Vulnerability Summary for the Week of September 27, 2021

Released
Oct 04, 2021
Document ID
SB21-277

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.

Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High: vulnerabilities with a CVSS base score of 7.0–10.0
  • Medium: vulnerabilities with a CVSS base score of 4.0–6.9
  • Low: vulnerabilities with a CVSS base score of 0.0–3.9

Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. 


 

High Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
adobe -- digital_editionsAdobe Digital Editions 4.5.11.187646 (and earlier) are affected by an arbitrary command execution vulnerability. An authenticated attacker could leverage this vulnerability to execute arbitrary commands. User interaction is required to abuse this vulnerability in that a user must open a maliciously crafted .epub file.2021-09-279.3CVE-2021-39826
MISC
adobe -- photoshop_2020Adobe Photoshop versions 21.2.11 (and earlier) and 22.5 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted SVG file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-279.3CVE-2021-40709
MISC
adobe -- premiere_elementsAdobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious png file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-279.3CVE-2021-39824
MISC
atlassian -- floodlightFloodlight through 1.2 has poor input validation in checkFlow in StaticFlowEntryPusherResource.java because of undefined fields mishandling.2021-09-307.5CVE-2020-18683
MISC
atlassian -- floodlightFloodlight through 1.2 has poor input validation in checkFlow in StaticFlowEntryPusherResource.java because of unchecked prerequisites related to TCP or UDP ports, or group or table IDs.2021-09-307.5CVE-2020-18685
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. Path Traversal leading to RCE via external form by adding a regular expression.2021-09-277.5CVE-2021-40098
MISC
MISC
github -- enterprise_serverAn improper access control vulnerability in GitHub Enterprise Server allowed a workflow job to execute in a self-hosted runner group it should not have had access to. This affects customers using self-hosted runner groups for access control. A repository with access to one enterprise runner group could access all of the enterprise runner groups within the organization because of improper authentication checks during the request. This could cause code to be run unintentionally by the incorrect runner group. This vulnerability affected GitHub Enterprise Server versions from 3.0.0 to 3.0.15 and 3.1.0 to 3.1.7 and was fixed in 3.0.16 and 3.1.8 releases.2021-09-247.5CVE-2021-22869
MISC
MISC
lodash -- lodash** DISPUTED ** A command injection vulnerability in Lodash 4.17.21 allows attackers to achieve arbitrary code execution via the template function. This is a different parameter, method, and version than CVE-2021-23337. NOTE: the vendor's position is that it's the developer's responsibility to ensure that a template does not evaluate code that originates from untrusted input.2021-09-307.5CVE-2021-41720
MISC
microfocus -- arcsight_enterprise_security_managerRemote Code Execution vulnerability in Micro Focus ArcSight Enterprise Security Manager (ESM) product, affecting versions 7.0.2 through 7.5. The vulnerability could be exploited resulting in remote code execution.2021-09-287.5CVE-2021-38124
MISC
nagios -- nagios_xiNagios XI before 5.8.5 has Incorrect Permission Assignment for repairmysql.sh.2021-09-287.5CVE-2021-36365
CONFIRM
CONFIRM
nagios -- nagios_xiNagios XI before 5.8.5 has Incorrect Permission Assignment for migrate.php.2021-09-287.5CVE-2021-36363
CONFIRM
CONFIRM
openvpn-monitor_project -- openvpn-monitorfurlongm openvpn-monitor through 1.1.3 allows %0a command injection via the OpenVPN management interface socket. This can shut down the server via signal%20SIGTERM.2021-09-277.8CVE-2021-31605
MISC
MISC
oracle -- linuxVulnerability in Oracle Linux (component: OSwatcher). Supported versions that are affected are 7 and 8. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Linux executes to compromise Oracle Linux. Successful attacks of this vulnerability can result in takeover of Oracle Linux. CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).2021-09-247.2CVE-2021-2464
MISC
phoenixcontact -- plcnext_technology_starterkit_firmwareMultiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.2021-09-277.8CVE-2021-34570
CONFIRM
set_user_project -- set_userThe set_user extension module before 3.0.0 for PostgreSQL allows ProcessUtility_hook bypass via set_config.2021-09-277.5CVE-2021-41558
CONFIRM
skale -- sgxwalletAn issue was discovered in SKALE sgxwallet 1.58.3. The provided input for ECALL 14 triggers a branch in trustedEcdsaSign that frees a non-initialized pointer from the stack. An attacker can chain multiple enclave calls to prepare a stack that contains a valid address. This address is then freed, resulting in compromised integrity of the enclave. This was resolved after v1.58.3 and not reproducible in sgxwallet v1.77.0.2021-09-277.5CVE-2021-36219
MISC
MISC
stylemixthemes -- ulistingUnauthenticated Privilege Escalation vulnerability in WordPress uListing plugin (versions <= 2.0.5). Possible if WordPress configuration allows user registration.2021-09-277.5CVE-2021-36879
MISC
CONFIRM
stylemixthemes -- ulistingUnauthenticated SQL Injection (SQLi) vulnerability in WordPress uListing plugin (versions <= 2.0.3), vulnerable parameter: custom.2021-09-277.5CVE-2021-36880
MISC
CONFIRM
surelinesystems -- sureedge_migratorA SQL injection vulnerability exists in Sureline SUREedge Migrator 7.0.7.29360.2021-09-287.5CVE-2021-38303
MISC
MISC
trendmicro -- serverprotectA vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.2021-09-2910CVE-2021-36745
MISC
MISC
MISC
zohocorp -- manageengine_admanager_plusZoho ManageEngine ADManager Plus version 7110 and prior is vulnerable to unrestricted file upload, leading to remote code execution.2021-09-277.5CVE-2021-37761
MISC
MISC
zohocorp -- manageengine_admanager_plusZoho ManageEngine ADManager Plus before 7111 is vulnerable to unrestricted file which leads to Remote code execution.2021-09-277.5CVE-2021-37539
MISC
MISC
zyxel -- zywall_vpn2s_firmwareA command injection vulnerability in the CGI program of the Zyxel VPN2S firmware version 1.12 could allow an authenticated, local user to execute arbitrary OS commands.2021-09-297.2CVE-2021-35028
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
adobe -- creative_cloud_desktop_applicationAdobe Creative Cloud Desktop Application for macOS version 5.3 (and earlier) is affected by a privilege escalation vulnerability that could allow a normal user to delete the OOBE directory and get permissions of any directory under the administrator authority.2021-09-294.6CVE-2021-28547
MISC
adobe -- digital_editionsAdobe Digital Editions 4.5.11.187646 (and earlier) are affected by a privilege escalation vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to escalate privileges. User interaction is required before product installation to abuse this vulnerability.2021-09-276.8CVE-2021-39828
MISC
adobe -- digital_editionsAdobe Digital Editions 4.5.11.187646 (and earlier) are affected by an arbitrary file write vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to write an arbitrary file to the system. User interaction is required before product installation to abuse this vulnerability.2021-09-276.8CVE-2021-39827
MISC
adobe -- experience_managerAdobe Experience Manager version 6.5.9.0 (and earlier) is affected by a stored XSS vulnerability when creating Content Fragments. An authenticated attacker can send a malformed POST request to achieve server-side denial of service. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.2021-09-274.3CVE-2021-40711
MISC
adobe -- experience_managerAdobe Experience Manager version 6.5.9.0 (and earlier) is affected by a improper input validation vulnerability via the path parameter. An authenticated attacker can send a malformed POST request to achieve server-side denial of service.2021-09-274CVE-2021-40712
MISC
adobe -- experience_managerAdobe Experience Manager version 6.5.9.0 (and earlier) is affected by a improper certificate validation vulnerability in the cold storage component. If an attacker can achieve a man in the middle when the cold server establishes a new certificate, they would be able to harvest sensitive information.2021-09-274.3CVE-2021-40713
MISC
adobe -- experience_managerAdobe Experience Manager version 6.5.9.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability via the accesskey parameter. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser2021-09-274.3CVE-2021-40714
MISC
adobe -- incopyAdobe InCopy version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-276.8CVE-2021-39818
MISC
adobe -- incopyAdobe InCopy version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious XML file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-276.8CVE-2021-39819
MISC
adobe -- indesignAdobe InDesign versions 16.3 (and earlier), and 16.3.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.2021-09-296.8CVE-2021-39821
MISC
apache -- druidIn the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.2021-09-244CVE-2021-36749
MISC
MLIST
asus -- armoury_crate_lite_serviceASUS ROG Armoury Crate Lite before 4.2.10 allows local users to gain privileges by placing a Trojan horse file in the publicly writable %PROGRAMDATA%\ASUS\GamingCenterLib directory.2021-09-274.4CVE-2021-40981
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. Authenticated path traversal leads to to remote code execution via uploaded PHP code, related to the bFilename parameter.2021-09-276.5CVE-2021-40097
MISC
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. There is unauthenticated stored XSS in blog comments via the website field.2021-09-274.3CVE-2021-40106
MISC
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. There is XSS via Markdown Comments.2021-09-274.3CVE-2021-40105
MISC
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. There is an SVG sanitizer bypass.2021-09-275CVE-2021-40104
MISC
MISC
concretecms -- concrete_cmsA SSRF issue was discovered in Concrete CMS through 8.5.5. Users can access forbidden files on their local network. A user with permissions to upload files from external sites can upload a URL that redirects to an internal resource of any file type. The redirect is followed and loads the contents of the file from the redirected-to server. Files of disallowed types can be uploaded.2021-09-275.5CVE-2021-40109
MISC
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. Arbitrary File deletion can occur via PHAR deserialization in is_dir (PHP Object Injection associated with the __wakeup magic method).2021-09-246.4CVE-2021-40102
MISC
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. Fetching the update json scheme over HTTP leads to remote code execution.2021-09-246.5CVE-2021-40099
MISC
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. Path Traversal can lead to Arbitrary File Reading and SSRF.2021-09-275CVE-2021-40103
MISC
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. The Calendar is vulnerable to CSRF. ccm_token is not verified on the ccm/calendar/dialogs/event/add/save endpoint.2021-09-276.8CVE-2021-40108
MISC
MISC
couchbase -- couchbase_serverCouchbase Server 6.5.x, 6.6.x through 6.6.2, and 7.0.0 has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.2021-09-295CVE-2021-35944
MISC
MISC
couchbase -- couchbase_serverCouchbase Server 6.5.x, 6.6.0 through 6.6.2, and 7.0.0, has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.2021-09-295CVE-2021-35945
