation in PDM DIAG command in FTM in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables2021-11-127.2CVE-2021-30255
CONFIRM
qualcomm -- apq8009_firmwarePossible buffer overflow due to improper input validation in factory calibration and test DIAG command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables2021-11-127.2CVE-2021-30254
CONFIRM
qualcomm -- apq8009_firmwarePossible heap overflow due to improper length check of domain while parsing the DNS response in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables2021-11-1210CVE-2021-1975
CONFIRM
qualcomm -- apq8009_firmwareA FTM Diag command can allow an arbitrary write into modem OS space in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables2021-11-127.2CVE-2021-1973
CONFIRM
qualcomm -- aqt1000_firmwarePossible buffer overflow due to improper validation of FTM command payload in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile2021-11-127.2CVE-2021-1979
CONFIRM
qualcomm -- aqt1000_firmwarePossible out of bound access due to improper validation of function table entries in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking2021-11-127.2CVE-2021-30259
CONFIRM
qualcomm -- aqt1000_firmwarePossible integer overflow can occur due to improper length check while calculating count and grace period in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile2021-11-127.2CVE-2021-1912
CONFIRM
qualcomm -- aqt1000_firmwarePossible buffer overflow due to lack of parameter length check during MBSSID scan IE parse in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity2021-11-1210CVE-2021-30321
CONFIRM
recruitment_management_system_project -- recruitment_management_systemThe Company's Recruitment Management System in id=2 of the parameter from view_vacancy app on-page appears to be vulnerable to SQL injection. The payloads 19424269' or '1309'='1309 and 39476597' or '2917'='2923 were each submitted in the id parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.2021-11-177.5CVE-2021-41931
MISC
samsung -- ddr4_sdram_firmwareModern DRAM devices (PC-DDR4, LPDDR4X) are affected by a vulnerability in their internal Target Row Refresh (TRR) mitigation against Rowhammer attacks. Novel non-uniform Rowhammer access patterns, consisting of aggressors with different frequencies, phases, and amplitudes allow triggering bit flips on affected memory modules using our Blacksmith fuzzer. The patterns generated by Blacksmith were able to trigger bitflips on all 40 PC-DDR4 DRAM devices in our test pool, which cover the three major DRAM manufacturers: Samsung, SK Hynix, and Micron. This means that, even when chips advertised as Rowhammer-free are used, attackers may still be able to exploit Rowhammer. For example, this enables privilege-escalation attacks against the kernel or binaries such as the sudo binary, and also triggering bit flips in RSA-2048 keys (e.g., SSH keys) to gain cross-tenant virtual-machine access. We can confirm that DRAM devices acquired in July 2020 with DRAM chips from all three major DRAM vendors (Samsung, SK Hynix, Micron) are affected by this vulnerability. For more details, please refer to our publication.2021-11-1610CVE-2021-42114
MISC
MISC
CONFIRM
smartertools -- smartermailSmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows remote code execution.2021-11-177.5CVE-2021-32234
MISC
MISC
tibco -- partnerexpressThe Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain easily exploitable Stored and Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below.2021-11-168.5CVE-2021-43047
CONFIRM
CONFIRM
tibco -- partnerexpressThe Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain an easily exploitable vulnerability that allows an unauthenticated attacker with network access to obtain session tokens for the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below.2021-11-169.3CVE-2021-43046
CONFIRM
CONFIRM
tibco -- partnerexpressThe Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below.2021-11-1610CVE-2021-43048
CONFIRM
CONFIRM
tp-link -- tl-wr840n_firmwareThe PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.2021-11-1310CVE-2021-41653
MISC
MISC
MISC
vice -- webopacGrand Vice info Co. webopac7 file upload function fails to filter special characters. While logging in with general user’s permission, remote attackers can upload malicious script and execute arbitrary code to control the system or interrupt services.2021-11-159CVE-2021-42839
MISC
zohocorp -- manageengine_remote_access_plusZoho Remote Access Plus Server Windows Desktop binary fixed in version 10.1.2132 is affected by an unauthorized password reset vulnerability. Because of the designed password reset mechanism, any non-admin Windows user can reset the password of the Remote Access Plus Server Admin account.2021-11-177.2CVE-2021-42955
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
adobe -- after_effectsAdobe After Effects version 18.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-11-184.3CVE-2021-40761
MISC
adobe -- after_effectsAdobe After Effects version 18.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-11-184.3CVE-2021-40756
MISC
adobe -- animateAcrobat Animate versions 21.0.9 (and earlier)is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-11-184.3CVE-2021-42525
MISC
adobe -- animateAdobe Animate version 21.0.9 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted FLA file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-11-184.3CVE-2021-42268
MISC
adobe -- campaignAdobe Campaign version 21.2.1 (and earlier) is affected by a Path Traversal vulnerability that could lead to reading arbitrary server files. By leveraging an exposed XML file, an unauthenticated attacker can enumerate other files on the server.2021-11-175CVE-2021-40745
MISC
adobe -- experience_managerAdobe Experience Manager version 6.5.9.0 (and earlier) are affected by an improper access control vulnerability that leads to a security feature bypass. By manipulating referer headers, an unauthenticated attacker could gain access to arbitrary pages that they are not authorized to access.2021-11-165CVE-2021-42725
MISC
advantech -- webaccess_hmi_designerThis vulnerability could allow an attacker to disclose information and execute arbitrary code on affected installations of WebAccess/MHI Designer2021-11-154.6CVE-2021-42706
MISC
advantech -- webaccess_hmi_designerThis vulnerability could allow an attacker to send malicious Javascript code resulting in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage, and performing unintended browser action.2021-11-154.3CVE-2021-42703
MISC
aifu -- cashier_accounting_management_systemThe permission control of AIFU cashier management salary query function can be bypassed, thus after obtaining general user’s permission, the remote attacker can access account information except passwords by crafting URL parameters.2021-11-164CVE-2021-42337
MISC
alquistai -- alquistAlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.2021-11-155CVE-2021-43495
MISC
alquistai -- alquistAlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system andcan significantly aid in getting remote code access.2021-11-125CVE-2021-43492
MISC
amd -- epyc_7003_firmwareWhen the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used.2021-11-164.6CVE-2021-26315
MISC
amd -- epyc_7003_firmwareRace condition in PSP FW could allow less privileged x86 code to perform PSP SMM operations.2021-11-164.4CVE-2020-12951
MISC
amd -- epyc_7003_firmwareInsufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.2021-11-164.9CVE-2021-26336
MISC
amd -- epyc_7003_firmwareA potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections.2021-11-164.6CVE-2020-12961
MISC
amd -- epyc_7232p_firmwareFailure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.2021-11-164.6CVE-2021-26323
MISC
amd -- epyc_7601_firmwareInsufficient validation of BIOS image length by PSP Firmware could lead to arbitrary code execution.2021-11-164.6CVE-2020-12944
MISC
amd -- epyc_7601_firmwareInsufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP.2021-11-164.9CVE-2021-26321
MISC
amd -- epyc_7601_firmwarePersistent platform private key may not be protected with a random IV leading to a potential “two time pad attack”.2021-11-165CVE-2021-26322
MISC
amd -- epyc_7f72_firmwareInsufficient input validation in PSP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service.2021-11-166.6CVE-2020-12946
MISC
amd -- radeon_softwareImproper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .2021-11-154.6CVE-2020-12929
MISC
amd -- radeon_softwareOut of Bounds Write and Read in AMD Graphics Driver for Windows 10 in Escape 0x6002d03 may lead to escalation of privilege or denial of service.2021-11-154.6CVE-2020-12903
MISC
amd -- radeon_softwareA potential privilege escalation/denial of service issue exists in the AMD Radeon Kernel Mode driver Escape 0x2000c00 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck or write to leak information.2021-11-154.6CVE-2020-12964
MISC
amd -- radeon_softwareEscape call interface in the AMD Graphics Driver for Windows may cause privilege escalation.2021-11-154.6CVE-2020-12962
MISC
amd -- radeon_softwareAn arbitrary write vulnerability in the AMD Radeon Graphics Driver for Windows 10 potentially allows unprivileged users to gain Escalation of Privileges and cause Denial of Service.2021-11-154.6CVE-2020-12900
MISC
amd -- radeon_softwareStack Buffer Overflow in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.2021-11-154.6CVE-2020-12898
MISC
amd -- radeon_softwareArbitrary Decrement Privilege Escalation in AMD Graphics Driver for Windows 10 may lead to escalation of privilege or denial of service.2021-11-154.6CVE-2020-12902
MISC
amd -- radeon_softwarePool/Heap Overflow in AMD Graphics Driver for Windows 10 in Escape 0x110037 may lead to escalation of privilege, information disclosure or denial of service.2021-11-154.6CVE-2020-12895
MISC
amd -- radeon_softwareAn untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.2021-11-154.4CVE-2020-12892
MISC
amd -- radeon_softwareStack Buffer Overflow in AMD Graphics Driver for Windows 10 in Escape 0x15002a may lead to escalation of privilege or denial of service.2021-11-154.6CVE-2020-12893
MISC
apache -- ozoneIn Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.2021-11-196.5CVE-2021-39236
MISC
MLIST
apache -- ozoneIn Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.2021-11-194CVE-2021-39235
MISC
MLIST
apache -- ozoneIn Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.2021-11-194.9CVE-2021-39234
MISC
MLIST
apache -- ozoneIn Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.2021-11-196.4CVE-2021-39233
MISC
MLIST
apache -- ozoneIn Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.2021-11-196.5CVE-2021-39232
MISC
MLIST
apache -- ozoneIn Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.2021-11-195CVE-2021-41532
MISC
MLIST
apache -- ozoneIn Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.2021-11-196.4CVE-2021-39231
MISC
MLIST
apache -- supersetApache Superset up to and including 1.3.1 allowed for database connections password leak for authenticated users. This information could be accessed in a non-trivial way.2021-11-124CVE-2021-41972
CONFIRM
CONFIRM
apache -- supersetImproper output neutralization for Logs. A specific Apache Superset HTTP endpoint allowed for an authenticated user to forge log entries or inject malicious content into logs.2021-11-174CVE-2021-42250
CONFIRM
MLIST
arangodb -- arangodbIn ArangoDB, versions v3.7.6 through v3.8.3 are vulnerable to Insufficient Session Expiration. When a user’s password is changed by the administrator, the session isn’t invalidated, allowing a malicious user to still be logged in and perform arbitrary actions within the system.2021-11-166CVE-2021-25940
MISC
MISC
area17 -- twilltwill is vulnerable to Cross-Site Request Forgery (CSRF)2021-11-134.3CVE-2021-3932
CONFIRM
MISC
asus -- gt-axe11000_firmwareASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users' connections by sending specially crafted SAE authentication frames.2021-11-125CVE-2021-37910
MISC
atmail -- atmail** UNSUPPORTED WHEN ASSIGNED ** WebAdmin Control Panel in Atmail 6.5.0 (a version released in 2012) allows XSS via the format parameter to the default URI. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.2021-11-154.3CVE-2021-43574
MISC
MISC
binatoneglobal -- halo\+_camera_firmwareSome device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker.2021-11-125CVE-2021-3792
CONFIRM
binatoneglobal -- halo\+_camera_firmwareAn unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device.2021-11-125.8CVE-2021-3577
CONFIRM
binatoneglobal -- halo\+_camera_firmwareAn improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware.2021-11-125CVE-2021-3793
CONFIRM
binatoneglobal -- halo\+_camera_firmwareA vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with local access to obtain the MQTT credentials that could result in unauthorized access to backend Hubble services.2021-11-124.6CVE-2021-3787
CONFIRM
binatoneglobal -- halo\+_camera_firmwareAn exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device.2021-11-124.6CVE-2021-3788
CONFIRM
broadcom -- emulex_hba_managerBroadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, have a vulnerability in the remote firmware download feature that could allow a user to place or replace an arbitrary file on the remote host. In non-secure mode, the user is unauthenticated.2021-11-126.4CVE-2021-42775
MISC
CONFIRM
broadcom -- emulex_hba_managerBroadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, could allow a user to retrieve an arbitrary file from a remote host with the GetDumpFile command. In non-secure mode, the user is unauthenticated.2021-11-125CVE-2021-42773
MISC
CONFIRM
busybox -- busyboxAn attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.2021-11-156.8CVE-2021-42377
N/A
busybox -- busyboxA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function2021-11-156.5CVE-2021-42378
N/A
busybox -- busyboxA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function2021-11-156.5CVE-2021-42379
N/A
busybox -- busyboxA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function2021-11-156.5CVE-2021-42380
N/A
busybox -- busyboxA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function2021-11-156.5CVE-2021-42381
N/A
busybox -- busyboxA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function2021-11-156.5CVE-2021-42382
N/A
busybox -- busyboxA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function2021-11-156.5CVE-2021-42384
N/A
busybox -- busyboxA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function2021-11-156.5CVE-2021-42383
N/A
busybox -- busyboxA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function2021-11-156.5CVE-2021-42385
N/A
busybox -- busyboxA use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function2021-11-156.5CVE-2021-42386
