Commit
·
24d2e6f
1
Parent(s):
aac4909
update secutable version 2
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- STI_CEA/table1.csv +0 -0
- STI_CEA/table10.csv +0 -78
- STI_CEA/table1001.csv +0 -124
- STI_CEA/table1002.csv +0 -124
- STI_CEA/table1003.csv +0 -124
- STI_CEA/table1004.csv +0 -124
- STI_CEA/table1005.csv +0 -124
- STI_CEA/table1006.csv +0 -0
- STI_CEA/table1007.csv +0 -124
- STI_CEA/table1008.csv +0 -124
- STI_CEA/table1009.csv +0 -0
- STI_CEA/table101.csv +0 -0
- STI_CEA/table1010.csv +0 -124
- STI_CEA/table1011.csv +0 -124
- STI_CEA/table1012.csv +0 -124
- STI_CEA/table1013.csv +0 -124
- STI_CEA/table1014.csv +0 -124
- STI_CEA/table1015.csv +0 -124
- STI_CEA/table1016.csv +0 -124
- STI_CEA/table1017.csv +0 -0
- STI_CEA/table1018.csv +0 -124
- STI_CEA/table1019.csv +0 -124
- STI_CEA/table102.csv +0 -38
- STI_CEA/table1020.csv +0 -124
- STI_CEA/table1021.csv +0 -124
- STI_CEA/table1022.csv +0 -124
- STI_CEA/table1023.csv +0 -0
- STI_CEA/table1024.csv +0 -0
- STI_CEA/table1025.csv +0 -124
- STI_CEA/table1026.csv +0 -124
- STI_CEA/table1027.csv +0 -124
- STI_CEA/table1028.csv +0 -0
- STI_CEA/table1029.csv +0 -124
- STI_CEA/table103.csv +0 -77
- STI_CEA/table1030.csv +0 -124
- STI_CEA/table1031.csv +0 -124
- STI_CEA/table1032.csv +0 -124
- STI_CEA/table1033.csv +0 -124
- STI_CEA/table1034.csv +0 -124
- STI_CEA/table1035.csv +0 -124
- STI_CEA/table1036.csv +0 -124
- STI_CEA/table1037.csv +0 -124
- STI_CEA/table1038.csv +0 -124
- STI_CEA/table1039.csv +0 -0
- STI_CEA/table104.csv +0 -75
- STI_CEA/table1040.csv +0 -124
- STI_CEA/table1041.csv +0 -124
- STI_CEA/table1042.csv +0 -124
- STI_CEA/table1043.csv +0 -0
- STI_CEA/table1044.csv +0 -0
STI_CEA/table1.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table10.csv
DELETED
|
@@ -1,78 +0,0 @@
|
|
| 1 |
-
Name
|
| 2 |
-
J2EE Misconfiguration: Data Transmission Without Encryption
|
| 3 |
-
J2EE Misconfiguration: Insufficient Session-ID Length
|
| 4 |
-
J2EE Misconfiguration: Missing Custom Error Page
|
| 5 |
-
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
|
| 6 |
-
Struts: Duplicate Validation Forms
|
| 7 |
-
Struts: Incomplete validate() Method Definition
|
| 8 |
-
Struts: Form Bean Does Not Extend Validation Class
|
| 9 |
-
Struts: Form Field Without Validator
|
| 10 |
-
Struts: Plug-in Framework not in Use
|
| 11 |
-
Struts: Unused Validation Form
|
| 12 |
-
Struts: Unvalidated Action Form
|
| 13 |
-
Struts: Validator Turned Off
|
| 14 |
-
Struts: Validator Without Form Field
|
| 15 |
-
Direct Use of Unsafe JNI
|
| 16 |
-
Integer Underflow (Wrap or Wraparound)
|
| 17 |
-
Integer Coercion Error
|
| 18 |
-
Numeric Truncation Error
|
| 19 |
-
Generation of Error Message Containing Sensitive Information
|
| 20 |
-
J2EE Bad Practices: Direct Management of Connections
|
| 21 |
-
J2EE Bad Practices: Direct Use of Sockets
|
| 22 |
-
Uncaught Exception
|
| 23 |
-
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
|
| 24 |
-
Race Condition within a Thread
|
| 25 |
-
Passing Mutable Objects to an Untrusted Method
|
| 26 |
-
Returning a Mutable Object to an Untrusted Caller
|
| 27 |
-
J2EE Bad Practices: Use of System.exit()
|
| 28 |
-
J2EE Bad Practices: Direct Use of Threads
|
| 29 |
-
Use of NullPointerException Catch to Detect NULL Pointer Dereference
|
| 30 |
-
Declaration of Catch for Generic Exception
|
| 31 |
-
Declaration of Throws for Generic Exception
|
| 32 |
-
Improper Cleanup on Thrown Exception
|
| 33 |
-
Duplicate Key in Associative List (Alist)
|
| 34 |
-
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
|
| 35 |
-
NULL Pointer Dereference
|
| 36 |
-
Missing Default Case in Multiple Condition Expression
|
| 37 |
-
Assigning instead of Comparing
|
| 38 |
-
Omitted Break Statement in Switch
|
| 39 |
-
Comparison of Classes by Name
|
| 40 |
-
Reliance on Package-level Scope
|
| 41 |
-
Public cloneable() Method Without Final ('Object Hijack')
|
| 42 |
-
Use of Inner Class Containing Sensitive Data
|
| 43 |
-
Critical Public Variable Without Final Modifier
|
| 44 |
-
Private Data Structure Returned From A Public Method
|
| 45 |
-
Public Data Assigned to Private Array-Typed Field
|
| 46 |
-
Cloneable Class Containing Sensitive Information
|
| 47 |
-
Serializable Class Containing Sensitive Data
|
| 48 |
-
Public Static Field Not Marked Final
|
| 49 |
-
Deserialization of Untrusted Data
|
| 50 |
-
Java Runtime Error Message Containing Sensitive Information
|
| 51 |
-
Use of Singleton Pattern Without Synchronization in a Multithreaded Context
|
| 52 |
-
Unsynchronized Access to Shared Data in a Multithreaded Context
|
| 53 |
-
finalize() Method Without super.finalize()
|
| 54 |
-
Call to Thread run() instead of start()
|
| 55 |
-
EJB Bad Practices: Use of Synchronization Primitives
|
| 56 |
-
EJB Bad Practices: Use of AWT Swing
|
| 57 |
-
EJB Bad Practices: Use of Java I/O
|
| 58 |
-
EJB Bad Practices: Use of Sockets
|
| 59 |
-
EJB Bad Practices: Use of Class Loader
|
| 60 |
-
J2EE Bad Practices: Non-serializable Object Stored in Session
|
| 61 |
-
clone() Method Without super.clone()
|
| 62 |
-
Object Model Violation: Just One of Equals and Hashcode Defined
|
| 63 |
-
Array Declared Public, Final, and Static
|
| 64 |
-
finalize() Method Declared Public
|
| 65 |
-
Empty Synchronized Block
|
| 66 |
-
Explicit Call to Finalize()
|
| 67 |
-
J2EE Framework: Saving Unserializable Objects to Disk
|
| 68 |
-
Comparison of Object References Instead of Object Contents
|
| 69 |
-
Public Static Final Field References Mutable Object
|
| 70 |
-
Struts: Non-private Field in ActionForm Class
|
| 71 |
-
Double-Checked Locking
|
| 72 |
-
Critical Data Element Declared Public
|
| 73 |
-
Access to Critical Private Variable via Public Method
|
| 74 |
-
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
|
| 75 |
-
Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations
|
| 76 |
-
Incorrect Bitwise Shift of Integer
|
| 77 |
-
Improper Neutralization of Special Elements Used in a Template Engine
|
| 78 |
-
Multiple Releases of Same Resource or Handle
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1001.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-36830,Candidate,Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Comment Guestbook plugin <= 0.8.0 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/comment-guestbook/wordpress-comment-guestbook-plugin-0-8-0-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/comment-guestbook/wordpress-comment-guestbook-plugin-0-8-0-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/comment-guestbook/ | URL:https://wordpress.org/plugins/comment-guestbook/,Assigned (20210719),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-36831,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-36832,Candidate,"WordPress Popups, Welcome Bar, Optins and Lead Generation Plugin – Icegram (versions <= 2.0.2) vulnerable at ""Headline"" (&message_data[16][headline]) input.",CONFIRM:https://wordpress.org/plugins/icegram/#developers | URL:https://wordpress.org/plugins/icegram/#developers | MISC:https://patchstack.com/database/vulnerability/icegram/wordpress-icegram-plugin-2-0-2-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/icegram/wordpress-icegram-plugin-2-0-2-authenticated-stored-cross-site-scripting-xss-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-36833,Candidate,Authenticated (admin or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in ibericode's MC4WP plugin <= 4.8.6 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/mailchimp-for-wp/wordpress-mc4wp-plugin-4-8-6-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/mailchimp-for-wp/wordpress-mc4wp-plugin-4-8-6-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/mailchimp-for-wp/#developers | URL:https://wordpress.org/plugins/mailchimp-for-wp/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-36834,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-36835,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-36836,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-36837,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-36838,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-36839,Candidate,Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Social Media Follow Buttons Bar plugin <= 4.73 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/social-media-buttons-toolbar/wordpress-social-media-follow-buttons-bar-plugin-4-73-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/social-media-buttons-toolbar/wordpress-social-media-follow-buttons-bar-plugin-4-73-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/social-media-buttons-toolbar/ | URL:https://wordpress.org/plugins/social-media-buttons-toolbar/,Assigned (20210719),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-3684,Candidate,"A vulnerability was found in OpenShift Assisted Installer. During generation of the Discovery ISO, image pull secrets were leaked as plaintext in the installation logs. An authenticated user could exploit this by re-using the image pull secret to pull container images from the registry as the associated user.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1985962 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1985962 | MISC:https://github.com/openshift/assisted-installer/commit/2403dad3795406f2c5d923af0894e07bc8b0bdc4 | URL:https://github.com/openshift/assisted-installer/commit/2403dad3795406f2c5d923af0894e07bc8b0bdc4 | MISC:https://github.com/openshift/assisted-installer/commit/f3800cfa3d64ce6dcd6f7b73f0578bb99bfdaf7a | URL:https://github.com/openshift/assisted-installer/commit/f3800cfa3d64ce6dcd6f7b73f0578bb99bfdaf7a,Assigned (20210805),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-36840,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-36841,Candidate,"Authenticated Stored Cross-Site Scripting (XSS) vulnerability in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.7, vulnerable parameter &yith_maintenance_newsletter_submit_label. Possible even when unfiltered HTML is disallowed by WordPress configuration.",CONFIRM:https://wordpress.org/plugins/yith-maintenance-mode/#developers | URL:https://wordpress.org/plugins/yith-maintenance-mode/#developers | MISC:https://patchstack.com/database/vulnerability/yith-maintenance-mode/wordpress-yith-maintenance-mode-plugin-1-3-7-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/yith-maintenance-mode/wordpress-yith-maintenance-mode-plugin-1-3-7-authenticated-stored-cross-site-scripting-xss-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-36842,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-36843,Candidate,Authenticated Stored Cross-Site Scripting (XSS) vulnerability discovered in WordPress Floating Social Media Icon plugin (versions <= 4.3.5) Social Media Configuration form. Requires high role user like admin.,CONFIRM:https://wordpress.org/plugins/floating-social-media-icon/ | URL:https://wordpress.org/plugins/floating-social-media-icon/ | MISC:https://patchstack.com/database/vulnerability/floating-social-media-icon/wordpress-floating-social-media-icon-plugin-4-3-5-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/floating-social-media-icon/wordpress-floating-social-media-icon-plugin-4-3-5-authenticated-stored-cross-site-scripting-xss-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-36844,Candidate,Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in MyThemeShop WP Subscribe plugin <= 1.2.12 on WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/wp-subscribe/wordpress-wp-subscribe-plugin-1-2-12-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/wp-subscribe/wordpress-wp-subscribe-plugin-1-2-12-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/wp-subscribe/#developers | URL:https://wordpress.org/plugins/wp-subscribe/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-36845,Candidate,"Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. Vulnerable parameters: 1 - ""Newsletter"" tab, &yith_maintenance_newsletter_submit_label parameter: payload should start with a single quote (') symbol to break the context, i.e.: NOTIFY ME' autofocus onfocus=alert(/Visse/);// v=' - this payload will be auto triggered while admin visits this page/tab. 2 - ""General"" tab issues, vulnerable parameters: &yith_maintenance_message, &yith_maintenance_custom_style, &yith_maintenance_mascotte, &yith_maintenance_title_font[size], &yith_maintenance_title_font[family], &yith_maintenance_title_font[color], &yith_maintenance_paragraph_font[size], &yith_maintenance_paragraph_font[family], &yith_maintenance_paragraph_font[color], &yith_maintenance_border_top. 3 - ""Background"" tab issues, vulnerable parameters: &yith_maintenance_background_image, &yith_maintenance_background_color. 4 - ""Logo"" tab issues, vulnerable parameters: &yith_maintenance_logo_image, &yith_maintenance_logo_tagline, &yith_maintenance_logo_tagline_font[size], &yith_maintenance_logo_tagline_font[family], &yith_maintenance_logo_tagline_font[color]. 5 - ""Newsletter"" tab issues, vulnerable parameters: &yith_maintenance_newsletter_email_font[size], &yith_maintenance_newsletter_email_font[family], &yith_maintenance_newsletter_email_font[color], &yith_maintenance_newsletter_submit_font[size], &yith_maintenance_newsletter_submit_font[family], &yith_maintenance_newsletter_submit_font[color], &yith_maintenance_newsletter_submit_background, &yith_maintenance_newsletter_submit_background_hover, &yith_maintenance_newsletter_title, &yith_maintenance_newsletter_action, &yith_maintenance_newsletter_email_label, &yith_maintenance_newsletter_email_name, &yith_maintenance_newsletter_submit_label, &yith_maintenance_newsletter_hidden_fields. 6 - ""Socials"" tab issues, vulnerable parameters: &yith_maintenance_socials_facebook, &yith_maintenance_socials_twitter, &yith_maintenance_socials_gplus, &yith_maintenance_socials_youtube, &yith_maintenance_socials_rss, &yith_maintenance_socials_skype, &yith_maintenance_socials_email, &yith_maintenance_socials_behance, &yith_maintenance_socials_dribble, &yith_maintenance_socials_flickr, &yith_maintenance_socials_instagram, &yith_maintenance_socials_pinterest, &yith_maintenance_socials_tumblr, &yith_maintenance_socials_linkedin.",CONFIRM:https://wordpress.org/plugins/yith-maintenance-mode/#developers | URL:https://wordpress.org/plugins/yith-maintenance-mode/#developers | MISC:https://patchstack.com/database/vulnerability/yith-maintenance-mode/wordpress-yith-maintenance-mode-plugin-1-3-8-multiple-authenticated-stored-cross-site-scripting-xss-vulnerabilities | URL:https://patchstack.com/database/vulnerability/yith-maintenance-mode/wordpress-yith-maintenance-mode-plugin-1-3-8-multiple-authenticated-stored-cross-site-scripting-xss-vulnerabilities,Assigned (20210719),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-36846,Candidate,Authenticated (admin or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Premio Chaty (WordPress plugin) <= 2.8.3,CONFIRM:https://patchstack.com/database/vulnerability/chaty/wordpress-chaty-plugin-2-8-3-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/chaty/wordpress-chaty-plugin-2-8-3-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/chaty/ | URL:https://wordpress.org/plugins/chaty/,Assigned (20210719),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-36847,Candidate,Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WebbaPlugins Webba Booking plugin <= 4.2.21 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/webba-booking-lite/wordpress-webba-booking-plugin-4-2-21-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/webba-booking-lite/wordpress-webba-booking-plugin-4-2-21-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/webba-booking-lite/#developers | URL:https://wordpress.org/plugins/webba-booking-lite/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-36848,,Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Social Media Feather (WordPress plugin) versions <= 2.0.4,CONFIRM:https://patchstack.com/database/vulnerability/social-media-feather/wordpress-social-media-feather-plugin-2-0-4-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/social-media-feather/wordpress-social-media-feather-plugin-2-0-4-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/social-media-feather/#developers | URL:https://wordpress.org/plugins/social-media-feather/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-36849,Candidate,Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ren� Hermenau's Social Media Share Buttons plugin <= 3.8.1 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/mashsharer/wordpress-social-media-share-buttons-plugin-3-8-1-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/mashsharer/wordpress-social-media-share-buttons-plugin-3-8-1-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/mashsharer/#developers | URL:https://wordpress.org/plugins/mashsharer/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-3685,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210805),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-36850,Candid*at|!e*,"Cross-Site Request Forgery (CSRF) vulnerability in WordPress Media File Renamer – Auto & Manual Rename plugin (versions <= 5.1.9). Affected parameters ""post_title"", ""filename"", ""lock"". This allows changing the uploaded media title, media file name, and media locking state.",CONFIRM:https://wordpress.org/plugins/media-file-renamer/#developers | URL:https://wordpress.org/plugins/media-file-renamer/#developers | MISC:https://patchstack.com/database/vulnerability/media-file-renamer/wordpress-media-file-renamer-plugin-5-1-9-multiple-cross-site-request-forgery-csrf-vulnerabilities | URL:https://patchstack.com/database/vulnerability/media-file-renamer/wordpress-media-file-renamer-plugin-5-1-9-multiple-cross-site-request-forgery-csrf-vulnerabilities,Assigned (20210719),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-36851,Candidate,"Authenticated (editor or higher user role) Cross-Site Scripting (XSS) vulnerability in Web-Settler Testimonial Slider – Free Testimonials Slider Plugin (WordPress plugin) via parameters mpsp_posts_bg_color, mpsp_posts_description_color, mpsp_slide_nav_button_color.",CONFIRM:https://patchstack.com/database/vulnerability/testimonial-add/wordpress-testimonial-slider-plugin-3-5-8-3-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/testimonial-add/wordpress-testimonial-slider-plugin-3-5-8-3-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/testimonial-add/#developers | URL:https://wordpress.org/plugins/testimonial-add/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-36852,,Cross-Site Request Forgery (CSRF) vulnerability in ThimPress WP Hotel Booking plugin <= 1.10.5 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/wp-hotel-booking/wordpress-wp-hotel-booking-plugin-1-10-5-cross-site-request-forgery-csrf-vulnerability | URL:https://patchstack.com/database/vulnerability/wp-hotel-booking/wordpress-wp-hotel-booking-plugin-1-10-5-cross-site-request-forgery-csrf-vulnerability | CONFIRM:https://wordpress.org/plugins/wp-hotel-booking/#developers | URL:https://wordpress.org/plugins/wp-hotel-booking/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-36853,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-36854,Candidate,Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Booking Ultra Pro plugin <= 1.1.4 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-plugin-1-1-4-multiple-cross-site-request-forgery-csrf-vulnerabilities?_s_id=cve | URL:https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-plugin-1-1-4-multiple-cross-site-request-forgery-csrf-vulnerabilities?_s_id=cve | CONFIRM:https://wordpress.org/plugins/booking-ultra-pro/ | URL:https://wordpress.org/plugins/booking-ultra-pro/,Assigned (20210719),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-36855,Candidate,Cross-Site Scripting (XSS) via Cross-Site Request Forgery (CSRF) vulnerability in Booking Ultra Pro plugin <= 1.1.4 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-plugin-1-1-4-cross-site-scripting-xss-via-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-plugin-1-1-4-cross-site-scripting-xss-via-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/booking-ultra-pro/ | URL:https://wordpress.org/plugins/booking-ultra-pro/,Assigned (20210719),None (candidate not yet proposed),
|
| 30 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-36857,Candidate,Authenticated (editor+) Stored Cross-Site Scripting (XSS) vulnerability in wpshopmart Testimonial Builder plugin <= 1.6.1 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/testimonial-builder/wordpress-testimonial-builder-plugin-1-6-1-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/testimonial-builder/wordpress-testimonial-builder-plugin-1-6-1-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/testimonial-builder/#developers | URL:https://wordpress.org/plugins/testimonial-builder/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-36858,Candidate,Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Themepoints Testimonials plugin <= 2.6 on WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/super-testimonial/wordpress-testimonials-plugin-2-6-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/super-testimonial/wordpress-testimonials-plugin-2-6-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/super-testimonial/ | URL:https://wordpress.org/plugins/super-testimonial/,Assigned (20210719),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-36859,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-3686,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210805),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-36860,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-3|8|1,Candidate,Cross-Site Request Forgery (CSRF) vulnerability in Rich Reviews by Starfish plugin <= 1.9.14 at WordPress allows an attacker to delete reviews.,CONFIRM:https://patchstack.com/database/vulnerability/rich-reviews/wordpress-rich-reviews-by-starfish-plugin-1-9-14-cross-site-request-forgery-csrf-vulnerability | URL:https://patchstack.com/database/vulnerability/rich-reviews/wordpress-rich-reviews-by-starfish-plugin-1-9-14-cross-site-request-forgery-csrf-vulnerability | CONFIRM:https://wordpress.org/plugins/rich-reviews/#developers | URL:https://wordpress.org/plugins/rich-reviews/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-36862,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-36863,Candidate,Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in ExpressTech Quiz And Survey Master plugin <= 7.3.4 on WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/quiz-master-next/#developers | URL:https://wordpress.org/plugins/quiz-master-next/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-36864,Candidate,Auth. (editor+) Reflected Cross-Site Scripting (XSS) vulnerability in ExpressTech Quiz And Survey Master plugin <= 7.3.4 on WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-auth-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-auth-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/quiz-master-next/#developers | URL:https://wordpress.org/plugins/quiz-master-next/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-36865,Candidate,Insecure direct object references (IDOR) vulnerability in ExpressTech Quiz And Survey Master plugin <= 7.3.4 at WordPress allows attackers to change the content of the quiz.,CONFIRM:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-insecure-direct-object-references-idor-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-insecure-direct-object-references-idor-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/quiz-master-next/#developers | URL:https://wordpress.org/plugins/quiz-master-next/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-36866,Candidate,Authenticated (author or higher role) Stored Cross-Site Scripting (XSS) vulnerability in Fatcat Apps Easy Pricing Tables plugin <= 3.1.2 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/easy-pricing-tables/wordpress-easy-pricing-tables-plugin-3-1-2-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/easy-pricing-tables/wordpress-easy-pricing-tables-plugin-3-1-2-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/easy-pricing-tables/#developers | URL:https://wordpress.org/plugins/easy-pricing-tables/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-36867,Candidate,Stored Cross-Site Scripting (XSS) vulnerability in Alexander Ustimenko's Psychological tests & quizzes plugin <= 0.21.19 on WordPress possible for users with contributor or higher user rights.,CONFIRM:https://patchstack.com/database/vulnerability/wp-testing/wordpress-psychological-tests-quizzes-plugin-0-21-19-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/wp-testing/wordpress-psychological-tests-quizzes-plugin-0-21-19-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/wp-testing/ | URL:https://wordpress.org/plugins/wp-testing/,Assigned (20210719),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-36868,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 44 |
-
,Candidate,Reflected Cross-Site Scripting (XSS) vulnerability in WordPress Ivory Search plugin (versions <= 4.6.6). Vulnerable parameter: &post.,CONFIRM:https://wordpress.org/plugins/add-search-to-menu/#developers | URL:https://wordpress.org/plugins/add-search-to-menu/#developers | MISC:https://patchstack.com/database/vulnerability/add-search-to-menu/wordpress-ivory-search-plugin-4-6-6-reflected-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/add-search-to-menu/wordpress-ivory-search-plugin-4-6-6-reflected-cross-site-scripting-xss-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-3687,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210805),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-36870,,"Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in WordPress WP Google Maps plugin (versions <= 8.1.12). Vulnerable parameters: &dataset_name, &wpgmza_gdpr_retention_purpose, &wpgmza_gdpr_company_name, &name #2, &name, &polyname #2, &polyname, &address.",CONFIRM:https://wordpress.org/plugins/wp-google-maps/#developers | URL:https://wordpress.org/plugins/wp-google-maps/#developers | MISC:https://patchstack.com/database/vulnerability/wp-google-maps/wordpress-wp-google-maps-plugin-8-1-12-multiple-authenticated-persistent-cross-site-scripting-xss-vulnerabilities | URL:https://patchstack.com/database/vulnerability/wp-google-maps/wordpress-wp-google-maps-plugin-8-1-12-multiple-authenticated-persistent-cross-site-scripting-xss-vulnerabilities,Assigned (20210719),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-36871,Candidate,"Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in WordPress WP Google Maps Pro premium plugin (versions <= 8.1.11). Vulnerable parameters: &wpgmaps_marker_category_name, Value > &attributes[], Name > &attributes[], &icons[], &names[], &description, &link, &title.",CONFIRM:https://www.wpgmaps.com/documentation/pro-changelog/ | URL:https://www.wpgmaps.com/documentation/pro-changelog/ | MISC:https://patchstack.com/database/vulnerability/wp-google-maps-pro/wordpress-wp-google-maps-pro-premium-plugin-8-1-11-multiple-authenticated-persistent-cross-site-scripting-xss-vulnerabilities | URL:https://patchstack.com/database/vulnerability/wp-google-maps-pro/wordpress-wp-google-maps-pro-premium-plugin-8-1-11-multiple-authenticated-persistent-cross-site-scripting-xss-vulnerabilities,Assigned (20210719),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-36872,Ca$didate,Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress Popular Posts plugin (versions <= 5.3.3). Vulnerable at &widget-wpp[2][post_type].,CONFIRM:https://github.com/cabrerahector/wordpress-popular-posts/blob/master/changelog.md | URL:https://github.com/cabrerahector/wordpress-popular-posts/blob/master/changelog.md | MISC:https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-5-3-3-authenticated-persistent-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/wordpress-popular-posts/wordpress-popular-posts-plugin-5-3-3-authenticated-persistent-cross-site-scripting-xss-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-36873,Candidae,Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress iQ Block Country plugin (versions <= 1.2.11). Vulnerable parameter: &blockcountry_blockmessage.,CONFIRM:https://wordpress.org/plugins/iq-block-country/#developers | URL:https://wordpress.org/plugins/iq-block-country/#developers | MISC:https://patchstack.com/database/vulnerability/iq-block-country-/wordpress-iq-block-country-plugin-1-2-11-authenticated-persistent-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/iq-block-country-/wordpress-iq-block-country-plugin-1-2-11-authenticated-persistent-cross-site-scripting-xss-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-36874,Candidate,Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5).,CONFIRM:https://wordpress.org/plugins/ulisting/#developers | URL:https://wordpress.org/plugins/ulisting/#developers | MISC:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-authenticated-insecure-direct-object-references-idor-vulnerability | URL:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-authenticated-insecure-direct-object-references-idor-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-36875,Candidate,"Authenticated Reflected Cross-Site Scripting (XSS) vulnerability in WordPress uListing plugin (versions <= 2.0.5). Vulnerable parameters: &filter[id], &filter[user], &filter[expired_date], &filter[created_date], &filter[updated_date].",CONFIRM:https://wordpress.org/plugins/ulisting/#developers | URL:https://wordpress.org/plugins/ulisting/#developers | MISC:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-authenticated-reflected-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-authenticated-reflected-cross-site-scripting-xss-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-36876,Candidate,Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in WordPress uListing plugin (versions <= 2.0.5) as it lacks CSRF checks on plugin administration pages.,CONFIRM:https://wordpress.org/plugins/ulisting/#developers | URL:https://wordpress.org/plugins/ulisting/#developers | MISC:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-multiple-cross-site-request-forgery-csrf-vulnerabilities | URL:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-multiple-cross-site-request-forgery-csrf-vulnerabilities,Assigned (20210719),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-36877,Candidate,Cross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to modify user roles.,CONFIRM:https://wordpress.org/plugins/ulisting/#developers | URL:https://wordpress.org/plugins/ulisting/#developers | MISC:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-modify-user-roles-via-cross-site-request-forgery-csrf-vulnerability | URL:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-modify-user-roles-via-cross-site-request-forgery-csrf-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-36878,Candidate,Cross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to update settings.,CONFIRM:https://wordpress.org/plugins/ulisting/#developers | URL:https://wordpress.org/plugins/ulisting/#developers | MISC:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-settings-update-via-cross-site-request-forgery-csrf-vulnerability | URL:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-settings-update-via-cross-site-request-forgery-csrf-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-36879,Candidate,Unauthenticated Privilege Escalation vulnerability in WordPress uListing plugin (versions <= 2.0.5). Possible if WordPress configuration allows user registration.,CONFIRM:https://wordpress.org/plugins/ulisting/#developers | URL:https://wordpress.org/plugins/ulisting/#developers | MISC:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-unauthenticated-privilege-escalation-vulnerability | URL:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-5-unauthenticated-privilege-escalation-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-3688,Candidate,"A flaw was found in Red Hat JBoss Core Services HTTP Server in all versions, where it does not properly normalize the path component of a request URL contains dot-dot-semicolon(s). This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.",MISC:https://access.redhat.com/security/cve/CVE-2021-3688 | URL:https://access.redhat.com/security/cve/CVE-2021-3688 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1990252 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1990252,Assigned (20210805),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-36880,Candidate,"Unauthenticated SQL Injection (SQLi) vulnerability in WordPress uListing plugin (versions <= 2.0.3), vulnerable parameter: custom.",CONFIRM:https://wordpress.org/plugins/ulisting/#developers | URL:https://wordpress.org/plugins/ulisting/#developers | MISC:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-3-unauthenticated-sql-injection-sqli-vulnerability | URL:https://patchstack.com/database/vulnerability/ulisting/wordpress-ulisting-plugin-2-0-3-unauthenticated-sql-injection-sqli-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-36881,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-36882,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-36883,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-36884,Candidate,Authenticated Persistent Cross-Site Scripting (XSS) vulnerability discovered in WordPress Backup Migration plugin <= 1.1.5 versions.,CONFIRM:https://patchstack.com/database/vulnerability/backup-backup/wordpress-backup-migration-plugin-1-1-5-authenticated-persistent-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/backup-backup/wordpress-backup-migration-plugin-1-1-5-authenticated-persistent-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/backup-backup/#developers | URL:https://wordpress.org/plugins/backup-backup/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-36885,Candidate,Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions <= 1.2.6.1).,CONFIRM:https://patchstack.com/database/vulnerability/contact-form-cfdb7/wordpress-contact-form-7-database-addon-cfdb7-plugin-1-2-6-1-unauthenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/contact-form-cfdb7/wordpress-contact-form-7-database-addon-cfdb7-plugin-1-2-6-1-unauthenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/contact-form-cfdb7/#developers | URL:https://wordpress.org/plugins/contact-form-cfdb7/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-36886,Candidate,Cross-Site Request Forgery (CSRF) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions <= 1.2.5.9).,CONFIRM:https://wordpress.org/plugins/contact-form-cfdb7/#developers | URL:https://wordpress.org/plugins/contact-form-cfdb7/#developers | MISC:https://patchstack.com/database/vulnerability/contact-form-cfdb7/wordpress-contact-form-7-database-addon-cfdb7-plugin-1-2-5-9-cross-site-request-forgery-csrf-vulnerability | URL:https://patchstack.com/database/vulnerability/contact-form-cfdb7/wordpress-contact-form-7-database-addon-cfdb7-plugin-1-2-5-9-cross-site-request-forgery-csrf-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-36887,Candidate,"Cross-Site Request Forgery (CSRF) vulnerability leading to Cross-Site Scripting (XSS) discovered in tarteaucitron.js – Cookies legislation & GDPR WordPress plugin (versions <= 1.5.4), vulnerable parameters ""tarteaucitronEmail"" and ""tarteaucitronPass"".",CONFIRM:https://wordpress.org/plugins/tarteaucitronjs/#developers | URL:https://wordpress.org/plugins/tarteaucitronjs/#developers | MISC:https://patchstack.com/database/vulnerability/tarteaucitronjs/wordpress-tarteaucitron-js-cookies-legislation-gdpr-plugin-1-5-4-cross-site-request-forgery-csrf-vulnerability-leading-to-cross-site-scripting-xss | URL:https://patchstack.com/database/vulnerability/tarteaucitronjs/wordpress-tarteaucitron-js-cookies-legislation-gdpr-plugin-1-5-4-cross-site-request-forgery-csrf-vulnerability-leading-to-cross-site-scripting-xss,Assigned (20210719),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-36888,Candidate,Unauthenticated Arbitrary Options Update vulnerability leading to full website compromise discovered in Image Hover Effects Ultimate (versions <= 9.6.1) WordPress plugin.,CONFIRM:https://patchstack.com/database/vulnerability/image-hover-effects-ultimate/wordpress-image-hover-effects-ultimate-plugin-9-6-1-unauthenticated-arbitrary-options-update-leading-to-full-website-compromise | URL:https://patchstack.com/database/vulnerability/image-hover-effects-ultimate/wordpress-image-hover-effects-ultimate-plugin-9-6-1-unauthenticated-arbitrary-options-update-leading-to-full-website-compromise | CONFIRM:https://wordpress.org/plugins/image-hover-effects-ultimate/#developers | URL:https://wordpress.org/plugins/image-hover-effects-ultimate/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-36889,,Multiple Stored Authenticated Cross-Site Scripting (XSS) vulnerabilities were discovered in tarteaucitron.js – Cookies legislation & GDPR WordPress plugin (versions <= 1.6).,CONFIRM:https://wordpress.org/plugins/tarteaucitronjs/#developers | URL:https://wordpress.org/plugins/tarteaucitronjs/#developers | MISC:https://patchstack.com/database/vulnerability/tarteaucitronjs/wordpress-tarteaucitron-js-cookies-legislation-gdpr-plugin-1-6-multiple-stored-authenticated-cross-site-scripting-xss-vulnerabilities | URL:https://patchstack.com/database/vulnerability/tarteaucitronjs/wordpress-tarteaucitron-js-cookies-legislation-gdpr-plugin-1-6-multiple-stored-authenticated-cross-site-scripting-xss-vulnerabilities,Assigned (20210719),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-3689,Candidate,yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator,CONFIRM:https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f | URL:https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f | MISC:https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46 | URL:https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46,Assigned (20210807),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-36890,Candidate,Cross-Site Request Forgery (CSRF) vulnerability in Social Share Buttons by Supsystic plugin <= 2.2.2 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/social-share-buttons-by-supsystic/wordpress-social-share-buttons-by-supsystic-plugin-2-2-2-cross-site-request-forgery-csrf-vulnerability | URL:https://patchstack.com/database/vulnerability/social-share-buttons-by-supsystic/wordpress-social-share-buttons-by-supsystic-plugin-2-2-2-cross-site-request-forgery-csrf-vulnerability | CONFIRM:https://wordpress.org/plugins/social-share-buttons-by-supsystic/ | URL:https://wordpress.org/plugins/social-share-buttons-by-supsystic/,Assigned (20210719),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-36891,Candiate,Cross-Site Request Forgery (CSRF) vulnerability in Photo Gallery by Supsystic plugin <= 1.15.5 at WordPress allows changing the plugin settings.,CONFIRM:https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-5-cross-site-request-forgery-csrf-leading-to-plugin-settings-change | URL:https://patchstack.com/database/vulnerability/gallery-by-supsystic/wordpress-photo-gallery-by-supsystic-plugin-1-15-5-cross-site-request-forgery-csrf-leading-to-plugin-settings-change | CONFIRM:https://wordpress.org/plugins/gallery-by-supsystic/#developers | URL:https://wordpress.org/plugins/gallery-by-supsystic/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-36892,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-36893,Candidate,Authenticated (author or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Responsive Tabs (WordPress plugin) <= 4.0.5,CONFIRM:https://patchstack.com/database/vulnerability/responsive-tabs/wordpress-responsive-tabs-plugin-4-0-5-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/responsive-tabs/wordpress-responsive-tabs-plugin-4-0-5-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/responsive-tabs/ | URL:https://wordpress.org/plugins/responsive-tabs/,Assigned (20210719),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-36894,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-36895,Candidate,Unauthenticated Cross-Site Scripting (XSS) vulnerability in Tripetto's Tripetto plugin <= 5.1.4 on WordPress via SVG image upload.,CONFIRM:https://patchstack.com/database/vulnerability/tripetto/wordpress-tripetto-plugin-5-1-4-unauthenticated-cross-site-scripting-xss-vulnerability-via-svg-image-upload | URL:https://patchstack.com/database/vulnerability/tripetto/wordpress-tripetto-plugin-5-1-4-unauthenticated-cross-site-scripting-xss-vulnerability-via-svg-image-upload | CONFIRM:https://wordpress.org/plugins/tripetto/#developers | URL:https://wordpress.org/plugins/tripetto/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-36896,Candidate,Authenticated (author or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Pricing Table (WordPress plugin) versions <= 1.5.2,CONFIRM:https://patchstack.com/database/vulnerability/pricing-table/wordpress-pricing-table-plugin-1-5-2-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/pricing-table/wordpress-pricing-table-plugin-1-5-2-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/pricing-table/#developers | URL:https://wordpress.org/plugins/pricing-table/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-36897,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-36898,Candidate,Auth. SQL Injection (SQLi) vulnerability in Quiz And Survey Master plugin <= 7.3.4 on WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-auth-sql-injection-sqli-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-auth-sql-injection-sqli-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/quiz-master-next/#developers | URL:https://wordpress.org/plugins/quiz-master-next/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 77 |
-
,Candidate,Authenticated (admin+) Reflected Cross-Site Scripting (XSS) vulnerability in Gabe Livan's Asset CleanUp: Page Speed Booster plugin <= 1.3.8.4 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/wp-asset-clean-up/wordpress-asset-cleanup-page-speed-booster-plugin-1-3-8-4-authenticated-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/wp-asset-clean-up/wordpress-asset-cleanup-page-speed-booster-plugin-1-3-8-4-authenticated-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/wp-asset-clean-up/#developers | URL:https://wordpress.org/plugins/wp-asset-clean-up/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-3690,Candidate,A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.,MISC:https://access.redhat.com/security/cve/CVE-2021-3690 | URL:https://access.redhat.com/security/cve/CVE-2021-3690 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1991299 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1991299 | MISC:https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877 | URL:https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877 | MISC:https://issues.redhat.com/browse/UNDERTOW-1935 | URL:https://issues.redhat.com/browse/UNDERTOW-1935,Assigned (20210809),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-36900,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-36901,Candidate,Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability in Phil Baker's Age Gate plugin <= 2.17.0 at WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/age-gate/wordpress-age-gate-plugin-2-17-0-unauthenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/age-gate/wordpress-age-gate-plugin-2-17-0-unauthenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/age-gate/#developers | URL:https://wordpress.org/plugins/age-gate/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-36902,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-36903,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-36904,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-36905,Candidate,Multiple Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerabilities in Quiz And Survey Master plugin <= 7.3.4 on WordPress.,CONFIRM:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-multiple-auth-stored-cross-site-scripting-xss-vulnerabilities?_s_id=cve | URL:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-4-multiple-auth-stored-cross-site-scripting-xss-vulnerabilities?_s_id=cve | CONFIRM:https://wordpress.org/plugins/quiz-master-next/#developers | URL:https://wordpress.org/plugins/quiz-master-next/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 85 |
-
,Candidate,Multiple Insecure Direct Object References (IDOR) vulnerabilities in ExpressTech Quiz And Survey Master plugin <= 7.3.6 on WordPress.,MISC:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-6-multiple-insecure-direct-object-references-idor-vulnerabilities?_s_id=cve | URL:https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-7-3-6-multiple-insecure-direct-object-references-idor-vulnerabilities?_s_id=cve | MISC:https://wordpress.org/plugins/quiz-master-next/#developers | URL:https://wordpress.org/plugins/quiz-master-next/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-36907,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-36908,Candidate,Cross-Site Request Forgery (CSRF) vulnerability leading to Database Reset in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows attackers to trick authenticated into making unintentional database reset.,CONFIRM:https://patchstack.com/database/vulnerability/wp-reset/wordpress-wp-reset-pro-premium-plugin-5-98-cross-site-request-forgery-csrf-vulnerability-leading-to-database-reset | URL:https://patchstack.com/database/vulnerability/wp-reset/wordpress-wp-reset-pro-premium-plugin-5-98-cross-site-request-forgery-csrf-vulnerability-leading-to-database-reset | CONFIRM:https://patchstack.com/wp-reset-pro-critical-vulnerability-fixed/ | URL:https://patchstack.com/wp-reset-pro-critical-vulnerability-fixed/ | CONFIRM:https://wpreset.com/changelog/ | URL:https://wpreset.com/changelog/,Assigned (20210719),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-36909,Candidate,Authenticated Database Reset vulnerability in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows any authenticated user to wipe the entire database regardless of their authorization. It leads to a complete website reset and takeover.,CONFIRM:https://wpreset.com/changelog/ | URL:https://wpreset.com/changelog/ | MISC:https://patchstack.com/database/vulnerability/wp-reset/wordpress-wp-reset-pro-premium-plugin-5-98-authenticated-database-reset-vulnerability | URL:https://patchstack.com/database/vulnerability/wp-reset/wordpress-wp-reset-pro-premium-plugin-5-98-authenticated-database-reset-vulnerability | MISC:https://patchstack.com/wp-reset-pro-critical-vulnerability-fixed/ | URL:https://patchstack.com/wp-reset-pro-critical-vulnerability-fixed/,Assigned (20210719),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-3691,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210809),None (candidate not yet proposed),
|
| 90 |
-
CVE-221-36910,Candidate,Authenticated (admin user role) Stored Cross-Site Scripting (XSS) in WP-Appbox (WordPress plugin) <= 4.3.20.,CONFIRM:https://patchstack.com/database/vulnerability/wp-appbox/wordpress-wp-appbox-plugin-4-3-20-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/wp-appbox/wordpress-wp-appbox-plugin-4-3-20-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/wp-appbox/#developers | URL:https://wordpress.org/plugins/wp-appbox/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-36911,Candidate,"Stored Cross-Site Scripting (XSS) vulnerability discovered in WordPress Comment Engine Pro plugin (versions <= 1.0), could be exploited by users with Editor or higher role.",CONFIRM:https://wordpress.org/plugins/comment-engine-pro/ | URL:https://wordpress.org/plugins/comment-engine-pro/ | MISC:https://patchstack.com/database/vulnerability/comment-engine-pro/wordpress-comment-engine-pro-plugin-1-0-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/comment-engine-pro/wordpress-comment-engine-pro-plugin-1-0-stored-cross-site-scripting-xss-vulnerability,Assigned (20210719),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-36912,Candidate,"Stored Cross-Site Scripting (XSS) vulnerability in Andrea Pernici News Sitemap for Google plugin <= 1.0.16 on WordPress, attackers must have contributor or higher user role.",CONFIRM:https://patchstack.com/database/vulnerability/google-news-sitemap/wordpress-andrea-pernici-news-sitemap-for-google-plugin-1-0-16-authenticated-stored-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/google-news-sitemap/wordpress-andrea-pernici-news-sitemap-for-google-plugin-1-0-16-authenticated-stored-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/google-news-sitemap/ | URL:https://wordpress.org/plugins/google-news-sitemap/,Assigned (20210719),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-36913,Candidate,Unauthenticated Options Change and Content Injection vulnerability in Qube One Redirection for Contact Form 7 plugin <= 2.4.0 at WordPress allows attackers to change options and inject scripts into the footer HTML. Requires an additional extension (plugin) AccessiBe.,CONFIRM:https://patchstack.com/database/vulnerability/wpcf7-redirect/wordpress-redirection-for-contact-form-7-plugin-2-4-0-unauthenticated-options-change-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/wpcf7-redirect/wordpress-redirection-for-contact-form-7-plugin-2-4-0-unauthenticated-options-change-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/wpcf7-redirect/#developers | URL:https://wordpress.org/plugins/wpcf7-redirect/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-36914,Candidate,Cross-Site Request Forgery (CSRF) vulnerability leading to Reflected Cross-Site Scripting (XSS) in CalderaWP License Manager (WordPress plugin) <= 1.2.11.,CONFIRM:https://github.com/CalderaWP/calderawp-license-manager | URL:https://github.com/CalderaWP/calderawp-license-manager | CONFIRM:https://patchstack.com/database/vulnerability/calderawp-license-manager/wordpress-calderawp-license-manager-plugin-1-2-11-cross-site-request-forgery-csrf-vulnerability-leading-to-reflected-cross-site-scripting-xss | URL:https://patchstack.com/database/vulnerability/calderawp-license-manager/wordpress-calderawp-license-manager-plugin-1-2-11-cross-site-request-forgery-csrf-vulnerability-leading-to-reflected-cross-site-scripting-xss,Assigned (20210719),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-36915,Canddate,Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs Profile Builder plugin <= 3.6.0 at WordPress allows uploading the JSON file and updating the options. Requires Import and Export add-on.,CONFIRM:https://patchstack.com/database/vulnerability/profile-builder/wordpress-profile-builder-plugin-3-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | URL:https://patchstack.com/database/vulnerability/profile-builder/wordpress-profile-builder-plugin-3-6-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | CONFIRM:https://wordpress.org/plugins/profile-builder/#developers | URL:https://wordpress.org/plugins/profile-builder/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-36916,Candidate,"The SQL injection vulnerability in the Hide My WP WordPress plugin (versions <= 6.2.3) is possible because of how the IP address is retrieved and used inside a SQL query. The function ""hmwp_get_user_ip"" tries to retrieve the IP address from multiple headers, including IP address headers that the user can spoof, such as ""X-Forwarded-For."" As a result, the malicious payload supplied in one of these IP address headers will be directly inserted into the SQL query, making SQL injection possible.",CONFIRM:https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158 | URL:https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158 | MISC:https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability | URL:https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-sql-injection-sqli-vulnerability | MISC:https://patchstack.com/hide-my-wp-vulnerabilities-fixed/ | URL:https://patchstack.com/hide-my-wp-vulnerabilities-fixed/,Assigned (20210719),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-36917,Candidat,WordPress Hide My WP plugin (versions <= 6.2.3) can be deactivated by any unauthenticated user. It is possible to retrieve a reset token which can then be used to deactivate the plugin.,CONFIRM:https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158 | URL:https://codecanyon.net/item/hide-my-wp-amazing-security-plugin-for-wordpress/4177158 | MISC:https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-unauthenticated-plugin-deactivation-vulnerability | URL:https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-premium-plugin-6-2-3-unauthenticated-plugin-deactivation-vulnerability | MISC:https://patchstack.com/hide-my-wp-vulnerabilities-fixed/ | URL:https://patchstack.com/hide-my-wp-vulnerabilities-fixed/,Assigned (20210719),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-36918,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-36919,,"Multiple Authenticated Reflected Cross-Site Scripting (XSS) vulnerabilities in WordPress Awesome Support plugin (versions <= 6.0.6), vulnerable parameters (&id, &assignee).",CONFIRM:https://wordpress.org/plugins/awesome-support/#developers | URL:https://wordpress.org/plugins/awesome-support/#developers | MISC:https://patchstack.com/database/vulnerability/awesome-support/wordpress-awesome-support-plugin-6-0-6-multiple-authenticated-reflected-cross-site-scripting-xss-vulnerabilities | URL:https://patchstack.com/database/vulnerability/awesome-support/wordpress-awesome-support-plugin-6-0-6-multiple-authenticated-reflected-cross-site-scripting-xss-vulnerabilities,Assigned (20210719),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-3692,Candidate,yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator,CONFIRM:https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba | URL:https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba | MISC:https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46 | URL:https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46,Assigned (20210809),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-36920,Candidate,Authenticated Reflected Cross-Site Scripting (XSS) vulnerability discovered in WordPress plugin Download Monitor (versions <= 4.4.6).,CONFIRM:https://patchstack.com/database/vulnerability/download-monitor/wordpress-download-monitor-plugin-4-4-6-authenticated-reflected-cross-site-scripting-xss-vulnerability | URL:https://patchstack.com/database/vulnerability/download-monitor/wordpress-download-monitor-plugin-4-4-6-authenticated-reflected-cross-site-scripting-xss-vulnerability | CONFIRM:https://wordpress.org/plugins/download-monitor/#developers | URL:https://wordpress.org/plugins/download-monitor/#developers,Assigned (20210719),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-36921,Candidate,AIMANAGER before B115 on MONITORAPP Application Insight Web Application Firewall (AIWAF) devices with Manager 2.1.0 has Improper Authentication. An attacker can gain administrative access by modifying the response to an authentication check request.,CONFIRM:https://github.com/monitorapp-aicc/report/wiki/CVE-2021-36921 | MISC:https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0021/FEYE-2021-0021.md | MISC:https://www.monitorapp.com/waf/,Assigned (20210719),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-36922,Candidate,"RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve unauthorized access to USB devices (Escalation of Privileges, Denial of Service, Code Execution, and Information Disclosure) via a crafted Device IO Control packet to a device.",MISC:https://www.realtek.com/images/safe-report/Realtek_RtsUpx_Security_Advisory_Report.pdf | MISC:https://www.sentinelone.com/resources/category/report/,Assigned (20210719),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-36923,Candidate,"RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve unauthorized access to USB device privileged IN and OUT instructions (leading to Escalation of Privileges, Denial of Service, Code Execution, and Information Disclosure) via a crafted Device IO Control packet to a device.",MISC:https://www.realtek.com/images/safe-report/Realtek_RtsUpx_Security_Advisory_Report.pdf | MISC:https://www.sentinelone.com/resources/category/report/,Assigned (20210719),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-36924,,"RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve a pool overflow (leading to Escalation of Privileges, Denial of Service, and Code Execution) via a crafted Device IO Control packet to a device.",MISC:https://www.realtek.com/images/safe-report/Realtek_RtsUpx_Security_Advisory_Report.pdf | MISC:https://www.sentinelone.com/resources/category/report/,Assigned (20210719),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-36925,Candidte,"RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve an arbitrary read or write operation from/to physical memory (leading to Escalation of Privileges, Denial of Service, Code Execution, and Information Disclosure) via a crafted Device IO Control packet to a device.",MISC:https://www.realtek.com/images/safe-report/Realtek_RtsUpx_Security_Advisory_Report.pdf | MISC:https://www.sentinelone.com/resources/category/report/,Assigned (20210719),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-36926,Candidate,"Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26433, CVE-2021-36932, CVE-2021-36933.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36926 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36926,Assigned (20210719),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-36927,Candidate,Windows Digital TV Tuner device registration application Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36927 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36927,Assigned (20210719),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-36928,Candidate,Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36931.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36928 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36928,Assigned (20210719),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-36929,Candidate,Microsoft Edge (Chromium-based) Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36929 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36929,Assigned (20210719),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-3693,Candidate,"LedgerSMB does not check the origin of HTML fragments merged into the browser's DOM. By sending a specially crafted URL to an authenticated user, this flaw can be abused for remote code execution and information disclosure.",CONFIRM:https://huntr.dev/bounties/daf1384d-648a-43fd-9b35-5c37d8ead667 | URL:https://huntr.dev/bounties/daf1384d-648a-43fd-9b35-5c37d8ead667 | DEBIAN:DSA-4962 | URL:https://www.debian.org/security/2021/dsa-4962 | MISC:https://ledgersmb.org/cve-2021-3693-cross-site-scripting | URL:https://ledgersmb.org/cve-2021-3693-cross-site-scripting,Assigned (20210809),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-36930,Candidate,Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26436.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36930 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36930,Assigned (20210719),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-36931,Candidate,Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36928.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36931 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36931,Assigned (20210719),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-36932,Candidate,"Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26433, CVE-2021-36926, CVE-2021-36933.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36932 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36932,Assigned (20210719),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-36933,Candidate,"Windows Services for NFS ONCRPC XDR Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26433, CVE-2021-36926, CVE-2021-36932.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36933 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36933,Assigned (20210719),None (candidate not yet proposed),
|
| 116 |
-
,Candidate,Windows Elevation of Privilege Vulnerability,MISC:http://packetstormsecurity.com/files/164006/HiveNightmare-AKA-SeriousSAM.html | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36934 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36934,Assigned (20210719),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-36935,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-36936,Candidate,"Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36947, CVE-2021-36958.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36936 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36936,Assigned (20210719),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-36937,Candidate,Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36937 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36937,Assigned (20210719),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-36938,Candidate,Windows Cryptographic Primitives Library Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36938 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36938,Assigned (20210719),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-36939,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-3694,,"LedgerSMB does not sufficiently HTML-encode error messages sent to the browser. By sending a specially crafted URL to an authenticated user, this flaw can be abused for remote code execution and information disclosure.",CONFIRM:https://huntr.dev/bounties/ef7f4cf7-3a81-4516-b261-f5b6ac21430c | URL:https://huntr.dev/bounties/ef7f4cf7-3a81-4516-b261-f5b6ac21430c | DEBIAN:DSA-4962 | URL:https://www.debian.org/security/2021/dsa-4962 | MISC:https://github.com/ledgersmb/ledgersmb/commit/98fa476d46a4a7e5e9492ed69b4fa190be5547fc | URL:https://github.com/ledgersmb/ledgersmb/commit/98fa476d46a4a7e5e9492ed69b4fa190be5547fc | MISC:https://ledgersmb.org/cve-2021-3694-cross-site-scripting | URL:https://ledgersmb.org/cve-2021-3694-cross-site-scripting,Assigned (20210809),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-36940,Candidate,Microsoft SharePoint Server Spoofing Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36940 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36940,Assigned (20210719),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-36941,Candidae,Microsoft Word Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36941 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36941,Assigned (20210719),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1002.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-36942,Candidate,Windows LSA Spoofing Vulnerability,CERT-VN:VU#405600 | URL:https://www.kb.cert.org/vuls/id/405600 | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36942 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36942,Assigned (20210719),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-36943,Candidate,Azure CycleCloud Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33762.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36943 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36943,Assigned (20210719),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-36944,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-36945,Candidate,Windows 10 Update Assistant Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36945 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36945,Assigned (20210719),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-36946,Candidate,Microsoft Dynamics Business Central Cross-site Scripting Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36946 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36946,Assigned (20210719),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-36947,,"Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36958.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36947 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36947,Assigned (20210719),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-36948,,Windows Update Medic Service Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36948 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36948,Assigned (20210719),None (candidate not yet proposed),
|
| 9 |
-
CVE-021-36949,Candidate,Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36949 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36949,Assigned (20210719),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-3695,Candidate,"A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue has a high complexity to be exploited as an attacker needs to perform some triage over the heap layout to achieve signifcant results, also the values written into the memory are repeated three times in a row making difficult to produce valid payloads. This flaw affects grub2 versions prior grub-2.12.",CONFIRM:https://security.netapp.com/advisory/ntap-20220930-0001/ | GENTOO:GLSA-202209-12 | URL:https://security.gentoo.org/glsa/202209-12 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1991685 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1991685,Assigned (20210810),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-36950,Candidate,Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36950 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36950,Assigned (20210719),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-36951,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-36952,Candidate,Visual Studio Remote Code Execution Vulnerability,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1076/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36952 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36952,Assigned (20210719),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-36953,Candidate,Windows TCP/IP Denial of Service Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36953 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36953,Assigned (20210719),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-36954,Candidate,Windows Bind Filter Driver Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36954 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36954,Assigned (20210719),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-36955,Candidate,"Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36963, CVE-2021-38633.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36955 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36955,Assigned (20210719),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-36956,Candidate,Azure Sphere Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36956 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36956,Assigned (20210719),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-36957,Candidate,Windows Desktop Bridge Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36957 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36957,Assigned (20210719),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-36958,Candidate,"Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36947.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36958 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36958,Assigned (20210719),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-36959,Candidate,Windows Authenticode Spoofing Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36959 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36959,Assigned (20210719),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-3696,Candidate,"A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.",CONFIRM:https://security.netapp.com/advisory/ntap-20220930-0001/ | GENTOO:GLSA-202209-12 | URL:https://security.gentoo.org/glsa/202209-12 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1991686 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1991686,Assigned (20210810),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-36960,Candidat,Windows SMB Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-36972.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36960 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36960,Assigned (20210719),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-36961,Candidate,Windows Installer Denial of Service Vulnerability,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1078/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36961 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36961,Assigned (20210719),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-36962,Candidate,Windows Installer Information Disclosure Vulnerability,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1103/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36962 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36962,Assigned (20210719),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-36963,Candidate,"Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36955, CVE-2021-38633.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36963 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36963,Assigned (20210719),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-36964,Candidate,Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38630.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36964 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36964,Assigned (20210719),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-36965,,Windows WLAN AutoConfig Service Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36965 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36965,Assigned (20210719),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-36966,Candidate,Windows Subsystem for Linux Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36966 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36966,Assigned (20210719),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-36967,Candidate,Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36967 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36967,Assigned (20210719),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-36968,Candidate,Windows DNS Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36968 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36968,Assigned (20210719),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-36969,Candidate,"Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-38635, CVE-2021-38636.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36969 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36969,Assigned (20210719),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-3697,Candidate,"A crafted JPEG image may lead the JPEG reader to underflow its data pointer, allowing user-controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.",CONFIRM:https://security.netapp.com/advisory/ntap-20220930-0001/ | GENTOO:GLSA-202209-12 | URL:https://security.gentoo.org/glsa/202209-12 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1991687 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1991687,Assigned (20210810),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-36970,,Windows Print Spooler Spoofing Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36970 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36970,Assigned (20210719),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-36971,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210719),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-36972,Candidate,Windows SMB Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-36960.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36972 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36972,Assigned (20210719),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-36973,Candidate,Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36973 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36973,Assigned (20210719),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-3697,Candidate,Windows SMB Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36974 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36974,Assigned (20210719),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-36975,Candidate,Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38639.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36975 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36975,Assigned (20210719),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-36976,Candidate,libarchive 3.4.1 through 3.5.1 has a use-after-free in copy_string (called from do_uncompress_block and process_block).,CONFIRM:https://support.apple.com/kb/HT213182 | CONFIRM:https://support.apple.com/kb/HT213183 | CONFIRM:https://support.apple.com/kb/HT213193 | FEDORA:FEDORA-2022-9bb794c5f5 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/ | FULLDISC:20220314 APPLE-SA-2022-03-14-1 iOS 15.4 and iPadOS 15.4 | URL:http://seclists.org/fulldisclosure/2022/Mar/27 | FULLDISC:20220314 APPLE-SA-2022-03-14-2 watchOS 8.5 | URL:http://seclists.org/fulldisclosure/2022/Mar/28 | FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3 | URL:http://seclists.org/fulldisclosure/2022/Mar/29 | GENTOO:GLSA-202208-26 | URL:https://security.gentoo.org/glsa/202208-26 | MISC:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32375 | MISC:https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libarchive/OSV-2021-557.yaml,Assigned (20210720),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-36977,Candidate,"matio (aka MAT File I/O Library) 1.5.20 and 1.5.21 has a heap-based buffer overflow in H5MM_memcpy (called from H5MM_malloc and H5C_load_entry), related to use of HDF5 1.12.0.",MISC:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31265 | MISC:https://github.com/HDFGroup/hdf5/issues/272 | MISC:https://github.com/google/oss-fuzz-vulns/blob/main/vulns/matio/OSV-2021-440.yaml | MISC:https://github.com/google/oss-fuzz-vulns/commit/37b781ace1b4228fc36483bb7e30c72ea9d4c3d6 | MISC:https://github.com/google/oss-fuzz/issues/4999,Assigned (20210720),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-36978,Candidate,QPDF 9.x through 9.1.1 and 10.x through 10.0.4 has a heap-based buffer overflow in Pl_ASCII85Decoder::write (called from Pl_AES_PDF::flush and Pl_AES_PDF::finish) when a certain downstream write fails.,MISC:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28262 | MISC:https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qpdf/OSV-2020-2245.yaml | MISC:https://github.com/qpdf/qpdf/commit/dc92574c10f3e2516ec6445b88c5d584f40df4e5,Assigned (20210720),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-36979,Candidate,Unicorn Engine 1.0.2 has an out-of-bounds write in tb_flush_armeb (called from cpu_arm_exec_armeb and tcg_cpu_exec_armeb).,FEDORA:FEDORA-2021-53dd27bb86 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ6LOCJXHQVU6SCJLFDJINBOVJYYENLX/ | MISC:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30391 | MISC:https://github.com/google/oss-fuzz-vulns/blob/main/vulns/unicorn/OSV-2020-2305.yaml | MISC:https://github.com/unicorn-engine/unicorn/commit/bf1713d9e011b55ca1f502a6779fc4722b4bb077,Assigned (20210720),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-3698,Candidate,"A flaw was found in Cockpit in versions prior to 260 in the way it handles the certificate verification performed by the System Security Services Daemon (SSSD). This flaw allows client certificates to authenticate successfully, regardless of the Certificate Revocation List (CRL) configuration or the certificate status. The highest threat from this vulnerability is to confidentiality.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1992149 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1992149,Assigned (20210810),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-36980,Candidate,Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action.,MISC:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27851 | MISC:https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openvswitch/OSV-2020-2197.yaml | MISC:https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f | MISC:https://github.com/openvswitch/ovs/commit/65c61b0c23a0d474696d7b1cea522a5016a8aeb3 | MISC:https://github.com/openvswitch/ovs/commit/6d67310f4d2524b466b98f05ebccc1add1e8cf35 | MISC:https://github.com/openvswitch/ovs/commit/77cccc74deede443e8b9102299efc869a52b65b2 | MISC:https://github.com/openvswitch/ovs/commit/8ce8dc34b5f73b30ce0c1869af9947013c3c6575 | MISC:https://github.com/openvswitch/ovs/commit/9926637a80d0d243dbf9c49761046895e9d1a8e2,Assigned (20210720),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-36981,Candidate,"In the server in SerNet verinice before 1.22.2, insecure Java deserialization allows remote authenticated attackers to execute arbitrary code.",MISC:https://github.com/0xBrAinsTorM/CVE-2021-36981 | MISC:https://github.com/SerNet/verinice/compare/1.22.1...1.22.2 | MISC:https://verinice.com/en/support/security-advisory | MISC:https://www.secianus.de/worum-geht-es/aktuelle-meldung/cve-2021-36981-verinicepro-unsafe-java-deserialization,Assigned (20210720),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-36982,Candidate,AIMANAGER before B115 on MONITORAPP Application Insight Web Application Firewall (AIWAF) devices with Manager 2.1.0 allows OS Command Injection because of missing input validation on one of the parameters of an HTTP request.,CONFIRM:https://github.com/monitorapp-aicc/report/wiki/CVE-2021-36982 | MISC:https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0022/FEYE-2021-0022.md | MISC:https://www.monitorapp.com/waf/,Assigned (20210720),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-36983,Candidate,replay-sorcery-kms in Replay Sorcery 0.6.0 allows a local attacker to gain root privileges via a symlink attack on /tmp/replay-sorcery or /tmp/replay-sorcery/device.sock.,MISC:http://www.openwall.com/lists/oss-security/2021/07/27/1 | MISC:https://github.com/matanui159/ReplaySorcery/releases,Assigned (20210720),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-36984,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210720),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-36985,Candidate,There is a Code injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may exhaust system resources and cause the system to restart.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-36986,Candidate,There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-36987,Candidate,There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-36988,Candidate,There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 53 |
-
C$V#E-202%1-369$89,Candidate,There is a Kernel crash vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-3699,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210811),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-36990,Candidate,There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-36991,Candidate,There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-36992,Candidate,There is a Public key verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-36993,Candidate,There is a Memory leaks vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-36994,Candidate,There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-36995,Candidate,There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-36996,Candidate,There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-36997,Candidate,There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-36998,*|Ca@nd!idate,There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-36999,Candidate,There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-3700,Candidate,A use-after-free vulnerability was found in usbredir in versions prior to 0.11.0 in the usbredirparser_serialize() in usbredirparser/usbredirparser.c. This issue occurs when serializing large amounts of buffered write data in the case of a slow or blocked destination.,MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1992830 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1992830 | MISC:https://gitlab.freedesktop.org/spice/usbredir/-/commit/03c519ff5831ba | URL:https://gitlab.freedesktop.org/spice/usbredir/-/commit/03c519ff5831ba | MLIST:[debian-lts-announce] 20220320 [SECURITY] [DLA 2958-1] usbredir security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00030.html,Assigned (20210811),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-37000,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210720),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-3#*01,,There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-37002,Candidate,There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/,Assigned (20210720),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-37003,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-37004,Candi%ate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-37005,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-37006,Candidate,There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-37007,Candidate,There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-37008,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-37009,Candidate,There is a Configuration vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-3701,Candidate,"A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did not expect. The highest threat from this vulnerability is to confidentiality and integrity.",MISC:https://access.redhat.com/security/cve/CVE-2021-3701 | URL:https://access.redhat.com/security/cve/CVE-2021-3701 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1977959 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1977959 | MISC:https://github.com/ansible/ansible-runner/issues/738 | URL:https://github.com/ansible/ansible-runner/issues/738 | MISC:https://github.com/ansible/ansible-runner/pull/742/commits | URL:https://github.com/ansible/ansible-runner/pull/742/commits,Assigned (20210812),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-37010,Candidate,There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the confidentiality of users is affected.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-37011,Candidate,There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-37012,,There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-37013,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the availability of users is affected.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-37014,Candidate,There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to device cannot be used properly.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-37015,Candidate,There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-37016,,There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause Information Disclosure or Denial of Service.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-3@?17,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-37018,Candidate,There is a Data Processing Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-37019,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-3702,andidate,"A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat out of this flaw is to integrity and confidentiality.",MISC:https://access.redhat.com/security/cve/CVE-2021-3702 | URL:https://access.redhat.com/security/cve/CVE-2021-3702 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1977965 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1977965 | MISC:https://github.com/ansible/ansible-runner/pull/742/commits | URL:https://github.com/ansible/ansible-runner/pull/742/commits,Assigned (20210812),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-37020,Candidate,There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-37021,Candidate,There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-37022,Candidate,There is a Heap-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause root permission which can be escalated.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-37023,Candidate,There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause media files which can be reads and writes in non-distributed directories on any device on the network..,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-37024,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-37025,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-37026,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash.,MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965,Assigned (20210720),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-37027,Candidate,There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/7/ | MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/,Assigned (20210720),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-37028,Candidate,"There is a command injection vulnerability in the HG8045Q product. When the command-line interface is enabled, which is disabled by default, attackers with administrator privilege could execute part of commands.",JVN:JVN#41646618 | URL:http://jvn.jp/en/jp/JVN41646618/index.html | MISC:https://support.huawei.com/carrier/navi?coltype=software#col=software&from=product&detailId=PBI1-252279599&path=PBI1-252301455/PBI1-252303293/PBI1-23709862/PBI1-22318696/PBI1-21457383 | URL:https://support.huawei.com/carrier/navi?coltype=software#col=software&from=product&detailId=PBI1-252279599&path=PBI1-252301455/PBI1-252303293/PBI1-23709862/PBI1-22318696/PBI1-21457383,Assigned (20210720),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-37029,Candidate,There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/8/,Assigned (20210720),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-3703,Candidate,"It was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless 1.16.0 and Serverless client kn 1.16.0. These have been fixed with Serverless 1.17.0.",MISC:https://access.redhat.com/security/cve/CVE-2021-3703 | URL:https://access.redhat.com/security/cve/CVE-2021-3703 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1992955 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1992955,Assigned (20210812),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-37030,Can*idate,There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/8/,Assigned (20210720),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-37031,Candidate,There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/8/,Assigned (20210720),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-37032,Candidate,There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/8/,Assigned (20210720),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-37033,Candidate,There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/8/,Assigned (20210720),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-37034,Candidate,There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/8/,Assigned (20210720),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-37035,Candidate,There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/8/,Assigned (20210720),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-37036,Candidate,"There is an information leakage vulnerability in FusionCompute 6.5.1, eCNS280_TD V100R005C00 and V100R005C10. Due to the improperly storage of specific information in the log file, the attacker can obtain the information when a user logs in to the device. Successful exploit may cause the information leak.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210818-01-informationleak-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210818-01-informationleak-en,Assigned (20210720),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-37037,Candidate,There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-37038,Candidate,There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/,Assigned (20210720),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-37039,Candidate,There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 109 |
-
,Candidate,Potential security vulnerabilities have been discovered on a certain HP LaserJet Pro printer that may allow a Denial of Service on the device.,MISC:https://support.hp.com/us-en/document/ish_4411563-4411589-16/hpsbpi03741 | URL:https://support.hp.com/us-en/document/ish_4411563-4411589-16/hpsbpi03741,Assigned (20210813),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-37040,Candidate,There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-37041,Candidate,There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/,Assigned (20210720),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-37042,Candidate,There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/,Assigned (20210720),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-37043,Candidate,There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-37044,,There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-37045,,There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-37046,Candidate,There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/,Assigned (20210720),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-37047,Candidate,There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/,Assigned (20210720),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-37048,Candidate,"There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to fake visitors to control PC,play a video,etc.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-37049,Candidate,There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-3705,Candidate,"Potential security vulnerabilities have been discovered on a certain HP LaserJet Pro printer that may allow an unauthorized user to reconfigure, reset the device.",MISC:https://support.hp.com/us-en/document/ish_4411563-4411589-16/hpsbpi03741 | URL:https://support.hp.com/us-en/document/ish_4411563-4411589-16/hpsbpi03741,Assigned (20210813),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-37050,Candidate,There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 122 |
-
,Candidate,There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-37052,Candidate,There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-37053,,There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1003.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
