CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2021-38138 XSS 2021-08-05 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
OneNav beta 0.9.12 allows XSS via the Add Link feature. NOTE: the vendor's position is that there intentionally is not any XSS protection at present, because the attack risk is largely limited to a compromised account; however, XSS protection is planned for a future release.
2 CVE-2021-38115 DoS 2021-08-04 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
3 CVE-2021-38114 2021-08-04 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868.
4 CVE-2021-38113 XSS 2021-08-04 2021-08-04
0.0
None ??? ??? ??? ??? ??? ???
In addBouquet in js/bqe.js in OpenWebif (aka e2openplugin-OpenWebif) through 1.4.7, inserting JavaScript into the Add Bouquet feature of the Bouquet Editor (i.e., bouqueteditor/api/addbouquet?name=) leads to Stored XSS.
5 CVE-2021-38111 Overflow 2021-08-04 2021-08-04
0.0
None ??? ??? ??? ??? ??? ???
The DEF CON 27 badge allows remote attackers to exploit a buffer overflow by sending an oversized packet via the NFMI (Near Field Magnetic Induction) protocol.
6 CVE-2021-38095 2021-08-05 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
The REST API in Planview Spigit 4.5.3 allows remote unauthenticated attackers to query sensitive user accounts data, as demonstrated by an api/v1/users/1 request.
7 CVE-2021-38084 2021-08-03 2021-08-04
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.
8 CVE-2021-37916 XSS 2021-08-03 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
Joplin before 2.0.9 allows XSS via button and form in the note body.
9 CVE-2021-37914 2021-08-03 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.
10 CVE-2021-37859 XSS Bypass 2021-08-05 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
Fixed a bypass for a reflected cross-site scripting vulnerability affecting OAuth-enabled instances of Mattermost.
11 CVE-2021-37848 +Info 2021-08-02 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
common/password.c in Pengutronix barebox through 2021.07.0 leaks timing information because strncmp is used during hash comparison.
12 CVE-2021-37847 +Info 2021-08-02 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
crypto/digest.c in Pengutronix barebox through 2021.07.0 leaks timing information because memcmp is used during digest verification.
13 CVE-2021-37843 2021-08-02 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6.6, 4.0.12, 5.0.5; for Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; for Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; and for Fisheye 2.5.9.
14 CVE-2021-37840 2021-08-02 2021-08-02
0.0
None ??? ??? ??? ??? ??? ???
aaPanel through 6.8.12 allows Cross-Site WebSocket Hijacking (CSWH) involving OS commands within WebSocket messages at a ws:// URL for /webssh (the victim must have configured Terminal with at least one host). Successful exploitation depends on the browser used by a potential victim (e.g., exploitation can occur with Firefox but not Chrome).
15 CVE-2021-37833 Exec Code XSS 2021-08-03 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands.
16 CVE-2021-37832 Sql 2021-08-03 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite is being used as the application database. A malicious attacker can issue SQL commands to the SQLite database through the vulnerable idappartamenti parameter.
17 CVE-2021-37760 2021-07-31 2021-08-02
0.0
None ??? ??? ??? ??? ??? ???
A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
18 CVE-2021-37759 2021-07-31 2021-08-02
0.0
None ??? ??? ??? ??? ??? ???
A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).
19 CVE-2021-37746 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click.
20 CVE-2021-37632 Exec Code 2021-08-05 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
SuperMartijn642's Config Lib is a library used by a number of mods for the game Minecraft. The versions of SuperMartijn642's Config Lib between 1.0.4 and 1.0.8 are affected by a vulnerability and can be exploited on both servers and clients. Using SuperMartijn642's Config Lib, servers will send a packet to clients with the server's config values. In order to read `enum` values from the packet data, `ObjectInputStream#readObject` is used. `ObjectInputStream#readObject` will instantiate a class based on the input data. Since, the packet data is not validated before `ObjectInputStream#readObject` is called, an attacker can instantiate any class by sending a malicious packet. If a suitable class is found, the vulnerability can lead to a number of exploits, including remote code execution. Although the vulnerable packet is typically only send from server to client, it can theoretically also be send from client to server. This means both clients and servers running SuperMartijn642's Config Lib between 1.0.4 and 1.0.8 are vulnerable. The vulnerability has been patched in SuperMartijn642's Config lib 1.0.9. Both, players and server owners, should update to 1.0.9 or higher.