N/A
cacti -- cactiCacti before 1.2.18 allows remote attackers to trigger XSS via template import for the midwinter theme.2021-11-144.3CVE-2020-14424
CONFIRM
CONFIRM
calibre-web_project -- calibre-webIn Calibre-web, versions 0.6.0 to 0.6.13 are vulnerable to Cross-Site Request Forgery (CSRF). By luring an authenticated user to click on a link, an attacker can create a new user role with admin privileges and attacker-controlled credentials, allowing them to take over the application.2021-11-166.8CVE-2021-25965
MISC
MISC
clustering_project -- clusteringClustering master branch as of commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.2021-11-125CVE-2021-43496
MISC
codingforentrepreneurs -- opencv_rest_apiOpenCV-REST-API master branch as of commit 69be158c05d4dd5a4aff38fdc680a162dd6b9e49 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.2021-11-125CVE-2021-43494
MISC
cron-utils_project -- cron-utilscron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known.2021-11-156.8CVE-2021-41269
MISC
MISC
CONFIRM
MISC
darwin -- factorIn Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.2021-11-164.3CVE-2021-25982
MISC
MISC
darwin -- factorIn Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.2021-11-164.3CVE-2021-25983
MISC
MISC
darwin -- factorIn Factor (App Framework & Headless CMS) forum plugin, versions v1.3.3 to v1.8.30, are vulnerable to stored Cross-Site Scripting (XSS) at the “post reply” section. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.2021-11-164.3CVE-2021-25984
MISC
MISC
dell -- emc_powerscale_onefsDell EMC PowerScale OneFS versions 9.1.0, 9.2.0.x, 9.2.1.x contain an Exposure of Information through Directory Listing vulnerability. This vulnerability is triggered when upgrading from a previous versions.2021-11-125CVE-2021-21528
MISC
dell -- emc_powerscale_onefsDell PowerScale OneFS contains an Unsynchronized Access to Shared Data in a Multithreaded Context in SMB CA handling. An authenticated user of SMB on a cluster with CA could potentially exploit this vulnerability, leading to a denial of service over SMB.2021-11-124CVE-2021-36305
MISC
discourse -- discourseDiscourse is a platform for community discussion. In affected versions a maliciously crafted request could cause an error response to be cached by intermediate proxies. This could cause a loss of confidentiality for some content. This issue is patched in the latest stable, beta and tests-passed versions of Discourse.2021-11-155CVE-2021-41271
CONFIRM
MISC
discourse -- rails_multisiterails_multisite provides multi-db support for Rails applications. In affected versions this vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application. The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.2021-11-156CVE-2021-41263
MISC
CONFIRM
django-helpdesk_project -- django-helpdeskdjango-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')2021-11-134.3CVE-2021-3945
MISC
CONFIRM
dotnetfoundation -- piranha_cmsIn PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.2021-11-164CVE-2021-25976
CONFIRM
MISC
email_log_project -- email_logThe Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections2021-11-176.5CVE-2021-24758
MISC
firefly-iii -- firefly_iiifirefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)2021-11-134.3CVE-2021-3921
CONFIRM
MISC
fruity_project -- fruityAn issue was discovered in the fruity crate through 0.2.0 for Rust. Security-relevant validation of filename extensions is plausibly affected. Methods of NSString for conversion to a string may return a partial result. Because they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first '\0' byte, which might not be the end of the string.2021-11-155CVE-2021-43620
MISC
MISC
MISC
gesundheit-bewegt -- colorful_categoriesThe Colorful Categories WordPress plugin before 2.0.15 does not enforce nonce checks which could allow attackers to make a logged in admin or editor change taxonomy colors via a CSRF attack2021-11-174.3CVE-2021-24802
MISC
gmplib -- gmpGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.2021-11-155CVE-2021-43618
MISC
MISC
MISC
gnu -- mailmanIn GNU Mailman before 2.1.36, a crafted URL to the Cgi/options.py user options page can execute arbitrary JavaScript for XSS.2021-11-124.3CVE-2021-43331
MISC
CONFIRM
gnu -- mailmanIn GNU Mailman before 2.1.36, the CSRF token for the Cgi/admindb.py admindb page contains an encrypted version of the list admin password. This could potentially be cracked by a moderator via an offline brute-force attack.2021-11-124CVE-2021-43332
MISC
CONFIRM
google -- androidIn mdlactl driver, there is a possible memory corruption due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05673424; Issue ID: ALPS05673424.2021-11-184.6CVE-2021-0655
MISC
google -- androidIn edma driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05709376; Issue ID: ALPS05709376.2021-11-184.6CVE-2021-0656
MISC
google -- androidIn apusys, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672103; Issue ID: ALPS05672103.2021-11-184.6CVE-2021-0657
MISC
google -- androidIn apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672107.2021-11-184.6CVE-2021-0658
MISC
google -- androidIn ccu, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05827158; Issue ID: ALPS05827158.2021-11-184.6CVE-2021-0664
MISC
google -- androidIn apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05670581; Issue ID: ALPS05670581.2021-11-184.6CVE-2021-0667
MISC
grafana -- grafanaGrafana is an open-source platform for monitoring and observability. In affected versions when the fine-grained access control beta feature is enabled and there is more than one organization in the Grafana instance admins are able to access users from other organizations. Grafana 8.0 introduced a mechanism which allowed users with the Organization Admin role to list, add, remove, and update users’ roles in other organizations in which they are not an admin. With fine-grained access control enabled, organization admins can list, add, remove and update users' roles in another organization, where they do not have organization admin role. All installations between v8.0 and v8.2.3 that have fine-grained access control beta enabled and more than one organization should be upgraded as soon as possible. If you cannot upgrade, you should turn off the fine-grained access control using a feature flag.2021-11-156.5CVE-2021-41244
MISC
CONFIRM
MLIST
ibm -- iris_xe_max_dedicated_graphicsImproper access control in the installer for some Intel(R) Iris(R) Xe MAX Dedicated Graphics Drivers for Windows 10 before version 27.20.100.9466 may allow authenticated user to potentially enable escalation of privilege via local access.2021-11-174.6CVE-2021-0121
MISC
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 212782.2021-11-154.3CVE-2021-38977
CONFIRM
XF
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212792.2021-11-155CVE-2021-38983
XF
CONFIRM
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 212783.2021-11-154.3CVE-2021-38978
CONFIRM
XF
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785.2021-11-155CVE-2021-38979
XF
CONFIRM
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.2021-11-124CVE-2021-38985
XF
CONFIRM
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.2021-11-124CVE-2021-38973
CONFIRM
XF
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to cause a denial of service using specially crafted HTTP requests. IBM X-Force ID: 212779.2021-11-154CVE-2021-38974
CONFIRM
XF
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.2021-11-124CVE-2021-38972
XF
CONFIRM
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212788.2021-11-155CVE-2021-38981
XF
CONFIRM
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212793.2021-11-155CVE-2021-38984
XF
CONFIRM
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to to obtain sensitive information from a specially crafted HTTP request. IBM X-Force ID: 212780.2021-11-154CVE-2021-38975
XF
CONFIRM
ibm -- security_siteprotector_systemIBM Security SiteProtector System 3.1.1 could allow a remote attacker to obtain sensitive information, caused by missing 'HttpOnly' flag. A remote attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 174129.2021-11-125CVE-2020-4146
CONFIRM
XF
idreamsoft -- icmsiCMS v7.0.15 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admincp.php?app=members&do=add.2021-11-126.8CVE-2020-21141
MISC
insert_pages_project -- insert_pagesThe Insert Pages WordPress plugin before 3.7.0 allows users with a role as low as Contributor to access content and metadata from arbitrary posts/pages regardless of their author and status (ie private), using a shortcode. Password protected posts/pages are not affected by such issue.2021-11-174CVE-2021-24851
CONFIRM
MISC
intel -- ax210_firmwareImproper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.2021-11-176.8CVE-2021-0078
MISC
intel -- ax210_firmwareImproper input validation in firmware for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.2021-11-175.8CVE-2021-0071
MISC
intel -- ax210_firmwareImproper input validation in firmware for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.2021-11-176.1CVE-2021-0063
MISC
intel -- ax210_firmwareInsecure inherited permissions in the Intel(R) PROSet/Wireless WiFi software installer for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-174.6CVE-2021-0064
MISC
intel -- ax210_firmwareIncorrect default permissions in the Intel(R) PROSet/Wireless WiFi software installer for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-174.6CVE-2021-0065
MISC
intel -- ax210_firmwareImproper input validation in software for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.2021-11-176.1CVE-2021-0079
MISC
intel -- endpoint_management_assistantImproper input validation for Intel(R) EMA before version 1.5.0 may allow an unauthenticated user to potentially enable denial of service via network access.2021-11-175CVE-2021-0013
MISC
intel -- nuc7i3dn_firmwareImproper authentication in the software installer for the Intel(R) NUC HDMI Firmware Update Tool for NUC7i3DN, NUC7i5DN, NUC7i7DN before version 1.78.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-174.6CVE-2021-0096
MISC
intel -- nuc_hdmi_firmware_update_toolImproper access control in the software installer for the Intel(R) NUC HDMI Firmware Update Tool for NUC8i3BE, NUC8i5BE, NUC8i7BE before version 1.78.4.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-174.6CVE-2021-33089
MISC
intel -- nuc_m15_laptop_kit_lapbc510_firmwareOut-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access.2021-11-174.9CVE-2021-33086
MISC
intel -- nuc_m15_laptop_kit_management_engine_driver_packImproper authentication in the installer for the Intel(R) NUC M15 Laptop Kit Management Engine driver pack before version 15.0.10.1508 may allow an authenticated user to potentially enable denial of service via local access.2021-11-174.9CVE-2021-33087
MISC
intel -- safestring_libraryInteger overflow in the Safestring library maintained by Intel(R) may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-174.6CVE-2021-33106
MISC
intel -- thunderbolt_non-dch_driverImproper permissions in the installer for the Intel(R) Thunderbolt(TM) non-DCH driver, all versions, for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-174.6CVE-2020-8741
MISC
jenkins -- owasp_dependency-checkJenkins OWASP Dependency-Check Plugin 5.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.2021-11-125.5CVE-2021-43577
CONFIRM
MLIST
jenkins -- performanceJenkins Performance Plugin 3.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.2021-11-124CVE-2021-21701
CONFIRM
MLIST
MISC
jenkins -- pom2configJenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.2021-11-124.3CVE-2021-43576
CONFIRM
MLIST
MISC
jenkins -- squash_tm_publisherJenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string.2021-11-125.5CVE-2021-43578
CONFIRM
MLIST
lenovo -- antillesA dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi). MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi. The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi.2021-11-126.8CVE-2021-3840
CONFIRM
lenovo -- ideacentre_c5-14mb05_firmwareA vulnerability was reported in some Lenovo Desktop models that could allow unauthorized access to the boot menu, when the "BIOS Password At Boot Device List" BIOS setting is Yes.2021-11-126.9CVE-2021-3519
CONFIRM
linphone -- belle-sipBelledonne Belle-sip before 5.0.20 can crash applications such as Linphone via " \ " in the display name of a From header.2021-11-125CVE-2021-43611
MISC
MISC
linphone -- belle-sipBelledonne Belle-sip before 5.0.20 can crash applications such as Linphone via an invalid From header (request URI without a parameter) in an unauthenticated SIP message, a different issue than CVE-2021-33056.2021-11-125CVE-2021-43610
MISC
MISC
linux -- linux_kernelIn the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.2021-11-174.6CVE-2021-43975
MISC
MISC
llhttp -- llhttpThe parser in accepts requests with a space (SP) right after the header name before the colon. This can lead to HTTP Request Smuggling (HRS) in llhttp < v2.1.4 and < v6.0.6.2021-11-156.4CVE-2021-22959
MISC
min -- minio_consoleMinio console is a graphical user interface for the for MinIO operator. Minio itself is a multi-cloud object storage project. Affected versions are subject to an authentication bypass issue in the Operator Console when an external IDP is enabled. All users on release v0.12.2 and before are affected and are advised to update to 0.12.3 or newer. Users unable to upgrade should add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes service account token.2021-11-156.8CVE-2021-41266
MISC
CONFIRM
montala -- resourcespaceResourceSpace before 9.6 rev 18290 is affected by a reflected Cross-Site Scripting vulnerability in plugins/wordpress_sso/pages/index.php via the wordpress_user parameter. If an attacker is able to persuade a victim to visit a crafted URL, malicious JavaScript content may be executed within the context of the victim's browser.2021-11-154.3CVE-2021-41951
MISC
montala -- resourcespaceA directory traversal issue in ResourceSpace 9.6 before 9.6 rev 18277 allows remote unauthenticated attackers to delete arbitrary files on the ResourceSpace server via the provider and variant parameters in pages/ajax/tiles.php. Attackers can delete configuration or source code files, causing the application to become unavailable to all users.2021-11-156.4CVE-2021-41950
MISC
MISC
mousewheel_smooth_scroll_project -- mousewheel_smooth_scrollThe MouseWheel Smooth Scroll WordPress plugin before 5.7 does not have CSRF check in place on its settings page, which could allow attackers to make a logged in admin change them via a CSRF attack2021-11-174.3CVE-2021-24852
MISC