,Candidate,There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-37055,Candidate,There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/,Assigned (20210720),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-37056,Candidate,There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/9/,Assigned (20210720),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-37057,Candidate,There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to restart the phone.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-37058,Candidate,"There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user's nickname is maliciously tampered with.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-37059,Candidate,There is a Weaknesses Introduced During Design,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-3706,Candidate,adminlte is vulnerable to Sensitive Cookie Without 'HttpOnly' Flag,CONFIRM:https://huntr.dev/bounties/ac7fd77b-b31b-4d02-aebd-f89ecbae3fce | URL:https://huntr.dev/bounties/ac7fd77b-b31b-4d02-aebd-f89ecbae3fce | MISC:https://github.com/pi-hole/adminlte/commit/cf8602eedd4a31eadb72372fc878c12d342f8600 | URL:https://github.com/pi-hole/adminlte/commit/cf8602eedd4a31eadb72372fc878c12d342f8600,Assigned (20210813),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-37060,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to SAMGR Heap Address Leakage.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-37061,Candidate,There is a Uncontrolled Resource Consumption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Screen projection application denial of service.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-37062,Candidate,There is a Improper Validation of Array Index vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory overflow and information leakage.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-37063,Candidate,There is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-37064,Candidate,There is a Improper Limitation of a Pathname to a Restricted Directory vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to arbitrary file created.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-37065,Candidate,There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality or Availability impacted.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-37066,Candidate,There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-37067,Candidate,There is a Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Confidentiality impacted.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-37068,Candidate,There is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-37069,Candidate,There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/11/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/11/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-3707,Candidate,"D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to unauthorized configuration modification. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3708, to execute any OS commands on the vulnerable device.",CONFIRM:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10230 | URL:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10230 | JVN:JVNVU#92088210: Multiple vulnerabilities in D-Link router DSL-2750U | URL:https://jvn.jp/en/vu/JVNVU92088210/ | MISC:https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md | URL:https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md,Assigned (20210815),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-37070,Candidate,There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-37071,Candidate,There is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-37072,,There is a Incorrect Calculation of Buffer Size vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to memory crash.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-37073,Candidate,There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the detection result is tampered with.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-37074,Candidate,There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/11/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/11/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-37075,Candidate,There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-37076,Cndidate,There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-37077,Candidate,There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel crash.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-37078,Canddate,There is a Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote Denial of Service.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-37079,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete arbitrary file by system_app permission.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 30 |
-
CVE-202-3708,Cadidate,"D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to OS command injection. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3707, to execute any OS commands on the vulnerable device.",CONFIRM:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10230 | URL:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10230 | JVN:JVNVU#92088210: Multiple vulnerabilities in D-Link router DSL-2750U | URL:https://jvn.jp/en/vu/JVNVU92088210/ | MISC:https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md | URL:https://github.com/HadiMed/firmware-analysis/blob/main/DSL-2750U%20(firmware%20version%201.6)/README.md,Assigned (20210815),None (candidate not yet proposed),
|
| 31 |
-
CVE-20?@-37080,Candidate,There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-37081,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-37082,Candidate,There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to motionhub crash.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-37083,Candidate,There is a NULL Pointer Dereference vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Denial of Service Attacks.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-37084,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious invoking other functions of the Smart Assistant through text messages.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-37085,Candidate,There is a Encoding timing vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of service.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-37086,Candidate,There is a Improper Preservation of Permissions vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers which can isolate and read synchronization files of other applications across the UID sandbox.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-37087,Candidate,There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can create arbitrary file.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-37088,,There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers can write any content to any file.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-37089,Candidate,There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to kernel restart.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-3709,Candidate,Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;,MISC:https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1934308 | URL:https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1934308 | MISC:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3709 | URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3709 | MISC:https://ubuntu.com/security/notices/USN-5077-1 | URL:https://ubuntu.com/security/notices/USN-5077-1 | MISC:https://ubuntu.com/security/notices/USN-5077-2 | URL:https://ubuntu.com/security/notices/USN-5077-2,Assigned (20210816),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-37090,Candidate,There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to process crash.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-37091,Cand*date,"There is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-37092,Candidate,There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 45 |
-
CVE-2$21-37093,Candidate,There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-37094,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system denial of service.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-37095,Candidate,There is a Integer Overflow or Wraparound vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to remote denial of service and potential remote code execution.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-37096,Candidate,There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to user privacy disclosed.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-37097,,There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 50 |
-
CVE2021-37098,Candidate,Hilinksvc service exists a Data Processing Errors vulnerability .Successful exploitation of this vulnerability may cause application crash.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-37099,Candidate,There is a Path Traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to delete any file.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-3710,Candidate,An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;,MISC:https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832 | URL:https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1933832 | MISC:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710 | URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3710 | MISC:https://ubuntu.com/security/notices/USN-5077-1 | URL:https://ubuntu.com/security/notices/USN-5077-1 | MISC:https://ubuntu.com/security/notices/USN-5077-2 | URL:https://ubuntu.com/security/notices/USN-5077-2,Assigned (20210816),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-37100,Candidate,There is a Improper Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to account authentication bypassed.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727,Assigned (20210720),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-37101,Candidate,"There is an improper authorization vulnerability in AIS-BW50-00 9.0.6.2(H100SP10C00) and 9.0.6.2(H100SP15C00). Due to improper authorization mangement, an attakcer can exploit this vulnerability by physical accessing the device and implant malicious code. Successfully exploit could leads to arbitrary code execution in the target device.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210908-01-badauthorization-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210908-01-badauthorization-en,Assigned (20210720),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-37102,Candidate,"There is a command injection vulnerability in CMA service module of FusionCompute product when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system. Affected product versions include: FusionCompute 6.0.0, 6.3.0, 6.3.1, 6.5.0, 6.5.1, 8.0.0.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-cmd-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-cmd-en,Assigned (20210720),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-37103,Canddate,There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/,Assigned (20210720),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-37104,Candidate,There is a server-side request forgery vulnerability in HUAWEI P40 versions 10.1.0.118(C00E116R3P3). This vulnerability is due to insufficient validation of parameters while dealing with some messages. A successful exploit could allow the attacker to gain access to certain resource which the attacker are supposed not to do.,MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-ssrf-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-ssrf-en,Assigned (20210720),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-37105,Candidate,"There is an improper file upload control vulnerability in FusionCompute 6.5.0, 6.5.1 and 8.0.0. Due to the improper verification of file to be uploaded and does not strictly restrict the file access path, attackers may upload malicious files to the device, resulting in the service abnormal.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-upload-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-upload-en,Assigned (20210720),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-37106,Candidate,"There is a command injection vulnerability in CMA service module of FusionCompute 6.3.0, 6.3.1, 6.5.0 and 8.0.0 when processing the default certificate file. The software constructs part of a command using external special input from users, but the software does not sufficiently validate the user input. Successful exploit could allow the attacker to inject certain commands to the system.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-commandinjection-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210922-01-commandinjection-en,Assigned (20210720),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-37107,Candidate,There is an improper memory access permission configuration on ACPU.Successful exploitation of this vulnerability may cause out-of-bounds access.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/,Assigned (20210720),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-37108,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210720),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-37109,,There is a security protection bypass vulnerability with the modem.Successful exploitation of this vulnerability may cause memory protection failure.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/,Assigned (20210720),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-3711,Candidate,"In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the ""out"" parameter can be NULL and, on exit, the ""outlen"" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the ""out"" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | CONFIRM:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 | URL:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46 | CONFIRM:https://security.netapp.com/advisory/ntap-20210827-0010/ | URL:https://security.netapp.com/advisory/ntap-20210827-0010/ | CONFIRM:https://security.netapp.com/advisory/ntap-20211022-0003/ | URL:https://security.netapp.com/advisory/ntap-20211022-0003/ | CONFIRM:https://www.openssl.org/news/secadv/20210824.txt | URL:https://www.openssl.org/news/secadv/20210824.txt | CONFIRM:https://www.tenable.com/security/tns-2021-16 | URL:https://www.tenable.com/security/tns-2021-16 | CONFIRM:https://www.tenable.com/security/tns-2022-02 | URL:https://www.tenable.com/security/tns-2022-02 | DEBIAN:DSA-4963 | URL:https://www.debian.org/security/2021/dsa-4963 | GENTOO:GLSA-202209-02 | URL:https://security.gentoo.org/glsa/202209-02 | GENTOO:GLSA-202210-02 | URL:https://security.gentoo.org/glsa/202210-02 | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpuoct2021.html | URL:https://www.oracle.com/security-alerts/cpuoct2021.html | MLIST:[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712) | URL:http://www.openwall.com/lists/oss-security/2021/08/26/2 | MLIST:[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release? | URL:https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E | MLIST:[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release? | URL:https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E",Assigned (20210816),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-37110,Candidate,There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/11/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/11/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-37111,Candidate,There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-37112,Candidate,Hisuite module has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability may lead to Firmware leak.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210720),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-37113,Candidate,There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 68 |
-
,Candidate,There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-37115,Candidate,There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/,Assigned (20210720),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-37116,Candidate,PCManager has a Weaknesses Introduced During Design vulnerability .Successful exploitation of this vulnerability may cause that the PIN of the subscriber is changed.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-37117,Candidate,There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-37118,Candidate,The HwNearbyMain module has a Improper Handling of Exceptional Conditions vulnerability.Successful exploitation of this vulnerability may lead to message leak.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210720),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-37119,Candidate,There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-3712,Candidate,"ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own ""d2i"" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the ""data"" and ""length"" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the ""data"" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf | CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf | CONFIRM:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11 | URL:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11 | CONFIRM:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 | URL:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 | CONFIRM:https://kc.mcafee.com/corporate/index?page=content&id=SB10366 | URL:https://kc.mcafee.com/corporate/index?page=content&id=SB10366 | CONFIRM:https://security.netapp.com/advisory/ntap-20210827-0010/ | URL:https://security.netapp.com/advisory/ntap-20210827-0010/ | CONFIRM:https://www.openssl.org/news/secadv/20210824.txt | URL:https://www.openssl.org/news/secadv/20210824.txt | CONFIRM:https://www.tenable.com/security/tns-2021-16 | URL:https://www.tenable.com/security/tns-2021-16 | CONFIRM:https://www.tenable.com/security/tns-2022-02 | URL:https://www.tenable.com/security/tns-2022-02 | DEBIAN:DSA-4963 | URL:https://www.debian.org/security/2021/dsa-4963 | GENTOO:GLSA-202209-02 | URL:https://security.gentoo.org/glsa/202209-02 | GENTOO:GLSA-202210-02 | URL:https://security.gentoo.org/glsa/202210-02 | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpuoct2021.html | URL:https://www.oracle.com/security-alerts/cpuoct2021.html | MLIST:[debian-lts-announce] 20210926 [SECURITY] [DLA 2766-1] openssl security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html | MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2774-1] openssl1.0 security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html | MLIST:[oss-security] 20210825 OpenSSL SM2 Decryption Buffer Overflow (CVE-2021-3711), Read buffer overruns processing ASN.1 strings (CVE-2021-3712) | URL:http://www.openwall.com/lists/oss-security/2021/08/26/2 | MLIST:[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release? | URL:https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E | MLIST:[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release? | URL:https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E",Assigned (20210816),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-37120,Candidate,There is a Double free vulnerability in Smartphone.Successful exploitation of this vulnerability may cause a kernel crash or privilege escalation.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/,Assigned (20210720),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-37121,Candidate,There is a Configuration defects in Smartphone.Successful exploitation of this vulnerability may elevate the MEID (IMEI) permission.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/10/,Assigned (20210720),None (candidate not yet proposed),
|
| 77 |
-
CV@E-2@021-3!7122,Candidate,"There is a use-after-free (UAF) vulnerability in Huawei products. An attacker may craft specific packets to exploit this vulnerability. Successful exploitation may cause the service abnormal. Affected product versions include:CloudEngine 12800 V200R005C10SPC800,V200R019C00SPC800;CloudEngine 5800 V200R005C10SPC800,V200R019C00SPC800;CloudEngine 6800 V200R005C10SPC800,V200R005C20SPC800,V200R019C00SPC800;CloudEngine 7800 V200R005C10SPC800,V200R019C00SPC800.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211008-01-cloudengine-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211008-01-cloudengine-en,Assigned (20210720),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-37123,Candidate,"There is an improper authentication vulnerability in Hero-CT060 before 1.0.0.200. The vulnerability is due to that when an user wants to do certain operation, the software does not insufficiently validate the user's identity. Successful exploit could allow the attacker to do certain operations which the user are supposed not to do.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210929-01-auth-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210929-01-auth-en,Assigned (20210720),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-37124,Candidate,"There is a path traversal vulnerability in Huawei PC product. Because the product does not filter path with special characters,attackers can construct a file path with special characters to exploit this vulnerability. Successful exploitation could allow the attacker to transport a file to certain path.Affected product versions include:PC Smart Full Scene 11.1 versions PCManager 11.1.1.97.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211008-01-share-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211008-01-share-en,Assigned (20210720),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-37125,Candidate,Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause confidentiality is affected.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-37126,Candidate,Arbitrary file has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability .Successful exploitation of this vulnerability may cause the directory is traversed.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-37127,Candidate,"There is a signature management vulnerability in some huawei products. An attacker can forge signature and bypass the signature check. During firmware update process, successful exploit this vulnerability can cause the forged system file overwrite the correct system file. Affected product versions include:iManager NetEco V600R010C00CP2001,V600R010C00CP2002,V600R010C00SPC100,V600R010C00SPC110,V600R010C00SPC120,V600R010C00SPC200,V600R010C00SPC210,V600R010C00SPC300;iManager NetEco 6000 V600R009C00SPC100,V600R009C00SPC110,V600R009C00SPC120,V600R009C00SPC190,V600R009C00SPC200,V600R009C00SPC201,V600R009C00SPC202,V600R009C00SPC210.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-signature-en,Assigned (20210720),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-37128,Candidate,HwPCAssistant has a Path Traversal vulnerability .Successful exploitation of this vulnerability may write any file.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-37129,Candidate,"There is an out of bounds write vulnerability in some Huawei products. The vulnerability is caused by a function of a module that does not properly verify input parameter. Successful exploit could cause out of bounds write leading to a denial of service condition.Affected product versions include:IPS Module V500R005C00,V500R005C20;NGFW Module V500R005C00;NIP6600 V500R005C00,V500R005C20;S12700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600,V200R013C00SPC500,V200R019C00SPC200,V200R019C00SPC500,V200R019C10SPC200,V200R020C00,V200R020C10;S1700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S2700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S5700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600,V200R019C00SPC500;S6700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;S7700 V200R010C00SPC600,V200R010C00SPC700,V200R011C10SPC500,V200R011C10SPC600;S9700 V200R010C00SPC600,V200R011C10SPC500,V200R011C10SPC600;USG9500 V500R005C00,V500R005C20.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-outofwrite-en,Assigned (20210720),None (candidate not yet proposed),
|
| 85 |
-
,Candidate,"An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.",CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0006/ | DEBIAN:DSA-4980 | URL:https://www.debian.org/security/2021/dsa-4980 | GENTOO:GLSA-202208-27 | URL:https://security.gentoo.org/glsa/202208-27 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1994640 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1994640 | MLIST:[debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html | MLIST:[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update | URL:https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html,Assigned (20210817),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-37130,Candidate,"There is a path traversal vulnerability in Huawei FusionCube 6.0.2.The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-pathtraversal-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-pathtraversal-en,Assigned (20210720),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-37131,Candidate,"There is a CSV injection vulnerability in ManageOne, iManager NetEco and iManager NetEco 6000. An attacker with high privilege may exploit this vulnerability through some operations to inject the CSV files. Due to insufficient input validation of some parameters, the attacker can exploit this vulnerability to inject CSV files to the target device.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-csv-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-csv-en,Assigned (20210720),None (candidate not yet proposed),
|
| 88 |
-
,C*n#idate,"PackageManagerService has a Permissions, Privileges, and Access Controls vulnerability .Successful exploitation of this vulnerability may cause that Third-party apps can obtain the complete list of Harmony apps without permission.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-37133,$C#and|idate,There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/11/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/11/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210720),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-37134,Candidate,Location-related APIs exists a Race Condition vulnerability.Successful exploitation of this vulnerability may use Higher Permissions for invoking the interface of location-related components.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210720),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-37135,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210720),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-37136,Candidate,The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack,CONFIRM:https://security.netapp.com/advisory/ntap-20220210-0012/ | URL:https://security.netapp.com/advisory/ntap-20220210-0012/ | DEBIAN:DSA-5316 | URL:https://www.debian.org/security/2023/dsa-5316 | MISC:https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv | URL:https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update | URL:https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html | MLIST:[druid-commits] 20211025 [GitHub] [druid] a2l007 commented on pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211025 [GitHub] [druid] jihoonson commented on pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211025 [GitHub] [druid] jihoonson opened a new pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211026 [GitHub] [druid] clintropolis merged pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211026 [GitHub] [druid] jihoonson commented on pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E | MLIST:[tinkerpop-dev] 20211025 [jira] [Created] (TINKERPOP-2632) Netty 4.1.61 flagged with two high severity security violations | URL:https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E,Assigned (20210720),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-37137,Candidate,The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk.,CONFIRM:https://security.netapp.com/advisory/ntap-20220210-0012/ | URL:https://security.netapp.com/advisory/ntap-20220210-0012/ | DEBIAN:DSA-5316 | URL:https://www.debian.org/security/2023/dsa-5316 | MISC:https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363 | URL:https://github.com/netty/netty/security/advisories/GHSA-9vjp-v76f-g363 | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[debian-lts-announce] 20230111 [SECURITY] [DLA 3268-1] netty security update | URL:https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html | MLIST:[druid-commits] 20211025 [GitHub] [druid] a2l007 commented on pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211025 [GitHub] [druid] jihoonson commented on pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211025 [GitHub] [druid] jihoonson opened a new pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211026 [GitHub] [druid] clintropolis merged pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211026 [GitHub] [druid] jihoonson commented on pull request #11844: Bump netty4 to 4.1.68; suppress CVE-2021-37136 and CVE-2021-37137 for netty3 | URL:https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E | MLIST:[tinkerpop-dev] 20211025 [jira] [Created] (TINKERPOP-2632) Netty 4.1.61 flagged with two high severity security violations | URL:https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E,Assigned (20210720),None (candidate not yet proposed),
|
| 94 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210720),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-37139,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210720),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-3714,Candidate,A flaw was found in the Linux kernels memory deduplication mechanism. Previous work has shown that memory deduplication can be attacked via a local exploitation mechanism. The same technique can be used if an attacker can upload page sized files and detect the change in access time from a networked service to determine if the page has been merged.,MISC:https://access.redhat.com/security/cve/CVE-2021-3714 | URL:https://access.redhat.com/security/cve/CVE-2021-3714 | MISC:https://arxiv.org/abs/2111.08553 | URL:https://arxiv.org/abs/2111.08553 | MISC:https://arxiv.org/pdf/2111.08553.pdf | URL:https://arxiv.org/pdf/2111.08553.pdf | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1931327 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1931327,Assigned (20210818),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-37140,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210720),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-37141,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210720),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-37142,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210720),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-37143,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-37144,,"CSZ CMS 1.2.9 is vulnerable to Arbitrary File Deletion. This occurs in PHP when the unlink() function is called and user input might affect portions of or the whole affected parameter, which represents the path of the file to remove, without sufficient sanitization.",MISC:https://github.com/cskaza/cszcms/issues/32,Assigned (20210721),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-37145,Candidate,** UNSUPPORTED WHEN ASSIGNED ** A command-injection vulnerability in an authenticated Telnet connection in Poly (formerly Polycom) CX5500 and CX5100 1.3.5 leads an attacker to Privilege Escalation and Remote Code Execution capability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.,CONFIRM:https://support.polycom.com/content/dam/polycom-support/global/documentation/security-bulletin-cx5100-cx5500-authenticated-v1-0.pdf | MISC:https://support.polycom.com/content/support.html,Assigned (20210721),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-37146,Candidate,An infinite loop in Open Robotics ros_comm XMLRPC server in ROS Melodic through 1.4.11 and ROS Noetic through1.15.11 allows remote attackers to cause a Denial of Service in ros_comm via a crafted XMLRPC call.,MISC:https://discourse.ros.org/t/new-packages-for-melodic-2021-09-27/22446 | MISC:https://discourse.ros.org/t/new-packages-for-noetic-2021-09-27/22447 | MISC:https://github.com/ros/ros_comm,Assigned (20210721),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-37147,Candidate,Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.,DEBIAN:DSA-5153 | URL:https://www.debian.org/security/2022/dsa-5153 | MISC:https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164 | URL:https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164,Assigned (20210721),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-37148,Candidate,Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.0.1.,DEBIAN:DSA-5153 | URL:https://www.debian.org/security/2022/dsa-5153 | MISC:https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164 | URL:https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164,Assigned (20210721),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-37149,Candidate,Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.,DEBIAN:DSA-5153 | URL:https://www.debian.org/security/2022/dsa-5153 | MISC:https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164 | URL:https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164,Assigned (20210721),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-3715,Candidate,"A flaw was found in the ""Routing decision"" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359 | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359,Assigned (20210818),None (candidate not yet proposed),
|
| 108 |
-
,Candidate,Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to request secure resources. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.,DEBIAN:DSA-5206 | URL:https://www.debian.org/security/2022/dsa-5206 | FEDORA:FEDORA-2022-23043f5a0b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCSBQBYPOZSWS5LCOAQ6LJLRLXFIAW5A/ | FEDORA:FEDORA-2022-9832c0c04b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CJ67IWD5PRJUOIYIDJRUG3UMS2UF4X4J/ | MISC:https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21 | URL:https://lists.apache.org/thread/rc64lwbdgrkv674koc3zl1sljr9vwg21 | MLIST:[debian-lts-announce] 20230123 [SECURITY] [DLA 3279-1] trafficserver security update | URL:https://lists.debian.org/debian-lts-announce/2023/01/msg00019.html,Assigned (20210721),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-37151,Candidate,"CyberArk Identity 21.5.131, when handling an invalid authentication attempt, sometimes reveals whether the username is valid. In certain authentication policy configurations with MFA, the API response length can be used to differentiate between a valid user and an invalid one (aka Username Enumeration). Response differentiation enables attackers to enumerate usernames of valid application users. Attackers can use this information to leverage brute-force and dictionary attacks in order to discover valid account information such as passwords.",MISC:https://www.cyberark.com/products/ | MISC:https://www.gov.il/en/departments/faq/cve_advisories,Assigned (20210721),None (candidate not yet proposed),
|
| 110 |
-
CV-2021-37152,Candidate,Multiple XSS issues exist in Sonatype Nexus Repository Manager 3 before 3.33.0. An authenticated attacker with the ability to add HTML files to a repository could redirect users to Nexus Repository Manager’s pages with code modifications.,MISC:https://support.sonatype.com | MISC:https://support.sonatype.com/hc/en-us/articles/4404115639827,Assigned (20210721),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-37153,Candidate,"ForgeRock Access Management (AM) before 7.0.2, when configured with Active Directory as the Identity Store, has an authentication-bypass issue.",CONFIRM:https://backstage.forgerock.com/knowledge/kb/article/a55763454 | MISC:https://www.forgerock.com/platform/access-management,Assigned (20210721),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-37154,Candidate,"In ForgeRock Access Management (AM) before 7.0.2, the SAML2 implementation allows XML injection, potentially enabling a fraudulent SAML 2.0 assertion.",CONFIRM:https://backstage.forgerock.com/knowledge/kb/article/a55763454 | MISC:https://www.forgerock.com/platform/access-management,Assigned (20210721),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-37155,Candidate,wolfSSL 4.6.x through 4.7.x before 4.8.0 does not produce a failure outcome when the serial number in an OCSP request differs from the serial number in the OCSP response.,MISC:https://github.com/wolfSSL/wolfssl/pull/3990 | MISC:https://github.com/wolfSSL/wolfssl/releases/tag/v4.8.0-stable,Assigned (20210721),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-37156,Candidate,"Redmine 4.2.0 and 4.2.1 allow existing user sessions to continue upon enabling two-factor authentication for the user's account, but the intended behavior is for those sessions to be terminated.",MISC:https://www.redmine.org/news/132 | MISC:https://www.redmine.org/projects/redmine/wiki/Security_Advisories,Assigned (20210721),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-37157,Candidate,An issue was discovered in OpenGamePanel OGP-Agent-Linux through 2021-08-14. $HOME/OGP/Cfg/Config.pm has the root password in cleartext.,MISC:https://github.com/OpenGamePanel/OGP-Agent-Linux/commits/master | MISC:https://www.exploit-db.com/exploits/50373,Assigned (20210721),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-37158,Candidate,An issue was discovered in OpenGamePanel OGP-Agent-Linux through 2021-08-14. An authenticated attacker could inject OS commands by starting a Counter-Strike server and using the map field to enter a Bash command.,MISC:https://github.com/OpenGamePanel/OGP-Website/pull/561 | MISC:https://www.exploit-db.com/exploits/50373,Assigned (20210721),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-37159,Candidate,"hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",CONFIRM:https://security.netapp.com/advisory/ntap-20210819-0003/ | URL:https://security.netapp.com/advisory/ntap-20210819-0003/ | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MISC:https://www.spinics.net/lists/linux-usb/msg202228.html | URL:https://www.spinics.net/lists/linux-usb/msg202228.html | MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html,Assigned (20210721),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-3716,Candidate,"A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1994695 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1994695 | MISC:https://gitlab.com/nbdkit/nbdkit/-/commit/09a13dafb7bb3a38ab52eb5501cba786365ba7fd | URL:https://gitlab.com/nbdkit/nbdkit/-/commit/09a13dafb7bb3a38ab52eb5501cba786365ba7fd | MISC:https://gitlab.com/nbdkit/nbdkit/-/commit/6c5faac6a37077cf2366388a80862bb00616d0d8 | URL:https://gitlab.com/nbdkit/nbdkit/-/commit/6c5faac6a37077cf2366388a80862bb00616d0d8 | MISC:https://listman.redhat.com/archives/libguestfs/2021-August/msg00083.html | URL:https://listman.redhat.com/archives/libguestfs/2021-August/msg00083.html | MISC:https://www.openwall.com/lists/oss-security/2021/08/18/2 | URL:https://www.openwall.com/lists/oss-security/2021/08/18/2,Assigned (20210818),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-37160,Candidate,"A firmware validation issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. There is no firmware validation (e.g., cryptographic signature validation) during a File Upload for a firmware update.","MISC:https://www.armis.com/PwnedPiper | MISC:https://www.swisslog-healthcare.com | MISC:https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37160-bulletin---no-firmware-update-validation.pdf?rev=c7f94647037c4007992e2e626d445561&hash=E89531490070A809FB74994018BA1248 | MISC:https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20,%20%20CVE-2021-37164%20%204%20more%20rows%20",Assigned (20210721),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-37161,Candidate,"A buffer overflow issue was discovered in the HMI3 Control Panel contained within the Swisslog Healthcare Nexus Panel, operated by released versions of software before Nexus Software 7.2.5.7. A buffer overflow allows an attacker to overwrite an internal queue data structure and can lead to remote code execution.","MISC:https://www.armis.com/PwnedPiper | MISC:https://www.swisslog-healthcare.com | MISC:https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37161-bulletin---underflow-in-udprxthread.pdf?rev=9395dad86d0b4811ae4a9e37f0568c2e&hash=3D8571C7A3DCC8B7D8DCB89C2DA4BB8D | MISC:https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20,%20%20CVE-2021-37164%20%204%20more%20rows%20",Assigned (20210721),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-37162,Candidate,"A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. If an attacker sends a malformed UDP message, a buffer underflow occurs, leading to an out-of-bounds copy and possible remote code execution.","MISC:https://www.armis.com/PwnedPiper | MISC:https://www.swisslog-healthcare.com | MISC:https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37162-bulletin---overflow-in-sccprocessmsg.pdf?rev=55a2a1d76199435688a8479970fc54bf&hash=4FDAB2F0EB319F0B773500669D67F3AD | MISC:https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20,%20%20CVE-2021-37164%20%204%20more%20rows%20",Assigned (20210721),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-37163,Candidate,An insecure permissions issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus operated by released versions of software before Nexus Software 7.2.5.7. The device has two user accounts with passwords that are hardcoded.,"MISC:https://www.armis.com/PwnedPiper | MISC:https://www.swisslog-healthcare.com | MISC:https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37163-bulletin---default-credentials-for-the-telnet-server.pdf?rev=da64c389a475494985b9fd2c2c508542&hash=466A7109AF08EBFF3756B2C25968ED5E | MISC:https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20,%20%20CVE-2021-37164%20%204%20more%20rows%20",Assigned (20210721),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-37164,Candidate,"A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. In the tcpTxThread function, the received data is copied to a stack buffer. An off-by-3 condition can occur, resulting in a stack-based buffer overflow.","MISC:https://www.armis.com/PwnedPiper | MISC:https://www.swisslog-healthcare.com | MISC:https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37164-bulletin---off-by-three-stack-overflow-in-tcptxthread.pdf?rev=daf615075c71484c8059c906872a51e6&hash=1FCC1A5D921E231D71E6B95A9AA8B741 | MISC:https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20,%20%20CVE-2021-37164%20%204%20more%20rows%20",Assigned (20210721),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-37165,Candidate,"A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. When a message is sent to the HMI TCP socket, it is forwarded to the hmiProcessMsg function through the pendingQ, and may lead to remote code execution.","MISC:https://www.armis.com/PwnedPiper | MISC:https://www.swisslog-healthcare.com | MISC:https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37165-bulletin---overflow-in-hmiprocessmsg.pdf?rev=2e2678dab62b41ba999cd6d1e03974ca&hash=F465ACE2C7FAED826B52FE996E36ACEC | MISC:https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20,%20%20CVE-2021-37164%20%204%20more%20rows%20",Assigned (20210721),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1004.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-37166,Candidate,"A buffer overflow issue leading to denial of service was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. When HMI3 starts up, it binds a local service to a TCP port on all interfaces of the device, and takes extensive time for the GUI to connect to the TCP socket, allowing the connection to be hijacked by an external attacker.","MISC:https://www.armis.com/PwnedPiper | MISC:https://www.swisslog-healthcare.com | MISC:https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37166-bulletin---gui-socket-denial-of-service.pdf?rev=05321b2af1064eb2a6d6e6bf77604c6b&hash=40A927FE1153AA980428C93B2EF7EB40 | MISC:https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20,%20%20CVE-2021-37164%20%204%20more%20rows%20",Assigned (20210721),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-37167,Candidate,"An insecure permissions issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus Panel operated by released versions of software before Nexus Software 7.2.5.7. A user logged in using the default credentials can gain root access to the device, which provides permissions for all of the functionality of the device.","MISC:https://www.armis.com/PwnedPiper | MISC:https://www.swisslog-healthcare.com | MISC:https://www.swisslog-healthcare.com/-/media/swisslog-healthcare/documents/customer-service/armis-documents/cve-2021-37167-bulletin---privilege-escalation.pdf?rev=20c909e5f00048838620b52471f266fc&hash=F43731C7A882EEBB5CE28DFBC75933D3 | MISC:https://www.swisslog-healthcare.com/en-us/customer-care/security-information/cve-disclosures#:~:text=CVE%20Disclosures%20%20%20%20Vulnerability%20Name%20,%20%20CVE-2021-37164%20%204%20more%20rows%20",Assigned (20210721),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-37168,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-37169,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-3717,Candidate,"A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability. This flaw affects wildfly-core versions prior to 17.0.",CONFIRM:https://security.netapp.com/advisory/ntap-20220804-0002/ | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1991305 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1991305,Assigned (20210818),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-37170,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-37171,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 9 |
-
,Candidate,A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (V4.5.0). Affected devices fail to authenticate against configured passwords when provisioned using TIA Portal V13. This could allow an attacker using TIA Portal V13 or later versions to bypass authentication and download arbitrary programs to the PLC. The vulnerability does not occur when TIA Portal V13 SP1 or any later version was used to provision the device.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-830194.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-830194.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-37173,Candidate,"A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.14.1), RUGGEDCOM ROX RX1400 (All versions < V2.14.1), RUGGEDCOM ROX RX1500 (All versions < V2.14.1), RUGGEDCOM ROX RX1501 (All versions < V2.14.1), RUGGEDCOM ROX RX1510 (All versions < V2.14.1), RUGGEDCOM ROX RX1511 (All versions < V2.14.1), RUGGEDCOM ROX RX1512 (All versions < V2.14.1), RUGGEDCOM ROX RX1524 (All versions < V2.14.1), RUGGEDCOM ROX RX1536 (All versions < V2.14.1), RUGGEDCOM ROX RX5000 (All versions < V2.14.1). The command line interface of affected devices insufficiently restrict file read and write operations for low privileged users. This could allow an authenticated remote attacker to escalate privileges and gain root access to the device.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-150692.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-150692.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-37174,Candidate,"A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.14.1), RUGGEDCOM ROX RX1400 (All versions < V2.14.1), RUGGEDCOM ROX RX1500 (All versions < V2.14.1), RUGGEDCOM ROX RX1501 (All versions < V2.14.1), RUGGEDCOM ROX RX1510 (All versions < V2.14.1), RUGGEDCOM ROX RX1511 (All versions < V2.14.1), RUGGEDCOM ROX RX1512 (All versions < V2.14.1), RUGGEDCOM ROX RX1524 (All versions < V2.14.1), RUGGEDCOM ROX RX1536 (All versions < V2.14.1), RUGGEDCOM ROX RX5000 (All versions < V2.14.1). The affected devices have a privilege escalation vulnerability, if exploited, an attacker could gain root user access.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-150692.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-150692.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-37175,Candidate,"A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.14.1), RUGGEDCOM ROX RX1400 (All versions < V2.14.1), RUGGEDCOM ROX RX1500 (All versions < V2.14.1), RUGGEDCOM ROX RX1501 (All versions < V2.14.1), RUGGEDCOM ROX RX1510 (All versions < V2.14.1), RUGGEDCOM ROX RX1511 (All versions < V2.14.1), RUGGEDCOM ROX RX1512 (All versions < V2.14.1), RUGGEDCOM ROX RX1524 (All versions < V2.14.1), RUGGEDCOM ROX RX1536 (All versions < V2.14.1), RUGGEDCOM ROX RX5000 (All versions < V2.14.1). The affected devices do not properly handle permissions to traverse the file system. If exploited, an attacker could gain access to an overview of the complete file system on the affected devices.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-150692.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-150692.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-37176,Candidate,"A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). The femap.exe application lacks proper validation of user-supplied data when parsing modfem files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-14260)",MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1073/ | MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-997732.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-997732.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-37177,$Can*#didate%,A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The status provided by the syslog clients managed by the affected software can be manipulated by an unauthenticated attacker in the same network of the affected system.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 15 |
-
CVE2021-37178,Candidate,A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). An XML external entity injection vulnerability in the underlying XML parser could cause the affected application to disclose arbitrary files to remote attackers by loading a specially crafted xml file.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-37179,Candidate,A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). The PSKERNEL.dll library in affected application lacks proper validation while parsing user-supplied OBJ files that could lead to a use-after-free condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13777),MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1114/ | MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-3718,Candidate,A denial of service vulnerability was reported in some ThinkPad models that could cause a system to crash when the Enhanced Biometrics setting is enabled in BIOS.,MISC:https://support.lenovo.com/us/en/product_security/LEN-72619 | URL:https://support.lenovo.com/us/en/product_security/LEN-72619,Assigned (20210818),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-37180,Candidate,A vulnerability has been identified in Solid Edge SE2021 (All Versions < SE2021MP7). The PSKERNEL.dll library lacks proper validation while parsing user-supplied OBJ files that could cause an out of bounds access to an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13775),MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1113/ | MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-818688.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-37181,Candidate,"A vulnerability has been identified in Cerberus DMS V4.0 (All versions), Cerberus DMS V4.1 (All versions), Cerberus DMS V4.2 (All versions), Cerberus DMS V5.0 (All versions < v5.0 QU1), Desigo CC Compact V4.0 (All versions), Desigo CC Compact V4.1 (All versions), Desigo CC Compact V4.2 (All versions), Desigo CC Compact V5.0 (All versions < V5.0 QU1), Desigo CC V4.0 (All versions), Desigo CC V4.1 (All versions), Desigo CC V4.2 (All versions), Desigo CC V5.0 (All versions < V5.0 QU1). The application deserialises untrusted data without sufficient validations, that could result in an arbitrary deserialization. This could allow an unauthenticated attacker to execute code in the affected system. The CCOM communication component used for Windows App / Click-Once and IE Web / XBAP client connectivity are affected by the vulnerability.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-453715.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-453715.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-37182,Candidate,"A vulnerability has been identified in SCALANCE XM408-4C (All versions < V6.5), SCALANCE XM408-4C (L3 int.) (All versions < V6.5), SCALANCE XM408-8C (All versions < V6.5), SCALANCE XM408-8C (L3 int.) (All versions < V6.5), SCALANCE XM416-4C (All versions < V6.5), SCALANCE XM416-4C (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 1x230V (All versions < V6.5), SCALANCE XR524-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 24V (All versions < V6.5), SCALANCE XR524-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR524-8C, 2x230V (All versions < V6.5), SCALANCE XR524-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 1x230V (All versions < V6.5), SCALANCE XR526-8C, 1x230V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 24V (All versions < V6.5), SCALANCE XR526-8C, 24V (L3 int.) (All versions < V6.5), SCALANCE XR526-8C, 2x230V (All versions < V6.5), SCALANCE XR526-8C, 2x230V (L3 int.) (All versions < V6.5), SCALANCE XR528-6M (All versions < V6.5), SCALANCE XR528-6M (2HR2) (All versions < V6.5), SCALANCE XR528-6M (2HR2, L3 int.) (All versions < V6.5), SCALANCE XR528-6M (L3 int.) (All versions < V6.5), SCALANCE XR552-12M (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2) (All versions < V6.5), SCALANCE XR552-12M (2HR2, L3 int.) (All versions < V6.5). The OSPF protocol implementation in affected devices fails to verify the checksum and length fields in the OSPF LS Update messages. An unauthenticated remote attacker could exploit this vulnerability to cause interruptions in the network by sending specially crafted OSPF packets. Successful exploitation requires OSPF to be enabled on an affected device.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-145224.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-145224.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-37183,Candidate,A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software allows sending send-to-sleep notifications to the managed devices. An unauthenticated attacker in the same network of the affected system can abuse these notifications to cause a Denial-of-Service condition in the managed devices.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-37184,Candidate,A vulnerability has been identified in Industrial Edge Management (All versions < V1.3). An unauthenticated attacker could change the the password of any user in the system under certain circumstances. With this an attacker could impersonate any valid user on an affected system.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-692317.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-692317.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-37185,Candidate,"A vulnerability has been identified in SIMATIC Drive Controller family (All versions >= V2.9.2 < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions >= V21.9 < V21.9.4), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions >= V21.9 < V21.9.4), SIMATIC S7-PLCSIM Advanced (All versions >= V4.0 < V4.0 SP1), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over port 102/tcp. A restart of the affected device is needed to restore normal operations.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-838121.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-838121.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 24 |
-
,Candidate,"A vulnerability has been identified in LOGO! CMR2020 (All versions < V2.2), LOGO! CMR2040 (All versions < V2.2), SIMATIC RTU3010C (All versions < V4.0.9), SIMATIC RTU3030C (All versions < V4.0.9), SIMATIC RTU3031C (All versions < V4.0.9), SIMATIC RTU3041C (All versions < V4.0.9). The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection and gain access to sensitive information.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-316383.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-37187,Candidate,"An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may read a password file (with reversible passwords) from the device, which allows decoding of other users' passwords.",MISC:https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-04.txt | MISC:https://www.digi.com/search/results?q=transport,Assigned (20210721),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-37188,Candidate,"An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may load customized firmware (because the bootloader does not verify that it is authentic), changing the behavior of the gateway.",MISC:https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-04.txt | MISC:https://www.digi.com/search/results?q=transport,Assigned (20210721),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-37189,Candidate,"An issue was discovered on Digi TransPort Gateway devices through 5.2.13.4. They do not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in cleartext over an HTTP session.",MISC:https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-04.txt | MISC:https://www.digi.com/search/results?q=transport,Assigned (20210721),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-3719,Candidate,A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code.,MISC:https://support.lenovo.com/us/en/product_security/LEN-67440 | URL:https://support.lenovo.com/us/en/product_security/LEN-67440,Assigned (20210818),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-37190,Candidate,A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software has an information disclosure vulnerability that could allow an attacker to retrieve VPN connection for a known user.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 30 |
-
CVE2021-37191,Candidate,A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). An unauthenticated attacker in the same network of the affected system could brute force the usernames from the affected software.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-37192,,A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). The affected software has an information disclosure vulnerability that could allow an attacker to retrieve a list of network devices a known user can manage.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-37193,Candidate,A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.0 SP2). An unauthenticated attacker in the same network of the affected system could manipulate certain parameters and set a valid user of the affected software as invalid (or vice-versa).,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-334944.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-37194,Candidate,"A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS allows to upload and store arbitrary files at the webserver. This could allow an attacker to store malicious files.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-37195,Candidate,"A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-37196,Candidate,"A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.3 (All versions >= V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS unpacks specially crafted archive files to relative paths. This vulnerability could allow an attacker to store files in any folder accessible by the COMOS Web webservice.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-37197,Cndidate,"A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS is vulnerable to SQL injections. This could allow an attacker to execute arbitrary SQL statements.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-37198,Candidate,"A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS uses a flawed implementation of CSRF prevention. An attacker could exploit this vulnerability to perform cross-site request forgery attacks.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-995338.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-37199,Candidate,"A vulnerability has been identified in SINUMERIK 808D (All versions), SINUMERIK 828D (All versions < V4.95). Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial-of-service in the device.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-178380.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-178380.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 39 |
-
,Candidate,An information disclosure vulnerability was reported in the Time Weather system widget on Legion Phone Pro (L79031) and Legion Phone2 Pro (L70081) that could allow other applications to access device GPS data.,MISC:https://iknow.lenovo.com.cn/detail/dc_199217.html | URL:https://iknow.lenovo.com.cn/detail/dc_199217.html,Assigned (20210818),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-37200,Candidate,A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP1). An attacker with access to the webserver of an affected system could download arbitrary files from the underlying filesystem by sending a specially crafted HTTP request.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-330339.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-330339.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 41 |
-
CVE2021-37201,Candidate,A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP1). The web interface of affected devices is vulnerable to a Cross-Site Request Forgery (CSRF) attack. This could allow an attacker to manipulate the SINEC NMS configuration by tricking an unsuspecting user with administrative privileges to click on a malicious link.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-330339.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-330339.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-37202,Candidate,"A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The IFC adapter in affected application contains a use-after-free vulnerability that could be triggered while parsing user-supplied IFC files. An attacker could leverage this vulnerability to execute code in the context of the current process.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-208530.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-208530.pdf | MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-37203,Candidate,"A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The plmxmlAdapterIFC.dll contains an out-of-bounds read while parsing user supplied IFC files which could result in a read past the end of an allocated buffer. This could allow an attacker to cause a denial-of-service condition or read sensitive information from memory locations.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-208530.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-208530.pdf | MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-728618.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-37204,Candidate,"A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC Drive Controller family (All versions >= V2.9.2 < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V21.9), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions >= V21.9 < V21.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 Ready4Linux (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.5.0), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.9.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions < V21.9), SIMATIC S7-1500 Software Controller (All versions >= V21.9 < V21.9.4), SIMATIC S7-PLCSIM Advanced (All versions < V4.0), SIMATIC S7-PLCSIM Advanced (All versions >= V4.0 < V4.0 SP1), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packet over port 102/tcp. A restart of the affected device is needed to restore normal operations.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-838121.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-838121.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-37205,Candidate,"A vulnerability has been identified in SIMATIC Drive Controller family (All versions >= V2.9.2 < V2.9.4), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions >= V21.9 < V21.9.4), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions >= V4.5.0 < V4.5.2), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions >= V2.9.2 < V2.9.4), SIMATIC S7-1500 Software Controller (All versions >= V21.9 < V21.9.4), SIMATIC S7-PLCSIM Advanced (All versions >= V4.0 < V4.0 SP1), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions >= V2.2). An unauthenticated attacker could cause a denial-of-service condition in a PLC when sending specially prepared packets over port 102/tcp. A restart of the affected device is needed to restore normal operations.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-838121.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-838121.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-37206,Candidate,"A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Received webpackets are not properly processed. An unauthenticated remote attacker with access to any of the Ethernet interfaces could send specially crafted packets to force a restart of the target device.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-500748.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-500748.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-37207,Candidate,A vulnerability has been identified in SENTRON powermanager V3 (All versions). The affected application assigns improper access rights to a specific folder containing configuration files. This could allow an authenticated local attacker to inject arbitrary code and escalate privileges.,MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-537983.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-537983.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-37208,Candidate,"A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416NC, RUGGEDCOM RS416NC v2, RUGGEDCOM RS416P, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNC v2, RUGGEDCOM RS416Pv2, RUGGEDCOM RS416v2, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. Improper neutralization of special characters on the web server configuration page could allow an attacker, in a privileged position, to retrieve sensitive information via cross-site scripting.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-256353.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-37209,Candidate,"A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < V4.3.8), RUGGEDCOM M2200 (All versions < V4.3.8), RUGGEDCOM M969 (All versions < V4.3.8), RUGGEDCOM RMC30 (All versions < V4.3.8), RUGGEDCOM RMC8388 V4.X (All versions < V4.3.8), RUGGEDCOM RMC8388 V5.X (All versions < V5.7.0), RUGGEDCOM RP110 (All versions < V4.3.8), RUGGEDCOM RS1600 (All versions < V4.3.8), RUGGEDCOM RS1600F (All versions < V4.3.8), RUGGEDCOM RS1600T (All versions < V4.3.8), RUGGEDCOM RS400 (All versions < V4.3.8), RUGGEDCOM RS401 (All versions < V4.3.8), RUGGEDCOM RS416 (All versions < V4.3.8), RUGGEDCOM RS416P (All versions < V4.3.8), RUGGEDCOM RS416Pv2 (All versions < V5.7.0), RUGGEDCOM RS416v2 (All versions < V5.7.0), RUGGEDCOM RS8000 (All versions < V4.3.8), RUGGEDCOM RS8000A (All versions < V4.3.8), RUGGEDCOM RS8000H (All versions < V4.3.8), RUGGEDCOM RS8000T (All versions < V4.3.8), RUGGEDCOM RS900 (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900G (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RS900GP (All versions < V4.3.8), RUGGEDCOM RS900L (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-GETS-XX (All versions < V4.3.8), RUGGEDCOM RS900M-STND-C01 (All versions < V4.3.8), RUGGEDCOM RS900M-STND-XX (All versions < V4.3.8), RUGGEDCOM RS900W (All versions < V4.3.8), RUGGEDCOM RS910 (All versions < V4.3.8), RUGGEDCOM RS910L (All versions < V4.3.8), RUGGEDCOM RS910W (All versions < V4.3.8), RUGGEDCOM RS920L (All versions < V4.3.8), RUGGEDCOM RS920W (All versions < V4.3.8), RUGGEDCOM RS930L (All versions < V4.3.8), RUGGEDCOM RS930W (All versions < V4.3.8), RUGGEDCOM RS940G (All versions < V4.3.8), RUGGEDCOM RS969 (All versions < V4.3.8), RUGGEDCOM RSG2100 (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V4.X (All versions < V4.3.8), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.7.0), RUGGEDCOM RSG2100P (All versions < V4.3.8), RUGGEDCOM RSG2200 (All versions < V4.3.8), RUGGEDCOM RSG2288 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2288 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300 V5.X (All versions < V5.7.0), RUGGEDCOM RSG2300P V4.X (All versions < V4.3.8), RUGGEDCOM RSG2300P V5.X (All versions < V5.7.0), RUGGEDCOM RSG2488 V4.X (All versions < V4.3.8), RUGGEDCOM RSG2488 V5.X (All versions < V5.7.0), RUGGEDCOM RSG907R (All versions < V5.7.0), RUGGEDCOM RSG908C (All versions < V5.7.0), RUGGEDCOM RSG909R (All versions < V5.7.0), RUGGEDCOM RSG910C (All versions < V5.7.0), RUGGEDCOM RSG920P V4.X (All versions < V4.3.8), RUGGEDCOM RSG920P V5.X (All versions < V5.7.0), RUGGEDCOM RSL910 (All versions < V5.7.0), RUGGEDCOM RST2228 (All versions < V5.7.0), RUGGEDCOM RST2228P (All versions < V5.7.0), RUGGEDCOM RST916C (All versions < V5.7.0), RUGGEDCOM RST916P (All versions < V5.7.0). The SSH server on affected devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-764417.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-764417.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-3721,Candidate,A denial of service vulnerability was reported in Lenovo PCManager prior to version 4.0.20.10282 that could allow an attacker with local access to trigger a blue screen error.,MISC:https://iknow.lenovo.com.cn/detail/dc_200016.html | URL:https://iknow.lenovo.com.cn/detail/dc_200016.html,Assigned (20210818),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-37210,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-37211,Candidate,The bulletin function of Flygo does not filter special characters while a new announcement is added. Remoter attackers can use the vulnerability with general user’s credential to inject JavaScript and execute stored XSS attacks.,MISC:https://www.twcert.org.tw/tw/cp-132-4988-8f642-1.html | URL:https://www.twcert.org.tw/tw/cp-132-4988-8f642-1.html,Assigned (20210721),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-37212,Candidate,"The bulletin function of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the bulletin ID in specific Url parameters and access and modify bulletin particular content.",MISC:https://www.twcert.org.tw/tw/cp-132-4989-5d955-1.html | URL:https://www.twcert.org.tw/tw/cp-132-4989-5d955-1.html,Assigned (20210721),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-37213,Candidate,"The check-in record page of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the employee ID and date in specific parameters to access particular employee’s check-in record.",MISC:https://www.twcert.org.tw/tw/cp-132-4990-0c75d-1.html | URL:https://www.twcert.org.tw/tw/cp-132-4990-0c75d-1.html,Assigned (20210721),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-37214,Candidate,"The employee management page of Flygo contains Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attackers can manipulate the employee ID in specific parameters to arbitrary access employee's data, modify it, and then obtain administrator privilege and execute arbitrary command.",MISC:https://www.twcert.org.tw/tw/cp-132-4991-658b1-1.html | URL:https://www.twcert.org.tw/tw/cp-132-4991-658b1-1.html,Assigned (20210721),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-37215,Candidate,"The employee management page of Flygo contains an Insecure Direct Object Reference (IDOR) vulnerability. After being authenticated as a general user, remote attacker can manipulate the user data and then over-write another employee’s user data by specifying that employee’s ID in the API parameter.",MISC:https://www.twcert.org.tw/tw/cp-132-4992-dac66-1.html | URL:https://www.twcert.org.tw/tw/cp-132-4992-dac66-1.html,Assigned (20210721),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-37216,Candidate,QSAN Storage Manager header page parameters does not filter special characters. Remote attackers can inject JavaScript without logging in and launch reflected XSS attacks to access and modify specific data.,MISC:https://www.twcert.org.tw/tw/cp-132-4962-44cd2-1.html | URL:https://www.twcert.org.tw/tw/cp-132-4962-44cd2-1.html,Assigned (20210721),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-37217,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-37218,Candidate,"HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4.",MISC:https://discuss.hashicorp.com/t/hcsec-2021-21-nomad-raft-rpc-privilege-escalation/29023 | MISC:https://www.hashicorp.com/blog/category/nomad,Assigned (20210721),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-37219,Candidate,"HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.",GENTOO:GLSA-202207-01 | URL:https://security.gentoo.org/glsa/202207-01 | MISC:https://discuss.hashicorp.com/t/hcsec-2021-22-consul-raft-rpc-privilege-escalation/29024 | MISC:https://www.hashicorp.com/blog/category/consul,Assigned (20210721),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-3722,Candidate,A denial of service vulnerability was reported in Lenovo PCManager prior to version 4.0.40.2175 that could allow configuration files to be written to non-standard locations during installation.,MISC:https://iknow.lenovo.com.cn/detail/dc_199218.html | URL:https://iknow.lenovo.com.cn/detail/dc_199218.html,Assigned (20210818),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-37220,Candidate,"MuPDF through 1.18.1 has an out-of-bounds write because the cached color converter does not properly consider the maximum key size of a hash table. This can, for example, be seen with crafted ""mutool draw"" input.",FEDORA:FEDORA-2021-e1d8a99caa | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TKRMREIYUBGG2GV73CU7BJNW2Q34IP23/ | MISC:http://git.ghostscript.com/?p=mupdf.git;h=f5712c9949d026e4b891b25837edd2edc166151f | MISC:https://bugs.ghostscript.com/show_bug.cgi?id=703791,Assigned (20210721),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-37221,Candidate,"A file upload vulnerability exists in Sourcecodester Customer Relationship Management System 1.0 via the account update option & customer create option, which could let a remote malicious user upload an arbitrary php file. .",MISC:https://www.exploit-db.com/exploits/50046,Assigned (20210721),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-37222,Candidate,Parsers in the open source project RCDCAP before 1.0.5 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via specially crafted packets.,MISC:http://hg.code.sf.net/p/rcdcap/code/rev/0af05606c55b#l2.10 | MISC:https://www.openhub.net/p/rcdcap,Assigned (20210721),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-37223,Candidate,"Nagios Enterprises NagiosXI <= 5.8.4 contains a Server-Side Request Forgery (SSRF) vulnerability in schedulereport.php. Any authenticated user can create scheduled reports containing PDF screenshots of any view in the NagiosXI application. Due to lack of input sanitisation, the target page can be replaced with an SSRF payload to access internal resources or disclose local system files.",MISC:http://nagios.com | MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-37224,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-37225,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-37226,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-37227,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-37228,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 71 |
-
CV@-2021!37229,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-3723,Candidate,A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session.,MISC:https://support.lenovo.com/us/en/product_security/LEN-66347 | URL:https://support.lenovo.com/us/en/product_security/LEN-66347,Assigned (20210818),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-37230,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-37231,Candidate,A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check.,MISC:https://github.com/wez/atomicparsley/issues/30 | MISC:https://github.com/wez/atomicparsley/pull/31#issue-687280335,Assigned (20210721),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-37232,Candidate,A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.,MISC:https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1 | MISC:https://github.com/wez/atomicparsley/issues/32,Assigned (20210721),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-37233,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-37234,Candidate,Incorrect Access Control vulnerability in Modern Honey Network commit 0abf0db9cd893c6d5c727d036e1f817c02de4c7b allows remote attackers to view sensitive information via crafted PUT request to Web API.,MISC:https://github.com/pwnlandia/mhn/issues/809,Assigned (20210721),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-37235,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-37236,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 80 |
-
CVE-202137237,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-37238,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-37239,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-3724,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,MISC:https://www.cve.org/CVERecord?id=CVE-2021-3724,Assigned (20210819),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-37240,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-37241,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-37242,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-37243,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-37244,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-37245,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-37246,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-37247,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-37248,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-37249,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-3725,Candidate,"Vulnerability in dirhistory plugin Description: the widgets that go back and forward in the directory history, triggered by pressing Alt-Left and Alt-Right, use functions that unsafely execute eval on directory names. If you cd into a directory with a carefully-crafted name, then press Alt-Left, the system is subject to command injection. Impacted areas: - Functions pop_past and pop_future in dirhistory plugin.",MISC:https://github.com/ohmyzsh/ohmyzsh/commit/06fc5fb | URL:https://github.com/ohmyzsh/ohmyzsh/commit/06fc5fb,Assigned (20210819),None (candidate not yet proposed),
|
| 95 |
-
CVE2021-37250,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-37251,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 97 |
-
CVE2021-37252,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-37253,Candidate,"** DISPUTED ** M-Files Web before 20.10.9524.1 allows a denial of service via overlapping ranges (in HTTP requests with crafted Range or Request-Range headers). NOTE: this is disputed because the range behavior is the responsibility of the web server, not the responsibility of the individual web application.",FULLDISC:20211203 CVE-2021-37253: M-Files Web Improper Range Header Processing Denial of Services (DoS) Vulnerability | URL:http://seclists.org/fulldisclosure/2021/Dec/1 | MISC:http://packetstormsecurity.com/files/165139/M-Files-Web-Denial-Of-Service.html | MISC:https://vulmon.com/vulnerabilitydetails?qid=CVE-2021-37253 | MISC:https://www.m-files.com/about/trust-center/security-advisories/cve-2021-37253-denial-of-service/ | MISC:https://www.m-files.com/company/trust-center/vulnerability-disclosure/ | MISC:https://www.tenable.com/cve/CVE-2021-37253,Assigned (20210721),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-37254,Candidate,"In M-Files Web product with versions before 20.10.9524.1 and 20.10.9445.0, a remote attacker could use a flaw to obtain unauthenticated access to 3rd party component license key information on server.",MISC:https://www.m-files.com/about/trust-center/security-vulnerabilities/cve-2021-37254/ | MISC:https://www.m-files.com/company/trust-center/vulnerability-disclosure/,Assigned (20210721),None (candidate not yet proposed),
|
| 100 |
-
CVE-20$1-3725#,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 101 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-37257,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-37258,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-37259,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-3726,Candidate,"# Vulnerability in `title` function **Description**: the `title` function defined in `lib/termsupport.zsh` uses `print` to set the terminal title to a user-supplied string. In Oh My Zsh, this function is always used securely, but custom user code could use the `title` function in a way that is unsafe. **Fixed in**: [a263cdac](https://github.com/ohmyzsh/ohmyzsh/commit/a263cdac). **Impacted areas**: - `title` function in `lib/termsupport.zsh`. - Custom user code using the `title` function.",MISC:https://github.com/ohmyzsh/ohmyzsh/commit/a263cdac | URL:https://github.com/ohmyzsh/ohmyzsh/commit/a263cdac,Assigned (20210819),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-37260,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-37261,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-37262,Candidate,JFinal_cms 5.1.0 is vulnerable to regex injection that may lead to Denial of Service.,MISC:https://github.com/jflyfox/jfinal_cms/issues/23,Assigned (20210721),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-37263,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-37264,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-37265,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-37266,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-37267,Candidate,"Cross Site Scripting (XSS) vulnerability exists in all versions of KindEditor, which can be exploited by an attacker to obtain user cookie information.",MISC:https://www.cnvd.org.cn/flaw/show/3257066,Assigned (20210721),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-37268,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-37269,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-3727,Candidate,"# Vulnerability in `rand-quote` and `hitokoto` plugins **Description**: the `rand-quote` and `hitokoto` fetch quotes from quotationspage.com and hitokoto.cn respectively, do some process on them and then use `print -P` to print them. If these quotes contained the proper symbols, they could trigger command injection. Given that they're an external API, it's not possible to know if the quotes are safe to use. **Fixed in**: [72928432](https://github.com/ohmyzsh/ohmyzsh/commit/72928432). **Impacted areas**: - `rand-quote` plugin (`quote` function). - `hitokoto` plugin (`hitokoto` function).",MISC:https://github.com/ohmyzsh/ohmyzsh/commit/72928432 | URL:https://github.com/ohmyzsh/ohmyzsh/commit/72928432,Assigned (20210819),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-37270,Candidate,There is an unauthorized access vulnerability in the CMS Enterprise Website Construction System 5.0. Attackers can use this vulnerability to directly access the specified background path without logging in to the background to obtain the background administrator authority.,MISC:https://github.com/purple-WL/S-cms-Unauthorized | MISC:https://www.cnvd.org.cn/flaw/show/2815129,Assigned (20210721),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-37271,Candidate,"Cross Site Scripting (XSS) vulnerability exists in UEditor v1.4.3.3, which can be exploited by an attacker to obtain user cookie information.",MISC:https://www.cnvd.org.cn/flaw/show/3243916 | MISC:https://www.freebuf.com/vuls/269956.html,Assigned (20210721),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-37272,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-37273,Candidate,"A Denial of Service issue exists in China Telecom Corporation EPON Tianyi Gateway ZXHN F450(EPON ONU) 3.0. Tianyi Gateway is a hardware terminal of ""Optical Modem Smart Router."" Attackers can use this vulnerability to restart the device multiple times.",MISC:https://www.cnvd.org.cn/flaw/show/2958526,Assigned (20210721),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-37274,Candidate,Kingdee KIS Professional Edition has a privilege escalation vulnerability. Attackers can use the vulnerability to gain computer administrator rights via unspecified loopholes.,MISC:https://github.com/purple-WL/CNVD-2020-75301/issues/1 | MISC:https://www.cnvd.org.cn/flaw/show/2740765,Assigned (20210721),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-37275,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-37276,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-37277,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1005.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-37278,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-37279,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-3728,Candidate,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d | URL:https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d | MISC:https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e | URL:https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e,Assigned (20210820),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-37280,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 6 |
-
CVE-202?%1?-37281,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-37282,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-37283,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-37284,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 10 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-37286,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-37287,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-37288,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-37289,Candidate,Insecure Permissions in administration interface in Planex MZK-DP150N 1.42 and 1.43 allows attackers to execute system command as root via etc_ro/web/syscmd.asp.,MISC:http://www.planex.co.jp/products/mzk-dp150n/ | MISC:https://jvn.jp/en/vu/JVNVU98291763/ | MISC:https://samy.link/blog/a-hidden-web-shell-in-the-plug-in-wireless-planex-mzk-dp150n,Assigned (20210721),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-3729,Candidate,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76 | URL:https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76 | MISC:https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712 | URL:https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712,Assigned (20210820),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-37290,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-37291,Candidate,An SQL Injection vulnerability exists in KevinLAB Inc Building Energy Management System 4ST BEMS 1.0.0 ivia the input_id POST parameter in index.php.,MISC:http://www.kevinlab.com | MISC:https://www.zeroscience.mk/en/vulnerabilities/,Assigned (20210721),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-37292,Candidate,An Access Control vulnerability exists in KevinLAB Inc Building Energy Management System 4ST BEMS 1.0.0 due to an undocumented backdoor account. A malicious user can log in using the backdor account with admin highest privileges and obtain system control.,MISC:http://www.kevinlab.com | MISC:https://www.zeroscience.mk/en/vulnerabilities/,Assigned (20210721),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-37293,Candidate,A Directory Traversal vulnerability exists in KevinLAB Inc Building Energy Management System 4ST BEMS 1.0.0 via the page GET parameter in index.php.,MISC:http://www.kevinlab.com | MISC:https://www.zeroscience.mk/en/vulnerabilities/,Assigned (20210721),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-37294,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 21 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-37296,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-37297,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 24 |
-
|CVE-2021-3?729%8,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210721),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-37299,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-3730,Candidate,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7 | URL:https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7 | MISC:https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6 | URL:https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6,Assigned (20210820),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-37300,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-37301,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-37302,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 30 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 31 |
-
,Candidate,An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.,MISC:https://github.com/jeecgboot/jeecg-boot/issues/2793,Assigned (20210721),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-37305,Candidate,An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin.,MISC:https://github.com/jeecgboot/jeecg-boot/issues/2794,Assigned (20210721),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-37306,Candidate,An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: api uri:/sys/user/checkOnlyUser?username=admin.,MISC:https://github.com/jeecgboot/jeecg-boot/issues/2794,Assigned (20210721),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-37307,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-37308,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-37309,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-3731,Candidate,"LedgerSMB does not sufficiently guard against being wrapped by other sites, making it vulnerable to 'clickjacking'. This allows an attacker to trick a targetted user to execute unintended actions.",CONFIRM:https://huntr.dev/bounties/5664331d-f5f8-4412-8566-408f8655888a | URL:https://huntr.dev/bounties/5664331d-f5f8-4412-8566-408f8655888a | CONFIRM:https://ledgersmb.org/cve-2021-3731-clickjacking | URL:https://ledgersmb.org/cve-2021-3731-clickjacking | DEBIAN:DSA-4962 | URL:https://www.debian.org/security/2021/dsa-4962,Assigned (20210821),None (candidate not yet proposed),
|
| 38 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-37311,,Buffer Overflow vulnerability in fcitx5 5.0.8 allows attackers to cause a denial of service via crafted message to the application's listening port.,MISC:https://fcitx-im.org | MISC:https://github.com/fcitx/fcitx5/pull/308,Assigned (20210721),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-37312,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-37313,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-37314,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 43 |
-
%VE-2021-37315,Candidate,Incorrect Access Control issue discoverd in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the source for COPY and MOVE operations.,MISC:https://robertchen.cc/blog/2021/03/31/asus-rce,Assigned (20210721),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-37316,Candidate,SQL injection vulnerability in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to view sensitive information via /etc/shadow.,MISC:https://robertchen.cc/blog/2021/03/31/asus-rce,Assigned (20210721),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-37317,Candidate,Directory Traversal vulnerability in Cloud Disk in ASUS RT-AC68U router firmware version before 3.0.0.4.386.41634 allows remote attackers to write arbitrary files via improper sanitation on the target for COPY and MOVE operations.,MISC:https://robertchen.cc/blog/2021/03/31/asus-rce,Assigned (20210721),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-37318,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-37319,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 48 |