MISC
MISC
d-link -- dcs-932l_firmware** UNSUPPORTED WHEN ASSIGNED ** DCS-5000L v1.05 and DCS-932L v2.17 and older are affecged by Incorrect Acess Control. The use of the basic authentication for the devices command interface allows attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.2021-09-245.2CVE-2021-41503
MISC
MISC
d-link -- dcs-932l_firmware** UNSUPPORTED WHEN ASSIGNED ** An Elevated Privileges issue exists in D-Link DCS-5000L v1.05 and DCS-932L v2.17 and older. The use of the digest-authentication for the devices command interface may allow further attack vectors that may compromise the cameras configuration and allow malicious users on the LAN to access the device. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.2021-09-245.2CVE-2021-41504
MISC
MISC
dell -- emc_networkerDell NetWorker, versions 18.x and 19.x contain a Path traversal vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information.2021-09-284CVE-2021-21569
MISC
dell -- emc_networkerDell NetWorker, versions 18.x and 19.x contain an Information disclosure vulnerability. A NetWorker server user with remote access to NetWorker clients may potentially exploit this vulnerability and gain access to unauthorized information.2021-09-284CVE-2021-21570
MISC
dlink -- dir-605l_firmwareAn informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page2021-09-245CVE-2021-40655
MISC
MISC
dlink -- dir-615_firmwareAn information disclosure issue exist in D-LINK-DIR-615 B2 2.01mt. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page2021-09-244CVE-2021-40654
MISC
MISC
firefly-iii -- firefly_iiifirefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)2021-09-276.8CVE-2021-3819
CONFIRM
MISC
getgrav -- gravgrav is vulnerable to Reliance on Cookies without Validation and Integrity Checking2021-09-275CVE-2021-3818
MISC
CONFIRM
getgrav -- grav-plugin-admingrav-plugin-admin is vulnerable to Improper Restriction of Rendered UI Layers or Frames2021-09-275.8CVE-2021-3799
CONFIRM
MISC
gilacms -- gila_cmsA Cross-Site Request Forgery (CSRF) in GilaCMS v1.11.4 allows authenticated attackers to arbitrarily add administrator accounts.2021-09-276.8CVE-2020-20693
MISC
gilacms -- gila_cmsGilaCMS v1.11.4 was discovered to contain a SQL injection vulnerability via the $_GET parameter in /src/core/controllers/cm.php.2021-09-276.5CVE-2020-20692
MISC
MISC
github -- enterprise_serverA path traversal vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to read files on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.1.8 and was fixed in 3.1.8, 3.0.16, and 2.22.22. This vulnerability was reported via the GitHub Bug Bounty program. This is the result of an incomplete fix for CVE-2021-22867.2021-09-244CVE-2021-22868
MISC
MISC
MISC
google -- androidIn m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.2021-09-274.6CVE-2021-0611
MISC
google -- androidIn memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.2021-09-274.6CVE-2021-0610
MISC
google -- androidIn ccu, there is a possible out of bounds read due to incorrect error handling. This could lead to information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05827145; Issue ID: ALPS05827145.2021-09-274CVE-2021-0660
MISC
google -- androidIn m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.2021-09-274.6CVE-2021-0612
MISC
gradle -- gradleIn Gradle Enterprise before 2021.1.3, an attacker with the ability to perform SSRF attacks can potentially reset the system user password.2021-09-245CVE-2021-41586
MISC
gradle -- gradleGradle Enterprise before 2021.1.3 can allow unauthorized viewing of a response (information disclosure of possibly sensitive build/configuration details) via a crafted HTTP request with the X-Gradle-Enterprise-Ajax-Request header.2021-09-245CVE-2021-41584
MISC
gradle -- gradleIn Gradle Enterprise before 2021.1.3, an attacker with the ability to perform SSRF attacks can potentially discover credentials for other resources.2021-09-245CVE-2021-41587
MISC
gradle -- gradleIn Gradle Enterprise before 2021.1.3, a crafted request can trigger deserialization of arbitrary unsafe Java objects. The attacker must have the encryption and signing keys.2021-09-246.8CVE-2021-41588
MISC
ibm -- sterling_order_managementIBM Sterling Order Management 9.4, 9.5, and 10.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199179.2021-09-304.3CVE-2021-20554
XF
CONFIRM
inflect_project -- inflectinflect is vulnerable to Inefficient Regular Expression Complexity2021-09-275CVE-2021-3820
MISC
CONFIRM
jsoneditoronline -- jsoneditorjsoneditor is vulnerable to Inefficient Regular Expression Complexity2021-09-275CVE-2021-3822
MISC
CONFIRM
kindsoft -- kindeditorCross Site Scripting (XSS) vulnerability exists in all versions of KindEditor, which can be exploited by an attacker to obtain user cookie information.2021-09-284.3CVE-2021-37267
MISC
kindsoft -- kindeditorCross Site Scripting (XSS) vulnerability exists in KindEditor (Chinese versions) 4.1.12, which can be exploited by an attacker to obtain user cookie information.2021-09-284.3CVE-2021-30086
MISC
MISC
laracms_project -- laracmsLaraCMS v1.0.1 transmits sensitive information in cleartext which can be intercepted by attackers.2021-09-295CVE-2020-20128
MISC
maccms -- maccmsA Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/<id>.html allows authenticated attackers to delete all users.2021-09-244.9CVE-2020-20514
MISC
nltk -- nltknltk is vulnerable to Inefficient Regular Expression Complexity2021-09-275CVE-2021-3828
CONFIRM
MISC
openbsd -- libresslx509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.2021-09-244.3CVE-2021-41581
MISC
openbsd -- opensshsshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.2021-09-266CVE-2021-41617
MISC
MISC
MISC
CONFIRM
FEDORA
FEDORA
opennms -- opennmsOpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP agent supplied data. By creating a malicious SNMP 'sysName' or 'sysContact' response, an attacker can store an XSS payload which will trigger when a user of the web UI views the data. This issue was fixed in version 18.0.2, released on September 20, 2016.2021-09-244.3CVE-2016-6556
MISC
MISC
opennms -- opennmsOpenNMS version 18.0.1 and prior are vulnerable to a stored XSS issue due to insufficient filtering of SNMP trap supplied data. By creating a malicious SNMP trap, an attacker can store an XSS payload which will trigger when a user of the web UI views the events list page. This issue was fixed in version 18.0.2, released on September 20, 2016.2021-09-244.3CVE-2016-6555
MISC
MISC
openvpn-monitor_project -- openvpn-monitorfurlongm openvpn-monitor through 1.1.3 allows Authorization Bypass to disconnect arbitrary clients.2021-09-275CVE-2021-31606
MISC
MISC
openvpn-monitor_project -- openvpn-monitorfurlongm openvpn-monitor through 1.1.3 allows CSRF to disconnect an arbitrary client.2021-09-274.3CVE-2021-31604
MISC
MISC
os4ed -- opensisA SQL injection vulnerability exists in the Take Attendance functionality of OS4Ed's OpenSIS 8.0. allows an attacker to inject their own SQL query. The cp_id_miss_attn parameter from TakeAttendance.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request as a user with access to "Take Attendance" functionality to trigger this vulnerability.2021-09-246.5CVE-2021-40309
MISC
MISC
MISC
pingidentity -- pingaccessPing Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation.2021-09-245CVE-2021-31923
CONFIRM
shopkit_project -- shopkitShopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.2021-09-244.3CVE-2020-20508
MISC
siemens -- solid_edgeA vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13789).2021-09-286.8CVE-2021-41537
MISC
MISC
siemens -- solid_edgeA vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to information disclosure by unexpected access to an uninitialized pointer while parsing user-supplied OBJ files. An attacker could leverage this vulnerability to leak information from unexpected memory locations (ZDI-CAN-13770).2021-09-284.3CVE-2021-41538
MISC
MISC
siemens -- solid_edgeA vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703).2021-09-284.3CVE-2021-41534
MISC
MISC
siemens -- solid_edgeA vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13565).2021-09-284.3CVE-2021-41533
MISC
MISC
siemens -- solid_edgeA vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13778).2021-09-286.8CVE-2021-41536
MISC
MISC
siemens -- solid_edgeA vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771).2021-09-286.8CVE-2021-41535
MISC
MISC
siemens -- solid_edgeA vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13776).2021-09-286.8CVE-2021-41540
MISC
MISC
siemens -- solid_edgeA vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13773).2021-09-286.8CVE-2021-41539
MISC
MISC
skale -- sgxwalletAn issue was discovered in SKALE sgxwallet 1.58.3. sgx_disp_ippsAES_GCMEncrypt allows an out-of-bounds write, resulting in a segfault and compromised enclave. This issue describes a buffer overflow, which was resolved prior to v1.77.0 and not reproducible in latest sgxwallet v1.77.02021-09-275CVE-2021-36218
MISC
MISC
speed_test_project -- speed_teste7d Speed Test (aka speedtest) 0.5.3 allows a path-traversal attack that results in information disclosure via the "GET /.." substring.2021-09-275CVE-2021-40349
MISC
MISC
spotweb_project -- spotwebCross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the firstname parameter.2021-10-014.3CVE-2021-40969
MISC
MISC
streama_project -- streamaA cross-site request forgery (CSRF) vulnerability exists in Streama up to and including v1.10.3. The application does not have CSRF checks in place when performing actions such as uploading local files. As a result, attackers could make a logged-in administrator upload arbitrary local files via a CSRF attack and send them to the attacker.2021-09-296.8CVE-2021-41764
MISC
MISC
MISC
stylemixthemes -- ulistingAuthenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5).2021-09-276.5CVE-2021-36874
MISC
CONFIRM
stylemixthemes -- ulistingMultiple Cross-Site Request Forgery (CSRF) vulnerabilities in WordPress uListing plugin (versions <= 2.0.5) as it lacks CSRF checks on plugin administration pages.2021-09-276.8CVE-2021-36876
MISC
CONFIRM
stylemixthemes -- ulistingCross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to modify user roles.2021-09-274.3CVE-2021-36877
MISC
CONFIRM
trendmicro -- housecall_for_home_networksAn uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.2021-09-296.9CVE-2021-32466
MISC
MISC
MISC
wpdevart -- countdown_and_countup\,_woocommerce_sales_timerThe Countdown and CountUp, WooCommerce Sales Timers WordPress plugin is vulnerable to Cross-Site Request Forgery via the save_theme function found in the ~/includes/admin/coundown_theme_page.php file due to a missing nonce check which allows attackers to inject arbitrary web scripts, in versions up to and including 1.5.7.2021-09-286.8CVE-2021-34636
MISC
MISC
wpxpo -- postx_-_gutenberg_blocks_for_post_gridThe PostX – Gutenberg Blocks for Post Grid WordPress plugin before 2.4.10 performs incorrect checks before allowing any logged in user to perform some ajax based requests, allowing any user to modify, delete or add ultp_options values.2021-09-274CVE-2021-24652
MISC
zte -- axon_30_pro_message_serviceThere is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.2021-09-254.3CVE-2021-21742
MISC
zyxel -- zywall_vpn2s_firmwareA directory traversal vulnerability in the web server of the Zyxel VPN2S firmware version 1.12 could allow a remote attacker to gain access to sensitive information.2021-09-295CVE-2021-35027
MISC

Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
baidu -- ueditorCross Site Scripting (XSS) vulnerability exists in UEditor v1.4.3.3, which can be exploited by an attacker to obtain user cookie information.2021-09-283.5CVE-2021-37271
MISC
MISC
btcpayserver -- btcpay_serverbtcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')2021-09-263.5CVE-2021-3830
CONFIRM
MISC
concretecms -- concrete_cmsAn issue was discovered in Concrete CMS through 8.5.5. Stored XSS can occur in Conversations when the Active Conversation Editor is set to Rich Text.2021-09-243.5CVE-2021-40100
MISC
MISC
dell -- supportassist_client_consumerDell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin.2021-09-283.6CVE-2021-36286
MISC
gilacms -- gila_cmsA stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.2021-09-273.5CVE-2020-20695
MISC
gilacms -- gila_cmsA cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field.2021-09-273.5CVE-2020-20696
MISC
google -- androidIn memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787.2021-09-272.1CVE-2021-0424
MISC
google -- androidIn memory management driver, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05385714.2021-09-272.1CVE-2021-0423
MISC
google -- androidIn memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.2021-09-272.1CVE-2021-0422
MISC
google -- androidIn memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.2021-09-272.1CVE-2021-0425
MISC
ibm -- business_automation_workflowIBM Business Automation Workflow 18.0.0.0, 18.0.0.1, 18.0.0.2, 19.0.0.1, 19.0.0.2, 19.0.0.3,20.0.0.1, 20.0.0.2, and 21.0.2 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 204832.2021-09-293.5CVE-2021-29834
CONFIRM
XF
laracms_project -- laracmsLaraCMS v1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content editor.2021-09-293.5CVE-2020-20129
MISC
laracms_project -- laracmsLaraCMS v1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows atackers to execute arbitrary web scripts or HTML via a crafted payload in the page management module.2021-09-293.5CVE-2020-20131
MISC
os4ed -- opensisOpenSIS Community Edition version 8.0 is affected by a cross-site scripting (XSS) vulnerability in the TakeAttendance.php via the cp_id_miss_attn parameter.2021-09-243.5CVE-2021-40310
MISC
MISC
MISC
status301 -- coolclockThe CoolClock WordPress plugin before 4.3.5 does not escape some shortcode attributes, allowing users with a role as low as Contributor toperform Stored Cross-Site Scripting attacks2021-09-273.5CVE-2021-24670
MISC
stylemixthemes -- ulistingAuthenticated Reflected Cross-Site Scripting (XSS) vulnerability in WordPress uListing plugin (versions <= 2.0.5). Vulnerable parameters: &filter[id], &filter[user], &filter[expired_date], &filter[created_date], &filter[updated_date].2021-09-273.5CVE-2021-36875
MISC
CONFIRM
torproject -- tor_browserTor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).2021-09-243.6CVE-2021-39246
MISC
MISC
MISC
MISC
MISC
ucms_project -- ucmsA stored cross-site scripting (XSS) vulnerability in /ucms/index.php?do=list_edit of UCMS 1.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the title, key words, description or content text fields.2021-09-293.5CVE-2020-20781
MISC
wpxpo -- postx_-_gutenberg_blocks_for_post_gridThe PostX – Gutenberg Blocks for Post Grid WordPress plugin before 2.4.10, with Saved Templates Addon enabled, allows users with Contributor roles or higher to read password-protected or private post contents the user is otherwise unable to read, given the post ID.2021-09-273.5CVE-2021-24661
MISC
wpxpo -- postx_-_gutenberg_blocks_for_post_gridThe PostX – Gutenberg Blocks for Post Grid WordPress plugin before 2.4.10, with Saved Templates Addon enabled, allows users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks via the plugin's shortcode.2021-09-273.5CVE-2021-24660
MISC
wpxpo -- postx_-_gutenberg_blocks_for_post_gridThe PostX – Gutenberg Blocks for Post Grid WordPress plugin before 2.4.10 allows users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks via the plugin's block.2021-09-273.5CVE-2021-24659
MISC
yithemes -- yith_maintenance_modeAuthenticated Stored Cross-Site Scripting (XSS) vulnerability in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.7, vulnerable parameter &yith_maintenance_newsletter_submit_label. Possible even when unfiltered HTML is disallowed by WordPress configuration.2021-09-273.5CVE-2021-36841
MISC
CONFIRM

Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
3xlogic -- infinias_access_control
 
An issue was discovered in 3xLogic Infinias Access Control through 6.7.10708.0, affecting physical security. Users with login credentials assigned to a specific zone can send modified HTTP GET and POST requests, allowing them to view user data such as personal information and Prox card credentials. Also, an authorized user of one zone can send API requests to unlock electronic locks associated with zones they are unauthorized to have access to. They can also create new user logins for zones they were not authorized to access, including the root zone of the software.2021-10-01not yet calculatedCVE-2021-41847
MISC
MISC
MISC
abb -- busch-controltouch
 
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch2021-09-27not yet calculatedCVE-2021-22272
MISC
adobe -- acrobat_pro_dcAcrobat Pro DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to disclose sensitive user memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39860
MISC
adobe -- acrobat_pro_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39861
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.2021-09-29not yet calculatedCVE-2021-39846
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39853
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39851
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39850
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39849
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39854
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.2021-09-29not yet calculatedCVE-2021-39845
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetCaption action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39838
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm deleteItemAt action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39837
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page.2021-09-29not yet calculatedCVE-2021-39855
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39858
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An authenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39852
MISC
adobe -- acrobat_reader_dcAdobe Acrobat Reader DC add-on for Internet Explorer versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to check for existence of local files. Exploitation of this issue requires user interaction in that a victim must visit an attacker controlled web page.2021-09-29not yet calculatedCVE-2021-39857
MISC
adobe -- acrobat_reader_dcAcrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must visit an attacker controlled web page.2021-09-29not yet calculatedCVE-2021-39856
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm getItem action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39839
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForms that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.2021-09-29not yet calculatedCVE-2021-39840
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Type Confusion vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39841
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39842
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39843
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetIcon action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39836
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39863
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to locally escalate privileges in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-30not yet calculatedCVE-2021-21089
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. An attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user via DLL hijacking. Exploitation of this issue requires user interaction.2021-09-29not yet calculatedCVE-2021-35982
MISC
adobe -- acrobat_reader_dc
 
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39844
MISC
adobe -- creative_cloud_desktop_application
 
Adobe Creative Cloud Desktop Application version 5.4 (and earlier) is affected by a file handling vulnerability that could allow an attacker to arbitrarily overwrite a file. Exploitation of this issue requires local access, administrator privileges and user interaction.2021-09-27not yet calculatedCVE-2021-28613
MISC
adobe -- framemaker
 
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39865
MISC
adobe -- framemaker
 
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-40697
MISC
adobe -- framemaker
 
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-39862
MISC
adobe -- frameworkAdobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.2021-09-29not yet calculatedCVE-2021-39831
MISC
adobe -- framework
 
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.2021-09-29not yet calculatedCVE-2021-39829
MISC
adobe -- framework
 
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.2021-09-29not yet calculatedCVE-2021-39834
MISC
adobe -- framework
 
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.2021-09-29not yet calculatedCVE-2021-39833
MISC
adobe -- framework
 
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by a memory corruption vulnerability due to insecure handling of a malicious PDF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-29not yet calculatedCVE-2021-39832
MISC
adobe -- framework
 
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by a memory corruption vulnerability due to insecure handling of a malicious PDF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-29not yet calculatedCVE-2021-39830
MISC
adobe -- framework
 
Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed PDF file that could result in disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.2021-09-29not yet calculatedCVE-2021-39835
MISC
adobe -- genuine_service
 
Adobe Genuine Service versions 7.3 (and earlier) are affected by a privilege escalation vulnerability in the AGSService installer. An authenticated attacker could leverage this vulnerability to achieve read / write privileges to execute arbitrary code. User interaction is required to abuse this vulnerability.2021-09-29not yet calculatedCVE-2021-40708
MISC
adobe -- photoshop_elements
 
Photoshop Elements versions 2021 build 19.0 (20210304.m.156367) (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious TTF file.2021-09-27not yet calculatedCVE-2021-39825
MISC
adobe -- premiere_elements

 

Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-27not yet calculatedCVE-2021-40701
MISC
adobe -- premiere_elements
 
Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-27not yet calculatedCVE-2021-40700
MISC
adobe -- premiere_elements
 
Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-27not yet calculatedCVE-2021-40703
MISC
adobe -- premiere_elements
 
Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious psd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-27not yet calculatedCVE-2021-40702
MISC
adobe -- premiere_pro
 
Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .exr file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-09-29not yet calculatedCVE-2021-40715
MISC
adobe -- premiere_pro
 
Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.2021-09-29not yet calculatedCVE-2021-40710
MISC
adobe -- svg-native-viewer
 
Adobe svg-native-viewer 8182d14dfad5d1e10f53ed830328d7d9a3cfa96d and earlier versions are affected by a heap buffer overflow vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.2021-09-27not yet calculatedCVE-2021-39823
MISC
apache -- db_ddiutils
 
Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release.2021-09-30not yet calculatedCVE-2021-41616
MISC
apple -- macos
 
The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner.2021-10-01not yet calculatedCVE-2021-3747
MISC
apple -- safari
 
