CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2021-34693 +Info 2021-06-14 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
2 CVE-2021-34682 2021-06-12 2021-06-14
0.0
None ??? ??? ??? ??? ??? ???
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
3 CVE-2021-34679 2021-06-11 2021-06-14
0.0
None ??? ??? ??? ??? ??? ???
Thycotic Password Reset Server before 5.3.0 allows credential disclosure.
4 CVE-2021-34557 Overflow Bypass 2021-06-10 2021-06-11
0.0
None ??? ??? ??? ??? ??? ???
XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs.
5 CVE-2021-34555 DoS 2021-06-10 2021-06-10
0.0
None ??? ??? ??? ??? ??? ???
OpenDMARC 1.4.1 and 1.4.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a multi-value From header field.
6 CVE-2021-34547 CSRF 2021-06-10 2021-06-10
0.0
None ??? ??? ??? ??? ??? ???
PRTG Network Monitor 20.1.55.1775 allows /editsettings CSRF for user account creation.
7 CVE-2021-34546 Exec Code 2021-06-10 2021-06-11
0.0
None ??? ??? ??? ??? ??? ???
An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the "save log to file" feature. To accomplish this, the attacker can navigate to cmd.exe.
8 CVE-2021-34540 XSS 2021-06-11 2021-06-11
0.0
None ??? ??? ??? ??? ??? ???
Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard.
9 CVE-2021-34539 Exec Code 2021-06-10 2021-06-10
0.0
None ??? ??? ??? ??? ??? ???
An issue was discovered in CubeCoders AMP before 2.1.1.8. A lack of validation of the Java Version setting means that an unintended executable path can be set. The result is that high-privileged users can trigger code execution.
10 CVE-2021-34369 +Info 2021-06-09 2021-06-14
0.0
None ??? ??? ??? ??? ??? ???
portlets/contact/ref/refContactDetail.do in Accela Civic Platform through 20.1 allows remote attackers to obtain sensitive information via a modified contactSeqNumber value.
11 CVE-2021-34170 Exec Code 2021-06-15 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
Bandai Namco FromSoftware Dark Souls III allows remote attackers to execute arbitrary code.
12 CVE-2021-34129 Dir. Trav. 2021-06-15 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
LaikeTui 3.5.0 allows remote authenticated users to delete arbitrary files, as demonstrated by deleting install.lock in order to reinstall the product in an attacker-controlled manner. This deletion is possible via directory traversal in the uploadImg, oldpic, or imgurl parameter.
13 CVE-2021-34128 Exec Code 2021-06-15 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
LaikeTui 3.5.0 allows remote authenticated users to execute arbitrary PHP code by using index.php?module=system&action=pay to upload a ZIP archive containing a .php file, as demonstrated by the ../../../../phpinfo.php pathname.
14 CVE-2021-33894 Sql 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
In Progress MOVEit Transfer before 2019.0.6 (11.0.6), 2019.1.x before 2019.1.5 (11.1.5), 2019.2.x before 2019.2.2 (11.2.2), 2020.x before 2020.0.5 (12.0.5), 2020.1.x before 2020.1.4 (12.1.4), and 2021.x before 2021.0.1 (13.0.1), a SQL injection vulnerability exists in SILUtility.vb in MOVEit.DMZ.WebApp in the MOVEit Transfer web app. This could allow an authenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database and/or execute SQL statements that alter or delete database elements.
15 CVE-2021-33887 2021-06-15 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
Insufficient verification of data authenticity in Peloton TTR01 up to and including PTV55G allows an attacker with physical access to boot into a modified kernel/ramdisk without unlocking the bootloader.
16 CVE-2021-33881 Bypass 2021-06-06 2021-06-07
0.0
None ??? ??? ??? ??? ??? ???
On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc.
17 CVE-2021-33880 2021-06-06 2021-06-07
0.0
None ??? ??? ??? ??? ??? ???
The aaugustin websockets library before 9.1 for Python has an Observable Timing Discrepancy on servers when HTTP Basic Authentication is enabled with basic_auth_protocol_factory(credentials=...). An attacker may be able to guess a password via a timing attack.
18 CVE-2021-33842 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
Improper Authentication vulnerability in the cookie parameter of Circutor SGE-PLC1000 firmware version 0.9.2b allows an attacker to perform operations as an authenticated user. In order to exploit this vulnerability, the attacker must be within the network where the device affected is located.
19 CVE-2021-33841 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
SGE-PLC1000 device, in its 0.9.2b firmware version, does not handle some requests correctly, allowing a remote attacker to inject code into the operating system with maximum privileges.