-
,Candidate,A flaw was found in the Linux kernel's OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.,MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1995249 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1995249 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631 | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d1476da1a86b8d67aceb485eb3631 | MISC:https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631 | URL:https://github.com/torvalds/linux/commit/427215d85e8d1476da1a86b8d67aceb485eb3631 | MISC:https://ubuntu.com/security/CVE-2021-3732 | URL:https://ubuntu.com/security/CVE-2021-3732,Assigned (20210823),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-37320,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-37321,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-37322,Candidate,GCC c++filt v2.26 was discovered to contain a use-after-free vulnerability via the component cplus-dem.c.,MISC:https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188,Assigned (20210721),None (candidate not yet proposed),
|
| 52 |
-
CVE%202|-37323,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-37324,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-37325,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-37326,Candidate,NetSarang Xshell 7 before Build 0077 includes unintended code strings in paste operations.,MISC:https://www.netsarang.com/en/xshell-update-history/,Assigned (20210721),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-37327,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-37328,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-37329,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-3733,Candidate,"There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",CONFIRM:https://security.netapp.com/advisory/ntap-20220407-0001/ | MISC:https://bugs.python.org/issue43075 | URL:https://bugs.python.org/issue43075 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1995234 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1995234 | MISC:https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb | URL:https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb | MISC:https://github.com/python/cpython/pull/24391 | URL:https://github.com/python/cpython/pull/24391 | MISC:https://ubuntu.com/security/CVE-2021-3733 | URL:https://ubuntu.com/security/CVE-2021-3733,Assigned (20210823),None (candidate not yet proposed),
|
| 60 |
-
CV?-2021-3!330,Candidate,"Laravel Booking System Booking Core 2.0 is vulnerable to Cross Site Scripting (XSS). The Avatar upload in the My Profile section could be exploited to upload a malicious SVG file which contains Javascript. Now if another user/admin views the profile and clicks to view his avatar, an XSS will trigger.",MISC:https://www.navidkagalwalla.com/booking-core-vulnerabilities,Assigned (20210721),None (candidate not yet proposed),
|
| 61 |
-
CVE-?02@-37331,Candidate,"Laravel Booking System Booking Core 2.0 is vulnerable to Incorrect Access Control. On the Verifications page, after uploading an ID Card or Trade License and viewing it, ID Cards and Trade Licenses of other vendors/users can be viewed by changing the URL.",MISC:https://www.navidkagalwalla.com/booking-core-vulnerabilities,Assigned (20210721),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-37332,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-37333,Candidate,Laravel Booking System Booking Core 2.0 is vulnerable to Session Management. A password change at sandbox.bookingcore.org/user/profile/change-password does not invalidate a session that is opened in a different browser.,MISC:https://www.navidkagalwalla.com/booking-core-vulnerabilities,Assigned (20210721),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-37334,Candidate,"Umbraco Forms version 4.0.0 up to and including 8.7.5 and below are vulnerable to a security flaw that could lead to a remote code execution attack and/or arbitrary file deletion. A vulnerability occurs because validation of the file extension is performed after the file has been stored in a temporary directory. By default, files are stored within the application directory structure at %BASEDIR%/APP_DATA/TEMP/FileUploads/. Whilst access to this directory is restricted by the root web.config file, it is possible to override this restriction by uploading another specially crafted web.config file to the temporary directory. It is possible to exploit this flaw to upload a malicious script file to execute arbitrary code and system commands on the server.",MISC:https://umbraco.com/blog/security-advisory-20th-of-july-2021-patch-is-now-available/ | MISC:https://umbraco.com/blog/security-advisory-security-patches-for-umbraco-forms-ready-on-july-20th-2021-at-7-am-utc/,Assigned (20210721),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-37335,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-37336,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-37337,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-37338,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 69 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-3734,Candidate,yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames,CONFIRM:https://huntr.dev/bounties/dd2e2dbe-efe5-49ec-be11-7a7e7c41debd | URL:https://huntr.dev/bounties/dd2e2dbe-efe5-49ec-be11-7a7e7c41debd | MISC:https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe | URL:https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe,Assigned (20210824),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-37340,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-37341,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-37342,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-37343,Candidate,A path traversal vulnerability exists in Nagios XI below version 5.8.5 AutoDiscovery component and could lead to post authenticated RCE under security context of the user running Nagios.,MISC:http://packetstormsecurity.com/files/165978/Nagios-XI-Autodiscovery-Shell-Upload.html | MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-37344,Cadidate,Nagios XI Switch Wizard before version 2.5.7 is vulnerable to remote code execution through improper neutralisation of special elements used in an OS Command (OS Command injection).,MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-37345,Candidate,Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because xi-sys.cfg is being imported from the var directory for some scripts with elevated permissions.,MISC:http://nagios.com | MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-37346,Candidate,Nagios XI WatchGuard Wizard before version 1.4.8 is vulnerable to remote code execution through Improper neutralisation of special elements used in an OS Command (OS Command injection).,MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-37347,Candidate,Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because getprofile.sh does not validate the directory name it receives as an argument.,MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-37348,Candidate,Nagios XI before version 5.8.5 is vulnerable to local file inclusion through improper limitation of a pathname in index.php.,MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-37349,Candidate,Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because cleaner.php does not sanitise input read from the database.,MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-3735,Candidate,"A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.",MISC:https://access.redhat.com/security/cve/CVE-2021-3735 | URL:https://access.redhat.com/security/cve/CVE-2021-3735 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1997184 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1997184 | MISC:https://security-tracker.debian.org/tracker/CVE-2021-3735 | URL:https://security-tracker.debian.org/tracker/CVE-2021-3735,Assigned (20210825),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-37350,Candidate,Nagios XI before version 5.8.5 is vulnerable to SQL injection vulnerability in Bulk Modifications Tool due to improper input sanitisation.,MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-37351,Candidate,Nagios XI before version 5.8.5 is vulnerable to insecure permissions and allows unauthenticated users to access guarded pages through a crafted HTTP request to the server.,MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-37352,Candidate,"An open redirect vulnerability exists in Nagios XI before version 5.8.5 that could lead to spoofing. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link.",MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-37353,Candidate,Nagios XI Docker Wizard before version 1.1.3 is vulnerable to SSRF due to improper sanitation in table_population.php.,MISC:https://www.nagios.com/downloads/nagios-xi/change-log/,Assigned (20210721),None (candidate not yet proposed),
|
| 86 |
-
,Candidate,Xerox Phaser 4622 v35.013.01.000 was discovered to contain a buffer overflow in the function sub_3226AC via the TIMEZONE variable. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.,MISC:https://github.com/Ainevsia/CVE-Request/tree/main/Xerox/1,Assigned (20210721),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-37355,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-37356,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-37357,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-37358,Candidate,"SQL Injection in SEACMS v210530 (2021-05-30) allows remote attackers to execute arbitrary code via the component ""admin_ajax.php?action=checkrepeat&v_name="".",MISC:https://github.com/kk98kk0/exploit/blob/master/SEACMS-V210530-sql.md,Assigned (20210721),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-37359,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-3736,Candidate,A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information.,MISC:https://access.redhat.com/security/cve/CVE-2021-3736 | URL:https://access.redhat.com/security/cve/CVE-2021-3736 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1995570 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1995570 | MISC:https://github.com/torvalds/linux/commit/de5494af4815a4c9328536c72741229b7de88e7f | URL:https://github.com/torvalds/linux/commit/de5494af4815a4c9328536c72741229b7de88e7f,Assigned (20210826),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-37360,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 94 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-37362,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 96 |
-
,Candidate,"An Insecure Permissions issue exists in Gestionale Open 11.00.00. A low privilege account is able to rename the mysqld.exe file located in bin folder and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.",MISC:https://www.exploit-db.com/exploits/50449 | MISC:https://www.gestionaleopen.org/,Assigned (20210721),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-37364,Candidate,"OpenClinic GA 5.194.18 is affected by Insecure Permissions. By default the Authenticated Users group has the modify permission to openclinic folders/files. A low privilege account is able to rename mysqld.exe or tomcat8.exe files located in bin folders and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.",MISC:https://sourceforge.net/projects/open-clinic/ | MISC:https://sourceforge.net/projects/open-clinic/files/latest/download | MISC:https://www.exploit-db.com/exploits/50448,Assigned (20210721),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-37365,Candidate,"CTparental before 4.45.03 is vulnerable to cross-site scripting (XSS) in the CTparental admin panel. In bl_categires_help.php, the 'categories' variable is assigned with the content of the query string param 'cat' without sanitization or encoding, enabling an attacker to inject malicious code into the output webpage.",MISC:https://gist.github.com/securylight/092ba96a660e07ad76f2a380c2eaa75a | MISC:https://gitlab.com/marsat/CTparental/,Assigned (20210721),None (candidate not yet proposed),
|
| 99 |
-
,,"CTparental before 4.45.03 is vulnerable to cross-site request forgery (CSRF) in the CTparental admin panel. By combining CSRF with XSS, an attacker can trick the administrator into clicking a link that cancels the filtering for all standard users.",MISC:https://gist.github.com/securylight/092ba96a660e07ad76f2a380c2eaa75a | MISC:https://gitlab.com/marsat/CTparental/,Assigned (20210721),None (candidate not yet proposed),
|
| 100 |
-
,Candidate,"CTparental before 4.45.07 is affected by a code execution vulnerability in the CTparental admin panel. Because The file ""bl_categories_help.php"" is vulnerable to directory traversal, an attacker can create a file that contains scripts and run arbitrary commands.",MISC:https://gist.github.com/securylight/092ba96a660e07ad76f2a380c2eaa75a | MISC:https://gitlab.com/marsat/CTparental/,Assigned (20210721),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-37368,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-37369,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-3737,Candidate,"A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",CONFIRM:https://security.netapp.com/advisory/ntap-20220407-0009/ | URL:https://security.netapp.com/advisory/ntap-20220407-0009/ | MISC:https://bugs.python.org/issue44022 | URL:https://bugs.python.org/issue44022 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1995162 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1995162 | MISC:https://github.com/python/cpython/pull/25916 | URL:https://github.com/python/cpython/pull/25916 | MISC:https://github.com/python/cpython/pull/26503 | URL:https://github.com/python/cpython/pull/26503 | MISC:https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html | URL:https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html | MISC:https://ubuntu.com/security/CVE-2021-3737 | URL:https://ubuntu.com/security/CVE-2021-3737 | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html,Assigned (20210826),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-37370,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-37371,Candidate,Online Student Admission System 1.0 is affected by an unauthenticated SQL injection bypass vulnerability in /admin/login.php.,MISC:http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html | MISC:https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf | MISC:https://www.sourcecodester.com/php/14874/online-student-admission-system.html,Assigned (20210721),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-37372,Candidate,Online Student Admission System 1.0 is affected by an insecure file upload vulnerability. A low privileged user can upload malicious PHP files by updating their profile image to gain remote code execution.,MISC:http://packetstormsecurity.com/files/164625/Online-Student-Admission-System-1.0-SQL-Injection-Shell-Upload.html | MISC:https://packetstormsecurity.com/files/164625/Online_Admission_System_CVEs-Gerard-Carbonell.pdf | MISC:https://www.sourcecodester.com/php/14874/online-student-admission-system.html,Assigned (20210721),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-37373,Candidate,** UNSUPPORTED WHEN ASSIGNED ** Cross Site Scripting (XSS) vulnerability in Teradek Slice 1st generation firmware 7.3.x and earlier allows remote attackers to run arbitrary code via the Friendly Name field in System Information Settings. NOTE: Vedor states the product has reached End of Life and will not be receiving any firmware updates to address this issue.,MISC:https://tbutler.org/2021/04/29/teradek-vulnerability-advisory,Assigned (20210721),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-37374,Candidate,** UNSUPPORTED WHEN ASSIGNED ** Cross Site Scripting (XSS) vulnerability in Teradek Clip all firmware versions allows remote attackers to run arbitrary code via the Friendly Name field in System Information Settings. NOTE: Vedor states the product has reached End of Life and will not be receiving any firmware updates to address this issue.,MISC:https://tbutler.org/2021/04/29/teradek-vulnerability-advisory,Assigned (20210721),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-37375,Candidate,** UNSUPPORTED WHEN ASSIGNED ** Cross Site Scripting (XSS) vulnerability in Teradek VidiU / VidiU Mini firmware version 3.0.8 and earlier allows remote attackers to run arbitrary code via the Friendly Name field in System Information Settings. NOTE: Vedor states the product has reached End of Life and will not be receiving any firmware updates to address this issue.,MISC:https://tbutler.org/2021/04/29/teradek-vulnerability-advisory,Assigned (20210721),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-37376,Candidate,"** UNSUPPORTED WHEN ASSIGNED ** Cross Site Scripting (XSS) vulnerability in Teradek Bond, Bond 2 and Bond Pro firmware version 7.3.x and earlier allows remote attackers to run arbitrary code via the Friendly Name field in System Information Settings. NOTE: Vedor states the product has reached End of Life and will not be receiving any firmware updates to address this issue.",MISC:https://tbutler.org/2021/04/29/teradek-vulnerability-advisory | MISC:https://teradek.com/collections/cube2,Assigned (20210721),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-37377,Candidate,** UNSUPPORTED WHEN ASSIGNED ** Cross Site Scripting (XSS) vulnerability in Teradek Brik firmware version 7.2.x and earlier allows remote attackers to run arbitrary code via the Friendly Name field in System Information Settings. NOTE: Vedor states the product has reached End of Life and will not be receiving any firmware updates to address this issue.,MISC:https://tbutler.org/2021/04/29/teradek-vulnerability-advisory,Assigned (20210721),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-37378,Candidate,** UNSUPPORTED WHEN ASSIGNED ** Cross Site Scripting (XSS) vulnerability in Teradek Cube and Cube Pro firmware version 7.3.x and earlier allows remote attackers to run arbitrary code via the Friendly Name field in System Information Settings. NOTE: Vedor states the product has reached End of Life and will not be receiving any firmware updates to address this issue.,MISC:https://tbutler.org/2021/04/29/teradek-vulnerability-advisory,Assigned (20210721),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-37379,Candidate,** UNSUPPORTED WHEN ASSIGNED ** Cross Site Scripting (XSS) vulnerability in Teradek Sphere all firmware versions allows remote attackers to run arbitrary code via the Friendly Name field in System Information Settings. NOTE: Vedor states the product has reached End of Life and will not be receiving any firmware updates to address this issue.,MISC:https://tbutler.org/2021/04/29/teradek-vulnerability-advisory,Assigned (20210721),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-3738,Candidate,"In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credentials state was only pointed at, and when one connection within that association group ended, the database would be left pointing at an invalid 'struct session_info'. The most likely outcome here is a crash, but it is possible that the use-after-free could instead allow different user state to be pointed at and this might allow more privileged access.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2021726 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2021726 | MISC:https://bugzilla.samba.org/show_bug.cgi?id=14468 | URL:https://bugzilla.samba.org/show_bug.cgi?id=14468 | MISC:https://www.samba.org/samba/security/CVE-2021-3738.html | URL:https://www.samba.org/samba/security/CVE-2021-3738.html,Assigned (20210826),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-37380,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-37381,Candidate,"Southsoft GMIS 5.0 is vulnerable to CSRF attacks. Attackers can access other users' private information such as photos through CSRF. For example: any student's photo information can be accessed through /gmis/(S([1]))/student/grgl/PotoImageShow/?bh=[2]. Among them, the code in [1] is a random string generated according to the user's login related information. It can protect the user's identity, but it can not effectively prevent unauthorized access. The code in [2] is the student number of any student. The attacker can carry out CSRF attack on the system by modifying [2] without modifying [1].",MISC:https://github.com/caiteli/poc_information/blob/main/southsoft_GMIS.txt | MISC:https://github.com/caiteli/poc_information/issues/1,Assigned (20210721),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-37382,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-37383,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-37384,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-37385,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-37386,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-37387,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 123 |
-
,Candidate,A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution.,MISC:https://github.com/noobexploiter/IOTHACKS/blob/main/vuln1.md | MISC:https://www.dlink.com/en/security-bulletin/,Assigned (20210721),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-37389,,Chamilo 1.11.14 allows stored XSS via main/install/index.php and main/install/ajax.php through the port parameter.,MISC:https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities | MISC:https://github.com/chamilo/chamilo-lms/commit/dfae49f5dc392c00cd43badcb3043db3a646ff0c,Assigned (20210721),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1006.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table1007.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE|%-2021-37#3@9,Candid#@*ate,"A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires ‘CAP_SYS_ADMIN’. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1997958 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1997958 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 | MISC:https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 | URL:https://github.com/torvalds/linux/commit/e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091 | MISC:https://security.netapp.com/advisory/ntap-20220407-0006/ | URL:https://security.netapp.com/advisory/ntap-20220407-0006/ | MISC:https://ubuntu.com/security/CVE-2021-3739 | URL:https://ubuntu.com/security/CVE-2021-3739 | MISC:https://www.openwall.com/lists/oss-security/2021/08/25/3 | URL:https://www.openwall.com/lists/oss-security/2021/08/25/3,Assigned (20210826),None (candidate not yet proposed),
|
| 3 |
-
CVE-20#21%$-3739|0,Canddate,A Chamilo LMS 1.11.14 reflected XSS vulnerability exists in main/social/search.php=q URI (social network search feature).,MISC:https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities | MISC:https://github.com/chamilo/chamilo-lms/commit/3fcc751d5cc7da311532a8756fba5a8778f50ca0,Assigned (20210721),None (candidate not yet proposed),
|
| 4 |
-
CVE2021-37391,Ca#di$ate,"A user without privileges in Chamilo LMS 1.11.14 can send an invitation message to another user, e.g., the administrator, through main/social/search.php, main/inc/lib/social.lib.php and steal cookies or execute arbitrary code on the administration side via a stored XSS vulnerability via social network the send invitation feature.",MISC:https://gitbook.seguranca-informatica.pt/cve-and-exploits/cves/chamilo-lms-1.11.14-xss-vulnerabilities | MISC:https://github.com/chamilo/chamilo-lms/commit/de43a77049771cce08ea7234c5c1510b5af65bc8,Assigned (20210721),None (candidate not yet proposed),
|
| 5 |
-
CVE-!2@021-%37392,Candi%date*@*,"In RPCMS v1.8 and below, the ""nickname"" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.",MISC:https://gist.github.com/victomteng1997/bfa1e0e07dd22f7e0b13256eda79626f | MISC:https://github.com/ralap-z/RPCMS/,Assigned (20210721),None (candidate not yet proposed),
|
| 6 |
-
@CVE-@%2021-37393,Candidate,"In RPCMS v1.8 and below, the ""nickname"" variable is not properly sanitized before being displayed on page. Attacker can use ""update password"" function to inject XSS payloads into nickname variable, and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.",MISC:https://gist.github.com/victomteng1997/bfa1e0e07dd22f7e0b13256eda79626f | MISC:https://github.com/ralap-z/RPCMS/,Assigned (20210721),None (candidate not yet proposed),
|
| 7 |
-
@CV?E-2**021-37394,Candidate,"In RPCMS v1.8 and below, attackers can interact with API and change variable ""role"" to ""admin"" to achieve admin user registration.",MISC:https://gist.github.com/victomteng1997/bfa1e0e07dd22f7e0b13256eda79626f | MISC:https://github.com/ralap-z/RPCMS/,Assigned (20210721),None (candidate not yet proposed),
|
| 8 |
-
CVE-2|21-373%5,?%Candid?at@e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 9 |
-
CV#E-2@021-373%96,%Ca!ndidate%*,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 10 |
-
CVE?-202#1*-37397,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 11 |
-
|VE-20|1-37398,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-37399,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210721),None (candidate not yet proposed),
|
| 13 |
-
CVE!-2?021-%3740,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210826),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-37400,Candidate,"An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.",MISC:https://jvn.jp/en/vu/JVNVU92279973/ | MISC:https://us.idec.com/idec-us/en/USD/Programmable-Logic-Controller/Micro-PLC/FC6A-MicroSmart/c/MicroSmart_FC6A | MISC:https://us.idec.com/idec-us/en/USD/Software-Downloads-Automation-Organizer | MISC:https://www.idec.com/home/lp/pdf/2021-12-24-PLC.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-37401,Canidate,"An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or downloaded.",MISC:https://jvn.jp/en/vu/JVNVU92279973/ | MISC:https://us.idec.com/idec-us/en/USD/Programmable-Logic-Controller/Micro-PLC/FC6A-MicroSmart/c/MicroSmart_FC6A | MISC:https://us.idec.com/idec-us/en/USD/Software-Downloads-Automation-Organizer | MISC:https://www.idec.com/home/lp/pdf/2021-12-24-PLC.pdf,Assigned (20210721),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-37402,Candidate,OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via binary data that is mishandled when the legacy dataretrieval endpoint has been enabled.,MISC:http://seclists.org/fulldisclosure/2021/Jul/33 | MISC:https://www.open-xchange.com,Assigned (20210722),None (candidate not yet proposed),
|
| 17 |
-
C%VE-2021$-37403@,Candidate,OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via a code snippet (user-generated content) when a sharing link is created and an App Loader relative URL is used.,MISC:http://seclists.org/fulldisclosure/2021/Jul/33 | MISC:https://www.open-xchange.com,Assigned (20210722),None (candidate not yet proposed),
|
| 18 |
-
C@|V@E-2021-3*7404,C*an$di?date,"There is a potential heap buffer overflow in Apache Hadoop libhdfs native code. Opening a file path provided by user without validation may result in a denial of service or arbitrary code execution. Users should upgrade to Apache Hadoop 2.10.2, 3.2.3, 3.3.2 or higher.",CONFIRM:https://security.netapp.com/advisory/ntap-20220715-0007/ | MISC:https://lists.apache.org/thread/2h56ztcj3ojc66qzf1nno88vjw9vd4wo | URL:https://lists.apache.org/thread/2h56ztcj3ojc66qzf1nno88vjw9vd4wo,Assigned (20210723),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-37405,C#$andida?te@,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211130),None (candidate not yet proposed),
|
| 20 |
-
VE-2021-37408,Candid@%e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211209),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-37409,!andid?te,Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.,MISC:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html | URL:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00621.html | MLIST:[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10) | URL:https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html,Assigned (20211130),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-3741,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210826),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-3$411,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210723),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-37412,Candidae,The TechRadar app 1.1 for Confluence Server allows XSS via the Title field of a Radar.,MISC:https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-040.txt,Assigned (20210723),None (candidate not yet proposed),
|
| 25 |
-
#CVE-20#21-37413?,#Ca$ndi!date,"GRANDCOM DynWEB before 4.2 contains a SQL Injection vulnerability in the admin login interface. A remote unauthenticated attacker can exploit this vulnerability to obtain administrative access to the webpage, access the user database, modify web content and upload custom files. The backend login script does not verify and sanitize user-provided strings.",MISC:https://github.com/martinkubecka/CVE-References/blob/main/CVE-2021-37413.md | MISC:https://www.grandcom.sk,Assigned (20210723),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-37414,Candi@a*e,Zoho ManageEngine DesktopCentral before 10.0.709 allows anyone to get a valid user's APIKEY without authentication.,MISC:https://www.manageengine.com/products/desktop-central/help/introduction/release_notes.html | MISC:https://www.manageengine.com/products/desktop-central/improper-access-control.html,Assigned (20210723),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-37415,andidate,Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.,CONFIRM:https://www.manageengine.com/products/service-desk/on-premises/readme.html#11302 | MISC:https://www.manageengine.com,Assigned (20210723),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-37416,andidate,Zoho ManageEngine ADSelfService Plus version 6103 and prior is vulnerable to reflected XSS on the loadframe page.,MISC:https://blog.stmcyber.com/vulns/cve-2021-37416/,Assigned (20210723),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-37417,Candidate,Zoho ManageEngine ADSelfService Plus version 6103 and prior allows CAPTCHA bypass due to improper parameter validation.,MISC:https://blog.stmcyber.com/vulns/cve-2021-37417/,Assigned (20210723),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-7418,C$an@*di#date,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-31874. Reason: This candidate is a reservation duplicate of CVE-2021-31874. Notes: All CVE users should reference CVE-2021-31874 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.,,Assigned (20210723),None (candidate not yet proposed),
|
| 31 |
-
%C%VE-2021|-37419,Candidate,Zoho ManageEngine ADSelfService Plus before 6112 is vulnerable to SSRF.,MISC:https://blog.stmcyber.com/vulns/cve-2021-37419/ | MISC:https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release | MISC:https://www.manageengine.com,Assigned (20210723),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-3742,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210826),None (candidate not yet proposed),
|
| 33 |
-
CVE-$|2021-374?20,Candidate,Zoho ManageEngine ADSelfService Plus before 6112 is vulnerable to mail spoofing.,MISC:https://blog.stmcyber.com/vulns/cve-2021-37420/ | MISC:https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release | MISC:https://www.manageengine.com,Assigned (20210723),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-37421,Candidate,Zoho ManageEngine ADSelfService Plus 6103 and prior is vulnerable to admin portal access-restriction bypass.,MISC:https://blog.stmcyber.com/vulns/cve-2021-37421/ | MISC:https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6104-released-with-an-important-security-fixes,Assigned (20210723),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-37422,Canidate,Zoho ManageEngine ADSelfService Plus 6111 and prior is vulnerable to SQL Injection while linking the databases.,MISC:https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release,Assigned (20210723),None (candidate not yet proposed),
|
| 36 |
-
CVE-2?21-!7423,Ca%dida|e,Zoho ManageEngine ADSelfService Plus 6111 and prior is vulnerable to linked applications takeover.,MISC:https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release,Assigned (20210723),None (candidate not yet proposed),
|
| 37 |
-
CVE*-2021-?*37424,Candidate,ManageEngine ADSelfService Plus before 6112 is vulnerable to domain user account takeover.,MISC:https://pitstop.manageengine.com/portal/en/community/topic/adselfservice-plus-6112-hotfix-release | MISC:https://www.manageengine.com,Assigned (20210723),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-3742,Candiate,"Altova MobileTogether Server before 7.3 SP1 allows XXE attacks, such as an InfoSetChanges/Changes attack against /workflowmanagement, or reading mobiletogetherserver.cfg and then reading the certificate and private key.",MISC:http://seclists.org/fulldisclosure/2021/Aug/12 | MISC:https://www.altova.com/mobiletogether | MISC:https://www.redteam-pentesting.de/advisories/rt-sa-2021-002 | MISC:https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses,Assigned (20210723),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-37426,C|and*idat@e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-37427,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-3742,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 42 |
-
CVE-202||1-37#429,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 43 |
-
CVE|-2%!02%1-3743,Candi!at|,"An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1997961 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1997961 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb | URL:https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117 | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e78c597c3ebfd0cb329aa09a838734147e4f117 | MISC:https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117 | URL:https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117 | MISC:https://lists.openwall.net/netdev/2021/08/17/124 | URL:https://lists.openwall.net/netdev/2021/08/17/124 | MISC:https://security.netapp.com/advisory/ntap-20220407-0007/ | URL:https://security.netapp.com/advisory/ntap-20220407-0007/ | MISC:https://www.openwall.com/lists/oss-security/2021/08/27/2 | URL:https://www.openwall.com/lists/oss-security/2021/08/27/2 | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html,Assigned (20210827),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-37430,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-37431,!C|and%idate$,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 46 |
-
CVE-221-37432,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 47 |
-
CVE-201-37433,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 48 |
-
C!$V?E$-2021-37434,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021?@-3%7435!,Candi#*%d@ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210724),None (candidate not yet proposed),
|
| 50 |
-
CVE-221-37436,C|@andida#te,"Amazon Echo Dot devices through 2021-07-02 sometimes allow attackers, who have physical access to a device after a factory reset, to obtain sensitive information via a series of complex hardware and software attacks. NOTE: reportedly, there were vendor marketing statements about safely removing personal content via a factory reset. Also, the vendor has reportedly indicated that they are working on mitigations.",MISC:https://arstechnica.com/gadgets/2021/07/passwords-in-amazon-echo-dots-live-on-even-after-you-factory-reset-them/ | MISC:https://dl.acm.org/doi/pdf/10.1145/3448300.3467820 | MISC:https://news.ycombinator.com/item?id=27943730 | MISC:https://www.cpomagazine.com/data-privacy/is-it-possible-to-make-iot-devices-private-amazon-echo-dot-does-not-wipe-personal-content-after-factory-reset/,Assigned (20210724),None (candidate not yet proposed),
|
| 51 |
-
CVE-20@|21-!3?7437,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210725),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-37438,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210725),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-37439,Candidae,NCH FlexiServer v6.00 suffers from a syslog?file=/.. path traversal vulnerability.,MISC:https://github.com/0xfml/poc/blob/main/NCH/Flexiserver_6.00_LFI.md | MISC:https://www.nchsoftware.com/flexi/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-3744,Candidate,"A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.",MISC:DSA-5096 | URL:https://www.debian.org/security/2022/dsa-5096 | MISC:FEDORA-2021-79cbbefebe | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/ | MISC:FEDORA-2021-9dd76a1ed0 | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/ | MISC:FEDORA-2021-ffda3d6fa1 | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/ | MISC:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | MISC:[oss-security] 20210914 Disclosure: CVE-2021-3744: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() | URL:http://www.openwall.com/lists/oss-security/2021/09/14/1 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2000627 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2000627 | MISC:https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680 | URL:https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680 | MISC:https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0 | URL:https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0 | MISC:https://seclists.org/oss-sec/2021/q3/164 | URL:https://seclists.org/oss-sec/2021/q3/164 | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html,Assigned (20210827),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-37440,Candidte,NCH Axon PBX v2.22 and earlier allows path traversal for file disclosure via the logprop?file=/.. substring.,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_LFI.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-37441,Candidat,NCH Axon PBX v2.22 and earlier allows path traversal for file deletion via the logdelete?file=/.. substring.,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_LFI.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-37442,Candidate,NCH IVM Attendant v5.12 and earlier allows path traversal via viewfile?file=/.. to read files.,MISC:https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_LFI.md | MISC:https://www.nch.com.au/ivm/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 58 |
-
CVE-202137443,Candiate,NCH IVM Attendant v5.12 and earlier allows path traversal via the logdeleteselected check0 parameter for file deletion.,MISC:https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_LFI.md | MISC:https://www.nch.com.au/ivm/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-37444,Candida@e,"NCH IVM Attendant v5.12 and earlier suffers from a directory traversal weakness upon uploading plugins in a ZIP archive. This can lead to code execution if a ZIP element's pathname is set to a Windows startup folder, a file for the inbuilt Out-Going Message function, or a file for the the inbuilt Autodial function.",MISC:https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_RCE.md | MISC:https://www.nch.com.au/ivm/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-3745,Candidate,"In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via logprop?file=/.. for file reading.",MISC:https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md | MISC:https://www.nch.com.au/conference/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-37446,C?andi??date,"In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via documentprop?file=/.. for file reading.",MISC:https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md | MISC:https://www.nch.com.au/conference/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 62 |
-
CVE-2|@021-3744%7,C$nd%date,"In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via documentdelete?file=/.. for file deletion.",MISC:https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_LFI.md | MISC:https://www.nch.com.au/conference/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 63 |
-
CVE-221-37448,Candidate,Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via the Mailbox name (stored).,MISC:https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md | MISC:https://www.nch.com.au/ivm/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-374?9,Ca$ndi*date$?,Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via /ogmlist?folder= (reflected).,MISC:https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md | MISC:https://www.nch.com.au/ivm/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 65 |
-
CVE$-20@21-3$745,Candidate,flatcore-cms is vulnerable to Unrestricted Upload of File with Dangerous Type,CONFIRM:https://huntr.dev/bounties/7879ab3d-8018-402a-aa0b-131bdbd1966c | URL:https://huntr.dev/bounties/7879ab3d-8018-402a-aa0b-131bdbd1966c | MISC:https://github.com/flatcore/flatcore-cms/commit/5cc3937b6bc38293ec921a5cf00018b48b668dc6 | URL:https://github.com/flatcore/flatcore-cms/commit/5cc3937b6bc38293ec921a5cf00018b48b668dc6,Assigned (20210827),None (candidate not yet proposed),
|
| 66 |
-
CV#E%-!#2021-37450,Cadidate,Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via /ogmprop?id= (reflected).,MISC:https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md | MISC:https://www.nch.com.au/ivm/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021$37451,Candidate,Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via /msglist?mbx= (reflected).,MISC:https://github.com/0xfml/poc/blob/main/NCH/IVM_5.12_XSS.md | MISC:https://www.nch.com.au/ivm/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 68 |
-
CVE-2|021$-3*745@2,Candidate,NCH Quorum v2.03 and earlier allows local users to discover cleartext login information relating to users by reading the local .dat configuration files.,MISC:https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_CC.md | MISC:https://www.nch.com.au/conference/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 69 |
-
CE-2021-37453,Candidate,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the extension name (stored).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 70 |
-
CVE-221-37454,Candidate,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the line name (stored).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-37455,Candidate,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the outbound dialing plan (stored).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-3745?,Candidate,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the blacklist IP address (stored).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-37457,Candidate,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the SipRule field (stored).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 74 |
-
CV-2021-37458,Cand#date,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the primary phone field (stored).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 75 |
-
CVE-202137459,Candidate,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the customer name field (stored).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-3746,Candidate,"A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1998588 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1998588,Assigned (20210827),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-37460,andidate,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /planprop?id= (reflected).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-3741,C#nd@date,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /extensionsinstruction?id= (reflected).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 79 |
-
CVE2021-37462,C%andid|a#t@e,Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /ipblacklist?errorip= (reflected).,MISC:https://github.com/0xfml/poc/blob/main/NCH/Axon_2.22_XSS.md | MISC:https://www.nch.com.au/pbx/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 80 |
-
CVE*-20@21-374%63,Canidate,"In NCH Quorum v2.03 and earlier, XSS exists via User Display Name (stored).",MISC:https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md | MISC:https://www.nch.com.au/conference/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-37464,andidate,"In NCH Quorum v2.03 and earlier, XSS exists via Conference Description (stored).",MISC:https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md | MISC:https://www.nch.com.au/conference/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-3745,Cadidate,"In NCH Quorum v2.03 and earlier, XSS exists via /uploaddoc?id= (reflected).",MISC:https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md | MISC:https://www.nch.com.au/conference/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-37%66,Candidate,"In NCH Quorum v2.03 and earlier, XSS exists via /conference?id= (reflected).",MISC:https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md | MISC:https://www.nch.com.au/conference/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-37467,Candiate,"In NCH Quorum v2.03 and earlier, XSS exists via /conferencebrowseuploadfile?confid= (reflected).",MISC:https://github.com/0xfml/poc/blob/main/NCH/Quorum_2.03_XSS.md | MISC:https://www.nch.com.au/conference/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 85 |
-
CV|-2021-37468,Ca%didate,NCH Reflect CRM 3.01 allows local users to discover cleartext user account information by reading the configuration files.,MISC:https://github.com/0xfml/poc/blob/main/NCH/ReflectCRM_3.01_CC.md | MISC:https://www.nchsoftware.com/crm/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-37469,Canidate,"In NCH WebDictate v2.13 and earlier, authenticated users can abuse logprop?file=/.. path traversal to read files on the filesystem.",MISC:https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_LFI.md | MISC:https://www.nch.com.au/webdictate/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 87 |
-
C*VE-2021!-3!747,Candidate,"The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner.",MISC:https://github.com/canonical/multipass/issues/2261 | URL:https://github.com/canonical/multipass/issues/2261,Assigned (20210828),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-37470,Candidate,"In NCH WebDictate v2.13, persistent Cross Site Scripting (XSS) exists in the Recipient Name field. An authenticated user can add or modify the affected field to inject arbitrary JavaScript.",MISC:https://github.com/0xfml/poc/blob/main/NCH/WebDictate_2.13_XSS.md | MISC:https://www.nch.com.au/webdictate/index.html,Assigned (20210725),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-37471,Candidate,"Cradlepoint IBR900-600 devices running versions < 7.21.10 are vulnerable to a restricted shell escape sequence that provides an attacker the capability to simultaneously deny availability to the device's NetCloud Manager console, local console and SSH command-line.",MISC:https://cradlepoint.com/product/endpoints/ibr900/ | MISC:https://securitybytes.me/posts/cve-2021-37471/,Assigned (20210725),None (candidate not yet proposed),
|
| 90 |
-
CVE-202137472,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-37473,Candidate,"In NavigateCMS version 2.9.4 and below, function in `product.php` is vulnerable to sql injection on parameter `products-order` through a post request, which results in arbitrary sql query execution in the backend database.",MISC:https://gist.github.com/victomteng1997/ed429fed7de46651c89f05e7591fd4fe | MISC:https://github.com/NavigateCMS/Navigate-CMS | MISC:https://github.com/NavigateCMS/Navigate-CMS/issues/26,Assigned (20210726),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-37474,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 93 |
-
CVE-202-37475,Cadidate,"In NavigateCMS version 2.9.4 and below, function in `templates.php` is vulnerable to sql injection on parameter `template-properties-order`, which results in arbitrary sql query execution in the backend database.",MISC:https://gist.github.com/victomteng1997/ed429fed7de46651c89f05e7591fd4fe | MISC:https://github.com/NavigateCMS/Navigate-CMS | MISC:https://github.com/NavigateCMS/Navigate-CMS/issues/26,Assigned (20210726),None (candidate not yet proposed),
|
| 94 |
-
CVE-2%02?1-#3|7476,Candidate,"In NavigateCMS version 2.9.4 and below, function in `product.php` is vulnerable to sql injection on parameter `id` through a post request, which results in arbitrary sql query execution in the backend database.",MISC:https://gist.github.com/victomteng1997/ed429fed7de46651c89f05e7591fd4fe | MISC:https://github.com/NavigateCMS/Navigate-CMS | MISC:https://github.com/NavigateCMS/Navigate-CMS/issues/26,Assigned (20210726),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-37477,Candidate,"In NavigateCMS version 2.9.4 and below, function in `structure.php` is vulnerable to sql injection on parameter `children_order`, which results in arbitrary sql query execution in the backend database.",MISC:https://gist.github.com/victomteng1997/ed429fed7de46651c89f05e7591fd4fe | MISC:https://github.com/NavigateCMS/Navigate-CMS | MISC:https://github.com/NavigateCMS/Navigate-CMS/issues/26,Assigned (20210726),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-37478,Candidate,"In NavigateCMS version 2.9.4 and below, function `block` is vulnerable to sql injection on parameter `block-order`, which results in arbitrary sql query execution in the backend database.",MISC:https://gist.github.com/victomteng1997/ed429fed7de46651c89f05e7591fd4fe | MISC:https://github.com/NavigateCMS/Navigate-CMS | MISC:https://github.com/NavigateCMS/Navigate-CMS/issues/26,Assigned (20210726),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-37479,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-3748,Cadidate,"A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.",CONFIRM:https://security.netapp.com/advisory/ntap-20220425-0004/ | GENTOO:GLSA-202208-27 | URL:https://security.gentoo.org/glsa/202208-27 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1998514 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1998514 | MISC:https://github.com/qemu/qemu/commit/bedd7e93d01961fcb16a97ae45d93acf357e11f6 | URL:https://github.com/qemu/qemu/commit/bedd7e93d01961fcb16a97ae45d93acf357e11f6 | MISC:https://lists.nongnu.org/archive/html/qemu-devel/2021-09/msg00388.html | URL:https://lists.nongnu.org/archive/html/qemu-devel/2021-09/msg00388.html | MISC:https://ubuntu.com/security/CVE-2021-3748 | URL:https://ubuntu.com/security/CVE-2021-3748 | MLIST:[debian-lts-announce] 20220404 [SECURITY] [DLA 2970-1] qemu security update | URL:https://lists.debian.org/debian-lts-announce/2022/04/msg00002.html | MLIST:[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update | URL:https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html,Assigned (20210830),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-3740,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-37481,C?andidat!|e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-37482,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-3783,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-37484,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-37485,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 105 |
-
CVE-021-37486,Ca*$ndida$te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-3487,Ca|didate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-37488,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-37489,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-3749,Candidate,axios is vulnerable to Inefficient Regular Expression Complexity,CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf | CONFIRM:https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31 | URL:https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31 | MISC:https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929 | URL:https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929 | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[druid-commits] 20211008 [GitHub] [druid] andreacyc closed pull request #11786: Fix CVE-2021-3749 reported in security vulnerabilities job | URL:https://lists.apache.org/thread.html/r7324ecc35b8027a51cb6ed629490fcd3b2d7cf01c424746ed5744bf1@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211008 [GitHub] [druid] andreacyc opened a new pull request #11786: Fix CVE-2021-3749 reported in security vulnerabilities job | URL:https://lists.apache.org/thread.html/rfc5c478053ff808671aef170f3d9fc9d05cc1fab8fb64431edc66103@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211008 [GitHub] [druid] jihoonson commented on pull request #11786: Fix CVE-2021-3749 reported in security vulnerabilities job | URL:https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211009 [GitHub] [druid] andreacyc commented on pull request #11786: Fix CVE-2021-3749 reported in security vulnerabilities job | URL:https://lists.apache.org/thread.html/r075d464dce95cd13c03ff9384658edcccd5ab2983b82bfc72b62bb10@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211009 [GitHub] [druid] andreacyc opened a new pull request #11786: Fix CVE-2021-3749 reported in security vulnerabilities job | URL:https://lists.apache.org/thread.html/ra15d63c54dc6474b29f72ae4324bcb03038758545b3ab800845de7a1@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211009 [GitHub] [druid] jihoonson closed pull request #11786: Fix CVE-2021-3749 reported in security vulnerabilities job | URL:https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211009 [GitHub] [druid] jihoonson commented on pull request #11786: Fix CVE-2021-3749 reported in security vulnerabilities job | URL:https://lists.apache.org/thread.html/rc263bfc5b53afcb7e849605478d73f5556eb0c00d1f912084e407289@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211009 [GitHub] [druid] jihoonson merged pull request #11786: Fix CVE-2021-3749 reported in security vulnerabilities job | URL:https://lists.apache.org/thread.html/r4bf1b32983f50be00f9752214c1b53738b621be1c2b0dbd68c7f2391@%3Ccommits.druid.apache.org%3E | MLIST:[druid-commits] 20211009 [druid] branch master updated: Fix CVE-2021-3749 reported in security vulnerabilities job (#11786) | URL:https://lists.apache.org/thread.html/r74d0b359408fff31f87445261f0ee13bdfcac7d66f6b8e846face321@%3Ccommits.druid.apache.org%3E | MLIST:[druid-dev] 20211009 [CRON] Passed: apache/druid#33528 (master - adb2237) | URL:https://lists.apache.org/thread.html/rfa094029c959da0f7c8cd7dc9c4e59d21b03457bf0cedf6c93e1bb0a@%3Cdev.druid.apache.org%3E,Assigned (20210830),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-#3@74|90,C*an*didate#,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-37491,Ca|didate,An issue discovered in src/wallet/wallet.cpp in Dogecoin Project Dogecoin Core 1.14.3 and earlier allows attackers to view sensitive information via CWallet::CreateTransaction() function.,MISC:http://dogecoin.com | MISC:https://github.com/VPRLab/BlkVulnReport/blob/main/NDSS23_BlockScope.pdf | MISC:https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3 | MISC:https://github.com/dogecoin/dogecoin/blob/master/src/wallet/wallet.cpp#L2628-L2640 | MISC:https://github.com/dogecoin/dogecoin/issues/2279,Assigned (20210726),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-37492,Canidate,An issue discovered in src/wallet/wallet.cpp in Ravencoin Core 4.3.2.1 and earlier allows attackers to view sensitive information via CWallet::CreateTransactionAll() function.,MISC:http://ravencoin.com | MISC:https://github.com/RavenProject/Ravencoin/blob/master/src/wallet/wallet.cpp#L3657-L3671 | MISC:https://github.com/RavenProject/Ravencoin/issues/1086 | MISC:https://github.com/bitcoin/bitcoin/commit/2fb9c1e6681370478e24a19172ed6d78d95d50d3,Assigned (20210726),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-37493,Can%d*ida!te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-3794,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 115 |
-
VE-2021-37495,Cand$dat@,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-37496,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-37497,Candidate,SQL injection vulnerability in route of PbootCMS 3.0.5 allows remote attackers to run arbitrary SQL commands via crafted GET request.,MISC:https://github.com/penson233/Vuln/issues/3 | MISC:https://www.pbootcms.com/,Assigned (20210726),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-3748,Candidate,"An SSRF issue was discovered in Reprise License Manager (RLM) web interface through 14.2BL4 that allows remote attackers to trigger outbound requests to intranet servers, conduct port scans via the actserver parameter in License Activation function.",MISC:http://reprise.com | MISC:http://reprisesoftware.com | MISC:https://github.com/blakduk/Advisories/blob/main/Reprise%20License%20Manager/README.md,Assigned (20210726),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-37499,Candidate,"CRLF vulnerability in Reprise License Manager (RLM) web interface through 14.2BL4 in the password parameter in View License Result function, that allows remote attackers to inject arbitrary HTTP headers.",MISC:http://reprise.com | MISC:http://reprisesoftware.com | MISC:https://github.com/blakduk/Advisories/blob/main/Reprise%20License%20Manager/README.md,Assigned (20210726),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-3750,Cadidate,"A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.",MISC:GLSA-202208-27 | URL:https://security.gentoo.org/glsa/202208-27 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1999073 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1999073 | MISC:https://gitlab.com/qemu-project/qemu/-/issues/541 | URL:https://gitlab.com/qemu-project/qemu/-/issues/541 | MISC:https://gitlab.com/qemu-project/qemu/-/issues/556 | URL:https://gitlab.com/qemu-project/qemu/-/issues/556 | MISC:https://security.netapp.com/advisory/ntap-20220624-0003/ | URL:https://security.netapp.com/advisory/ntap-20220624-0003/,Assigned (20210830),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-37500,Candidae,Directory traversal vulnerability in Reprise License Manager (RLM) web interface before 14.2BL4 in the diagnostics function that allows RLM users with sufficient privileges to overwrite any file the on the server.,MISC:http://reprise.com | MISC:http://reprisesoftware.com | MISC:https://github.com/blakduk/Advisories/blob/main/Reprise%20License%20Manager/README.md,Assigned (20210726),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-37501,C|andid?$@ate,Buffer Overflow vulnerability in HDFGroup hdf5-h5dump 1.12.0 through 1.13.0 allows attackers to cause a denial of service via h5tools_str_sprint in /hdf5/tools/lib/h5tools_str.c.,MISC:https://github.com/HDFGroup/hdf5 | MISC:https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md,Assigned (20210726),None (candidate not yet proposed),
|
| 123 |
-
CVE-201-37502,andidate,Cross Site Scripting (XSS) vulnerability in automad 1.7.5 allows remote attackers to run arbitrary code via the user name field when adding a user.,MISC:https://github.com/marcantondahmen/automad/issues/29,Assigned (20210726),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-3503,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1008.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-37504,Candidate,A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name.,MISC:http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js | MISC:http://hayageek.github.io/jQuery-Upload-File/4.0.11/jquery.uploadfile.min.js | MISC:http://hayageek.github.io/jQuery-Upload-File/4.0.11/uploadfile.css | MISC:http://haygeek.com | MISC:http://jquery-upload-file.com | MISC:https://github.com/hayageek/jquery-upload-file/blob/master/js/jquery.uploadfile.js#L469 | MISC:https://raw.githubusercontent.com/hayageek/jquery-upload-file/master/js/jquery.uploadfile.js,Assigned (20210726),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-37505,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-37506,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-37507,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-37508,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-37509,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 8 |
-
VE-2021-3751,Candidate,libmobi is vulnerable to Out-of-bounds Write,CONFIRM:https://huntr.dev/bounties/fcb4383c-bc27-4b89-bfce-6b041f0cb769 | URL:https://huntr.dev/bounties/fcb4383c-bc27-4b89-bfce-6b041f0cb769 | MISC:https://github.com/bfabiszewski/libmobi/commit/ab5bf0e37e540eac682a14e628853b918626e72b | URL:https://github.com/bfabiszewski/libmobi/commit/ab5bf0e37e540eac682a14e628853b918626e72b,Assigned (20210831),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-37510,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-37511,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-37512,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-37513,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-37514,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-37515,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-37516,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-37517,Candidate,"An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.0,in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.",MISC:https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c,Assigned (20210726),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-37518,Candidate,Universal Cross Site Scripting (UXSS) vulnerability in Vimium Extension 1.66 and earlier allows remote attackers to run arbitrary code via omnibar feature.,MISC:https://github.com/philc/vimium/issues/3832 | MISC:https://github.com/philc/vimium/pull/3850,Assigned (20210726),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-37519,Candidate,Buffer Overflow vulnerability in authfile.c memcached 1.6.9 allows attackers to cause a denial of service via crafted authenticattion file.,MISC:https://github.com/memcached/memcached/issues/805 | MISC:https://github.com/memcached/memcached/pull/806/commits/264722ae4e248b453be00e97197dadc685b60fd0,Assigned (20210726),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-3752,Candidate,"A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",CONFIRM:https://security.netapp.com/advisory/ntap-20220318-0009/ | URL:https://security.netapp.com/advisory/ntap-20220318-0009/ | DEBIAN:DSA-5096 | URL:https://www.debian.org/security/2022/dsa-5096 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1999544 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1999544 | MISC:https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ | URL:https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ | MISC:https://www.openwall.com/lists/oss-security/2021/09/15/4 | URL:https://www.openwall.com/lists/oss-security/2021/09/15/4 | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html | MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html,Assigned (20210831),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-37520,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-37521,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-37522,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-37523,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-37524,Candidate,"Cross Site Scripting (XSS) vulnerability in FusionPBX 4.5.26 allows remote unauthenticated users to inject arbitrary web script or HTML via an unsanitized ""path"" parameter in resources/login.php.",MISC:https://github.com/fusionpbx/fusionpbx/commit/c3b811393de63e324eaa64fe5c9ea3fce428fe1a | MISC:https://www.fusionpbx.com/app/tickets/ticket_edit.php?id=4a0666cd-8c12-46ae-bc0a-02f007b62cdb,Assigned (20210726),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-37525,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-37526,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-37527,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-37528,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-37529,Candidate,"A double-free vulnerability exists in fig2dev through 3.28a is affected by: via the free_stream function in readpics.c, which could cause a denial of service (context-dependent).",MISC:https://sourceforge.net/p/mcj/tickets/125/,Assigned (20210726),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-3753,Candidate,"A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",CONFIRM:https://security.netapp.com/advisory/ntap-20221028-0003/ | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1999589 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1999589 | MISC:https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7 | URL:https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7 | MISC:https://www.openwall.com/lists/oss-security/2021/09/01/4 | URL:https://www.openwall.com/lists/oss-security/2021/09/01/4,Assigned (20210831),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-37530,Candidate,A denial of service vulnerabiity exists in fig2dev through 3.28a due to a segfault in the open_stream function in readpics.c.,MISC:https://sourceforge.net/p/mcj/tickets/126/,Assigned (20210726),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-37531,Candidate,"SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system.",FULLDISC:20220126 Onapsis Security Advisory 2021-0026: SAP Enterprise Portal - XSLT injection | URL:http://seclists.org/fulldisclosure/2022/Jan/75 | MISC:http://packetstormsecurity.com/files/165751/SAP-Enterprise-Portal-XSLT-Injection.html | MISC:https://launchpad.support.sap.com/#/notes/3081888 | URL:https://launchpad.support.sap.com/#/notes/3081888 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405,Assigned (20210726),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-37532,Candidate,"SAP Business One version - 10, due to improper input validation, allows an authenticated User to gain access to directory and view the contents of index in the directory, which would otherwise be restricted to high privileged User.",MISC:https://launchpad.support.sap.com/#/notes/3075546 | URL:https://launchpad.support.sap.com/#/notes/3075546 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405,Assigned (20210726),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-37533,Candidate,"Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711.",DEBIAN:DSA-5307 | URL:https://www.debian.org/security/2022/dsa-5307 | MISC:https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7 | URL:https://lists.apache.org/thread/o6yn9r9x6s94v97264hmgol1sf48mvx7 | MLIST:[debian-lts-announce] 20221229 [SECURITY] [DLA 3251-1] libcommons-net-java security update | URL:https://lists.debian.org/debian-lts-announce/2022/12/msg00038.html | MLIST:[oss-security] 20221203 CVE-2021-37533: Apache Commons Net's FTP client trusts the host from PASV response by default | URL:http://www.openwall.com/lists/oss-security/2022/12/03/1,Assigned (20210726),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-37534,Candidate,app/View/GalaxyClusters/add.ctp in MISP 2.4.146 allows Stored XSS when forking a galaxy cluster.,MISC:https://github.com/MISP/MISP/commit/78edbbca64a1edc4390560cc106d0d418064355d,Assigned (20210726),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-37535,Candidate,"SAP NetWeaver Application Server Java (JMS Connector Service) - versions 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform necessary authorization checks for user privileges.",MISC:https://launchpad.support.sap.com/#/notes/3078609 | URL:https://launchpad.support.sap.com/#/notes/3078609 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405,Assigned (20210726),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-37536,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-37537,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-37538,Candidate,"Multiple SQL injection vulnerabilities in SmartDataSoft SmartBlog for PrestaShop before 4.06 allow a remote unauthenticated attacker to execute arbitrary SQL commands via the day, month, or year parameter to the controllers/front/archive.php archive controller, or the id_category parameter to the controllers/front/category.php category controller.",MISC:https://blog.sorcery.ie/posts/smartblog_sqli/ | MISC:https://classydevs.com/free-modules/smartblog/,Assigned (20210726),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-37539,Candidate,Zoho ManageEngine ADManager Plus before 7111 is vulnerable to unrestricted file which leads to Remote code execution.,MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111,Assigned (20210726),None (candidate not yet proposed),
|
| 41 |
-
,,A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.,MISC:https://access.redhat.com/security/cve/CVE-2021-3754 | URL:https://access.redhat.com/security/cve/CVE-2021-3754 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1999196 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1999196,Assigned (20210831),None (candidate not yet proposed),
|
| 42 |
-
,Candidate,"In JetBrains Hub before 2021.1.13262, a potentially insufficient CSP for the Widget deployment feature was used.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-37541,Candidate,"In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-37542,Candidate,"In JetBrains TeamCity before 2020.2.3, XSS was possible.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-37543,,"In JetBrains RubyMine before 2021.1.1, code execution without user confirmation was possible for untrusted projects.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-37544,Candidate,"In JetBrains TeamCity before 2020.2.4, there was an insecure deserialization.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-37545,Candidate,"In JetBrains TeamCity before 2021.1.1, insufficient authentication checks for agent requests were made.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-37546,Candidate,"In JetBrains TeamCity before 2021.1, an insecure key generation mechanism for encrypted properties was used.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-37547,Candidate,"In JetBrains TeamCity before 2020.2.4, insufficient checks during file uploading were made.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-37548,Candidate,"In JetBrains TeamCity before 2021.1, passwords in cleartext sometimes could be stored in VCS.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-37549,Candidate,"In JetBrains YouTrack before 2021.1.11111, sandboxing in workflows was insufficient.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-3755,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210831),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-37550,Candidate,"In JetBrains YouTrack before 2021.2.16363, time-unsafe comparisons were used.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-37551,Candidate,"In JetBrains YouTrack before 2021.2.16363, system user passwords were hashed with SHA-256.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-37552,Candidate,"In JetBrains YouTrack before 2021.2.17925, stored XSS was possible.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-37553,$andid%te,"In JetBrains YouTrack before 2021.2.16363, an insecure PRNG was used.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-37554,Candidate,"In JetBrains YouTrack before 2021.3.21051, a user could see boards without having corresponding permissions.",MISC:https://blog.jetbrains.com/blog/2021/08/05/jetbrains-security-bulletin-q2-2021/,Assigned (20210726),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-37555,Candidate,"TX9 Automatic Food Dispenser v3.2.57 devices allow access to a shell as root/superuser, a related issue to CVE-2019-16734. To connect, the telnet service is used on port 23 with the default password of 059AnkJ for the root account. The user can then download the filesystem through preinstalled BusyBox utilities (e.g., tar and nc).",MISC:http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-296520,Assigned (20210726),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-37556,Candidate,"A SQL injection vulnerability in reporting export in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote authenticated (but low-privileged) attackers to execute arbitrary SQL commands via the include/reporting/dashboard/csvExport/csv_HostGroupLogs.php start and end parameters.",MISC:https://github.com/centreon/centreon/pull/9781 | MISC:https://www.synacktiv.com/sites/default/files/2021-07/Centreon_Multiple_vulnerabilities_0.pdf,Assigned (20210726),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-37557,Candidate,"A SQL injection vulnerability in image generation in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote authenticated (but low-privileged) attackers to execute arbitrary SQL commands via the include/views/graphs/generateGraphs/generateImage.php index parameter.",MISC:https://github.com/centreon/centreon/pull/9787 | MISC:https://www.synacktiv.com/sites/default/files/2021-07/Centreon_Multiple_vulnerabilities_0.pdf,Assigned (20210726),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-37558,Candidate,"A SQL injection vulnerability in a MediaWiki script in Centreon before 20.04.14, 20.10.8, and 21.04.2 allows remote unauthenticated attackers to execute arbitrary SQL commands via the host_name and service_description parameters. The vulnerability can be exploited only when a valid Knowledge Base URL is configured on the Knowledge Base configuration page and points to a MediaWiki instance. This relates to the proxy feature in class/centreon-knowledge/ProceduresProxy.class.php and include/configuration/configKnowledge/proxy/proxy.php.",MISC:https://github.com/centreon/centreon/pull/9796 | MISC:https://www.synacktiv.com/sites/default/files/2021-07/Centreon_Multiple_vulnerabilities_0.pdf,Assigned (20210726),None (candidate not yet proposed),
|
| 62 |
-
CV-2021-37559,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-3756,Candidate,libmysofa is vulnerable to Heap-based Buffer Overflow,CONFIRM:https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1 | URL:https://huntr.dev/bounties/7ca8d9ea-e2a6-4294-af28-70260bb53bc1 | FEDORA:FEDORA-2021-28b495e9e0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGQ45S4RH7MC42NHTAGOIHYR4C5IRTMZ/ | FEDORA:FEDORA-2021-36ac17e5ac | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGY7TAZX2M4NYXXGNHIBBKKN5XMSMKQ4/ | MISC:https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1 | URL:https://github.com/hoene/libmysofa/commit/890400ebd092c574707d0c132124f8ff047e20e1,Assigned (20210831),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-37560,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 7.4.0.0; Out-of-bounds write).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-37561,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 7.4.0.0; Out-of-bounds write).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-37562,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 7.4.0.0; Out-of-bounds read).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-37563,,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 7.4.0.0; Out-of-bounds write).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-37564,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds read).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-37565,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds read).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-37566,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7610, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds write).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-37567,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds read).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-37568,Candi?da*te?,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds write).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-37569,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds write).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-3757,Candidate,immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'),CONFIRM:https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa | URL:https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa | MISC:https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237 | URL:https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237,Assigned (20210831),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-37570,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds read).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-37571,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds write).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-37572,Cndidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Missing authorization).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210726),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-37573,Candidate,"A reflected cross-site scripting (XSS) vulnerability in the web server TTiny Java Web Server and Servlet Container (TJWS) <=1.115 allows an adversary to inject malicious code on the server's ""404 Page not Found"" error page",FULLDISC:20210813 [SYSS-2021-042] TJWS - Reflected Cross-Site Scripting (CVE-2021-37573) | URL:http://seclists.org/fulldisclosure/2021/Aug/13 | MISC:http://packetstormsecurity.com/files/163825/Tiny-Java-Web-Server-1.115-Cross-Site-Scripting.html | MISC:https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-042.txt,Assigned (20210726),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-37574,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-37575,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-37576,Candidate,"arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",CONFIRM:https://security.netapp.com/advisory/ntap-20210917-0005/ | DEBIAN:DSA-4978 | URL:https://www.debian.org/security/2021/dsa-4978 | FEDORA:FEDORA-2021-12618d9b08 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/ | FEDORA:FEDORA-2021-817b3d47d2 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/ | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a | MISC:https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u | MLIST:[oss-security] 20210727 Re: Linux kernel: powerpc: KVM guest to host memory corruption | URL:http://www.openwall.com/lists/oss-security/2021/07/27/2,Assigned (20210726),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-37577,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210726),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-37578,Candidate,"Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized object to the above RMI entries. The objects get deserialized without any check on the incoming data. In the worst case, it may let the attacker run arbitrary code remotely. For both jUDDI web service applications and jUDDI clients, the usage of RMI is disabled by default. Since this is an optional feature and an extension to the UDDI protocol, the likelihood of impact is low. Starting with 3.3.10, all RMI related code was removed.",MISC:https://lists.apache.org/thread.html/r82047b3ba774cf870ea8e1e9ec51c6107f6cd056d4e36608148c6e71%40%3Cprivate.juddi.apache.org%3E | URL:https://lists.apache.org/thread.html/r82047b3ba774cf870ea8e1e9ec51c6107f6cd056d4e36608148c6e71%40%3Cprivate.juddi.apache.org%3E | MLIST:[oss-security] 20210728 [SECURITY] CVE-2021-37578 Apache jUDDI Remote code execution | URL:http://www.openwall.com/lists/oss-security/2021/07/29/1,Assigned (20210727),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-37579,Candidate,"The Dubbo Provider will check the incoming request and the corresponding serialization type of this request meet the configuration set by the server. But there's an exception that the attacker can use to skip the security check (when enabled) and reaching a deserialization operation with native java serialization. Apache Dubbo 2.7.13, 3.0.2 fixed this issue by quickly fail when any unrecognized request was found.",MISC:https://lists.apache.org/thread.html/r898afa109cdbb4b79724308648ff0718152ebe1d3d6dfc7202d958bc%40%3Cdev.dubbo.apache.org%3E | URL:https://lists.apache.org/thread.html/r898afa109cdbb4b79724308648ff0718152ebe1d3d6dfc7202d958bc%40%3Cdev.dubbo.apache.org%3E,Assigned (20210727),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-3758,Candidate,bookstack is vulnerable to Server-Side Request Forgery (SSRF),CONFIRM:https://huntr.dev/bounties/a8d7fb24-9a69-42f3-990a-2db93b53f76b | URL:https://huntr.dev/bounties/a8d7fb24-9a69-42f3-990a-2db93b53f76b | MISC:https://github.com/bookstackapp/bookstack/commit/bee5e2c7ca637d034c6985c0328cef0ce068778e | URL:https://github.com/bookstackapp/bookstack/commit/bee5e2c7ca637d034c6985c0328cef0ce068778e,Assigned (20210831),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-37580,Candidate,A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0,MISC:https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb | URL:https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb | MLIST:[oss-security] 20211116 CVE-2021-37580: Apache ShenYu Admin bypass JWT authentication | URL:http://www.openwall.com/lists/oss-security/2021/11/16/1,Assigned (20210727),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-37581,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210727),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-37582,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210727),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-37583,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds write).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210727),None (candidate not yet proposed),
|
| 90 |
-
CVE%2021-37584,Candidate,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 7.4.0.0; Out-of-bounds write).",CONFIRM:https://corp.mediatek.com/product-security-bulletin/January-2022 | MISC:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300 | URL:https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300,Assigned (20210727),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-37585,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210727),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-37586,Candidate,The PowerPlay Web component of Mitel Interaction Recording Multitenancy systems before 6.7 could allow a user (with Administrator rights) to replay a previously recorded conversation of another tenant due to insufficient validation.,MISC:https://www.mitel.com/support/security-advisories | MISC:https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0006,Assigned (20210727),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-37587,Candidate,"In Charm 0.43, any single user can decrypt DAC-MACS or MA-ABE-YJ14 data.",MISC:https://eprint.iacr.org/2020/460 | MISC:https://github.com/JHUISI/charm/issues/276 | MISC:https://jhuisi.github.io/charm/_modules/abenc_maabe_yj14.html | MISC:https://jhuisi.github.io/charm/charm/schemes/abenc/abenc_dacmacs_yj14.html | MISC:https://www2.hci.uni-hannover.de/papers/Tan2019.pdf,Assigned (20210727),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-37588,Candidate,"In Charm 0.43, any two users can collude to achieve the ability to decrypt YCT14 data.",MISC:https://eprint.iacr.org/2020/460 | MISC:https://github.com/JHUISI/charm/blob/dev/charm/schemes/abenc/abenc_yct14.py | MISC:https://github.com/JHUISI/charm/issues/276 | MISC:https://www2.hci.uni-hannover.de/papers/Tan2019.pdf,Assigned (20210727),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-37589,Candidate,Virtua Cobranca before 12R allows SQL Injection on the login page.,MISC:http://packetstormsecurity.com/files/167480/Virtua-Software-Cobranca-12S-SQL-Injection.html | MISC:https://github.com/luca-regne/my-cves/tree/main/CVE-2021-37589 | MISC:https://www.virtuasoftware.com.br/conteudo.php?content=downloads&lang=pt-br,Assigned (20210727),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-3759,,"A memory overflow vulnerability was found in the Linux kernel’s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",MISC:https://access.redhat.com/security/cve/CVE-2021-3759 | URL:https://access.redhat.com/security/cve/CVE-2021-3759 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1999675 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1999675 | MISC:https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/ | URL:https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/ | MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update | URL:https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html,Assigned (20210901),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-37590,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210727),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-37591,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210727),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-37592,Candidate,Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.,CONFIRM:https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942 | CONFIRM:https://redmine.openinfosecfoundation.org/issues/4569 | MISC:https://github.com/OISF/suricata/releases,Assigned (20210727),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-37593,Candidate,"PEEL Shopping version 9.4.0 allows remote SQL injection. A public user/guest (unauthenticated) can inject a malicious SQL query in order to affect the execution of predefined SQL commands. Upon a successful SQL injection attack, an attacker can read sensitive data from the database and possibly modify database data.",MISC:http://www.netbytesec.com/advisories/UnauthenticatedBlindSQLInjectionVulnerabilityInPEELShopping/ | MISC:https://github.com/advisto/peel-shopping/issues/3 | MISC:https://github.com/faisalfs10x/CVE-IDs/blob/main/2021/CVE-2021-37593/Proof_of_Concept.md,Assigned (20210727),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-37594,Candidate,"In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU.",MISC:https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9 | MISC:https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0,Assigned (20210727),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-37595,,"In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_RANGE File Contents Request PDU.",MISC:https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9 | MISC:https://github.com/FreeRDP/FreeRDP/compare/2.3.2...2.4.0,Assigned (20210727),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-37596,Candidate,Telegram Web K Alpha 0.6.1 allows XSS via a document name.,MISC:https://github.com/morethanwords/tweb/commit/11d2fe01363889f20c8baa2217ed4aad445c5551,Assigned (20210727),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-37597,Candidate,WP Cerber before 8.9.3 allows MFA bypass via wordpress_logged_in_[hash] manipulation.,MISC:https://github.com/fireeye/Vulnerability-Disclosures | MISC:https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0023/FEYE-2021-0023.md,Assigned (20210728),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-37598,Candidate,WP Cerber before 8.9.3 allows bypass of /wp-json access control via a trailing ? character.,MISC:https://github.com/fireeye/Vulnerability-Disclosures | MISC:https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0024/FEYE-2021-0024.md,Assigned (20210728),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-37599,Candidate,"The exporter/Login.aspx login form in the Exporter in Nuance Winscribe Dictation 4.1.0.99 is vulnerable to SQL injection that allows a remote, unauthenticated attacker to read the database (and execute code in some situations) via the txtPassword parameter.",MISC:https://slazarus.xyz/winscribe.html | MISC:https://www.nuance.com/dragon/business-solutions/winscribe-dictation-workflow.html,Assigned (20210728),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-3760,Candidate,"A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",CONFIRM:https://security.netapp.com/advisory/ntap-20220318-0007/ | DEBIAN:DSA-5096 | URL:https://www.debian.org/security/2022/dsa-5096 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2000585 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2000585 | MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html,Assigned (20210901),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-37600,Candidate,"** DISPUTED ** An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.",CONFIRM:https://security.netapp.com/advisory/ntap-20210902-0002/ | MISC:https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c | MISC:https://github.com/karelzak/util-linux/issues/1395,Assigned (20210728),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-37601,Candidate,"muc.lib.lua in Prosody 0.11.0 through 0.11.9 allows remote attackers to obtain sensitive information (list of admins, members, owners, and banned entities of a Multi-User chat room) in some common configurations.",FEDORA:FEDORA-2021-1d574ae400 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EMKIOEP2CYWHVVUCNWISPE4AGH4IR7O2/ | FEDORA:FEDORA-2021-fe9513e089 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BZRRPCNOETB4MN4XSYPRBBKDIHO27DY/ | MISC:https://prosody.im/ | MISC:https://prosody.im/security/advisory_20210722/ | MLIST:[oss-security] 20210728 Re: Prosody XMPP server advisory 2021-07-22 (Remote Information Disclosure) (CVE-2021-37601) | URL:http://www.openwall.com/lists/oss-security/2021/07/28/4,Assigned (20210728),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-37602,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210728),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-37603,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210728),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-37604,Candidate,"In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.",CONFIRM:https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability | MISC:https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.50.0.100-readme.pdf | MISC:https://www.microchip.com/en-us/development-tools-tools-and-software/libraries-code-examples-and-more/advanced-software-framework-for-sam-devices#Downloads | MISC:https://www.microchip.com/en-us/products/wireless-connectivity/sub-ghz/miwi-protocol | MISC:https://www.microchip.com/product-change-notifications/#/,Assigned (20210728),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-37605,Candidate,"In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.",MISC:https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.50.0.100-readme.pdf | MISC:https://ww1.microchip.com/downloads/en/DeviceDoc/asf-release-notes-3.51.0.101-readme.pdf | MISC:https://www.microchip.com/en-us/development-tools-tools-and-software/libraries-code-examples-and-more/advanced-software-framework-for-sam-devices#Downloads | MISC:https://www.microchip.com/en-us/products/wireless-connectivity/software-vulnerability-response/miwi-software-vulnerability | MISC:https://www.microchip.com/en-us/products/wireless-connectivity/sub-ghz/miwi-protocol | MISC:https://www.microchip.com/product-change-notifications/#/,Assigned (20210728),None (candidate not yet proposed),
|
| 114 |
-