The Safari app extension bundled with 1Password for Mac 7.7.0 through 7.8.x before 7.8.7 is vulnerable to authorization bypass. By targeting a vulnerable component of this extension, a malicious web page could read a subset of 1Password vault items that would normally be fillable by the user on that web page. These items are usernames and passwords for vault items associated with its domain, usernames and passwords without a domain association, credit cards, and contact items. (1Password must be unlocked for these items to be accessible, but no further user interaction is required.)2021-09-29not yet calculatedCVE-2021-41795
MISC
aurelia -- aurelia
 
aurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an application to parse the following URL: `https://aurelia.io/blog/?__proto__[asdf]=asdf`. The problem is patched in version `1.1.7`.2021-09-27not yet calculatedCVE-2021-41097
MISC
MISC
CONFIRM
MISC
MISC
aviatorscript -- aviatorscript
 
AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).2021-10-02not yet calculatedCVE-2021-41862
MISC
baicloud -- baicloud
 
BaiCloud-cms v2.5.7 is affected by an arbitrary file deletion vulnerability, which allows an attacker to delete arbitrary files on the server through /user/ppsave.php.2021-09-30not yet calculatedCVE-2021-41729
MISC
bugs -- bugs
 
Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the email parameter.2021-10-01not yet calculatedCVE-2021-40923
MISC
MISC
bugs -- bugs
 
Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the first_name parameter.2021-10-01not yet calculatedCVE-2021-40924
MISC
MISC
bugs -- bugs
 
Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the last_name parameter.2021-10-01not yet calculatedCVE-2021-40922
MISC
MISC
china_telecom_corporation -- epon_tianyi_gateway
 
A Denial of Service issue exists in China Telecom Corporation EPON Tianyi Gateway ZXHN F450(EPON ONU) 3.0. Tianyi Gateway is a hardware terminal of "Optical Modem Smart Router." Attackers can use this vulnerability to restart the device multiple times.2021-09-28not yet calculatedCVE-2021-37273
MISC
confluent -- ansibleConfluent Ansible (cp-ansible) version 5.5.0, 5.5.1, 5.5.2 and 6.0.0 is vulnerable to Incorrect Access Control via its auxiliary component that allows remote attackers to access sensitive information.2021-09-29not yet calculatedCVE-2021-33924
MISC
MISC
confluent -- ansible
 
Insecure permissions in Confluent Ansible (cp-ansible) 5.5.0, 5.5.1, 5.5.2 and 6.0.0 allows local attackers to access some sensitive information (private keys, state database).2021-09-29not yet calculatedCVE-2021-33923
MISC
MISC
conrete5 -- legacyCross-site scripting (XSS) vulnerability in concrete/elements/collection_theme.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the rel parameter.2021-10-01not yet calculatedCVE-2021-41465
MISC
MISC
conrete5 -- legacy
 
Cross-site scripting (XSS) vulnerability in toos/permissions/dialogs/access/entity/types/group_combination.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the cID parameter.2021-10-01not yet calculatedCVE-2021-41463
MISC
MISC
conrete5 -- legacy
 
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the rel parameter.2021-10-01not yet calculatedCVE-2021-41464
MISC
MISC
conrete5 -- legacy
 
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the mode parameter.2021-10-01not yet calculatedCVE-2021-41461
MISC
MISC
conrete5 -- legacy
 
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the ctID parameter.2021-10-01not yet calculatedCVE-2021-41462
MISC
MISC
corel -- drawstandard_2020CdrCore.dll in Corel DrawStandard 2020 22.0.0.474 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CDR file.2021-10-02not yet calculatedCVE-2021-38107
MISC
MISC
corel -- drawstandard_2020
 
Corel DrawStandard 2020 22.0.0.474 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CDR file.2021-10-02not yet calculatedCVE-2021-38109
MISC
MISC
corel -- pdf_fusion
 
Corel PDF Fusion 2.6.2.0 is affected by a Heap Corruption vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.2021-10-01not yet calculatedCVE-2021-38098
MISC
MISC
corel -- pdf_fusion
 
Corel PDF Fusion 2.6.2.0 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.2021-10-01not yet calculatedCVE-2021-38097
MISC
MISC
corel -- pdf_fusion
 
Coreip.dll in Corel PDF Fusion 2.6.2.0 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.2021-10-01not yet calculatedCVE-2021-38096
MISC
MISC
corel -- photopaint

 

Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file.2021-10-01not yet calculatedCVE-2021-38100
MISC
MISC
corel -- photopaint
 
CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38099.2021-10-01not yet calculatedCVE-2021-38101
MISC
MISC
corel -- photopaint
 
CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38101.2021-10-01not yet calculatedCVE-2021-38099
MISC
MISC
corel -- presentations_2020UAX200.dll in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file.2021-10-01not yet calculatedCVE-2021-38106
MISC
MISC
corel -- presentations_2020IPPP82.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. This is different from CVE-2021-38102.2021-10-01not yet calculatedCVE-2021-38105
MISC
MISC
corel -- presentations_2020IPPP82.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. This is different from CVE-2021-38105.2021-10-01not yet calculatedCVE-2021-38102
MISC
MISC
corel -- presentations_2020
 
IBJPG2.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file.2021-10-01not yet calculatedCVE-2021-38103
MISC
MISC
corel -- presentations_2020
 
IPPP72.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file.2021-10-01not yet calculatedCVE-2021-38104
MISC
MISC
corel -- wordperfect_2020Word97Import200.dll in Corel WordPerfect 2020 20.0.0.200 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious DOC file.2021-10-01not yet calculatedCVE-2021-38110
MISC
MISC
corel -- wordperfect_2020
 
Word97Import200.dll in Corel WordPerfect 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious DOC file.2021-10-02not yet calculatedCVE-2021-38108
MISC
MISC
couchbase -- server
 
Couchbase Server 6.5.x and 6.6.x through 6.6.2 has Incorrect Access Control. Externally managed users are not prevented from using an empty password, per RFC4513.2021-09-29not yet calculatedCVE-2021-35943
MISC
MISC
craft -- craft
 
Craft CMS before 3.7.14 allows CSV injection.2021-09-30not yet calculatedCVE-2021-41824
MISC
MISC
cwlviewer -- cwlviewer
 
cwlviewer is a web application to view and share Common Workflow Language workflows. Versions prior to 1.3.1 contain a Deserialization of Untrusted Data vulnerability. Commit number f6066f09edb70033a2ce80200e9fa9e70a5c29de (dated 2021-09-30) contains a patch. There are no available workarounds aside from installing the patch. The SnakeYaml constructor, by default, allows any data to be parsed. To fix the issue the object needs to be created with a `SafeConstructor` object, as seen in the patch.2021-10-01not yet calculatedCVE-2021-41110
MISC
MISC
CONFIRM
d-link -- multiple_devices
 
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in D-Link DIR-X1560, v1.04B04, and DIR-X6060, v1.11B04 allows a remote unauthenticated attacker to disconnect a wireless client via sending specific spoofed SAE authentication frames.2021-09-27not yet calculatedCVE-2021-41753
MISC
data_tables -- data_tables
 
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.2021-09-27not yet calculatedCVE-2021-23445
MISC
MISC
MISC
MISC
MISC
datalust -- seq
 
Datalust Seq before 2021.2.6259 allows users (with view filters applied to their accounts) to see query results not constrained by their view filter. This information exposure, caused by an internal cache key collision, occurs when the user's view filter includes an array or IN clause, and when another user has recently executed an identical query differing only by the array elements.2021-09-27not yet calculatedCVE-2021-41329
MISC
CONFIRM
debian -- curl
 
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.2021-09-29not yet calculatedCVE-2021-22946
MISC
MLIST
FEDORA
debian -- curl
 
When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.2021-09-29not yet calculatedCVE-2021-22947
MISC
MLIST
FEDORA
dell -- bios

 

Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive admin password attempt mitigations in order to carry out a brute force attack.2021-09-28not yet calculatedCVE-2021-36284
MISC
dell -- bios
 
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.2021-09-28not yet calculatedCVE-2021-36283
MISC
dell -- bios
 
Dell BIOS contains a Credentials Management issue. A local authenticated malicious user may potentially exploit this vulnerability to gain access to sensitive information on an NVMe storage by resetting the BIOS password on the system via the Manageability Interface.2021-09-28not yet calculatedCVE-2021-21522
MISC
dell -- bios
 
Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive NVMe password attempt mitigations in order to carry out a brute force attack.2021-09-28not yet calculatedCVE-2021-36285
MISC
dell -- emc_insightiq
 
Dell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity.2021-10-01not yet calculatedCVE-2021-36298
MISC
dell -- enterprise_sonic_os
 
Dell Enterprise SONiC OS, versions 3.3.0 and earlier, contains a sensitive information disclosure vulnerability. An authenticated malicious user with access to the system may use the TACACS\Radius credentials stored to read sensitive information and use it in further attacks.2021-10-01not yet calculatedCVE-2021-36309
MISC
detector -- detector
 
Cross-site scripting (XSS) vulnerability in _contactform.inc.php in Detector 0.8.5 and below version allows remote attackers to inject arbitrary web script or HTML via the cid parameter.2021-10-01not yet calculatedCVE-2021-40921
MISC
discourse -- discourse
 
Discourse is an open source discussion platform. There is a cross-site scripting (XSS) vulnerability in versions 2.7.7 and earlier of the `stable` branch, versions 2.8.0.beta6 and earlier of the `beta` branch, and versions 2.8.0.beta6 and earlier of the `tests-passed` branch. Rendering of some error messages that contain user input can be susceptible to XSS attacks. This vulnerability only affects sites which have blocked watched words that contain HTML tags, modified or disabled Discourse's default Content Security Policy. This issue is patched in the latest `stable`, `beta` and `tests-passed` versions of Discourse. As a workaround, avoid modifying or disabling Discourse’s default Content Security Policy, and blocking watched words containing HTML tags.2021-09-27not yet calculatedCVE-2021-41095
CONFIRM
MISC
dr.web -- firewall
 
Dr.Web Firewall 12.5.2.4160 on Windows incorrectly restricts applications signed by Dr.Web. A DLL for a custom payload within a legitimate binary (e.g., frwl_svc.exe) bypasses firewall filters.2021-09-24not yet calculatedCVE-2021-28130
MISC
MISC
earclink -- espcms-p8
 
EARCLINK ESPCMS-P8 contains a cross-site scripting (XSS) vulnerability in espcms_web\espcms_load.php.2021-09-28not yet calculatedCVE-2020-20125
MISC
eclipse -- che
 
