The affected product is vulnerable to a disclosure of peer username and password by allowing all users access to read global variables.
Max CVSS
8.0
EPSS Score
0.07%
Published
2021-10-22
Updated
2021-10-27
An issue was discovered in Zammad before 4.1.1. The REST API discloses sensitive information.
Max CVSS
7.5
EPSS Score
0.15%
Published
2021-10-07
Updated
2021-10-14
An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature.
Max CVSS
5.3
EPSS Score
0.15%
Published
2021-10-04
Updated
2021-10-12
SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the importFile parameter of the RefreshMapping import functionality.
Max CVSS
5.3
EPSS Score
0.10%
Published
2021-10-04
Updated
2021-10-12
SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the file_name parameter of the Step3 import functionality.
Max CVSS
5.3
EPSS Score
0.09%
Published
2021-10-04
Updated
2021-10-12
.NET Core and Visual Studio Information Disclosure Vulnerability
Max CVSS
5.7
EPSS Score
0.26%
Published
2021-10-13
Updated
2023-08-01
SCOM Information Disclosure Vulnerability
Max CVSS
7.5
EPSS Score
0.66%
Published
2021-10-13
Updated
2023-12-28
Windows Fast FAT File System Driver Information Disclosure Vulnerability
Max CVSS
5.5
EPSS Score
0.04%
Published
2021-10-13
Updated
2023-08-01
Windows Kernel Information Disclosure Vulnerability
Max CVSS
5.5
EPSS Score
0.04%
Published
2021-10-13
Updated
2023-08-01
Windows Print Spooler Information Disclosure Vulnerability
Max CVSS
6.5
EPSS Score
2.68%
Published
2021-10-13
Updated
2023-08-01
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, an attacker can perform a SIP digest leak attack against FreeSWITCH and receive the challenge response of a gateway configured on the FreeSWITCH server. This is done by challenging FreeSWITCH's SIP requests with the realm set to that of the gateway, thus forcing FreeSWITCH to respond with the challenge response which is based on the password of that targeted gateway. Abuse of this vulnerability allows attackers to potentially recover gateway passwords by performing a fast offline password cracking attack on the challenge response. The attacker does not require special network privileges, such as the ability to sniff the FreeSWITCH's network traffic, to exploit this issue. Instead, what is required for this attack to work is the ability to cause the victim server to send SIP request messages to the malicious party. Additionally, to exploit this issue, the attacker needs to specify the correct realm which might in some cases be considered secret. However, because many gateways are actually public, this information can easily be retrieved. The vulnerability appears to be due to the code which handles challenges in `sofia_reg.c`, `sofia_reg_handle_sip_r_challenge()` which does not check if the challenge is originating from the actual gateway. The lack of these checks allows arbitrary UACs (and gateways) to challenge any request sent by FreeSWITCH with the realm of the gateway being targeted. This issue is patched in version 10.10.7. Maintainers recommend that one should create an association between a SIP session for each gateway and its realm to make a check be put into place for this association when responding to challenges.
Max CVSS
7.5
EPSS Score
0.15%
Published
2021-10-26
Updated
2022-10-24
Discourse-reactions is a plugin for the Discourse platform that allows user to add their reactions to the post. In affected versions reactions given by user to secure topics and private messages are visible. This issue is patched in version 0.2 of discourse-reaction. Users who are unable to update are advised to disable the Discourse-reactions plugin in admin panel.
Max CVSS
5.3
EPSS Score
0.06%
Published
2021-10-19
Updated
2022-08-12
Scrapy is a high-level web crawling and scraping framework for Python. If you use `HttpAuthMiddleware` (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects. Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the `w3lib.http.basic_auth_header` function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using `HttpAuthMiddleware`.