20 CVE-2021-33833 Overflow 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).
21 CVE-2021-33805 2021-06-03 2021-06-03
0.0
None ??? ??? ??? ??? ??? ???
In the reference implementation of FUSE before 2.9.8 and 3.x before 3.2.5, local attackers were able to specify the allow_other option even if forbidden in /etc/fuse.conf, leading to exposure of FUSE filesystems to other users. This issue only affects systems with SELinux active.
22 CVE-2021-33669 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
Under certain conditions, SAP Mobile SDK Certificate Provider allows a local unprivileged attacker to exploit an insecure temporary file storage. For a successful exploitation user interaction from another user is required and could lead to complete impact of confidentiality integrity and availability.
23 CVE-2021-33668 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
Due to improper input sanitization, specially crafted LDAP queries can be injected by an unauthenticated user. This could partially impact the confidentiality of the application.
24 CVE-2021-33666 XSS 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
When SAP Commerce Cloud version 100, hosts a JavaScript storefront, it is vulnerable to MIME sniffing, which, in certain circumstances, could be used to facilitate an XSS attack or malware proliferation.
25 CVE-2021-33665 XSS 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
SAP NetWeaver Application Server ABAP (Applications based on SAP GUI for HTML), versions - KRNL64NUC - 7.49, KRNL64UC - 7.49,7.53, KERNEL - 7.49,7.53,7.77,7.81,7.84, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
26 CVE-2021-33664 XSS 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
SAP NetWeaver Application Server ABAP (Applications based on Web Dynpro ABAP), versions - SAP_UI - 750,752,753,754,755, SAP_BASIS - 702, 731 does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.
27 CVE-2021-33662 200 +Info 2021-06-09 2021-06-15
2.1
None Local Low Not required Partial None None
Under certain conditions, the installation of SAP Business One, version - 10.0, discloses sensitive information on the file system allowing an attacker to access information which would otherwise be restricted.
28 CVE-2021-33622 2021-06-15 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
Sylabs Singularity 3.5.x and 3.6.x, and SingularityPRO before 3.5-8, has an Incorrect Check of a Function's Return Value.
29 CVE-2021-33571 Bypass 2021-06-08 2021-06-08
0.0
None ??? ??? ??? ??? ??? ???
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
30 CVE-2021-33393 2021-06-09 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
lfs/backup in IPFire 2.25-core155 does not ensure that /var/ipfire/backup/bin/backup.pl is owned by the root account. It might be owned by an unprivileged account, which could potentially be used to install a Trojan horse backup.pl script that is later executed by root. Similar problems with the ownership/permissions of other files may be present as well.
31 CVE-2021-33359 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability exists in gowitness < 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file.
32 CVE-2021-33358 Exec Code 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
Multiple vulnerabilities exist in RaspAP 2.3 to 2.6.5 in the "interface", "ssid" and "wpa_passphrase" POST parameters in /hostapd, when the parameter values contain special characters such as ";" or "$()" which enables an authenticated attacker to execute arbitrary OS commands.
33 CVE-2021-33357 Exec Code 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
A vulnerability exists in RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands.
34 CVE-2021-33356 Exec Code 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
Multiple privilege escalation vulnerabilities in RaspAP 1.5 to 2.6.5 could allow an authenticated remote attacker to inject arbitrary commands to /installers/common.sh component that can result in remote command execution with root privileges.
35 CVE-2021-33205 +Priv 2021-06-11 2021-06-11
0.0
None ??? ??? ??? ??? ??? ???
Western Digital EdgeRover before 0.25 has an escalation of privileges vulnerability where a low privileged user could load malicious content into directories with higher privileges, because of how Node.js is used. An attacker can gain admin privileges and carry out malicious activities such as creating a fake library and stealing user credentials.
36 CVE-2021-33203 Dir. Trav. 2021-06-08 2021-06-08
0.0
None ??? ??? ??? ??? ??? ???
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
37 CVE-2021-33190 Bypass 2021-06-08 2021-06-08
0.0
None ??? ??? ??? ??? ??? ???
In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, the default account and password are fixed.Ultimately these factors lead to the issue of security risks. This issue is fixed in APISIX Dashboard 2.6.1
38 CVE-2021-33176 DoS 2021-06-08 2021-06-08
0.0
None ??? ??? ??? ??? ??? ???
VerneMQ MQTT Broker versions prior to 1.12.0 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system.