The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.2021-09-29not yet calculatedCVE-2021-41034
CONFIRM
ecoa -- basECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate HVAC.2021-09-30not yet calculatedCVE-2021-41292
MISC
ecoa -- basECOA BAS controller uses weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system.2021-09-30not yet calculatedCVE-2021-41296
MISC
ecoa -- basECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario.2021-09-30not yet calculatedCVE-2021-41294
MISC
ecoa -- basECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administrator’s privilege without logging in.2021-09-30not yet calculatedCVE-2021-41299
MISC
ecoa -- bas
 
ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.2021-09-30not yet calculatedCVE-2021-41290
MISC
ecoa -- bas
 
ECOA BAS controller has a Cross-Site Request Forgery vulnerability, thus authenticated attacker can remotely place a forged request at a malicious web page and execute CRUD commands (GET, POST, PUT, DELETE) to perform arbitrary operations in the system.2021-09-30not yet calculatedCVE-2021-41295
MISC
ecoa -- bas
 
ECOA BAS controller suffers from a path traversal content disclosure vulnerability. Using the GET parameter in File Manager, unauthenticated attackers can remotely disclose directory content on the affected device.2021-09-30not yet calculatedCVE-2021-41291
MISC
ecoa -- bas
 
ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text.2021-09-30not yet calculatedCVE-2021-41297
MISC
ecoa -- bas
 
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities.2021-09-30not yet calculatedCVE-2021-41298
MISC
ecoa -- bas
 
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information.2021-09-30not yet calculatedCVE-2021-41293
MISC
ecoa -- bas
 
ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain user’s privilege.2021-09-30not yet calculatedCVE-2021-41302
MISC
ecoa -- bas
 
ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.2021-09-30not yet calculatedCVE-2021-41301
MISC
ecoa -- bas
 
ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality.2021-09-30not yet calculatedCVE-2021-41300
MISC
ecommerce-codeigniter_bootstrap -- ecommerce-codeigniter_bootstrap
 
Cross-site scripting (XSS) vulnerability in application/modules/admin/views/ecommerce/products.php in Ecommerce-CodeIgniter-Bootstrap (Codeigniter 3.1.11, Bootstrap 3.3.7) allows remote attackers to inject arbitrary web script or HTML via the search_title parameter.2021-10-01not yet calculatedCVE-2021-40975
MISC
emerson -- wirelesshart_gateway
 
There is a flaw in the code used to configure the internal gateway firewall when the gateway's VLAN feature is enabled. If a user enables the VLAN setting, the internal gateway firewall becomes disabled resulting in exposure of all ports used by the gateway.2021-09-29not yet calculatedCVE-2020-12030
MISC
emlog -- emlog
 
emlog v6.0.0 contains an arbitrary file deletion vulnerability in admin/plugin.php.2021-10-01not yet calculatedCVE-2020-21014
MISC
emlog -- emlog
 
emlog v6.0.0 contains a SQL injection via /admin/comment.php.2021-10-01not yet calculatedCVE-2020-21013
MISC
enterprise_website_construction_system -- enterprise_website_construction_system
 
There is an unauthorized access vulnerability in the CMS Enterprise Website Construction System 5.0. Attackers can use this vulnerability to directly access the specified background path without logging in to the background to obtain the background administrator authority.2021-09-27not yet calculatedCVE-2021-37270
MISC
MISC
esphome -- esphome
 
ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username & password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`.2021-09-28not yet calculatedCVE-2021-41104
MISC
MISC
CONFIRM
esri -- portal
 
There is an privilege escalation vulnerability in organization-specific logins in Esri Portal for ArcGIS versions 10.9 and below that may allow a remote, authenticated attacker to impersonate another account.2021-10-01not yet calculatedCVE-2021-29108
CONFIRM
esri -- portal
 
A reflected XSS vulnerability in Esri Portal for ArcGIS version 10.9 and below may allow a remote attacker able to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the user’s browser.2021-10-01not yet calculatedCVE-2021-29109
CONFIRM
esri -- portal
 
Stored cross-site scripting (XSS) issue in Esri Portal for ArcGIS may allow a remote unauthenticated attacker to pass and store malicious strings in the home application.2021-10-01not yet calculatedCVE-2021-29110
CONFIRM
f-secure -- internet_gatekeeper
 
A denial-of-service (DoS) vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. The vulnerability occurs because of an attacker can trigger assertion via malformed HTTP packet to web interface. An unauthenticated attacker could exploit this vulnerability by sending a large username parameter. A successful exploitation could lead to a denial-of-service of the product.2021-09-28not yet calculatedCVE-2021-33600
MISC
MISC
f-secure -- internet_gatekeeper
 
A vulnerability was discovered in the web user interface of F-Secure Internet Gatekeeper. An authenticated user can modify settings through the web user interface in a way that could lead to an arbitrary code execution on the F-Secure Internet Gatekeeper server.2021-09-28not yet calculatedCVE-2021-33601
MISC
MISC
f5 -- big-ip
 
On version 16.x before 16.1.0, 15.1.x before 15.1.4, 14.1.x before 14.1.4.4, and all versions of 13.1.x, 12.1.x, and 11.6.x, a reflected cross-site scripting (XSS) vulnerability exists in the resource information page for authenticated users when a full webtop is configured on the BIG-IP APM system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.2021-09-27not yet calculatedCVE-2021-23054
MISC
flamecms -- flamecms
 
FlameCMS 3.3.5 contains a SQL injection vulnerability in /master/article.php via the "Id" parameter.2021-09-30not yet calculatedCVE-2020-20796
MISC
flamecms -- flamecms
 
FlameCMS 3.3.5 contains a time-based blind SQL injection vulnerability in /account/register.php.2021-09-30not yet calculatedCVE-2020-20797
MISC
flextv -- flextCross-site scripting (XSS) vulnerability in index.php in FlexTV beta development version allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF parameter.2021-10-01not yet calculatedCVE-2021-40928
MISC
MISC
floodlight -- floodlight
 
Floodlight through 1.2 has an integer overflow in checkFlow in StaticFlowEntryPusherResource.java via priority or port number.2021-09-30not yet calculatedCVE-2020-18684
MISC
foitt -- multiple_products
 
Certain Federal Office of Information Technology Systems and Telecommunication FOITT products are affected by improper handling of exceptional conditions. This affects COVID Certificate App IOS 2.2.0 and below affected, patch in progress and COVID Certificate Check App IOS 2.2.0 and below affected, patch in progress. A denial of service (physically proximate) could be caused by scanning a crafted QR code.2021-09-27not yet calculatedCVE-2021-37786
MISC
fortinet -- fortimanager
 
An improper neutralization of formula elements in a csv file in Fortinet FortiManager version 6.4.3 and below, 6.2.7 and below allows attacker to execute arbitrary commands via crafted IPv4 field in policy name, when exported as excel file and opened unsafely on the victim host.2021-09-30not yet calculatedCVE-2021-24016
CONFIRM
fortinet -- fortimanager
 
An improper authentication in Fortinet FortiManager version 6.4.3 and below, 6.2.6 and below allows attacker to assign arbitrary Policy and Object modules via crafted requests to the request handler.2021-09-30not yet calculatedCVE-2021-24017
CONFIRM
fusioncompute -- fusioncompute
 
There is a command injection vulnerability in CMA service module of FusionCompute 6.3.0, 6.3.1, 6.5.0 and 8.0.0 when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system.2021-09-28not yet calculatedCVE-2021-37106
MISC
fusioncompute -- fusioncompute
 
There is an improper file upload control vulnerability in FusionCompute 6.5.0, 6.5.1 and 8.0.0. Due to the improper verification of file to be uploaded and does not strictly restrict the file access path, attackers may upload malicious files to the device, resulting in the service abnormal.2021-09-28not yet calculatedCVE-2021-37105
MISC
galera -- web_tempalte
 
Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow.2021-10-01not yet calculatedCVE-2021-40960
MISC
MISC
getid3 -- getid3
 
Cross-site scripting (XSS) vulnerability in demos/demo.mysqli.php in getID3 1.X and v2.0.0-beta allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter.2021-10-01not yet calculatedCVE-2021-40926
MISC
MISC
handsontable -- handsontable
 
The package handsontable before 10.0.0; the package handsontable from 0 and before 10.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) in Handsontable.helper.isNumeric function.2021-09-29not yet calculatedCVE-2021-23446
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
hewlett_packard_enterprises -- storeonce
 
A potential DOM-based Cross Site Scripting security vulnerability has been identified in HPE StoreOnce. The vulnerability could be remotely exploited to cause an elevation of privilege leading to partial impact to confidentiality, availability, and integrity. HPE has made the following software update - HPE StoreOnce 4.3.0, to resolve the vulnerability in HPE StoreOnce.2021-09-27not yet calculatedCVE-2021-26587
MISC
hitachi -- content_platform_anywhere
 
Hitachi Content Platform Anywhere (HCP-AW) 4.4.5 and later allows information disclosure. If authenticated user creates a link to a file or folder while the system was running version 4.3.x or earlier and then shares the link and then later deletes the file or folder without deleting the link and before the link expires. If the system has been upgraded to version 4.4.5 or 4.5.0 a malicious user with the link could browse and download all files of the authenticated user that created the link .2021-09-29not yet calculatedCVE-2021-41573
MISC
MISC
huawei -- huawei
 
There is a server-side request forgery vulnerability in HUAWEI P40 versions 10.1.0.118(C00E116R3P3). This vulnerability is due to insufficient validation of parameters while dealing with some messages. A successful exploit could allow the attacker to gain access to certain resource which the attacker are supposed not to do.2021-09-28not yet calculatedCVE-2021-37104
MISC
ibm -- cloud_pak_for_security
 
IBM Cloud Pak for Security (CP4S) 1.7.0.0, 1.7.1.0, 1.7.2.0, and 1.8.0.0 could allow an attacker to perform unauthorized actions due to improper or missing authentication controls. IBM X-Force ID: 199282.2021-09-30not yet calculatedCVE-2021-20578
CONFIRM
XF
ibm -- cloud_pak_for_security
 
IBM Cloud Pak for Security (CP4S) 1.7.0.0, 1.7.1.0, 1.7.2.0, and 1.8.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 207320.2021-09-30not yet calculatedCVE-2021-29894
XF
CONFIRM
image2pdf -- image2pdf
 