my_tickets_project -- my_ticketsThe My Tickets WordPress plugin before 1.8.31 does not properly sanitise and escape the Email field of booked tickets before outputting it in the Payment admin dashboard, which could allow unauthenticated users to perform Cross-Site Scripting attacks against admins2021-11-174.3CVE-2021-24796
MISC
nextcloud -- talkNextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.2021-11-154.3CVE-2021-39222
CONFIRM
MISC
MISC
ni -- ni_service_locatorThere is an Unquoted Service Path in NI Service Locator (nisvcloc.exe) in versions prior to 18.0 on Windows. This may allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges.2021-11-124.6CVE-2021-42563
MISC
ohmyz -- ohmyzshohmyzsh is vulnerable to Improper Neutralization of Special Elements used in an OS Command2021-11-125.1CVE-2021-3934
CONFIRM
MISC
opendesign -- drawings_sdkAn Out-of-bounds Read vulnerability exists in the DGN file reading procedure in Open Design Alliance Drawings SDK before 2022.11. Crafted data in a DGN file and lack of verification of input data can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.2021-11-144.3CVE-2021-43273
MISC
MISC
MISC
opendesign -- drawings_software_developemnt_kitAn Out-of-bounds Read vulnerability exists in the OBJ file reading procedure in Open Design Alliance Drawings SDK before 2022.11. The lack of validating the input length can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.2021-11-146.8CVE-2021-43278
MISC
opendesign -- drawings_software_development_kitA Use After Free vulnerability exists in the DGN file reading procedure in Open Design Alliance Drawings SDK before 2022.8. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process.2021-11-146.8CVE-2021-43275
MISC
opendesign -- drawings_software_development_kitA Use After Free Vulnerability exists in the Open Design Alliance Drawings SDK before 2022.11. The specific flaw exists within the parsing of DWF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.2021-11-146.8CVE-2021-43274
MISC
opendesign -- drawings_software_development_kitA stack-based buffer overflow vulnerability exists in the DWF file reading procedure in Open Design Alliance Drawings SDK before 2022.8. The issue results from the lack of proper validation of the length of user-supplied data before copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.2021-11-146.8CVE-2021-43280
MISC
opendesign -- drawings_software_development_kitAn Out-of-Bounds Write vulnerability exists when reading a DXF file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF files. Crafted data in a DXF file (an invalid number of properties) can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.2021-11-146.8CVE-2021-43336
MISC
opendesign -- drawings_software_development_kitAn Out-of-Bounds Write vulnerability exists when reading a DGN file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DGN files. Crafted data in a DGN file and lack of proper validation of input data can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.2021-11-146.8CVE-2021-43390
MISC
opendesign -- drawings_software_development_kitAn Out-of-Bounds Read vulnerability exists when reading a DXF file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF files. Crafted data in a DXF file (an invalid dash counter in line types) can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.2021-11-146.8CVE-2021-43391
MISC
opendesign -- oda_prc_software_development_kitAn out-of-bounds read vulnerability exists in the U3D file reading procedure in Open Design Alliance PRC SDK before 2022.10. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.2021-11-146.8CVE-2021-43277
MISC
opendesign -- oda_prc_software_development_kitAn out-of-bounds write vulnerability exists in the U3D file reading procedure in Open Design Alliance PRC SDK before 2022.10. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.2021-11-146.8CVE-2021-43279
MISC
opendesign -- oda_viewerAn Out-of-bounds Read vulnerability exists in Open Design Alliance ODA Viewer before 2022.8. Crafted data in a DWF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process2021-11-146.8CVE-2021-43276
MISC
optical_character_recognition_project -- optical_character_recognitionA stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in try_to_divide_boxes() in pgm2asc.c.2021-11-176.8CVE-2021-33481
MISC
MISC
optical_character_recognition_project -- optical_character_recognitionA stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in measure_pitch() in pgm2asc.c.2021-11-176.8CVE-2021-33479
MISC
MISC
optical_character_recognition_project -- optical_character_recognitionAn use-after-free vulnerability was discovered in gocr through 0.53-20200802 in context_correction() in pgm2asc.c.2021-11-174.3CVE-2021-33480
MISC
MISC
MISC
orckestra -- c1_cmsThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS 6.10. Authentication is required to exploit this vulnerability. The specific flaw exists within Composite.dll. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-14740.2021-11-156.5CVE-2021-34992
MISC
MISC
osisoft -- pi_visionPI Vision could disclose information to a user with insufficient privileges for an AF attribute that is the child of another attribute and is configured as a Limits property.2021-11-174CVE-2021-43553
MISC
preview_e-mails_for_woocommerce_project -- preview_e-mails_for_woocommerceThe Preview E-Mails for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the search_order parameter found in the ~/views/form.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.6.8.2021-11-194.3CVE-2021-42363
MISC
MISC
MISC
qnap -- qmailagentA cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running QmailAgent. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of QmailAgent: QmailAgent 3.0.2 ( 2021/08/25 ) and later2021-11-134.3CVE-2021-34357
MISC
qr_redirector_project -- qr_redirectorThe QR Redirector WordPress plugin before 1.6 does not have capability and CSRF checks when saving bulk QR Redirector settings via the qr_save_bulk AJAX action, which could allow any authenticated user, such as subscriber to change the redirect response status code of arbitrary QR Redirects2021-11-174.3CVE-2021-24853
MISC
qualcomm -- apq8009_firmwarePossible information exposure and denial of service due to NAS not dropping messages when integrity check fails in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables2021-11-126.4CVE-2021-30284
CONFIRM
qualcomm -- apq8009_firmwarePossible use after free due improper validation of reference from call back to internal store table in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking2021-11-124.6CVE-2021-30264
CONFIRM
qualcomm -- apq8009_firmwarePossible use after free due to improper memory validation when initializing new interface via Interface add command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking2021-11-124.6CVE-2021-30266
CONFIRM
qualcomm -- apq8017_firmwarePossible buffer over read due to improper IE size check of Bearer capability IE in MT setup request from network in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile2021-11-126.4CVE-2021-1981
CONFIRM
qualcomm -- apq8053_firmwarePossible memory corruption due to improper validation of memory address while processing user-space IOCTL for clearing Filter and Route statistics in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables2021-11-124.6CVE-2021-30265
CONFIRM
qualcomm -- aqt1000_firmwarePossible memory corruption due to Improper handling of hypervisor unmap operations for concurrent memory operations in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile2021-11-126.9CVE-2021-1921
CONFIRM
qualcomm -- aqt1000_firmwarePossible denial of service scenario can occur due to lack of length check on Channel Switch Announcement IE in beacon or probe response frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking2021-11-125CVE-2021-1903
CONFIRM
qualcomm -- aqt1000_firmwarePossible race condition can occur due to lack of synchronization mechanism when On-Device Logging node open twice concurrently in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music2021-11-124.4CVE-2021-30263
CONFIRM
qualcomm -- ar8035_firmwarePossible denial of service scenario due to improper input validation of received NAS OTA message in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile2021-11-125CVE-2021-1982
CONFIRM
ruijie -- rg-uac_6000-e50_firmwareRuijie RG-UAC 6000-E50 commit 9071227 was discovered to contain a cross-site scripting (XSS) vulnerability via the rule_name parameter. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload.2021-11-164.3CVE-2020-21639
MISC
ruijie -- rg-uac_firmwareRuijie RG-UAC commit 9071227 was discovered to contain a vulnerability in the component /current_action.php?action=reboot, which allows attackers to cause a denial of service (DoS) via unspecified vectors.2021-11-165CVE-2020-21627
MISC
schedmd -- slurmSchedMD Slurm 21.08.* before 21.08.4 has Incorrect Access Control. On sites using the new AccountingStoreFlags=job_script and/or job_env options, the access control rules in SlurmDBD may permit users to request job scripts and environment files to which they should not have access.2021-11-174CVE-2021-43337
MISC
MISC
CONFIRM
CONFIRM
servermanagement_project -- servermanagementServerManagement master branch as of commit 49491cc6f94980e6be7791d17be947c27071eb56 is affected by a directory traversal vulnerability. This vulnerability can be used to extract credentials which can in turn be used to execute code.2021-11-125CVE-2021-43493
MISC
showdoc -- showdocshowdoc is vulnerable to Cross-Site Request Forgery (CSRF)2021-11-135.8CVE-2021-3775
MISC
CONFIRM
showdoc -- showdocshowdoc is vulnerable to Cross-Site Request Forgery (CSRF)2021-11-135.8CVE-2021-3776
MISC
CONFIRM
showdoc -- showdocshowdoc is vulnerable to Cross-Site Request Forgery (CSRF)2021-11-134.3CVE-2021-3683
CONFIRM
MISC
simple_jwt_login_project -- simple_jwt_loginThe Simple JWT Login WordPress plugin before 3.2.1 does not have nonce checks when saving its settings, allowing attackers to make a logged in admin changed them. Settings such as HMAC verification secret, account registering and default user roles can be updated, which could result in site takeover.2021-11-176.8CVE-2021-24804
MISC
smartertools -- smartermailSmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows XSS.2021-11-174.3CVE-2021-43977
MISC
MISC
snipeitapp -- snipe-itsnipe-it is vulnerable to Cross-Site Request Forgery (CSRF)2021-11-134.3CVE-2021-3931
CONFIRM
MISC
talariax -- sendquick_alert_plus_server_adminA SQL Injection vulnerability in /appliance/shiftmgn.php in TalariaX sendQuick Alert Plus Server Admin 4.3 before 8HF11 allows attackers to obtain sensitive information via a Roster Time to Roster Management.2021-11-146.5CVE-2021-26795
MISC
MISC
vice -- webopacGrand Vice info Co. webopac7 book search field parameter does not properly restrict the input of special characters, thus unauthenticated attackers can inject JavaScript syntax remotely, and further perform reflective XSS attacks.2021-11-154.3CVE-2021-42838
MISC
webfactoryltd -- wp_reset_proAuthenticated Database Reset vulnerability in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows any authenticated user to wipe the entire database regardless of their authorization. It leads to a complete website reset and takeover.2021-11-185.5CVE-2021-36909
MISC
CONFIRM
MISC
webfactoryltd -- wp_reset_proCross-Site Request Forgery (CSRF) vulnerability leading to Database Reset in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows attackers to trick authenticated into making unintentional database reset.2021-11-186.8CVE-2021-36908
CONFIRM
CONFIRM
CONFIRM
wordpress_popular_posts_project -- wordpress_popular_postsThe WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.2021-11-176.5CVE-2021-42362
MISC
MISC
MISC
MISC
wp-buy -- seo_redirection-301_redirect_managerThe importFromRedirection AJAX action of the SEO Redirection Plugin – 301 Redirect Manager WordPress plugin before 8.2, available to any authenticated user, does not properly sanitise the offset parameter before using it in a SQL statement, leading an SQL injection when the redirection plugin is also installed2021-11-176.5CVE-2021-24847
MISC
wp_performance_score_booster_project -- wp_performance_score_boosterThe WP Performance Score Booster WordPress plugin before 2.1 does not have CSRF check when saving its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.2021-11-174.3CVE-2021-24776
MISC
xwp -- streamThe Stream WordPress plugin before 3.8.2 does not sanitise and validate the order GET parameter from the Stream Records admin dashboard before using it in a SQL statement, leading to an SQL injection issue.2021-11-176.5CVE-2021-24772
MISC
CONFIRM
yop-poll -- yop_pollThe YOP Poll WordPress plugin before 6.3.1 is affected by a stored Cross-Site Scripting vulnerability which exists in the Create Poll - Options module where a user with a role as low as author is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of custom label parameters - vote button label , results link label and back to vote caption label.2021-11-174.3CVE-2021-24834
MISC
CONFIRM
MISC
zoho -- manageengine_remote_access_plus_serverZoho Remote Access Plus Server Windows Desktop Binary fixed in 10.1.2132.6 is affected by a sensitive information disclosure vulnerability. Due to improper privilege management, the process launches as the logged in user, so memory dump can be done by non-admin also. Remotely, an attacker can dump all sensitive information including DB Connection string, entire IT infrastructure details, commands executed by IT admin including credentials, secrets, private keys and more.2021-11-176.5CVE-2021-42956
MISC
zohocorp -- manageengine_remote_access_plusZoho Remote Access Plus Server Windows Desktop Binary fixed from 10.1.2121.1 is affected by incorrect access control. The installation directory is vulnerable to weak file permissions by allowing full control for Windows Everyone user group (non-admin or any guest users), thereby allowing privilege escalation, unauthorized password reset, stealing of sensitive data, access to credentials in plaintext, access to registry values, tampering with configuration files, etc.2021-11-174.6CVE-2021-42954
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
amd -- epyc_7003_firmwareInsufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.2021-11-162.1CVE-2021-26337
MISC
amd -- epyc_7003_firmwareA side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification.2021-11-162.1CVE-2020-12954
MISC
amd -- epyc_7003_firmwareAMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.2021-11-162.1CVE-2021-26330
MISC
amd -- epyc_7003_firmwareInsufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.2021-11-162.1CVE-2021-26327
MISC
amd -- epyc_7232p_firmwareInsufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service.2021-11-162.1CVE-2021-26325