39 CVE-2021-33175 DoS 2021-06-08 2021-06-08
0.0
None ??? ??? ??? ??? ??? ???
EMQ X Broker versions prior to 4.2.8 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system.
40 CVE-2021-33031 +Priv 2021-06-10 2021-06-10
0.0
None ??? ??? ??? ??? ??? ???
In LabCup before <v2_next_18022, it is possible to use the save API to perform unauthorized actions for users without access to user management in order to, after successful exploitation, gain access to a victim's account. A user without the user-management privilege can change another user's email address if the attacker knows details of the victim such as the exact roles and group roles, ID, and remote authentication ID settings. These must be sent in a modified save API request. It was fixed in 6.3.0.03.
41 CVE-2021-32942 316 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
The vulnerability could expose cleartext credentials from AVEVA InTouch Runtime 2020 R2 and all prior versions (WindowViewer) if an authorized, privileged user creates a diagnostic memory dump of the process and saves it to a non-protected location.
42 CVE-2021-32932 89 Sql 2021-06-11 2021-06-11
0.0
None ??? ??? ??? ??? ??? ???
The affected product is vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information on the iView (versions prior to v5.7.03.6182).
43 CVE-2021-32930 Exec Code 2021-06-11 2021-06-11
0.0
None ??? ??? ??? ??? ??? ???
The affected product’s configuration is vulnerable due to missing authentication, which may allow an attacker to change configurations and execute arbitrary code on the iView (versions prior to v5.7.03.6182).
44 CVE-2021-32924 2021-06-01 2021-06-01
0.0
None ??? ??? ??? ??? ??? ???
Invision Community (aka IPS Community Suite) before 4.6.0 allows eval-based PHP code injection by a moderator because the IPS\cms\modules\front\pages\_builder::previewBlock method interacts unsafely with the IPS\_Theme::runProcessFunction method.
45 CVE-2021-32923 2021-06-03 2021-06-03
0.0
None ??? ??? ??? ??? ??? ???
HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.
46 CVE-2021-32684 2021-06-14 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, and logs commands, effectively making them unusable. Version 1.5.3 contains patches for the problems.
47 CVE-2021-32683 Exec Code XSS 2021-06-15 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
wire-webapp is the web version of Wire, an open-source messenger. A cross-site scripting vulnerability exists in wire-webapp prior to version 2021-06-01-production.0. If a user is instructed to open an image in a new tab (right click -> open in new tab, or copy the URL and paste it in the URL bar), an the image payload is executed on the domain hosting the app (app.wire.com). In particular, if an image contains malicious code in addition to the actual picture, this code is executed on app.wire.com. This allows the attacker to fully control the user account. The vulnerability was patched in version 2021-06-01-production.0. As a workaround, users should not try to open image URLs.
48 CVE-2021-32682 Exec Code 2021-06-14 2021-06-15
0.0
None ??? ??? ??? ??? ??? ???
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.
49 CVE-2021-32677 CSRF 2021-06-09 2021-06-09
0.0
None ??? ??? ??? ??? ??? ???
FastAPI is a web framework for building APIs with Python 3.6+ based on standard Python type hints. FastAPI versions lower than 0.65.2 that used cookies for authentication in path operations that received JSON payloads sent by browsers were vulnerable to a Cross-Site Request Forgery (CSRF) attack. In versions lower than 0.65.2, FastAPI would try to read the request payload as JSON even if the content-type header sent was not set to application/json or a compatible JSON media type (e.g. application/geo+json). A request with a content type of text/plain containing JSON data would be accepted and the JSON data would be extracted. Requests with content type text/plain are exempt from CORS preflights, for being considered Simple requests. The browser will execute them right away including cookies, and the text content could be a JSON string that would be parsed and accepted by the FastAPI application. This is fixed in FastAPI 0.65.2. The request data is now parsed as JSON only if the content-type header is application/json or another JSON compatible media type like application/geo+json. It's best to upgrade to the latest FastAPI, but if updating is not possible then a middleware or a dependency that checks the content-type header and aborts the request if it is not application/json or another JSON compatible content type can act as a mitigating workaround.
50 CVE-2021-32674 22 Dir. Trav. 2021-06-08 2021-06-08
0.0
None ??? ??? ??? ??? ??? ???
Zope is an open-source web application server. This advisory extends the previous advisory at https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36 with additional cases of TAL expression traversal vulnerabilities. Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. The problem has been fixed in Zope 5.21 and 4.6.1. The workaround is the same as for https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36: A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.