A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Image2PDF. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Image2PDF: Image2PDF 2.1.5 ( 2021/08/17 ) and later2021-10-01not yet calculatedCVE-2021-38675
MISC
infaveohelpdesk -- infaveohelpdeskCross-site scripting (XSS) vulnerability in dompdf/dompdf/www/demo.php infaveo-helpdesk v1.11.0 and below allow remote attackers to inject arbitrary web script or HTML via the $_SERVER["PHP_SELF"] parameter.2021-10-01not yet calculatedCVE-2021-40925
MISC
MISC
insyde -- insydeh2o
 
In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 through 5.5).2021-10-01not yet calculatedCVE-2021-33626
MISC
irfanview -- irfanviewA buffer overflow vulnerability in FORMATS!Read_Utah_RLE+0x340 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.2021-09-28not yet calculatedCVE-2021-29361
MISC
irfanview -- irfanviewA buffer overflow vulnerability in FORMATS!ReadPVR_W+0xfa of Irfanview 4.57 allows attackers to cause a denial of service (DOS) via a crafted PVR file.2021-09-28not yet calculatedCVE-2021-29358
MISC
irfanview -- irfanviewA buffer overflow vulnerability in FORMATS!GetPlugInInfo+0x2de9 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.2021-09-28not yet calculatedCVE-2021-29366
MISC
irfanview -- irfanviewA buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa74 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.0xa742021-09-28not yet calculatedCVE-2021-29363
MISC
irfanview -- irfanview
 
A buffer overflow vulnerability in WPG+0x1dda of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted WPG file.2021-09-28not yet calculatedCVE-2021-29367
MISC
irfanview -- irfanview
 
Irfanview 4.57 is affected by an infinite loop when processing a crafted BMP file in the EFFECTS!AutoCrop_W component. This can cause a denial of service (DOS).2021-09-28not yet calculatedCVE-2021-29365
MISC
irfanview -- irfanview
 
A buffer overflow vulnerability in Formats!ReadRAS_W+0x1001 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.2021-09-28not yet calculatedCVE-2021-29364
MISC
irfanview -- irfanview
 
A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa30 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.2021-09-28not yet calculatedCVE-2021-29362
MISC
irfanview -- irfanview
 
A buffer overflow vulnerability in FORMATS!Read_Utah_RLE+0x37a of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.2021-09-28not yet calculatedCVE-2021-29360
MISC
jeecms -- jeecms
 
JeeCMS 1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the commentText parameter.2021-09-30not yet calculatedCVE-2020-20799
MISC
jizhicms -- jizhicms
 
JIZHICMS 1.5.1 contains a cross-site scripting (XSS) vulnerability in the component /user/release.html, which allows attackers to arbitrarily add an administrator cookie.2021-10-01not yet calculatedCVE-2020-21228
MISC
MISC
MISC
json -- web_token
 
JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue and validate tokens, users are lead to believe that everything works properly. Versions 3.4.6, 4.0.4, and 4.1.5 have been patched to always load the file contents, deprecated the `Lcobucci\JWT\Signer\Key\LocalFileReference`, and suggest `Lcobucci\JWT\Signer\Key\InMemory` as the alternative. As a workaround, use `Lcobucci\JWT\Signer\Key\InMemory` instead of `Lcobucci\JWT\Signer\Key\LocalFileReference` to create the instances of one's keys.2021-09-28not yet calculatedCVE-2021-41106
CONFIRM
MISC
MISC
justwriting -- justwriting
 
Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter.2021-10-01not yet calculatedCVE-2021-41467
MISC
MISC
kaushik -- jadav_online_food_ordering_web_app
 
An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable "username" parameter in login.php and retrieve sensitive database information, as well as add an administrative user.2021-10-01not yet calculatedCVE-2021-41647
MISC
MISC
kingdee -- kis_professional_edition
 
Kingdee KIS Professional Edition has a privilege escalation vulnerability. Attackers can use the vulnerability to gain computer administrator rights via unspecified loopholes.2021-09-27not yet calculatedCVE-2021-37274
MISC
MISC
libiec_iccp_mod -- libiec_iccp_mod
 
libiec_iccp_mod v1.5 contains a segmentation violation in the component server_example1.c.2021-09-30not yet calculatedCVE-2020-20664
MISC
libiec_iccp_mod -- libiec_iccp_mod
 
libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_connection.c.2021-09-30not yet calculatedCVE-2020-20663
MISC
libiec_iccp_mod -- libiec_iccp_mod
 
libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_example1.c.2021-09-30not yet calculatedCVE-2020-20662
MISC
lider -- liderahenk
 
On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials.2021-10-01not yet calculatedCVE-2021-3825
CONFIRM
CONFIRM
linux -- linux_kernel
 
A flaw was found in the Linux kernel. A corrupted timer tree caused the task wakeup to be missing in the timerqueue_add function in lib/timerqueue.c. This flaw allows a local attacker with special user privileges to cause a denial of service, slowing and eventually stopping the system while running OSP.2021-09-27not yet calculatedCVE-2021-20317
MISC
MISC
linux_kernel -- linux_kernel
 
prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel through 5.14.9 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.2021-10-02not yet calculatedCVE-2021-41864
MISC
MISC
mcafee -- drive_encryption
 
Privilege Escalation vulnerability in a Windows system driver of McAfee Drive Encryption (DE) prior to 7.3.0 could allow a local non-admin user to gain elevated system privileges via exploiting an unutilized memory buffer.2021-10-01not yet calculatedCVE-2021-23893
CONFIRM
mediatek -- mediatek
 
In memory management driver, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381235.2021-09-27not yet calculatedCVE-2021-0421
MISC
micro_focus -- directory_resource_administrator
 
Unauthorized information security disclosure vulnerability on Micro Focus Directory and Resource Administrator (DRA) product, affecting all DRA versions prior to 10.1 Patch 1. The vulnerability could lead to unauthorized information disclosure.2021-09-28not yet calculatedCVE-2021-22535
MISC
monstra -- monstraAn issue in Monstra CMS v3.0.4 allows attackers to execute arbitrary web scripts or HTML via bypassing the file extension filter and uploading crafted HTML files.2021-09-27not yet calculatedCVE-2020-20691
MISC
mp4box -- mp4boxThere is a stack buffer overflow in MP4Box v1.0.1 at src/filters/dmx_nhml.c:1008 in the nhmldmx_send_sample() function szXmlFrom parameter which leads to a denial of service vulnerability.2021-10-01not yet calculatedCVE-2021-41459
MISC
mp4box -- mp4boxThere is a stack buffer overflow in MP4Box 1.1.0 at src/filters/dmx_nhml.c in nhmldmx_init_parsing which leads to a denial of service vulnerability.2021-10-01not yet calculatedCVE-2021-41457
MISC
mp4box -- mp4box
 
There is a stack buffer overflow in MP4Box v1.0.1 at src/filters/dmx_nhml.c:1004 in the nhmldmx_send_sample() function szXmlTo parameter which leads to a denial of service vulnerability.2021-10-01not yet calculatedCVE-2021-41456
MISC
multipass -- multipass
 
The Windows version of Multipass before 1.7.0 allowed any local process to connect to the localhost TCP control socket to perform mounts from the operating system to a guest, allowing for privilege escalation.2021-10-01not yet calculatedCVE-2021-3626
MISC
nagios -- xi
 
Nagios XI before 5.8.5 incorrectly allows backup_xi.sh wildcards.2021-09-28not yet calculatedCVE-2021-36364
CONFIRM
CONFIRM
nagios -- xi
 
Nagios XI before 5.8.5 incorrectly allows manage_services.sh wildcards.2021-09-28not yet calculatedCVE-2021-36366
CONFIRM
CONFIRM
netop -- vision_pro
 
Out of bounds write vulnerability in the JPEG parsing code of Netop Vision Pro up to and including 9.7.2 allows an adjacent unauthenticated attacker to write to arbitrary memory potentially leading to a Denial of Service (DoS).2021-09-27not yet calculatedCVE-2021-36134
MISC
netscout -- ngeniusoneNETSCOUT nGeniusONE 6.3.0 build 1196 allows high-privileged users to achieve Stored Cross-Site Scripting (XSS) in FDSQueryService.2021-09-30not yet calculatedCVE-2021-35200
MISC
netscout -- ngeniusoneNETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Reflected Cross-Site Scripting (XSS) in the support endpoint.2021-09-30not yet calculatedCVE-2021-35204
MISC
netscout -- ngeniusone
 
NETSCOUT Systems nGeniusONE version 6.3.0 build 1196 allows URL redirection in redirector.2021-09-30not yet calculatedCVE-2021-35205
MISC
netscout -- ngeniusone
 
NETSCOUT nGeniusONE 6.3.0 build 1004 and earlier allows Stored Cross-Site Scripting (XSS) in the Packet Analysis module.2021-09-30not yet calculatedCVE-2021-35198
MISC
netscout -- ngeniusone
 
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Arbitrary File Read operations via the FDSQueryService endpoint.2021-09-30not yet calculatedCVE-2021-35203
MISC
netscout -- ngeniusone
 
NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Authorization Bypass (to access an endpoint) in FDSQueryService.2021-09-30not yet calculatedCVE-2021-35202
MISC
netscout -- ngeniusone
 
NEI in NETSCOUT nGeniusONE 6.3.0 build 1196 allows XML External Entity (XXE) attacks.2021-09-30not yet calculatedCVE-2021-35201
MISC
netscout -- ngeniusone
 
NETSCOUT nGeniusONE 6.3.0 build 1196 and earlier allows Stored Cross-Site Scripting (XSS) in UploadFile.2021-09-30not yet calculatedCVE-2021-35199
MISC
nokogiri -- nokogiri
 
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.2021-09-27not yet calculatedCVE-2021-41098
MISC
CONFIRM
open_robotics -- ros_melodicAn infinite loop in Open Robotics ros_comm XMLRPC server in ROS Melodic through 1.4.11 and ROS Noetic through1.15.11 allows remote attackers to cause a Denial of Service in ros_comm via a crafted XMLRPC call.2021-09-28not yet calculatedCVE-2021-37146
MISC
MISC
MISC
opencrx -- opencrx
 
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.2021-09-29not yet calculatedCVE-2021-25959
MISC
MISC
oppo -- oppo
 
In Oppo's battery application, the third-party SDK provides the function of loading a third-party Provider, which can be used.2021-09-27not yet calculatedCVE-2021-23243
MISC
os4ed -- opensis_community
 
OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.2021-09-29not yet calculatedCVE-2021-40651
MISC
MISC
MISC
parse_server -- parse_server
 