Max CVSS
6.5
EPSS Score
0.37%
Published
2021-10-06
Updated
2022-04-22
Scrapy-splash is a library which provides Scrapy and JavaScript integration. In affected versions users who use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for Splash authentication will have any non-Splash request expose your credentials to the request target. This includes `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`. Upgrade to scrapy-splash 0.8.0 and use the new `SPLASH_USER` and `SPLASH_PASS` settings instead to set your Splash authentication credentials safely. If you cannot upgrade, set your Splash request credentials on a per-request basis, [using the `splash_headers` request parameter](https://github.com/scrapy-plugins/scrapy-splash/tree/0.8.x#http-basic-auth), instead of defining them globally using the [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth). Alternatively, make sure all your requests go through Splash. That includes disabling the [robots.txt middleware](https://docs.scrapy.org/en/latest/topics/downloader-middleware.html#topics-dlmw-robots).
Max CVSS
7.5
EPSS Score
0.13%
Published
2021-10-05
Updated
2021-10-14
Survey Solutions is a survey management and data collection system. In affected versions the Headquarters application publishes /metrics endpoint available to any user. None of the survey answers are ever exposed, only the aggregate counters, including count of interviews, or count of assignments. Starting from version 21.09.1 the endpoint is turned off by default.
Max CVSS
5.3
EPSS Score
0.06%
Published
2021-10-04
Updated
2022-08-12
sylius/paypal-plugin is a paypal plugin for the Sylius development platform. In affected versions the URL to the payment page done after checkout was created with autoincremented payment id (/pay-with-paypal/{id}) and therefore it was easy to predict. The problem is that the Credit card form has prefilled "credit card holder" field with the Customer's first and last name and hence this can lead to personally identifiable information exposure. Additionally, the mentioned form did not require authentication. The problem has been patched in Sylius/PayPalPlugin 1.2.4 and 1.3.1. If users are unable to update they can override a sylius_paypal_plugin_pay_with_paypal_form route and change its URL parameters to (for example) {orderToken}/{paymentId}, then override the Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method. Additionally, one could override the @SyliusPayPalPlugin/payWithPaypal.html.twig template, to add contingencies: ['SCA_ALWAYS'] line in hostedFields.submit(...) function call (line 421). It would then have to be handled in the function callback.
Max CVSS
7.5
EPSS Score
0.17%
Published
2021-10-05
Updated
2022-08-12
Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.
Max CVSS
7.5
EPSS Score
0.11%
Published
2021-10-04
Updated
2022-06-14
Microsoft SharePoint Server Information Disclosure Vulnerability
Max CVSS
7.5
EPSS Score
0.83%
Published
2021-10-13
Updated
2023-08-01
Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
Max CVSS
5.5
EPSS Score
0.04%
Published
2021-10-13
Updated
2023-08-01
Microsoft Excel Information Disclosure Vulnerability
Max CVSS
5.5
EPSS Score
0.04%
Published
2021-10-13
Updated
2023-08-01
Windows Bind Filter Driver Information Disclosure Vulnerability
Max CVSS
5.5
EPSS Score
0.04%
Published
2021-10-13
Updated
2023-08-01
Rich Text Edit Control Information Disclosure Vulnerability
Max CVSS
5.5
EPSS Score
0.04%
Published
2021-10-13
Updated
2023-08-01
Information disclosure from SendEntry in GitLab starting with 10.8 allowed exposure of full URL of artifacts stored in object-storage with a temporary availability via Rails logs.
Max CVSS
4.0
EPSS Score
0.05%
Published
2021-10-04
Updated
2022-07-12
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud OfficeOnline application prior to version 1.1.1 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the OfficeOnline application is upgraded to 1.1.1. As a workaround, one may disable the OfficeOnline application in the app settings.
Max CVSS
5.3
EPSS Score
0.06%
Published
2021-10-25
Updated
2021-10-29
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Richdocuments application prior to versions 3.8.6 and 4.2.3 returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. (e.g. an attacker could see that the file `shared.txt` is located within `/files/$username/Myfolder/Mysubfolder/shared.txt`). It is recommended that the Richdocuments application is upgraded to 3.8.6 or 4.2.3. As a workaround, disable the Richdocuments application in the app settings.
Max CVSS
5.3
EPSS Score
0.07%
Published
2021-10-25
Updated
2021-10-29
88 vulnerabilities found
1 2 3 4
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!