MISC
amd -- epyc_7601_firmwarePSP protection against improperly configured side channels may lead to potential information disclosure. This issue affects: AMD 1st Gen AMD EPYC™ versions prior to NaplesPI-SP3_1.0.0.G. AMD 2nd Gen AMD EPYC™ versions prior to RomePI-SP3_1.0.0.C. AMD 3rd Gen AMD EPYC™ versions prior to MilanPI-SP3_1.0.0.4.2021-11-162.1CVE-2021-26312
MISC
amd -- epyc_7601_firmwareAMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources.2021-11-162.1CVE-2021-26329
MISC
amd -- epyc_7601_firmwareInsufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP2021-11-162.1CVE-2021-26320
MISC
amd -- radeon_softwareKernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.2021-11-152.1CVE-2020-12897
MISC
amd -- radeon_softwareArbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.2021-11-152.1CVE-2020-12901
MISC
amd -- radeon_softwareOut of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.2021-11-152.1CVE-2020-12904
MISC
amd -- radeon_softwareOut of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.2021-11-152.1CVE-2020-12905
MISC
amd -- radeon_softwareA potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.2021-11-152.1CVE-2020-12920
MISC
amd -- radeon_softwareArbitrary Write in AMD Graphics Driver for Windows 10 in Escape 0x40010d may lead to arbitrary write to kernel memory or denial of service.2021-11-153.6CVE-2020-12894
MISC
amd -- radeon_softwareAMD Graphics Driver for Windows 10, amdfender.sys may improperly handle input validation on InputBuffer which may result in a denial of service (DoS).2021-11-152.1CVE-2020-12960
MISC
amd -- radeon_softwareArbitrary Read in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or denial of service.2021-11-153.6CVE-2020-12899
MISC
asus -- p453uj_biosASUS P453UJ contains the Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. With a general user’s permission, local attackers can modify the BIOS by replacing or filling in the content of the designated Memory DataBuffer, which causing a failure of integrity verification and further resulting in a failure to boot.2021-11-153.6CVE-2021-41289
MISC
MISC
binatoneglobal -- halo\+_camera_firmwareAn information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages.2021-11-122.1CVE-2021-3789
CONFIRM
binatoneglobal -- halo\+_camera_firmwareA buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device.2021-11-123.3CVE-2021-3790
CONFIRM
binatoneglobal -- halo\+_camera_firmwareAn information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password.2021-11-123.3CVE-2021-3791
CONFIRM
bluez -- bluezBlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will always be hung in the singly linked list of cstates and will not be freed. This will cause a memory leak over time. The data can be a very large object, which can be caused by an attacker continuously sending sdp packets and this may cause the service of the target device to crash.2021-11-123.3CVE-2021-41229
CONFIRM
bookstackapp -- bookstackbookstack is vulnerable to Unrestricted Upload of File with Dangerous Type2021-11-133.5CVE-2021-3915
MISC
CONFIRM
brainstormforce -- starter_templatesOn sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page.2021-11-173.5CVE-2021-42360
MISC
busybox -- busyboxA NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given2021-11-152.1CVE-2021-42373
N/A
busybox -- busyboxAn incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.2021-11-151.9CVE-2021-42375
N/A
busybox -- busyboxA NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.2021-11-151.9CVE-2021-42376
N/A
busybox -- busyboxAn out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that2021-11-153.3CVE-2021-42374
N/A
ckeditor -- ckeditorCKEditor4 is an open source WYSIWYG HTML editor. In affected versions a vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.2021-11-173.5CVE-2021-41164
CONFIRM
MISC
CONFIRM
codepeople -- contact_form_emailThe Contact Form Email WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the name parameter found in the ~/trunk/cp-admin-int-list.inc.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.3.24. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.2021-11-172.1CVE-2021-42361
MISC
MISC
fortinet -- fortiosAn exposure of sensitive information to an unauthorized actor vulnerability in FortiOS CLI 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, 6.0.x and 5.6.x may allow a local and authenticated user assigned to a specific VDOM to retrieve other VDOMs information such as the admin account list and the network interface list.2021-11-172.1CVE-2021-32600
CONFIRM
getkirby -- kirbyKirby is an open source file structured CMS. In affected versions Kirby's blocks field stores structured data for each block. This data is then used in block snippets to convert the blocks to HTML for use in your templates. We recommend to escape HTML special characters to protect against cross-site scripting (XSS) attacks. The default snippet for the image block unfortunately did not use our escaping helper. This made it possible to include malicious HTML code in the source, alt and link fields of the image block, which would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. Attackers must be in your group of authenticated Panel users in order to exploit this weakness. Users who do not make use of the blocks field are not affected. This issue has been patched in Kirby version 3.5.8 by escaping special HTML characters in the output from the default image block snippet. Please update to this or a later version to fix the vulnerability.2021-11-162.1CVE-2021-41258
MISC
CONFIRM
MISC
getkirby -- kirbyKirby is an open source file structured CMS ### Impact Kirby's writer field stores its formatted content as HTML code. Unlike with other field types, it is not possible to escape HTML special characters against cross-site scripting (XSS) attacks, otherwise the formatting would be lost. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. Attackers must be in your group of authenticated Panel users in order to exploit this weakness. Users who do not make use of the writer field are not affected. This issue has been patched in Kirby 3.5.8 by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a later version to fix the vulnerability.2021-11-162.1CVE-2021-41252
CONFIRM
MISC
MISC
google -- androidIn flv extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05594988; Issue ID: ALPS05594988.2021-11-182.1CVE-2021-0624
MISC
google -- androidIn Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05969704; Issue ID: ALPS05969704.2021-11-182.1CVE-2021-0672
MISC
google -- androidIn apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672086; Issue ID: ALPS05672086.2021-11-182.1CVE-2021-0666
MISC
google -- androidIn apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672113; Issue ID: ALPS05672113.2021-11-182.1CVE-2021-0665
MISC
google -- androidIn apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05687559; Issue ID: ALPS05687559.2021-11-182.1CVE-2021-0659
MISC
google -- androidIn ape extractor, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561395; Issue ID: ALPS05561395.2021-11-182.1CVE-2021-0619
MISC
google -- androidIn asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381.2021-11-182.1CVE-2021-0620
MISC
google -- androidIn asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.2021-11-182.1CVE-2021-0621
MISC
google -- androidIn asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561388.2021-11-182.1CVE-2021-0622
MISC
google -- androidIn asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.2021-11-182.1CVE-2021-0623
MISC
helpful_project -- helpfulThe Helpful WordPress plugin before 4.4.59 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed2021-11-173.5CVE-2021-24841
MISC
MISC
hitachienergy -- counterparty_settlements_and_billingImproper Access Control vulnerability in the application authentication and authorization of Hitachi Energy Retail Operations, Counterparty Settlement and Billing (CSB) allows an attacker to execute a modified signed Java Applet JAR file. A successful exploitation may lead to data extraction or modification of data inside the application. This issue affects: Hitachi Energy Retail Operations 5.7.3 and prior versions. Hitachi Energy Counterparty Settlement and Billing (CSB) 5.7.3 prior versions.2021-11-173.6CVE-2021-35528
CONFIRM
CONFIRM
ibm -- mqIBM MQ 7.5, 8.0, 9.0 LTS, 9.1 CD, and 9.1 LTS stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 211403.2021-11-162.1CVE-2021-38949
CONFIRM
XF
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212791.2021-11-153.5CVE-2021-38982
XF
CONFIRM
ibm -- security_guardium_key_lifecycle_managerIBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 stores user credentials in plain clear text which can be read by a local user. X-Force ID: 212781.2021-11-152.1CVE-2021-38976
XF
CONFIRM
ibm -- security_siteprotector_systemIBM Security SiteProtector System 3.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174052.2021-11-123.5CVE-2020-4140
XF
CONFIRM
ibm -- spectrum_scaleIBM Spectrum Scale 5.1.0 through 5.1.1.1 could allow a privileged admin to destroy filesystem audit logging records before expiration time. IBM X-Force ID: 209164.2021-11-162.1CVE-2021-38882
CONFIRM
XF
ibm -- spss_statisticsIBM SPSS Statistics for Windows 24.0, 25.0, 26.0, 27.0, 27.0.1, and 28.0 could allow a local user to cause a denial of service by writing arbitrary files to admin protected directories on the system. IBM X-Force ID: 212046.2021-11-172.1CVE-2021-38959
XF
CONFIRM
ibm -- viosIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the libc.a library to expose sensitive information. IBM X-Force ID: 206084.2021-11-172.1CVE-2021-29860
CONFIRM
XF
ibm -- viosIBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in EFS to expose sensitive information. IBM X-Force ID: 206085.2021-11-172.1CVE-2021-29861
XF
CONFIRM
insert_pages_project -- insert_pagesThe Insert Pages WordPress plugin before 3.7.0 adds a shortcode that prints out other pages' content and custom fields. It can be used by users with a role as low as Contributor to perform Cross-Site Scripting attacks by storing the payload/s in another post's custom fields.2021-11-173.5CVE-2021-24850
MISC
intel -- ax210_firmwareImproper input validation in firmware for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and some Killer(TM) WiFi in Windows 10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.2021-11-173.3CVE-2021-0069
MISC
intel -- ax210_firmwareOut-of-bounds write in firmware for some Intel(R) PROSet/Wireless WiFi in multiple operating systems and some Killer(TM) WiFi in Windows 10 may allow a privileged user to potentially enable denial of service via local access.2021-11-172.1CVE-2021-0075
MISC
intel -- ax210_firmwareImproper initialization in firmware for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi in Windows 10 may allow an authenticated user to potentially enable information disclosure via adjacent access.2021-11-172.7CVE-2021-0053
MISC
intel -- thunderbolt_dch_driverImproper access control in some Intel(R) Thunderbolt(TM) Windows DCH Drivers before version 1.41.1054.0 may allow unauthenticated user to potentially enable denial of service via local access.2021-11-172.1CVE-2021-0110
MISC
jenkins -- active_choicesJenkins Active Choices Plugin 2.5.6 and earlier does not escape the parameter name of reactive parameters and dynamic reference parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.2021-11-123.5CVE-2021-21699
CONFIRM
MLIST
jenkins -- scriptlerJenkins Scriptler Plugin 3.3 and earlier does not escape the name of scripts on the UI when asking to confirm their deletion, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by exploitable by attackers able to create Scriptler scripts.2021-11-123.5CVE-2021-21700
CONFIRM
MLIST
lenovo -- legion_phone_pro_\(l79031\)firmwareAn information disclosure vulnerability was reported in the Time Weather system widget on Legion Phone Pro (L79031) and Legion Phone2 Pro (L70081) that could allow other applications to access device GPS data.2021-11-122.1CVE-2021-3720
CONFIRM
linux -- linux_kernelIn the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).2021-11-172.1CVE-2021-43976
MISC
osisoft -- pi_visionA remote attacker with write access to PI Vision could inject code into a display. Unauthorized information disclosure, modification, or deletion is possible if a victim views or interacts with the infected display using Microsoft Internet Explorer. The impact affects PI System data and other data accessible with victim’s user permissions.2021-11-173.5CVE-2021-43551
MISC
qr_redirector_project -- qr_redirectorThe QR Redirector WordPress plugin before 1.6.1 does not sanitise and escape some of the QR Redirect fields, which could allow users with a role as low as Contributor perform Stored Cross-Site Scripting attacks.2021-11-173.5CVE-2021-24854
MISC
qualcomm -- apq8009_firmwareInformation disclosure through timing and power side-channels during mod exponentiation for RSA-CRT in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking2021-11-122.1CVE-2021-1924
CONFIRM
snipeitapp -- snipe-itsnipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')2021-11-133.5CVE-2021-3938
MISC
CONFIRM
tammersoft -- shared_filesThe Shared Files WordPress plugin before 1.6.61 does not sanitise and escape the Download Counter Text settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed2021-11-173.5CVE-2021-24856
MISC
MISC
webventures -- client_invoicing_by_sprout_invoicesThe Client Invoicing by Sprout Invoices WordPress plugin before 19.9.7 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed2021-11-173.5CVE-2021-24787
MISC
wibu -- codemeter_runtimeIn WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.2021-11-143.6CVE-2021-41057
CONFIRM
CONFIRM
MISC
wpplugin -- accept_donations_with_paypalThe Accept Donations with PayPal WordPress plugin before 1.3.2 does not escape the Amount Menu Name field of created Buttons, which could allow a high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.2021-11-173.5CVE-2021-24815
MISC
wpshopmart -- testimonial_builderThe Testimonial WordPress plugin before 1.6.0 does not escape some testimonial fields which could allow high privilege users to perform Cross Site Scripting attacks even when the unfiltered_html capability is disallowed2021-11-173.5CVE-2021-24598
MISC
CONFIRM
yop-poll -- yop_pollThe YOP Poll WordPress plugin before 6.3.1 is affected by a stored Cross-Site Scripting vulnerability, which exists in the Admin preview module where a user with a role as low as author is allowed to execute arbitrary script code within the context of the application. This vulnerability is due to insufficient validation of question and answer text parameters in Create Poll module.2021-11-173.5CVE-2021-24833
MISC
MISC
CONFIRM

Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
4mosan -- 4mosan
 
4MOSAn GCB Doctor’s login page has improper validation of Cookie, which allows an unauthenticated remote attacker to bypass authentication by code injection in cookie, and arbitrarily manipulate the system or interrupt services by upload and execution of arbitrary files.2021-11-19not yet calculatedCVE-2021-42338
CONFIRM
adobe -- audition
 
Adobe Audition version 14.2 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-11-19not yet calculatedCVE-2021-36003
MISC
adobe -- creative_cloud
 
Adobe Creative Cloud version 5.5 (and earlier) are affected by an Application denial of service vulnerability in the Creative Cloud Desktop installer. An authenticated attacker could leverage this vulnerability to achieve denial of service in the context of the user. User interaction is required before product installation to abuse this vulnerability.2021-11-18not yet calculatedCVE-2021-43017
MISC
amazon -- freertos
 
Amazon FreeRTOS 10.2.0 through 10.4.5 on the ARMv7-M and ARMv8-M MPU platforms does not prevent non-kernel code from calling the xPortRaisePrivilege and vPortResetPrivilege internal functions. This is fixed in 10.4.6 and in 10.4.3-LTS Patch 2.2021-11-17not yet calculatedCVE-2021-43997
MISC
MISC
asus -- multiple_products
 
A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request.2021-11-19not yet calculatedCVE-2021-41435
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
asus -- multiple_products
 
An HTTP request smuggling in web application in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote unauthenticated attacker to DoS via sending a specially crafted HTTP packet.2021-11-19not yet calculatedCVE-2021-41436
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
beyondtrust -- beyondtrustBeyondTrust Privilege Management prior to version 21.6 creates a Temporary File in a Directory with Insecure Permissions.2021-11-19not yet calculatedCVE-2021-42254
MISC
MISC
cisco -- common_services_platform_collector
 
A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by adding malicious code to the configuration by using the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information.2021-11-19not yet calculatedCVE-2021-40131
CISCO
cisco -- common_services_platform_collector
 
A vulnerability in the web application of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to specify non-log files as sources for syslog reporting. This vulnerability is due to improper restriction of the syslog configuration. An attacker could exploit this vulnerability by configuring non-log files as sources for syslog reporting through the web application. A successful exploit could allow the attacker to read non-log files on the CSPC.2021-11-19not yet calculatedCVE-2021-40130
CISCO
cisco -- common_services_platform_collector
 
A vulnerability in the configuration dashboard of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to submit a SQL query through the CSPC configuration dashboard. This vulnerability is due to insufficient input validation of uploaded files. An attacker could exploit this vulnerability by uploading a file containing a SQL query to the configuration dashboard. A successful exploit could allow the attacker to read restricted information from the CSPC SQL database.2021-11-19not yet calculatedCVE-2021-40129
CISCO
ckeditor4 -- ckeditor4
 
CKEditor4 is an open source WYSIWYG HTML editor. In affected version a vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. The problem has been recognized and patched. The fix will be available in version 4.17.0.2021-11-17not yet calculatedCVE-2021-41165
MISC
CONFIRM
CONFIRM
concrete -- cmsConcrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable toa. SSRF attacks on the private LAN servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb. SSRF Mitigation Bypass through DNS RebindingConcrete CMS security team gave this a CVSS score of 3.5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:NConcrete CMS is maintaining Concrete version 8.5.x until 1 May 2022 for security fixes.This CVE is shared with HackerOne Reports https://hackerone.com/reports/1364797 and https://hackerone.com/reports/1360016Reporters: Adrian Tiron from FORTBRIDGE (https://www.fortbridge.co.uk/ ) and Bipul Jaiswal2021-11-19not yet calculatedCVE-2021-22970
MISC
MISC
MISC
concrete -- cmsConcrete CMS (formerly concrete5) versions below 8.5.7 has a SSRF mitigation bypass using DNS Rebind attack giving an attacker the ability to fetch cloud IAAS (ex AWS) IAM keys.To fix this Concrete CMS no longer allows downloads from the local network and specifies the validated IP when downloading rather than relying on DNS.Discoverer: Adrian Tiron from FORTBRIDGE ( https://www.fortbridge.co.uk/ )The Concrete CMS team gave this a CVSS 3.1 score of 3.5 AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N . Please note that Cloud IAAS provider mis-configurations are not Concrete CMS vulnerabilities. A mitigation for this vulnerability is to make sure that the IMDS configurations are according to a cloud provider's best practices.This fix is also in Concrete version 9.0.02021-11-19not yet calculatedCVE-2021-22969
MISC
MISC
concrete -- cms
 