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to version 4.10.4, for regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload. A patch in version 4.10.4 removes session tokens from the LiveQuery payload. As a workaround, set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up.2021-09-30not yet calculatedCVE-2021-41109
MISC
MISC
CONFIRM
passport-oauth2 -- passport-oauth2
 
** DISPUTED ** The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply receiving the access token (i.e., does not try to use the token). NOTE: the passport-oauth2 vendor does not consider this a passport-oauth2 vulnerability.2021-09-27not yet calculatedCVE-2021-41580
MISC
MISC
MISC
pingidentity -- pingfederate
 
The Authentication API in Ping Identity PingFederate before 10.3 mishandles certain aspects of external password management.2021-09-27not yet calculatedCVE-2021-40329
CONFIRM
placeos -- authentication_service
 
PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect.2021-09-30not yet calculatedCVE-2021-41826
MISC
MISC
progress -- whatsup_gold
 
In Progress WhatsUp Gold prior to version 21.1.0, an application endpoint failed to adequately sanitize malicious input. which could allow an unauthenticated attacker to execute arbitrary code in a victim's browser.2021-09-28not yet calculatedCVE-2021-41318
MISC
MISC
puneethreddyhc -- onlineshoppingsystemadvanced
 
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.2021-10-01not yet calculatedCVE-2021-41648
MISC
MISC
puneethreddyhc -- onlineshoppingsystemadvanced
 
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.2021-10-01not yet calculatedCVE-2021-41649
MISC
pydio -- cells

 

Broken access control for user creation in Pydio Cells 2.2.9 allows remote anonymous users to create standard users via the profile parameter. (In addition, such users can be granted several admin permissions via the Roles parameter.)2021-09-30not yet calculatedCVE-2021-41325
MISC
MISC
MISC
pydio -- cells
 
Directory traversal in the Compress feature in Pydio Cells 2.2.9 allows remote authenticated users to overwrite personal files, or Cells files belonging to any user, via the format parameter.2021-09-30not yet calculatedCVE-2021-41323
MISC
MISC
MISC
pydio -- cells
 
Directory traversal in the Copy, Move, and Delete features in Pydio Cells 2.2.9 allows remote authenticated users to enumerate personal files (or Cells files belonging to any user) via the nodes parameter (for Copy and Move) or via the Path parameter (for Delete).2021-09-30not yet calculatedCVE-2021-41324
MISC
MISC
MISC
qnap -- multiple_devicesA cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Photo Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 6.0.18 ( 2021/09/01 ) and later2021-10-01not yet calculatedCVE-2021-34356
MISC
qnap -- multiple_devicesA cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Photo Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 6.0.18 ( 2021/09/01 ) and later2021-10-01not yet calculatedCVE-2021-34354
MISC
qnap -- multiple_devices
 
A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210902 and later2021-10-01not yet calculatedCVE-2021-34352
MISC
qnap -- multiple_devices
 
A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210803 and later2021-09-27not yet calculatedCVE-2021-34349
MISC
qnap -- multiple_devices
 
A cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Photo Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Photo Station: Photo Station 5.4.10 ( 2021/08/19 ) and later Photo Station 5.7.13 ( 2021/08/19 ) and later Photo Station 6.0.18 ( 2021/09/01 ) and later2021-10-01not yet calculatedCVE-2021-34355
MISC
qnap -- multiple_devices
 
A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210803 and later2021-09-27not yet calculatedCVE-2021-34348
MISC
qnap -- multiple_devices
 
A command injection vulnerability has been reported to affect QNAP device running QVR. If exploited, this vulnerability could allow remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.5 build 20210803 and later2021-09-27not yet calculatedCVE-2021-34351
MISC
red_hat -- errata
 
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.2021-09-29not yet calculatedCVE-2021-3653
MISC
MISC
reiner -- timecard
 
REINER timeCard 6.05.07 installs a Microsoft SQL Server with an sa password that is hardcoded in the TCServer.jar file.2021-09-30not yet calculatedCVE-2021-33583
MISC
ricon -- indusrial_cellular_router
 
RICON Industrial Cellular Router S9922L 16.10.3(3794) is affected by cleartext storage of sensitive information and sends username and password as base64.2021-09-28not yet calculatedCVE-2021-36165
MISC
rucky -- rucky
 
Rucky is a USB HID Rubber Ducky Launch Pad for Android. Versions 2.2 and earlier for release builds and versions 425 and earlier for nightly builds suffer from use of a weak cryptographic algorithm (RSA/ECB/PKCS1Padding). The issue will be patched in v2.3 for release builds and 426 onwards for nightly builds. As a workaround, one may disable an advance security feature if not required.2021-09-27not yet calculatedCVE-2021-41096
CONFIRM
MISC
rudp -- rudp
 
rudp v0.6 was discovered to contain a memory leak in the component main.c.2021-09-30not yet calculatedCVE-2020-20665
MISC
scalabium -- dbase_viewer
 
Scalabium dBase Viewer version 2.6 (Build 5.751) is vulnerable to remote code execution via a crafted DBF file that triggers a buffer overflow. An attacker can use the Structured Exception Handler (SEH) records and redirect execution to attacker-controlled code.2021-10-01not yet calculatedCVE-2021-35297
MISC
securonix -- securonix
 
The third party intelligence connector in Securonix SNYPR 6.3.1 Build 184295_0302 allows an authenticated user to obtain access to server configuration details via SSRF.2021-09-27not yet calculatedCVE-2021-41385
MISC
shuup -- shuup
 
In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped.2021-09-30not yet calculatedCVE-2021-25963
MISC
MISC
shuup -- shuup
 
“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.2021-09-29not yet calculatedCVE-2021-25962
MISC
MISC
sonicwall -- sma100Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS.2021-09-27not yet calculatedCVE-2021-20035
CONFIRM
sonicwall -- sma100
 
An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.2021-09-27not yet calculatedCVE-2021-20034
CONFIRM
sourcecodester -- hotel_and_lodge_management_system
 
Sourcecodester Hotel and Lodge Management System 2.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the email parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details.2021-10-01not yet calculatedCVE-2020-21012
MISC
spotify -- for_alfred
 
Cross-site scripting (XSS) vulnerability in callback.php in Spotify-for-Alfred 0.13.9 and below allows remote attackers to inject arbitrary web script or HTML via the error parameter.2021-10-01not yet calculatedCVE-2021-40927
MISC
MISC
spotweb -- spotweb
 
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the newpassword2 parameter.2021-10-01not yet calculatedCVE-2021-40968
MISC
MISC
spotweb -- spotweb
 
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the lastname parameter.2021-10-01not yet calculatedCVE-2021-40973
MISC
MISC
spotweb -- spotweb
 
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the mail parameter.2021-10-01not yet calculatedCVE-2021-40972
MISC
MISC
spotweb -- spotweb
 
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the newpassword1 parameter.2021-10-01not yet calculatedCVE-2021-40971
MISC
MISC
spotweb -- spotweb
 
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the username parameter.2021-10-01not yet calculatedCVE-2021-40970
MISC
MISC
suitecrm -- suitecrm
 
In “SuiteCRM” application, v7.11.18 through v7.11.19 and v7.10.29 through v7.10.31 are affected by “CSV Injection” vulnerability (Formula Injection). A low privileged attacker can use accounts module to inject payloads in the input fields. When an administrator access accounts module to export the data as a CSV file and opens it, the payload gets executed. This was not fixed properly as part of CVE-2020-15301, allowing the attacker to bypass the security measure.2021-09-29not yet calculatedCVE-2021-25960
MISC
MISC
MISC
suitecrm -- suitecrm
 
In “SuiteCRM” application, v7.1.7 through v7.10.31 and v7.11-beta through v7.11.20 fail to properly invalidate password reset links that is associated with a deleted user id, which makes it possible for account takeover of any newly created user with the same user id.2021-09-29not yet calculatedCVE-2021-25961
MISC
MISC
MISC
supportassist -- client
 
SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's,2021-09-28not yet calculatedCVE-2021-36297
MISC
tenda -- ac9
 
A stack-based buffer overflow in the httpd server on Tenda AC9 V15.03.06.60_EN allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via a crafted POST request to /goform/SetStaticRouteCfg.2021-09-30not yet calculatedCVE-2020-20746
MISC
thinkphp -- thinkphp
 
ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods.2021-09-28not yet calculatedCVE-2020-20120
MISC
thycoticcentrify -- secret_server
 
A SQL injection issue was discovered in ThycoticCentrify Secret Server before 11.0.000007.2021-10-01not yet calculatedCVE-2021-41845
MISC
MISC
ubuntu -- ubuntu
 
Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;2021-10-01not yet calculatedCVE-2021-3709
MISC
MISC
MISC
MISC
ubuntu -- ubuntu
 
An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;2021-10-01not yet calculatedCVE-2021-3710
MISC
MISC
MISC
MISC
wazuh -- manager
 
Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Integer Underflow vulnerability that might lead to denial of service. A crafted message must be sent from an authenticated agent to the manager.2021-09-29not yet calculatedCVE-2021-41821
MISC
MISC
webauthn -- framework
 
Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.2021-09-27not yet calculatedCVE-2021-38299
MISC
MISC
wire-server -- wire-server
 
wire-server is an open-source back end for Wire, a secure collaboration platform. Before version 2.106.0, the CORS ` Access-Control-Allow-Origin ` header set by `nginz` is set for all subdomains of `.wire.com` (including `wire.com`). This means that if somebody were to find an XSS vector in any of the subdomains, they could use it to talk to the Wire API using the user's Cookie. A patch does not exist, but a workaround does. To make sure that a compromise of one subdomain does not yield access to the cookie of another, one may limit the `Access-Control-Allow-Origin` header to apps that actually require the cookie (account-pages, team-settings and the webapp).2021-09-30not yet calculatedCVE-2021-41101
CONFIRM
wordpress -- wordpressThe Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P<id>[\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.2021-09-27not yet calculatedCVE-2021-24666
MISC
MISC
wordpress -- wordpressThe Recipe Card Blocks by WPZOOM WordPress plugin before 2.8.3 does not properly sanitise or escape some of the properties of the Recipe Card Block (such as ingredientsLayout, iconSet, steps, ingredients, recipeTitle, or settings), which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks.2021-09-27not yet calculatedCVE-2021-24634
MISC
wordpress -- wordpress
 
Cross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to update settings.2021-09-27not yet calculatedCVE-2021-36878
MISC
CONFIRM
wordpress -- wordpress
 