21 CVE-2021-37625 2021-08-05 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
Skytable is an open source NoSQL database. In versions prior to 0.6.4 an incorrect check of return value of the accept function in the run-loop for a TCP socket/TLS socket/TCP+TLS multi-socket causes an early exit from the run loop that should continue infinitely unless terminated by a local user, effectively causing the whole database server to shut down. This has severe impact and can be used to easily cause DoS attacks without the need to use much bandwidth. The attack vectors include using an incomplete TLS connection for example by not providing the certificate for the connection and using a specially crafted TCP packet that triggers the application layer backoff algorithm.
22 CVE-2021-37614 Sql 2021-08-05 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
In certain Progress MOVEit Transfer versions before 2021.0.3 (aka 13.0.3), SQL injection in the MOVEit Transfer web application could allow an authenticated remote attacker to gain access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, or execute SQL statements that alter or delete database elements, via crafted strings sent to unique MOVEit Transfer transaction types. The fixed versions are 2019.0.7 (11.0.7), 2019.1.6 (11.1.6), 2019.2.3 (11.2.3), 2020.0.6 (12.0.6), 2020.1.5 (12.1.5), and 2021.0.3 (13.0.3).
23 CVE-2021-37606 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
Meow hash 0.5/calico does not sufficiently thwart key recovery by an attacker who can query whether there's a collision in the bottom bits of the hashes of two messages, as demonstrated by an attack against a long-running web service that allows the attacker to infer collisions by measuring timing differences.
24 CVE-2021-37605 2021-08-05 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
In the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being being validated / updated prior to message authentication.
25 CVE-2021-37604 2021-08-05 2021-08-05
0.0
None ??? ??? ??? ??? ??? ???
In the Microchip MiWi v6.5 software stack, there is a possibility of frame counters being validated/updated prior to message authentication.
26 CVE-2021-37601 +Info 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
muc.lib.lua in Prosody 0.11.0 through 0.11.9 allows remote attackers to obtain sensitive information (list of admins, members, owners, and banned entities of a Multi-User chat room) in some common configurations.
27 CVE-2021-37600 Overflow 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file.
28 CVE-2021-37596 XSS 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
Telegram Web K Alpha 0.6.1 allows XSS via a document name.
29 CVE-2021-37595 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU.
30 CVE-2021-37594 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU.
31 CVE-2021-37593 Exec Code Sql 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
PEEL Shopping before 9.4.0.1 allows remote SQL injection. A public user/guest (unauthenticated) can inject a malicious SQL query in order to affect the execution of predefined SQL commands via the id parameter on the achat/produit_details.php?id={SQLi] endpoint. Upon a successful SQL injection attack, an attacker can read sensitive data from the database or modify database data.
32 CVE-2021-37588 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
In Charm 0.43, any two users can collude to achieve the ability to decrypt YCT14 data.
33 CVE-2021-37587 2021-07-30 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
In Charm 0.43, any single user can decrypt DAC-MACS or MA-ABE-YJ14 data.
34 CVE-2021-37578 2021-07-29 2021-07-30
0.0
None ??? ??? ??? ??? ??? ???
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely. For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.
35 CVE-2021-37558 Exec Code Sql 2021-08-03 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
A SQL injection vulnerability in a MediaWiki script in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote unauthenticated attackers to execute arbitrary SQL commands via the host_name and service_description parameters. The vulnerability can be exploited only when a valid Knowledge Base URL is configured on the Knowledge Base configuration page and points to a MediaWiki instance. This relates to the proxy feature in class/centreon-knowledge/ProceduresProxy.class.php and include/configuration/configKnowledge/proxy/proxy.php.