A bypass of adding remote files in Concrete CMS (previously concrete5) File Manager leads to remote code execution in Concrete CMS (concrete5) versions 8.5.6 and below.The external file upload feature stages files in the public directory even if they have disallowed file extensions. They are stored in a directory with a random name, but it's possible to stall the uploads and brute force the directory name. You have to be an admin with the ability to upload files, but this bug gives you the ability to upload restricted file types and execute them depending on server configuration.To fix this, a check for allowed file extensions was added before downloading files to a tmp directory.Concrete CMS Security Team gave this a CVSS v3.1 score of 5.4 AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:NThis fix is also in Concrete version 9.0.02021-11-19not yet calculatedCVE-2021-22968
MISC
MISC
concrete -- cms
 
In Concrete CMS (formerly concrete 5) below 8.5.7, IDOR Allows Unauthenticated User to Access Restricted Files If Allowed to Add Message to a Conversation.To remediate this, a check was added to verify a user has permissions to view files before attaching the files to a message in "add / edit message”.Concrete CMS security team gave this a CVSS v3.1 score of 4.3 AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NCredit for discovery Adrian H2021-11-19not yet calculatedCVE-2021-22967
MISC
MISC
concrete -- cms
 
Privilege escalation from Editor to Admin using Groups in Concrete CMS versions 8.5.6 and below. If a group is granted "view" permissions on the bulkupdate page, then users in that group can escalate to being an administrator with a specially crafted curl. Fixed by adding a check for group permissions before allowing a group to be moved. Concrete CMS Security team CVSS scoring: 7.1 AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HCredit for discovery: "Adrian Tiron from FORTBRIDGE ( https://www.fortbridge.co.uk/ )"This fix is also in Concrete version 9.0.02021-11-19not yet calculatedCVE-2021-22966
MISC
MISC
concretecms -- concretecms
 
Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.Credit for discovery: "Solar Security Research Team"Concrete CMS security team CVSS scoring is 5.3: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NThis fix is also in Concrete version 9.0.02021-11-19not yet calculatedCVE-2021-22951
MISC
MISC
dell -- biosDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.2021-11-12not yet calculatedCVE-2021-36323
MISC
dell -- bios
 
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.2021-11-12not yet calculatedCVE-2021-36324
MISC
dell -- emc_scg
 
Dell EMC SCG 5.00.00.10 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information and use it.2021-11-20not yet calculatedCVE-2021-36340
MISC
dell -- emc_smartfabric
 
Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains a privilege escalation vulnerability. A malicious low privileged user with specific access to the API could potentially exploit this vulnerability to gain admin privileges on the affected system.2021-11-20not yet calculatedCVE-2021-36307
MISC
dell -- emc_smartfabric
 
Networking OS10, versions prior to October 2021 with Smart Fabric Services enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.2021-11-20not yet calculatedCVE-2021-36308
MISC
dell -- emc_smartfabric
 
Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system.2021-11-20not yet calculatedCVE-2021-36306
MISC
dell -- networking
 
Dell Networking OS10, versions 10.4.3.x, 10.5.0.x, 10.5.1.x & 10.5.2.x, contain an uncontrolled resource consumption flaw in its API service. A high-privileged API user may potentially exploit this vulnerability, leading to a denial of service.2021-11-20not yet calculatedCVE-2021-36310
MISC
dell -- networking
 
Dell Networking OS10 versions 10.4.3.x, 10.5.0.x and 10.5.1.x contain an information exposure vulnerability. A low privileged authenticated malicious user can gain access to SNMP authentication failure messages.2021-11-20not yet calculatedCVE-2021-36319
MISC
dell -- networking_x-series
 
Dell Networking X-Series firmware versions prior to 3.0.1.8 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially hijack a session and access the webserver by forging the session ID.2021-11-20not yet calculatedCVE-2021-36320
MISC
dell -- networking_x-series
 
Dell Networking X-Series firmware versions prior to 3.0.1.8 contain an improper input validation vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by sending specially crafted data to trigger a denial of service.2021-11-20not yet calculatedCVE-2021-36321
MISC
dell -- networking_x-series
 
Dell Networking X-Series firmware versions prior to 3.0.1.8 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary host header values to poison the web-cache or trigger redirections.2021-11-20not yet calculatedCVE-2021-36322
MISC
distribution_spec -- distribution_spec
 
The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields if they are unable to update to version 1.0.1 of the spec.2021-11-17not yet calculatedCVE-2021-41190
CONFIRM
MISC
MLIST
django -- helpdesk
 
django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')2021-11-19not yet calculatedCVE-2021-3950
MISC
CONFIRM
edgex -- edgex
 
Functions SDK for EdgeX is meant to provide all the plumbing necessary for developers to get started in processing/transforming/exporting data out of the EdgeX IoT platform. In affected versions broken encryption in app-functions-sdk “AES” transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors. The app-functions-sdk exports an “aes” transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation. Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the “aes” transform and provides an improved “aes256” transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends on the broken implementation. As the broken transform is a library function that is not invoked by default, users who do not use the AES transform in their processing pipelines are unaffected. Those that are affected are urged to upgrade to the Jakarta EdgeX release and modify processing pipelines to use the new "aes256" transform.2021-11-19not yet calculatedCVE-2021-41278
MISC
CONFIRM
elastic -- kibana
 
It was discovered that Kibana’s JIRA connector & IBM Resilient connector could be used to return HTTP response data on internal hosts, which may be intentionally hidden from public view. Using this vulnerability, a malicious user with the ability to create connectors, could utilize these connectors to view limited HTTP response data on hosts accessible to the cluster.2021-11-18not yet calculatedCVE-2021-37939
MISC
elastic -- kibana
 
It was discovered that on Windows operating systems specifically, Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension. Thanks to Dominic Couture for finding this vulnerability.2021-11-18not yet calculatedCVE-2021-37938
MISC
gallagher -- command_centre
 
Improper certificate validation vulnerability in SMTP Client allows man-in-the-middle attack to retrieve sensitive information from the Command Centre Server. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3); 8.40 versions prior to 8.40.2063 (MR4); 8.30 versions prior to 8.30.1454 (MR4) ; version 8.20 and prior versions.2021-11-18not yet calculatedCVE-2021-23167
MISC
gallagher -- command_centre
 
An Incomplete Comparison with Missing Factors vulnerability in the Gallagher Controller allows an attacker to bypass PIV verification. This issue affects: Gallagher Command Centre 8.40 versions prior to 8.40.1888 (MR3); 8.30 versions prior to 8.30.1454 (MR3); 8.20 versions prior to 8.20.1291 (MR5); 8.10 versions prior to 8.10.1284 (MR7); version 8.00 and prior versions.2021-11-18not yet calculatedCVE-2021-23146
MISC
gallagher -- command_centre_mobile_client
 
Improper validation of the cloud certificate chain in Mobile Client allows man-in-the-middle attack to impersonate the legitimate Command Centre Server. This issue affects: Gallagher Command Centre Mobile Client for Android 8.60 versions prior to 8.60.065; version 8.50 and prior versions.2021-11-18not yet calculatedCVE-2021-23155
MISC
gallagher -- command_centre_mobile_connect
 
Improper validation of the cloud certificate chain in Mobile Connect allows man-in-the-middle attack to impersonate the legitimate Command Centre Server. This issue affects: Gallagher Command Centre Mobile Connect for Android 15 versions prior to 15.04.040; version 14 and prior versions.2021-11-18not yet calculatedCVE-2021-23162
MISC
gallagher -- command_centre_server
 
Improper privilege validation vulnerability in COM Interface of Gallagher Command Centre Server allows authenticated unprivileged operators to retrieve sensitive information from the Command Centre Server. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3) ; 8.40 versions prior to 8.40.2063 (MR4); 8.30 versions prior to 8.30.1454 (MR4) ; 8.20 versions prior to 8.20.1291 (MR6); version 8.10 and prior versions.2021-11-18not yet calculatedCVE-2021-23193
MISC
gallagher -- command_centre_server
 
Unquoted service path vulnerability in the Gallagher Controller Service allows an unprivileged user to execute arbitrary code as the account that runs the Controller Service. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3) ;2021-11-18not yet calculatedCVE-2021-23197
MISC
gcc -- gcc
 
GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.2021-11-18not yet calculatedCVE-2021-37322
MISC
gerbv -- gerbv
 
An out-of-bounds write vulnerability exists in the drill format T-code tool number functionality of Gerbv 2.7.0, dev (commit b5f1eacd), and the forked version of Gerbv (commit 71493260). A specially-crafted drill file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.2021-11-19not yet calculatedCVE-2021-40391
MISC
getgrav -- getgrav
 
grav-plugin-admin is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')2021-11-19not yet calculatedCVE-2021-3920
MISC
CONFIRM
go-ethereum -- go-ethereum
 
Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with "runtime error: invalid memory address or nil pointer dereference" and arise a SEGV signal.2021-11-18not yet calculatedCVE-2021-43668
MISC
greenplum -- greenplum
 
In versions of Greenplum database prior to 5.28.14 and 6.17.0, certain statements execution led to the storage of sensitive(credential) information in the logs of the database. A malicious user with access to logs can read sensitive(credentials) information about users2021-11-19not yet calculatedCVE-2021-22030
MISC
greenplum -- greenplum
 
In versions of Greenplum database prior to 5.28.6 and 6.14.0, greenplum database contains a file path traversal vulnerability leading to information disclosure from the file system. A malicious user can read/write information from the file system using this vulnerability.2021-11-19not yet calculatedCVE-2021-22028
MISC
hitachi -- energy_relion_products
 
Insecure Boot Image vulnerability in Hitachi Energy Relion Relion 670/650/SAM600-IO series allows an attacker who manages to get access to the front network port and to cause a reboot sequences of the device may exploit the vulnerability, where there is a tiny time gap during the booting process where an older version of VxWorks is loaded prior to application firmware booting, could exploit the vulnerability in the older version of VxWorks and cause a denial-of-service on the product. This issue affects: Hitachi Energy Relion 670 Series 2.2.2 all revisions; 2.2.3 versions prior to 2.2.3.3. Hitachi Energy Relion 670/650 Series 2.2.0 all revisions; 2.2.4 all revisions. Hitachi Energy Relion 670/650/SAM600-IO 2.2.1 all revisions.2021-11-18not yet calculatedCVE-2021-35535
CONFIRM
hitachi -- energy_relion_products
 
Insufficient security control vulnerability in internal database access mechanism of Hitachi Energy Relion 670/650/SAM600-IO, Relion 650, GMS600, PWC600 allows attacker who successfully exploited this vulnerability, of which the product does not sufficiently restrict access to an internal database tables, could allow anybody with user credentials to bypass security controls that is enforced by the product. Consequently, exploitation may lead to unauthorized modifications on data/firmware, and/or to permanently disabling the product. This issue affects: Hitachi Energy Relion 670 Series 2.0 all revisions; 2.2.2 all revisions; 2.2.3 versions prior to 2.2.3.5. Hitachi Energy Relion 670/650 Series 2.1 all revisions. 2.2.0 all revisions; 2.2.4 all revisions; Hitachi Energy Relion 670/650/SAM600-IO 2.2.1 all revisions; 2.2.5 versions prior to 2.2.5.2. Hitachi Energy Relion 650 1.0 all revisions. 1.1 all revisions; 1.2 all revisions; 1.3 versions prior to 1.3.0.8; Hitachi Energy GMS600 1.3.0; 1.3.0.1; 1.2.0. Hitachi Energy PWC600 1.0.1 version 1.0.1.4 and prior versions; 1.1.0 version 1.1.0.1 and prior versions.2021-11-18not yet calculatedCVE-2021-35534
CONFIRM
CONFIRM
CONFIRM
hyperledger -- fabric
 