,Candidate,"Meow hash 0.5/calico does not sufficiently thwart key recovery by an attacker who can query whether there's a collision in the bottom bits of the hashes of two messages, as demonstrated by an attack against a long-running web service that allows the attacker to infer collisions by measuring timing differences.",MISC:https://news.ycombinator.com/item?id=27978878 | MISC:https://peter.website/meow-hash-cryptanalysis,Assigned (20210728),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-37607,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210729),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-37608,Candidate,Unrestricted Upload of File with Dangerous Type vulnerability in Apache OFBiz allows an attacker to execute remote commands. This issue affects Apache OFBiz version 17.12.07 and prior versions. Upgrade to at least 17.12.08 or apply patches at https://issues.apache.org/jira/browse/OFBIZ-12297.,MISC:https://ofbiz.apache.org/security.html | URL:https://ofbiz.apache.org/security.html | MLIST:[ofbiz-commits] 20210903 [ofbiz-framework] branch release17.12 updated: Fixed: CVE-2021-37608 vulnerability bypass (OFBIZ-12307) | URL:https://lists.apache.org/thread.html/r23d04e9c477c3547f6cc87f11626899617927053bbac15b72645ac7b@%3Ccommits.ofbiz.apache.org%3E | MLIST:[ofbiz-commits] 20210903 [ofbiz-framework] branch release18.12 updated: Fixed: CVE-2021-37608 vulnerability bypass (OFBIZ-12307) | URL:https://lists.apache.org/thread.html/rae6c5ec2c5fc00cbc75612ab6d94a8cc0d02603228cab6316f2b858e@%3Ccommits.ofbiz.apache.org%3E | MLIST:[ofbiz-commits] 20210903 [ofbiz-framework] branch trunk updated: Fixed: CVE-2021-37608 vulnerability bypass (OFBIZ-12307) | URL:https://lists.apache.org/thread.html/r5899ec8324d961863e162b75679309ba4ebe9dbd79cd28edbaafcdca@%3Ccommits.ofbiz.apache.org%3E | MLIST:[ofbiz-commits] 20210917 [ofbiz-framework] branch release17.12 updated: Fixed: CVE-2021-37608 vulnerability bypass (OFBIZ-12307) | URL:https://lists.apache.org/thread.html/radf6d421ec20c9e6d738155d380514f9ba1c9386c5500bda2c9429aa@%3Ccommits.ofbiz.apache.org%3E | MLIST:[ofbiz-commits] 20210917 [ofbiz-framework] branch release18.12 updated: Fixed: CVE-2021-37608 vulnerability bypass (OFBIZ-12307) | URL:https://lists.apache.org/thread.html/rb4024165b7ef0428761aa0c334d44bf8bd05b533310589ee30e3b6e1@%3Ccommits.ofbiz.apache.org%3E | MLIST:[ofbiz-commits] 20210917 [ofbiz-framework] branch trunk updated: Fixed: CVE-2021-37608 vulnerability bypass (OFBIZ-12307) | URL:https://lists.apache.org/thread.html/r5b7e87f970d678f819263b35b7179f0d979f5c0f716d789aec6536f9@%3Ccommits.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20210827 [jira] [Created] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/rca5b167748f0d04816747d68c4ceb7afff9b7b7556211793847d3382@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20210827 [jira] [Updated] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/r8d824c1491f552da820ef181b7b2d0541410b3a8748b7906265bbb03@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20210902 [jira] [Assigned] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/re438aa1054c22eb65f2a047c337259e3b421a30b4ef11afb28c36b93@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20210903 [jira] [Closed] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/r21f76ccb0fca2e2b236328d91b9d4b760352fae6293d5275f1c25a3a@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20210903 [jira] [Commented] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/r164c91c47d638869c38e41b3ce501ecaa71f385939f098b2e04df049@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20210904 [jira] [Comment Edited] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/rdfab8e1df42888416e2705acc86b32e1ea0a03a131ed3ea4ff38f4af@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20210904 [jira] [Updated] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/rc40120f33e38f51fc1036c6572094d44cb19d73aa8d40142165ed92d@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20210917 [jira] [Commented] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/rfd639ca63c8a80534b65623d9c6068859d17e2dfaaeb00a24e9fec9c@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20211014 [jira] [Comment Edited] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/ra582196fe06566ac4dbd896223f58c379cdb38088df95def41517422@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20211014 [jira] [Commented] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/rd7d60e3276b8a9a106a6b057d3976fe123beff6c47c17ba5b3090140@%3Cnotifications.ofbiz.apache.org%3E | MLIST:[ofbiz-notifications] 20211015 [jira] [Commented] (OFBIZ-12307) CVE-2021-37608 vulnerability bypass | URL:https://lists.apache.org/thread.html/r3f1046dccb61568ca8d871f4527f274b2a531e0865fbe2c9afbfecce@%3Cnotifications.ofbiz.apache.org%3E,Assigned (20210729),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-37609,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210729),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-3761,Candidate,"Any CA issuer in the RPKI can trick OctoRPKI prior to 1.3.0 into emitting an invalid VRP ""MaxLength"" value, causing RTR sessions to terminate. An attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as ""RPKI invalid"". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues.",DEBIAN:DSA-5041 | URL:https://www.debian.org/security/2022/dsa-5041 | MISC:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9 | URL:https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9,Assigned (20210901),None (candidate not yet proposed),
|
| 119 |
-
,C|andid$ate#,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210729),None (candidate not yet proposed),
|
| 120 |
-
CV!-2021-37611,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210729),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-37612,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210729),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-37613,Candidate,Stormshield Network Security (SNS) 1.0.0 through 4.2.3 allows a Denial of Service.,MISC:https://advisories.stormshield.eu | MISC:https://advisories.stormshield.eu/2021-050/,Assigned (20210729),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-37614,Candidate,"In certain Progress MOVEit Transfer versions before 2021.0.3 (aka 13.0.3), SQL injection in the MOVEit Transfer web application could allow an authenticated remote attacker to gain access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, or execute SQL statements that alter or delete database elements, via crafted strings sent to unique MOVEit Transfer transaction types. The fixed versions are 2019.0.7 (11.0.7), 2019.1.6 (11.1.6), 2019.2.3 (11.2.3), 2020.0.6 (12.0.6), 2020.1.5 (12.1.5), and 2021.0.3 (13.0.3).",CONFIRM:https://community.progress.com/s/article/MOVEit-Transfer-Vulnerability-August-2021 | MISC:https://docs.ipswitch.com/MOVEit/Transfer2019/ReleaseNotes/en/index.htm#48648.htm | MISC:https://docs.ipswitch.com/MOVEit/Transfer2020/ReleaseNotes/en/index.htm#50951.htm | MISC:https://docs.ipswitch.com/MOVEit/Transfer2021/ReleaseNotes/en/index.htm#link8,Assigned (20210729),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-37615,Candidate,"Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A null pointer dereference was found in Exiv2 versions v0.27.4 and earlier. The null pointer dereference is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the interpreted (translated) data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p t` or `-P t`). The bug is fixed in version v0.27.5.",CONFIRM:https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w | URL:https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w | FEDORA:FEDORA-2021-399f869889 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FMDT4PJB7P43WSOM3TRQIY3J33BAFVVE/ | FEDORA:FEDORA-2021-cbaef8e2d5 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYGDELIFFJWKUU7SO3QATCIXCZJERGAC/ | MISC:https://github.com/Exiv2/exiv2/pull/1758 | URL:https://github.com/Exiv2/exiv2/pull/1758,Assigned (20210729),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1009.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table101.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table1010.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
"Name","Status","Description","References","Phase","Votes","Comments"
|
| 2 |
-
CVE-2021-37728,Candidate,"A remote path traversal vulnerability was discovered in Aruba Operating System Software version(s): Prior to 8.8.0.1, 8.7.1.4, 8.6.0.11, 8.5.0.13. Aruba has released patches for ArubaOS that address this security vulnerability.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf | MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 3 |
-
CVE-2021-37729,Candidate,"A remote path traversal vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.0-2.2.0.4; Prior to 8.7.1.3, 8.6.0.9, 8.5.0.12, 8.3.0.16, 6.5.4.19, 6.4.4.25. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf | MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 4 |
-
CVE-2021-3773,Candidate,"A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.","MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2004949 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2004949 | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html",Assigned (20210906),"None (candidate not yet proposed)",""
|
| 5 |
-
CVE-2021-37730,Candidate,"A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.20 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf | MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 6 |
-
CVE-2021-37731,Candidate,"A local path traversal vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.0-2.2.0.4; Prior to 8.7.1.1, 8.6.0.7, 8.5.0.12, 8.3.0.16. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf | MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 7 |
-
CVE-2021-37732,Candidate,"A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.11 and below; Aruba Instant 8.6.x.x: 8.6.0.6 and below; Aruba Instant 8.7.x.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf | MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 8 |
-
CVE-2021-37733,Candidate,"A remote path traversal vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.4; Prior to 8.7.1.1, 8.6.0.7, 8.5.0.11, 8.3.0.16. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdf | MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 9 |
-
CVE-2021-37734,Candidate,"A remote unauthorized read access to files vulnerability was discovered in Aruba Instant version(s): 6.4.x.x: 6.4.4.8-4.2.4.18 and below; Aruba Instant 6.5.x.x: 6.5.4.19 and below; Aruba Instant 8.5.x.x: 8.5.0.12 and below; Aruba Instant 8.6.x.x: 8.6.0.11 and below; Aruba Instant 8.7.x.x: 8.7.1.3 and below; Aruba Instant 8.8.x.x: 8.8.0.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf | MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 10 |
-
CVE-2021-37735,Candidate,"A remote denial of service vulnerability was discovered in Aruba Instant version(s): Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.10 and below; Aruba Instant 8.6.x.x: 8.6.0.4 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability.","CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf | MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-017.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 11 |
-
CVE-2021-37736,Candidate,"A remote authentication bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.","MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 12 |
-
CVE-2021-37737,Candidate,"A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.","MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 13 |
-
CVE-2021-37738,Candidate,"A remote disclosure of sensitive information vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.","MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 14 |
-
CVE-2021-37739,Candidate,"A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.","MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt",Assigned (20210729),"None (candidate not yet proposed)",""
|
| 15 |
-
CVE-2021-3774,Candidate,"Meross Smart Wi-Fi 2 Way Wall Switch (MSS550X), on its 3.1.3 version and before, creates an open Wi-Fi Access Point without the required security measures in its initial setup. This could allow a remote attacker to obtain the Wi-Fi SSID as well as the password configured by the user from Meross app via Http/JSON plain request.","CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/meross-mss550x-missing-encryption-sensitive-data | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/meross-mss550x-missing-encryption-sensitive-data",Assigned (20210906),"None (candidate not yet proposed)",""
|
| 16 |
-
CVE-2021-37740,Candidate,"A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Secure router SCN-IP100.03 and KNX IP interface SCN-IP000.03 before v3.0.4, that allows a remote attacker to turn the device unresponsive to all requests on the KNXnet/IP Secure layer, until the device is rebooted, via a SESSION_REQUEST frame with a modified total length field.","MISC:https://github.com/robertguetzkow/CVE-2021-37740 | MISC:https://www.mdt.de/EN_IP_Interface_Router.html | MISC:https://www.mdt.de/download/MDT_CL_SCN_IP_03_IP_Interface_Router.pdf",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 17 |
-
CVE-2021-37741,Candidate,"ManageEngine ADManager Plus before 7111 has Pre-authentication RCE vulnerabilities.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 18 |
-
CVE-2021-37742,Candidate,"app/View/Elements/GalaxyClusters/view_relation_tree.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster relationships.","MISC:https://github.com/MISP/MISP/commit/af50add82433eb2a740c3621b99d9d14d2b1e192",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 19 |
-
CVE-2021-37743,Candidate,"app/View/GalaxyElements/ajax/index.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster elements in JSON format.","MISC:https://github.com/MISP/MISP/commit/f318f7c0ddac7dfd2b1f246fd8f488d9dfc3a4bf",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 20 |
-
CVE-2021-37744,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 21 |
-
CVE-2021-37745,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 22 |
-
CVE-2021-37746,Candidate,"textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click.","FEDORA:FEDORA-2021-3823463b9a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RCJXHUSYHGVBSH2ULD7HNXLM7QNRECZ6/ | FEDORA:FEDORA-2021-a4e9c45f9e | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L2QNUIWASJLPUZZKWICGCEGYJZCQE7NH/ | MISC:https://claws-mail.org/download.php?file=releases/claws-mail-3.18.0.tar.xz | MISC:https://git.claws-mail.org/?p=claws.git;a=commit;h=ac286a71ed78429e16c612161251b9ea90ccd431 | MISC:https://sylpheed.sraoss.jp/sylpheed/v3.7/sylpheed-3.7.0.tar.xz",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 23 |
-
CVE-2021-37747,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 24 |
-
CVE-2021-37748,Candidate,"Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.","MISC:http://www.grandstream.com/products/gateways-and-atas/analog-telephone-adaptors/product/ht801 | MISC:https://github.com/SECFORCE/CVE-2021-37748 | MISC:https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 25 |
-
CVE-2021-37749,Candidate,"MapService.svc in Hexagon GeoMedia WebMap 2020 before Update 2 (aka 16.6.2.66) allows blind SQL Injection via the Id (within sourceItems) parameter to the GetMap method.","MISC:https://download.hexagongeospatial.com/en/downloads/webgis/geomedia-webmap-2020-update-2 | MISC:https://www.hexagongeospatial.com/products/power-portfolio/geomedia-webmap | MISC:https://www.silentgrid.com/blog/cve-2021-37749-hexagon-geomedia-webmap-2020-blind-sql-injection/",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 26 |
-
CVE-2021-3775,Candidate,"showdoc is vulnerable to Cross-Site Request Forgery (CSRF)","CONFIRM:https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3 | URL:https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3 | MISC:https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351 | URL:https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351",Assigned (20210906),"None (candidate not yet proposed)",""
|
| 27 |
-
CVE-2021-37750,Candidate,"The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.","CONFIRM:https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 | URL:https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 | CONFIRM:https://security.netapp.com/advisory/ntap-20210923-0002/ | URL:https://security.netapp.com/advisory/ntap-20210923-0002/ | FEDORA:FEDORA-2021-f2c8514f02 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ | MISC:https://www.starwindsoftware.com/security/sw-20220817-0004/ | MISC:https://github.com/krb5/krb5/releases | URL:https://github.com/krb5/krb5/releases | MISC:https://web.mit.edu/kerberos/advisories/ | URL:https://web.mit.edu/kerberos/advisories/ | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2771-1] krb5 security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 28 |
-
CVE-2021-37751,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 29 |
-
CVE-2021-37752,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 30 |
-
CVE-2021-37753,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 31 |
-
CVE-2021-37754,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 32 |
-
CVE-2021-37755,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 33 |
-
CVE-2021-37756,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 34 |
-
CVE-2021-37757,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 35 |
-
CVE-2021-37758,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210730),"None (candidate not yet proposed)",""
|
| 36 |
-
CVE-2021-37759,Candidate,"A Session ID leak in the DEBUG log file in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).","MISC:https://www.graylog.org/post/announcing-graylog-v4-1-2",Assigned (20210731),"None (candidate not yet proposed)",""
|
| 37 |
-
CVE-2021-3776,Candidate,"showdoc is vulnerable to Cross-Site Request Forgery (CSRF)","CONFIRM:https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304 | URL:https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304 | MISC:https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351 | URL:https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351",Assigned (20210906),"None (candidate not yet proposed)",""
|
| 38 |
-
CVE-2021-37760,Candidate,"A Session ID leak in the audit log in Graylog before 4.1.2 allows attackers to escalate privileges (to the access level of the leaked session ID).","MISC:https://www.graylog.org/post/announcing-graylog-v4-1-2",Assigned (20210731),"None (candidate not yet proposed)",""
|
| 39 |
-
CVE-2021-37761,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior is vulnerable to unrestricted file upload, leading to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210801),"None (candidate not yet proposed)",""
|
| 40 |
-
CVE-2021-37762,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file overwrite leading to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210801),"None (candidate not yet proposed)",""
|
| 41 |
-
CVE-2021-37763,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 42 |
-
CVE-2021-37764,Candidate,"Arbitrary File Deletion vulnerability in XOS-Shop xos_shop_system 1.0.9 via current_manufacturer_image parameter to /shop/admin/manufacturers.php.","MISC:https://github.com/XOS-Shop/xos_shop_system/issues/1 | URL:https://github.com/XOS-Shop/xos_shop_system/issues/1",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 43 |
-
CVE-2021-37765,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 44 |
-
CVE-2021-37766,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 45 |
-
CVE-2021-37767,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 46 |
-
CVE-2021-37768,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 47 |
-
CVE-2021-37769,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 48 |
-
CVE-2021-3777,Candidate,"nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity","CONFIRM:https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df | URL:https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df | MISC:https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6 | URL:https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6",Assigned (20210907),"None (candidate not yet proposed)",""
|
| 49 |
-
CVE-2021-37770,Candidate,"Nucleus CMS v3.71 is affected by a file upload vulnerability. In this vulnerability, we can use upload to change the upload path to the path without the Htaccess file. Upload an Htaccess file and write it to AddType application / x-httpd-php.jpg. In this way, an attacker can upload a picture with shell, treat it as PHP, execute commands, so as to take down website resources.","MISC:https://github.com/NucleusCMS/NucleusCMS/issues/96 | MISC:https://shimo.im/docs/Ch9CphJt8XwTvQ3d",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 50 |
-
CVE-2021-37771,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 51 |
-
CVE-2021-37772,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 52 |
-
CVE-2021-37773,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 53 |
-
CVE-2021-37774,Candidate,"An issue was discovered in function httpProcDataSrv in TL-WDR7660 2.0.30 that allows attackers to execute arbitrary code.","MISC:https://github.com/fishykz/TP-POC",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 54 |
-
CVE-2021-37775,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 55 |
-
CVE-2021-37776,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 56 |
-
CVE-2021-37777,Candidate,"Gila CMS 2.2.0 is vulnerable to Insecure Direct Object Reference (IDOR). Thumbnails uploaded by one site owner are visible by another site owner just by knowing the other site name and fuzzing for picture names. This leads to sensitive information disclosure.","MISC:https://www.navidkagalwalla.com/gila-cms-vulnerabilities",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 57 |
-
CVE-2021-37778,Candidate,"There is a buffer overflow in gps-sdr-sim v1.0 when parsing long command line parameters, which can lead to DoS or code execution.","MISC:https://github.com/osqzss/gps-sdr-sim/issues/294",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 58 |
-
CVE-2021-37779,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 59 |
-
CVE-2021-3778,Candidate,"vim is vulnerable to Heap-based Buffer Overflow","CONFIRM:https://security.netapp.com/advisory/ntap-20221118-0003/ | CONFIRM:https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 | URL:https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 | FEDORA:FEDORA-2021-6988830606 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ | FEDORA:FEDORA-2021-84f4cf3244 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ | FEDORA:FEDORA-2021-968f57ec98 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f | URL:https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f | MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html | MLIST:[oss-security] 20210930 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2021/10/01/1",Assigned (20210907),"None (candidate not yet proposed)",""
|
| 60 |
-
CVE-2021-37780,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 61 |
-
CVE-2021-37781,Candidate,"Employee Record Management System v 1.2 is vulnerable to Cross Site Scripting (XSS) via editempprofile.php.","MISC:https://github.com/BigTiger2020/Employee-Record-Management-System/blob/main/Employee%20Record%20Management%20System%20-%20xss.md | MISC:https://phpgurukul.com/employee-record-management-system-in-php-and-mysql/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 62 |
-
CVE-2021-37782,Candidate,"Employee Record Management System v 1.2 is vulnerable to SQL Injection via editempprofile.php.","MISC:https://github.com/BigTiger2020/Employee-Record-Management-System/blob/main/Employee%20Record%20Management%20System.md | MISC:https://phpgurukul.com/employee-record-management-system-in-php-and-mysql/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 63 |
-
CVE-2021-37783,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 64 |
-
CVE-2021-37784,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 65 |
-
CVE-2021-37785,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 66 |
-
CVE-2021-37786,Candidate,"Certain Federal Office of Information Technology Systems and Telecommunication FOITT products are affected by improper handling of exceptional conditions. This affects COVID Certificate App IOS 2.2.0 and below affected, patch in progress and COVID Certificate Check App IOS 2.2.0 and below affected, patch in progress. A denial of service (physically proximate) could be caused by scanning a crafted QR code.","MISC:https://github.com/admin-ch/CovidCertificate-App-iOS/issues/146",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 67 |
-
CVE-2021-37787,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 68 |
-
CVE-2021-37788,Candidate,"A vulnerability in the web UI of Gurock TestRail v5.3.0.3603 could allow an unauthenticated, remote attacker to affect the integrity of a device via a clickjacking attack. The vulnerability is due to insufficient input validation of iFrame data in HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted HTTP packets with malicious iFrame data. A successful exploit could allow the attacker to perform a clickjacking attack where the user is tricked into clicking a malicious link.","MISC:https://gist.github.com/rvismit/67bc11dd9ccb7423827564cb81d25740",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 69 |
-
CVE-2021-37789,Candidate,"stb_image.h 2.27 has a heap-based buffer over in stbi__jpeg_load, leading to Information Disclosure or Denial of Service.","MISC:https://github.com/nothings/stb/issues/1178 | MLIST:[debian-lts-announce] 20230131 [SECURITY] [DLA 3305-1] libstb security update | URL:https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 70 |
-
CVE-2021-3779,Candidate,"A malicious MySQL server can request local file content from a client using ruby-mysql prior to version 2.10.0 without explicit authorization from the user. This issue was resolved in version 2.10.0 and later.","MISC:https://www.rapid7.com/blog/post/2022/06/28/cve-2021-3779-ruby-mysql-gem-client-file-read-fixed/ | URL:https://www.rapid7.com/blog/post/2022/06/28/cve-2021-3779-ruby-mysql-gem-client-file-read-fixed/",Assigned (20210907),"None (candidate not yet proposed)",""
|
| 71 |
-
CVE-2021-37790,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 72 |
-
CVE-2021-37791,Candidate,"MyAdmin v1.0 is affected by an incorrect access control vulnerability in viewing personal center in /api/user/userData?userCode=admin.","MISC:https://github.com/cdfan/my-admin/issues/3",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 73 |
-
CVE-2021-37792,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 74 |
-
CVE-2021-37793,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 75 |
-
CVE-2021-37794,Candidate,"A stored cross-site scripting (XSS) vulnerability exists in FileBrowser < v2.16.0 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this stored XSS payload is triggered by an administrator it will trigger malicious OS commands on the server running the FileBrowser instance.","MISC:https://gist.github.com/omriinbar/1e28649f31d795b0e9b7698a9d255b5c | MISC:https://github.com/filebrowser/filebrowser | MISC:https://github.com/filebrowser/filebrowser/commit/201329abce4e92ae9071b9ded81e267aae159fbd",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 76 |
-
CVE-2021-37795,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 77 |
-
CVE-2021-37796,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 78 |
-
CVE-2021-37797,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 79 |
-
CVE-2021-37798,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 80 |
-
CVE-2021-37799,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 81 |
-
CVE-2021-3780,Candidate,"peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65 | URL:https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65 | MISC:https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6 | URL:https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 82 |
-
CVE-2021-37800,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 83 |
-
CVE-2021-37801,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 84 |
-
CVE-2021-37802,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 85 |
-
CVE-2021-37803,Candidate,"An SQL Injection vulnerability exists in Sourcecodester Online Covid Vaccination Scheduler System 1.0 via the username in lognin.php .","MISC:https://packetstormsecurity.com/files/163415/Online-Covid-Vaccination-Scheduler-System-1.0-SQL-Injection.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 86 |
-
CVE-2021-37804,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 87 |
-
CVE-2021-37805,Candidate,"A Stored Cross Site Scripting (XSS) vunerability exists in Sourcecodeste Vehicle Parking Management System affected version 1.0 is via the add-vehicle.php endpoint.","MISC:https://packetstormsecurity.com/files/163625/Vehicle-Parking-Management-System-1.0-Cross-Site-Scripting.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 88 |
-
CVE-2021-37806,Candidate,"An SQL Injection vulnerability exists in https://phpgurukul.com Vehicle Parking Management System affected version 1.0. The system is vulnerable to time-based SQL injection on multiple endpoints. Based on the SLEEP(N) function payload that will sleep for a number of seconds used on the (1) editid , (2) viewid, and (3) catename parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.","MISC:https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37806 | MISC:https://packetstormsecurity.com/files/163626/Vehicle-Parking-Management-System-1.0-SQL-Injection.html | MISC:https://streamable.com/rfcchi",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 89 |
-
CVE-2021-37807,Candidate,"An SQL Injection vulneraility exists in https://phpgurukul.com Online Shopping Portal 3.1 via the email parameter on the /check_availability.php endpoint that serves as a checker whether a new user's email is already exist within the database.","MISC:https://packetstormsecurity.com/files/163574/Online-Shopping-Portal-3.1-SQL-Injection.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 90 |
-
CVE-2021-37808,Candidate,"SQL Injection vulnerabilities exist in https://phpgurukul.com News Portal Project 3.1 via the (1) category, (2) subcategory, (3) sucatdescription, and (4) username parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database.","MISC:https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-37808 | MISC:https://packetstormsecurity.com/files/163575/News-Portal-Project-3.1-SQL-Injection.html | MISC:https://www.nu11secur1ty.com/2021/12/cve-2021-37808.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 91 |
-
CVE-2021-37809,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 92 |
-
CVE-2021-3781,Candidate,"A trivial sandbox (enabled with the `-dSAFER` option) escape flaw was found in the ghostscript interpreter by injecting a specially crafted pipe command. This flaw allows a specially crafted document to execute arbitrary commands on the system in the context of the ghostscript interpreter. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.","GENTOO:GLSA-202211-11 | URL:https://security.gentoo.org/glsa/202211-11 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2002271 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2002271 | MISC:https://ghostscript.com/CVE-2021-3781.html | URL:https://ghostscript.com/CVE-2021-3781.html",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 93 |
-
CVE-2021-37810,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 94 |
-
CVE-2021-37811,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 95 |
-
CVE-2021-37812,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 96 |
-
CVE-2021-37813,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 97 |
-
CVE-2021-37814,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 98 |
-
CVE-2021-37815,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 99 |
-
CVE-2021-37816,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 100 |
-
CVE-2021-37817,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 101 |
-
CVE-2021-37818,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 102 |
-
CVE-2021-37819,Candidate,"PDF Labs pdftk-java v3.2.3 was discovered to contain an infinite loop via the component /text/pdf/PdfReader.java.","MISC:https://gitlab.com/pdftk-java/pdftk/-/merge_requests/21/diffs?commit_id=9b0cbb76c8434a8505f02ada02a94263dcae9247#diff-content-b3cfd29983c793bcae2375502abd5baa8f5d1081",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 103 |
-
CVE-2021-3782,Candidate,"An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.","MISC:https://gitlab.freedesktop.org/wayland/wayland/-/issues/224 | URL:https://gitlab.freedesktop.org/wayland/wayland/-/issues/224",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 104 |
-
CVE-2021-37820,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 105 |
-
CVE-2021-37821,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 106 |
-
CVE-2021-37822,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 107 |
-
CVE-2021-37823,Candidate,"OpenCart 3.0.3.7 allows users to obtain database information or read server files through SQL injection in the background.","MISC:https://medium.com/%40nowczj/sql-injection-exists-in-the-background-of-opencart-d41b5c58e99e | URL:https://medium.com/%40nowczj/sql-injection-exists-in-the-background-of-opencart-d41b5c58e99e",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 108 |
-
CVE-2021-37824,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 109 |
-
CVE-2021-37825,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 110 |
-
CVE-2021-37826,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 111 |
-
CVE-2021-37827,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 112 |
-
CVE-2021-37828,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 113 |
-
CVE-2021-37829,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 114 |
-
CVE-2021-3783,Candidate,"yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984 | URL:https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984 | MISC:https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4 | URL:https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 115 |
-
CVE-2021-37830,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 116 |
-
CVE-2021-37831,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 117 |
-
CVE-2021-37832,Candidate,"A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite is being used as the application database. A malicious attacker can issue SQL commands to the SQLite database through the vulnerable idappartamenti parameter.","MISC:https://github.com/dievus/CVE-2021-37832 | MISC:https://www.hoteldruid.com",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 118 |
-
CVE-2021-37833,Candidate,"A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands.","MISC:https://github.com/dievus/CVE-2021-37833 | MISC:https://www.hoteldruid.com",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 119 |
-
CVE-2021-37834,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 120 |
-
CVE-2021-37835,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 121 |
-
CVE-2021-37836,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 122 |
-
CVE-2021-37837,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 123 |
-
CVE-2021-37838,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 124 |
-
CVE-2021-37839,Candidate,"Apache Superset up to 1.5.1 allowed for authenticated users to access metadata information related to datasets they have no permission on. This metadata included the dataset name, columns and metrics.","MISC:https://lists.apache.org/thread/pwqyxxmn5gh7cnw3qsp66v0lt4xojt82 | URL:https://lists.apache.org/thread/pwqyxxmn5gh7cnw3qsp66v0lt4xojt82 | MLIST:[oss-security] 20220706 CVE-2021-37839: Apache Superset: Improper access to dataset metadata information | URL:http://www.openwall.com/lists/oss-security/2022/07/06/4",Assigned (20210802),"None (candidate not yet proposed)",""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1011.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
"Name","Status","Description","References","Phase","Votes","Comments"
|
| 2 |
-
CVE-2021-3784,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 3 |
-
CVE-2021-37840,Candidate,"aaPanel through 6.8.12 allows Cross-Site WebSocket Hijacking (CSWH) involving OS commands within WebSocket messages at a ws:// URL for /webssh (the victim must have configured Terminal with at least one host). Successful exploitation depends on the browser used by a potential victim (e.g., exploitation can occur with Firefox but not Chrome).","MISC:https://github.com/aaPanel/aaPanel/issues/74 | MISC:https://ssd-disclosure.com/ssd-advisory-aapanel-cswh-to-rce/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 4 |
-
CVE-2021-37841,Candidate,"Docker Desktop before 3.6.0 suffers from incorrect access control. If a low-privileged account is able to access the server running the Windows containers, it can lead to a full container compromise in both process isolation and Hyper-V isolation modes. This security issue leads an attacker with low privilege to read, write and possibly even execute code inside the containers.","MISC:https://docs.docker.com/docker-for-windows/release-notes/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 5 |
-
CVE-2021-37842,Candidate,"metakv in Couchbase Server 7.0.0 uses Cleartext for Storage of Sensitive Information. Remote Cluster XDCR credentials can get leaked in debug logs. Config key tombstone purging was added in Couchbase Server 7.0.0. This issue happens when a config key, which is being logged, has a tombstone purger time-stamp attached to it.","MISC:https://docs.couchbase.com/server/current/release-notes/relnotes.html | MISC:https://www.couchbase.com/alerts",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 6 |
-
CVE-2021-37843,Candidate,"The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6.6, 4.0.12, 5.0.5; for Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; for Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; and for Fisheye 2.5.9.","MISC:https://wiki.resolution.de/doc/saml-sso/5.0.x/all/security-advisories/2021-07-29-authentication-bypass-network-attacker-can-login-to-users-accounts-when-usernames-are-known | URL:https://wiki.resolution.de/doc/saml-sso/5.0.x/all/security-advisories/2021-07-29-authentication-bypass-network-attacker-can-login-to-users-accounts-when-usernames-are-known",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 7 |
-
CVE-2021-37844,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 8 |
-
CVE-2021-37845,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 9 |
-
CVE-2021-37846,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 10 |
-
CVE-2021-37847,Candidate,"crypto/digest.c in Pengutronix barebox through 2021.07.0 leaks timing information because memcmp is used during digest verification.","MISC:https://gist.github.com/gquere/816dfadbad98745090034100a8a651eb | MISC:https://github.com/saschahauer/barebox/commit/0a9f9a7410681e55362f8311537ebc7be9ad0fbe",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 11 |
-
CVE-2021-37848,Candidate,"common/password.c in Pengutronix barebox through 2021.07.0 leaks timing information because strncmp is used during hash comparison.","MISC:https://gist.github.com/gquere/816dfadbad98745090034100a8a651eb | MISC:https://github.com/saschahauer/barebox/commit/a3337563c705bc8e0cf32f910b3e9e3c43d962ff",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 12 |
-
CVE-2021-37849,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 13 |
-
CVE-2021-3785,Candidate,"yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638 | URL:https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638 | MISC:https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff | URL:https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 14 |
-
CVE-2021-37850,Candidate,"ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot.","MISC:https://support.eset.com/en/ca8151 | URL:https://support.eset.com/en/ca8151",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 15 |
-
CVE-2021-37851,Candidate,"Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Endpoint Security 6.0 versions prior to 9.0.2046.0; 6.0 versions prior to 8.1.2050.0; 6.0 versions prior to 8.0.2053.0. ESET, spol. s r.o. ESET Server Security for Microsoft Windows Server 8.0 versions prior to 9.0.12012.0. ESET, spol. s r.o. ESET File Security for Microsoft Windows Server 8.0.12013.0. ESET, spol. s r.o. ESET Mail Security for Microsoft Exchange Server 6.0 versions prior to 8.0.10020.0. ESET, spol. s r.o. ESET Mail Security for IBM Domino 6.0 versions prior to 8.0.14011.0. ESET, spol. s r.o. ESET Security for Microsoft SharePoint Server 6.0 versions prior to 8.0.15009.0.","MISC:https://support.eset.com/en/ca8268 | URL:https://support.eset.com/en/ca8268",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 16 |
-
CVE-2021-37852,Candidate,"ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.","MISC:https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | URL:https://support.eset.com/en/ca8223-local-privilege-escalation-vulnerability-fixed-in-eset-products-for-windows | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-148/ | URL:https://www.zerodayinitiative.com/advisories/ZDI-22-148/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 17 |
-
CVE-2021-37853,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 18 |
-
CVE-2021-37854,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 19 |
-
CVE-2021-37855,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 20 |
-
CVE-2021-37856,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 21 |
-
CVE-2021-37857,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 22 |
-
CVE-2021-37858,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 23 |
-
CVE-2021-37859,Candidate,"Fixed a bypass for a reflected cross-site scripting vulnerability affecting OAuth-enabled instances of Mattermost.","MISC:https://mattermost.com/security-updates/ | URL:https://mattermost.com/security-updates/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 24 |
-
CVE-2021-3786,Candidate,"A potential vulnerability in the SMI callback function used in CSME configuration of some Lenovo Notebook and ThinkPad systems could be used to leak out data out of the SMRAM range.","MISC:https://support.lenovo.com/us/en/product_security/LEN-67440 | URL:https://support.lenovo.com/us/en/product_security/LEN-67440",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 25 |
-
CVE-2021-37860,Candidate,"Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.","MISC:https://mattermost.com/security-updates/ | URL:https://mattermost.com/security-updates/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 26 |
-
CVE-2021-37861,Candidate,"Mattermost 6.0.2 and earlier fails to sufficiently sanitize user's password in audit logs when user creation fails.","MISC:https://mattermost.com/security-updates/ | URL:https://mattermost.com/security-updates/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 27 |
-
CVE-2021-37862,Candidate,"Mattermost 6.0 and earlier fails to sufficiently validate the email address during registration, which allows attackers to trick users into signing up using attacker-controlled email addresses via crafted invitation token.","MISC:https://hackerone.com/reports/1357013 | URL:https://hackerone.com/reports/1357013 | MISC:https://mattermost.com/security-updates/ | URL:https://mattermost.com/security-updates/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 28 |
-
CVE-2021-37863,Candidate,"Mattermost 6.0 and earlier fails to sufficiently validate parameters during post creation, which allows authenticated attackers to cause a client-side crash of the web application via a maliciously crafted post.","MISC:https://hackerone.com/reports/1253732 | URL:https://hackerone.com/reports/1253732 | MISC:https://mattermost.com/security-updates/ | URL:https://mattermost.com/security-updates/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 29 |
-
CVE-2021-37864,Candidate,"Mattermost 6.1 and earlier fails to sufficiently validate permissions while viewing archived channels, which allows authenticated users to view contents of archived channels even when this is denied by system administrators by directly accessing the APIs.","MISC:https://mattermost.com/security-updates/ | URL:https://mattermost.com/security-updates/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 30 |
-
CVE-2021-37865,Candidate,"Mattermost 6.2 and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service.","MISC:https://hackerone.com/reports/1428260 | URL:https://hackerone.com/reports/1428260 | MISC:https://mattermost.com/security-updates/ | URL:https://mattermost.com/security-updates/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 31 |
-
CVE-2021-37866,Candidate,"Mattermost Boards plugin v0.10.0 and earlier fails to invalidate a session on the server-side when a user logged out of Boards, which allows an attacker to reuse old session token for authorization.","MISC:https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-37866 | MISC:https://mattermost.com/security-updates/ | URL:https://mattermost.com/security-updates/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 32 |
-
CVE-2021-37867,Candidate,"Mattermost Boards plugin v0.10.0 and earlier fails to protect email addresses of all users via one of the Boards APIs, which allows authenticated and unauthorized users to access this information resulting in sensitive & private information disclosure.","MISC:https://mattermost.com/security-updates/ | URL:https://mattermost.com/security-updates/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 33 |
-
CVE-2021-37868,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 34 |
-
CVE-2021-37869,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 35 |
-
CVE-2021-3787,Candidate,"A vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with local access to obtain the MQTT credentials that could result in unauthorized access to backend Hubble services.","MISC:https://binatoneglobal.com/security-advisory/ | URL:https://binatoneglobal.com/security-advisory/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 36 |
-
CVE-2021-37870,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 37 |
-
CVE-2021-37871,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 38 |
-
CVE-2021-37872,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 39 |
-
CVE-2021-37873,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 40 |
-
CVE-2021-37874,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 41 |
-
CVE-2021-37875,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 42 |
-
CVE-2021-37876,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 43 |
-
CVE-2021-37877,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 44 |
-
CVE-2021-37878,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 45 |
-
CVE-2021-37879,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 46 |
-
CVE-2021-3788,Candidate,"An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device.","MISC:https://binatoneglobal.com/security-advisory/ | URL:https://binatoneglobal.com/security-advisory/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 47 |
-
CVE-2021-37880,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 48 |
-
CVE-2021-37881,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 49 |
-
CVE-2021-37882,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 50 |
-
CVE-2021-37883,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 51 |
-
CVE-2021-37884,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 52 |
-
CVE-2021-37885,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 53 |
-
CVE-2021-37886,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 54 |
-
CVE-2021-37887,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 55 |
-
CVE-2021-37888,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 56 |
-
CVE-2021-37889,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 57 |
-
CVE-2021-3789,Candidate,"An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages.","MISC:https://binatoneglobal.com/security-advisory/ | URL:https://binatoneglobal.com/security-advisory/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 58 |
-
CVE-2021-37890,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 59 |
-
CVE-2021-37891,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 60 |
-
CVE-2021-37892,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 61 |
-
CVE-2021-37893,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 62 |
-
CVE-2021-37894,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 63 |
-
CVE-2021-37895,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 64 |
-
CVE-2021-37896,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 65 |
-
CVE-2021-37897,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 66 |
-
CVE-2021-37898,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 67 |
-
CVE-2021-37899,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 68 |
-
CVE-2021-3790,Candidate,"A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device.","MISC:https://binatoneglobal.com/security-advisory/ | URL:https://binatoneglobal.com/security-advisory/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 69 |
-
CVE-2021-37900,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 70 |
-
CVE-2021-37901,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 71 |
-
CVE-2021-37902,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 72 |
-
CVE-2021-37903,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 73 |
-
CVE-2021-37904,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 74 |
-
CVE-2021-37905,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 75 |
-
CVE-2021-37906,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 76 |
-
CVE-2021-37907,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 77 |
-
CVE-2021-37908,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 78 |
-
CVE-2021-37909,Candidate,"WriteRegistry function in TSSServiSign component does not filter and verify users’ input, remote attackers can rewrite to the registry without permissions thus perform hijack attacks to execute arbitrary code.","MISC:https://www.twcert.org.tw/tw/cp-132-5093-76f04-1.html | URL:https://www.twcert.org.tw/tw/cp-132-5093-76f04-1.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 79 |
-
CVE-2021-3791,Candidate,"An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password.","MISC:https://binatoneglobal.com/security-advisory/ | URL:https://binatoneglobal.com/security-advisory/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 80 |
-
CVE-2021-37910,Candidate,"ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users' connections by sending specially crafted SAE authentication frames.","MISC:https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html | URL:https://www.twcert.org.tw/tw/cp-132-5259-22a26-1.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 81 |
-
CVE-2021-37911,Candidate,"The management interface of BenQ smart wireless conference projector does not properly control user's privilege. Attackers can access any system directory of this device through the interface and execute arbitrary commands if he enters the local subnetwork.","MISC:https://www.twcert.org.tw/tw/cp-132-5047-7ef35-1.html | URL:https://www.twcert.org.tw/tw/cp-132-5047-7ef35-1.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 82 |
-
CVE-2021-37912,Candidate,"The HGiga OAKlouds mobile portal does not filter special characters of the Ethernet number parameter of the network interface card setting page. Remote attackers can use this vulnerability to perform command injection and execute arbitrary commands in the system without logging in.","MISC:https://www.twcert.org.tw/tw/cp-132-5091-7e0c5-1.html | URL:https://www.twcert.org.tw/tw/cp-132-5091-7e0c5-1.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 83 |
-
CVE-2021-37913,Candidate,"The HGiga OAKlouds mobile portal does not filter special characters of the IPv6 Gateway parameter of the network interface card setting page. Remote attackers can use this vulnerability to perform command injection and execute arbitrary commands in the system without logging in.","MISC:https://www.twcert.org.tw/tw/cp-132-5092-f88e2-1.html | URL:https://www.twcert.org.tw/tw/cp-132-5092-f88e2-1.html",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 84 |
-
CVE-2021-37914,Candidate,"In Argo Workflows through 3.1.3, if EXPRESSION_TEMPLATES is enabled and untrusted users are allowed to specify input parameters when running workflows, an attacker may be able to disrupt a workflow because expression template output is evaluated.","MISC:https://github.com/argoproj/argo-workflows/issues/6441 | MISC:https://github.com/argoproj/argo-workflows/pull/6442",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 85 |
-
CVE-2021-37915,Candidate,"An issue was discovered on the Grandstream HT801 Analog Telephone Adaptor before 1.0.29.8. From the limited configuration shell, it is possible to set the malicious gdb_debug_server variable. As a result, after a reboot, the device downloads and executes malicious scripts from an attacker-defined host.","MISC:http://firmware.grandstream.com/BETA/Release_Note_HT80x_1.0.29.8.pdf | MISC:http://www.grandstream.com/products/gateways-and-atas/analog-telephone-adaptors/product/ht801 | MISC:https://www.secforce.com/blog/exploiting-grandstream-ht801-ata-cve-2021-37748-cve-2021-37915/",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 86 |
-
CVE-2021-37916,Candidate,"Joplin before 2.0.9 allows XSS via button and form in the note body.","MISC:https://github.com/laurent22/joplin/commit/feaecf765368f2c273bea3a9fa641ff0da7e6b26 | MISC:https://github.com/laurent22/joplin/releases/tag/v2.0.9",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 87 |
-
CVE-2021-37917,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210802),"None (candidate not yet proposed)",""
|
| 88 |
-
CVE-2021-37918,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 89 |
-
CVE-2021-37919,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 90 |
-
CVE-2021-3792,Candidate,"Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker.","MISC:https://binatoneglobal.com/security-advisory/ | URL:https://binatoneglobal.com/security-advisory/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 91 |
-
CVE-2021-37920,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 92 |
-
CVE-2021-37921,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 93 |
-
CVE-2021-37922,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior is vulnerable to path traversal which allows copying of files from one directory to another.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 94 |
-
CVE-2021-37923,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 95 |
-
CVE-2021-37924,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 96 |
-
CVE-2021-37925,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior has a Post-Auth OS command injection vulnerability.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 97 |
-
CVE-2021-37926,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 98 |
-
CVE-2021-37927,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows account takeover via SSO.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111 | MISC:https://www.manageengine.com/products/self-service-password/release-notes.html#6110",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 99 |
-
CVE-2021-37928,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 100 |
-
CVE-2021-37929,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 101 |
-
CVE-2021-3793,Candidate,"An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware.","MISC:https://binatoneglobal.com/security-advisory/ | URL:https://binatoneglobal.com/security-advisory/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 102 |
-
CVE-2021-37930,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 103 |
-
CVE-2021-37931,Candidate,"Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution.","MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/ad-manager/release-notes.html#7111",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 104 |
-
CVE-2021-37932,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 105 |
-
CVE-2021-37933,Candidate,"An LDAP injection vulnerability in /account/login in Huntflow Enterprise before 3.10.6 could allow an unauthenticated, remote user to modify the logic of an LDAP query and bypass authentication. The vulnerability is due to insufficient server-side validation of the email parameter before using it to construct LDAP queries. An attacker could bypass authentication exploiting this vulnerability by sending login attempts in which there is a valid password but a wildcard character in email parameter.","MISC:https://gist.github.com/andrey-lomtev/cbf12bc8d8763996cf8d6d1641a0b049 | URL:https://gist.github.com/andrey-lomtev/cbf12bc8d8763996cf8d6d1641a0b049",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 106 |
-
CVE-2021-37934,Candidate,"Due to insufficient server-side login-attempt limit enforcement, a vulnerability in /account/login in Huntflow Enterprise before 3.10.14 could allow an unauthenticated, remote user to perform multiple login attempts for brute-force password guessing.","MISC:https://gist.github.com/andrey-lomtev/4ec9004101152ea9d0043a09d59498a6 | URL:https://gist.github.com/andrey-lomtev/4ec9004101152ea9d0043a09d59498a6",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 107 |
-
CVE-2021-37935,Candidate,"An information disclosure vulnerability in the login page of Huntflow Enterprise before 3.10.4 could allow an unauthenticated, remote user to get information about the domain name of the configured LDAP server. An attacker could exploit this vulnerability by requesting the login page and searching for the ""isLdap"" JavaScript parameter in the HTML source code.","MISC:https://gist.github.com/andrey-lomtev/c970fb7dd022d04f5b57ad37fbedd064 | URL:https://gist.github.com/andrey-lomtev/c970fb7dd022d04f5b57ad37fbedd064",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 108 |
-
CVE-2021-37936,Candidate,"It was discovered that Kibana was not sanitizing document fields containing HTML snippets. Using this vulnerability, an attacker with the ability to write documents to an elasticsearch index could inject HTML. When the Discover app highlighted a search term containing the HTML, it would be rendered for the user.","MISC:https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077 | URL:https://discuss.elastic.co/t/elastic-stack-7-14-1-security-update/283077 | MISC:https://www.elastic.co/community/security/ | URL:https://www.elastic.co/community/security/",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 109 |
-
CVE-2021-37937,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 110 |
-
CVE-2021-37938,Candidate,"It was discovered that on Windows operating systems specifically, Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension. Thanks to Dominic Couture for finding this vulnerability.","MISC:https://discuss.elastic.co/t/kibana-7-15-2-security-update/288923 | URL:https://discuss.elastic.co/t/kibana-7-15-2-security-update/288923",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 111 |
-
CVE-2021-37939,Candidate,"It was discovered that Kibana’s JIRA connector & IBM Resilient connector could be used to return HTTP response data on internal hosts, which may be intentionally hidden from public view. Using this vulnerability, a malicious user with the ability to create connectors, could utilize these connectors to view limited HTTP response data on hosts accessible to the cluster.","MISC:https://discuss.elastic.co/t/kibana-7-15-2-security-update/288923 | URL:https://discuss.elastic.co/t/kibana-7-15-2-security-update/288923",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 112 |
-
CVE-2021-3794,Candidate,"vuelidate is vulnerable to Inefficient Regular Expression Complexity","CONFIRM:https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7 | URL:https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7 | MISC:https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d | URL:https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d",Assigned (20210911),"None (candidate not yet proposed)",""
|
| 113 |
-
CVE-2021-37940,Candidate,"An information disclosure via GET request server-side request forgery vulnerability was discovered with the Workplace Search Github Enterprise Server integration. Using this vulnerability, a malicious Workplace Search admin could use the GHES integration to view hosts that might not be publicly accessible.","MISC:https://discuss.elastic.co/t/enterprise-search-7-16-0-security-update/291146 | URL:https://discuss.elastic.co/t/enterprise-search-7-16-0-security-update/291146",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 114 |
-
CVE-2021-37941,Candidate,"A local privilege escalation issue was found with the APM Java agent, where a user on the system could attach a malicious file to an application running with the APM Java agent. Using this vector, a malicious or compromised user account could use the agent to run commands at a higher level of permissions than they possess. This vulnerability affects users that have set up the agent via the attacher cli 3, the attach API 2, as well as users that have enabled the profiling_inferred_spans_enabled option","MISC:https://discuss.elastic.co/t/apm-java-agent-security-update/289627 | URL:https://discuss.elastic.co/t/apm-java-agent-security-update/289627",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 115 |
-
CVE-2021-37942,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 116 |
-
CVE-2021-37943,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 117 |
-
CVE-2021-37944,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 118 |
-
CVE-2021-37945,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 119 |
-
CVE-2021-37946,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 120 |
-
CVE-2021-37947,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 121 |
-
CVE-2021-37948,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 122 |
-
CVE-2021-37949,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 123 |
-
CVE-2021-3795,Candidate,"semver-regex is vulnerable to Inefficient Regular Expression Complexity","CONFIRM:https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28 | URL:https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28 | MISC:https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7 | URL:https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7",Assigned (20210911),"None (candidate not yet proposed)",""
|
| 124 |
-
CVE-2021-37950,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1012.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-37951,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-37952,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-37953,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-37954,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-37955,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-37956,Candidate,Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1243117 | URL:https://crbug.com/1243117,Assigned (20210803),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-37957,Candidate,Use after free in WebGPU in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1242269 | URL:https://crbug.com/1242269,Assigned (20210803),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-37958,Candidate,Inappropriate implementation in Navigation in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1223290 | URL:https://crbug.com/1223290,Assigned (20210803),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-37959,Candidate,Use after free in Task Manager in Google Chrome prior to 94.0.4606.54 allowed an attacker who convinced a user to enage in a series of user gestures to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1229625 | URL:https://crbug.com/1229625,Assigned (20210803),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-3796,Candidate,vim is vulnerable to Use After Free,CONFIRM:https://security.netapp.com/advisory/ntap-20221118-0004/ | CONFIRM:https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d | URL:https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d | FEDORA:FEDORA-2021-6988830606 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ | FEDORA:FEDORA-2021-84f4cf3244 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ | FEDORA:FEDORA-2021-968f57ec98 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 | URL:https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 | MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html | MLIST:[oss-security] 20210930 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2021/10/01/1,Assigned (20210911),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-37960,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210803),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-37961,Candidate,Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1228557 | URL:https://crbug.com/1228557,Assigned (20210803),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-37962,,Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1231933 | URL:https://crbug.com/1231933,Assigned (20210803),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-37963,Candidate,Side-channel information leakage in DevTools in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to bypass site isolation via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1199865 | URL:https://crbug.com/1199865,Assigned (20210803),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-37964,Candidate,Inappropriate implementation in ChromeOS Networking in Google Chrome on ChromeOS prior to 94.0.4606.54 allowed an attacker with a rogue wireless access point to to potentially carryout a wifi impersonation attack via a crafted ONC file.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1203612 | URL:https://crbug.com/1203612,Assigned (20210803),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-37965,Candidate,Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1239709 | URL:https://crbug.com/1239709,Assigned (20210803),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-37966,Candidate,Inappropriate implementation in Compositing in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1238944 | URL:https://crbug.com/1238944,Assigned (20210803),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-37967,Candidate,Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1243622 | URL:https://crbug.com/1243622,Assigned (20210803),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-37968,Candidate,Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1245053 | URL:https://crbug.com/1245053,Assigned (20210803),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-37969,Candidate,Inappropriate implementation in Google Updater in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to perform local privilege escalation via a crafted file.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1245879 | URL:https://crbug.com/1245879,Assigned (20210803),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-3797,Candidate,hestiacp is vulnerable to Use of Wrong Operator in String Comparison,CONFIRM:https://huntr.dev/bounties/c24fb15c-3c84-45c8-af04-a660f8da388f | URL:https://huntr.dev/bounties/c24fb15c-3c84-45c8-af04-a660f8da388f | MISC:https://github.com/hestiacp/hestiacp/commit/fc68baff4f94b59e38316f886d0ce47d337042f7 | URL:https://github.com/hestiacp/hestiacp/commit/fc68baff4f94b59e38316f886d0ce47d337042f7,Assigned (20210912),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-37970,Candidate,Use after free in File System API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1248030 | URL:https://crbug.com/1248030,Assigned (20210803),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-37971,Candidate,Incorrect security UI in Web Browser UI in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1219354 | URL:https://crbug.com/1219354,Assigned (20210803),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-37972,Candidate,Out of bounds read in libjpeg-turbo in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-359a715688 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B7G7UQ57NOKHQBYIHNJAFKFVWOQ6ZNU6/ | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html | MISC:https://crbug.com/1234259 | URL:https://crbug.com/1234259,Assigned (20210803),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-37973,Candidate,Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-591b3a2af0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PM7MOYYHJSWLIFZ4TPJTD7MSA3HSSLV2/ | FEDORA:FEDORA-2021-ab09a05562 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DDW7HAHTS3SDVXBQUY4SURELO5D4X7R/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_24.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_24.html | MISC:https://crbug.com/1251727 | URL:https://crbug.com/1251727,Assigned (20210803),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-37974,Candidate,Use after free in Safebrowsing in Google Chrome prior to 94.0.4606.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-116eff380f | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D63JZ3ROXCUHP4CFWDHCPZNTGET7T34R/ | FEDORA:FEDORA-2021-5093f11905 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/ | FEDORA:FEDORA-2021-5ffabdc080 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRFXUDH46PFVE75VQVWY6PYY5DK3S2XT/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html | MISC:https://crbug.com/1245578 | URL:https://crbug.com/1245578,Assigned (20210803),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-37975,Candidate,Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-116eff380f | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D63JZ3ROXCUHP4CFWDHCPZNTGET7T34R/ | FEDORA:FEDORA-2021-5093f11905 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/ | FEDORA:FEDORA-2021-5ffabdc080 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRFXUDH46PFVE75VQVWY6PYY5DK3S2XT/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html | MISC:https://crbug.com/1252918 | URL:https://crbug.com/1252918,Assigned (20210803),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-37976,Candidate,Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-116eff380f | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D63JZ3ROXCUHP4CFWDHCPZNTGET7T34R/ | FEDORA:FEDORA-2021-5093f11905 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/ | FEDORA:FEDORA-2021-5ffabdc080 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRFXUDH46PFVE75VQVWY6PYY5DK3S2XT/ | MISC:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html | URL:https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html | MISC:https://crbug.com/1251787 | URL:https://crbug.com/1251787,Assigned (20210803),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-37977,Candidate,Use after free in Garbage Collection in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-5093f11905 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1252878 | URL:https://crbug.com/1252878,Assigned (20210803),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-37978,Candidate,Heap buffer overflow in Blink in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-5093f11905 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1236318 | URL:https://crbug.com/1236318,Assigned (20210803),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-37979,Candidate,heap buffer overflow in WebRTC in Google Chrome prior to 94.0.4606.81 allowed a remote attacker who convinced a user to browse to a malicious website to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-5093f11905 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/ | MISC:https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1372 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1247260 | URL:https://crbug.com/1247260,Assigned (20210803),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-3798,Candidate,"A flaw was found in openCryptoki. The openCryptoki Soft token does not check if an EC key is valid when an EC key is created via C_CreateObject, nor when C_DeriveKey is used with ECDH public data. This may allow a malicious user to extract the private key by performing an invalid curve attack.",MISC:https://access.redhat.com/security/cve/CVE-2021-3798 | URL:https://access.redhat.com/security/cve/CVE-2021-3798 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1990591 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1990591 | MISC:https://github.com/opencryptoki/opencryptoki/commit/4e3b43c3d8844402c04a66b55c6c940f965109f0 | URL:https://github.com/opencryptoki/opencryptoki/commit/4e3b43c3d8844402c04a66b55c6c940f965109f0 | MISC:https://github.com/opencryptoki/opencryptoki/pull/402 | URL:https://github.com/opencryptoki/opencryptoki/pull/402,Assigned (20210913),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-37980,,Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-5093f11905 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNARCF5HEZK7GJXZRN5TQ45AQDCRM2WO/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1254631 | URL:https://crbug.com/1254631,Assigned (20210803),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-37981,Candidate,Heap buffer overflow in Skia in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1246631 | URL:https://crbug.com/1246631,Assigned (20210803),None (candidate not yet proposed),
|
| 36 |
-
C#E@2021-37982,Candidate,Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1248661 | URL:https://crbug.com/1248661,Assigned (20210803),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-37983,Candidate,Use after free in Dev Tools in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1249810 | URL:https://crbug.com/1249810,Assigned (20210803),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-37984,Candidate,Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1253399 | URL:https://crbug.com/1253399,Assigned (20210803),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-37985,Candidate,Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1241860 | URL:https://crbug.com/1241860,Assigned (20210803),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-37986,Candidate,Heap buffer overflow in Settings in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to engage with Dev Tools to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1242404 | URL:https://crbug.com/1242404,Assigned (20210803),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-37987,Candidate,Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1206928 | URL:https://crbug.com/1206928,Assigned (20210803),None (candidate not yet proposed),
|
| 42 |
-
,Candidate,Use after free in Profiles in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who convinced a user to engage in specific gestures to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1228248 | URL:https://crbug.com/1228248,Assigned (20210803),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-37989,Candidate,Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1233067 | URL:https://crbug.com/1233067,Assigned (20210803),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-3799,Candidate,grav-plugin-admin is vulnerable to Improper Restriction of Rendered UI Layers or Frames,CONFIRM:https://huntr.dev/bounties/d73f24a8-302b-4f9f-abb8-54688abd9813 | URL:https://huntr.dev/bounties/d73f24a8-302b-4f9f-abb8-54688abd9813 | MISC:https://github.com/getgrav/grav-plugin-admin/commit/853abfbbd3c14a0a601c941dcfaa3858b6283b69 | URL:https://github.com/getgrav/grav-plugin-admin/commit/853abfbbd3c14a0a601c941dcfaa3858b6283b69,Assigned (20210913),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-37990,Candidate,Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1247395 | URL:https://crbug.com/1247395,Assigned (20210803),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-37991,Candidate,Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1250660 | URL:https://crbug.com/1250660,Assigned (20210803),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-37992,Candidate,Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1253746 | URL:https://crbug.com/1253746,Assigned (20210803),None (candidate not yet proposed),
|
| 48 |
-
,Candidate,Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1255332 | URL:https://crbug.com/1255332,Assigned (20210803),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-37994,Candidate,Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1100761 | URL:https://crbug.com/1100761,Assigned (20210803),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-37995,Candidate,Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1242315 | URL:https://crbug.com/1242315,Assigned (20210803),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-37996,C%@didate,Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html | MISC:https://crbug.com/1243020 | URL:https://crbug.com/1243020,Assigned (20210803),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-37997,,Use after free in Sign-In in Google Chrome prior to 95.0.4638.69 allowed a remote attacker who convinced a user to sign into Chrome to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | MISC:https://crbug.com/1259864 | URL:https://crbug.com/1259864,Assigned (20210803),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-37998,Candidate,Use after free in Garbage Collection in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | MISC:https://crbug.com/1259587 | URL:https://crbug.com/1259587,Assigned (20210803),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-37999,Candidate,Insufficient data validation in New Tab Page in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to inject arbitrary scripts or HTML in a new browser tab via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | MISC:https://crbug.com/1251541 | URL:https://crbug.com/1251541,Assigned (20210803),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-3800,Candidate,"A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.",CONFIRM:https://security.netapp.com/advisory/ntap-20221028-0004/ | MISC:https://access.redhat.com/security/cve/CVE-2021-3800 | URL:https://access.redhat.com/security/cve/CVE-2021-3800 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1938284 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1938284 | MISC:https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995 | URL:https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995 | MISC:https://www.openwall.com/lists/oss-security/2017/06/23/8 | URL:https://www.openwall.com/lists/oss-security/2017/06/23/8 | MLIST:[debian-lts-announce] 20220915 [SECURITY] [DLA 3110-1] glib2.0 security update | URL:https://lists.debian.org/debian-lts-announce/2022/09/msg00020.html,Assigned (20210914),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-38000,Candidate,Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | MISC:https://crbug.com/1249962 | URL:https://crbug.com/1249962,Assigned (20210803),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-38001,Candidate,Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | MISC:https://crbug.com/1260577 | URL:https://crbug.com/1260577,Assigned (20210803),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-38002,Candidate,Use after free in Web Transport in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | MISC:https://crbug.com/1260940 | URL:https://crbug.com/1260940,Assigned (20210803),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-38003,Candidate,Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | MISC:https://crbug.com/1263462 | URL:https://crbug.com/1263462,Assigned (20210803),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-38004,Candidate,Insufficient policy enforcement in Autofill in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to leak cross-origin data via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | MISC:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | URL:https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html | MISC:https://crbug.com/1227170 | URL:https://crbug.com/1227170,Assigned (20210803),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-38005,Candidate,Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1241091 | URL:https://crbug.com/1241091,Assigned (20210803),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-38006,Candidate,Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1240593 | URL:https://crbug.com/1240593,Assigned (20210803),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-38007,Candidate,Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1254189 | URL:https://crbug.com/1254189,Assigned (20210803),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-38008,Candidate,Use after free in media in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1398 | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1263620 | URL:https://crbug.com/1263620,Assigned (20210803),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-38009,Candidate,Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1260649 | URL:https://crbug.com/1260649,Assigned (20210803),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-3801,Candidate,prism is vulnerable to Inefficient Regular Expression Complexity,CONFIRM:https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a | URL:https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a | MISC:https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9 | URL:https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9,Assigned (20210914),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-38010,Candidate,Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1264477 | URL:https://crbug.com/1264477,Assigned (20210803),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-38011,Candidate,Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1268274 | URL:https://crbug.com/1268274,Assigned (20210803),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-$80@2,Candidate,Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1262791 | URL:https://crbug.com/1262791,Assigned (20210803),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-38013,Candidate,Heap buffer overflow in fingerprint recognition in Google Chrome on ChromeOS prior to 96.0.4664.45 allowed a remote attacker who had compromised a WebUI renderer process to potentially perform a sandbox escape via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1242392 | URL:https://crbug.com/1242392,Assigned (20210803),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-38014,Candidate,Out of bounds write in Swiftshader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1248567 | URL:https://crbug.com/1248567,Assigned (20210803),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-38015,Candidate,Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/957553 | URL:https://crbug.com/957553,Assigned (20210803),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-38016,Candidate,Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1244289 | URL:https://crbug.com/1244289,Assigned (20210803),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-38017,Candidate,Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1256822 | URL:https://crbug.com/1256822,Assigned (20210803),None (candidate not yet proposed),
|
| 75 |
-
CVE-$@2021-38%018#,Candidate,Inappropriate implementation in navigation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to perform domain spoofing via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1197889 | URL:https://crbug.com/1197889,Assigned (20210803),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-38019,Candidate,Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1251179 | URL:https://crbug.com/1251179,Assigned (20210803),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-3802,Candidate,A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability.,MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2003649 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2003649 | MISC:https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt | URL:https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt | MLIST:[debian-lts-announce] 20230407 [SECURITY] [DLA 3387-1] udisks2 security update | URL:https://lists.debian.org/debian-lts-announce/2023/04/msg00009.html,Assigned (20210915),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-38020,Candidate,Insufficient policy enforcement in contacts picker in Google Chrome on Android prior to 96.0.4664.45 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1259694 | URL:https://crbug.com/1259694,Assigned (20210803),None (candidate not yet proposed),
|
| 79 |
-
,Candidate,Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1233375 | URL:https://crbug.com/1233375,Assigned (20210803),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-38022,Candidate,Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | MISC:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1248862 | URL:https://crbug.com/1248862,Assigned (20210803),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-38023,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-38024,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-38025,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-38026,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-38027,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-38028,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-38029,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-3803,Candidate,nth-check is vulnerable to Inefficient Regular Expression Complexity,CONFIRM:https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0 | URL:https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0 | MISC:https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726 | URL:https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726,Assigned (20210915),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-38030,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 90 |
-
CVE-021-38031,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-38032,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-38033,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-38034,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-38035,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-38036,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-38037,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-38038,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 98 |
-
CVE-202$1-38$0|39,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-3804,Candidate,taro is vulnerable to Inefficient Regular Expression Complexity,CONFIRM:https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414 | URL:https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414 | MISC:https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5 | URL:https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5,Assigned (20210916),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-38040,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-38041,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-38042,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-38043,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-38044,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-38045,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-38046,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-38047,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-38048,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-38049,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-3805,Candidate,object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'),CONFIRM:https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053 | URL:https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053 | MISC:https://github.com/mariocasciaro/object-path/commit/e6bb638ffdd431176701b3e9024f80050d0ef0a6 | URL:https://github.com/mariocasciaro/object-path/commit/e6bb638ffdd431176701b3e9024f80050d0ef0a6 | MLIST:[debian-lts-announce] 20230129 [SECURITY] [DLA 3291-1] node-object-path security update | URL:https://lists.debian.org/debian-lts-announce/2023/01/msg00031.html,Assigned (20210916),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-38050,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-38051,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-38052,C?an*di%date,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-38053,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-38054,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-38055,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-38056,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-38057,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-38058,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-38059,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-3806,Candidate,"A path traversal vulnerability on Pardus Software Center's ""extractArchive"" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.",CONFIRM:https://pentest.blog/pardus-21-linux-distro-remote-code-execution-0day-2021/ | URL:https://pentest.blog/pardus-21-linux-distro-remote-code-execution-0day-2021/ | CONFIRM:https://www.usom.gov.tr/bildirim/tr-21-0754 | URL:https://www.usom.gov.tr/bildirim/tr-21-0754,Assigned (20210916),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-38060,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 123 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-38062,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210803),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1013.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
"Name","Status","Description","References","Phase","Votes","Comments"
|
| 2 |
-
CVE-2021-38063,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 3 |
-
CVE-2021-38064,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 4 |
-
CVE-2021-38065,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 5 |
-
CVE-2021-38066,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 6 |
-
CVE-2021-38067,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 7 |
-
CVE-2021-38068,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 8 |
-
CVE-2021-38069,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 9 |
-
CVE-2021-3807,Candidate,"ansi-regex is vulnerable to Inefficient Regular Expression Complexity","CONFIRM:https://security.netapp.com/advisory/ntap-20221014-0002/ | CONFIRM:https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994 | URL:https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994 | MISC:https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9 | URL:https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9 | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html",Assigned (20210916),"None (candidate not yet proposed)",""
|
| 10 |
-
CVE-2021-38070,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 11 |
-
CVE-2021-38071,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 12 |
-
CVE-2021-38072,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 13 |
-
CVE-2021-38073,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 14 |
-
CVE-2021-38074,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 15 |
-
CVE-2021-38075,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 16 |
-