The Credova_Financial WordPress plugin discloses a site's associated Credova API account username and password in plaintext via an AJAX action whenever a site user goes to checkout on a page that has the Credova Financing option enabled. This affects versions up to, and including, 1.4.8.2021-09-29not yet calculatedCVE-2021-39342
MISC
MISC
wordpress -- wordpress
 
The Cookie Notice & Compliance for GDPR / CCPA WordPress plugin before 2.1.2 does not escape the value of its Button Text setting when outputting it in an attribute in the frontend, allowing high privilege users such as admin to perform Cross-Site Scripting even when the unfiltered_html capability is disallowed.2021-09-27not yet calculatedCVE-2021-24569
MISC
wordpress -- wordpress
 
The TranslatePress WordPress plugin before 2.0.9 does not implement a proper sanitisation on the translated strings. The 'trp_sanitize_string' function only removes script tag with a regex, still allowing other HTML tags and attributes to execute javascript, which could lead to authenticated Stored Cross-Site Scripting issues.2021-09-27not yet calculatedCVE-2021-24610
MISC
MISC
wordpress -- wordpress
 
The Recipe Card Blocks by WPZOOM WordPress plugin before 2.8.1 does not escape the message parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting issue2021-09-27not yet calculatedCVE-2021-24632
MISC
wordpress -- wordpress
 
The Countdown Block WordPress plugin before 1.1.2 does not have authorisation in the eb_write_block_css AJAX action, which allows any authenticated user, such as Subscriber, to modify post contents displayed to users.2021-09-27not yet calculatedCVE-2021-24633
MISC
wordpress -- wordpress
 
The WP Map Block WordPress plugin before 1.2.3 does not escape some attributes of the WP Map Block, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks2021-09-27not yet calculatedCVE-2021-24643
MISC
wordpress -- wordpress
 
Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. Vulnerable parameters: 1 - "Newsletter" tab, &yith_maintenance_newsletter_submit_label parameter: payload should start with a single quote (') symbol to break the context, i.e.: NOTIFY ME' autofocus onfocus=alert(/Visse/);// v=' - this payload will be auto triggered while admin visits this page/tab. 2 - "General" tab issues, vulnerable parameters: &yith_maintenance_message, &yith_maintenance_custom_style, &yith_maintenance_mascotte, &yith_maintenance_title_font[size], &yith_maintenance_title_font[family], &yith_maintenance_title_font[color], &yith_maintenance_paragraph_font[size], &yith_maintenance_paragraph_font[family], &yith_maintenance_paragraph_font[color], &yith_maintenance_border_top. 3 - "Background" tab issues, vulnerable parameters: &yith_maintenance_background_image, &yith_maintenance_background_color. 4 - "Logo" tab issues, vulnerable parameters: &yith_maintenance_logo_image, &yith_maintenance_logo_tagline, &yith_maintenance_logo_tagline_font[size], &yith_maintenance_logo_tagline_font[family], &yith_maintenance_logo_tagline_font[color]. 5 - "Newsletter" tab issues, vulnerable parameters: &yith_maintenance_newsletter_email_font[size], &yith_maintenance_newsletter_email_font[family], &yith_maintenance_newsletter_email_font[color], &yith_maintenance_newsletter_submit_font[size], &yith_maintenance_newsletter_submit_font[family], &yith_maintenance_newsletter_submit_font[color], &yith_maintenance_newsletter_submit_background, &yith_maintenance_newsletter_submit_background_hover, &yith_maintenance_newsletter_title, &yith_maintenance_newsletter_action, &yith_maintenance_newsletter_email_label, &yith_maintenance_newsletter_email_name, &yith_maintenance_newsletter_submit_label, &yith_maintenance_newsletter_hidden_fields. 6 - "Socials" tab issues, vulnerable parameters: &yith_maintenance_socials_facebook, &yith_maintenance_socials_twitter, &yith_maintenance_socials_gplus, &yith_maintenance_socials_youtube, &yith_maintenance_socials_rss, &yith_maintenance_socials_skype, &yith_maintenance_socials_email, &yith_maintenance_socials_behance, &yith_maintenance_socials_dribble, &yith_maintenance_socials_flickr, &yith_maintenance_socials_instagram, &yith_maintenance_socials_pinterest, &yith_maintenance_socials_tumblr, &yith_maintenance_socials_linkedin.2021-09-27not yet calculatedCVE-2021-36845
MISC
CONFIRM
wordpress -- wordpress
 
The MX Time Zone Clocks WordPress plugin before 3.4.1 does not escape the time_zone attribute of the mxmtzc_time_zone_clocks shortcode, allowing users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks2021-09-27not yet calculatedCVE-2021-24671
MISC
wuzhi -- wuhzi
 
Beijing Wuzhi Internet Technology Co., Ltd. Wuzhi CMS 4.0.1 is an open source content management system. The five fingers CMS backend in***.php file has arbitrary file deletion vulnerability. Attackers can use vulnerabilities to delete arbitrary files.2021-09-27not yet calculatedCVE-2020-24930
MISC
MISC
wuzhi -- wuzhi
 
Wuzhi CMS v4.1.0 contains a remote code execution (RCE) vulnerability in \attachment\admin\index.php.2021-09-28not yet calculatedCVE-2020-20124
MISC
wuzhi -- wuzhi
 
Wuzhi CMS v4.1 contains a SQL injection vulnerability in the checktitle() function in /coreframe/app/content/admin/content.php.2021-09-28not yet calculatedCVE-2020-20122
MISC
xmp -- toolkit_sdk
 
XMP Toolkit SDK versions 2021.07 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.2021-09-29not yet calculatedCVE-2021-40716
MISC
zeek -- zeek
 
An issue was discovered in zeek version 4.1.0. There is a HTTP request splitting vulnerability that will invalidate any ZEEK HTTP based security analysis.2021-09-29not yet calculatedCVE-2021-41732
MISC
zoho_manageengine -- opmanage
 
Zoho ManageEngine OpManager version 125466 and below is vulnerable to SQL Injection in the getReportData API.2021-09-30not yet calculatedCVE-2021-41288
MISC
zoho_manageengine -- remote_access_plus
 
Zoho ManageEngine Remote Access Plus before 10.1.2121.1 has hardcoded credentials for read-only access. The credentials are in the source code that corresponds to the DCBackupRestore JAR archive.2021-09-30not yet calculatedCVE-2021-41827
MISC
MISC
zoho_manageengine -- remote_access_plus
 
Zoho ManageEngine Remote Access Plus before 10.1.2121.1 relies on the application's build number to calculate a certain encryption key.2021-09-30not yet calculatedCVE-2021-41829
MISC
MISC
zoho_manageengine -- remote_access_plus
 
Zoho ManageEngine Remote Access Plus before 10.1.2121.1 has hardcoded credentials associated with resetPWD.xml.2021-09-30not yet calculatedCVE-2021-41828
MISC
MISC
zoom -- client_for_meetingsThe Zoom Client for Meetings for Windows in all versions before version 5.3.2 writes log files to a user writable directory as a privileged user during the installation or update of the client. This could allow for potential privilege escalation if a link was created between the user writable directory used and a non-user writable directory.2021-09-27not yet calculatedCVE-2021-34408
CONFIRM
zoom -- client_for_meetings
 
User-writable pre and post-install scripts unpacked during the Zoom Client for Meetings for MacOS installation before version 5.2.0 allow for privilege escalation to root.2021-09-27not yet calculatedCVE-2021-34409
CONFIRM
zoom -- client_for_meetings
 
The Zoom Client for Meetings for Windows in all versions before 5.3.0 fails to properly validate the certificate information used to sign .msi files when performing an update of the client. This could lead to remote code execution in an elevated privileged context.2021-09-27not yet calculatedCVE-2021-33907
MISC
zoom -- client_for_meetings
 
During the installation process for all versions of the Zoom Client for Meetings for Windows before 5.4.0, it is possible to launch Internet Explorer. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation.2021-09-27not yet calculatedCVE-2021-34412
CONFIRM
zoom -- meeting_connector
 
The network address administrative settings web portal for the Zoom on-premise Meeting Connector before version 4.6.360.20210325, Zoom on-premise Meeting Connector MMR before version 4.6.360.20210325, Zoom on-premise Recording Connector before version 3.8.44.20210326, Zoom on-premise Virtual Room Connector before version 4.4.6752.20210326, and Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5495.20210326 fails to validate input sent in requests to update the network configuration, which could lead to remote command injection on the on-premise image by the web portal administrators.2021-09-27not yet calculatedCVE-2021-34416
CONFIRM
zoom -- meeting_connector_controller
 
The network proxy page on the web portal for the Zoom on-premise Meeting Connector Controller before version 4.6.348.20201217, Zoom on-premise Meeting Connector MMR before version 4.6.348.20201217, Zoom on-premise Recording Connector before version 3.8.42.20200905, Zoom on-premise Virtual Room Connector before version 4.4.6620.20201110, and Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5495.20210326 fails to validate input sent in requests to update the network proxy configuration, which could lead to remote command injection on the on-premise image by a web portal administrator.2021-09-27not yet calculatedCVE-2021-34414
CONFIRM
zoom -- plugin_for_microsoft_outlook
 
A user-writable application bundle unpacked during the install for all versions of the Zoom Plugin for Microsoft Outlook for Mac before 5.0.25611.0521 allows for privilege escalation to root.2021-09-27not yet calculatedCVE-2021-34410
CONFIRM
zoom -- plugin_fpr_microsoft_outlook
 
All versions of the Zoom Plugin for Microsoft Outlook for MacOS before 5.3.52553.0918 contain a Time-of-check Time-of-use (TOC/TOU) vulnerability during the plugin installation process. This could allow a standard user to write their own malicious application to the plugin directory, allowing the malicious application to execute in a privileged context.2021-09-27not yet calculatedCVE-2021-34413
CONFIRM
zoom -- rooms_for_conference_room
 
During the installation process forZoom Rooms for Conference Room for Windows before version 5.3.0 it is possible to launch Internet Explorer with elevated privileges. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation.2021-09-27not yet calculatedCVE-2021-34411
CONFIRM
zoom -- zone_controller
 
The Zone Controller service in the Zoom On-Premise Meeting Connector Controller before version 4.6.358.20210205 does not verify the cnt field sent in incoming network packets, which leads to exhaustion of resources and system crash.2021-09-27not yet calculatedCVE-2021-34415
CONFIRM

Back to top

Please share your thoughts

We recently updated our anonymous product survey; we’d welcome your feedback.