A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.1.0. This bug can be leveraged by constructing a message whose payload is nil and sending this message with the method 'forwardToLeader'. This bug has been admitted and fixed by the developers of Fabric. If leveraged, any leader node will crash.2021-11-18not yet calculatedCVE-2021-43667
MISC
MISC
hyperledger -- fabric
 
A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.0.1, v2.3.0. It can easily break down as many orderers as the attacker wants. This bug can be leveraged by constructing a message whose header is invalid to the interface Order. This bug has been admitted and fixed by the developers of Fabric.2021-11-18not yet calculatedCVE-2021-43669
MISC
MISC
imagemagick -- imagemagick
 
A flaw was found in ImageMagick 7.1.0-14 where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.2021-11-19not yet calculatedCVE-2021-3962
MISC
intel -- administrative_tools_for_intel_network_adapterfor_windows
 
Improper access control in the installer Intel(R)Administrative Tools for Intel(R) Network Adaptersfor Windowsbefore version 1.4.0.21 may allow an unauthenticated user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-33058
MISC
intel -- administrative_tools_for_intel_network_adapters
 
Improper input validation in the Intel(R) Administrative Tools for Intel(R) Network Adapters driver for Windows before version 1.4.0.15, may allow a privileged user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-33059
MISC
intel -- distribution_of_openvinoa_toolkit
 
Uncontrolled resource consumption in the Intel(R) Distribution of OpenVINOâ„¢ Toolkit before version 2021.4 may allow an unauthenticated user to potentially enable denial of service via local access.2021-11-17not yet calculatedCVE-2021-33073
MISC
intel -- ethernet
 
Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may allow an authenticated user to potentially enable denial of service via local access.2021-11-17not yet calculatedCVE-2021-33098
MISC
intel -- ethernet_700_series_controllers
 
Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-0200
MISC
intel -- ethernet_diagnostic_driver
 
Improper input validation in the Intel(R) Ethernet Diagnostic Driver for Windows before version 1.4.0.10 may allow a privileged user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-0135
MISC
intel -- ethernet_network_controllers
 
Protection mechanism failure in the firmware for the Intel(R) Ethernet Network Controller E810 before version 1.5.5.6 may allow a privileged user to enable a denial of service via local access.2021-11-17not yet calculatedCVE-2021-0197
MISC
intel -- ethernet_network_controllers
 
Improper input validation in the firmware for the Intel(R) Ethernet Network Controller E810 before version 1.6.0.6 may allow a privileged user to potentially enable a denial of service via local access.2021-11-17not yet calculatedCVE-2021-0199
MISC
intel -- ethernet_network_controllers
 
Improper access control in the firmware for the Intel(R) Ethernet Network Controller E810 before version 1.5.5.6 may allow a privileged user to potentially enable a denial of service via local access.2021-11-17not yet calculatedCVE-2021-0198
MISC
intel -- graphics_dch_driversImproper initialization in the installer for some Intel(R) Graphics DCH Drivers for Windows 10 before version 27.20.100.9316 may allow an authenticated user to potentially enable denial of service via local access.2021-11-17not yet calculatedCVE-2021-0120
MISC
intel -- haxm_softwareUncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable privilege escalation via local access.2021-11-17not yet calculatedCVE-2021-0180
MISC
intel -- haxm_software
 
Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable information disclosure via local access.2021-11-17not yet calculatedCVE-2021-0182
MISC
intel -- oneapi_rendering_toolkit
 
Incorrect default permissions in the installer for the Intel(R) oneAPI Rendering Toolkit before version 2021.2 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-33071
MISC
intel -- processorsImproper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-0158
MISC
intel -- processors
 
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-0157
MISC
intel -- processors
 
Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.2021-11-17not yet calculatedCVE-2021-0146
MISC
intel -- processors
 
Improper input validation in the Intel(R) SGX SDK applications compiled for SGX2 enabled processors may allow a privileged user to potentially escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-0186
MISC
intel -- proset/wireless_wifi
 
Uncontrolled search path in software installer for Intel(R) PROSet/Wireless WiFi in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-0082
MISC
intel -- realsense_d400_series_uwp_driver
 
Uncontrolled search path in the Intel(R) RealSense(TM) D400 Series UWP driver for Windows 10 before version 6.1.160.22 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-33063
MISC
intel -- serial_io_driver
 
Improper access control in the software installer for the Intel(R) Serial IO driver for Intel(R) NUC 11 Gen before version 30.100.2104.1 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-33118
MISC
intel -- sgx
 
Time-of-check time-of-use vulnerability in the Crypto API Toolkit for Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via network access.2021-11-17not yet calculatedCVE-2021-33097
MISC
intel -- ssd_dc
 
Insertion of information into log file in firmware for some Intel(R) SSD DC may allow a privileged user to potentially enable information disclosure via local access.2021-11-17not yet calculatedCVE-2021-0148
MISC
intel -- vtune_profiler
 
Incorrect default permissions in the software installer for the Intel(R) VTune(TM) Profiler before version 2021.3.0 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-33062
MISC
intel -- wireless_bluetooth_and_killer_bluetooth_productsImproper access control in the installer for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access.2021-11-17not yet calculatedCVE-2021-0151
MISC
intel -- wireless_bluetooth_and_killer_bluetooth_products
 
Improper verification of cryptographic signature in the installer for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products in Windows 10 may allow an authenticated user to potentially enable denial of service via local access.2021-11-17not yet calculatedCVE-2021-0152
MISC
ionic -- identity_vault
 
In Ionic Identity Vault before 5.0.5, the protection mechanism for invalid unlock attempts can be bypassed.2021-11-19not yet calculatedCVE-2021-44033
MISC
FULLDISC
kimai2 -- kimai2
 
kimai2 is vulnerable to Cross-Site Request Forgery (CSRF)2021-11-19not yet calculatedCVE-2021-3957
MISC
CONFIRM
kimai2 -- kimai2
 
kimai2 is vulnerable to Cross-Site Request Forgery (CSRF)2021-11-19not yet calculatedCVE-2021-3963
CONFIRM
MISC
kimai2 -- kimai2
 
kimai2 is vulnerable to Cross-Site Request Forgery (CSRF)2021-11-19not yet calculatedCVE-2021-3976
MISC
CONFIRM
librecad -- librecadA code execution vulnerability exists in the dxfRW::processLType() functionality of LibreCad libdxfrw 2.2.0-rc2-19-ge02f3580. A specially-crafted .dxf file can lead to a use-after-free vulnerability. An attacker can provide a malicious file to trigger this vulnerability.2021-11-19not yet calculatedCVE-2021-21900
MISC
librecad -- librecad
 
A code execution vulnerability exists in the dwgCompressor::copyCompBytes21 functionality of LibreCad libdxfrw 2.2.0-rc2-19-ge02f3580. A specially-crafted .dwg file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.2021-11-19not yet calculatedCVE-2021-21899
MISC
librecad -- librecad
 
A code execution vulnerability exists in the dwgCompressor::decompress18() functionality of LibreCad libdxfrw 2.2.0-rc2-19-ge02f3580. A specially-crafted .dwg file can lead to an out-of-bounds write. An attacker can provide a malicious file to trigger this vulnerability.2021-11-19not yet calculatedCVE-2021-21898
MISC
metabase -- metabase
 
Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.2021-11-17not yet calculatedCVE-2021-41277
MISC
CONFIRM
microsoft -- clarity
 
There is a Cross-Site Scripting vulnerability in Microsoft Clarity version 0.3. The XSS payload executes whenever the user changes the clarity configuration in Microsoft Clarity version 0.3. The payload is stored on the configuring project Id page.2021-11-19not yet calculatedCVE-2021-33850
MISC
myscada -- mydesigner
 
mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution.2021-11-19not yet calculatedCVE-2021-43555
MISC
netflix -- spring_cloud_netflix_hysterix_dashboard
 
Applications using both `spring-cloud-netflix-hystrix-dashboard` and `spring-boot-starter-thymeleaf` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.2021-11-19not yet calculatedCVE-2021-22053
MISC
nvdia -- nvdiaNVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to access debug registers during runtime, which may lead to information disclosure.2021-11-20not yet calculatedCVE-2021-1105
CONFIRM
nvdia -- nvdia
 
NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to utilize debug mechanisms with insufficient access control, which may lead to information disclosure.2021-11-20not yet calculatedCVE-2021-1088
CONFIRM
nvdia -- nvdia
 
NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to corrupt program data.2021-11-20not yet calculatedCVE-2021-1125
CONFIRM
nvidia -- gpu_and_tegraNVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to access protected information, which may lead to information disclosure.2021-11-20not yet calculatedCVE-2021-23219
CONFIRM
nvidia -- gpu_and_tegraNVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to instantiate a specifically timed DMA write to corrupt code execution, which may impact confidentiality, integrity, or availability.2021-11-20not yet calculatedCVE-2021-23217
CONFIRM
nvidia -- gpu_and_tegra
 
NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to gain access to information from unscrubbed registers, which may lead to information disclosure.2021-11-20not yet calculatedCVE-2021-34399
CONFIRM
nvidia -- gpu_and_tegra
 
NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to gain access to information from unscrubbed memory, which may lead to information disclosure.2021-11-20not yet calculatedCVE-2021-34400
CONFIRM
nvidia -- gpu_and_tegra
 
NVIDIA GPU and Tegra hardware contain a vulnerability in an internal microcontroller which may allow a user with elevated privileges to generate valid microcode. This could lead to information disclosure, data corruption, or denial of service of the device.2021-11-20not yet calculatedCVE-2021-23201
CONFIRM
opensource -- moddableOpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fx_String_prototype_repeat function at /moddable/xs/sources/xsString.c.2021-11-19not yet calculatedCVE-2021-29325
MISC
opensource -- moddableOpenSource Moddable v10.5.0 was discovered to contain a stack overflow in the fxBinaryExpressionNodeDistribute function at /moddable/xs/sources/xsTree.c.2021-11-19not yet calculatedCVE-2021-29329
MISC
opensource -- moddableOpenSource Moddable v10.5.0 was discovered to contain buffer over-read in the fxDebugThrow function at /moddable/xs/sources/xsDebug.c.2021-11-19not yet calculatedCVE-2021-29328
MISC
opensource -- moddableOpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fx_ArrayBuffer function at /moddable/xs/sources/xsDataView.c.2021-11-19not yet calculatedCVE-2021-29327
MISC
opensource -- moddable
 
OpenSource Moddable v10.5.0 was discovered to contain a stack overflow via the component /moddable/xs/sources/xsScript.c.2021-11-19not yet calculatedCVE-2021-29324
MISC
opensource -- moddable
 
OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fxIDToString function at /moddable/xs/sources/xsSymbol.c.2021-11-19not yet calculatedCVE-2021-29326
MISC
opensource -- moddable
 
OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow via the component /modules/network/wifi/esp/modwifi.c.2021-11-19not yet calculatedCVE-2021-29323
MISC
oroinc -- client_relationship_management
 
OroCRM is an open source Client Relationship Management (CRM) application. Affected versions we found to suffer from a vulnerability which could an attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack. There are no workarounds that address this vulnerability and all users are advised to update their package.2021-11-19not yet calculatedCVE-2021-39198
CONFIRM
phillips -- mri_1.5_and_mri_3t
 
Philips MRI 1.5T and MRI 3T Version 5.x.x assigns an owner who is outside the intended control sphere to a resource.2021-11-19not yet calculatedCVE-2021-26248
MISC
MISC
phillips -- mri_1.5_and_mri_3t
 