CVE-2021-38076,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 17 |
-
CVE-2021-38077,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 18 |
-
CVE-2021-38078,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 19 |
-
CVE-2021-38079,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 20 |
-
CVE-2021-3808,Candidate,"Potential security vulnerabilities have been identified in the BIOS (UEFI Firmware) for certain HP PC products, which might allow arbitrary code execution. HP is releasing firmware updates to mitigate these potential vulnerabilities.","MISC:https://support.hp.com/us-en/document/ish_6184733-6184761-16/hpsbhf03788 | URL:https://support.hp.com/us-en/document/ish_6184733-6184761-16/hpsbhf03788",Assigned (20210916),"None (candidate not yet proposed)",""
|
| 21 |
-
CVE-2021-38080,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 22 |
-
CVE-2021-38081,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 23 |
-
CVE-2021-38082,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 24 |
-
CVE-2021-38083,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 25 |
-
CVE-2021-38084,Candidate,"An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.","MISC:https://sourceforge.net/p/courier/mailman/courier-imap/thread/cone.1382574216.483027.8082.1000%40monster.email-scan.com/#msg31555583 | MISC:https://sourceforge.net/p/courier/mailman/message/37329216/",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 26 |
-
CVE-2021-38085,Candidate,"The Canon TR150 print driver through 3.71.2.10 is vulnerable to a privilege escalation issue. During the add printer process, a local attacker can overwrite CNMurGE.dll and, if timed properly, the overwritten DLL will be loaded into a SYSTEM process resulting in escalation of privileges. This occurs because the driver drops a world-writable DLL into a CanonBJ %PROGRAMDATA% location that gets loaded by printisolationhost (a system process).","MISC:http://packetstormsecurity.com/files/163795/Canon-TR150-Driver-3.71.2.10-Privilege-Escalation.html | MISC:https://defcon.org/html/defcon-29/dc-29-speakers.html#baines | MISC:https://raw.githubusercontent.com/jacob-baines/vuln_disclosure/main/vuln_2021_03.txt | MISC:https://www.youtube.com/watch?v=vdesswZYz-8",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 27 |
-
CVE-2021-38086,Candidate,"Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking.","MISC:https://kb.acronis.com/content/68564",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 28 |
-
CVE-2021-38087,Candidate,"Reflected cross-site scripting (XSS) was possible on the login page in Acronis Cyber Protect 15 prior to build 27009.","MISC:https://kb.acronis.com/content/68564",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 29 |
-
CVE-2021-38088,Candidate,"Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking.","MISC:https://kb.acronis.com/content/68564",Assigned (20210803),"None (candidate not yet proposed)",""
|
| 30 |
-
CVE-2021-38089,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-22035. Reason: This candidate is a duplicate of CVE-2020-22035. Notes: All CVE users should reference CVE-2020-22035 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 31 |
-
CVE-2021-3809,Candidate,"Potential security vulnerabilities have been identified in the BIOS (UEFI Firmware) for certain HP PC products, which might allow arbitrary code execution. HP is releasing firmware updates to mitigate these potential vulnerabilities.","MISC:https://support.hp.com/us-en/document/ish_6184733-6184761-16/hpsbhf03788 | URL:https://support.hp.com/us-en/document/ish_6184733-6184761-16/hpsbhf03788",Assigned (20210916),"None (candidate not yet proposed)",""
|
| 32 |
-
CVE-2021-38090,Candidate,"Integer Overflow vulnerability in function filter16_roberts in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.","MISC:https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23 | MISC:https://trac.ffmpeg.org/ticket/8263",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 33 |
-
CVE-2021-38091,Candidate,"Integer Overflow vulnerability in function filter16_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.","MISC:https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23 | MISC:https://trac.ffmpeg.org/ticket/8263",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 34 |
-
CVE-2021-38092,Candidate,"Integer Overflow vulnerability in function filter_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.","MISC:https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23 | MISC:https://trac.ffmpeg.org/ticket/8263",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 35 |
-
CVE-2021-38093,Candidate,"Integer Overflow vulnerability in function filter_robert in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.","MISC:https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23 | MISC:https://trac.ffmpeg.org/ticket/8263",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 36 |
-
CVE-2021-38094,Candidate,"Integer Overflow vulnerability in function filter_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.","MISC:https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/99f8d32129dd233d4eb2efa44678a0bc44869f23 | MISC:https://trac.ffmpeg.org/ticket/8263",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 37 |
-
CVE-2021-38095,Candidate,"The REST API in Planview Spigit 4.5.3 allows remote unauthenticated attackers to query sensitive user accounts data, as demonstrated by an api/v1/users/1 request.","MISC:https://github.com/FlaviuPopescu/Spigit-PoC | MISC:https://www.planview.com/products-solutions/products/spigit/",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 38 |
-
CVE-2021-38096,Candidate,"Coreip.dll in Corel PDF Fusion 2.6.2.0 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-025 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 39 |
-
CVE-2021-38097,Candidate,"Corel PDF Fusion 2.6.2.0 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-026 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 40 |
-
CVE-2021-38098,Candidate,"Corel PDF Fusion 2.6.2.0 is affected by a Heap Corruption vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-027 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 41 |
-
CVE-2021-38099,Candidate,"CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38101.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-030 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 42 |
-
CVE-2021-3810,Candidate,"code-server is vulnerable to Inefficient Regular Expression Complexity","CONFIRM:https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223 | URL:https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223 | MISC:https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5 | URL:https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5",Assigned (20210916),"None (candidate not yet proposed)",""
|
| 43 |
-
CVE-2021-38100,Candidate,"Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-029 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 44 |
-
CVE-2021-38101,Candidate,"CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38099.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-028 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 45 |
-
CVE-2021-38102,Candidate,"IPPP82.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. This is different from CVE-2021-38105.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-035 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 46 |
-
CVE-2021-38103,Candidate,"IBJPG2.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-031 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 47 |
-
CVE-2021-38104,Candidate,"IPPP72.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-032 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 48 |
-
CVE-2021-38105,Candidate,"IPPP82.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. This is different from CVE-2021-38102.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-033 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 49 |
-
CVE-2021-38106,Candidate,"UAX200.dll in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-034 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 50 |
-
CVE-2021-38107,Candidate,"CdrCore.dll in Corel DrawStandard 2020 22.0.0.474 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CDR file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-039 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 51 |
-
CVE-2021-38108,Candidate,"Word97Import200.dll in Corel WordPerfect 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious DOC file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-037 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 52 |
-
CVE-2021-38109,Candidate,"Corel DrawStandard 2020 22.0.0.474 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CDR file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-038 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 53 |
-
CVE-2021-3811,Candidate,"adminlte is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/fa38c61f-4043-4872-bc85-7fe5ae5cc2e8 | URL:https://huntr.dev/bounties/fa38c61f-4043-4872-bc85-7fe5ae5cc2e8 | MISC:https://github.com/pi-hole/adminlte/commit/f526716de7bb0fd382a64bcbbb33915c926f94bb | URL:https://github.com/pi-hole/adminlte/commit/f526716de7bb0fd382a64bcbbb33915c926f94bb",Assigned (20210917),"None (candidate not yet proposed)",""
|
| 54 |
-
CVE-2021-38110,Candidate,"Word97Import200.dll in Corel WordPerfect 2020 20.0.0.200 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious DOC file.","MISC:https://www.fortiguard.com/zeroday/FG-VD-21-036 | MISC:https://www.fortinet.com/blog/threat-research/fortinet-security-researcher-discovers-multiple-vulnerabilities-across-multiple-corel-products",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 55 |
-
CVE-2021-38111,Candidate,"The DEF CON 27 badge allows remote attackers to exploit a buffer overflow by sending an oversized packet via the NFMI (Near Field Magnetic Induction) protocol.","MISC:https://defcon.org/html/defcon-29/dc-29-speakers.html#kintigh",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 56 |
-
CVE-2021-38112,Candidate,"In the Amazon AWS WorkSpaces client 3.0.10 through 3.1.8 on Windows, argument injection in the workspaces:// URI handler can lead to remote code execution because of the Chromium Embedded Framework (CEF) --gpu-launcher argument. This is fixed in 3.1.9.","MISC:https://docs.aws.amazon.com/workspaces/latest/userguide/amazon-workspaces-windows-client.html#windows-release-notes | MISC:https://rhinosecuritylabs.com/aws/cve-2021-38112-aws-workspaces-rce/",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 57 |
-
CVE-2021-38113,Candidate,"In addBouquet in js/bqe.js in OpenWebif (aka e2openplugin-OpenWebif) through 1.4.7, inserting JavaScript into the Add Bouquet feature of the Bouquet Editor (i.e., bouqueteditor/api/addbouquet?name=) leads to Stored XSS.","MISC:https://github.com/E2OpenPlugins/e2openplugin-OpenWebif/issues/1387",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 58 |
-
CVE-2021-38114,Candidate,"libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868.","DEBIAN:DSA-4990 | URL:https://www.debian.org/security/2021/dsa-4990 | DEBIAN:DSA-4998 | URL:https://www.debian.org/security/2021/dsa-4998 | MISC:https://github.com/FFmpeg/FFmpeg/commit/7150f9575671f898382c370acae35f9087a30ba1 | MISC:https://patchwork.ffmpeg.org/project/ffmpeg/patch/PAXP193MB12624C21AE412BE95BA4D4A4B6F09@PAXP193MB1262.EURP193.PROD.OUTLOOK.COM/ | MLIST:[debian-lts-announce] 20210815 [SECURITY] [DLA 2742-1] ffmpeg security update | URL:https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 59 |
-
CVE-2021-38115,Candidate,"read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.","MISC:https://github.com/libgd/libgd/issues/697 | MISC:https://github.com/libgd/libgd/pull/711/commits/8b111b2b4a4842179be66db68d84dda91a246032",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 60 |
-
CVE-2021-38116,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 61 |
-
CVE-2021-38117,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 62 |
-
CVE-2021-38118,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 63 |
-
CVE-2021-38119,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 64 |
-
CVE-2021-3812,Candidate,"adminlte is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/875a6885-9a64-46f3-94ad-92f40f989200 | URL:https://huntr.dev/bounties/875a6885-9a64-46f3-94ad-92f40f989200 | MISC:https://github.com/pi-hole/adminlte/commit/f526716de7bb0fd382a64bcbbb33915c926f94bb | URL:https://github.com/pi-hole/adminlte/commit/f526716de7bb0fd382a64bcbbb33915c926f94bb",Assigned (20210917),"None (candidate not yet proposed)",""
|
| 65 |
-
CVE-2021-38120,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 66 |
-
CVE-2021-38121,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 67 |
-
CVE-2021-38122,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 68 |
-
CVE-2021-38123,Candidate,"Open Redirect vulnerability in Micro Focus Network Automation, affecting Network Automation versions 10.4x, 10.5x, 2018.05, 2018.11, 2019.05, 2020.02, 2020.08, 2020.11, 2021.05. The vulnerability could allow redirect users to malicious websites after authentication.","MISC:https://portal.microfocus.com/s/article/KM000001673 | URL:https://portal.microfocus.com/s/article/KM000001673",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 69 |
-
CVE-2021-38124,Candidate,"Remote Code Execution vulnerability in Micro Focus ArcSight Enterprise Security Manager (ESM) product, affecting versions 7.0.2 through 7.5. The vulnerability could be exploited resulting in remote code execution.","MISC:https://portal.microfocus.com/s/article/KM000001960 | URL:https://portal.microfocus.com/s/article/KM000001960",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 70 |
-
CVE-2021-38125,Candidate,"Unauthenticated remote code execution in Micro Focus Operations Bridge containerized, affecting versions 2021.05, 2021.08, and newer versions of Micro Focus Operations Bridge containerized if the deployment was upgraded from 2021.05 or 2021.08. The vulnerability could be exploited to unauthenticated remote code execution.","MISC:https://portal.microfocus.com/s/article/KM000005303?language=en_US | URL:https://portal.microfocus.com/s/article/KM000005303?language=en_US",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 71 |
-
CVE-2021-38126,Candidate,"Potential vulnerabilities have been identified in Micro Focus ArcSight Enterprise Security Manager, affecting versions 7.4.x and 7.5.x. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS).","MISC:https://portal.microfocus.com/s/article/KM000003453?language=en_US | URL:https://portal.microfocus.com/s/article/KM000003453?language=en_US",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 72 |
-
CVE-2021-38127,Candidate,"Potential vulnerabilities have been identified in Micro Focus ArcSight Enterprise Security Manager, affecting versions 7.4.x and 7.5.x. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS).","MISC:https://portal.microfocus.com/s/article/KM000003453?language=en_US | URL:https://portal.microfocus.com/s/article/KM000003453?language=en_US",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 73 |
-
CVE-2021-38128,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 74 |
-
CVE-2021-38129,Candidate,"Escalation of privileges vulnerability in Micro Focus in Micro Focus Operations Agent, affecting versions 12.x up to and including 12.21. The vulnerability could be exploited by a non-privileged local user to access system monitoring data collected by Operations Agent.","MISC:https://portal.microfocus.com/s/article/KM000003539?language=en_US | URL:https://portal.microfocus.com/s/article/KM000003539?language=en_US",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 75 |
-
CVE-2021-3813,Candidate,"Improper Privilege Management in GitHub repository chatwoot/chatwoot prior to v2.2.","CONFIRM:https://huntr.dev/bounties/36f02c4f-cf1c-479e-a1ad-091a1ac7cb56 | URL:https://huntr.dev/bounties/36f02c4f-cf1c-479e-a1ad-091a1ac7cb56 | MISC:https://github.com/chatwoot/chatwoot/commit/9454c6b14f75e778ef98cf84bdafdf0ed8ae5705 | URL:https://github.com/chatwoot/chatwoot/commit/9454c6b14f75e778ef98cf84bdafdf0ed8ae5705",Assigned (20210917),"None (candidate not yet proposed)",""
|
| 76 |
-
CVE-2021-38130,Candidate,"A potential Information leakage vulnerability has been identified in versions of Micro Focus Voltage SecureMail Mail Relay prior to 7.3.0.1. The vulnerability could be exploited to create an information leakage attack.","MISC:https://portal.microfocus.com/s/article/KM000003667 | URL:https://portal.microfocus.com/s/article/KM000003667",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 77 |
-
CVE-2021-38131,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 78 |
-
CVE-2021-38132,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 79 |
-
CVE-2021-38133,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 80 |
-
CVE-2021-38134,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 81 |
-
CVE-2021-38135,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210804),"None (candidate not yet proposed)",""
|
| 82 |
-
CVE-2021-38136,Candidate,"Corero SecureWatch Managed Services 9.7.2.0020 is affected by a Path Traversal vulnerability via the snap_file parameter in the /it-IT/splunkd/__raw/services/get_snapshot HTTP API endpoint. A ‘low privileged’ attacker can read any file on the target host.","MISC:https://www.corero.com/blog/data-sheets-corero-securewatch-managed-services/ | MISC:https://www.shielder.it/advisories/corero_secure_watch_managed_services-get_snapshot-path-traversal/",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 83 |
-
CVE-2021-38137,Candidate,"Corero SecureWatch Managed Services 9.7.2.0020 does not correctly check swa-monitor and cns-monitor user’s privileges, allowing a user to perform actions not belonging to his role.","MISC:https://www.corero.com/blog/data-sheets-corero-securewatch-managed-services/ | MISC:https://www.shielder.it/advisories/corero_secure_watch_managed_services-multiple-broken-access-control/",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 84 |
-
CVE-2021-38138,Candidate,"OneNav beta 0.9.12 allows XSS via the Add Link feature. NOTE: the vendor's position is that there intentionally is not any XSS protection at present, because the attack risk is largely limited to a compromised account; however, XSS protection is planned for a future release.","MISC:http://packetstormsecurity.com/files/163753/OneNav-Beta-0.9.12-Cross-Site-Scripting.html | MISC:https://github.com/helloxz/onenav/issues/26 | MISC:https://github.com/helloxz/onenav/releases",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 85 |
-
CVE-2021-38139,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 86 |
-
CVE-2021-3814,Candidate,"It was found that 3scale's APIdocs does not validate the access token, in the case of invalid token, it uses session auth instead. This conceivably bypasses access controls and permits unauthorized information disclosure.","MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2004322 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2004322",Assigned (20210917),"None (candidate not yet proposed)",""
|
| 87 |
-
CVE-2021-38140,Candidate,"The set_user extension module before 2.0.1 for PostgreSQL allows a potential privilege escalation using RESET SESSION AUTHORIZATION after set_user().","CONFIRM:https://github.com/pgaudit/set_user/releases/tag/REL2_0_1 | MISC:https://github.com/pgaudit/set_user/compare/REL2_0_0...REL2_0_1",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 88 |
-
CVE-2021-38141,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 89 |
-
CVE-2021-38142,Candidate,"Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS).","MISC:https://www.barco.com/en/support/cms | MISC:https://www.barco.com/en/support/software/R33050099?majorVersion=2&minorVersion=5&patchVersion=3&buildVersion=65",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 90 |
-
CVE-2021-38143,Candidate,"An issue was discovered in Form Tools through 3.0.20. When an administrator creates a customer account, it is possible for the customer to log in and proceed with a change of name and last name. However, these fields are vulnerable to XSS payload insertion, being triggered in the admin panel when the admin tries to see the client list. This type of XSS (stored) can lead to the extraction of the PHPSESSID cookie belonging to the admin.","MISC:https://bernardofsr.github.io/blog/2021/form-tools/ | MISC:https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md | MISC:https://github.com/formtools/core | MISC:https://www.formtools.org/",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 91 |
-
CVE-2021-38144,Candidate,"An issue was discovered in Form Tools through 3.0.20. A low-privileged user can trigger Reflected XSS when a viewing a form via the submission_id parameter, e.g., clients/forms/edit_submission.php?form_id=1&view_id=1&submission_id=[XSS].","MISC:https://bernardofsr.github.io/blog/2021/form-tools/ | MISC:https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md | MISC:https://github.com/formtools/core | MISC:https://www.formtools.org/",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 92 |
-
CVE-2021-38145,Candidate,"An issue was discovered in Form Tools through 3.0.20. SQL Injection can occur via the export_group_id field when a low-privileged user (client) tries to export a form with data, e.g., manipulation of modules/export_manager/export.php?export_group_id=1&export_group_1_results=all&export_type_id=1.","MISC:https://bernardofsr.github.io/blog/2021/form-tools/ | MISC:https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md | MISC:https://github.com/formtools/core/ | MISC:https://www.formtools.org/",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 93 |
-
CVE-2021-38146,Candidate,"The File Download API in Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to read arbitrary files via absolute path traversal in the SearchString JSON field in /home/download POST data.","MISC:http://packetstormsecurity.com/files/164970/Wipro-Holmes-Orchestrator-20.4.1-Arbitrary-File-Download.html | MISC:https://www.wipro.com/holmes/",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 94 |
-
CVE-2021-38147,Candidate,"Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to download arbitrary files, such as reports containing sensitive information, because authentication is not required for API access to processexecution/DownloadExcelFile/Domain_Credential_Report_Excel, processexecution/DownloadExcelFile/User_Report_Excel, processexecution/DownloadExcelFile/Process_Report_Excel, processexecution/DownloadExcelFile/Infrastructure_Report_Excel, or processexecution/DownloadExcelFile/Resolver_Report_Excel.","MISC:http://packetstormsecurity.com/files/165039/Wipro-Holmes-Orchestrator-20.4.1-Report-Disclosure.html | MISC:https://www.wipro.com/holmes/",Assigned (20210805),"None (candidate not yet proposed)",""
|
| 95 |
-
CVE-2021-38148,Candidate,"Obsidian before 0.12.12 does not require user confirmation for non-http/https URLs.","MISC:https://forum.obsidian.md/t/obsidian-release-v0-12-12/21564",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 96 |
-
CVE-2021-38149,Candidate,"index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS.","MISC:https://chikitsa.net/ | MISC:https://github.com/jboogie15/CVE-2021-38149",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 97 |
-
CVE-2021-3815,Candidate,"utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')","CONFIRM:https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0 | URL:https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0 | MISC:https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a | URL:https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a",Assigned (20210917),"None (candidate not yet proposed)",""
|
| 98 |
-
CVE-2021-38150,Candidate,"When an attacker manages to get access to the local memory, or the memory dump of a victim, for example by a social engineering attack, SAP Business Client versions - 7.0, 7.70, will allow him to read extremely sensitive data, such as credentials. This would allow the attacker to compromise the corresponding backend for which the credentials are valid.","MISC:https://launchpad.support.sap.com/#/notes/3060621 | URL:https://launchpad.support.sap.com/#/notes/3060621 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 99 |
-
CVE-2021-38151,Candidate,"index.php/appointment/todos in Chikitsa Patient Management System 2.0.0 allows XSS.","MISC:https://chikitsa.net/ | MISC:https://github.com/jboogie15/CVE-2021-38149",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 100 |
-
CVE-2021-38152,Candidate,"index.php/appointment/insert_patient_add_appointment in Chikitsa Patient Management System 2.0.0 allows XSS.","MISC:http://packetstormsecurity.com/files/163816/Chikitsa-2.0.0-Cross-Site-Scripting.html | MISC:https://chikitsa.net/ | MISC:https://github.com/jboogie15/CVE-2021-38149",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 101 |
-
CVE-2021-38153,Candidate,"Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.","MISC:https://kafka.apache.org/cve-list | URL:https://kafka.apache.org/cve-list | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[kafka-dev] 20211007 Re: CVE Back Port? | URL:https://lists.apache.org/thread.html/r35322aec467ddae34002690edaa4d9f16e7df9b5bf7164869b75b62c@%3Cdev.kafka.apache.org%3E | MLIST:[kafka-dev] 20211012 [VOTE] 2.6.3 RC0 | URL:https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cdev.kafka.apache.org%3E | MLIST:[kafka-dev] 20211012 [VOTE] 2.7.2 RC0 | URL:https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cdev.kafka.apache.org%3E | MLIST:[kafka-dev] 20211026 Re: [kafka-clients] [VOTE] 2.7.2 RC0 | URL:https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cdev.kafka.apache.org%3E | MLIST:[kafka-users] 20211012 [VOTE] 2.6.3 RC0 | URL:https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cusers.kafka.apache.org%3E | MLIST:[kafka-users] 20211012 [VOTE] 2.7.2 RC0 | URL:https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cusers.kafka.apache.org%3E | MLIST:[kafka-users] 20211026 Re: [kafka-clients] [VOTE] 2.7.2 RC0 | URL:https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cusers.kafka.apache.org%3E",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 102 |
-
CVE-2021-38154,Candidate,"Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.","MISC:https://protocolpolice.nl/CVE-2021-38154_Protocol_Police_Catwalk_Alert | MISC:https://www.usa.canon.com/internet/portal/us/home/support/product-advisories",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 103 |
-
CVE-2021-38155,Candidate,"OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain that account's corresponding UUID, which might be leveraged for other unrelated attacks. All deployments enabling security_compliance.lockout_failure_attempts are affected.","CONFIRM:https://security.openstack.org/ossa/OSSA-2021-003.html | MISC:https://launchpad.net/bugs/1688137 | MLIST:[oss-security] 20210810 [OSSA-2021-003] Keystone: Account name and UUID oracles in account locking (CVE-2021-38155) | URL:http://www.openwall.com/lists/oss-security/2021/08/10/5",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 104 |
-
CVE-2021-38156,Candidate,"In Nagios XI before 5.8.6, XSS exists in the dashboard page (/dashboards/#) when administrative users attempt to edit a dashboard.","MISC:https://raxis.com/blog/cve-2021-38156 | MISC:https://www.nagios.com/downloads/nagios-xi/change-log/",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 105 |
-
CVE-2021-38157,Candidate,"** UNSUPPORTED WHEN ASSIGNED ** LeoStream Connection Broker 9.x before 9.0.34.3 allows Unauthenticated Reflected XSS via the /index.pl user parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.","MISC:https://dgccpa.com | MISC:https://gist.github.com/erud1te-sec/5c85924cb78ba85af42e0b7b62a5ec91 | MISC:https://leostream.com | MISC:https://www.leostream.com/resources-2/product-lifecycle/",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 106 |
-
CVE-2021-38158,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210806),"None (candidate not yet proposed)",""
|
| 107 |
-
CVE-2021-38159,Candidate,"In certain Progress MOVEit Transfer versions before 2021.0.4 (aka 13.0.4), SQL injection in the MOVEit Transfer web application could allow an unauthenticated remote attacker to gain access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, or execute SQL statements that alter or delete database elements, via crafted strings sent to unique MOVEit Transfer transaction types. The fixed versions are 2019.0.8 (11.0.8), 2019.1.7 (11.1.7), 2019.2.4 (11.2.4), 2020.0.7 (12.0.7), 2020.1.6 (12.1.6), and 2021.0.4 (13.0.4).","CONFIRM:https://community.progress.com/s/article/MOVEit-Transfer-Vulnerability-August-6-2021 | MISC:https://www.progress.com/moveit",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 108 |
-
CVE-2021-3816,Candidate,"Cacti 1.1.38 allows authenticated users with User Management permissions to inject arbitrary HTML in the group_prefix field during the creation of a new group via ""Copy"" method at user_group_admin.php.","MISC:https://www.cacti.net/info/changelog | URL:https://www.cacti.net/info/changelog",Assigned (20210917),"None (candidate not yet proposed)",""
|
| 109 |
-
CVE-2021-38160,Candidate,"** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.","CONFIRM:https://security.netapp.com/advisory/ntap-20210902-0010/ | DEBIAN:DSA-4978 | URL:https://www.debian.org/security/2021/dsa-4978 | MISC:https://access.redhat.com/security/cve/cve-2021-38160 | MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 | MISC:https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46 | MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 110 |
-
CVE-2021-38161,Candidate,"Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8.","DEBIAN:DSA-5153 | URL:https://www.debian.org/security/2022/dsa-5153 | MISC:https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164 | URL:https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 111 |
-
CVE-2021-38162,Candidate,"SAP Web Dispatcher versions - 7.49, 7.53, 7.77, 7.81, KRNL64NUC - 7.22, 7.22EXT, 7.49, KRNL64UC -7.22, 7.22EXT, 7.49, 7.53, KERNEL - 7.22, 7.49, 7.53, 7.77, 7.81, 7.83 processes allow an unauthenticated attacker to submit a malicious crafted request over a network to a front-end server which may, over several attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages. This can result in the back-end server executing a malicious payload which can be used to read or modify any information on the server or consume server resources making it temporarily unavailable.","FULLDISC:20220504 Onapsis Security Advisory 2022-0001: HTTP Request Smuggling in SAP Web Dispatcher | URL:http://seclists.org/fulldisclosure/2022/May/3 | MISC:http://packetstormsecurity.com/files/166964/SAP-Web-Dispatcher-HTTP-Request-Smuggling.html | MISC:https://launchpad.support.sap.com/#/notes/3080567 | URL:https://launchpad.support.sap.com/#/notes/3080567 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 112 |
-
CVE-2021-38163,Candidate,"SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable.","MISC:https://launchpad.support.sap.com/#/notes/3084487 | URL:https://launchpad.support.sap.com/#/notes/3084487 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 113 |
-
CVE-2021-38164,Candidate,"SAP ERP Financial Accounting (RFOPENPOSTING_FR) versions - SAP_APPL - 600, 602, 603, 604, 605, 606, 616, SAP_FIN - 617, 618, 700, 720, 730, SAPSCORE - 125, S4CORE, 100, 101, 102, 103, 104, 105, allows a registered attacker to invoke certain functions that would otherwise be restricted to specific users. These functions are normally exposed over the network and once exploited the attacker may be able to view and modify financial accounting data that only a specific user should have access to.","MISC:https://launchpad.support.sap.com/#/notes/3068582 | URL:https://launchpad.support.sap.com/#/notes/3068582 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 114 |
-
CVE-2021-38165,Candidate,"Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which allows remote attackers to discover cleartext credentials because they may appear in SNI data.","DEBIAN:DSA-4953 | URL:https://www.debian.org/security/2021/dsa-4953 | FEDORA:FEDORA-2021-232161e4d5 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K6PZF7JNTFCOJ62HXZG4Q2NEHSZ6IO2V/ | FEDORA:FEDORA-2021-57287bd052 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7YMUHFJJWTZ6HBHTYXVDPNZINGGURHDW/ | FEDORA:FEDORA-2021-f59bda7d94 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKNK7GQBJBUBMJVNKVC7RTCYWUYMFJQW/ | MISC:https://bugs.debian.org/991971 | MISC:https://github.com/w3c/libwww/blob/f010b4cc58d32f34b162f0084fe093f7097a61f0/Library/src/HTParse.c#L118 | MISC:https://lynx.invisible-island.net/current/CHANGES.html | MISC:https://www.openwall.com/lists/oss-security/2021/08/07/1 | MISC:https://www.openwall.com/lists/oss-security/2021/08/07/11 | MLIST:[debian-lts-announce] 20210809 [SECURITY] [DLA 2736-1] lynx security update | URL:https://lists.debian.org/debian-lts-announce/2021/08/msg00010.html | MLIST:[oss-security] 20210807 Re: Bug#991971: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances) | URL:http://www.openwall.com/lists/oss-security/2021/08/07/9 | MLIST:[oss-security] 20210807 Re: Re: Bug#991971: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances) | URL:http://www.openwall.com/lists/oss-security/2021/08/07/11 | MLIST:[oss-security] 20210807 Re: Re: Bug#991971: [Lynx-dev] bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances) | URL:http://www.openwall.com/lists/oss-security/2021/08/07/12",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 115 |
-
CVE-2021-38166,Candidate,"In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.","CONFIRM:https://security.netapp.com/advisory/ntap-20210909-0001/ | DEBIAN:DSA-4978 | URL:https://www.debian.org/security/2021/dsa-4978 | FEDORA:FEDORA-2021-b22606e88b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GUVLBJKZMWA3E3YXSH4SZ7BOYGJP4GXP/ | FEDORA:FEDORA-2021-f35f45a76f | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UL6CH5M5PRLMA3KPBX4LPUO6Z73GRISO/ | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=c4eb1f403243fc7bbb7de644db8587c03de36da6 | MISC:https://lore.kernel.org/bpf/20210806150419.109658-1-th.yasumatsu@gmail.com/",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 116 |
-
CVE-2021-38167,Candidate,"Roxy-WI through 5.2.2.0 allows SQL Injection via check_login. An unauthenticated attacker can extract a valid uuid to bypass authentication.","MISC:https://github.com/hap-wi/roxy-wi/issues/285",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 117 |
-
CVE-2021-38168,Candidate,"Roxy-WI through 5.2.2.0 allows authenticated SQL injection via select_servers.","MISC:https://github.com/hap-wi/roxy-wi/issues/285",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 118 |
-
CVE-2021-38169,Candidate,"Roxy-WI through 5.2.2.0 allows command injection via /app/funct.py and /api/api_funct.py.","MISC:https://github.com/hap-wi/roxy-wi/issues/285",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 119 |
-
CVE-2021-3817,Candidate,"wbce_cms is vulnerable to Improper Neutralization of Special Elements used in an SQL Command","CONFIRM:https://huntr.dev/bounties/c330dc0d-220a-4b15-b785-5face4cf6ef7 | URL:https://huntr.dev/bounties/c330dc0d-220a-4b15-b785-5face4cf6ef7 | MISC:http://packetstormsecurity.com/files/165377/WBCE-CMS-1.5.1-Admin-Password-Reset.html | MISC:https://github.com/wbce/wbce_cms/commit/6ca63f0cad5f0cd606fdb69a372f09b7d238f1d7 | URL:https://github.com/wbce/wbce_cms/commit/6ca63f0cad5f0cd606fdb69a372f09b7d238f1d7",Assigned (20210920),"None (candidate not yet proposed)",""
|
| 120 |
-
CVE-2021-38170,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 121 |
-
CVE-2021-38171,Candidate,"adts_decode_extradata in libavformat/adtsenc.c in FFmpeg 4.4 does not check the init_get_bits return value, which is a necessary step because the second argument to init_get_bits can be crafted.","DEBIAN:DSA-4990 | URL:https://www.debian.org/security/2021/dsa-4990 | DEBIAN:DSA-4998 | URL:https://www.debian.org/security/2021/dsa-4998 | MISC:https://github.com/FFmpeg/FFmpeg/commit/9ffa49496d1aae4cbbb387aac28a9e061a6ab0a6 | MISC:https://patchwork.ffmpeg.org/project/ffmpeg/patch/AS8P193MB12542A86E22F8207EC971930B6F19@AS8P193MB1254.EURP193.PROD.OUTLOOK.COM/ | MLIST:[debian-lts-announce] 20211114 [SECURITY] [DLA 2818-1] ffmpeg security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 122 |
-
CVE-2021-38172,Candidate,"perM 0.4.0 has a Buffer Overflow related to strncpy. (Debian initially fixed this in 0.4.0-7.)","CONFIRM:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993019 | MISC:https://lists.debian.org/debian-med/2021/08/msg00016.html | MISC:https://packages.qa.debian.org/p/perm.html | MISC:https://salsa.debian.org/med-team/perm/-/commits/master/ | MISC:https://tracker.debian.org/pkg/perm",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 123 |
-
CVE-2021-38173,Candidate,"Btrbk before 0.31.2 allows command execution because of the mishandling of remote hosts filtering SSH commands using ssh_filter_btrbk.sh in authorized_keys.","CONFIRM:https://github.com/digint/btrbk/blob/master/ChangeLog | FEDORA:FEDORA-2022-a66734e7a2 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP2T32JMENJFRP2HWXR7FTTZVRTTPECL/ | FEDORA:FEDORA-2022-dc62389784 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM7GLTUN5YS4KE2RNBX732EAMVVGNEX3/ | MISC:https://github.com/digint/btrbk/commit/58212de771c381cd4fa05625927080bf264e9584 | MLIST:[debian-lts-announce] 20210905 [SECURITY] [DLA 2755-1] btrbk security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00002.html",Assigned (20210807),"None (candidate not yet proposed)",""
|
| 124 |
-
CVE-2021-38174,Candidate,"When a user opens manipulated files received from untrusted sources in SAP 3D Visual Enterprise Viewer version - 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.","MISC:https://launchpad.support.sap.com/#/notes/3087791 | URL:https://launchpad.support.sap.com/#/notes/3087791 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405",Assigned (20210807),"None (candidate not yet proposed)",""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1014.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-38175,Candidate,"SAP Analysis for Microsoft Office - version 2.8, allows an attacker with high privileges to read sensitive data over the network, and gather or change information in the current system without user interaction. The attack would not lead to an impact on the availability of the system, but there would be an impact on integrity and confidentiality.",MISC:https://launchpad.support.sap.com/#/notes/3082500 | URL:https://launchpad.support.sap.com/#/notes/3082500 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405,Assigned (20210807),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-38176,Canidate,"Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query or inject ABAP code to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system.",MISC:https://launchpad.support.sap.com/#/notes/3089831 | URL:https://launchpad.support.sap.com/#/notes/3089831 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405,Assigned (20210807),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-38177,Candidate,"SAP CommonCryptoLib version 8.5.38 or lower is vulnerable to null pointer dereference vulnerability when an unauthenticated attacker sends crafted malicious data in the HTTP requests over the network, this causes the SAP application to crash and has high impact on the availability of the SAP system.",FULLDISC:20220126 Onapsis Security Advisory 2021-0025: Null Pointer Dereference vulnerability in SAP CommonCryptoLib | URL:http://seclists.org/fulldisclosure/2022/Jan/74 | MISC:http://packetstormsecurity.com/files/165749/SAP-CommonCryptoLib-Null-Pointer-Dereference.html | MISC:https://launchpad.support.sap.com/#/notes/3051787 | URL:https://launchpad.support.sap.com/#/notes/3051787 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=585106405,Assigned (20210807),None (candidate not yet proposed),
|
| 5 |
-
CV-2021-38178,Candidate,"The software logistics system of SAP NetWeaver AS ABAP and ABAP Platform versions - 700, 701, 702, 710, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, enables a malicious user to transfer ABAP code artifacts or content, by-passing the established quality gates. By this vulnerability malicious code can reach quality and production, and can compromise the confidentiality, integrity, and availability of the system and its data.",MISC:https://launchpad.support.sap.com/#/notes/3097887 | URL:https://launchpad.support.sap.com/#/notes/3097887 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210807),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021@3817@,|andidate,Debug function of Admin UI of SAP Business One Integration is enabled by default. This allows Admin User to see the captured packet contents which may include User credentials.,MISC:https://launchpad.support.sap.com/#/notes/3074819 | URL:https://launchpad.support.sap.com/#/notes/3074819 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210807),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-3818,Candidate,grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking,CONFIRM:https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea | URL:https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea | MISC:https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07 | URL:https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07,Assigned (20210920),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021|38%80,Cadidate,"SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel (CSV injection) due to improper sanitation during the data export. An attacker could thereby execute arbitrary commands on the victim's computer but only if the victim allows to execute macros while opening the file and the security settings of Excel allow for command execution.",MISC:https://launchpad.support.sap.com/#/notes/3079427 | URL:https://launchpad.support.sap.com/#/notes/3079427 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210807),None (candidate not yet proposed),
|
| 9 |
-
CVE-221-38181,Cand@dat!,"SAP NetWeaver AS ABAP and ABAP Platform - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.",MISC:https://launchpad.support.sap.com/#/notes/3080710 | URL:https://launchpad.support.sap.com/#/notes/3080710 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210807),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-38182,Candidae,"Due to insufficient input validation of Kyma, authenticated users can pass a Header of their choice and escalate privileges which can completely compromise the cluster.",MISC:https://github.com/kyma-project/kyma/security/advisories/GHSA-2vjp-5q24-hqjv | URL:https://github.com/kyma-project/kyma/security/advisories/GHSA-2vjp-5q24-hqjv | MISC:https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 | URL:https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021,Assigned (20210807),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-38183,Ca|?ndida#te,"SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim and executed by the web browser, resulting in Cross-Site Scripting vulnerability.",MISC:https://launchpad.support.sap.com/#/notes/3084937 | URL:https://launchpad.support.sap.com/#/notes/3084937 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210807),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-38184,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210807),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-38185,Candidate,"GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.",MISC:https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b | URL:https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b | MISC:https://github.com/fangqyi/cpiopwn | URL:https://github.com/fangqyi/cpiopwn | MISC:https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html | URL:https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html | MISC:https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html | URL:https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html,Assigned (20210807),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-38186,Candidate,"An issue was discovered in the comrak crate before 0.10.1 for Rust. It mishandles & characters, leading to XSS via &# HTML entities.",MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/comrak/RUSTSEC-2021-0063.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0063.html,Assigned (20210808),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-38187,Ca|didat*,An issue was discovered in the anymap crate through 0.12.1 for Rust. It violates soundness via conversion of a *u8 to a *u64.,MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/anymap/RUSTSEC-2021-0065.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0065.html,Assigned (20210808),None (candidate not yet proposed),
|
| 16 |
-
C*V|E-2021-38188|,?@Candidate*,"An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely.",MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/iced-x86/RUSTSEC-2021-0068.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0068.html,Assigned (20210808),None (candidate not yet proposed),
|
| 17 |
-
CVE-202-38189,Cadidate,"An issue was discovered in the lettre crate before 0.9.6 for Rust. In an e-mail message body, an attacker can place a . character after two <CR><LF> sequences and then inject arbitrary SMTP commands.",MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lettre/RUSTSEC-2021-0069.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0069.html,Assigned (20210808),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-3819,Candidate,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5 | URL:https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5 | MISC:https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9 | URL:https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9,Assigned (20210920),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-38190,Candidte,An issue was discovered in the nalgebra crate before 0.27.1 for Rust. It allows out-of-bounds memory access because it does not ensure that the number of elements is equal to the product of the row count and column count.,MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/nalgebra/RUSTSEC-2021-0070.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0070.html,Assigned (20210808),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-38!91,Candidate,"An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.",MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0072.html,Assigned (20210808),None (candidate not yet proposed),
|
| 21 |
-
C$VE-%2021-38192|,Candidate,An issue was discovered in the prost-types crate before 0.8.0 for Rust. An overflow can occur during conversion from Timestamp to SystemTime.,MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/prost-types/RUSTSEC-2021-0073.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0073.html,Assigned (20210808),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-38193,?a%didate,"An issue was discovered in the ammonia crate before 3.1.0 for Rust. XSS can occur because the parsing differences for HTML, SVG, and MathML are mishandled, a similar issue to CVE-2020-26870.",MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ammonia/RUSTSEC-2021-0074.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0074.html,Assigned (20210808),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-38194,Candidate,"An issue was discovered in the ark-r1cs-std crate before 0.3.1 for Rust. It does not enforce any constraints in the FieldVar::mul_by_inverse method. Thus, a prover can produce a proof that is unsound but is nonetheless verified.",MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ark-r1cs-std/RUSTSEC-2021-0075.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0075.html,Assigned (20210808),None (candidate not yet proposed),
|
| 24 |
-
CVE-#2|021*-38195,Candidate,"An issue was discovered in the libsecp256k1 crate before 0.5.0 for Rust. It can verify an invalid signature because it allows the R or S parameter to be larger than the curve order, aka an overflow.",MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/libsecp256k1/RUSTSEC-2021-0076.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0076.html,Assigned (20210808),None (candidate not yet proposed),
|
| 25 |
-
CVE-20!21*-38|19|6,Candidate,"An issue was discovered in the better-macro crate through 2021-07-22 for Rust. It intentionally demonstrates that remote attackers can execute arbitrary code via proc-macros, and otherwise has no legitimate purpose.",MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/better-macro/RUSTSEC-2021-0077.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0077.html,Assigned (20210808),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-38197,Candidate,unarr.go in go-unarr (aka Go bindings for unarr) 0.1.1 allows Directory Traversal via ../ in a pathname within a TAR archive.,MISC:https://github.com/gen2brain/go-unarr/issues/21,Assigned (20210808),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-38198,Candiate,"arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11 | MISC:https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7 | MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html,Assigned (20210808),None (candidate not yet proposed),
|
| 28 |
-
CVE@2021-38199,Candidate,"fs/nfs/nfs4client.c in the Linux kernel before 5.13.4 has incorrect connection-setup ordering, which allows operators of remote NFSv4 servers to cause a denial of service (hanging of mounts) by arranging for those servers to be unreachable during trunking detection.",CONFIRM:https://security.netapp.com/advisory/ntap-20210902-0010/ | DEBIAN:DSA-4978 | URL:https://www.debian.org/security/2021/dsa-4978 | MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 | MISC:https://github.com/torvalds/linux/commit/dd99e9f98fbf423ff6d365b37a98e8879170f17c | MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html,Assigned (20210808),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-3820,Candidate,inflect is vulnerable to Inefficient Regular Expression Complexity,CONFIRM:https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a | URL:https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a | MISC:https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b | URL:https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b,Assigned (20210920),None (candidate not yet proposed),
|
| 30 |
-
CE-2021-38200,Candidate,"arch/powerpc/perf/core-book3s.c in the Linux kernel before 5.12.13, on systems with perf_event_paranoid=-1 and no specific PMU driver support registered, allows local users to cause a denial of service (perf_instruction_pointer NULL pointer dereference and OOPS) via a ""perf record"" command.",MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 | MISC:https://github.com/torvalds/linux/commit/60b7ed54a41b550d50caf7f2418db4a7e75b5bdc,Assigned (20210808),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-38201,!C?andid%*ate,net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.,CONFIRM:https://security.netapp.com/advisory/ntap-20210902-0010/ | MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 | MISC:https://github.com/torvalds/linux/commit/6d1c0f3d28f98ea2736128ed3e46821496dc3a8c,Assigned (20210808),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-38202,Candidate,fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd.,CONFIRM:https://security.netapp.com/advisory/ntap-20210902-0010/ | MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 | MISC:https://github.com/torvalds/linux/commit/7b08cf62b1239a4322427d677ea9363f0ab677c6,Assigned (20210808),None (candidate not yet proposed),
|
| 33 |
-
CVE-021-38203,Candidate,btrfs in the Linux kernel before 5.13.4 allows attackers to cause a denial of service (deadlock) via processes that trigger allocation of new system chunks during times when there is a shortage of free space in the system space_info.,CONFIRM:https://security.netapp.com/advisory/ntap-20210902-0010/ | MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4 | MISC:https://github.com/torvalds/linux/commit/1cb3db1cf383a3c7dbda1aa0ce748b0958759947,Assigned (20210808),None (candidate not yet proposed),
|
| 34 |
-
CVE-$202@1??-38204,Candidte,drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.,MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.6 | MISC:https://github.com/torvalds/linux/commit/b5fdf5c6e6bee35837e160c00ac89327bdad031b | MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html,Assigned (20210808),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-38205,Cndidate,"drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).",MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 | MISC:https://github.com/torvalds/linux/commit/d0d62baa7f505bd4c59cd169692ff07ec49dde37 | MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html,Assigned (20210808),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-38206,Candidate,"The mac80211 subsystem in the Linux kernel before 5.12.13, when a device supporting only 5 GHz is used, allows attackers to cause a denial of service (NULL pointer dereference in the radiotap parser) by injecting a frame with 802.11a rates.",MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 | MISC:https://github.com/torvalds/linux/commit/bddc0c411a45d3718ac535a070f349be8eca8d48,Assigned (20210808),None (candidate not yet proposed),
|
| 37 |
-
CV-2021-38207,Candid?te,drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.,CONFIRM:https://security.netapp.com/advisory/ntap-20210902-0007/ | MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.13 | MISC:https://github.com/torvalds/linux/commit/c364df2489b8ef2f5e3159b1dff1ff1fdb16040d,Assigned (20210808),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-38208,Candidate,net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.,CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=1992810 | MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.10 | MISC:https://github.com/torvalds/linux/commit/4ac06a1e013cf5fdd963317ffd3b968560f33bba | MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname | URL:http://www.openwall.com/lists/oss-security/2021/08/17/1 | MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname | URL:http://www.openwall.com/lists/oss-security/2021/08/17/2 | MLIST:[oss-security] 20210824 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname | URL:http://www.openwall.com/lists/oss-security/2021/08/24/2,Assigned (20210808),None (candidate not yet proposed),
|
| 39 |
-
$VE%2021-38209,Candidate,"net/netfilter/nf_conntrack_standalone.c in the Linux kernel before 5.12.2 allows observation of changes in any net namespace because these changes are leaked into all other net namespaces. This is related to the NF_SYSCTL_CT_MAX, NF_SYSCTL_CT_EXPECT_MAX, and NF_SYSCTL_CT_BUCKETS sysctls.",MISC:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.2 | MISC:https://github.com/torvalds/linux/commit/2671fa4dc0109d3fb581bc3078fdf17b5d9080f6,Assigned (20210808),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-3821,Candidate,A potential security vulnerability has been identified for certain HP multifunction printers (MFPs). The vulnerability may lead to Denial of Service when running HP Workpath solutions on potentially affected products.,MISC:https://support.hp.com/us-en/document/ish_4980799-4980823-16/hpsbpi03747 | URL:https://support.hp.com/us-en/document/ish_4980799-4980823-16/hpsbpi03747,Assigned (20210920),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-38210,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-38211,$andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-38212,Can*did$@a?te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-38213,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-3214,Ca$didate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-38215,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-38216,Candid%*e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-38217,Candidate,SEMCMS v 1.2 is vulnerable to SQL Injection via SEMCMS_User.php.,MISC:https://github.com/BigTiger2020/SEMCMS/blob/main/semcms-1.2-sql-2.md,Assigned (20210809),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-38218,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-38219,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-3822,Candidate,jsoneditor is vulnerable to Inefficient Regular Expression Complexity,CONFIRM:https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73 | URL:https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73 | MISC:https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e | URL:https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e,Assigned (20210922),None (candidate not yet proposed),
|
| 52 |
-
CVE-#021-38220,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-3221,Candidate,bbs-go <= 3.3.0 including Custom Edition is vulnerable to stored XSS.,MISC:https://github.com/mlogclub/bbs-go/issues/112 | MISC:https://github.com/mlogclub/bbs-go/pull/113,Assigned (20210809),None (candidate not yet proposed),
|
| 54 |
-
CVE$-2021|-3$82*22,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 55 |
-
@C#VE-%2021-38223,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-38224,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-38225,Ca!!ndida@?te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 58 |
-
CV#E#-2021-38226!,Cand!d!te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 59 |
-
CVE@2%21-38227,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-38228,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-38229,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-3823,Can!idate,Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects: Bitdefender GravityZone versions prior to 3.3.8.249.,MISC:https://www.bitdefender.com/support/security-advisories/path-traversal-vulnerability-in-bitdefender-gravitzone-update-server-in-relay-mode-va-10039/ | URL:https://www.bitdefender.com/support/security-advisories/path-traversal-vulnerability-in-bitdefender-gravitzone-update-server-in-relay-mode-va-10039/,Assigned (20210922),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-38230,!andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 64 |
-
CV*-2021-38231,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 65 |
-
CVE@2021-38232,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 66 |
-
CVE-202138233,Can!ida#e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 67 |
-
CVE-202#-38234,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-3235,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-38236,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-38237,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 71 |
-
CVE-20*21-38*#23%8,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 72 |
-
CVE-021-38239,Candidate,"SQL Injection vulnerability in dataease before 1.2.0, allows attackers to gain sensitive information via the orders parameter to /api/sys_msg/list/1/10.",MISC:https://github.com/dataease/dataease/issues/510,Assigned (20210809),None (candidate not yet proposed),
|
| 73 |
-
%VE-2@21-3824,Can%dida?*t?e,OpenVPN Access Server 2.9.0 through 2.9.4 allow remote attackers to inject arbitrary web script or HTML via the web login page URL.,MISC:https://openvpn.net/vpn-server-resources/release-notes/#openvpn-access-server-2-9-5 | URL:https://openvpn.net/vpn-server-resources/release-notes/#openvpn-access-server-2-9-5,Assigned (20210922),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021|3#240,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-38241,Cand$dat%,Deserialization issue discovered in Ruoyi before 4.6.1 allows remote attackers to run arbitrary code via weak cipher in Shiro framework.,MISC:https://www.du1ge.com/archives/CVE-2021-38241,Assigned (20210809),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-38242,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-38243,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 78 |
-
C#|V$E-$2021-38244,Candidate,A regular expression denial of service (ReDoS) vulnerability exits in cbioportal 3.6.21 and older via a POST request to /ProteinArraySignificanceTest.json.,MISC:https://github.com/cBioPortal/cbioportal/issues/8680 | MISC:https://github.com/cBioPortal/cbioportal/pull/8751,Assigned (20210809),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-38245,||Ca|nd@idate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 80 |
-
C$VE*|-2021@-38246,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 81 |
-
CVE-202138247,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 82 |
-
$CVE-#20@21-38248,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-38249,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-3825,?Candi$?date,On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials.,CONFIRM:https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/ | URL:https://pentest.blog/liderahenk-0day-all-your-pardus-clients-belongs-to-me/ | CONFIRM:https://www.usom.gov.tr/bildirim/tr-21-0795 | URL:https://www.usom.gov.tr/bildirim/tr-21-0795,Assigned (20210922),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-38250,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-38251,Can#%didate@,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-38252,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-38253,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 89 |
-
CV*E$-20*21-3825$4,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 90 |
-
C?VE-2?02#1-38255,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-3856,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-38257,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-3*25|,Candidate,NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostProcessCallback().,MISC:https://mcusec.github.io/vulnerabilities_details#nxp_usb,Assigned (20210809),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-38259,C|andidat$e|,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-3826,Cand$@i#?date,Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.,MISC:FEDORA-2022-19538a3732 | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/ | MISC:FEDORA-2022-667ee398b1 | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/ | MISC:FEDORA-2022-8e1df11a7a | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/ | MISC:FEDORA-2022-affcf9eea6 | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/ | MISC:FEDORA-2022-c9a1fd5370 | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/ | MISC:https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505 | URL:https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505 | MISC:https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987 | URL:https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987,Assigned (20210923),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-38260,Can$did$!ate@,NXP MCUXpresso SDK v2.7.0 was discovered to contain a buffer overflow in the function USB_HostParseDeviceConfigurationDescriptor().,MISC:https://mcusec.github.io/vulnerabilities_details#nxp_usb,Assigned (20210809),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-38261,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-38262,Cand$ida?#?te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-3826,Candidate,"Cross-site scripting (XSS) vulnerability in the Server module's script console in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 20 and 7.2 before fix pack 10 allows remote attackers to inject arbitrary web script or HTML via the output of a script.",MISC:http://liferay.com | MISC:https://issues.liferay.com/browse/LPE-17061 | MISC:https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38263-reflected-xss-with-script-page,Assigned (20210809),None (candidate not yet proposed),
|
| 100 |
-
CVE-202-38264,Candidate,Cross-site scripting (XSS) vulnerability in the Frontend Taglib module in Liferay Portal 7.4.0 and 7.4.1 allows remote attackers to inject arbitrary web script or HTML into the management toolbar search via the `keywords` parameter. This issue is caused by an incomplete fix in CVE-2021-35463.,MISC:http://liferay.com | MISC:https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38264-reflected-xss-with-keywords-in-search,Assigned (20210809),None (candidate not yet proposed),
|
| 101 |
-
CVE-2|021#-38265?,Candidate,Cross-site scripting (XSS) vulnerability in the Asset module in Liferay Portal 7.3.4 through 7.3.6 allow remote attackers to inject arbitrary web script or HTML when creating a collection page via the _com_liferay_asset_list_web_portlet_AssetListPortlet_title parameter.,MISC:http://liferay.com | MISC:https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38265-stored-xss-with-collection-name,Assigned (20210809),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-38266,Candidate,"The Portal Security module in Liferay Portal 7.2.1 and earlier, and Liferay DXP 7.0 before fix pack 90, 7.1 before fix pack 17 and 7.2 before fix pack 5 does not correctly import users from LDAP, which allows remote attackers to prevent a legitimate user from authenticating by attempting to sign in as a user that exist in LDAP.",MISC:http://liferay.com | MISC:https://issues.liferay.com/browse/LPE-17191 | MISC:https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38266,Assigned (20210809),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-38267,Candidate,"Cross-site scripting (XSS) vulnerability in the Blogs module's edit blog entry page in Liferay Portal 7.3.2 through 7.3.6, and Liferay DXP 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_blogs_web_portlet_BlogsAdminPortlet_title and _com_liferay_blogs_web_portlet_BlogsAdminPortlet_subtitle parameter.",MISC:http://liferay.com | MISC:https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38267-stored-xss-with-title-and-subtitle-of-blog-entry,Assigned (20210809),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-38268,Ca@!idate,"The Dynamic Data Mapping module in Liferay Portal 7.0.0 through 7.3.6, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 2 incorrectly sets default permissions for site members, which allows remote authenticated users with the site member role to add and duplicate forms, via the UI or the API.",MISC:http://liferay.com | MISC:https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default | MISC:https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default?_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_assetEntryId=120882524&_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_redirect=https%3A%2F%2Fportal.liferay.dev%3A443%2Flearn%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetP,Assigned (20210809),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-3826,Candidate,"Cross-site scripting (XSS) vulnerability in the Gogo Shell module in Liferay Portal 7.1.0 through 7.3.6 and 7.4.0, and Liferay DXP 7.1 before fix pack 23, 7.2 before fix pack 13, and 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the output of a Gogo Shell command.",MISC:http://liferay.com | MISC:https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38269-stored-xss-with-gogo-shell-output,Assigned (20210809),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-3827,Candidae,"A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.",MISC:https://access.redhat.com/security/cve/CVE-2021-3827 | URL:https://access.redhat.com/security/cve/CVE-2021-3827 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2007512 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2007512 | MISC:https://github.com/keycloak/keycloak/commit/44000caaf5051d7f218d1ad79573bd3d175cad0d | URL:https://github.com/keycloak/keycloak/commit/44000caaf5051d7f218d1ad79573bd3d175cad0d | MISC:https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v | URL:https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v,Assigned (20210924),None (candidate not yet proposed),
|
| 107 |
-
CVE-*021-38270,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-38271,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 109 |
-
CVE%2021-38272,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-38273,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-38274,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 112 |
-
CVE-202138275,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-38276,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-38277,C*a!ndidate!,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-38278,?|Can*|didate,Tenda AC10-1200 v15.03.06.23_EN was discovered to contain a buffer overflow via the urls parameter in the saveParentControlInfo function.,MISC:https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-2-strcpy-buffer-overflow-92cd88e1d503,Assigned (20210809),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-38279,|an!idate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-3828,Candidate,nltk is vulnerable to Inefficient Regular Expression Complexity,CONFIRM:https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32 | URL:https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32 | MISC:https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6 | URL:https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6,Assigned (20210924),None (candidate not yet proposed),
|
| 118 |
-
CVE#2021-38280,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 119 |
-
CVE-221-38281,Ca|n$did*ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-38282,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-38*!283@,Canddate,Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to read application log files containing sensitive information via a predictable /log URI.,MISC:http://packetstormsecurity.com/files/165031/Wipro-Holmes-Orchestrator-20.4.1-File-Disclosure.html | MISC:https://www.wipro.com/holmes/,Assigned (20210809),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-38284,Ca%did@te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 123 |
-
||CVE-20@21-%38285,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-3286,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1015.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CV%@E-2021|-38*287,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-38288,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-38289,Candidate,"An issue has been discovered in Novastar-VNNOX-iCare Novaicare 7.16.0 that gives attacker privilege escalation and allows attackers to view corporate information and SMTP server details, delete users, view roles, and other unspecified impacts.",MISC:https://github.com/viperbluff/Novastar-VNNOX-iCare-Privilege-Escalation | MISC:https://twitter.com/viperbluff/status/1439941380244230150?s=20&t=iPSn8eNxaxUKis5OKSQJRQ,Assigned (20210809),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-3829,Candidate,openwhyd is vulnerable to URL Redirection to Untrusted Site,CONFIRM:https://huntr.dev/bounties/6b8acb0c-8b5d-461e-9b46-b1bfb5a8ccdf | URL:https://huntr.dev/bounties/6b8acb0c-8b5d-461e-9b46-b1bfb5a8ccdf | MISC:https://github.com/openwhyd/openwhyd/commit/38707930103dcba49d89d993f56bebd346069640 | URL:https://github.com/openwhyd/openwhyd/commit/38707930103dcba49d89d993f56bebd346069640,Assigned (20210925),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-38290,Candidate,A host header attack vulnerability exists in FUEL CMS 1.5.0 through fuel/modules/fuel/config/fuel_constants.php and fuel/modules/fuel/libraries/Asset.php. An attacker can use a man in the middle attack such as phishing.,MISC:https://github.com/daylightstudio/FUEL-CMS/commit/8a0d88ad6869623c90e24b3b2ea33352049d39a7 | MISC:https://github.com/daylightstudio/FUEL-CMS/issues/580,Assigned (20210809),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-38291,Candidate,FFmpeg version (git commit de8e6e67e7523e48bb27ac224a0b446df05e1640) suffers from a an assertion failure at src/libavutil/mathematics.c.,DEBIAN:DSA-4990 | URL:https://www.debian.org/security/2021/dsa-4990 | DEBIAN:DSA-4998 | URL:https://www.debian.org/security/2021/dsa-4998 | MISC:https://trac.ffmpeg.org/ticket/9312 | MLIST:[debian-lts-announce] 20211114 [SECURITY] [DLA 2818-1] ffmpeg security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00012.html,Assigned (20210809),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-38292,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-38293,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-38294,Candidate,A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.,MISC:http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html | MISC:https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E | URL:https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E | MISC:https://seclists.org/oss-sec/2021/q4/44 | URL:https://seclists.org/oss-sec/2021/q4/44,Assigned (20210809),None (candidate not yet proposed),
|
| 11 |
-
,Candidate,"In Apache CouchDB, a malicious user with permission to create documents in a database is able to attach a HTML attachment to a document. If a CouchDB admin opens that attachment in a browser, e.g. via the CouchDB admin interface Fauxton, any JavaScript code embedded in that HTML attachment will be executed within the security context of that admin. A similar route is available with the already deprecated _show and _list functionality. This privilege escalation vulnerability allows an attacker to add or remove data in any database or make configuration changes. This issue affected Apache CouchDB prior to 3.1.2",MISC:https://docs.couchdb.org/en/stable/cve/2021-38295.html | URL:https://docs.couchdb.org/en/stable/cve/2021-38295.html,Assigned (20210809),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-38296,Candidate,"Apache Spark supports end-to-end encryption of RPC connections via ""spark.authenticate"" and ""spark.network.crypto.enabled"". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by ""spark.authenticate.enableSaslEncryption"", ""spark.io.encryption.enabled"", ""spark.ssl"", ""spark.ui.strictTransportSecurity"". Update to Apache Spark 3.1.3 or later",MISC:https://lists.apache.org/thread/70x8fw2gx3g9ty7yk0f2f1dlpqml2smd | URL:https://lists.apache.org/thread/70x8fw2gx3g9ty7yk0f2f1dlpqml2smd | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html,Assigned (20210809),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-38297,,"Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.",CONFIRM:https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A | CONFIRM:https://security.netapp.com/advisory/ntap-20211118-0006/ | FEDORA:FEDORA-2021-2b2dd1b5a7 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ON7BQRRJZBOR5TJHURBAB3WLF4YXFC6Z/ | FEDORA:FEDORA-2021-2ef35beebf | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OFS3M3OFB24SWPTIAPARKGPUMQVUY6Z/ | GENTOO:GLSA-202208-02 | URL:https://security.gentoo.org/glsa/202208-02 | MISC:https://groups.google.com/forum/#!forum/golang-announce,Assigned (20210809),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-38298,Candidate,Zoho ManageEngine ADManager Plus before 7110 is vulnerable to blind XXE.,CONFIRM:https://www.manageengine.com/products/ad-manager/release-notes.html#7110,Assigned (20210809),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-38299,Candidate,Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence.,MISC:https://github.com/web-auth/webauthn-framework/releases | MISC:https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2021-1-fehlende-ueberpruefung-von-user-presence-in-webauthn-framework/,Assigned (20210809),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-3830,,btcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/0fcdee5f-1f07-47ce-b650-ea8b4a7d35d8 | URL:https://huntr.dev/bounties/0fcdee5f-1f07-47ce-b650-ea8b4a7d35d8 | MISC:https://github.com/btcpayserver/btcpayserver/commit/fc4e47cec608cc3dba24b19d0145ac69320b975e | URL:https://github.com/btcpayserver/btcpayserver/commit/fc4e47cec608cc3dba24b19d0145ac69320b975e,Assigned (20210926),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-38300,Candidate,"arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture.",CONFIRM:https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 | CONFIRM:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b | CONFIRM:https://security.netapp.com/advisory/ntap-20211008-0003/ | DEBIAN:DSA-5096 | URL:https://www.debian.org/security/2022/dsa-5096 | MISC:http://www.openwall.com/lists/oss-security/2021/09/15/5 | MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html,Assigned (20210809),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-38301,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-38302,#andi?ate,The Newsletter extension through 4.0.0 for TYPO3 allows SQL Injection.,CONFIRM:https://typo3.org/security/advisory/typo3-ext-sa-2021-014 | MISC:https://typo3.org/help/security-advisories,Assigned (20210809),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-38303,Candidate,A SQL injection vulnerability exists in Sureline SUREedge Migrator 7.0.7.29360.,MISC:https://github.com/ederdemattos/Sureline_SUREedge_Migrator | MISC:https://github.com/ederdemattos/Sureline_SUREedge_Migrator/blob/main/4.png,Assigned (20210809),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-38304,Candidate,Improper input validation in the National Instruments NI-PAL driver in versions 20.0.0 and prior may allow a privileged user to potentially enable escalation of privilege via local access.,MISC:https://www.ni.com/en-us/support/documentation/supplemental/21/improper-input-validation-in-ni-pal.html,Assigned (20210809),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-38305,Candidate,"23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale.",MISC:https://github.com/23andMe/Yamale/pull/165 | MISC:https://github.com/23andMe/Yamale/releases/tag/3.0.8,Assigned (20210809),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-38306,Candidate,Network Attached Storage on LG N1T1*** 10124 devices allows an unauthenticated attacker to gain root access via OS command injection in the en/ajp/plugins/access.ssh/checkInstall.php destServer parameter.,MISC:https://www.lg.com/uk/support/product/lg-N1T1DD1 | MISC:https://www.lg.com/us/burners-drives/lg-N1T1-network-attached-storage | MISC:https://zerosecuritypenetrationtesting.com/?page_id=306,Assigned (20210809),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-38307,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-38308,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-38309,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-3831,Candidate,gnuboard5 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04 | URL:https://huntr.dev/bounties/25775287-88cd-4f00-b978-692d627dff04 | MISC:https://github.com/gnuboard/gnuboard5/commit/2e81619ea87bc9c0b4a073d8df3c7693a6fdbf0d | URL:https://github.com/gnuboard/gnuboard5/commit/2e81619ea87bc9c0b4a073d8df3c7693a6fdbf0d,Assigned (20210927),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-38310,|Can*didate#$,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 29 |
-