36 CVE-2021-37557 Exec Code Sql 2021-08-03 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
A SQL injection vulnerability in image generation in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote authenticated (but low-privileged) attackers to execute arbitrary SQL commands via the include/views/graphs/generateGraphs/generateImage.php index parameter.
37 CVE-2021-37556 Exec Code Sql 2021-08-03 2021-08-03
0.0
None ??? ??? ??? ??? ??? ???
A SQL injection vulnerability in reporting export in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote authenticated (but low-privileged) attackers to execute arbitrary SQL commands via the include/reporting/dashboard/csvExport/csv_HostGroupLogs.php start and end parameters.
38 CVE-2021-37555 2021-07-26 2021-07-27
0.0
None ??? ??? ??? ??? ??? ???
TX9 Automatic Food Dispenser v3.2.57 devices allow access to a shell as root/superuser, a related issue to CVE-2019-16734. To connect, the telnet service is used on port 23 with the default password of 059AnkJ for the root account. The user can then download the filesystem through preinstalled BusyBox utilities (e.g., tar and nc).
39 CVE-2021-37441 2021-07-25 2021-07-26
0.0
None ??? ??? ??? ??? ??? ???
NCH Axon PBX v2.22 and earlier allows path traversal for file deletion via the logdelete?file=/.. substring.
40 CVE-2021-37436 +Info 2021-07-24 2021-07-26
0.0
None ??? ??? ??? ??? ??? ???
Amazon Echo Dot devices through 2021-07-02 sometimes allow attackers, who have physical access to a device after a factory reset, to obtain sensitive information via a series of complex hardware and software attacks. NOTE: reportedly, there were vendor marketing statements about safely removing personal content via a factory reset. Also, the vendor has reportedly indicated that they are working on mitigations.
41 CVE-2021-37394 2021-07-26 2021-07-26
0.0
None ??? ??? ??? ??? ??? ???
In RPCMS v1.8 and below, attackers can interact with API and change variable "role" to "admin" to achieve admin user registration.
42 CVE-2021-37393 XSS 2021-07-26 2021-07-26
0.0
None ??? ??? ??? ??? ??? ???
In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. Attacker can use "update password" function to inject XSS payloads into nickname variable, and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.
43 CVE-2021-37392 XSS 2021-07-26 2021-07-26
0.0
None ??? ??? ??? ??? ??? ???
In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.
44 CVE-2021-37232 Overflow 2021-08-04 2021-08-04
0.0
None ??? ??? ??? ??? ??? ???
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
45 CVE-2021-37231 Overflow 2021-08-04 2021-08-04
0.0
None ??? ??? ??? ??? ??? ???
A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.
46 CVE-2021-37216 79 XSS 2021-08-02 2021-08-02
0.0
None ??? ??? ??? ??? ??? ???
QSAN Storage Manager header page parameters does not filter special characters. Remote attackers can inject JavaScript without logging in and launch reflected XSS attacks to access and modify specific data.
47 CVE-2021-37167 2021-08-02 2021-08-02
0.0
None ??? ??? ??? ??? ??? ???
An insecure permissions issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. A user logged in using the default credentials can gain root access to the device, which provides permissions for all of the functionality of the device.
48 CVE-2021-37166 DoS Overflow 2021-08-02 2021-08-02
0.0
None ??? ??? ??? ??? ??? ???
A buffer overflow issue leading to denial of service was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. When HMI3 starts up, it binds a local service to a TCP port on all interfaces of the device, and takes extensive time for the GUI to connect to the TCP socket, allowing the connection to be hijacked by an external attacker.
49 CVE-2021-37165 Exec Code Overflow 2021-08-02 2021-08-02
0.0
None ??? ??? ??? ??? ??? ???
A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. When a message is sent to the HMI TCP socket, it is forwarded to the hmiProcessMsg function through the pendingQ, and may lead to remote code execution.
50 CVE-2021-37164 Overflow 2021-08-02 2021-08-02
0.0
None ??? ??? ??? ??? ??? ???
A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. In the tcpTxThread function, the received data is copied to a stack buffer. An off-by-3 condition can occur, resulting in a stack-based buffer overflow.
Total number of vulnerabilities : 1870   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.