Philips MRI 1.5T and MRI 3T Version 5.x.x does not restrict or incorrectly restricts access to a resource from an unauthorized actor.2021-11-19not yet calculatedCVE-2021-26262
MISC
MISC
phillips -- mri_1.5t_and_mri_3t
 
Philips MRI 1.5T and MRI 3T Version 5.x.x exposes sensitive information to an actor not explicitly authorized to have access.2021-11-19not yet calculatedCVE-2021-42744
MISC
MISC
pi -- server
 
A remote authenticated attacker with write access to a PI Server could trick a user into interacting with a PI Web API endpoint and redirect them to a malicious website. As a result, a victim may disclose sensitive information to the attacker or be provided with false information.2021-11-18not yet calculatedCVE-2021-43549
MISC
prototype_pollution -- prototype_pollution
 
The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns.2021-11-19not yet calculatedCVE-2021-23433
MISC
MISC
MISC
pterodactyl -- pterodactyl
 
Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints: Sending a test email and Generating a node auto-deployment token. At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system. This has been addressed in release `1.6.6`. Users may optionally manually apply the fixes released in v1.6.6 to patch their own systems.2021-11-17not yet calculatedCVE-2021-41273
CONFIRM
MISC
pulse_connect_secure -- pulse_connect_secure
 
A vulnerability in Pulse Connect Secure before 9.1R12.1 could allow an unauthenticated administrator to causes a denial of service when a malformed request is sent to the device.2021-11-19not yet calculatedCVE-2021-22965
MISC
puppet -- agent
 
A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'.2021-11-18not yet calculatedCVE-2021-27025
MISC
puppet -- agent_and_puppet_server
 
A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-10000072021-11-18not yet calculatedCVE-2021-27023
MISC
puppet -- enterprise
 
A flaw was divered in Puppet Enterprise and other Puppet products where sensitive plan parameters may be logged2021-11-18not yet calculatedCVE-2021-27026
MISC
puppet -- enterprise
 
A flaw was discovered in Continuous Delivery for Puppet Enterprise (CD4PE) that results in a user with lower privileges being able to access a Puppet Enterprise API token. This issue is resolved in CD4PE 4.10.02021-11-18not yet calculatedCVE-2021-27024
MISC
qmailagent -- qmailagent
 
We have already fixed this vulnerability in the following versions of QmailAgent: QmailAgent 3.0.2 ( 2021/08/25 ) and later2021-11-20not yet calculatedCVE-2021-34358
CONFIRM
quagga -- quagga
 
An issue was discovered in Quagga through 1.2.4. Unsafe chown/chmod operations in the suggested spec file allow users (with control of the non-root-owned directory /etc/quagga) to escalate their privileges to root upon package installation or update.2021-11-19not yet calculatedCVE-2021-44038
MISC
MISC
roundcube -- roundcube
 
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.2021-11-19not yet calculatedCVE-2021-44026
MISC
MISC
MISC
roundcube -- roundcube
 
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to XSS in handling an attachment's filename extension when displaying a MIME type warning message.2021-11-19not yet calculatedCVE-2021-44025
MISC
MISC
MISC
MISC
sas -- intrnet
 
SAS/Intrnet 9.4 build 1520 and earlier allows Local File Inclusion. The samples library (included by default) in the appstart.sas file, allows end-users of the application to access the sample.webcsf1.sas program, which contains user-controlled macro variables that are passed to the DS2CSF macro. Users can escape the context of the configured user-controllable variable and append additional functions native to the macro but not included as variables within the library. This includes a function that retrieves files from the host OS.2021-11-19not yet calculatedCVE-2021-41569
MISC
sharetribe_go -- sharetribe_go
 
Sharetribe Go is a source available marketplace software. In affected versions operating system command injection is possible on installations of Sharetribe Go, that do not have a secret AWS Simple Notification Service (SNS) notification token configured via the `sns_notification_token` configuration parameter. This configuration parameter is unset by default. The vulnerability has been patched in version 10.2.1. Users who are unable to upgrade should set the`sns_notification_token` configuration parameter to a secret value.2021-11-19not yet calculatedCVE-2021-41280
CONFIRM
MISC
MISC
snapdragon -- qnap
 
A reflected cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Ragic Cloud DB. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic.2021-11-20not yet calculatedCVE-2021-38681
CONFIRM
snipe-it -- snipe-it
 
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')2021-11-19not yet calculatedCVE-2021-3961
CONFIRM
MISC
solidus_auth_devise -- solidus_auth_devise
 
solidus_auth_devise provides authentication services for the Solidus webstore framework, using the Devise gem. In affected versions solidus_auth_devise is subject to a CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both: Executed whether as: A `before_action` callback (the default) or A `prepend_before_action` (option `prepend: true` given) before the `:load_object` hook in `Spree::UserController` (most likely order to find). Configured to use `:null_session` or `:reset_session` strategies (`:null_session` is the default in case the no strategy is given, but `rails --new` generated skeleton use `:exception`). Users should promptly update to `solidus_auth_devise` version `2.5.4`. Users unable to update should if possible, change their strategy to `:exception`. Please see the linked GHSA for more workaround details.2021-11-17not yet calculatedCVE-2021-41274
CONFIRM
MISC
spree_auth_devise -- spree_auth_devise
 
spree_auth_devise is an open source library which provides authentication and authorization services for use with the Spree storefront framework by using an underlying Devise authentication framework. In affected versions spree_auth_devise is subject to a CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of spree_auth_devise are affected if protect_from_forgery method is both: Executed whether as: A before_action callback (the default). A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). Users are advised to update their spree_auth_devise gem. For users unable to update it may be possible to change your strategy to :exception. Please see the linked GHSA for more workaround details. ### Impact CSRF vulnerability that allows user account takeover. All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both: * Executed whether as: * A before_action callback (the default) * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find). * Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception). That means that applications that haven't been configured differently from what it's generated with Rails aren't affected. Thanks @waiting-for-dev for reporting and providing a patch ? ### Patches Spree 4.3 users should update to spree_auth_devise 4.4.1 Spree 4.2 users should update to spree_auth_devise 4.2.1 ### Workarounds If possible, change your strategy to :exception: ```ruby class ApplicationController < ActionController::Base protect_from_forgery with: :exception end ``` Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller: ```ruby config.after_initialize do Spree::UsersController.protect_from_forgery with: :exception end ``` ### References https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg22021-11-17not yet calculatedCVE-2021-41275
MISC
CONFIRM
styra -- open_policy_agent_gatekeeper
 
** DISPUTED ** Styra Open Policy Agent (OPA) Gatekeeper through 3.7.0 mishandles concurrency, sometimes resulting in incorrect access control. The data replication mechanism allows policies to access the Kubernetes cluster state. During data replication, OPA/Gatekeeper does not wait for the replication to finish before processing a request, which might cause inconsistencies between the replicated resources in OPA/Gatekeeper and the resources actually present in the cluster. Inconsistency can later be reflected in a policy bypass. NOTE: the vendor disagrees that this is a vulnerability, because Kubernetes states are only eventually consistent.2021-11-17not yet calculatedCVE-2021-43979
MISC
MISC
suricata -- suricata
 
Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.2021-11-19not yet calculatedCVE-2021-37592
MISC
CONFIRM
CONFIRM
team_password_manager -- team_password_manager
 
Team Password Manager (aka TeamPasswordManager) before 10.135.236 allows password-reset poisoning.2021-11-19not yet calculatedCVE-2021-44037
MISC
MISC
team_password_manager -- team_password_manager
 
Team Password Manager (aka TeamPasswordManager) before 10.135.236 has a CSRF vulnerability during import.2021-11-19not yet calculatedCVE-2021-44036
MISC
MISC
vim -- vim
 
vim is vulnerable to Heap-based Buffer Overflow2021-11-19not yet calculatedCVE-2021-3968
CONFIRM
MISC
vim -- vim
 
vim is vulnerable to Use After Free2021-11-19not yet calculatedCVE-2021-3974
MISC
CONFIRM
vim -- vim
 
vim is vulnerable to Heap-based Buffer Overflow2021-11-19not yet calculatedCVE-2021-3973
MISC
CONFIRM
wireshark -- wireshark
 
Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file2021-11-19not yet calculatedCVE-2021-39929
MISC
MISC
CONFIRM
wireshark -- wireshark
 
Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file2021-11-19not yet calculatedCVE-2021-39925
CONFIRM
MISC
MISC
wireshark -- wireshark
 
NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file2021-11-18not yet calculatedCVE-2021-39920
MISC
MISC
CONFIRM
wireshark -- wireshark
 
NULL pointer exception in the Modbus dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file2021-11-19not yet calculatedCVE-2021-39921
MISC
MISC
CONFIRM
wireshark -- wireshark
 
Buffer overflow in the C12.22 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file2021-11-19not yet calculatedCVE-2021-39922
CONFIRM
MISC
MISC
wireshark -- wireshark
 
NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file2021-11-19not yet calculatedCVE-2021-39923
CONFIRM
MISC
MISC
wireshark -- wireshark
 
Large loop in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file2021-11-19not yet calculatedCVE-2021-39924
MISC
CONFIRM
MISC
wireshark -- wireshark
 
Buffer overflow in the Bluetooth HCI_ISO dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file2021-11-19not yet calculatedCVE-2021-39926
MISC
CONFIRM
MISC
wireshark -- wireshark
 
NULL pointer exception in the IEEE 802.11 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file2021-11-18not yet calculatedCVE-2021-39928
CONFIRM
MISC
MISC
wordpress -- wordpress
 
The Duplicate Post WordPress plugin up to and including version 1.1.9 is vulnerable to SQL Injection. SQL injection vulnerabilities occur when client supplied data is included within an SQL Query insecurely. SQL Injection can typically be exploited to read, modify and delete SQL table data. In many cases it also possible to exploit features of SQL server to execute system commands and/or access the local file system. This particular vulnerability can be exploited by any authenticated user who has been granted access to use the Duplicate Post plugin. By default, this is limited to Administrators, however the plugin presents the option to permit access to the Editor, Author, Contributor and Subscriber roles.2021-11-19not yet calculatedCVE-2021-43408
MISC
MISC
wordpress -- wordpress
 
The Easy Registration Forms WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the ajax_add_form function found in the ~/includes/class-form.php file which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 2.1.1.2021-11-19not yet calculatedCVE-2021-39353
MISC
MISC
wordpress -- wordpress
 
Authenticated Persistent Cross-Site Scripting (XSS) vulnerability discovered in WordPress Backup Migration plugin <= 1.1.5 versions.2021-11-19not yet calculatedCVE-2021-36884
CONFIRM
CONFIRM
wordpress -- wordpress
 
The "WPO365 | LOGIN" WordPress plugin (up to and including version 15.3) by wpo365.com is vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability (also known as Stored or Second-Order XSS). Persistent XSS vulnerabilities occur when the application stores and retrieves client supplied data without proper handling of dangerous content. This type of XSS vulnerability is exploited by submitting malicious script content to the application which is then retrieved and executed by other application users. The attacker could exploit this to conduct a range of attacks against users of the affected application such as session hijacking, account take over and accessing sensitive data. In this case, the XSS payload can be submitted by any anonymous user, the payload then renders and executes when a WordPress administrator authenticates and accesses the WordPress Dashboard. The injected payload can carry out actions on behalf of the administrator including adding other administrative users and changing application settings. This flaw could be exploited to ultimately provide full control of the affected system to the attacker.2021-11-19not yet calculatedCVE-2021-43409
MISC
MISC

Back to top

Please share your thoughts

We recently updated our anonymous product survey; we’d welcome your feedback.