,Candidate,"In Contiki 3.0, potential nonterminating acknowledgment loops exist in the Telnet service. When the negotiated options are already disabled, servers still respond to DONT and WONT requests with WONT or DONT commands, which may lead to infinite acknowledgment loops, denial of service, and excessive CPU consumption.",MISC:https://github.com/contiki-os/contiki/issues/2685,Assigned (20210809),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-38312,,"The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress used an incorrect authorization check in the REST API endpoints registered under the “redux/v1/templates/” REST Route in “redux-templates/classes/class-api.php”. The `permissions_callback` used in this file only checked for the `edit_posts` capability which is granted to lower-privileged users such as contributors, allowing such users to install arbitrary plugins from the WordPress repository and edit arbitrary posts.",MISC:https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ | URL:https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/,Assigned (20210809),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-38313,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210809),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-38314,Candidate,"The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.",MISC:https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/ | URL:https://www.wordfence.com/blog/2021/09/over-1-million-sites-affected-by-redux-framework-vulnerabilities/,Assigned (20210809),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-38315,Candidate,"The SP Project & Document Manager WordPress plugin is vulnerable to attribute-based Reflected Cross-Site Scripting via the from and to parameters in the ~/functions.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.25.",MISC:https://plugins.trac.wordpress.org/browser/sp-client-document-manager/trunk/functions.php?rev=2566007#L1186 | URL:https://plugins.trac.wordpress.org/browser/sp-client-document-manager/trunk/functions.php?rev=2566007#L1186 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38315 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38315,Assigned (20210809),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-38316,Candidate,"The WP Academic People List WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the category_name parameter in the ~/admin-panel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.4.1.",MISC:https://plugins.trac.wordpress.org/browser/wp-academic-people/tags/0.4.1/admin-panel.php#L57 | URL:https://plugins.trac.wordpress.org/browser/wp-academic-people/tags/0.4.1/admin-panel.php#L57 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38316 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38316,Assigned (20210809),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-38317,Candidate,"The Konnichiwa! Membership WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the plan_id parameter in the ~/views/subscriptions.html.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.8.3.",MISC:https://plugins.trac.wordpress.org/browser/konnichiwa/trunk/views/subscriptions.html.php?rev=1625922#L7 | URL:https://plugins.trac.wordpress.org/browser/konnichiwa/trunk/views/subscriptions.html.php?rev=1625922#L7 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38317 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38317,Assigned (20210809),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-38318,Candidate,"The 3D Cover Carousel WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/cover-carousel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.",MISC:https://plugins.trac.wordpress.org/browser/3d-cover-carousel/trunk/cover-carousel.php?rev=1522904#L733 | URL:https://plugins.trac.wordpress.org/browser/3d-cover-carousel/trunk/cover-carousel.php?rev=1522904#L733 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38318 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38318,Assigned (20210809),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-38319,Candidate,"The More From Google WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/morefromgoogle.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.2.",MISC:https://plugins.trac.wordpress.org/browser/more-from-google/trunk/morefromgoogle.php#L397 | URL:https://plugins.trac.wordpress.org/browser/more-from-google/trunk/morefromgoogle.php#L397 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38319 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38319,Assigned (20210809),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-3832,Candidate,Integria IMS in its 5.0.92 version is vulnerable to a Remote Code Execution attack through file uploading. An unauthenticated attacker could abuse the AsyncUpload() function in order to exploit the vulnerability.,CONFIRM:https://integriaims.com/en/services/updates/ | URL:https://integriaims.com/en/services/updates/ | CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-remote-code-execution | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-remote-code-execution,Assigned (20210927),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-38320,Candidate,"The simpleSAMLphp Authentication WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/simplesamlphp-authentication.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.7.0.",MISC:https://plugins.trac.wordpress.org/browser/simplesamlphp-authentication/tags/0.7.0/simplesamlphp-authentication.php#L307 | URL:https://plugins.trac.wordpress.org/browser/simplesamlphp-authentication/tags/0.7.0/simplesamlphp-authentication.php#L307 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38320 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38320,Assigned (20210809),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-38321,Candidate,"The Custom Menu Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selected_menu parameter found in the ~/custom-menus.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.3.",MISC:https://plugins.trac.wordpress.org/browser/custom-sub-menus/trunk/custom-menus.php?rev=2205549#L136 | URL:https://plugins.trac.wordpress.org/browser/custom-sub-menus/trunk/custom-menus.php?rev=2205549#L136 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38321 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38321,Assigned (20210809),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-38322,Candidate,"The Twitter Friends Widget WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the pmc_TF_user and pmc_TF_password parameter found in the ~/twitter-friends-widget.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.1.",MISC:https://plugins.trac.wordpress.org/browser/twitter-friends-widget/trunk/twitter-friends-widget.php#L309 | URL:https://plugins.trac.wordpress.org/browser/twitter-friends-widget/trunk/twitter-friends-widget.php#L309 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38322 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38322,Assigned (20210809),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-38323,Candidate,"The RentPress WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the selections parameter found in the ~/src/rentPress/AjaxRequests.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 6.6.4.",MISC:https://plugins.trac.wordpress.org/browser/rentpress/tags/6.6.4/src/rentPress/AjaxRequests.php#L83 | URL:https://plugins.trac.wordpress.org/browser/rentpress/tags/6.6.4/src/rentPress/AjaxRequests.php#L83 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38323 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38323,Assigned (20210809),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-38324,Candidate,"The SP Rental Manager WordPress plugin is vulnerable to SQL Injection via the orderby parameter found in the ~/user/shortcodes.php file which allows attackers to retrieve information contained in a site's database, in versions up to and including 1.5.3.",MISC:https://plugins.trac.wordpress.org/browser/sp-rental-manager/tags/1.5.3/user/shortcodes.php#L389 | URL:https://plugins.trac.wordpress.org/browser/sp-rental-manager/tags/1.5.3/user/shortcodes.php#L389 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38324 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38324,Assigned (20210809),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-38325,Candidate,"The User Activation Email WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the uae-key parameter found in the ~/user-activation-email.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.0.",MISC:https://plugins.trac.wordpress.org/browser/user-activation-email/tags/1.3.0/user-activation-email.php#L191 | URL:https://plugins.trac.wordpress.org/browser/user-activation-email/tags/1.3.0/user-activation-email.php#L191 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38325 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38325,Assigned (20210809),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-38326,Candidate,"The Post Title Counter WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the notice parameter found in the ~/post-title-counter.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.1.",MISC:https://plugins.trac.wordpress.org/browser/post-title-counter/tags/1.1/post-title-counter.php#L87 | URL:https://plugins.trac.wordpress.org/browser/post-title-counter/tags/1.1/post-title-counter.php#L87 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38326 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38326,Assigned (20210809),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-38327,Candidate,"The YouTube Video Inserter WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/adminUI/settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.1.0.",MISC:https://plugins.trac.wordpress.org/browser/youtube-video-inserter/trunk/adminUI/settings.php#L67 | URL:https://plugins.trac.wordpress.org/browser/youtube-video-inserter/trunk/adminUI/settings.php#L67 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38327 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38327,Assigned (20210809),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-38328,Candidate,"The Notices WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/notices.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 6.1.",MISC:https://plugins.trac.wordpress.org/browser/notices/trunk/notices.php?rev=606181#L353 | URL:https://plugins.trac.wordpress.org/browser/notices/trunk/notices.php?rev=606181#L353 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38328 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38328,Assigned (20210809),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-38329,Candidate,"The DJ EmailPublish WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/dj-email-publish.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.7.2.",MISC:https://plugins.trac.wordpress.org/browser/dj-email-publish/tags/1.7.2/dj-email-publish.php#L259 | URL:https://plugins.trac.wordpress.org/browser/dj-email-publish/tags/1.7.2/dj-email-publish.php#L259 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38329 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38329,Assigned (20210809),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-3833,Candidate,"Integria IMS login check uses a loose comparator (""=="") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords.",CONFIRM:https://integriaims.com/en/services/updates/ | URL:https://integriaims.com/en/services/updates/ | CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-incorrect-authorization | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-incorrect-authorization,Assigned (20210927),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-38330,Candidate,"The Yet Another bol.com Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/yabp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.",MISC:https://plugins.trac.wordpress.org/browser/yabp/tags/1.4/yabp.php#L454 | URL:https://plugins.trac.wordpress.org/browser/yabp/tags/1.4/yabp.php#L454 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38330 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38330,Assigned (20210809),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-38331,Candidate,"The WP-T-Wap WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the posted parameter found in the ~/wap/writer.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.13.2.",MISC:https://plugins.trac.wordpress.org/browser/wp-t-wap/tags/1.13.3/wap/writer.php#L34 | URL:https://plugins.trac.wordpress.org/browser/wp-t-wap/tags/1.13.3/wap/writer.php#L34 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38331 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38331,Assigned (20210809),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-38332,Candidate,"The On Page SEO + Whatsapp Chat Button Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.1.",MISC:https://plugins.trac.wordpress.org/browser/ops-robots-txt/tags/1.0.0/settings.php#L175 | URL:https://plugins.trac.wordpress.org/browser/ops-robots-txt/tags/1.0.0/settings.php#L175 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38332 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38332,Assigned (20210809),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-38333,Candidate,"The WP Scrippets WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/wp-scrippets.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.5.1.",MISC:https://plugins.trac.wordpress.org/browser/wp-scrippets/tags/1.5.1/wp-scrippets.php#L123 | URL:https://plugins.trac.wordpress.org/browser/wp-scrippets/tags/1.5.1/wp-scrippets.php#L123 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38333 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38333,Assigned (20210809),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-38334,Candidate,"The WP Design Maps & Places WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the filename parameter found in the ~/wpdmp-admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.",MISC:https://plugins.trac.wordpress.org/browser/wp-design-maps-places/tags/1.2/wpdmp-admin.php#L192 | URL:https://plugins.trac.wordpress.org/browser/wp-design-maps-places/tags/1.2/wpdmp-admin.php#L192 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38334 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38334,Assigned (20210809),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-38335,Candidate,"The Wise Agent Capture Forms WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/WiseAgentCaptureForm.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.",MISC:https://plugins.trac.wordpress.org/browser/wiseagentleadform/tags/2.0/WiseAgentCaptureForm.php#L44 | URL:https://plugins.trac.wordpress.org/browser/wiseagentleadform/tags/2.0/WiseAgentCaptureForm.php#L44 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38335 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38335,Assigned (20210809),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-38336,Candidate,"The Edit Comments XT WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/edit-comments-xt.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.",MISC:https://plugins.trac.wordpress.org/browser/edit-comments-xt/tags/1.0/edit-comments-xt.php#L249 | URL:https://plugins.trac.wordpress.org/browser/edit-comments-xt/tags/1.0/edit-comments-xt.php#L249 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38336 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38336,Assigned (20210809),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-38337,Candidate,"The RSVPMaker Excel WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/phpexcel/PHPExcel/Shared/JAMA/docs/download.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.1.",MISC:https://plugins.trac.wordpress.org/browser/rsvpmaker-excel/tags/1.2/phpexcel/PHPExcel/Shared/JAMA/docs/download.php#L61 | URL:https://plugins.trac.wordpress.org/browser/rsvpmaker-excel/tags/1.2/phpexcel/PHPExcel/Shared/JAMA/docs/download.php#L61 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38337 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38337,Assigned (20210809),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-38338,Candidate,"The Border Loading Bar WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the `f` and `t` parameter found in the ~/titan-framework/iframe-googlefont-preview.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.1.",MISC:https://plugins.trac.wordpress.org/browser/border-loading-bar/trunk/titan-framework/iframe-googlefont-preview.php#L39 | URL:https://plugins.trac.wordpress.org/browser/border-loading-bar/trunk/titan-framework/iframe-googlefont-preview.php#L39 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38338 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38338,Assigned (20210809),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-38339,,"The Simple Matted Thumbnails WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/simple-matted-thumbnail.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.01.",MISC:https://plugins.trac.wordpress.org/browser/simple-matted-thumbnails/tags/1.01/simple-matted-thumbnail.php#L122 | URL:https://plugins.trac.wordpress.org/browser/simple-matted-thumbnails/tags/1.01/simple-matted-thumbnail.php#L122 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38339 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38339,Assigned (20210809),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-3834,Candidate,Integria IMS in its 5.0.92 version does not filter correctly some fields related to the login.php file. An attacker could exploit this vulnerability in order to perform a cross-site scripting attack (XSS).,CONFIRM:https://integriaims.com/en/services/updates/ | URL:https://integriaims.com/en/services/updates/ | CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-vulnerable-cross-site-scripting-xss | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/integria-ims-vulnerable-cross-site-scripting-xss,Assigned (20210927),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-38340,Candidate,"The Wordpress Simple Shop WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the update_row parameter found in the ~/includes/add_product.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.",MISC:https://plugins.trac.wordpress.org/browser/webful-simple-grocery-shop/trunk/includes/add_product.php#L80 | URL:https://plugins.trac.wordpress.org/browser/webful-simple-grocery-shop/trunk/includes/add_product.php#L80 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38340 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38340,Assigned (20210809),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-38341,Candidate,"The WooCommerce Payment Gateway Per Category WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER[""PHP_SELF""] value in the ~/includes/plugin_settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.10.",MISC:https://plugins.trac.wordpress.org/browser/wc-payment-gateway-per-category/tags/2.0.10/includes/plugin_settings.php#L31 | URL:https://plugins.trac.wordpress.org/browser/wc-payment-gateway-per-category/tags/2.0.10/includes/plugin_settings.php#L31 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38341 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38341,Assigned (20210809),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-38342,Candidate,"The Nested Pages WordPress plugin <= 3.1.15 was vulnerable to Cross-Site Request Forgery via the `npBulkAction`s and `npBulkEdit` `admin_post` actions, which allowed attackers to trash or permanently purge arbitrary posts as well as changing their status, reassigning their ownership, and editing other metadata.",MISC:https://www.wordfence.com/blog/2021/08/nested-pages-pat…on-vulnerability/ | URL:https://www.wordfence.com/blog/2021/08/nested-pages-pat…on-vulnerability/,Assigned (20210809),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-38343,Candidate,"The Nested Pages WordPress plugin <= 3.1.15 was vulnerable to an Open Redirect via the `page` POST parameter in the `npBulkActions`, `npBulkEdit`, `npListingSort`, and `npCategoryFilter` `admin_post` actions.",MISC:https://www.wordfence.com/blog/2021/08/nested-pages-pat…on-vulnerability/ | URL:https://www.wordfence.com/blog/2021/08/nested-pages-pat…on-vulnerability/,Assigned (20210809),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-38344,Candidate,"The Brizy Page Builder plugin <= 2.3.11 for WordPress was vulnerable to stored XSS by lower-privileged users such as a subscribers. It was possible to add malicious JavaScript to a page by modifying the request sent to update the page via the brizy_update_item AJAX action and adding JavaScript to the data parameter, which would be executed in the session of any visitor viewing or previewing the post or page.",MISC:https://www.wordfence.com/blog/2021/10/multiple-vulnerabilities-in-brizy-page-builder-plugin-allow-site-takeover/ | URL:https://www.wordfence.com/blog/2021/10/multiple-vulnerabilities-in-brizy-page-builder-plugin-allow-site-takeover/,Assigned (20210809),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-38345,Candidate,"The Brizy Page Builder plugin <= 2.3.11 for WordPress used an incorrect authorization check that allowed any logged-in user accessing any endpoint in the wp-admin directory to modify the content of any existing post or page created with the Brizy editor. An identical issue was found by another researcher in Brizy <= 1.0.125 and fixed in version 1.0.126, but the vulnerability was reintroduced in version 1.0.127.",MISC:https://www.wordfence.com/blog/2021/10/multiple-vulnerabilities-in-brizy-page-builder-plugin-allow-site-takeover/ | URL:https://www.wordfence.com/blog/2021/10/multiple-vulnerabilities-in-brizy-page-builder-plugin-allow-site-takeover/,Assigned (20210809),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-38346,Candidate,"The Brizy Page Builder plugin <= 2.3.11 for WordPress allowed authenticated users to upload executable files to a location of their choice using the brizy_create_block_screenshot AJAX action. The file would be named using the id parameter, which could be prepended with ""../"" to perform directory traversal, and the file contents were populated via the ibsf parameter, which would be base64-decoded and written to the file. While the plugin added a .jpg extension to all uploaded filenames, a double extension attack was still possible, e.g. a file named shell.php would be saved as shell.php.jpg, and would be executable on a number of common configurations.",MISC:https://www.wordfence.com/blog/2021/10/multiple-vulnerabilities-in-brizy-page-builder-plugin-allow-site-takeover/ | URL:https://www.wordfence.com/blog/2021/10/multiple-vulnerabilities-in-brizy-page-builder-plugin-allow-site-takeover/,Assigned (20210809),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-38347,Candidate,"The Custom Website Data WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter found in the ~/views/edit.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2.",MISC:https://plugins.trac.wordpress.org/browser/simple-custom-website-data/tags/2.2/views/edit.php#L30 | URL:https://plugins.trac.wordpress.org/browser/simple-custom-website-data/tags/2.2/views/edit.php#L30 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38347 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38347,Assigned (20210809),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-38348,Candidate,"The Advance Search WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the wpas_id parameter found in the ~/inc/admin/views/html-advance-search-admin-options.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.1.2.",MISC:https://plugins.trac.wordpress.org/browser/advance-search/trunk/inc/admin/views/html-advance-search-admin-options.php#L88 | URL:https://plugins.trac.wordpress.org/browser/advance-search/trunk/inc/admin/views/html-advance-search-admin-options.php#L88 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38348 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38348,Assigned (20210809),None (candidate not yet proposed),
|
| 70 |
-
%VE-2021-|8349,Candidate,"The Integration of Moneybird for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the error_description parameter found in the ~/templates/wcmb-admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.1.",MISC:https://plugins.trac.wordpress.org/browser/woo-moneybird/tags/2.1.1/templates/wcmb-admin.php#L8 | URL:https://plugins.trac.wordpress.org/browser/woo-moneybird/tags/2.1.1/templates/wcmb-admin.php#L8 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38349 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38349,Assigned (20210809),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-3835,Candidate,"Buffer overflow in usb device class. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf",MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf | URL:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf,Assigned (20210927),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-38350,Candidate,"The spideranalyse WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the date parameter found in the ~/analyse/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.1.",MISC:https://plugins.trac.wordpress.org/browser/spideranalyse/trunk/analyse/index.php#L33 | URL:https://plugins.trac.wordpress.org/browser/spideranalyse/trunk/analyse/index.php#L33 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38350 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38350,Assigned (20210809),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-38351,C%andid#a!$te,"The OSD Subscribe WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the osd_subscribe_message parameter found in the ~/options/osd_subscribe_options_subscribers.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.3.",MISC:https://plugins.trac.wordpress.org/browser/osd-subscribe/tags/1.2.3/options/osd_subscribe_options_subscribers.php#L86 | URL:https://plugins.trac.wordpress.org/browser/osd-subscribe/tags/1.2.3/options/osd_subscribe_options_subscribers.php#L86 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38351 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38351,Assigned (20210809),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-38352,Candidate,"The Feedify – Web Push Notifications WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the feedify_msg parameter found in the ~/includes/base.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.8.",MISC:https://plugins.trac.wordpress.org/browser/push-notification-by-feedify/tags/2.1.1/includes/base.php#L199 | URL:https://plugins.trac.wordpress.org/browser/push-notification-by-feedify/tags/2.1.1/includes/base.php#L199 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38352 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38352,Assigned (20210809),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-38353,Candidate,"The Dropdown and scrollable Text WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the content parameter found in the ~/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.",MISC:https://plugins.trac.wordpress.org/browser/dropdown-and-scrollable-text/trunk/index.php?rev=2307131#L176 | URL:https://plugins.trac.wordpress.org/browser/dropdown-and-scrollable-text/trunk/index.php?rev=2307131#L176 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38353 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38353,Assigned (20210809),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-38354,Candidate,"The GNU-Mailman Integration WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the gm_error parameter found in the ~/includes/admin/mailing-lists-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.6.",MISC:https://plugins.trac.wordpress.org/browser/gnu-mailman-integration/trunk/includes/admin/mailing-lists-page.php?rev=859898#L34 | URL:https://plugins.trac.wordpress.org/browser/gnu-mailman-integration/trunk/includes/admin/mailing-lists-page.php?rev=859898#L34 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38354 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38354,Assigned (20210809),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-38355,Candidate,"The Bug Library WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the successimportcount parameter found in the ~/bug-library.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.3.",MISC:https://plugins.trac.wordpress.org/browser/bug-library/trunk/bug-library.php?rev=2571533#L1358 | URL:https://plugins.trac.wordpress.org/browser/bug-library/trunk/bug-library.php?rev=2571533#L1358 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38355 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38355,Assigned (20210809),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-38356,Candidate,The NextScripts: Social Networks Auto-Poster <= 4.3.20 WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the $_REQUEST['page'] parameter which is echoed out on inc/nxs_class_snap.php by supplying the appropriate value 'nxssnap-post' to load the page in $_GET['page'] along with malicious JavaScript in $_POST['page'].,MISC:https://www.wordfence.com/blog/2021/10/xss-vulnerability-in-nextscripts-social-networks-auto-poster-plugin-impacts-100000-sites/ | URL:https://www.wordfence.com/blog/2021/10/xss-vulnerability-in-nextscripts-social-networks-auto-poster-plugin-impacts-100000-sites/,Assigned (20210809),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-38357,Candidate,"The SMS OVH WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the position parameter found in the ~/sms-ovh-sent.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1.",MISC:https://plugins.trac.wordpress.org/browser/sms-ovh/trunk/sms-ovh-sent.php#L44 | URL:https://plugins.trac.wordpress.org/browser/sms-ovh/trunk/sms-ovh-sent.php#L44 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38357 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38357,Assigned (20210809),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-38358,Candidate,"The MoolaMojo WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the classes parameter found in the ~/views/button-generator.html.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.7.4.1.",MISC:https://plugins.trac.wordpress.org/browser/moolamojo/trunk/views/button-generator.html.php#L16 | URL:https://plugins.trac.wordpress.org/browser/moolamojo/trunk/views/button-generator.html.php#L16 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38358 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38358,Assigned (20210809),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-38359,Candidate,"The WordPress InviteBox Plugin for viral Refer-a-Friend Promotions WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the message parameter found in the ~/admin/admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.1.",MISC:https://plugins.trac.wordpress.org/browser/refer-a-friend-widget-for-wp/tags/1.4.1/admin/admin.php#L75 | URL:https://plugins.trac.wordpress.org/browser/refer-a-friend-widget-for-wp/tags/1.4.1/admin/admin.php#L75 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38359 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38359,Assigned (20210809),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-3836,Candidate,dbeaver is vulnerable to Improper Restriction of XML External Entity Reference,CONFIRM:https://huntr.dev/bounties/a98264fb-1930-4c7c-b774-af24c0175fd4 | URL:https://huntr.dev/bounties/a98264fb-1930-4c7c-b774-af24c0175fd4 | MISC:https://github.com/dbeaver/dbeaver/commit/4debf8f25184b7283681ed3fb5e9e887d9d4fe22 | URL:https://github.com/dbeaver/dbeaver/commit/4debf8f25184b7283681ed3fb5e9e887d9d4fe22,Assigned (20210927),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-38360,Candidate,"The wp-publications WordPress plugin is vulnerable to restrictive local file inclusion via the Q_FILE parameter found in the ~/bibtexbrowser.php file which allows attackers to include local zip files and achieve remote code execution, in versions up to and including 0.0.",MISC:https://plugins.trac.wordpress.org/browser/wp-publications/trunk/bibtexbrowser.php?rev=1830330#L49 | URL:https://plugins.trac.wordpress.org/browser/wp-publications/trunk/bibtexbrowser.php?rev=1830330#L49 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38360 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38360,Assigned (20210809),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-38361,Candidate,"The .htaccess Redirect WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the link parameter found in the ~/htaccess-redirect.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.3.1.",MISC:https://plugins.trac.wordpress.org/browser/htaccess-redirect/trunk/htaccess-redirect.php#L249 | URL:https://plugins.trac.wordpress.org/browser/htaccess-redirect/trunk/htaccess-redirect.php#L249 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38361 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38361,Assigned (20210809),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-38362,Candidate,"In RSA Archer 6.x through 6.9 SP3 (6.9.3.0), an authenticated attacker can make a GET request to a REST API endpoint that is vulnerable to an Insecure Direct Object Reference (IDOR) issue and retrieve sensitive data.",MISC:https://github.com/fireeye/Vulnerability-Disclosures | MISC:https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0021/MNDT-2022-0021.md | MISC:https://www.archerirm.community/t5/security-advisories/archer-an-rsa-business-update-for-multiple-vulnerabilities/ta-p/674497,Assigned (20210810),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-38363,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 87 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-38365,Candidate,"Winner (aka ToneWinner) desktop speakers through 2021-08-09 allow remote attackers to recover speech signals from the power-indicator LED via a telescope and an electro-optical sensor, aka a ""Glowworm"" attack.",MISC:http://www.tonewinner.com | MISC:https://www.nassiben.com/glowworm-attack,Assigned (20210810),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-38366,Candidate,"Sitecore through 10.1, when Update Center is enabled, allows remote authenticated users to upload arbitrary files and achieve remote code execution by visiting an uploaded .aspx file at an admin/Packages URL.",MISC:https://blog.istern.dk/2021/08/10/sitecore-10-authenticated-file-upload-to-rce/,Assigned (20210810),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-38367,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-38368,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-38369,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-3837,Candidate,openwhyd is vulnerable to Improper Authorization,CONFIRM:https://huntr.dev/bounties/d66f90d6-1b5f-440d-8be6-cdffc9d4587e | URL:https://huntr.dev/bounties/d66f90d6-1b5f-440d-8be6-cdffc9d4587e | MISC:https://github.com/openwhyd/openwhyd/commit/102a97bb082edc831cf35d27f9e5c4f55f10ae85 | URL:https://github.com/openwhyd/openwhyd/commit/102a97bb082edc831cf35d27f9e5c4f55f10ae85,Assigned (20210927),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-38370,Candidate,"In Alpine before 2.25, untagged responses from an IMAP server are accepted before STARTTLS.",GENTOO:GLSA-202301-07 | URL:https://security.gentoo.org/glsa/202301-07 | MISC:https://alpine.x10host.com | MISC:https://bugs.gentoo.org/807613#c4 | MISC:https://nostarttls.secvuln.info,Assigned (20210810),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-38371,Candidate,The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.,MISC:https://nostarttls.secvuln.info | MISC:https://www.exim.org | MISC:https://www.exim.org/static/doc/security/CVE-2021-38371.txt,Assigned (20210810),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-38372,Candidate,"In KDE Trojita 0.7, man-in-the-middle attackers can create new folders because untagged responses from an IMAP server are accepted before STARTTLS.",MISC:https://bugs.kde.org/show_bug.cgi?id=432353 | MISC:https://nostarttls.secvuln.info,Assigned (20210810),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-38373,Candidate,"In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is not honored (and cleartext messages are sent) unless ""Server requires authentication"" is checked.",MISC:https://bugs.kde.org/show_bug.cgi?id=423423 | MISC:https://nostarttls.secvuln.info,Assigned (20210810),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-38374,Candidate,OX App Suite through through 7.10.5 allows XSS via a crafted snippet that has an app loader reference within an app loader URL.,FULLDISC:20220721 Open-Xchange Security Advisory 2022-07-21 | URL:http://seclists.org/fulldisclosure/2022/Jul/11 | MISC:http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html | MISC:http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html | MISC:http://seclists.org/fulldisclosure/2021/Nov/43 | MISC:https://www.open-xchange.com,Assigned (20210810),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-38375,,OX App Suite through 7.10.5 allows XSS via the alt attribute of an IMG element in a truncated e-mail message.,MISC:http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html | MISC:https://seclists.org/fulldisclosure/2021/Nov/43 | MISC:https://www.open-xchange.com,Assigned (20210810),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-38376,Candidate,OX App Suite through 7.10.5 has Incorrect Access Control for retrieval of session information via the rampup action of the login API call.,MISC:http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html | MISC:https://seclists.org/fulldisclosure/2021/Nov/43 | MISC:https://www.open-xchange.com,Assigned (20210810),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-38377,Candidate,"OX App Suite through 7.10.5 allows XSS via JavaScript code in an anchor HTML comment within truncated e-mail, because there is a predictable UUID with HTML transformation results.",MISC:http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html | MISC:https://seclists.org/fulldisclosure/2021/Nov/43 | MISC:https://www.open-xchange.com,Assigned (20210810),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-38378,Candidate,OX App Suite 7.10.5 allows Information Exposure because a caching mechanism can caused a Modified By response to show a person's name.,MISC:http://packetstormsecurity.com/files/165038/OX-App-Suite-7.10.5-Cross-Site-Scripting-Information-Disclosure.html | MISC:https://seclists.org/fulldisclosure/2021/Nov/43 | MISC:https://www.open-xchange.com,Assigned (20210810),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-38379,Candidate,The Hub in CFEngine Enterprise 3.6.7 through 3.18.0 has Insecure Permissions that allow local Information Disclosure.,MISC:https://cfengine.com/blog/2021/cve-2021-38379-and-cve-2021-36756/ | MISC:https://docs.cfengine.com/docs/3.18/enterprise-cfengine-guide.html,Assigned (20210810),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-3838,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210929),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-38380,Candidate,"Live555 through 1.08 mishandles huge requests for the same MP3 stream, leading to recursion and s stack-based buffer over-read. An attacker can leverage this to launch a DoS attack.",MISC:http://lists.live555.com/pipermail/live-devel/2021-August/021954.html | MISC:http://www.live555.com/liveMedia/public/changelog.txt#[2021.08.04],Assigned (20210810),None (candidate not yet proposed),
|
| 106 |
-
CV-2021-38381,Candidate,Live555 through 1.08 does not handle MPEG-1 or 2 files properly. Sending two successive RTSP SETUP commands for the same track causes a Use-After-Free and daemon crash.,MISC:http://lists.live555.com/pipermail/live-devel/2021-August/021961.html | MISC:http://www.live555.com/liveMedia/public/changelog.txt#[2021.08.09],Assigned (20210810),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-38382,Candidate,Live555 through 1.08 does not handle Matroska and Ogg files properly. Sending two successive RTSP SETUP commands for the same track causes a Use-After-Free and daemon crash.,MISC:http://lists.live555.com/pipermail/live-devel/2021-August/021959.html | MISC:http://www.live555.com/liveMedia/public/changelog.txt#[2021.08.06],Assigned (20210810),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-38383,Candidate,OwnTone (aka owntone-server) through 28.1 has a use-after-free in net_bind() in misc.c.,MISC:https://github.com/owntone/owntone-server/commit/246d8ae0cef27377e5dfe9ee3ad87e864d6b6266,Assigned (20210810),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-38384,Candidate,"Serverless Offline 8.0.0 returns a 403 HTTP status code for a route that has a trailing / character, which might cause a developer to implement incorrect access control, because the actual behavior within the Amazon AWS environment is a 200 HTTP status code (i.e., possibly greater than expected permissions).",MISC:https://github.com/dherault/serverless-offline/issues/1259,Assigned (20210810),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-38385,Candidate,"Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.",CONFIRM:https://blog.torproject.org/node/2062 | CONFIRM:https://bugs.torproject.org/tpo/core/tor/40078 | MISC:https://blog.torproject.org,Assigned (20210810),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-38386,Candidate,"In Contiki 3.0, a buffer overflow in the Telnet service allows remote attackers to cause a denial of service because the ls command is mishandled when a directory has many files with long names.",MISC:https://github.com/contiki-os/contiki/issues/2687,Assigned (20210810),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-38387,Candidate,"In Contiki 3.0, a Telnet server that silently quits (before disconnection with clients) leads to connected clients entering an infinite loop and waiting forever, which may cause excessive CPU consumption.",MISC:https://github.com/contiki-os/contiki/issues/2688,Assigned (20210810),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-38388,Cndidate,Central Dogma allows privilege escalation with mirroring to the internal dogma repository that has a file managing the authorization of the project.,MISC:https://github.com/line/centraldogma/pull/621 | URL:https://github.com/line/centraldogma/pull/621,Assigned (20210810),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-38389,Candidate,"Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-285-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-285-02,Assigned (20210810),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-3839,Candidate,"A flaw was found in the vhost library in DPDK. Function vhost_user_set_inflight_fd() does not validate `msg->payload.inflight.num_queues`, possibly causing out-of-bounds memory read/write. Any software using DPDK vhost library may crash as a result of this vulnerability.",MISC:https://access.redhat.com/security/cve/CVE-2021-3839 | URL:https://access.redhat.com/security/cve/CVE-2021-3839 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2025882 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2025882 | MISC:https://github.com/DPDK/dpdk/commit/6442c329b9d2ded0f44b27d2016aaba8ba5844c5 | URL:https://github.com/DPDK/dpdk/commit/6442c329b9d2ded0f44b27d2016aaba8ba5844c5,Assigned (20210929),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-38390,Candidate,"A Blind SQL injection vulnerability exists in the /DataHandler/HandlerEnergyType.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter egyid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-238-03 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-238-03,Assigned (20210810),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-38391,Candidate,"A Blind SQL injection vulnerability exists in the /DataHandler/AM/AM_Handler.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter type before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-238-03 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-238-03,Assigned (20210810),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-38392,Candidate,A skilled attacker with physical access to the affected device can gain access to the hard disk drive of the device to change the telemetry region and could use this setting to interrogate or program an implantable device in any region in the world.,MISC:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01,Assigned (20210810),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-38393,Candidate,"A Blind SQL injection vulnerability exists in the /DataHandler/HandlerAlarmGroup.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter agid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-238-03 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-238-03,Assigned (20210810),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-38394,Candidate,"An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted.",MISC:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01,Assigned (20210810),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-38395,Candidate,"Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralization of special elements in output, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.",CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-278-04 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-278-04 | CONFIRM:https://www.honeywellprocess.com/library/support/notifications/Customer/SN2021-02-22-01-Experion-C300-CCL.pdf | URL:https://www.honeywellprocess.com/library/support/notifications/Customer/SN2021-02-22-01-Experion-C300-CCL.pdf,Assigned (20210810),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-38396,Candidate,The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted USB.,MISC:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01,Assigned (20210810),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-38397,Candidate,"Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.",CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-278-04 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-278-04 | CONFIRM:https://www.honeywellprocess.com/library/support/notifications/Customer/SN2021-02-22-01-Experion-C300-CCL.pdf | URL:https://www.honeywellprocess.com/library/support/notifications/Customer/SN2021-02-22-01-Experion-C300-CCL.pdf,Assigned (20210810),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-38398,Candidate,The affected device uses off-the-shelf software components that contain unpatched vulnerabilities. A malicious attacker with physical access to the affected device could exploit these vulnerabilities.,MISC:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01,Assigned (20210810),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1016.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-38399,Candidate,"Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to relative path traversal, which may allow an attacker access to unauthorized files and directories.",CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-278-04 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-278-04 | CONFIRM:https://www.honeywellprocess.com/library/support/notifications/Customer/SN2021-02-22-01-Experion-C300-CCL.pdf | URL:https://www.honeywellprocess.com/library/support/notifications/Customer/SN2021-02-22-01-Experion-C300-CCL.pdf,Assigned (20210810),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-3840,Candidate,"A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi). MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi. The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi.",MISC:https://github.com/lenovo/Antilles/security/advisories/GHSA-hgc3-hp6x-wpgx | URL:https://github.com/lenovo/Antilles/security/advisories/GHSA-hgc3-hp6x-wpgx,Assigned (20210929),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-38400,Candidate,An attacker with physical access to Boston Scientific Zoom Latitude Model 3120 can remove the hard disk drive or create a specially crafted USB to extract the password hash for brute force reverse engineering of the system password.,MISC:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsma-21-273-01,Assigned (20210810),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-38401,Candidate,"Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an untrusted pointer dereference, which may allow an attacker to execute arbitrary code and cause the application to crash.",MISC:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01,Assigned (20210810),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-38402,Candidate,Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-252-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-252-02,Assigned (20210810),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-38403,Candidate,"Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter supplier of the API maintenance, which may allow an attacker to remotely execute code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-38404,Candidate,Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-252-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-252-02,Assigned (20210810),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-38405,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-38406,Candidate,Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-252-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-252-02,Assigned (20210810),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-38407,,"Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-38408,,A stack-based buffer overflow vulnerability in Advantech WebAccess Versions 9.02 and prior caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-245-03 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-245-03,Assigned (20210810),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-38409,Candidate,"Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an access of uninitialized pointer, which may allow an attacker read from or write to unexpected memory locations, leading to a denial-of-service.",MISC:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01,Assigned (20210810),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-3841,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210930),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-38410,Candidate,"AVEVA Software Platform Common Services (PCS) Portal versions 4.5.2, 4.5.1, 4.5.0, and 4.4.6 are vulnerable to DLL hijacking through an uncontrolled search path element, which may allow an attacker control to one or more locations in the search path.",CONFIRM:https://www.aveva.com/en/support-and-success/cyber-security-updates/ | URL:https://www.aveva.com/en/support-and-success/cyber-security-updates/ | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-252-01,Assigned (20210810),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-38411,@andidate,"Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter deviceName of the API modbusWriter-Reader, which may allow an attacker to remotely execute code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-38412,Candidate,Properly formatted POST requests to multiple resources on the HTTP and HTTPS web servers of the Digi PortServer TS 16 Rack device do not require authentication or authentication tokens. This vulnerability could allow an attacker to enable the SNMP service and manipulate the community strings to achieve further control in.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-257-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-257-01,Assigned (20210810),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-38413,Candidate,"Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to a stack-based buffer overflow, which may allow an attacker to achieve code execution.",MISC:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01,Assigned (20210810),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-38414,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-38415,,"Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable a heap-based buffer overflow when parsing a specially crafted project file, which may allow an attacker to execute arbitrary code.",MISC:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01,Assigned (20210810),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-38416,Candidate,"Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an attacker to use DLL hijacking and takeover the system where the software is installed.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-38417,Candidate,"VISAM VBASE version 11.6.0.6 is vulnerable to improper access control via the web-remote endpoint, which may allow an unauthenticated user viewing access to folders and files in the directory listing.",CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-308-01 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-308-01,Assigned (20210810),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-38418,Candidate,"Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an attacker to be positioned between the traffic and perform a machine-in-the-middle attack to access information without authorization.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-38$19,Candidate,"Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an out-of-bounds write, which can result in data corruption, a system crash, or code execution.",MISC:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01,Assigned (20210810),None (candidate not yet proposed),
|
| 25 |
-
,Candidate,nltk is vulnerable to Inefficient Regular Expression Complexity,CONFIRM:https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a | URL:https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a | MISC:https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d | URL:https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d,Assigned (20210930),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-38420,Candidate,"Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-38421,Candidate,"Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an out-of-bounds read, which may allow an attacker to read sensitive information from other memory locations or cause a crash.",MISC:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-299-01,Assigned (20210810),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-38422,Candidate,"Delta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, which may allow an attacker to have extensive access to the application directory and escalate privileges.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-38423,Candidate,"All versions of GurumDDS improperly calculate the size to be used when allocating the buffer, which may result in a buffer overflow.",CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-38424,Candidate,The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-38425,Candidate,"eProsima Fast DDS versions prior to 2.4.0 (#2269) are susceptible to exploitation when an attacker sends a specially crafted packet to flood a target device with unwanted traffic, which may result in a denial-of-service condition and information exposure.",CONFIRM:https://github.com/eProsima/Fast-DDS | URL:https://github.com/eProsima/Fast-DDS | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-38426,Candidate,"FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06,Assigned (20210810),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-38427,Candidate,"RTI Connext DDS Professional and Connext DDS Secure Versions 4.2.x to 6.1.0 are vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.",CONFIRM:https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F | URL:https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-38428,Candidate,"Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API schedule, which may allow an attacker to remotely execute code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-38429,Candidate,"OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition and information exposure.",CONFIRM:https://opendds.org/ | URL:https://opendds.org/ | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-3843,Candidate,A potential vulnerability in the SMI function to access EEPROM in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code.,MISC:https://support.lenovo.com/us/en/product_security/LEN-72619 | URL:https://support.lenovo.com/us/en/product_security/LEN-72619,Assigned (20210930),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-38430,%a$didate,"FATEK Automation WinProladder versions 3.30 and prior proper validation of user-supplied data when parsing project files, which could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06,Assigned (20210810),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-38431,Candidate,An authenticated user using Advantech WebAccess SCADA in versions 9.0.3 and prior can use API functions to disclose project names and paths from other users.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-285-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-285-01,Assigned (20210810),None (candidate not yet proposed),
|
| 39 |
-
,Candidate,"FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-07 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-07,Assigned (20210810),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-38433,Candidate,"RTI Connext DDS Professional and Connext DDS Secure Versions 4.2x to 6.1.0 vulnerable to a stack-based buffer overflow, which may allow a local attacker to execute arbitrary code.",CONFIRM:https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F | URL:https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-38434,Candidate,"FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an unexpected sign extension. An attacker could leverage this vulnerability to execute arbitrary code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06,Assigned (20210810),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-38435,Candidate,"RTI Connext DDS Professional and Connext DDS Secure Versions 4.2x to 6.1.0 not correctly calculate the size when allocating the buffer, which may result in a buffer overflow.",CONFIRM:https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F | URL:https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-38436,Candidate,"FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a memory-corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06,Assigned (20210810),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-38437,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-38438,Candidate,"A use after free vulnerability in FATEK Automation WinProladder versions 3.30 and prior may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06,Assigned (20210810),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-38439,Candidate,"All versions of GurumDDS are vulnerable to heap-based buffer overflow, which may cause a denial-of-service condition or remotely execute arbitrary code.",CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-3844,Candidate,"Rapid7 InsightVM suffers from insufficient session expiration when an administrator performs a security relevant edit on an existing, logged on user. For example, if a user's password is changed by an administrator due to an otherwise unrelated credential leak, that user account's current session is still valid after the password change, potentially allowing the attacker who originally compromised the credential to remain logged in and able to cause further damage. This vulnerability is mitigated by the use of the Platform Login feature. This issue is related to CVE-2019-5638.",MISC:https://docs.rapid7.com/insightvm/enable-insightvm-platform-login | URL:https://docs.rapid7.com/insightvm/enable-insightvm-platform-login | MISC:https://www.cve.org/cverecord?id=CVE-2019-5638 | URL:https://www.cve.org/cverecord?id=CVE-2019-5638,Assigned (20210930),None (candidate not yet proposed),
|
| 48 |
-
,Candidate,"FATEK Automation WinProladder versions 3.30 and prior is vulnerable to an out-of-bounds read, which may allow an attacker to read unauthorized information.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06,Assigned (20210810),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-38441,Candidate,"Eclipse CycloneDDS versions prior to 0.8.0 are vulnerable to a write-what-where condition, which may allow an attacker to write arbitrary values in the XML parser.",CONFIRM:https://projects.eclipse.org/projects/iot.cyclonedds | URL:https://projects.eclipse.org/projects/iot.cyclonedds | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-38442,Candidate,"FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a heap-corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-06,Assigned (20210810),None (candidate not yet proposed),
|
| 51 |
-
,Candidate,"Eclipse CycloneDDS versions prior to 0.8.0 improperly handle invalid structures, which may allow an attacker to write arbitrary values in the XML parser.",CONFIRM:https://projects.eclipse.org/projects/iot.cyclonedds | URL:https://projects.eclipse.org/projects/iot.cyclonedds | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-38444,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-38445,Candidate,"OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.",CONFIRM:https://opendds.org/ | URL:https://opendds.org/ | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-38446,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-38447,Candidate,"OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition.",CONFIRM:https://opendds.org/ | URL:https://opendds.org/ | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-38448,Candidate,"The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-266-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-266-01,Assigned (20210810),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-38449,,"Some API functions permit by-design writing or copying data into a given buffer. Since the client controls these parameters, an attacker could rewrite the memory in any location of the affected product.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-3845,Candidate,ws-scrcpy is vulnerable to External Control of File Name or Path,CONFIRM:https://huntr.dev/bounties/dc7fc98f-4f4f-440a-b6f6-124a56ea36ef | URL:https://huntr.dev/bounties/dc7fc98f-4f4f-440a-b6f6-124a56ea36ef | MISC:https://github.com/netristv/ws-scrcpy/commit/e83cf65438bef83a3503b25358bba97bcc156fef | URL:https://github.com/netristv/ws-scrcpy/commit/e83cf65438bef83a3503b25358bba97bcc156fef,Assigned (20211001),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-38450,Candidate,"The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-266-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-266-02,Assigned (20210810),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-38451,Candidate,"The affected product’s proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify any offset and read out-of-bounds data.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 61 |
-
CV-2021-38452,Candidate,"A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03,Assigned (20210810),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-38453,,"Some API functions allow interaction with the registry, which includes reading values as well as data modification.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-38454,Candidate,"A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03,Assigned (20210810),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-38455,,The affected product’s OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value.,CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-38456,Candidate,A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03,Assigned (20210810),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-38457,Candidate,"The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-38458,Candidate,"A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03,Assigned (20210810),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-38459,Candidate,"The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-3846,Candidate,firefly-iii is vulnerable to Unrestricted Upload of File with Dangerous Type,CONFIRM:https://huntr.dev/bounties/5267ec1c-d204-40d2-bd4f-6c2dd495ee18 | URL:https://huntr.dev/bounties/5267ec1c-d204-40d2-bd4f-6c2dd495ee18 | MISC:https://github.com/firefly-iii/firefly-iii/commit/a85b6420c19ace35134f896e094e1971d8c7954b | URL:https://github.com/firefly-iii/firefly-iii/commit/a85b6420c19ace35134f896e094e1971d8c7954b,Assigned (20211001),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-38460,Candidate,"A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-03,Assigned (20210810),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-38461,Candidate,The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.,CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-38462,,InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 does not enforce an efficient password policy. This may allow an attacker with obtained user credentials to enumerate passwords and impersonate other application users and perform operations on their behalf.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-38463,Candidate,The affected product does not properly control the allocation of resources. A user may be able to allocate unlimited memory buffers using API functions.,CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-38464,Candidate,"InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have inadequate encryption strength, which may allow an attacker to intercept the communication and steal sensitive information or hijack the session.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-38465,Candidate,"The webinstaller is a Golang web server executable that enables the generation of an Auvesy image agent. Resource consumption can be achieved by generating large amounts of installations, which are then saved without limitation in the temp folder of the webinstaller executable.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-38466,Candidate,"InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not perform sufficient input validation on client requests from the help page. This may allow an attacker to perform a reflected cross-site scripting attack, which could allow an attacker to run code on behalf of the client browser.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-38467,Candidate,A specific function code receives a raw pointer supplied by the user and deallocates this pointer. The user can then control what memory regions will be freed and cause use-after-free condition.,CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-38468,Candidate,"InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to stored cross-scripting, which may allow an attacker to hijack sessions of users connected to the system.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-38469,$Ca*ndidat@e?,"Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loaded DLL.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-3847,Candidate,An unauthorized access to the execution of the setuid file with capabilities flaw in the Linux kernel OverlayFS subsystem was found in the way user copying a capable file from a nosuid mount into another mount. A local user could use this flaw to escalate their privileges on the system.,MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2009704 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2009704 | MISC:https://www.openwall.com/lists/oss-security/2021/10/14/3 | URL:https://www.openwall.com/lists/oss-security/2021/10/14/3,Assigned (20211001),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-38470,Candidate,InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a ping tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-38471,C*an@d*idate%,"There are multiple API function codes that permit data writing to any file, which may allow an attacker to modify existing files or create new files.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-38472,Candidate,"InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 management portal does not contain an X-FRAME-OPTIONS header, which an attacker may take advantage of by sending a link to an administrator that frames the router’s management portal and could lure the administrator to perform changes.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-38473,Candidate,"The affected product’s code base doesn’t properly control arguments for specific functions, which could lead to a stack overflow.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-38474,Canidate,InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 have has no account lockout policy configured for the login page of the product. This may allow an attacker to execute a brute-force password attack with no time limitation and without harming the normal operation of the user. This could allow an attacker to gain valid credentials for the product interface.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-38475,Candidate,"The database connection to the server is performed by calling a specific API, which could allow an unprivileged user to gain SYSDBA permissions.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-38476,Candidate,InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 authentication process response indicates and validates the existence of a username. This may allow an attacker to enumerate different user accounts.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-38477,Candidate,"There are multiple API function codes that permit reading and writing data to or from files and directories, which could lead to the manipulation and/or the deletion of files.",CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-38478,Candidate,InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to an attacker using a traceroute tool to inject commands into the device. This may allow the attacker to remotely run commands on behalf of the device.,MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-38479,Candidate,Many API function codes receive raw pointers remotely from the user and trust these pointers as valid in-bound memory regions. An attacker can manipulate API functions by writing arbitrary data into the resolved address of a raw pointer.,CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-3848,Candidate,"An arbitrary file creation by privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1, and Worry-Free Business Security Services could allow a local attacker to create an arbitrary file with higher privileges that could lead to a denial-of-service (DoS) on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.",MISC:https://success.trendmicro.com/solution/000289183 | URL:https://success.trendmicro.com/solution/000289183,Assigned (20211001),None (candidate not yet proposed),
|
| 92 |
-
,Candidate,"InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 are vulnerable to cross-site request forgery when unauthorized commands are submitted from a user the web application trusts. This may allow an attacker to remotely perform actions on the router’s management portal, such as making configuration changes, changing administrator credentials, and running system commands on the router.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-38481,Candidate,The scheduler service running on a specific TCP port enables the user to start and stop jobs. There is no sanitation of the supplied JOB ID provided to the function. An attacker may send a malicious payload that can enable the user to execute another SQL expression by sending a specific string.,CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01,Assigned (20210810),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-38482,Candidate,"InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 website used to control the router is vulnerable to stored cross-site scripting, which may allow an attacker to hijack sessions of users connected to the system.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-38483,Candidate,"The affected product is vulnerable to misconfigured binaries, allowing users on the target PC with SYSTEM level privileges access to overwrite the binary and modify files to gain privilege escalation.",MISC:https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-03,Assigned (20210810),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-38484,Candidate,"InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-38485,Candidate,The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.,CONFIRM:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02,Assigned (20210810),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-38486,Candidate,"InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 cloud portal allows for self-registration of the affected product without any requirements to create an account, which may allow an attacker to have full control over the product and execute code within the internal network to which the product is connected.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-280-05,Assigned (20210810),None (candidate not yet proposed),
|
| 99 |
-
CV%E$-2021-3@8487,Candidate,"RTI Connext DDS Professional, Connext DDS Secure versions 4.2x to 6.1.0, and Connext DDS Micro versions 2.4 and later are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic. This may result in a denial-of-service condition and information exposure.",CONFIRM:https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F | URL:https://support.rti.com/s/login/?ec=302&startURL=%2Fs%2F | CONFIRM:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02 | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-02,Assigned (20210810),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-38488,Candidate,"Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter comment of the API events, which may allow an attacker to remotely execute code.",MISC:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02 | URL:https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02,Assigned (20210810),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-38489,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210810),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-3849,Candidate,An authentication bypass vulnerability was discovered in the web interface of the Lenovo Fan Power Controller2 (FPC2) and Lenovo System Management Module (SMM) firmware that could allow an unauthenticated attacker to execute commands on the SMM and FPC2. SMM2 is not affected.,MISC:https://support.lenovo.com/us/en/product_security/LEN-72615 | URL:https://support.lenovo.com/us/en/product_security/LEN-72615,Assigned (20211001),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-38490,Candidate,"Altova MobileTogether Server before 7.3 SP1 allows XML exponential entity expansion, a different vulnerability than CVE-2021-37425.",MISC:https://www.redteam-pentesting.de/advisories/rt-sa-2021-002,Assigned (20210810),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-38491,Candidate,Mixed-content checks were unable to analyze opaque origins which led to some mixed content being loaded. This vulnerability affects Firefox < 92.,GENTOO:GLSA-202202-03 | URL:https://security.gentoo.org/glsa/202202-03 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1551886 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1551886 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-38/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-38/,Assigned (20210810),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-38492,Candidate,"When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1.",GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1721107 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1721107 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-38/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-38/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-39/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-39/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-40/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-40/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-41/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-41/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-42/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-42/,Assigned (20210810),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-38493,Candidate,"Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.14, Thunderbird < 78.14, and Firefox < 92.",GENTOO:GLSA-202202-03 | URL:https://security.gentoo.org/glsa/202202-03 | GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1723391%2C1724101%2C1724107 | URL:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1723391%2C1724101%2C1724107 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-38/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-38/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-39/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-39/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-42/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-42/,Assigned (20210810),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-38494,Candidate,Mozilla developers reported memory safety bugs present in Firefox 91. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 92.,MISC:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1723920%2C1725638 | URL:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1723920%2C1725638 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-38/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-38/,Assigned (20210810),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-38495,Candidate,Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.1 and Firefox ESR < 91.1.,GENTOO:GLSA-202202-03 | URL:https://security.gentoo.org/glsa/202202-03 | GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1723391%2C1723920%2C1724101%2C1724107 | URL:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1723391%2C1723920%2C1724101%2C1724107 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-40/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-40/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-41/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-41/,Assigned (20210810),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-38496,Candidate,"During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.",DEBIAN:DSA-5034 | URL:https://www.debian.org/security/2022/dsa-5034 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1725335 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1725335 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-43/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-43/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-44/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-44/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-45/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-45/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-46/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-46/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-47/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-47/ | MLIST:[debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html,Assigned (20210810),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-38497,Candidate,"Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.",MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1726621 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1726621 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-43/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-43/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-45/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-45/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-47/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-47/,Assigned (20210810),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-38498,Candidate,"During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.",MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1729642 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1729642 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-43/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-43/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-45/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-45/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-47/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-47/,Assigned (20210810),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-38499,Candidate,Mozilla developers reported memory safety bugs present in Firefox 92. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93.,MISC:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1667102%2C1723170%2C1725356%2C1727364 | URL:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1667102%2C1723170%2C1725356%2C1727364 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-43/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-43/,Assigned (20210810),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-3850,Candidate,Authentication Bypass by Primary Weakness in GitHub repository adodb/adodb prior to 5.20.21.,CONFIRM:https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c | URL:https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c | DEBIAN:DSA-5101 | URL:https://www.debian.org/security/2022/dsa-5101 | MISC:https://github.com/adodb/adodb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29 | URL:https://github.com/adodb/adodb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29 | MLIST:[debian-lts-announce] 20220206 [SECURITY] [DLA 2912-1] libphp-adodb security update | URL:https://lists.debian.org/debian-lts-announce/2022/02/msg00006.html,Assigned (20211002),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-38500,Candidate,"Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.",DEBIAN:DSA-5034 | URL:https://www.debian.org/security/2022/dsa-5034 | MISC:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1725854%2C1728321 | URL:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1725854%2C1728321 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-43/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-43/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-44/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-44/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-45/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-45/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-46/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-46/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-47/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-47/ | MLIST:[debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html,Assigned (20210810),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-38501,Candidate,"Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.",MISC:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685354%2C1715755%2C1723176 | URL:https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685354%2C1715755%2C1723176 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-43/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-43/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-45/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-45/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-47/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-47/,Assigned (20210810),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-38502,Candidate,"Thunderbird ignored the configuration to require STARTTLS security for an SMTP connection. A MITM could perform a downgrade attack to intercept transmitted messages, or could take control of the authenticated session to execute SMTP commands chosen by the MITM. If an unprotected authentication method was configured, the MITM could obtain the authentication credentials, too. This vulnerability affects Thunderbird < 91.2.",DEBIAN:DSA-5034 | URL:https://www.debian.org/security/2022/dsa-5034 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1733366 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1733366 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-47/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-47/ | MLIST:[debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html,Assigned (20210810),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-38503,Candidate,"The iframe sandbox rules were not correctly applied to XSLT stylesheets, allowing an iframe to bypass restrictions such as executing scripts or navigating the top-level frame. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.",DEBIAN:DSA-5026 | URL:https://www.debian.org/security/2021/dsa-5026 | DEBIAN:DSA-5034 | URL:https://www.debian.org/security/2022/dsa-5034 | GENTOO:GLSA-202202-03 | URL:https://security.gentoo.org/glsa/202202-03 | GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1729517 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1729517 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-48/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-48/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-49/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-49/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-50/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-50/ | MLIST:[debian-lts-announce] 20211229 [SECURITY] [DLA 2863-1] firefox-esr security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | MLIST:[debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html,Assigned (20210810),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-38504,Candidate,"When interacting with an HTML input element's file picker dialog with webkitdirectory set, a use-after-free could have resulted, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.",DEBIAN:DSA-5026 | URL:https://www.debian.org/security/2021/dsa-5026 | DEBIAN:DSA-5034 | URL:https://www.debian.org/security/2022/dsa-5034 | GENTOO:GLSA-202202-03 | URL:https://security.gentoo.org/glsa/202202-03 | GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1730156 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1730156 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-48/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-48/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-49/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-49/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-50/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-50/ | MLIST:[debian-lts-announce] 20211229 [SECURITY] [DLA 2863-1] firefox-esr security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | MLIST:[debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html,Assigned (20210810),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-38505,Candidate,"Microsoft introduced a new feature in Windows 10 known as Cloud Clipboard which, if enabled, will record data copied to the clipboard to the cloud, and make it available on other computers in certain scenarios. Applications that wish to prevent copied data from being recorded in Cloud History must use specific clipboard formats; and Firefox before versions 94 and ESR 91.3 did not implement them. This could have caused sensitive data to be recorded to a user's Microsoft account. *This bug only affects Firefox for Windows 10+ with Cloud Clipboard enabled. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.",MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1730194 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1730194 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-48/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-48/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-49/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-49/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-50/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-50/,Assigned (20210810),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-38506,Candidate,"Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.",DEBIAN:DSA-5026 | URL:https://www.debian.org/security/2021/dsa-5026 | DEBIAN:DSA-5034 | URL:https://www.debian.org/security/2022/dsa-5034 | GENTOO:GLSA-202202-03 | URL:https://security.gentoo.org/glsa/202202-03 | GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1730750 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1730750 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-48/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-48/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-49/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-49/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-50/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-50/ | MLIST:[debian-lts-announce] 20211229 [SECURITY] [DLA 2863-1] firefox-esr security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | MLIST:[debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html,Assigned (20210810),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-38507,Candidate,"The Opportunistic Encryption feature of HTTP2 (RFC 8164) allows a connection to be transparently upgraded to TLS while retaining the visual properties of an HTTP connection, including being same-origin with unencrypted connections on port 80. However, if a second encrypted port on the same IP address (e.g. port 8443) did not opt-in to opportunistic encryption; a network attacker could forward a connection from the browser to port 443 to port 8443, causing the browser to treat the content of port 8443 as same-origin with HTTP. This was resolved by disabling the Opportunistic Encryption feature, which had low usage. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.",DEBIAN:DSA-5026 | URL:https://www.debian.org/security/2021/dsa-5026 | DEBIAN:DSA-5034 | URL:https://www.debian.org/security/2022/dsa-5034 | GENTOO:GLSA-202202-03 | URL:https://security.gentoo.org/glsa/202202-03 | GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1730935 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1730935 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-48/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-48/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-49/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-49/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-50/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-50/ | MLIST:[debian-lts-announce] 20211229 [SECURITY] [DLA 2863-1] firefox-esr security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | MLIST:[debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html,Assigned (20210810),None (candidate not yet proposed),
|
| 122 |
-
,Candidate,"By displaying a form validity message in the correct location at the same time as a permission prompt (such as for geolocation), the validity message could have obscured the prompt, resulting in the user potentially being tricked into granting the permission. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.",DEBIAN:DSA-5026 | URL:https://www.debian.org/security/2021/dsa-5026 | DEBIAN:DSA-5034 | URL:https://www.debian.org/security/2022/dsa-5034 | GENTOO:GLSA-202202-03 | URL:https://security.gentoo.org/glsa/202202-03 | GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1366818 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1366818 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-48/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-48/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-49/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-49/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-50/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-50/ | MLIST:[debian-lts-announce] 20211229 [SECURITY] [DLA 2863-1] firefox-esr security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | MLIST:[debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html,Assigned (20210810),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-38509,,"Due to an unusual sequence of attacker-controlled events, a Javascript alert() dialog with arbitrary (although unstyled) contents could be displayed over top an uncontrolled webpage of the attacker's choosing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.",DEBIAN:DSA-5026 | URL:https://www.debian.org/security/2021/dsa-5026 | DEBIAN:DSA-5034 | URL:https://www.debian.org/security/2022/dsa-5034 | GENTOO:GLSA-202202-03 | URL:https://security.gentoo.org/glsa/202202-03 | GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1718571 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1718571 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-48/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-48/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-49/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-49/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-50/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-50/ | MLIST:[debian-lts-announce] 20211229 [SECURITY] [DLA 2863-1] firefox-esr security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html | MLIST:[debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update | URL:https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html,Assigned (20210810),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-3851,Candidate,firefly-iii is vulnerable to URL Redirection to Untrusted Site,CONFIRM:https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592 | URL:https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592 | MISC:https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d | URL:https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d,Assigned (20211002),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1017.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table1018.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
"Name","Status","Description","References","Phase","Votes","Comments"
|
| 2 |
-
CVE-2021-38510,Candidate,"The executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.","MISC:https://bugzilla.mozilla.org/show_bug.cgi?id=1731779 | URL:https://bugzilla.mozilla.org/show_bug.cgi?id=1731779 | MISC:https://www.mozilla.org/security/advisories/mfsa2021-48/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-48/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-49/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-49/ | MISC:https://www.mozilla.org/security/advisories/mfsa2021-50/ | URL:https://www.mozilla.org/security/advisories/mfsa2021-50/",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 3 |
-
CVE-2021-38511,Candidate,"An issue was discovered in the tar crate before 0.4.36 for Rust. When symlinks are present in a TAR archive, extraction can create arbitrary directories via .. traversal.","MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tar/RUSTSEC-2021-0080.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0080.html",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 4 |
-
CVE-2021-38512,Candidate,"An issue was discovered in the actix-http crate before 3.0.0-beta.9 for Rust. HTTP/1 request smuggling (aka HRS) can occur, potentially leading to credential disclosure.","FEDORA:FEDORA-2021-98066afb33 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67URRW4K47SR6LNQB4YALPLGGQMQK7HO/ | MISC:https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-http/RUSTSEC-2021-0081.md | MISC:https://rustsec.org/advisories/RUSTSEC-2021-0081.html",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 5 |
-
CVE-2021-38513,Candidate,"Certain NETGEAR devices are affected by authentication bypass. This affects RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, RBS850 before 3.2.10.11, CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, RBK752 before 3.2.10.10, RBR750 before 3.2.10.10, and RBS750 before 3.2.10.10.","MISC:https://kb.netgear.com/000063777/Security-Advisory-for-Authentication-Bypass-on-Some-Extenders-and-WiFi-Systems-PSV-2020-0008",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 6 |
-
CVE-2021-38514,Candidate,"Certain NETGEAR devices are affected by authentication bypass. This affects D3600 before 1.0.0.72, D6000 before 1.0.0.72, D6100 before 1.0.0.63, D6200 before 1.1.00.34, D6220 before 1.0.0.48, D6400 before 1.0.0.86, D7000 before 1.0.1.70, D7000v2 before 1.0.0.52, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DC112A before 1.0.0.42, DGN2200v4 before 1.0.0.108, DGND2200Bv4 before 1.0.0.108, EX2700 before 1.0.1.48, EX3700 before 1.0.0.76, EX3800 before 1.0.0.76, EX6000 before 1.0.0.38, EX6100 before 1.0.2.24, EX6100v2 before 1.0.1.76, EX6120 before 1.0.0.42, EX6130 before 1.0.0.28, EX6150v1 before 1.0.0.42, EX6150v2 before 1.0.1.76, EX6200 before 1.0.3.88, EX6200v2 before 1.0.1.72, EX6400 before 1.0.2.136, EX7000 before 1.0.0.66, EX7300 before 1.0.2.136, EX8000 before 1.0.1.180, RBK50 before 2.1.4.10, RBR50 before 2.1.4.10, RBS50 before 2.1.4.10, RBK40 before 2.1.4.10, RBR40 before 2.1.4.10, RBS40 before 2.1.4.10, RBW30 before 2.2.1.204, PR2000 before 1.0.0.28, R6020 before 1.0.0.38, R6080 before 1.0.0.38, R6050 before 1.0.1.18, JR6150 before 1.0.1.18, R6120 before 1.0.0.46, R6220 before 1.1.0.86, R6250 before 1.0.4.34, R6300v2 before 1.0.4.32, R6400 before 1.0.1.44, R6400v2 before 1.0.2.62, R6700 before 1.0.1.48, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900v2 before 1.2.0.36, R6900 before 1.0.1.48, R7000 before 1.0.9.34, R6900P before 1.3.1.64, R7000P before 1.3.1.64, R7100LG before 1.0.0.48, R7300DST before 1.0.0.70, R7500v2 before 1.0.3.38, R7800 before 1.0.2.52, R7900 before 1.0.3.8, R8000 before 1.0.4.28, R7900P before 1.4.1.30, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, R9000 before 1.0.3.10, RBS40V before 2.2.0.58, RBK50V before 2.2.0.58, WN2000RPTv3 before 1.0.1.32, WN2500RPv2 before 1.0.1.54, WN3000RPv3 before 1.0.2.78, WN3100RPv2 before 1.0.0.66, WNDR3400v3 before 1.0.1.22, WNDR3700v4 before 1.0.2.102, WNDR4300v1 before 1.0.2.104, WNDR4300v2 before 1.0.0.56, WNDR4500v3 before 1.0.0.56, WNR2000v5 (R2000) before 1.0.0.66, WNR2020 before 1.1.0.62, WNR2050 before 1.1.0.62, WNR3500Lv2 before 1.2.0.62, and XR500 before 2.3.2.22.","MISC:https://kb.netgear.com/000063757/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-Extenders-and-WiFi-Systems-PSV-2017-2449",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 7 |
-
CVE-2021-38515,Candidate,"Certain NETGEAR devices are affected by denial of service. This affects R6400v2 before 1.0.4.98, R6700v3 before 1.0.4.98, R7900 before 1.0.3.18, and R8000 before 1.0.4.46.","MISC:https://kb.netgear.com/000063768/Security-Advisory-for-Denial-of-Service-on-Some-Routers-PSV-2019-0082",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 8 |
-
CVE-2021-38516,Candidate,"Certain NETGEAR devices are affected by lack of access control at the function level. This affects D6220 before 1.0.0.48, D6400 before 1.0.0.82, D7000v2 before 1.0.0.52, D7800 before 1.0.1.44, D8500 before 1.0.3.43, DC112A before 1.0.0.40, DGN2200v4 before 1.0.0.108, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK40 before 2.3.0.28, RBR40 before 2.3.0.28, RBS40 before 2.3.0.28, R6020 before 1.0.0.34, R6080 before 1.0.0.34, R6120 before 1.0.0.44, R6220 before 1.1.0.80, R6230 before 1.1.0.80, R6250 before 1.0.4.34, R6260 before 1.1.0.40, R6850 before 1.1.0.40, R6350 before 1.1.0.40, R6400v2 before 1.0.2.62, R6700v3 before 1.0.2.62, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900v2 before 1.2.0.36, R7000 before 1.0.9.34, R6900P before 1.3.1.44, R7000P before 1.3.1.44, R7100LG before 1.0.0.48, R7200 before 1.2.0.48, R7350 before 1.2.0.48, R7400 before 1.2.0.48, R7450 before 1.2.0.36, AC2100 before 1.2.0.36, AC2400 before 1.2.0.36, AC2600 before 1.2.0.36, R7500v2 before 1.0.3.38, R7800 before 1.0.2.58, R7900 before 1.0.3.8, R7960P before 1.4.1.44, R8000 before 1.0.4.28, R7900P before 1.4.1.30, R8000P before 1.4.1.30, R8900 before 1.0.4.2, R9000 before 1.0.4.2, RAX120 before 1.0.0.74, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, WNR3500Lv2 before 1.2.0.56, XR450 before 2.3.2.32, and XR500 before 2.3.2.32.","MISC:https://kb.netgear.com/000063780/Security-Advisory-for-Missing-Function-Level-Access-Control-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2020-0273",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 9 |
-
CVE-2021-38517,Candidate,"Certain NETGEAR devices are affected by out-of-bounds reads and writes. This affects R6400 before 1.0.1.70, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, and XR300 before 1.0.3.50.","MISC:https://kb.netgear.com/000063772/Security-Advisory-for-Out-of-Bounds-Read-and-Write-on-Some-Routers-PSV-2019-0187",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 10 |
-
CVE-2021-38518,Candidate,"Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.","MISC:https://kb.netgear.com/000063783/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-and-WiFi-Systems-PSV-2020-0528",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 11 |
-
CVE-2021-38519,Candidate,"Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6250 before 1.0.4.36, R6300v2 before 1.0.4.36, R6400 before 1.0.1.50, R6400v2 before 1.0.2.66, R6700v3 before 1.0.2.66, R6700 before 1.0.2.8, R6900 before 1.0.2.8, R7000 before 1.0.9.88, R6900P before 1.3.2.132, R7100LG before 1.0.0.52, R7900 before 1.0.3.10, R8000 before 1.0.4.46, R7900P before 1.4.1.50, R8000P before 1.4.1.50, and RAX80 before 1.0.1.40.","MISC:https://kb.netgear.com/000063762/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0564",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 12 |
-
CVE-2021-3852,Candidate,"growi is vulnerable to Authorization Bypass Through User-Controlled Key","CONFIRM:https://huntr.dev/bounties/d44def81-2834-4031-9037-e923975c3852 | URL:https://huntr.dev/bounties/d44def81-2834-4031-9037-e923975c3852 | MISC:https://github.com/weseek/growi/commit/863bfd7f622f413bd159b9446166fb1ce78ec863 | URL:https://github.com/weseek/growi/commit/863bfd7f622f413bd159b9446166fb1ce78ec863",Assigned (20211002),"None (candidate not yet proposed)",""
|
| 13 |
-
CVE-2021-38520,Candidate,"Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6400 before 1.0.1.52, R6400v2 before 1.0.4.84, R6700v3 before 1.0.4.84, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, and R7000P before 1.3.2.124.","MISC:https://kb.netgear.com/000063763/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0565",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 14 |
-
CVE-2021-38521,Candidate,"Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6400 before 1.0.1.50, R7900P before 1.4.1.50, R8000P before 1.4.1.50, RAX75 before 1.0.1.62, and RAX80 before 1.0.1.62.","MISC:https://kb.netgear.com/000063764/Security-Advisory-for-Post-Authentication-Command-Injection-on-Some-Routers-PSV-2018-0566",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 15 |
-
CVE-2021-38522,Candidate,"NETGEAR R6400 devices before 1.0.1.52 are affected by a stack-based buffer overflow by an authenticated user.","MISC:https://kb.netgear.com/000063767/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R6400-PSV-2019-0058",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 16 |
-
CVE-2021-38523,Candidate,"NETGEAR R6400 devices before 1.0.1.70 are affected by a stack-based buffer overflow by an authenticated user.","MISC:https://kb.netgear.com/000063771/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-R6400-PSV-2019-0166",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 17 |
-
CVE-2021-38524,Candidate,"Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects MK62 before 1.0.6.110, MR60 before 1.0.6.110, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX45 before 1.0.2.32, RAX50 before 1.0.2.32, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, and RBS750 before 3.2.16.6.","MISC:https://kb.netgear.com/000063779/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-WiFi-Systems-PSV-2020-0225",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 18 |
-
CVE-2021-38525,Candidate,"Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40.","MISC:https://kb.netgear.com/000063759/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-Gateways-and-Extenders-PSV-2018-0378",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 19 |
-
CVE-2021-38526,Candidate,"Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects RAX35 before 1.0.3.94, RAX38 before 1.0.3.94, and RAX40 before 1.0.3.94.","MISC:https://kb.netgear.com/000063782/Security-Advisory-for-Pre-Authentication-Buffer-Overflow-on-Some-Routers-PSV-2020-0416",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 20 |
-
CVE-2021-38527,Candidate,"Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.14, EX6100v2 before 1.0.1.98, EX6150v2 before 1.0.1.98, EX6250 before 1.0.0.132, EX6400 before 1.0.2.158, EX6400v2 before 1.0.0.132, EX6410 before 1.0.0.132, EX6420 before 1.0.0.132, EX7300 before 1.0.2.158, EX7300v2 before 1.0.0.132, EX7320 before 1.0.0.132, EX7700 before 1.0.0.216, EX8000 before 1.0.1.232, R7800 before 1.0.2.78, RBK12 before 2.6.1.44, RBR10 before 2.6.1.44, RBS10 before 2.6.1.44, RBK20 before 2.6.1.38, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.38, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBS40V before 2.6.2.4, RBS50Y before 2.6.1.40, RBW30 before 2.6.2.2, and XR500 before 2.3.2.114.","MISC:https://kb.netgear.com/000063778/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Extenders-Routers-and-WiFi-Systems-PSV-2020-0025",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 21 |
-
CVE-2021-38528,Candidate,"Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D8500 before 1.0.3.58, R6900P before 1.3.2.132, R7000P before 1.3.2.132, R7100LG before 1.0.0.64, WNDR3400v3 before 1.0.1.38, and XR300 before 1.0.3.56.","MISC:https://kb.netgear.com/000063781/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Gateways-and-Routers-PSV-2020-0297",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 22 |
-
CVE-2021-38529,Candidate,"Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7800 before 1.0.1.56, R7800 before 1.0.2.68, R8900 before 1.0.4.26, and R9000 before 1.0.4.26.","MISC:https://kb.netgear.com/000063765/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-Routers-and-Gateways-PSV-2018-0616",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 23 |
-
CVE-2021-3853,Candidate,"chaskiq is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/2b6a7647-8f2b-4510-b40f-c52aedc2820d | URL:https://huntr.dev/bounties/2b6a7647-8f2b-4510-b40f-c52aedc2820d | MISC:https://github.com/chaskiq/chaskiq/commit/51768b21632dac89fd0dedb2b3b6d91bac732345 | URL:https://github.com/chaskiq/chaskiq/commit/51768b21632dac89fd0dedb2b3b6d91bac732345",Assigned (20211003),"None (candidate not yet proposed)",""
|
| 24 |
-
CVE-2021-38530,Candidate,"Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK40 before 2.5.1.16, RBR40 before 2.5.1.16, RBS40 before 2.5.1.16, RBK20 before 2.5.1.16, RBR20 before 2.5.1.16, RBS20 before 2.5.1.16, RBK50 before 2.5.1.16, RBR50 before 2.5.1.16, RBS50 before 2.5.1.16, and RBS50Y before 2.6.1.40.","MISC:https://kb.netgear.com/000063770/Security-Advisory-for-Pre-Authentication-Command-Injection-on-Some-WiFi-Systems-PSV-2019-0151",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 25 |
-
CVE-2021-38531,Candidate,"Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6260 before 1.1.0.78, R6700v2 before 1.2.0.76, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, and AC2400 before 1.2.0.76.","MISC:https://kb.netgear.com/000063769/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-and-Gateways-PSV-2019-0113",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 26 |
-
CVE-2021-38532,Candidate,"NETGEAR WAC104 devices before 1.0.4.15 are affected by incorrect configuration of security settings.","MISC:https://kb.netgear.com/000063787/Security-Advisory-for-Security-Misconfiguration-on-WAC104-PSV-2021-0124",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 27 |
-
CVE-2021-38533,Candidate,"NETGEAR RAX40 devices before 1.0.3.64 are affected by stored XSS.","MISC:https://kb.netgear.com/000063776/Security-Advisory-for-Stored-Cross-Site-Scripting-on-RAX40-PSV-2019-0263",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 28 |
-
CVE-2021-38534,Candidate,"Certain NETGEAR devices are affected by stored XSS. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6100 before 1.0.0.60, D6200 before 1.1.00.36, D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7000 before 1.0.1.70, D7000v2 before 1.0.0.53, D8500 before 1.0.3.44, DC112A before 1.0.0.42, DGN2200v4 before 1.0.0.110, DGND2200Bv4 before 1.0.0.109, DM200 before 1.0.0.61, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6220 before 1.1.0.80, R6230 before 1.1.0.80, R6250 before 1.0.4.34, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.62, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6700v3 before 1.0.2.62, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.60, R7000P before 1.3.1.64, R7100LG before 1.0.0.50, R7300DST before 1.0.0.70, R7450 before 1.2.0.36, R7900 before 1.0.3.8, R7900P before 1.4.1.50, R8000 before 1.0.4.28, R8000P before 1.4.1.50, R8300 before 1.0.2.130, R8500 before 1.0.2.130, WNDR3400v3 before 1.0.1.24, WNR2020 before 1.1.0.62, WNR3500Lv2 before 1.2.0.62, XR450 before 2.3.2.40, and XR500 before 2.3.2.40.","MISC:https://kb.netgear.com/000063758/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2018-0244",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 29 |
-
CVE-2021-38535,Candidate,"Certain NETGEAR devices are affected by stored XSS. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6120 before 1.0.0.76, R6260 before 1.1.0.78, R6700v2 before 1.2.0.76, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6850 before 1.1.0.78, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, RAX35 before 1.0.3.62, and RAX40 before 1.0.3.62.","MISC:https://kb.netgear.com/000063773/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2019-0192",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 30 |
-
CVE-2021-38536,Candidate,"Certain NETGEAR devices are affected by stored XSS. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6120 before 1.0.0.66, R6260 before 1.1.0.78, R6700v2 before 1.2.0.76, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6850 before 1.1.0.78, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, RAX35 before 1.0.3.62, and RAX40 before 1.0.3.62.","MISC:https://kb.netgear.com/000063774/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2019-0193",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 31 |
-
CVE-2021-38537,Candidate,"Certain NETGEAR devices are affected by stored XSS. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6120 before 1.0.0.66, R6260 before 1.1.0.78, R6700v2 before 1.2.0.76, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6850 before 1.1.0.78, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, and RAX40 before 1.0.3.62.","MISC:https://kb.netgear.com/000063775/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-and-Gateways-PSV-2019-0245",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 32 |
-
CVE-2021-38538,Candidate,"Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7800 before 1.0.2.68, R8900 before 1.0.4.26, R9000 before 1.0.4.26, RAX120 before 1.0.0.78, RBK20 before 2.3.5.26, RBR20 before 2.3.5.26, RBS20 before 2.3.5.26, RBK40 before 2.3.5.30, RBR40 before 2.3.5.30, RBS40 before 2.3.5.30, RBK50 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and XR500 before 2.3.2.56.","MISC:https://kb.netgear.com/000063761/Security-Advisory-for-Stored-Cross-Site-Scripting-on-Some-Routers-Gateways-and-WiFi-Systems-PSV-2018-0515",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 33 |
-
CVE-2021-38539,Candidate,"Certain NETGEAR devices are affected by privilege escalation. This affects D8500 before 1.0.3.44, R6400v2 before 1.0.2.66, R6700 before 1.0.2.6, R6700v3 before 1.0.2.66, R6900 before 1.0.2.4, R6900P before 1.3.2.126, R7000 before 1.0.9.42, R7000P before 1.3.2.126, R7100LG before 1.0.0.50, R7300DST before 1.0.0.70, R7900 before 1.0.3.10, R8300 before 1.0.2.130, and R8500 before 1.0.2.130.","MISC:https://kb.netgear.com/000063760/Security-Advisory-for-Vertical-Privilege-Escalation-on-Some-Routers-and-Gateways-PSV-2018-0385",Assigned (20210810),"None (candidate not yet proposed)",""
|
| 34 |
-
CVE-2021-3854,Candidate,"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Glox Technology Useroam Hotspot allows SQL Injection. This issue affects Useroam Hotspot: before 5.1.0.15.","MISC:https://www.usom.gov.tr/bildirim/tr-23-0120 | URL:https://www.usom.gov.tr/bildirim/tr-23-0120",Assigned (20211004),"None (candidate not yet proposed)",""
|
| 35 |
-
CVE-2021-38540,Candidate,"The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3.","MISC:https://lists.apache.org/thread.html/rb34c3dd1a815456355217eef34060789f771b6f77c3a3dec77de2064%40%3Cusers.airflow.apache.org%3E | URL:https://lists.apache.org/thread.html/rb34c3dd1a815456355217eef34060789f771b6f77c3a3dec77de2064%40%3Cusers.airflow.apache.org%3E | MLIST:[announce] 20210909 CVE-2021-38540: Apache Airflow: Variable Import endpoint missed authentication check | URL:https://lists.apache.org/thread.html/rac2ed9118f64733e47b4f1e82ddc8c8020774698f13328ca742b03a2@%3Cannounce.apache.org%3E",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 36 |
-
CVE-2021-38541,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 37 |
-
CVE-2021-38542,Candidate,"Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.","MISC:https://www.openwall.com/lists/oss-security/2022/01/04/1 | URL:https://www.openwall.com/lists/oss-security/2022/01/04/1 | MLIST:[oss-security] 20220104 CVE-2021-38542: Apache James vulnerable to STARTTLS command injection (IMAP and POP3) | URL:http://www.openwall.com/lists/oss-security/2022/01/04/1 | MLIST:[oss-security] 20220919 CVE-2022-28220: STARTTLS command injection in Apache JAMES | URL:http://www.openwall.com/lists/oss-security/2022/09/20/1",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 38 |
-
CVE-2021-38543,Candidate,"TP-Link UE330 USB splitter devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a ""Glowworm"" attack. We assume that the USB splitter supplies power to some speakers. The power indicator LED of the USB splitter is connected directly to the power line, as a result, the intensity of the USB splitter's power indicator LED is correlative to its power consumption. The sound played by the connected speakers affects the USB splitter's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the USB splitter, we can recover the sound played by the connected speakers.","MISC:https://www.nassiben.com/glowworm-attack",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 39 |
-
CVE-2021-38544,Candidate,"Sony SRS-XB33 and SRS-XB43 devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a ""Glowworm"" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.","MISC:https://www.nassiben.com/glowworm-attack",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 40 |
-
CVE-2021-38545,Candidate,"Raspberry Pi 3 B+ and 4 B devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a ""Glowworm"" attack. We assume that the Raspberry Pi supplies power to some speakers. The power indicator LED of the Raspberry Pi is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects the Raspberry Pi's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the Raspberry Pi, we can recover the sound played by the speakers.","MISC:https://www.nassiben.com/glowworm-attack",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 41 |
-
CVE-2021-38546,Candidate,"CREATIVE Pebble devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a ""Glowworm"" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.","MISC:https://www.nassiben.com/glowworm-attack",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 42 |
-
CVE-2021-38547,Candidate,"Logitech Z120 and S120 speakers through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a ""Glowworm"" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.","MISC:https://www.nassiben.com/glowworm-attack",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 43 |
-
CVE-2021-38548,Candidate,"JBL Go 2 devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a ""Glowworm"" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.","MISC:https://www.nassiben.com/glowworm-attack",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 44 |
-
CVE-2021-38549,Candidate,"MIRACASE MHUB500 USB splitters through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a ""Glowworm"" attack. We assume that the USB splitter supplies power to some speakers. The power indicator LED of the USB splitter is connected directly to the power line, as a result, the intensity of the USB splitter's power indicator LED is correlative to its power consumption. The sound played by the connected speakers affects the USB splitter's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the USB splitter, we can recover the sound played by the connected speakers.","MISC:https://www.nassiben.com/glowworm-attack",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 45 |
-
CVE-2021-3855,Candidate,"Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Liman Central Management System Liman MYS (HTTP/Controllers, CronMail, Jobs modules) allows Command Injection.This issue affects Liman Central Management System: from 1.7.0 before 1.8.3-462.","MISC:https://docs.liman.dev/baslangic/guvenlik | URL:https://docs.liman.dev/baslangic/guvenlik | MISC:https://www.usom.gov.tr/bildirim/tr-23-0109 | URL:https://www.usom.gov.tr/bildirim/tr-23-0109",Assigned (20211004),"None (candidate not yet proposed)",""
|
| 46 |
-
CVE-2021-38550,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 47 |
-
CVE-2021-38551,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 48 |
-
CVE-2021-38552,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 49 |
-
CVE-2021-38553,Candidate,"HashiCorp Vault and Vault Enterprise 1.4.0 through 1.7.3 initialized an underlying database file associated with the Integrated Storage feature with excessively broad filesystem permissions. Fixed in Vault and Vault Enterprise 1.8.0.","GENTOO:GLSA-202207-01 | URL:https://security.gentoo.org/glsa/202207-01 | MISC:https://discuss.hashicorp.com/t/hcsec-2021-20-vault-s-integrated-storage-backend-database-file-may-have-excessively-broad-permissions/28168",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 50 |
-
CVE-2021-38554,Candidate,"HashiCorp Vault and Vault Enterprise’s UI erroneously cached and exposed user-viewed secrets between sessions in a single shared browser. Fixed in 1.8.0 and pending 1.7.4 / 1.6.6 releases.","GENTOO:GLSA-202207-01 | URL:https://security.gentoo.org/glsa/202207-01 | MISC:https://discuss.hashicorp.com/t/hcsec-2021-19-vault-s-ui-cached-user-viewed-secrets-between-shared-browser-sessions/28166",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 51 |
-
CVE-2021-38555,Candidate,"An XML external entity (XXE) injection vulnerability was discovered in the Any23 StreamUtils.java file and is known to affect Any23 versions < 2.5. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access.","MISC:https://lists.apache.org/thread.html/r589d1a9f94dbeee7a0f5dbe8513a0e300dfe669bd964ba2fbfe28e07%40%3Cannounce.apache.org%3E | URL:https://lists.apache.org/thread.html/r589d1a9f94dbeee7a0f5dbe8513a0e300dfe669bd964ba2fbfe28e07%40%3Cannounce.apache.org%3E | MLIST:[oss-security] 20210910 CVE-2021-38555: An XML external entity (XXE) injection vulnerability exists in Apache Any23 StreamUtils.java | URL:http://www.openwall.com/lists/oss-security/2021/09/11/1",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 52 |
-
CVE-2021-38556,Candidate,"includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.","MISC:https://github.com/RaspAP/raspap-webgui | MISC:https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php | MISC:https://zerosecuritypenetrationtesting.com/?page_id=306",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 53 |
-
CVE-2021-38557,Candidate,"raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.","MISC:https://github.com/RaspAP/raspap-webgui | MISC:https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers | MISC:https://zerosecuritypenetrationtesting.com/?page_id=306",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 54 |
-
CVE-2021-38558,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 55 |
-
CVE-2021-38559,Candidate,"DigitalDruid HotelDruid 3.0.2 has an XSS vulnerability in prenota.php affecting the fineperiodo1 parameter.","MISC:https://vitthals.github.io/writeups/CVEs/Hoteldruid%203.0.2%20XSS | MISC:https://www.hoteldruid.com",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 56 |
-
CVE-2021-3856,Candidate,"ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available.","MISC:https://access.redhat.com/security/cve/CVE-2021-3856 | URL:https://access.redhat.com/security/cve/CVE-2021-3856 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2010164 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2010164 | MISC:https://github.com/keycloak/keycloak/commit/73f0474008e1bebd0733e62a22aceda9e5de6743 | URL:https://github.com/keycloak/keycloak/commit/73f0474008e1bebd0733e62a22aceda9e5de6743 | MISC:https://github.com/keycloak/keycloak/pull/8588 | URL:https://github.com/keycloak/keycloak/pull/8588 | MISC:https://issues.redhat.com/browse/KEYCLOAK-19422 | URL:https://issues.redhat.com/browse/KEYCLOAK-19422",Assigned (20211004),"None (candidate not yet proposed)",""
|
| 57 |
-
CVE-2021-38560,Candidate,"Ivanti Service Manager 2021.1 allows reflected XSS via the appName parameter associated with ConfigDB calls, such as in RelocateAttachments.aspx.","MISC:https://forums.ivanti.com/s/article/Ivanti-Service-Manager-Asset-Manager-2021-1-Release-Notes?language=en_US | MISC:https://github.com/os909/iVANTI-CVE-2021-38560",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 58 |
-
CVE-2021-38561,Candidate,"golang.org/x/text/language in golang.org/x/text before 0.3.7 can panic with an out-of-bounds read during BCP 47 language tag parsing. Index calculation is mishandled. If parsing untrusted user input, this can be used as a vector for a denial-of-service attack.","MISC:https://deps.dev/advisory/OSV/GO-2021-0113 | URL:https://deps.dev/advisory/OSV/GO-2021-0113 | MISC:https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f | URL:https://go.googlesource.com/text/+/383b2e75a7a4198c42f8f87833eefb772868a56f | MISC:https://groups.google.com/g/golang-announce | URL:https://groups.google.com/g/golang-announce | MISC:https://pkg.go.dev/golang.org/x/text/language | URL:https://pkg.go.dev/golang.org/x/text/language",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 59 |
-
CVE-2021-38562,Candidate,"Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5, and 5.0 before 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm.","CONFIRM:https://github.com/bestpractical/rt/commit/70749bb66cb13dd70bd53340c371038a5f3ca57c | FEDORA:FEDORA-2021-825dd1879f | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2JK57CEEXLQF7MGBCUX76DZHXML7LUSQ/ | MISC:https://docs.bestpractical.com/release-notes/rt/index.html | MLIST:[debian-lts-announce] 20220623 [SECURITY] [DLA 3057-1] request-tracker4 security update | URL:https://lists.debian.org/debian-lts-announce/2022/06/msg00019.html",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 60 |
-
CVE-2021-38563,Candidate,"An issue was discovered in Foxit PDF Reader before 11.0.1 and PDF Editor before 11.0.1. It mishandles situations in which an array size (derived from a /Size entry) is smaller than the maximum indirect object number, and thus there is an attempted incorrect array access (leading to a NULL pointer dereference, or out-of-bounds read or write).","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 61 |
-
CVE-2021-38564,Candidate,"An issue was discovered in Foxit PDF Reader before 11.0.1 and PDF Editor before 11.0.1. It allows an out-of-bounds read via util.scand.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 62 |
-
CVE-2021-38565,Candidate,"An issue was discovered in Foxit PDF Reader before 11.0.1 and PDF Editor before 11.0.1. It allows writing to arbitrary files via submitForm.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 63 |
-
CVE-2021-38566,Candidate,"An issue was discovered in Foxit PDF Reader before 11.0.1 and PDF Editor before 11.0.1. It allows stack consumption during recursive processing of embedded XML nodes.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 64 |
-
CVE-2021-38567,Candidate,"An issue was discovered in Foxit PDF Editor before 11.0.1 and PDF Reader before 11.0.1 on macOS. It mishandles missing dictionary entries, leading to a NULL pointer dereference, aka CNVD-C-2021-95204.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 65 |
-
CVE-2021-38568,Candidate,"An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows memory corruption during conversion of a PDF document to a different document format.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 66 |
-
CVE-2021-38569,Candidate,"An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows stack consumption via recursive function calls during the handling of XFA forms or link objects.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 67 |
-
CVE-2021-3857,Candidate,"chaskiq is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/18f7eaee-6309-40cb-aed3-d5ac0af03cf3 | URL:https://huntr.dev/bounties/18f7eaee-6309-40cb-aed3-d5ac0af03cf3 | MISC:https://github.com/chaskiq/chaskiq/commit/bffa585862b11cc05229ab3ed621d68f70ed33d0 | URL:https://github.com/chaskiq/chaskiq/commit/bffa585862b11cc05229ab3ed621d68f70ed33d0",Assigned (20211004),"None (candidate not yet proposed)",""
|
| 68 |
-
CVE-2021-38570,Candidate,"An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows attackers to delete arbitrary files (during uninstallation) via a symlink.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 69 |
-
CVE-2021-38571,Candidate,"An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows DLL hijacking, aka CNVD-C-2021-68000 and CNVD-C-2021-68502.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 70 |
-
CVE-2021-38572,Candidate,"An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows writing to arbitrary files because the extractPages pathname is not validated.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 71 |
-
CVE-2021-38573,Candidate,"An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows writing to arbitrary files because a CombineFiles pathname is not validated.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 72 |
-
CVE-2021-38574,Candidate,"An issue was discovered in Foxit Reader and PhantomPDF before 10.1.4. It allows SQL Injection via crafted data at the end of a string.","MISC:https://www.foxitsoftware.com/support/security-bulletins.php",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 73 |
-
CVE-2021-38575,Candidate,"NetworkPkg/IScsiDxe has remotely exploitable buffer overflows.","MISC:https://bugzilla.tianocore.org/show_bug.cgi?id=3356 | URL:https://bugzilla.tianocore.org/show_bug.cgi?id=3356",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 74 |
-
CVE-2021-38576,Candidate,"A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system.","MISC:https://bugzilla.tianocore.org/show_bug.cgi?id=3499 | URL:https://bugzilla.tianocore.org/show_bug.cgi?id=3499",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 75 |
-
CVE-2021-38577,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 76 |
-
CVE-2021-38578,Candidate,"Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.","MISC:https://bugzilla.tianocore.org/show_bug.cgi?id=3387 | URL:https://bugzilla.tianocore.org/show_bug.cgi?id=3387",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 77 |
-
CVE-2021-38579,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 78 |
-
CVE-2021-3858,Candidate,"snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)","CONFIRM:https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b | URL:https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b | MISC:https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3 | URL:https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3",Assigned (20211004),"None (candidate not yet proposed)",""
|
| 79 |
-
CVE-2021-38580,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 80 |
-
CVE-2021-38581,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 81 |
-
CVE-2021-38582,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 82 |
-
CVE-2021-38583,Candidate,"openBaraza HCM 3.1.6 does not properly neutralize user-controllable input, which allows reflected cross-site scripting (XSS) on multiple pages: hr/subscription.jsp and hr/application.jsp and and hr/index.jsp (with view= and data=).","MISC:https://github.com/charlesbickel/CVE-2021-38583 | MISC:https://openbaraza.org | MISC:https://sourceforge.net/projects/obhrms/?source=directory",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 83 |
-
CVE-2021-38584,Candidate,"The WHM Locale Upload feature in cPanel before 98.0.1 allows XXE attacks (SEC-585).","MISC:https://docs.cpanel.net/changelogs/98-change-log/",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 84 |
-
CVE-2021-38585,Candidate,"The WHM Locale Upload feature in cPanel before 98.0.1 allows unserialization attacks (SEC-585).","MISC:https://docs.cpanel.net/changelogs/98-change-log/",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 85 |
-
CVE-2021-38586,Candidate,"In cPanel before 98.0.1, /scripts/cpan_config performs unsafe operations on files (SEC-589).","MISC:https://docs.cpanel.net/changelogs/98-change-log/",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 86 |
-
CVE-2021-38587,Candidate,"In cPanel before 96.0.13, scripts/fix-cpanel-perl mishandles the creation of temporary files (SEC-586).","MISC:https://docs.cpanel.net/changelogs/96-change-log/",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 87 |
-
CVE-2021-38588,Candidate,"In cPanel before 96.0.13, fix_cpanel_perl lacks verification of the integrity of downloads (SEC-587).","MISC:https://docs.cpanel.net/changelogs/96-change-log/",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 88 |
-
CVE-2021-38589,Candidate,"In cPanel before 96.0.13, scripts/fix-cpanel-perl does not properly restrict the overwriting of files (SEC-588).","MISC:https://docs.cpanel.net/changelogs/96-change-log/",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 89 |
-
CVE-2021-3859,Candidate,"A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.","MISC:https://access.redhat.com/security/cve/CVE-2021-3859 | URL:https://access.redhat.com/security/cve/CVE-2021-3859 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2010378 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2010378 | MISC:https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 | URL:https://github.com/undertow-io/undertow/commit/e43f0ada3f4da6e8579e0020cec3cb1a81e487c2 | MISC:https://github.com/undertow-io/undertow/pull/1296 | URL:https://github.com/undertow-io/undertow/pull/1296 | MISC:https://issues.redhat.com/browse/UNDERTOW-1979 | URL:https://issues.redhat.com/browse/UNDERTOW-1979 | MISC:https://security.netapp.com/advisory/ntap-20221201-0004/ | URL:https://security.netapp.com/advisory/ntap-20221201-0004/",Assigned (20211005),"None (candidate not yet proposed)",""
|
| 90 |
-
CVE-2021-38590,Candidate,"In cPanel before 96.0.8, weak permissions on web stats can lead to information disclosure (SEC-584).","MISC:https://docs.cpanel.net/changelogs/96-change-log/",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 91 |
-
CVE-2021-38591,Candidate,"An issue was discovered on LG mobile devices with Android OS P and Q software for mt6762/mt6765/mt6883. Attackers can change some of the NvRAM content by leveraging the misconfiguration of a debug command. The LG ID is LVE-SMP-210005 (August 2021).","MISC:https://lgsecurity.lge.com/",Assigned (20210811),"None (candidate not yet proposed)",""
|
| 92 |
-
CVE-2021-38592,Candidate,"Wasm3 0.5.0 has a heap-based buffer overflow in op_Const64 (called from EvaluateExpression and m3_LoadModule).","MISC:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=33554 | MISC:https://github.com/google/oss-fuzz-vulns/blob/main/vulns/wasm3/OSV-2021-676.yaml",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 93 |
-
CVE-2021-38593,Candidate,"Qt 5.x before 5.15.6 and 6.x through 6.1.2 has an out-of-bounds write in QOutlineMapper::convertPath (called from QRasterPaintEngine::fill and QPaintEngineEx::stroke).","FEDORA:FEDORA-2022-4131ced81a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HY5YCSDCTLHVMP3OXOM6HNTWHV6DBHDX/ | FEDORA:FEDORA-2022-54760f7fa4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36VN2WKMNQUSTF6ZW2X52NPAJVXJ4S5I/ | MISC:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35566 | MISC:https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qt/OSV-2021-903.yaml | MISC:https://github.com/qt/qtbase/commit/1ca02cf2879a5e1511a2f2109f0925cf4c892862 | MISC:https://github.com/qt/qtbase/commit/202143ba41f6ac574f1858214ed8bf4a38b73ccd | MISC:https://github.com/qt/qtbase/commit/6b400e3147dcfd8cc3a393ace1bd118c93762e0c | MISC:https://wiki.qt.io/Qt_5.15_Release#Known_Issues | MISC:https://www.qt.io/blog/qt-5.15-extended-support-for-subscription-license-holders",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 94 |
-
CVE-2021-38594,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 95 |
-
CVE-2021-38595,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 96 |
-
CVE-2021-38596,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 97 |
-
CVE-2021-38597,Candidate,"wolfSSL before 4.8.1 incorrectly skips OCSP verification in certain situations of irrelevant response data that contains the NoCheck extension.","MISC:https://github.com/wolfSSL/wolfssl/commit/f93083be72a3b3d956b52a7ec13f307a27b6e093 | MISC:https://www.wolfssl.com/docs/wolfssl-changelog/",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 98 |
-
CVE-2021-38598,Candidate,"OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations.","MISC:https://launchpad.net/bugs/1938670",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 99 |
-
CVE-2021-38599,Candidate,"WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because ""the user likely wanted to encrypt all file activity.""","MISC:https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3 | MISC:https://github.com/wal-g/wal-g/pull/1062",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 100 |
-
CVE-2021-3860,Candidate,"JFrog Artifactory before 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query.","MISC:https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection | URL:https://www.jfrog.com/confluence/display/JFROG/CVE-2021-3860%3A+Artifactory+Low+Privileged+Blind+SQL+Injection",Assigned (20211005),"None (candidate not yet proposed)",""
|
| 101 |
-
CVE-2021-38600,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 102 |
-
CVE-2021-38601,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 103 |
-
CVE-2021-38602,Candidate,"PluXML 5.8.7 allows Article Editing stored XSS via Headline or Content.","MISC:https://github.com/KielVaughn/CVE-2021-38602 | MISC:https://pluxml.org/download/changelog.txt",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 104 |
-
CVE-2021-38603,Candidate,"PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Information field.","MISC:http://packetstormsecurity.com/files/163823/PluXML-5.8.7-Cross-Site-Scripting.html | MISC:https://github.com/KielVaughn/CVE-2021-38603 | MISC:https://pluxml.org/download/changelog.txt",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 105 |
-
CVE-2021-38604,Candidate,"In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.","CONFIRM:https://security.netapp.com/advisory/ntap-20210909-0005/ | URL:https://security.netapp.com/advisory/ntap-20210909-0005/ | FEDORA:FEDORA-2021-16dc1f33af | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/ | GENTOO:GLSA-202208-24 | URL:https://security.gentoo.org/glsa/202208-24 | MISC:https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc | URL:https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc | MISC:https://sourceware.org/bugzilla/show_bug.cgi?id=28213 | URL:https://sourceware.org/bugzilla/show_bug.cgi?id=28213 | MISC:https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641 | URL:https://sourceware.org/git/?p=glibc.git;a=commit;h=4cc79c217744743077bf7a0ec5e0a4318f1e6641 | MISC:https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8 | URL:https://sourceware.org/git/?p=glibc.git;a=commit;h=b805aebd42364fe696e417808a700fdb9800c9e8 | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 106 |
-
CVE-2021-38605,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 107 |
-
CVE-2021-38606,Candidate,"reNgine through 0.5 relies on a predictable directory name.","MISC:https://github.com/yogeshojha/rengine/commit/158367a231335026b8dba633a76b44de290ad37c",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 108 |
-
CVE-2021-38607,Candidate,"Crocoblock JetEngine before 2.6.1 allows XSS by remote authenticated users via a custom form input.","CONFIRM:https://crocoblock.com/changelog/?plugin=jet-engine | MISC:https://crocoblock.com/plugins/jetengine/",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 109 |
-
CVE-2021-38608,Candidate,"Incorrect Access Control in Tranquil WAPT Enterprise - before 1.8.2.7373 and before 2.0.0.9450 allows guest OS users to escalate privileges via WAPT Agent.","MISC:https://www.tranquil.it/en/manage-it-equipment/discover-wapt/ | MISC:https://www.wapt.fr/fr/doc/wapt-security-bulletin.html | URL:https://www.wapt.fr/fr/doc/wapt-security-bulletin.html",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 110 |
-
CVE-2021-38609,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 111 |
-
CVE-2021-3861,Candidate,"The RNDIS USB device class includes a buffer overflow vulnerability. Zephyr versions >= v2.6.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj","MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj | URL:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj",Assigned (20211005),"None (candidate not yet proposed)",""
|
| 112 |
-
CVE-2021-38610,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 113 |
-
CVE-2021-38611,Candidate,"A command-injection vulnerability in the Image Upload function of the NASCENT RemKon Device Manager 4.0.0.0 allows attackers to execute arbitrary commands, as root, via shell metacharacters in the filename parameter to assets/index.php.","MISC:https://www.blacklanternsecurity.com/2021-08-23-Nascent-RemKon-CVEs/ | MISC:https://www.nascent.com/single-post/2019/01/17/nascent-technology-releases-remkon-31-to-enhance-audio-experience",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 114 |
-
CVE-2021-38612,Candidate,"In NASCENT RemKon Device Manager 4.0.0.0, a Directory Traversal vulnerability in a log-reading function in maintenance/readLog.php allows an attacker to read any file via a specialized URL.","MISC:https://www.blacklanternsecurity.com/2021-08-23-Nascent-RemKon-CVEs/ | MISC:https://www.nascent.com/single-post/2019/01/17/nascent-technology-releases-remkon-31-to-enhance-audio-experience",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 115 |
-
CVE-2021-38613,Candidate,"The assets/index.php Image Upload feature of the NASCENT RemKon Device Manager 4.0.0.0 allows attackers to upload any code to the target system and achieve remote code execution.","MISC:https://www.blacklanternsecurity.com/2021-08-23-Nascent-RemKon-CVEs/ | MISC:https://www.nascent.com/single-post/2019/01/17/nascent-technology-releases-remkon-31-to-enhance-audio-experience",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 116 |
-
CVE-2021-38614,Candidate,"** UNSUPPORTED WHEN ASSIGNED ** Polipo through 1.1.1, when NDEBUG is used, allows a heap-based buffer overflow during parsing of a Range header. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.","MISC:https://www.openwall.com/lists/oss-security/2021/07/28/2",Assigned (20210812),"None (candidate not yet proposed)",""
|
| 117 |
-
CVE-2021-38615,Candidate,"In Eigen NLP 3.10.1, a lack of access control on the /auth/v1/sso/config/ SSO configuration endpoint allows any logged-in user (guest, standard, or admin) to view and modify information.","MISC:https://eigentech.com/ | MISC:https://excellium-services.com/cert-xlm-advisory/ | MISC:https://excellium-services.com/cert-xlm-advisory/CVE-2021-38615",Assigned (20210813),"None (candidate not yet proposed)",""
|
| 118 |
-
CVE-2021-38616,Candidate,"In Eigen NLP 3.10.1, a lack of access control on the /auth/v1/user/{user-guid}/ user edition endpoint could permit any logged-in user to increase their own permissions via a user_permissions array in a PATCH request. A guest user could modify other users' profiles and much more.","MISC:https://eigentech.com/ | MISC:https://excellium-services.com/cert-xlm-advisory/ | MISC:https://excellium-services.com/cert-xlm-advisory/CVE-2021-38616",Assigned (20210813),"None (candidate not yet proposed)",""
|
| 119 |
-
CVE-2021-38617,Candidate,"In Eigen NLP 3.10.1, a lack of access control on the /auth/v1/user/ user creation endpoint allows a standard user to create a super user account with a defined password. This directly leads to privilege escalation.","MISC:https://eigentech.com/ | MISC:https://excellium-services.com/cert-xlm-advisory/ | MISC:https://excellium-services.com/cert-xlm-advisory/CVE-2021-38617",Assigned (20210813),"None (candidate not yet proposed)",""
|
| 120 |
-
CVE-2021-38618,Candidate,"In GFOS Workforce Management 4.8.272.1, the login page of application is prone to authentication bypass, allowing anyone (who knows a user's credentials except the password) to get access to an account. This occurs because of JSESSIONID mismanagement.","MISC:https://excellium-services.com/cert-xlm-advisory/cve-2021-38618/",Assigned (20210813),"None (candidate not yet proposed)",""
|
| 121 |
-
CVE-2021-38619,Candidate,"openBaraza HCM 3.1.6 does not properly neutralize user-controllable input: an unauthenticated remote attacker can conduct a stored cross-site scripting (XSS) attack against an administrative user from hr/subscription.jsp and hr/application.jsp and and hr/index.jsp (with view=).","MISC:https://github.com/charlesbickel/CVE-2021-38619 | MISC:https://openbaraza.org/ | MISC:https://sourceforge.net/projects/obhrms/",Assigned (20210813),"None (candidate not yet proposed)",""
|
| 122 |
-
CVE-2021-3862,Candidate,"icecoder is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601 | URL:https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601 | MISC:https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763 | URL:https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763",Assigned (20211005),"None (candidate not yet proposed)",""
|
| 123 |
-
CVE-2021-38620,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210813),"None (candidate not yet proposed)",""
|
| 124 |
-
CVE-2021-38621,Candidate,"The remove API in v1/controller/cloudStorage/alibabaCloud/remove/index.ts in netless Agora Flat Server before 2021-07-30 mishandles file ownership.","MISC:https://github.com/netless-io/flat-server/commit/425aa970f6366874c61aa1466527fced5501e476",Assigned (20210813),"None (candidate not yet proposed)",""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1019.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-38622,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-38623,Candidate,The deferred_image_processing (aka Deferred image processing) extension before 1.0.2 for TYPO3 allows Denial of Service via the FAL API because of /var/transient disk consumption.,MISC:https://typo3.org/security/advisory/typo3-ext-sa-2021-009,Assigned (20210813),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-38624,Candidate,Windows Key Storage Provider Security Feature Bypass Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38624 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38624,Assigned (20210813),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-38625,Candidate,Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38626.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38625 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38625,Assigned (20210813),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-38626,Candidate,Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38625.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38626 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38626,Assigned (20210813),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-38627,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-38628,Candidate,Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38638.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38628 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38628,Assigned (20210813),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-38629,Candidate,Windows Ancillary Function Driver for WinSock Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38629 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38629,Assigned (20210813),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-3863,Candidate,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0 | URL:https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0 | MISC:https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128 | URL:https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128,Assigned (20211005),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-38630,Candidate,Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36964.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38630 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38630,Assigned (20210813),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-38631,Candidate,Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41371.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38631 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38631,Assigned (20210813),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-38632,Candidate,BitLocker Security Feature Bypass Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38632 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38632,Assigned (20210813),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-38633,Candidat%@!e@,"Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36955, CVE-2021-36963.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38633 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38633,Assigned (20210813),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-38634,Candidate,Microsoft Windows Update Client Elevation of Privilege Vulnerability,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1075/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38634 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38634,Assigned (20210813),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-38635,Cand$$ate,"Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-36969, CVE-2021-38636.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38635 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38635,Assigned (20210813),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-38636,Candidate,"Windows Redirected Drive Buffering SubSystem Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-36969, CVE-2021-38635.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38636 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38636,Assigned (20210813),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-38637,Candidate,Windows Storage Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38637 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38637,Assigned (20210813),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-38638,Candidate,Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38628.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38638 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38638,Assigned (20210813),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-38639,Candidate,Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36975.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38639 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38639,Assigned (20210813),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-3864,Candidate,"A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.",MISC:https://access.redhat.com/security/cve/CVE-2021-3864 | URL:https://access.redhat.com/security/cve/CVE-2021-3864 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2015046 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2015046 | MISC:https://lore.kernel.org/all/20211221021744.864115-1-longman%40redhat.com/ | URL:https://lore.kernel.org/all/20211221021744.864115-1-longman%40redhat.com/ | MISC:https://lore.kernel.org/all/20211226150310.GA992%401wt.eu/ | URL:https://lore.kernel.org/all/20211226150310.GA992%401wt.eu/ | MISC:https://lore.kernel.org/lkml/20211228170910.623156-1-wander%40redhat.com/ | URL:https://lore.kernel.org/lkml/20211228170910.623156-1-wander%40redhat.com/ | MISC:https://security-tracker.debian.org/tracker/CVE-2021-3864 | URL:https://security-tracker.debian.org/tracker/CVE-2021-3864 | MISC:https://www.openwall.com/lists/oss-security/2021/10/20/2 | URL:https://www.openwall.com/lists/oss-security/2021/10/20/2,Assigned (20211006),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-38640,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-38641,Candidate,Microsoft Edge for Android Spoofing Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38641 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38641,Assigned (20210813),None (candidate not yet proposed),
|
| 24 |
-
CVE-20|21-386$$42,Candidate,Microsoft Edge for iOS Spoofing Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38642 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38642,Assigned (20210813),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-38643,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-38644,,Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38644 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38644,Assigned (20210813),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-38645,Candidate,"Open Management Infrastructure Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38648, CVE-2021-38649.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38645 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38645,Assigned (20210813),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-38646,Candidate,Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38646 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38646,Assigned (20210813),None (candidate not yet proposed),
|
| 29 |
-
,Candidae,Open Management Infrastructure Remote Code Execution Vulnerability,MISC:http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38647 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38647,Assigned (20210813),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-38648,Candidate,"Open Management Infrastructure Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38645, CVE-2021-38649.",MISC:http://packetstormsecurity.com/files/164925/Microsoft-OMI-Management-Interface-Authentication-Bypass.html | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38648,Assigned (20210813),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-38649,Candidate,"Open Management Infrastructure Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38645, CVE-2021-38648.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649,Assigned (20210813),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-3865,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211006),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-38650,,Microsoft Office Spoofing Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38650 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38650,Assigned (20210813),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-38651,Candidate,Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-38652.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38651 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38651,Assigned (20210813),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-38652,Candidate,Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-38651.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38652 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38652,Assigned (20210813),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-38653,Candidate,Microsoft Office Visio Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-38654.,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1079/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38653 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38653,Assigned (20210813),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-38654,Candidate,Microsoft Office Visio Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-38653.,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1081/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38654 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38654,Assigned (20210813),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-38655,Candidate,Microsoft Excel Remote Code Execution Vulnerability,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1080/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38655 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38655,Assigned (20210813),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-38656,Candidate,Microsoft Word Remote Code Execution Vulnerability,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1082/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38656 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38656,Assigned (20210813),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-38657,Candidate,Microsoft Office Graphics Component Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38657 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38657,Assigned (20210813),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-38658,,Microsoft Office Graphics Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-38660.,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1083/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38658 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38658,Assigned (20210813),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-38659,Candidate,Microsoft Office Remote Code Execution Vulnerability,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1084/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38659 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38659,Assigned (20210813),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-3866,Candidate,Cross-site Scripting (XSS) - Stored in GitHub repository zulip/zulip more than and including 44f935695d452cc3fb16845a0c6af710438b153d and prior to 3eb2791c3e9695f7d37ffe84e0c2184fae665cb6.,CONFIRM:https://huntr.dev/bounties/5f48dac5-e112-4b23-bbbf-cc00ba83bcf2 | URL:https://huntr.dev/bounties/5f48dac5-e112-4b23-bbbf-cc00ba83bcf2 | MISC:https://blog.zulip.com/2022/01/19/cve-2021-3866/ | URL:https://blog.zulip.com/2022/01/19/cve-2021-3866/ | MISC:https://github.com/zulip/zulip/commit/3eb2791c3e9695f7d37ffe84e0c2184fae665cb6 | URL:https://github.com/zulip/zulip/commit/3eb2791c3e9695f7d37ffe84e0c2184fae665cb6,Assigned (20211007),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-38660,Candidate,Microsoft Office Graphics Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-38658.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38660 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38660,Assigned (20210813),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-38661,Candidate,HEVC Video Extensions Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38661 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38661,Assigned (20210813),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-38662,Candidae,Windows Fast FAT File System Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41343.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38662 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38662,Assigned (20210813),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-38663,Candidate,Windows exFAT File System Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38663 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38663,Assigned (20210813),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-38664,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-38665,Candidate,Remote Desktop Protocol Client Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38665 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38665,Assigned (20210813),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-38666,Candidate,Remote Desktop Client Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38666 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38666,Assigned (20210813),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-38667,Candidate,"Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38671, CVE-2021-40447.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38667 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38667,Assigned (20210813),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-38668,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-38669,Candidate,Microsoft Edge (Chromium-based) Tampering Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38669 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38669,Assigned (20210813),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-3867,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211007),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-38670,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-38671,Candidate,"Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-40447.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38671 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38671,Assigned (20210813),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-38672,Candidate,Windows Hyper-V Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40461.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38672 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38672,Assigned (20210813),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-38673,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-38674,Candidate,"A cross-site scripting (XSS) vulnerability has been reported to affect QTS, QuTS hero and QuTScloud. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of QTS, QuTS hero and QuTScloud: QuTS hero h4.5.4.1771 build 20210825 and later QTS 4.5.4.1787 build 20210910 and later QuTScloud c4.5.7.1864 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-63 | URL:https://www.qnap.com/en/security-advisory/qsa-21-63,Assigned (20210813),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-38675,Candidate,"A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Image2PDF. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Image2PDF: Image2PDF 2.1.5 ( 2021/08/17 ) and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-43 | URL:https://www.qnap.com/en/security-advisory/qsa-21-43,Assigned (20210813),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-38676,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-38677,Candidate,"A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running QcalAgent. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of QcalAgent: QcalAgent 1.1.7 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-60 | URL:https://www.qnap.com/en/security-advisory/qsa-21-60,Assigned (20210813),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-38678,Candidate,"An open redirect vulnerability has been reported to affect QNAP device running QcalAgent. If exploited, this vulnerability allows attackers to redirect users to an untrusted page that contains malware. We have already fixed this vulnerability in the following versions of QcalAgent: QcalAgent 1.1.7 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-60 | URL:https://www.qnap.com/en/security-advisory/qsa-21-60,Assigned (20210813),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-38679,Candidate,"An improper authentication vulnerability has been reported to affect QNAP NAS running Kazoo Server. If exploited, this vulnerability allows attackers to compromise the security of the system. We have already fixed this vulnerability in the following versions of Kazoo Server: Kazoo Server 4.11.22 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-22-01 | URL:https://www.qnap.com/en/security-advisory/qsa-22-01,Assigned (20210813),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-3868,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211007),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-38680,Candidate,"A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Kazoo Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Kazoo Server: Kazoo Server 4.11.20 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-54 | URL:https://www.qnap.com/en/security-advisory/qsa-21-54,Assigned (20210813),None (candidate not yet proposed),
|
| 67 |
-
,,"A reflected cross-site scripting (XSS) vulnerability has been reported to affect QNAP NAS running Ragic Cloud DB. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already disabled and removed Ragic Cloud DB from the QNAP App Center, pending a security patch from Ragic.",MISC:https://www.qnap.com/en/security-advisory/qsa-21-48 | URL:https://www.qnap.com/en/security-advisory/qsa-21-48,Assigned (20210813),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-38682,Candidate,"A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QVR Elite, QVR Pro, QVR Guard: QuTS hero h5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QuTS hero h4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 4.5.4: QVR Guard 2.1.3.0 and later QTS 5.0.0: QVR Guard 2.1.3.0 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-59 | URL:https://www.qnap.com/en/security-advisory/qsa-21-59,Assigned (20210813),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-38683,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210813),None (candidate not yet proposed),
|
| 70 |
-
C?V|E-$2021-38684,Candidate,"A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Multimedia Console. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Multimedia Console: Multimedia Console 1.4.3 ( 2021/10/05 ) and later Multimedia Console 1.5.3 ( 2021/10/05 ) and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-45 | URL:https://www.qnap.com/en/security-advisory/qsa-21-45,Assigned (20210813),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-38685,Candidate,"A command injection vulnerability has been reported to affect QNAP device, VioStor. If exploited, this vulnerability allows remote attackers to run arbitrary commands. We have already fixed this vulnerability in the following versions of QVR: QVR FW 5.1.6 build 20211109 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-51 | URL:https://www.qnap.com/en/security-advisory/qsa-21-51,Assigned (20210813),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-38686,Candidate,"An improper authentication vulnerability has been reported to affect QNAP device, VioStor. If exploited, this vulnerability allows attackers to compromise the security of the system. We have already fixed this vulnerability in the following versions of QVR: QVR FW 5.1.6 build 20211109 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-52 | URL:https://www.qnap.com/en/security-advisory/qsa-21-52,Assigned (20210813),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-38687,Candidate,"A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Surveillance Station: QTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later QTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later QTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later QTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later QTS 4.3.3: Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-46 | URL:https://www.qnap.com/en/security-advisory/qsa-21-46,Assigned (20210813),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-38688,Candidate,"An improper authentication vulnerability has been reported to affect Android App Qfile. If exploited, this vulnerability allows attackers to compromise app and access information We have already fixed this vulnerability in the following versions of Qfile: Qfile 3.0.0.1105 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-55 | URL:https://www.qnap.com/en/security-advisory/qsa-21-55,Assigned (20210813),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-38689,,"A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QVR Elite, QVR Pro, QVR Guard: QuTS hero h5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QuTS hero h4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 4.5.4: QVR Guard 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Guard 2.1.3.0 (2021/12/06) and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-59 | URL:https://www.qnap.com/en/security-advisory/qsa-21-59,Assigned (20210813),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-3869,,corenlp is vulnerable to Improper Restriction of XML External Entity Reference,CONFIRM:https://huntr.dev/bounties/2f8baf6c-14b3-420d-8ede-9805797cd324 | URL:https://huntr.dev/bounties/2f8baf6c-14b3-420d-8ede-9805797cd324 | MISC:https://github.com/stanfordnlp/corenlp/commit/5d83f1e8482ca304db8be726cad89554c88f136a | URL:https://github.com/stanfordnlp/corenlp/commit/5d83f1e8482ca304db8be726cad89554c88f136a,Assigned (20211007),None (candidate not yet proposed),
|
| 77 |
-
CVE-2%21-38690,Candidate,"A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QVR Elite, QVR Pro, QVR Guard: QuTS hero h5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QuTS hero h4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 4.5.4: QVR Guard 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Guard 2.1.3.0 (2021/12/06) and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-59 | URL:https://www.qnap.com/en/security-advisory/qsa-21-59,Assigned (20210813),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-38691,Candidate,"A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QVR Elite, QVR Pro, QVR Guard: QuTS hero h5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QuTS hero h4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 4.5.4: QVR Guard 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Guard 2.1.3.0 (2021/12/06) and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-59 | URL:https://www.qnap.com/en/security-advisory/qsa-21-59,Assigned (20210813),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-38692,Candidate,"A stack buffer overflow vulnerability has been reported to affect QNAP device running QVR Elite, QVR Pro, QVR Guard. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of QVR Elite, QVR Pro, QVR Guard: QuTS hero h5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QuTS hero h4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 5.0.0: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Elite 2.1.4.0 (2021/12/06) and later QTS 4.5.4: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Pro 2.1.3.0 (2021/12/06) and later QTS 4.5.4: QVR Guard 2.1.3.0 (2021/12/06) and later QTS 5.0.0: QVR Guard 2.1.3.0 (2021/12/06) and later",MISC:https://www.qnap.com/en/security-advisory/qsa-21-59 | URL:https://www.qnap.com/en/security-advisory/qsa-21-59,Assigned (20210813),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-38693,Candidate,"A path traversal vulnerability has been reported to affect QNAP device running QuTScloud, QuTS hero, QTS, QVR Pro Appliance. If exploited, this vulnerability allows attackers to read the contents of unexpected files and expose sensitive data. We have already fixed this vulnerability in the following versions of QuTScloud, QuTS hero, QTS, QVR Pro Appliance: QuTScloud c5.0.1.1949 and later QuTS hero h5.0.0.1949 build 20220215 and later QuTS hero h4.5.4.1951 build 20220218 and later QTS 5.0.0.1986 build 20220324 and later QTS 4.5.4.1991 build 20220329 and later",MISC:https://www.qnap.com/en/security-advisory/qsa-22-13 | URL:https://www.qnap.com/en/security-advisory/qsa-22-13,Assigned (20210813),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-38694,Candidate,SoftVibe SARABAN for INFOMA 1.1 allows SQL Injection.,MISC:http://www.infoma.net/index.php/saraban/ | MISC:https://orangeo.tech/post/2021/12/24/First-CVEs.html | MISC:https://play.google.com/store/apps/details?id=th.co.softvibe.saraban&hl=en&gl=US | MISC:https://sawatdee.github.io/post/2021/12/24/First-CVEs.html,Assigned (20210814),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-38695,Candidate,"SoftVibe SARABAN for INFOMA 1.1 is vulnerable to stored cross-site scripting (XSS) that allows users to store scripts in certain fields (e.g. subject, description) of the document form.",MISC:http://www.infoma.net/index.php/saraban/ | MISC:https://orangeo.tech/post/2021/12/24/First-CVEs.html | MISC:https://play.google.com/store/apps/details?id=th.co.softvibe.saraban&hl=en&gl=US | MISC:https://sawatdee.github.io/post/2021/12/24/First-CVEs.html,Assigned (20210814),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-38696,Candidate,"SoftVibe SARABAN for INFOMA 1.1 has Incorrect Access Control vulnerability, that allows attackers to access signature files on the application without any authentication.",MISC:http://www.infoma.net/index.php/saraban/ | MISC:https://orangeo.tech/post/2021/12/24/First-CVEs.html | MISC:https://play.google.com/store/apps/details?id=th.co.softvibe.saraban&hl=en&gl=US | MISC:https://sawatdee.github.io/post/2021/12/24/First-CVEs.html,Assigned (20210814),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-38697,Candidate,"SoftVibe SARABAN for INFOMA 1.1 allows Unauthenticated unrestricted File Upload, that allows attackers to upload files with any file extension which can lead to arbitrary code execution.",MISC:http://www.infoma.net/index.php/saraban/ | MISC:https://orangeo.tech/post/2021/12/24/First-CVEs.html | MISC:https://play.google.com/store/apps/details?id=th.co.softvibe.saraban&hl=en&gl=US | MISC:https://sawatdee.github.io/post/2021/12/24/First-CVEs.html,Assigned (20210814),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-38698,Candidate,"HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2.",GENTOO:GLSA-202208-09 | URL:https://security.gentoo.org/glsa/202208-09 | MISC:https://discuss.hashicorp.com/t/hcsec-2021-24-consul-missing-authorization-check-on-txn-apply-endpoint/29026 | MISC:https://www.hashicorp.com/blog/category/consul,Assigned (20210814),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-38699,Candidate,"TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and /admin/system_logs.",MISC:http://packetstormsecurity.com/files/163843/TastyIgniter-3.0.7-Cross-Site-Scripting.html | MISC:https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS | MISC:https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS | MISC:https://github.com/Justin-1993/CVE-2021-38699 | MISC:https://pentesternotes.com/?p=209 | MISC:https://tastyigniter.com/support,Assigned (20210814),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-3870,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211008),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-38700,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210814),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-38701,Candidate,"Certain Motorola Solutions Avigilon devices allow XSS in the administrative UI. This affects T200/201 before 4.10.0.68; T290 before 4.4.0.80; T008 before 2.2.0.86; T205 before 4.12.0.62; T204 before 3.28.0.166; and T100, T101, T102, and T103 before 2.6.0.180.",CONFIRM:https://support.avigilon.com/s/feed/0D54y00006l9eCMCAY | MISC:https://www.motorolasolutions.com/en_us/about/trust-center/security.html,Assigned (20210814),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-3802,,Cyberoam NetGenie C0101B1-20141120-NG11VO devices through 2021-08-14 allow tweb/ft.php?u=[XSS] attacks.,FULLDISC:20210816 Cyberoam NetGenie (C0101B1-20141120-NG11VO) - Cross Site Scripting (XSS) | URL:http://seclists.org/fulldisclosure/2021/Aug/20 | MISC:http://packetstormsecurity.com/files/163859/Cyberoam-NetGenie-Cross-Site-Scripting.html | MISC:http://www.cyberoamworks.com/NetGenie-Home.asp | MISC:https://seclists.org/fulldisclosure/2021/Aug/20 | URL:https://seclists.org/fulldisclosure/2021/Aug/20,Assigned (20210814),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-38703,Candidate,Wireless devices running certain Arcadyan-derived firmware (such as KPN Experia WiFi 1.00.15) do not properly sanitise user input to the syslog configuration form. An authenticated remote attacker could leverage this to alter the device configuration and achieve remote code execution. This can be exploited in conjunction with CVE-2021-20090.,MISC:https://7bits.nl/journal/posts/cve-2021-38703-kpn-experia-wifi-root-shell/ | MISC:https://www.kpnwebshop.com/modems-routers/producten/experia-wifi/2,Assigned (20210815),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-38704,Candidate,Multiple reflected cross-site scripting (XSS) vulnerabilities in ClinicCases 7.3.3 allow unauthenticated attackers to introduce arbitrary JavaScript by crafting a malicious URL. This can result in account takeover via session token theft.,MISC:https://github.com/judsonmitchell/ClinicCases/releases | MISC:https://github.com/sudonoodle/CVE-2021-38704,Assigned (20210815),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-38705,Candidate,"ClinicCases 7.3.3 is affected by Cross-Site Request Forgery (CSRF). A successful attack would consist of an authenticated user following a malicious link, resulting in arbitrary actions being carried out with the privilege level of the targeted user. This can be exploited to create a secondary administrator account for the attacker.",MISC:https://github.com/judsonmitchell/ClinicCases/releases | MISC:https://github.com/sudonoodle/CVE-2021-38705,Assigned (20210815),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-38706,Candidate,"messages_load.php in ClinicCases 7.3.3 suffers from a blind SQL injection vulnerability, which allows low-privileged attackers to execute arbitrary SQL commands through a vulnerable parameter.",MISC:https://cliniccases.com | MISC:https://github.com/judsonmitchell/ClinicCases/releases,Assigned (20210815),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-38707,Candidate,Persistent cross-site scripting (XSS) vulnerabilities in ClinicCases 7.3.3 allow low-privileged attackers to introduce arbitrary JavaScript to account parameters. The XSS payloads will execute in the browser of any user who views the relevant content. This can result in account takeover via session token theft.,MISC:https://github.com/judsonmitchell/ClinicCases/releases | MISC:https://github.com/sudonoodle/CVE-2021-38707,Assigned (20210815),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-38708,Candidate,"In ocProducts Composr CMS before 10.0.38, an attacker can inject JavaScript via Comcode for XSS.",MISC:https://compo.sr/news/view/announcements/two-new-xss-security.htm | URL:https://compo.sr/news/view/announcements/two-new-xss-security.htm,Assigned (20210816),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-38709,Candidate,"In ocProducts Composr CMS before 10.0.38, an attacker can inject JavaScript via the staff_messaging messaging system for XSS.",MISC:https://compo.sr/news/view/announcements/two-new-xss-security.htm | URL:https://compo.sr/news/view/announcements/two-new-xss-security.htm,Assigned (20210816),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-3871,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211008),None (candidate not yet proposed),
|
| 99 |
-
,Candidate,** DISPUTED ** Static (Persistent) XSS Vulnerability exists in version 4.3.0 of Yclas when using the install/view/form.php script. An attacker can store XSS in the database through the vulnerable SITE_NAME parameter. NOTE: a requirement for an XSS payload to be introduced during a product's initial installation makes a vulnerability report largely irrelevant.,MISC:https://github.com/security-n/CVE-2021-38710,Assigned (20210816),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-38711,Candidate,"In gitit before 0.15.0.0, the Export feature can be exploited to leak information from files.",MISC:https://github.com/jgm/gitit/commit/eed32638f4f6e3b2f4b8a9a04c4b72001acf9ad8 | MISC:https://github.com/jgm/gitit/compare/0.14.0.0...0.15.0.0,Assigned (20210816),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-38712,Candidate,OneNav 0.9.12 allows Information Disclosure of the onenav.db3 contents. NOTE: the vendor's recommended solution is to block the access via an NGINX configuration file.,MISC:https://github.com/helloxz/onenav/issues/25,Assigned (20210816),None (candidate not yet proposed),
|
| 102 |
-
,Candidate,imgURL 2.31 allows XSS via an X-Forwarded-For HTTP header.,MISC:https://github.com/helloxz/imgurl/issues/72,Assigned (20210816),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-38714,Candidate,"In Plib through 1.85, there is an integer overflow vulnerability that could result in arbitrary code execution. The vulnerability is found in ssgLoadTGA() function in src/ssg/ssgLoadTGA.cxx file.",FEDORA:FEDORA-2022-08022e9452 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5SML6W6Z2B6THT76VPUKUFYQJABODFU/ | FEDORA:FEDORA-2022-1cf3c9578f | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTVSAKNCEYVMVAURQSB5GNA2MWL4XDPH/ | FEDORA:FEDORA-2022-bcc0df5180 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HT3BKNAXLDY246UPUNRSBPGGVANRDOU/ | MISC:https://sourceforge.net/p/plib/bugs/55/ | MLIST:[debian-lts-announce] 20211002 [SECURITY] [DLA 2775-1] plib security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00000.html,Assigned (20210816),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-38715,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-38716,#andidat?,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 106 |
-
C*@VE-20%21-38*717,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-38718,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-38719,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-3872,Candidate,vim is vulnerable to Heap-based Buffer Overflow,CONFIRM:https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8 | URL:https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8 | FEDORA:FEDORA-2021-6988830606 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ | FEDORA:FEDORA-2021-84f4cf3244 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b | URL:https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b | MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html,Assigned (20211008),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-38720,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-38721,Candidate,FUEL CMS 1.5.0 login.php contains a cross-site request forgery (CSRF) vulnerability,MISC:https://github.com/daylightstudio/FUEL-CMS/commit/6164cd794674d4d74da39f8b535ff588ab006e33 | MISC:https://github.com/daylightstudio/FUEL-CMS/issues/584,Assigned (20210816),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-38722,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-38723,Candidate,FUEL CMS 1.5.0 allows SQL Injection via parameter 'col' in /fuel/index.php/fuel/pages/items,MISC:https://github.com/daylightstudio/FUEL-CMS/issues/583,Assigned (20210816),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-38724,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-38725,,Fuel CMS 1.5.0 has a brute force vulnerability in fuel/modules/fuel/controllers/Login.php,MISC:https://github.com/daylightstudio/FUEL-CMS/commit/15934fdd309408640d1f2be18f93a8beadaa5e9b | MISC:https://github.com/daylightstudio/FUEL-CMS/issues/581,Assigned (20210816),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-38726,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-38727,,FUEL CMS 1.5.0 allows SQL Injection via parameter 'col' in /fuel/index.php/fuel/logs/items,MISC:https://github.com/daylightstudio/FUEL-CMS/issues/582 | MISC:https://streamable.com/lxw3ln | MISC:https://www.nu11secur1ty.com/2021/10/cve-2021-38727.html,Assigned (20210816),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-38728,Candidate,SEMCMS SHOP v 1.1 is vulnerable to Cross Site Scripting (XSS) via Ant_M_Coup.php.,MISC:https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-9.md | MISC:https://www.sem-cms.cn/wenda/view-56.html,Assigned (20210816),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-38729,Candidate,SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Plist.php.,MISC:https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-5.md | MISC:https://www.sem-cms.cn/wenda/view-56.html,Assigned (20210816),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-3873,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211008),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-38730,Candidate,SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Info.php.,MISC:https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-8.md | MISC:https://www.sem-cms.cn/wenda/view-56.html,Assigned (20210816),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-38731,Candidate,SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Zekou.php.,MISC:https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-4.md | MISC:https://www.sem-cms.cn/wenda/view-56.html,Assigned (20210816),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-38732,Candidate,SEMCMS SHOP v 1.1 is vulnerable to SQL via Ant_Message.php.,MISC:https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-3.md | MISC:https://www.sem-cms.cn/wenda/view-56.html,Assigned (20210816),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-38733,Candidate,SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_BlogCat.php.,MISC:https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-7.md | MISC:https://www.sem-cms.cn/wenda/view-56.html,Assigned (20210816),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table102.csv
DELETED
|
@@ -1,38 +0,0 @@
|
|
| 1 |
-
CWE-ID,Name,Weakness Abstraction,Status,Description,Extended Description,Related Weaknesses,Weakness Ordinalities,Applicable Platforms,Background Details,Alternate Terms,Modes Of Introduction,Exploitation Factors,Likelihood of Exploit,Common Consequences,Detection Methods,Potential Mitigations,Observed Examples,Functional Areas,Affected Resources,Taxonomy Mappings,Related Attack Patterns,Notes,
|
| 2 |
-
477,Use of Obsolete Function,Base,Draft,"The code uses deprecated or obsolete functions, which suggests that the code has not been actively reviewed or maintained.","As programming languages evolve, functions occasionally become obsolete due to: Advances in the language Improved understanding of how operations should be performed effectively and securely Changes in the conventions that govern certain operations Functions that are removed are usually replaced by newer counterparts that perform the same task in some different and hopefully improved way.",::NATURE:ChildOf:CWE ID:710:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation::,"::METHOD:Automated Static Analysis - Binary or Bytecode:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Binary / Bytecode Quality Analysis Cost effective for partial coverage: Bytecode Weakness Analysis - including disassembler + source code weakness analysis:EFFECTIVENESS:High::METHOD:Manual Static Analysis - Binary or Bytecode:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Binary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies:EFFECTIVENESS:SOAR Partial::METHOD:Dynamic Analysis with Manual Results Interpretation:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Debugger:EFFECTIVENESS:High::METHOD:Manual Static Analysis - Source Code:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Manual Source Code Review (not inspections) Cost effective for partial coverage: Focused Manual Spotcheck - Focused manual analysis of source:EFFECTIVENESS:High::METHOD:Automated Static Analysis - Source Code:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Source Code Quality Analyzer Source code Weakness Analyzer Context-configured Source Code Weakness Analyzer:EFFECTIVENESS:High::METHOD:Automated Static Analysis:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Origin Analysis:EFFECTIVENESS:High::METHOD:Architecture or Design Review:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Formal Methods / Correct-By-Construction Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.):EFFECTIVENESS:High::",::PHASE:Implementation:DESCRIPTION:Refer to the documentation for the obsolete function in order to determine why it is deprecated or obsolete and to learn about alternative ways to achieve the same functionality.::PHASE:Requirements:DESCRIPTION:Consider seriously the security implications of using an obsolete function. Consider using alternate functions.::,,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Obsolete::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::TAXONOMY NAME:SEI CERT Perl Coding Standard:ENTRY ID:DCL30-PL:ENTRY NAME:Do not import deprecated modules:MAPPING FIT:CWE More Specific::TAXONOMY NAME:SEI CERT Perl Coding Standard:ENTRY ID:EXP30-PL:ENTRY NAME:Do not use deprecated or obsolete functions or modules:MAPPING FIT:CWE More Specific::,,,
|
| 3 |
-
478,Missing Default Case in Multiple Condition Expression,Base,Draft,"The code does not have a default case in an expression with multiple conditions, such as a switch statement.","If a multiple-condition expression (such as a switch in C) omits the default case but does not consider or handle all possible values that could occur, then this might lead to complex logical errors and resultant weaknesses. Because of this, further decisions are made based on poor information, and cascading failure results. This cascading failure may result in any number of security issues, and constitutes a significant failure in the system.",::NATURE:ChildOf:CWE ID:1023:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Primary::,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C#:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Python:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:JavaScript:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,"::SCOPE:Integrity:IMPACT:Varies by Context:IMPACT:Alter Execution Logic:NOTE:Depending on the logical circumstances involved, any consequences may result: e.g., issues of confidentiality, authentication, authorization, availability, integrity, accountability, or non-repudiation.::",,"::PHASE:Implementation:DESCRIPTION:Ensure that there are no cases unaccounted for when adjusting program flow or values based on the value of a given variable. In the case of switch style statements, the very simple act of creating a default case can, if done correctly, mitigate this situation. Often however, the default case is used simply to represent an assumed option, as opposed to working as a check for invalid input. This is poor practice and in some cases is as bad as omitting a default case entirely.::",,,,::TAXONOMY NAME:CLASP:ENTRY NAME:Failure to account for default case in switch::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP4:ENTRY NAME:Unchecked Status Condition::,,,
|
| 4 |
-
479,Signal Handler Use of a Non-reentrant Function,Variant,Draft,The product defines a signal handler that calls a non-reentrant function.,"Non-reentrant functions are functions that cannot safely be called, interrupted, and then recalled before the first call has finished without resulting in memory corruption. This can lead to an unexpected system state and unpredictable results with a variety of potential consequences depending on context, including denial of service and code execution. Many functions are not reentrant, but some of them can result in the corruption of memory if they are used in a signal handler. The function call syslog() is an example of this. In order to perform its functionality, it allocates a small amount of memory as scratch space. If syslog() is suspended by a signal call and the signal handler calls syslog(), the memory used by both of these functions enters an undefined, and possibly, exploitable state. Implementations of malloc() and free() manage metadata in global structures in order to track which memory is allocated versus which memory is available, but they are non-reentrant. Simultaneous calls to these functions can cause corruption of the metadata.",::NATURE:ChildOf:CWE ID:828:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:663:VIEW ID:1000::NATURE:CanPrecede:CWE ID:123:VIEW ID:1000::,,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Integrity:SCOPE:Confidentiality:SCOPE:Availability:IMPACT:Execute Unauthorized Code or Commands:NOTE:It may be possible to execute arbitrary code through the use of a write-what-where condition.::SCOPE:Integrity:IMPACT:Modify Memory:IMPACT:Modify Application Data:NOTE:Signal race conditions often result in data corruption.::,,"::PHASE:Requirements:DESCRIPTION:Require languages or libraries that provide reentrant functionality, or otherwise make it easier to avoid this weakness.::PHASE:Architecture and Design:DESCRIPTION:Design signal handlers to only set flags rather than perform complex functionality.::PHASE:Implementation:DESCRIPTION:Ensure that non-reentrant functions are not found in signal handlers.::PHASE:Implementation:DESCRIPTION:Use sanity checks to reduce the timing window for exploitation of race conditions. This is only a partial solution, since many attacks might fail, but other attacks still might work within the narrower window, even accidentally.:EFFECTIVENESS:Defense in Depth::",::REFERENCE:CVE-2005-0893:DESCRIPTION:signal handler calls function that ultimately uses malloc():LINK:https://www.cve.org/CVERecord?id=CVE-2005-0893::REFERENCE:CVE-2004-2259:DESCRIPTION:SIGCHLD signal to FTP server can cause crash under heavy load while executing non-reentrant functions like malloc/free.:LINK:https://www.cve.org/CVERecord?id=CVE-2004-2259::,,::System Process::,::TAXONOMY NAME:CLASP:ENTRY NAME:Unsafe function call from a signal handler::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:SIG30-C:ENTRY NAME:Call only asynchronous-safe functions within signal handlers:MAPPING FIT:Exact::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:SIG34-C:ENTRY NAME:Do not call signal() from within interruptible signal handlers::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:EXP01-J:ENTRY NAME:Never dereference null pointers::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,,,
|
| 5 |
-
480,of Use Incorrect Operator,Base,Draft,"The product accidentally uses the wrong operator, which changes the logic in security-relevant ways.",These types of errors are generally the result of a typo by the programmer.,::NATURE:ChildOf:CWE ID:670:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Sometimes::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Sometimes::LANGUAGE NAME:Perl:LANGUAGE PREVALENCE:Sometimes::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Alter Execution Logic:NOTE:This weakness can cause unintended logic to be executed and other unexpected application behavior.::,"::METHOD:Automated Static Analysis:DESCRIPTION:This weakness can be found easily using static analysis. However in some cases an operator might appear to be incorrect, but is actually correct and reflects unusual logic within the program.::METHOD:Manual Static Analysis:DESCRIPTION:This weakness can be found easily using static analysis. However in some cases an operator might appear to be incorrect, but is actually correct and reflects unusual logic within the program.::",,"::REFERENCE:CVE-2021-3116:DESCRIPTION:Chain: Python-based HTTP Proxy server uses the wrong boolean operators (CWE-480) causing an incorrect comparison (CWE-697) that identifies an authN failure if all three conditions are met instead of only one, allowing bypass of the proxy authentication (CWE-1390):LINK:https://www.cve.org/CVERecord?id=CVE-2021-3116::",,,::TAXONOMY NAME:CLASP:ENTRY NAME:Using the wrong operator::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:EXP45-C:ENTRY NAME:Do not perform assignments in selection statements:MAPPING FIT:CWE More Abstract::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:EXP46-C:ENTRY NAME:Do not use a bitwise operator with a Boolean-like operand:MAPPING FIT:CWE More Abstract::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in Computation::,,,
|
| 6 |
-
481,Assigning instead of Comparing,Variant,Draft,The code uses an operator for assignment when the intention was to perform a comparison.,"In many languages the compare statement is very close in appearance to the assignment statement and are often confused. This bug is generally the result of a typo and usually causes obvious problems with program execution. If the comparison is in an if statement, the if statement will usually evaluate the value of the right-hand side of the predicate.",::NATURE:ChildOf:CWE ID:480:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:697:VIEW ID:1000::,,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C#:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Alter Execution Logic::,,"::PHASE:Testing:DESCRIPTION:Many IDEs and static analysis products will detect this problem.::PHASE:Implementation:DESCRIPTION:Place constants on the left. If one attempts to assign a constant with a variable, the compiler will produce an error.::",,,,::TAXONOMY NAME:CLASP:ENTRY NAME:Assigning instead of comparing::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in computation::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:EXP45-C:ENTRY NAME:Do not perform assignments in selection statements:MAPPING FIT:CWE More Abstract::,,,
|
| 7 |
-
482,Comparing instead of Assigning,Variant,Draft,The code uses an operator for comparison when the intention was to perform an assignment.,"In many languages, the compare statement is very close in appearance to the assignment statement; they are often confused.",::NATURE:ChildOf:CWE ID:480:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation:NOTE:This bug primarily originates from a typo.::,,,"::SCOPE:Availability:SCOPE:Integrity:IMPACT:Unexpected State:NOTE:The assignment will not take place, which should cause obvious program execution problems.::",,::PHASE:Testing:DESCRIPTION:Many IDEs and static analysis products will detect this problem.::,,,,::TAXONOMY NAME:CLASP:ENTRY NAME:Comparing instead of assigning::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP2:ENTRY NAME:Unused Entities::,,,
|
| 8 |
-
483,Incorrect Block Delimitation,Base,Draft,"The code does not explicitly delimit a block that is intended to contain 2 or more statements, creating a logic error.","In some languages, braces (or other delimiters) are optional for blocks. When the delimiter is omitted, it is possible to insert a logic error in which a statement is thought to be in a block but is not. In some cases, the logic error can have security implications.",::NATURE:ChildOf:CWE ID:670:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Primary::ORDINALITY:Indirect::,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Sometimes::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Sometimes::,,,::PHASE:Implementation::,,,"::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:IMPACT:Alter Execution Logic:NOTE:This is a general logic error which will often lead to obviously-incorrect behaviors that are quickly noticed and fixed. In lightly tested or untested code, this error may be introduced it into a production environment and provide additional attack vectors by creating a control flow path leading to an unexpected state in the application. The consequences will depend on the types of behaviors that are being incorrectly executed.::",,::PHASE:Implementation:DESCRIPTION:Always use explicit block delimitation and use static-analysis technologies to enforce this practice.::,::REFERENCE:CVE-2014-1266:DESCRIPTION:incorrect indentation of goto statement makes it more difficult to detect an incorrect goto (Apple's goto fail):LINK:https://www.cve.org/CVERecord?id=CVE-2014-1266::,,,::TAXONOMY NAME:CLASP:ENTRY NAME:Incorrect block delimitation::,,,
|
| 9 |
-
484,Omitted Break Statemnt in Switch,Base,Draft,"The product omits a break statement within a switch or similar construct, causing code associated with multiple conditions to execute. This can cause problems when the programmer only intended to execute code associated with one condition.",This can lead to critical code executing in situations where it should not.,::NATURE:ChildOf:CWE ID:710:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:670:VIEW ID:1000::,::ORDINALITY:Primary::ORDINALITY:Indirect::,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C#:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:PHP:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Alter Execution Logic:NOTE:This weakness can cause unintended logic to be executed and other unexpected application behavior.::,"::METHOD:White Box:DESCRIPTION:Omission of a break statement might be intentional, in order to support fallthrough. Automated detection methods might therefore be erroneous. Semantic understanding of expected product behavior is required to interpret whether the code is correct.::METHOD:Black Box:DESCRIPTION:Since this weakness is associated with a code construct, it would be indistinguishable from other errors that produce the same behavior.::","::PHASE:Implementation:DESCRIPTION:Omitting a break statement so that one may fall through is often indistinguishable from an error, and therefore should be avoided. If you need to use fall-through capabilities, make sure that you have clearly documented this within the switch statement, and ensure that you have examined all the logical possibilities.::PHASE:Implementation:DESCRIPTION:The functionality of omitting a break statement could be clarified with an if statement. This method is much safer.::",,,,::TAXONOMY NAME:CLASP:ENTRY NAME:Omitted break statement::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP4:ENTRY NAME:Unchecked Status Condition::,,,
|
| 10 |
-
486,Comparison of Classes by Name,Variant,Draft,"The product compares classes by name, which can cause it to use the wrong class when multiple classes can have the same name.","If the decision to trust the methods and data of an object is based on the name of a class, it is possible for malicious users to send objects of the same name as trusted classes and thereby gain the trust afforded to known classes and types.",::NATURE:ChildOf:CWE ID:1025:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,"::SCOPE:Integrity:SCOPE:Confidentiality:SCOPE:Availability:IMPACT:Execute Unauthorized Code or Commands:NOTE:If a product relies solely on the name of an object to determine identity, it may execute the incorrect or unintended code.::",,"::PHASE:Implementation:DESCRIPTION:Use class equivalency to determine type. Rather than use the class name to determine if an object is of a given type, use the getClass() method, and == operator.::",,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Comparing Classes by Name::TAXONOMY NAME:CLASP:ENTRY NAME:Comparing classes by name::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:OBJ09-J:ENTRY NAME:Compare classes and not class names::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in computation::,,,
|
| 11 |
-
,Reliance on Package-level Scope,Base,Incomplete,"Java packages are not inherently closed; therefore, relying on them for code security is not a good practice.",The purpose of package scope is to prevent accidental access by other parts of a program. This is an ease-of-software-development feature but not a security feature.,::NATURE:ChildOf:CWE ID:664:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:Any data in a Java package can be accessed outside of the Java framework if the package is distributed.::SCOPE:Integrity:IMPACT:Modify Application Data:NOTE:The data in a Java class can be modified by anyone outside of the Java framework if the packages is distributed.::,,"::PHASE:Architecture and Design Implementation:DESCRIPTION:Data should be private static and final whenever possible. This will assure that your code is protected by instantiating early, preventing access and tampering.::",,,,::TAXONOMY NAME:CLASP:ENTRY NAME:Relying on package-level scope::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:MET04-J:ENTRY NAME:Do not increase the accessibility of overridden or hidden methods::,,,
|
| 12 |
-
488,Exposure of Data Element to Wrong Sessin,Base,Draft,"The product does not sufficiently enforce boundaries between the states of different sessions, causing data to be provided to, or used by, the wrong session.","Data can bleed from one session to another through member variables of singleton objects, such as Servlets, and objects from a shared pool. In the case of Servlets, developers sometimes do not understand that, unless a Servlet implements the SingleThreadModel interface, the Servlet is a singleton; there is only one instance of the Servlet, and that single instance is used and re-used to handle multiple requests that are processed simultaneously by different threads. A common result is that developers use Servlet member fields in such a way that one user may inadvertently see another user's data. In other words, storing user data in Servlet member fields introduces a data access race condition.",::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation:NOTE:REALIZATION: This weakness is caused during implementation of an architectural security tactic.::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,"::PHASE:Architecture and Design:DESCRIPTION:Protect the application's sessions from information leakage. Make sure that a session's data is not used or visible by other sessions.::PHASE:Testing:DESCRIPTION:Use a static analysis tool to scan the code for information leakage vulnerabilities (e.g. Singleton Member Field).::PHASE:Architecture and Design:DESCRIPTION:In a multithreading environment, storing user data in Servlet member fields introduces a data access race condition. Do not use member fields to store information in the Servlet.::",,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Data Leaking Between Users::,::59::60::,,
|
| 13 |
-
,Debug Active Code,Base,Draft,"The product is deployed to unauthorized actors with debugging code still enabled or active, which can create unintended entry points or expose sensitive information.",A common development practice is to add back door code specifically designed for debugging or testing purposes that is not intended to be shipped or deployed with the product. These back door entry points create security risks because they are not considered during design or testing and fall outside of the expected operating conditions of the product.,::NATURE:ChildOf:CWE ID:710:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:215:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::ORDINALITY:Primary::,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::TECHNOLOGY CLASS:Not Technology-Specific:TECHNOLOGY PREVALENCE:Undetermined::TECHNOLOGY CLASS:ICS/OT:TECHNOLOGY PREVALENCE:Undetermined::,,::TERM:Leftover debug code:DESCRIPTION:This term originates from Seven Pernicious Kingdoms::,"::PHASE:Implementation:NOTE:In web-based applications, debug code is used to test and modify web application properties, configuration information, and functions. If a debug application is left on a production server, this oversight during the software process allows attackers access to debug functionality.::PHASE:Build and Compilation::PHASE:Operation::",,,"::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:SCOPE:Access Control:SCOPE:Other:IMPACT:Bypass Protection Mechanism:IMPACT:Read Application Data:IMPACT:Gain Privileges or Assume Identity:IMPACT:Varies by Context:NOTE:The severity of the exposed debug application will depend on the particular instance. At the least, it will give an attacker sensitive information about the settings and mechanics of web applications on the server. At worst, as is often the case, the debug application will allow an attacker complete control over the web application and server, as well as confidential information that either of these access.::",,::PHASE:Build and Compilation Distribution:DESCRIPTION:Remove debug code before deploying the application.::,,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Leftover Debug Code::TAXONOMY NAME:OWASP Top Ten 2004:ENTRY ID:A10:ENTRY NAME:Insecure Configuration Management:MAPPING FIT:CWE More Specific::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP28:ENTRY NAME:Unexpected access points::,::121::661::,"::TYPE:Other:NOTE:In J2EE a main method may be a good indicator that debug code has been left in the application, although there may not be any direct security impact.::",
|
| 14 |
-
491,Public cloneable() Method Without Final ('Object Hijack'),Variant,Draft,"A class has a cloneable() method that is not declared final, which allows an object to be created without calling the constructor. This can cause the object to be in an unexpected state.",,::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Integrity:SCOPE:Other:IMPACT:Unexpected State:IMPACT:Varies by Context::,,::PHASE:Implementation:DESCRIPTION:Make the cloneable() method final.::,,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Mobile Code: Object Hijack::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:OBJ07-J:ENTRY NAME:Sensitive classes must not let themselves be copied::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP28:ENTRY NAME:Unexpected access points::,,,
|
| 15 |
-
492,Use of Inner Class Containing Sensitive Data,Variant,Draft,Inner classes are translated into classes that are accessible at package scope and may expose code that the programmer intended to keep private to attackers.,"Inner classes quietly introduce several security concerns because of the way they are translated into Java bytecode. In Java source code, it appears that an inner class can be declared to be accessible only by the enclosing class, but Java bytecode has no concept of an inner class, so the compiler must transform an inner class declaration into a peer class with package level access to the original outer class. More insidiously, since an inner class can access private fields in its enclosing class, once an inner class becomes a peer class in bytecode, the compiler converts private fields accessed by the inner class into protected fields.",::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:Inner Classes data confidentiality aspects can often be overcome.::,,"::PHASE:Implementation:DESCRIPTION:Using sealed classes protects object-oriented encapsulation paradigms and therefore protects code from being extended in unforeseen ways.::PHASE:Implementation:DESCRIPTION:Inner Classes do not provide security. Warning: Never reduce the security of the object from an outer class, going to an inner class. If an outer class is final or private, ensure that its inner class is private as well.::",,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Mobile Code: Use of Inner Class::TAXONOMY NAME:CLASP:ENTRY NAME:Publicizing of private data when using inner classes::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:OBJ08-J:ENTRY NAME:Do not expose private members of an outer class from within a nested class::,,"::TYPE:Other:NOTE:Mobile code, in this case a Java Applet, is code that is transmitted across a network and executed on a remote machine. Because mobile code developers have little if any control of the environment in which their code will execute, special security concerns become relevant. One of the biggest environmental threats results from the risk that the mobile code will run side-by-side with other, potentially malicious, mobile code. Because all of the popular web browsers execute code from multiple sources together in the same JVM, many of the security guidelines for mobile code are focused on preventing manipulation of your objects' state and behavior by adversaries who have access to the same virtual machine where your program is running.::",
|
| 16 |
-
493,Critical Public Variable Without Final Modifier,Variant,Draft,"The product has a critical public variable that is not final, which allows the variable to be modified to contain unexpected values.","If a field is non-final and public, it can be changed once the value is set by any function that has access to the class which contains the field. This could lead to a vulnerability if other parts of the program make assumptions about the contents of that field.",::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::,"::Mobile code, such as a Java Applet, is code that is transmitted across a network and executed on a remote machine. Because mobile code developers have little if any control of the environment in which their code will execute, special security concerns become relevant. One of the biggest environmental threats results from the risk that the mobile code will run side-by-side with other, potentially malicious, mobile code. Because all of the popular web browsers execute code from multiple sources together in the same JVM, many of the security guidelines for mobile code are focused on preventing manipulation of your objects' state and behavior by adversaries who have access to the same virtual machine where your program is running.::Final provides security by only allowing non-mutable objects to be changed after being set. However, only objects which are not extended can be made final.::",,::PHASE:Implementation::,,,::SCOPE:Integrity:IMPACT:Modify Application Data:NOTE:The object could potentially be tampered with.::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:The object could potentially allow the object to be read.::,,"::PHASE:Implementation:DESCRIPTION:Declare all public fields as final when possible, especially if it is used to maintain internal state of an Applet or of classes used by an Applet. If a field must be public, then perform all appropriate sanity checks before accessing the field from your code.::",,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Mobile Code: Non-Final Public Field::TAXONOMY NAME:CLASP:ENTRY NAME:Failure to provide confidentiality for stored data::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:OBJ10-J:ENTRY NAME:Do not use public static nonfinal variables::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP28:ENTRY NAME:Unexpected access points::,,,
|
| 17 |
-
494,Download of Code Without Integrity Check,Base,Draft,The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.,"An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit.",::NATURE:ChildOf:CWE ID:345:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:669:VIEW ID:1000::NATURE:ChildOf:CWE ID:669:VIEW ID:1003:ORDINAL:Primary::NATURE:PeerOf:CWE ID:79:VIEW ID:1000::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::PHASE:Implementation::,,,"::SCOPE:Integrity:SCOPE:Availability:SCOPE:Confidentiality:SCOPE:Other:IMPACT:Execute Unauthorized Code or Commands:IMPACT:Alter Execution Logic:IMPACT:Other:NOTE:Executing untrusted code could compromise the control flow of the program. The untrusted code could execute attacker-controlled commands, read or modify sensitive resources, or prevent the software from functioning correctly for legitimate users.::","::METHOD:Manual Analysis:DESCRIPTION:This weakness can be detected using tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. Specifically, manual static analysis is typically required to find the behavior that triggers the download of code, and to determine whether integrity-checking methods are in use.::METHOD:Black Box:DESCRIPTION:Use monitoring tools that examine the software's process as it interacts with the operating system and the network. This technique is useful in cases when source code is unavailable, if the software was not developed by you, or if you want to verify that the build phase did not introduce any new weaknesses. Examples include debuggers that directly attach to the running process; system-call tracing utilities such as truss (Solaris) and strace (Linux); system activity monitors such as FileMon, RegMon, Process Monitor, and other Sysinternals utilities (Windows); and sniffers and protocol analyzers that monitor network traffic. Attach the monitor to the process and also sniff the network connection. Trigger features related to product updates or plugin installation, which is likely to force a code download. Monitor when files are downloaded and separately executed, or if they are otherwise read back into the process. Look for evidence of cryptographic library calls that use integrity checking.::","::PHASE:Implementation:DESCRIPTION:Perform proper forward and reverse DNS lookups to detect DNS spoofing.::PHASE:Architecture and Design Operation:DESCRIPTION:Encrypt the code with a reliable encryption scheme before transmitting. This will only be a partial solution, since it will not detect DNS spoofing and it will not prevent your code from being modified on the hosting site.::PHASE:Architecture and Design:STRATEGY:Libraries or Frameworks:DESCRIPTION:Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. Speficially, it may be helpful to use tools or frameworks to perform integrity checking on the transmitted code. When providing the code that is to be downloaded, such as for automatic updates of the software, then use cryptographic signatures for the code and modify the download clients to verify the signatures. Ensure that the implementation does not contain CWE-295, CWE-320, CWE-347, and related weaknesses. Use code signing technologies such as Authenticode. See references [REF-454] [REF-455] [REF-456].::PHASE:Architecture and Design Operation:STRATEGY:Environment Hardening:DESCRIPTION:Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations.::PHASE:Architecture and Design Operation:STRATEGY:Sandbox or Jail:DESCRIPTION:Run the code in a jail or similar sandbox environment that enforces strict boundaries between the process and the operating system. This may effectively restrict which files can be accessed in a particular directory or which commands can be executed by the software. OS-level examples include the Unix chroot jail, AppArmor, and SELinux. In general, managed code may provide some protection. For example, java.io.FilePermission in the Java SecurityManager allows the software to specify restrictions on file operations. This may not be a feasible solution, and it only limits the impact to the operating system; the rest of the application may still be subject to compromise. Be careful to avoid CWE-243 and other weaknesses related to jails.:EFFECTIVENESS:Limited::","::REFERENCE:CVE-2019-9534:DESCRIPTION:Satellite phone does not validate its firmware image.:LINK:https://www.cve.org/CVERecord?id=CVE-2019-9534::REFERENCE:CVE-2021-22909:DESCRIPTION:Chain: router's firmware update procedure uses curl with -k (insecure) option that disables certificate validation (CWE-295), allowing adversary-in-the-middle (AITM) compromise with a malicious firmware image (CWE-494).:LINK:https://www.cve.org/CVERecord?id=CVE-2021-22909::REFERENCE:CVE-2008-3438:DESCRIPTION:OS does not verify authenticity of its own updates.:LINK:https://www.cve.org/CVERecord?id=CVE-2008-3438::REFERENCE:CVE-2008-3324:DESCRIPTION:online poker client does not verify authenticity of its own updates.:LINK:https://www.cve.org/CVERecord?id=CVE-2008-3324::REFERENCE:CVE-2001-1125:DESCRIPTION:anti-virus product does not verify automatic updates for itself.:LINK:https://www.cve.org/CVERecord?id=CVE-2001-1125::REFERENCE:CVE-2002-0671:DESCRIPTION:VOIP phone downloads applications from web sites without verifying integrity.:LINK:https://www.cve.org/CVERecord?id=CVE-2002-0671::",,,::TAXONOMY NAME:CLASP:ENTRY NAME:Invoking untrusted mobile code::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:SEC06-J:ENTRY NAME:Do not rely on the default automatic signature verification provided by URLClassLoader and java.util.jar::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP27:ENTRY NAME:Tainted input to environment::,::184::185::186::187::533::538::657::662::691::692::693::695::,"::TYPE:Research Gap:NOTE:This is critical for mobile code, but it is likely to become more and more common as developers continue to adopt automated, network-based product distributions and upgrades. Software-as-a-Service (SaaS) might introduce additional subtleties. Common exploitation scenarios may include ad server compromises and bad upgrades.::",
|
| 18 |
-
495,Private Data Structure Returned From A Public Method,Variant,Draft,"The product has a method that is declared public, but returns a reference to a private data structure, which could then be modified in unexpected ways.",,::NATURE:ChildOf:CWE ID:664:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C#:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Integrity:IMPACT:Modify Application Data:NOTE:The contents of the data structure can be modified from outside the intended scope.::,,::PHASE:Implementation:DESCRIPTION:Declare the method private.::PHASE:Implementation:DESCRIPTION:Clone the member data and keep an unmodified version of the data private to the object.::PHASE:Implementation:DESCRIPTION:Use public setter methods that govern how a private member can be modified.::,,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Private Array-Typed Field Returned From A Public Method::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,,,
|
| 19 |
-
496,Public Data Assigned to Private Array-Typed Field,Variant,Incomplete,Assigning public data to a private array is equivalent to giving public access to the array.,,::NATURE:ChildOf:CWE ID:664:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C#:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Integrity:IMPACT:Modify Application Data:NOTE:The contents of the array can be modified from outside the intended scope.::,,::PHASE:Implementation:DESCRIPTION:Do not allow objects to modify private members of a class.::,,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Public Data Assigned to Private Array-Typed Field::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP25:ENTRY NAME:Tainted input to variable::,,,
|
| 20 |
-
497,to of Sensitive System Information Exposure an Unauthorized Control Sphere,Base,Incomplete,The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.,"Network-based products, such as web applications, often run on top of an operating system or similar environment. When the product communicates with outside parties, details about the underlying system are expected to remain hidden, such as path names for data files, other OS users, installed packages, the application environment, etc. This system information may be provided by the product itself, or buried within diagnostic or debugging messages. Debugging information helps an adversary learn about the system and form an attack plan. An information exposure occurs when system data or debugging information leaves the program through an output stream or logging function that makes it accessible to unauthorized parties. Using other weaknesses, an attacker could cause errors to occur; the response to these errors can reveal detailed system information, along with other impacts. An attacker can use messages that reveal technologies, operating systems, and product versions to tune the attack against known vulnerabilities in these technologies. A product may use diagnostic methods that provide significant implementation details such as stack traces as part of its error handling mechanism.",::NATURE:ChildOf:CWE ID:200:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,::PHASE:Architecture and Design Implementation:DESCRIPTION:Production applications should never use methods that generate internal details such as stack traces and error messages unless that information is directly committed to a log that is not viewable by the end user. All error message text should be HTML entity encoded before being written to the log file to protect against potential cross-site scripting attacks against the viewer of the logs::,,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:System Information Leak::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:ERR01-J:ENTRY NAME:Do not allow exceptions to expose sensitive information::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,::170::694::,,
|
| 21 |
-
498,Cloneable Class Containing Sensitive Information,Variant,Draft,"The code contains a class with sensitive data, but the class is cloneable. The data can then be accessed by cloning the class.","Cloneable classes are effectively open classes, since data cannot be hidden in them. Classes that do not explicitly deny cloning can be cloned by any other class without running the constructor.",::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:200:VIEW ID:1000::,,::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C#:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,"::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism:NOTE:A class that can be cloned can be produced without executing the constructor. This is dangerous since the constructor may perform security-related checks. By allowing the object to be cloned, those checks may be bypassed.::",,"::PHASE:Implementation:DESCRIPTION:If you do make your classes clonable, ensure that your clone method is final and throw super.clone().::",,,,::TAXONOMY NAME:CLASP:ENTRY NAME:Information leak through class cloning::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:OBJ07-J:ENTRY NAME:Sensitive classes must not let themselves be copied::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,,,
|
| 22 |
-
499,Serializable Class Containing Sensitive Data,Variant,Draft,"The code contains a class with sensitive data, but the class does not explicitly deny serialization. The data can be accessed by serializing the class through another class.","Serializable classes are effectively open classes since data cannot be hidden in them. Classes that do not explicitly deny serialization can be serialized by any other class, which can then in turn use the data stored inside it.",::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:200:VIEW ID:1000::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,"::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:an attacker can write out the class to a byte stream, then extract the important data from it.::",,"::PHASE:Implementation:DESCRIPTION:In Java, explicitly define final writeObject() to prevent serialization. This is the recommended solution. Define the writeObject() function to throw an exception explicitly denying serialization.::PHASE:Implementation:DESCRIPTION:Make sure to prevent serialization of your objects.::",,,,"::TAXONOMY NAME:CLASP:ENTRY NAME:Information leak through serialization::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:SER03-J:ENTRY NAME:Do not serialize unencrypted, sensitive data::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:SER05-J:ENTRY NAME:Do not serialize instances of inner classes::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::",,,
|
| 23 |
-
500,Public Static Field Not Marked Final,Variant,Draft,"An object contains a public static field that is not marked final, which might allow it to be modified in unexpected ways.",Public static variables can be read without an accessor and changed without a mutator by any classes in the application.,::NATURE:ChildOf:CWE ID:493:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,"::When a field is declared public but not final, the field can be read and written to by arbitrary Java code.::",,::PHASE:Implementation::,,,::SCOPE:Integrity:IMPACT:Modify Application Data:NOTE:The object could potentially be tampered with.::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:The object could potentially allow the object to be read.::,,"::PHASE:Architecture and Design:DESCRIPTION:Clearly identify the scope for all critical data elements, including whether they should be regarded as static.::PHASE:Implementation:DESCRIPTION:Make any static fields private and constant. A constant field is denoted by the keyword 'const' in C/C++ and ' final' in Java::",,,,::TAXONOMY NAME:CLASP:ENTRY NAME:Overflow of static internal buffer::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:OBJ10-J:ENTRY NAME:Do not use public static nonfinal variables::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP28:ENTRY NAME:Unexpected access points::,,,
|
| 24 |
-
501,Trust Boundary Violation,Base,Draft,The product mixes trusted and untrusted data in the same data structure or structured message.,"A trust boundary can be thought of as line drawn through a program. On one side of the line, data is untrusted. On the other side of the line, data is assumed to be trustworthy. The purpose of validation logic is to allow data to safely cross the trust boundary - to move from untrusted to trusted. A trust boundary violation occurs when a program blurs the line between what is trusted and what is untrusted. By combining trusted and untrusted data in the same data structure, it becomes easier for programmers to mistakenly trust unvalidated data.",::NATURE:ChildOf:CWE ID:664:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::,,,::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism::,,,,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Trust Boundary Violation::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,,,
|
| 25 |
-
502,Deserialization of Untrusted Data,Base,Draft,The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.,"It is often convenient to serialize objects for communication or to save them for later use. However, deserialized data or code can often be modified without using the provided accessor functions if it does not use cryptography to protect itself. Furthermore, any cryptography would still be client-side security -- which is a dangerous security assumption. Data that is untrusted can not be trusted to be well-formed. When developers place no restrictions on gadget chains, or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions, like generating a shell.",::NATURE:ChildOf:CWE ID:913:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:913:VIEW ID:1003:ORDINAL:Primary::NATURE:PeerOf:CWE ID:915:VIEW ID:1000::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Ruby:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:PHP:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:Python:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:JavaScript:LANGUAGE PREVALENCE:Undetermined::TECHNOLOGY CLASS:ICS/OT:TECHNOLOGY PREVALENCE:Often::,"::Serialization and deserialization refer to the process of taking program-internal object-related data, packaging it in a way that allows the data to be externally stored or transferred (serialization), then extracting the serialized data to reconstruct the original object (deserialization).::","::TERM:Marshaling, Unmarshaling:DESCRIPTION:Marshaling and unmarshaling are effectively synonyms for serialization and deserialization, respectively.::TERM:Pickling, Unpickling:DESCRIPTION:In Python, the pickle functionality is used to perform serialization and deserialization.::TERM:PHP Object Injection:DESCRIPTION:Some PHP application researchers use this term when attacking unsafe use of the unserialize() function; but it is also used for CWE-915.::",::PHASE:Architecture and Design:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::PHASE:Implementation::,,,"::SCOPE:Integrity:IMPACT:Modify Application Data:IMPACT:Unexpected State:NOTE:Attackers can modify unexpected objects or data that was assumed to be safe from modification.::SCOPE:Availability:IMPACT:DoS: Resource Consumption (CPU):NOTE:If a function is making an assumption on when to terminate, based on a sentry in a string, it could easily never terminate.::SCOPE:Other:IMPACT:Varies by Context:NOTE:The consequences can vary widely, because it depends on which objects or methods are being deserialized, and how they are used. Making an assumption that the code in the deserialized object is valid is dangerous and can enable exploitation.::",,"::PHASE:Architecture and Design Implementation:DESCRIPTION:If available, use the signing/sealing features of the programming language to assure that deserialized data has not been tainted. For example, a hash-based message authentication code (HMAC) could be used to ensure that data has not been modified.::PHASE:Implementation:DESCRIPTION:When deserializing data, populate a new object rather than just deserializing. The result is that the data flows through safe input validation and that the functions are safe.::PHASE:Implementation:DESCRIPTION:Explicitly define a final object() to prevent deserialization.::PHASE:Architecture and Design Implementation:DESCRIPTION:Make fields transient to protect them from deserialization. An attempt to serialize and then deserialize a class containing transient fields will result in NULLs where the transient data should be. This is an excellent way to prevent time, environment-based, or sensitive variables from being carried over and used improperly.::PHASE:Implementation:DESCRIPTION:Avoid having unnecessary types or gadgets available that can be leveraged for malicious ends. This limits the potential for unintended or unauthorized types and gadgets to be leveraged by the attacker. Add only acceptable classes to an allowlist. Note: new gadgets are constantly being discovered, so this alone is not a sufficient mitigation.::","::REFERENCE:CVE-2019-12799:DESCRIPTION:chain: bypass of untrusted deserialization issue (CWE-502) by using an assumed-trusted class (CWE-183):LINK:https://www.cve.org/CVERecord?id=CVE-2019-12799::REFERENCE:CVE-2015-8103:DESCRIPTION:Deserialization issue in commonly-used Java library allows remote execution.:LINK:https://www.cve.org/CVERecord?id=CVE-2015-8103::REFERENCE:CVE-2015-4852:DESCRIPTION:Deserialization issue in commonly-used Java library allows remote execution.:LINK:https://www.cve.org/CVERecord?id=CVE-2015-4852::REFERENCE:CVE-2013-1465:DESCRIPTION:Use of PHP unserialize function on untrusted input allows attacker to modify application configuration.:LINK:https://www.cve.org/CVERecord?id=CVE-2013-1465::REFERENCE:CVE-2012-3527:DESCRIPTION:Use of PHP unserialize function on untrusted input in content management system might allow code execution.:LINK:https://www.cve.org/CVERecord?id=CVE-2012-3527::REFERENCE:CVE-2012-0911:DESCRIPTION:Use of PHP unserialize function on untrusted input in content management system allows code execution using a crafted cookie value.:LINK:https://www.cve.org/CVERecord?id=CVE-2012-0911::REFERENCE:CVE-2012-0911:DESCRIPTION:Content management system written in PHP allows unserialize of arbitrary objects, possibly allowing code execution.:LINK:https://www.cve.org/CVERecord?id=CVE-2012-0911::REFERENCE:CVE-2011-2520:DESCRIPTION:Python script allows local users to execute code via pickled data.:LINK:https://www.cve.org/CVERecord?id=CVE-2011-2520::REFERENCE:CVE-2012-4406:DESCRIPTION:Unsafe deserialization using pickle in a Python script.:LINK:https://www.cve.org/CVERecord?id=CVE-2012-4406::REFERENCE:CVE-2003-0791:DESCRIPTION:Web browser allows execution of native methods via a crafted string to a JavaScript function that deserializes the string.:LINK:https://www.cve.org/CVERecord?id=CVE-2003-0791::",,,"::TAXONOMY NAME:CLASP:ENTRY NAME:Deserialization of untrusted data::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:SER01-J:ENTRY NAME:Do not deviate from the proper signatures of serialization methods::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:SER03-J:ENTRY NAME:Do not serialize unencrypted, sensitive data::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:SER06-J:ENTRY NAME:Make defensive copies of private mutable components during deserialization::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:SER08-J:ENTRY NAME:Do not use the default serialized form for implementation defined invariants::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP25:ENTRY NAME:Tainted input to variable::",::586::,"::TYPE:Maintenance:NOTE:The relationships between CWE-502 and CWE-915 need further exploration. CWE-915 is more narrowly scoped to object modification, and is not necessarily used for deserialization.::",
|
| 26 |
-
506,Embedded Malicious Code,Class,Incomplete,The product contains code that appears to be malicious in nature.,"Malicious flaws have acquired colorful names, including Trojan horse, trapdoor, timebomb, and logic-bomb. A developer might insert malicious code with the intent to subvert the security of a product or its host system at some time in the future. It generally refers to a program that performs a useful service but exploits rights of the program's user in a way the user does not intend.",::NATURE:ChildOf:CWE ID:912:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::PHASE:Bundling::PHASE:Distribution::PHASE:Installation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:IMPACT:Execute Unauthorized Code or Commands::,"::METHOD:Manual Static Analysis - Binary or Bytecode:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Binary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies Generated Code Inspection:EFFECTIVENESS:SOAR Partial::METHOD:Dynamic Analysis with Manual Results Interpretation:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Automated Monitored Execution:EFFECTIVENESS:SOAR Partial::METHOD:Manual Static Analysis - Source Code:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Manual Source Code Review (not inspections):EFFECTIVENESS:SOAR Partial::METHOD:Automated Static Analysis:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Origin Analysis:EFFECTIVENESS:SOAR Partial::","::PHASE:Testing:DESCRIPTION:Remove the malicious code and start an effort to ensure that no more malicious code exists. This may require a detailed review of all code, as it is possible to hide a serious attack in only one or two lines of code. These lines may be located almost anywhere in an application and may have been intentionally obfuscated by the attacker.::",,,,::TAXONOMY NAME:Landwehr:ENTRY NAME:Malicious::,::442::448::636::,"::TYPE:Terminology:NOTE:The term Trojan horse was introduced by Dan Edwards and recorded by James Anderson [18] to characterize a particular computer security threat; it has been redefined many times [4,18-20].::",
|
| 27 |
-
507,Trojan Horse,Base,Incomplete,"The product appears to contain benign or useful functionality, but it also contains code that is hidden from normal operation that violates the intended security policy of the user or the system administrator.",,::NATURE:ChildOf:CWE ID:506:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:IMPACT:Execute Unauthorized Code or Commands::,,::PHASE:Operation:DESCRIPTION:Most antivirus software scans for Trojan Horses.::PHASE:Installation:DESCRIPTION:Verify the integrity of the product that is being installed.::,,,,::TAXONOMY NAME:Landwehr:ENTRY NAME:Trojan Horse::,::698::,"::TYPE:Other:NOTE:Potentially malicious dynamic code compiled at runtime can conceal any number of attacks that will not appear in the baseline. The use of dynamically compiled code could also allow the injection of attacks on post-deployed applications.::TYPE:Terminology:NOTE:Definitions of Trojan horse and related terms have varied widely over the years, but common usage in 2008 generally refers to software that performs a legitimate function, but also contains malicious code. Almost any malicious code can be called a Trojan horse, since the author of malicious code needs to disguise it somehow so that it will be invoked by a nonmalicious user (unless the author means also to invoke the code, in which case they presumably already possess the authorization to perform the intended sabotage). A Trojan horse that replicates itself by copying its code into other program files (see case MA1) is commonly referred to as a virus. One that replicates itself by creating new processes or files to contain its code, instead of modifying existing storage entities, is often called a worm. Denning provides a general discussion of these terms; differences of opinion about the term applicable to a particular flaw or its exploitations sometimes occur.::",
|
| 28 |
-
,Non-Replicating Malicious Code,Base,Incomplete,Non-replicating malicious code only resides on the target system or product that is attacked; it does not attempt to spread to other systems.,,::NATURE:ChildOf:CWE ID:507:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:IMPACT:Execute Unauthorized Code or Commands::,,::PHASE:Operation:DESCRIPTION:Antivirus software can help mitigate known malicious code.::PHASE:Installation:DESCRIPTION:Verify the integrity of the software that is being installed.::,,,,::TAXONOMY NAME:Landwehr:ENTRY NAME:Non-Replicating::,,,
|
| 29 |
-
509,Replica#ting Malicious Code #(Viru!s* or Worm),Base,Incomplete,"Replicating malicious code, including viruses and worms, will attempt to attack other systems once it has successfully compromised the target system or the product.",,::NATURE:ChildOf:CWE ID:507:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:IMPACT:Execute Unauthorized Code or Commands::,,::PHASE:Operation:DESCRIPTION:Antivirus software scans for viruses or worms.::PHASE:Installation:DESCRIPTION:Always verify the integrity of the software that is being installed.::,,,,::TAXONOMY NAME:Landwehr:ENTRY NAME:Replicating (virus)::,,,
|
| 30 |
-
510,Trapdoor,Base,Incomplete,"A trapdoor is a hidden piece of code that responds to a special input, allowing its user access to resources without passing through the normal security enforcement mechanism.",,::NATURE:ChildOf:CWE ID:506:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:SCOPE:Access Control:IMPACT:Execute Unauthorized Code or Commands:IMPACT:Bypass Protection Mechanism::,"::METHOD:Automated Static Analysis - Binary or Bytecode:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Inter-application Flow Analysis Binary / Bytecode simple extractor - strings, ELF readers, etc.:EFFECTIVENESS:SOAR Partial::METHOD:Manual Static Analysis - Binary or Bytecode:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Binary / Bytecode disassembler - then use manual analysis for vulnerabilities & anomalies Generated Code Inspection:EFFECTIVENESS:SOAR Partial::METHOD:Dynamic Analysis with Manual Results Interpretation:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Automated Monitored Execution Forced Path Execution Debugger Monitored Virtual Environment - run potentially malicious code in sandbox / wrapper / virtual machine, see if it does anything suspicious:EFFECTIVENESS:SOAR Partial::METHOD:Manual Static Analysis - Source Code:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Manual Source Code Review (not inspections) Cost effective for partial coverage: Focused Manual Spotcheck - Focused manual analysis of source:EFFECTIVENESS:High::METHOD:Automated Static Analysis - Source Code:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Context-configured Source Code Weakness Analyzer:EFFECTIVENESS:SOAR Partial::METHOD:Architecture or Design Review:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.) Cost effective for partial coverage: Formal Methods / Correct-By-Construction:EFFECTIVENESS:High::","::PHASE:Installation:DESCRIPTION:Always verify the integrity of the software that is being installed.::PHASE:Testing:DESCRIPTION:Identify and closely inspect the conditions for entering privileged areas of the code, especially those related to authentication, process invocation, and network communications.::",,,,::TAXONOMY NAME:Landwehr:ENTRY NAME:Trapdoor::,,,
|
| 31 |
-
511,Logic/Time Bomb,Base,Incomplete,"The product contains code that is designed to disrupt the legitimate operation of the product (or its environment) when a certain time passes, or when a certain logical condition is met.","When the time bomb or logic bomb is detonated, it may perform a denial of service such as crashing the system, deleting critical data, or degrading system response time. This bomb might be placed within either a replicating or non-replicating Trojan horse.",::NATURE:ChildOf:CWE ID:506:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::TECHNOLOGY CLASS:Mobile:TECHNOLOGY PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Other:SCOPE:Integrity:IMPACT:Varies by Context:IMPACT:Alter Execution Logic::,,"::PHASE:Installation:DESCRIPTION:Always verify the integrity of the product that is being installed.::PHASE:Testing:DESCRIPTION:Conduct a code coverage analysis using live testing, then closely inspect any code that is not covered.::",,,,::TAXONOMY NAME:Landwehr:ENTRY NAME:Logic/Time Bomb::,,,
|
| 32 |
-
512,Spyware,Base,Incomplete,"The product collects personally identifiable information about a human user or the user's activities, but the product accesses this information using other resources besides itself, and it does not require that user's explicit approval or direct input into the product.","Spyware is a commonly used term with many definitions and interpretations. In general, it is meant to refer to products that collect information or install functionality that human users might not allow if they were fully aware of the actions being taken by the software. For example, a user might expect that tax software would collect a social security number and include it when filing a tax return, but that same user would not expect gaming software to obtain the social security number from that tax software's data.",::NATURE:ChildOf:CWE ID:506:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,::PHASE:Operation:DESCRIPTION:Use spyware detection and removal software.::PHASE:Installation:DESCRIPTION:Always verify the integrity of the product that is being installed.::,,,,,,,
|
| 33 |
-
514,Covert Channel,Class,Incomplete,A covert channel is a path that can be used to transfer information in a way not intended by the system's designers.,Typically the system has not given authorization for the transmission and has no knowledge of its occurrence.,::NATURE:ChildOf:CWE ID:1229:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Confidentiality:SCOPE:Access Control:IMPACT:Read Application Data:IMPACT:Bypass Protection Mechanism::,"::METHOD:Architecture or Design Review:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.):EFFECTIVENESS:SOAR Partial::",,,,,::TAXONOMY NAME:Landwehr:ENTRY NAME:Covert Channel::,::463::,"::TYPE:Theoretical:NOTE:A covert channel can be thought of as an emergent resource, meaning that it was not an originally intended resource, however it exists due the application's behaviors.::TYPE:Maintenance:NOTE:As of CWE 4.9, members of the CWE Hardware SIG are working to improve CWE's coverage of transient execution weaknesses, which include issues related to Spectre, Meltdown, and other attacks that create or exploit covert channels. As a result of that work, this entry might change in CWE 4.10.::",
|
| 34 |
-
515,Covert Storage Channel,Base,Incomplete,A covert storage channel transfers information through the setting of bits by one program and the reading of those bits by another. What distinguishes this case from that of ordinary operation is that the bits are used to convey encoded information.,"Covert storage channels occur when out-of-band data is stored in messages for the purpose of memory reuse. Covert channels are frequently classified as either storage or timing channels. Examples would include using a file intended to hold only audit information to convey user passwords--using the name of a file or perhaps status bits associated with it that can be read by all users to signal the contents of the file. Steganography, concealing information in such a manner that no one but the intended recipient knows of the existence of the message, is a good example of a covert storage channel.",::NATURE:ChildOf:CWE ID:514:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::,,,"::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:Covert storage channels may provide attackers with important information about the system in question.::SCOPE:Integrity:SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:If these messages or packets are sent with unnecessary data contained within, it may tip off malicious listeners as to the process that created the message. With this information, attackers may learn any number of things, including the hardware platform, operating system, or algorithms used by the sender. This information can be of significant value to the user in launching further attacks.::",,::PHASE:Implementation:DESCRIPTION:Ensure that all reserved fields are set to zero before messages are sent and that no unnecessary information is included.::,,,,::TAXONOMY NAME:Landwehr:ENTRY NAME:Storage::TAXONOMY NAME:CLASP:ENTRY NAME:Covert storage channel::,,"::TYPE:Maintenance:NOTE:As of CWE 4.9, members of the CWE Hardware SIG are working to improve CWE's coverage of transient execution weaknesses, which include issues related to Spectre, Meltdown, and other attacks that create or exploit covert channels. As a result of that work, this entry might change in CWE 4.10.::",
|
| 35 |
-
52,.NET Misconfiguration: Use of Impersonation,Variant,Incomplete,Allowing a .NET application to run at potentially escalated levels of access to the underlying operating and file systems can be dangerous and result in various forms of attacks.,".NET server applications can optionally execute using the identity of the user authenticated to the client. The intention of this functionality is to bypass authentication and access control checks within the .NET application code. Authentication is done by the underlying web server (Microsoft Internet Information Service IIS), which passes the authenticated token, or unauthenticated anonymous token, to the .NET application. Using the token to impersonate the client, the application then relies on the settings within the NTFS directories and files to control access. Impersonation enables the application, on the server running the .NET application, to both execute code and access resources in the context of the authenticated and authorized user.",::NATURE:ChildOf:CWE ID:266:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Access Control:IMPACT:Gain Privileges or Assume Identity::,,::PHASE:Operation:DESCRIPTION:Run the application with limited privilege to the underlying operating and file system.::,,,,,,,
|
| 36 |
-
521,Weak Password Requirements,Base,Draft,"The product does not require that users should have strong passwords, which makes it easier for attackers to compromise user accounts.",Authentication mechanisms often rely on a memorized secret (also known as a password) to provide an assertion of identity for a user of a system. It is therefore important that this password be of sufficient complexity and impractical for an adversary to guess. The specific requirements around how complex a password needs to be depends on the type of system being protected. Selecting the correct password requirements and enforcing them through implementation are critical to the overall success of the authentication mechanism.,::NATURE:ChildOf:CWE ID:1391:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:287:VIEW ID:1003:ORDINAL:Primary::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::TECHNOLOGY CLASS:Not Technology-Specific:TECHNOLOGY PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design:NOTE:COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.::PHASE:Implementation:NOTE:Not enforcing the password policy stated in a products design can allow users to create passwords that do not provide the necessary level of protection.::,,,::SCOPE:Access Control:IMPACT:Gain Privileges or Assume Identity:NOTE:An attacker could easily guess user passwords and gain access user accounts.::,,"::PHASE:Architecture and Design:DESCRIPTION:A product's design should require adherance to an appropriate password policy. Specific password requirements depend strongly on contextual factors, but it is recommended to contain the following attributes: Enforcement of a minimum and maximum length Restrictions against password reuse Restrictions against using common passwords Restrictions against using contextual string in the password (e.g., user id, app name) Depending on the threat model, the password policy may include several additional attributes. Complex passwords requiring mixed character sets (alpha, numeric, special, mixed case) Increasing the range of characters makes the password harder to crack and may be appropriate for systems relying on single factor authentication. Unfortunately, a complex password may be difficult to memorize, encouraging a user to select a short password or to incorrectly manage the password (write it down). Another disadvantage of this approach is that it often does not result in a significant increases in overal password complexity due to people's predictable usage of various symbols. Large Minimum Length (encouraging passphrases instead of passwords) Increasing the number of characters makes the password harder to crack and may be appropriate for systems relying on single factor authentication. A disadvantage of this approach is that selecting a good passphrase is not easy and poor passwords can still be generated. Some prompting may be needed to encourage long un-predictable passwords. Randomly Chosen Secrets Generating a password for the user can help make sure that length and complexity requirements are met, and can result in secure passwords being used. A disadvantage of this approach is that the resulting password or passpharse may be too difficult to memorize, encouraging them to be written down. Password Expiration Requiring a periodic password change can reduce the time window that an adversary has to crack a password, while also limiting the damage caused by password exposures at other locations. Password expiration may be a good mitigating technique when long complex passwords are not desired. See NIST 800-63B [REF-1053] for further information on password requirements.::PHASE:Architecture and Design:DESCRIPTION:Consider a second authentication factor beyond the password, which prevents the password from being a single point of failure. See CWE-308 for further information.::PHASE:Implementation:DESCRIPTION:Consider implementing a password complexity meter to inform users when a chosen password meets the required attributes.::",::REFERENCE:CVE-2020-4574:DESCRIPTION:key server application does not require strong passwords:LINK:https://www.cve.org/CVERecord?id=CVE-2020-4574::,,,::TAXONOMY NAME:OWASP Top Ten 2004:ENTRY ID:A3:ENTRY NAME:Broken Authentication and Session Management:MAPPING FIT:CWE More Specific::,::112::16::49::509::55::555::561::565::70::,,
|
| 37 |
-
522,Insufficiently Protected Credentials,Class,Incomplete,"The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.",,::NATURE:ChildOf:CWE ID:1390:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:287:VIEW ID:1003:ORDINAL:Primary::NATURE:ChildOf:CWE ID:668:VIEW ID:1000::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::TECHNOLOGY CLASS:ICS/OT:TECHNOLOGY PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design:NOTE:COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.::PHASE:Implementation::,,,::SCOPE:Access Control:IMPACT:Gain Privileges or Assume Identity:NOTE:An attacker could gain access to user accounts and access sensitive data used by the user accounts.::,,"::PHASE:Architecture and Design:DESCRIPTION:Use an appropriate security mechanism to protect the credentials.::PHASE:Architecture and Design:DESCRIPTION:Make appropriate use of cryptography to protect the credentials.::PHASE:Implementation:DESCRIPTION:Use industry standards to protect the credentials (e.g. LDAP, keystore, etc.).::","::REFERENCE:CVE-2022-29959:DESCRIPTION:Initialization file contains credentials that can be decoded using a simple string transformation:LINK:https://www.cve.org/CVERecord?id=CVE-2022-29959::REFERENCE:CVE-2022-35411:DESCRIPTION:Python-based RPC framework enables pickle functionality by default, allowing clients to unpickle untrusted data.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-35411::REFERENCE:CVE-2022-29519:DESCRIPTION:Programmable Logic Controller (PLC) sends sensitive information in plaintext, including passwords and session tokens.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-29519::REFERENCE:CVE-2022-30312:DESCRIPTION:Building Controller uses a protocol that transmits authentication credentials in plaintext.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-30312::REFERENCE:CVE-2022-31204:DESCRIPTION:Programmable Logic Controller (PLC) sends password in plaintext.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-31204::REFERENCE:CVE-2022-30275:DESCRIPTION:Remote Terminal Unit (RTU) uses a driver that relies on a password stored in plaintext.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-30275::REFERENCE:CVE-2007-0681:DESCRIPTION:Web app allows remote attackers to change the passwords of arbitrary users without providing the original password, and possibly perform other unauthorized actions.:LINK:https://www.cve.org/CVERecord?id=CVE-2007-0681::REFERENCE:CVE-2000-0944:DESCRIPTION:Web application password change utility doesn't check the original password.:LINK:https://www.cve.org/CVERecord?id=CVE-2000-0944::REFERENCE:CVE-2005-3435:DESCRIPTION:product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.:LINK:https://www.cve.org/CVERecord?id=CVE-2005-3435::REFERENCE:CVE-2005-0408:DESCRIPTION:chain: product generates predictable MD5 hashes using a constant value combined with username, allowing authentication bypass.:LINK:https://www.cve.org/CVERecord?id=CVE-2005-0408::",,,::TAXONOMY NAME:OWASP Top Ten 2007:ENTRY ID:A7:ENTRY NAME:Broken Authentication and Session Management:MAPPING FIT:CWE More Specific::TAXONOMY NAME:OWASP Top Ten 2004:ENTRY ID:A3:ENTRY NAME:Broken Authentication and Session Management:MAPPING FIT:CWE More Specific::,::102::474::50::509::551::555::560::561::600::644::645::652::653::,,
|
| 38 |
-
523,Unprotected Transport of Credentials,Base,Incomplete,Login pages do not use adequate measures to protect the user name and password while they are in transit from the client to the server.,,::NATURE:ChildOf:CWE ID:522:VIEW ID:1000:ORDINAL:Primary::NATURE:CanAlsoBe:CWE ID:312:VIEW ID:1000::,,,"::SSL (Secure Socket Layer) provides data confidentiality and integrity to HTTP. By encrypting HTTP messages, SSL protects from attackers eavesdropping or altering message contents.::",,::PHASE:Architecture and Design:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::,,,::SCOPE:Access Control:IMPACT:Gain Privileges or Assume Identity::,,"::PHASE:Operation System Configuration:DESCRIPTION:Enforce SSL use for the login page or any page used to transmit user credentials or other sensitive information. Even if the entire site does not use SSL, it MUST use SSL for login. Additionally, to help prevent phishing attacks, make sure that SSL serves the login page. SSL allows the user to verify the identity of the server to which they are connecting. If the SSL serves login page, the user can be certain they are talking to the proper end system. A phishing attack would typically redirect a user to a site that does not have a valid trusted server certificate issued from an authorized supplier.::",,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,::102::,,
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1020.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-38734,Candidate,SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Menu.php.,MISC:https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-2.md | MISC:https://www.sem-cms.cn/wenda/view-56.html,Assigned (20210816),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-38735,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-38736,Candidate,SEMCMS Shop V 1.1 is vulnerable to SQL Injection via Ant_Global.php.,MISC:https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-1.md | MISC:https://www.sem-cms.cn/wenda/view-56.html,Assigned (20210816),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-38737,Candidate,SEMCMS v 1.1 is vulnerable to SQL Injection via Ant_Pro.php.,MISC:https://github.com/BigTiger2020/SCSHOP/blob/main/semcms-6.md | MISC:https://www.sem-cms.cn/wenda/view-56.html,Assigned (20210816),None (candidate not yet proposed),
|
| 6 |
-
CV#-2021-38738,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-38739,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-3874,Candidate,bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),CONFIRM:https://huntr.dev/bounties/ac268a17-72b5-446f-a09a-9945ef58607a | URL:https://huntr.dev/bounties/ac268a17-72b5-446f-a09a-9945ef58607a | MISC:https://github.com/bookstackapp/bookstack/commit/7224fbcc89f00f2b71644e36bb1b1d96addd1d5a | URL:https://github.com/bookstackapp/bookstack/commit/7224fbcc89f00f2b71644e36bb1b1d96addd1d5a,Assigned (20211008),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-38740,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-38741,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-38742,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-38743,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-38744,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-38745,Candidate,Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.,MISC:https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-81-2021-07-26-High-impact-Low-risk-Zero-Code-RCE-in-admin,Assigned (20210816),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-38746,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-3874,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-38748,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-38749,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-3875,Candidate,vim is vulnerable to Heap-based Buffer Overflow,CONFIRM:https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53 | URL:https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53 | FEDORA:FEDORA-2021-6988830606 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ | FEDORA:FEDORA-2021-84f4cf3244 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f | URL:https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1,Assigned (20211009),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-38750,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-38751,Candidate,"A HTTP Host header attack exists in ExponentCMS 2.6 and below in /exponent_constants.php. A modified HTTP header can change links on the webpage to an arbitrary value, leading to a possible attack vector for MITM.",MISC:https://github.com/exponentcms/exponent-cms/issues/1544,Assigned (20210816),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-38752,Candidate,A cross-site scripting (XSS) vulnerability in Online Catering Reservation System using PHP on Sourcecodester allows an attacker to arbitrarily inject code in the search bar.,MISC:https://github.com/dumpling-soup/Online-Catering-Reservation/blob/main/README.md,Assigned (20210816),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-38753,Candidate,An unrestricted file upload on Simple Image Gallery Web App can be exploited to upload a web shell and executed to gain unauthorized access to the server hosting the web app.,MISC:https://github.com/dumpling-soup/Simple-Image-Gallery-Web-App/blob/main/README.md,Assigned (20210816),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-38754,Candidate,SQL Injection vulnerability in Hospital Management System due to lack of input validation in messearch.php.,MISC:https://github.com/kishan0725/Hospital-Management-System/issues/7 | MISC:https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-38754 | MISC:https://streamable.com/y9qy4m,Assigned (20210816),None (candidate not yet proposed),
|
| 25 |
-
,Candidate,Unauthenticated doctor entry deletion in Hospital Management System in admin-panel1.php.,MISC:https://github.com/kishan0725/Hospital-Management-System/issues/5,Assigned (20210816),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-38756,Candidate,Persistent cross-site scripting (XSS) in Hospital Management System targeted towards web admin through prescribe.php.,MISC:https://github.com/kishan0725/Hospital-Management-System/issues/4,Assigned (20210816),None (candidate not yet proposed),
|
| 27 |
-
C$VE-202$1-3@8757,Candidate,Persistent cross-site scripting (XSS) in Hospital Management System targeted towards web admin through contact.php.,MISC:http://packetstormsecurity.com/files/163869/Hospital-Management-System-Cross-Site-Scripting.html | MISC:https://github.com/kishan0725/Hospital-Management-System/issues/6,Assigned (20210816),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-38758,Candidate,Directory traversal vulnerability in Online Catering Reservation System 1.0 exists due to lack of validation in index.php.,MISC:https://attackerkb.com/topics/XuEb81tsid/online-catering-reservation-dt-food-catering-by-oretnom23-v1-0-sql-injection---login | MISC:https://github.com/dumpling-soup/Online-Catering-Reservation-DT/blob/main/README.md | MISC:https://github.com/nu11secur1ty/CVE-mitre/blob/main/CVE-2021-38758/README.MD | MISC:https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-38758 | MISC:https://github.com/nu11secur1ty/CVE-mitre/tree/main/Online-Catering-Reservation-DT-Food-Catering,Assigned (20210816),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-38759,Candidate,"Raspberry Pi OS through 5.10 has the raspberry default password for the pi account. If not changed, attackers can gain administrator privileges.",MISC:http://packetstormsecurity.com/files/165211/Raspberry-Pi-5.10-Default-Credentials.html | MISC:https://arstechnica.com/gadgets/2022/04/raspberry-pi-os-axes-longstanding-default-user-account-in-the-name-of-security/ | MISC:https://www.cnvd.org.cn/flaw/show/CNVD-2021-43968 | MISC:https://www.raspberrypi.com/documentation/computers/configuration.html#change-the-default-password,Assigned (20210816),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-3876,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211010),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-38760,Candida*e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-38761,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-38762,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-38763,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-38764,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 36 |
-
CVE2021-38765,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-38766,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-38767,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 39 |
-
,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-38769,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-3877,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211011),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-38770,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-38771,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-38772,Candidate,Tenda AC10-1200 v15.03.06.23_EN was discovered to contain a buffer overflow via the list parameter in the fromSetIpMacBind function.,MISC:https://noob3xploiter.medium.com/hacking-the-tenda-ac10-1200-router-part-3-yet-another-buffer-overflow-4eb322f64823,Assigned (20210816),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-38773,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-38774,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-38775,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-38776,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-38777,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 50 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-38779,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-3878,Candidate,corenlp is vulnerable to Improper Restriction of XML External Entity Reference,CONFIRM:https://huntr.dev/bounties/a11c889b-ccff-4fea-9e29-963a23a63dd2 | URL:https://huntr.dev/bounties/a11c889b-ccff-4fea-9e29-963a23a63dd2 | MISC:https://github.com/stanfordnlp/corenlp/commit/e5bbe135a02a74b952396751ed3015e8b8252e99 | URL:https://github.com/stanfordnlp/corenlp/commit/e5bbe135a02a74b952396751ed3015e8b8252e99,Assigned (20211012),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-38780,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-38781,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-38782,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-38783,,"There is a Out-of-Bound Write in the Allwinner R818 SoC Android Q SDK V1.0 camera driver ""/dev/cedar_dev"" through iotcl cmd IOCTL_SET_PROC_INFO and IOCTL_COPY_PROC_INFO, which could cause a system crash or EoP.",MISC:https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9ACamera%20Driver%20has%20Out-Of-Bound%20Write%20Vulnerability.md | MISC:https://vul.wangan.com/a/CNVD-2021-49168 | MISC:https://www.allwinnertech.com/index.php?c=product&a=index&id=92 | MISC:https://www.cnvd.org.cn/flaw/show/CNVD-2021-49168,Assigned (20210816),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-38784,Candidate,There is a NULL pointer dereference in the syscall open_exec function of Allwinner R818 SoC Android Q SDK V1.0 that could executable a malicious file to cause a system crash.,MISC:https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9ASyscall%20open_exec%20has%20Null%20Pointer%20Dereference%20Vulnerability.md | MISC:https://vul.wangan.com/a/CNVD-2021-49172 | MISC:https://www.allwinnertech.com/index.php?c=product&a=index&id=92 | MISC:https://www.cnvd.org.cn/flaw/show/CNVD-2021-49172,Assigned (20210816),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-38785,Candidate,There is a NULL pointer deference in the Allwinner R818 SoC Android Q SDK V1.0 camera driver /dev/cedar_dev that could use the ioctl cmd IOCTL_GET_IOMMU_ADDR to cause a system crash.,MISC:https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9ACamera%20Driver%20has%20Null%20Pointer%20Dereference%20Vulnerability.md | MISC:https://vul.wangan.com/a/CNVD-2021-49170 | MISC:https://www.allwinnertech.com/index.php?c=product&a=index&id=92 | MISC:https://www.cnvd.org.cn/flaw/show/CNVD-2021-49170,Assigned (20210816),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-38786,Candidate,"There is a NULL pointer dereference in media/libcedarc/vdecoder of Allwinner R818 SoC Android Q SDK V1.0, which could cause a media crash (denial of service).",MISC:https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9AMedia%20vdecoder%20has%20Null%20Pointer%20Dereference%20Vulnerability.md | MISC:https://vul.wangan.com/a/CNVD-2021-49173 | MISC:https://www.allwinnertech.com/index.php?c=product&a=index&id=92 | MISC:https://www.cnvd.org.cn/flaw/show/CNVD-2021-49173,Assigned (20210816),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-38787,Candidate,"There is an integer overflow in the ION driver ""/dev/ion"" of Allwinner R818 SoC Android Q SDK V1.0 that could use the ioctl cmd ""COMPAT_ION_IOC_SUNXI_FLUSH_RANGE"" to cause a system crash (denial of service).",MISC:https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9AION%20Driver%20Integer%20Overflow.md | MISC:https://vul.wangan.com/a/CNVD-2021-49171 | MISC:https://www.allwinnertech.com/index.php?c=product&a=index&id=92 | MISC:https://www.cnvd.org.cn/flaw/show/CNVD-2021-49171,Assigned (20210816),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-38788,Candi%*te,"The Background service in Allwinner R818 SoC Android Q SDK V1.0 is used to manage background applications. Malicious apps can use the interface provided by the service to set the number of applications allowed to run in the background to 0 and add themselves to the whitelist, so that once other applications enter the background, they will be forcibly stopped by the system, causing a denial of service.",MISC:https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9Abackground%20service%20has%20EoP%20Vulnerability.md | MISC:https://vul.wangan.com/a/CNVD-2021-46928 | MISC:https://www.allwinnertech.com/index.php?c=product&a=index&id=92 | MISC:https://www.cnvd.org.cn/flaw/show/CNVD-2021-46928,Assigned (20210816),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-38789,Candidate,"Allwinner R818 SoC Android Q SDK V1.0 is affected by an incorrect access control vulnerability that does not check the caller's permission, in which a third-party app could change system settings.",MISC:https://github.com/pokerfacett/MY_CVE_CREDIT/blob/master/Allwinner%20R818%20SoC%EF%BC%9Aaw_display%20service%20has%20EoP%20Vulnerability.md | MISC:https://vul.wangan.com/a/CNVD-2021-46927 | MISC:https://www.allwinnertech.com/index.php?c=product&a=index&id=92 | MISC:https://www.cnvd.org.cn/flaw/show/CNVD-2021-46927,Assigned (20210816),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-3879,Can%didat$e*,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe | URL:https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe | MISC:https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c | URL:https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c,Assigned (20211012),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-38790,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-38791,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-38792,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-38793,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 68 |
-
CVE*2021-3879#,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-3795,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-38796,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-38797,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-38798,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-38799,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-3880,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211012),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-38800,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-38801,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-38802,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-38803,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-38804,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-38805,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-38806,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-38807,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-38808,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-38809,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-3881,Ca%ndida?te%,libmobi is vulnerable to Out-of-bounds Read,CONFIRM:https://huntr.dev/bounties/540fd115-7de4-4e19-a918-5ee61f5157c1 | URL:https://huntr.dev/bounties/540fd115-7de4-4e19-a918-5ee61f5157c1 | MISC:https://github.com/bfabiszewski/libmobi/commit/bec783e6212439a335ba6e8df7ab8ed610ca9a21 | URL:https://github.com/bfabiszewski/libmobi/commit/bec783e6212439a335ba6e8df7ab8ed610ca9a21,Assigned (20211012),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-38810,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 87 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-38812,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-38813,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-38814,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 91 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-38816,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-38817,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-38818,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-38819,Candidate,"A SQL injection vulnerability exits on the Simple Image Gallery System 1.0 application through ""id"" parameter on the album page.",MISC:https://github.com/m4sk0ff/CVE-2021-38819/blob/main/CVE-2021-38819.md,Assigned (20210816),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-3882,Candidate,"LedgerSMB does not set the 'Secure' attribute on the session authorization cookie when the client uses HTTPS and the LedgerSMB server is behind a reverse proxy. By tricking a user to use an unencrypted connection (HTTP), an attacker may be able to obtain the authentication data by capturing network traffic. LedgerSMB 1.8 and newer switched from Basic authentication to using cookie authentication with encrypted cookies. Although an attacker can't access the information inside the cookie, nor the password of the user, possession of the cookie is enough to access the application as the user from which the cookie has been obtained. In order for the attacker to obtain the cookie, first of all the server must be configured to respond to unencrypted requests, the attacker must be suitably positioned to eavesdrop on the network traffic between the client and the server *and* the user must be tricked into using unencrypted HTTP traffic. Proper audit control and separation of duties limit Integrity impact of the attack vector. Users of LedgerSMB 1.8 are urged to upgrade to known-fixed versions. Users of LedgerSMB 1.7 or 1.9 are unaffected by this vulnerability and don't need to take action. As a workaround, users may configure their Apache or Nginx reverse proxy to add the Secure attribute at the network boundary instead of relying on LedgerSMB. For Apache, please refer to the 'Header always edit' configuration command in the mod_headers module. For Nginx, please refer to the 'proxy_cookie_flags' configuration command.",CONFIRM:https://huntr.dev/bounties/7061d97a-98a5-495a-8ba0-3a4c66091e9d | URL:https://huntr.dev/bounties/7061d97a-98a5-495a-8ba0-3a4c66091e9d | MISC:https://github.com/ledgersmb/ledgersmb/commit/c242f5a2abf4b99b0da205473cbba034f306bfe2 | URL:https://github.com/ledgersmb/ledgersmb/commit/c242f5a2abf4b99b0da205473cbba034f306bfe2 | MISC:https://ledgersmb.org/cve-2021-3882-sensitive-non-secure-cookie | URL:https://ledgersmb.org/cve-2021-3882-sensitive-non-secure-cookie,Assigned (20211012),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-38820,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-38821,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-38822,Candidate,A Stored Cross Site Scripting vulnerability via Malicious File Upload exists in multiple pages of IceHrm 30.0.0.OS that allows for arbitrary execution of JavaScript commands.,MISC:https://www.navidkagalwalla.com/icehrm-vulnerabilities,Assigned (20210816),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-38823,Candidate,The IceHrm 30.0.0 OS website was found vulnerable to Session Management Issue. A signout from an admin account does not invalidate an admin session that is opened in a different browser.,MISC:https://www.navidkagalwalla.com/icehrm-vulnerabilities,Assigned (20210816),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-38824,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-38825,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-38826,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-38827,Candidate,Xiongmai Camera XM-JPR2-LX V4.02.R12.A6420987.10002.147502.00000 is vulnerable to account takeover.,MISC:https://github.com/ChandlerChin/XiongmaiCamera/blob/main/Account%20takeover%20with%20traffic%20monitoring%20exploitation%20in%20XM-JPR2-LX%20device.pdf,Assigned (20210816),None (candidate not yet proposed),
|
| 105 |
-
CVE-221-38828,Candidate,Xiongmai Camera XM-JPR2-LX V4.02.R12.A6420987.10002.147502.00000 is vulnerable to plain-text traffic sniffing.,MISC:https://github.com/ChandlerChin/XiongmaiCamera/blob/main/Sniffing%20the%20plain-text%20traffic%20in%20Xiongmai%20Camera.pdf,Assigned (20210816),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-38829,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-3883,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211013),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-38830,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-38831,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-38832,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-38833,Candidate,SQL injection vulnerability in PHPGurukul Apartment Visitors Management System (AVMS) v. 1.0 allows attackers to execute arbitrary SQL statements and to gain RCE.,MISC:https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-38833 | MISC:https://phpgurukul.com/apartment-visitors-management-system-using-php-and-mysql/ | MISC:https://streamable.com/ojobew | MISC:https://www.exploit-db.com/exploits/50288,Assigned (20210816),None (candidate not yet proposed),
|
| 112 |
-
,Candidate,easy-mock v1.5.0-v1.6.0 allows remote attackers to bypass the vm2 sandbox and execute arbitrary system commands through special js code.,MISC:https://www.exploit-db.com/exploits/50194,Assigned (20210816),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-38835,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-38836,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-8837,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-38838,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-38839,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-3884,Cndidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211013),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-38840,,SQL Injection can occur in Simple Water Refilling Station Management System 1.0 via the water_refilling/classes/Login.php username parameter.,MISC:https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-38840 | MISC:https://www.exploit-db.com/exploits/50204 | MISC:https://www.exploit-db.com/exploits/50205 | MISC:https://www.sourcecodester.com/php/14906/simple-water-refilling-station-management-system-php-free-source-code.html | MISC:https://www.sourcecodester.com/users/tips23,Assigned (20210816),None (candidate not yet proposed),
|
| 120 |
-
,Candidate,Remote Code Execution can occur in Simple Water Refilling Station Management System 1.0 via the System Logo option on the system_info page in classes/SystemSettings.php with an update_settings action.,MISC:https://www.exploit-db.com/exploits/50205 | MISC:https://www.sourcecodester.com/php/14906/simple-water-refilling-station-management-system-php-free-source-code.html | MISC:https://www.sourcecodester.com/users/tips23,Assigned (20210816),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-38842,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-38843,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 123 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-38845,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1021.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-38846,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-38847,Candidate,S-Cart v6.4.1 and below was discovered to contain an arbitrary file upload vulnerability in the Editor module on the Admin panel. This vulnerability allows attackers to execute arbitrary code via a crafted IMG file.,MISC:https://github.com/bousalman/S-Cart-Arbitrary-File-Upload,Assigned (20210816),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-38848,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-38849,!an?idate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-3885,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211013),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-38850,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-38851,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-38852,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-38853,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-38854,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-38855,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-38856,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-38857,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-38858,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-38859,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-3886,,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211014),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-38860,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-38861,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-38862,,IBM Data Risk Manager (iDNA) 2.0.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 207980.,CONFIRM:https://www.ibm.com/support/pages/node/6497499 | URL:https://www.ibm.com/support/pages/node/6497499 | XF:ibm-idna-cve202138862-info-disc (207980) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/207980,Assigned (20210816),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-38863,Candidate,IBM Security Verify Bridge 1.0.5.0 stores user credentials in plain clear text which can be read by a locally authenticated user. IBM X-Force ID: 208154.,CONFIRM:https://www.ibm.com/support/pages/node/6491653 | URL:https://www.ibm.com/support/pages/node/6491653 | XF:ibm-sv-cve202138863-info-disc (208154) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208154,Assigned (20210816),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-38864,Candidate,IBM Security Verify Bridge 1.0.5.0 could allow a user to obtain sensitive information due to improper certificate validation. IBM X-Force ID: 208155.,CONFIRM:https://www.ibm.com/support/pages/node/6491651 | URL:https://www.ibm.com/support/pages/node/6491651 | XF:ibm-sv-cve202138864-info-disc (208155) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208155,Assigned (20210816),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-3885,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-38866,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-38867,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-38868,Candidate,IBM Engineering Requirements Quality Assistant On-Premises (All versions) is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force Id: 208310.,CONFIRM:https://www.ibm.com/support/pages/node/6604005 | URL:https://www.ibm.com/support/pages/node/6604005 | XF:ibm-engineering-cve202138868-csrf (208310) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208310,Assigned (20210816),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-38869,Candidate,"IBM QRadar SIEM 7.3, 7.4, and 7.5 in some situations may not automatically log users out after they exceede their idle timeout. IBM X-Force ID: 208341.",CONFIRM:https://www.ibm.com/support/pages/node/6574787 | URL:https://www.ibm.com/support/pages/node/6574787 | XF:ibm-qradar-cve202138869-session-fixation (208341) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208341,Assigned (20210816),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-3887,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211015),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-38870,Candidate,IBM Aspera Cloud is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208343.,CONFIRM:https://www.ibm.com/support/pages/node/6491603 | URL:https://www.ibm.com/support/pages/node/6491603 | XF:ibm-aspera-cve202138870-xss (208343) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208343,Assigned (20210816),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-38871,Candidate,"IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208345.",CONFIRM:https://www.ibm.com/support/pages/node/6597503 | URL:https://www.ibm.com/support/pages/node/6597503 | XF:ibm-jazz-cve202138871-xss (208345) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208345,Assigned (20210816),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-38872,Candidate,"IBM DataPower Gateway 10.0.2.0, 10.0.3.0, 10.0.1.0 through 10.0.1.4, and 2018.4.1.0 through 2018.4.1.17 could allow a remote user to cause a denial of service by consuming resources with multiple requests. IBM X-Force ID: 208348.",CONFIRM:https://www.ibm.com/support/pages/node/6586704 | URL:https://www.ibm.com/support/pages/node/6586704 | XF:ibm-datapower-cve202138872-dos (208348) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208348,Assigned (20210816),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-38873,Candidate,"IBM Planning Analytics 2.0 is potentially vulnerable to CSV Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 208396.",CONFIRM:https://www.ibm.com/support/pages/node/6517470 | URL:https://www.ibm.com/support/pages/node/6517470 | XF:ibm-planning-cve202138873-code-exec (208396) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208396,Assigned (20210816),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-38874,Candidate,"IBM QRadar SIEM 7.3, 7.4, and 7.5 allows for users to access information across tenant and domain boundaries in some situations. IBM X-Force ID: 208397.",CONFIRM:https://www.ibm.com/support/pages/node/6574787 | URL:https://www.ibm.com/support/pages/node/6574787 | XF:ibm-qradar-cve202138874-info-disc (208397) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208397,Assigned (20210816),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-38875,Candidate,"IBM MQ 8.0, 9.0 LTS, 9.1 LTS, 9.2 LTS, 9.1 CD, and 9.2 CD is vulnerable to a denial of service attack caused by an error processing messages. IBM X-Force ID: 208398.",CONFIRM:https://www.ibm.com/support/pages/node/6517672 | URL:https://www.ibm.com/support/pages/node/6517672 | XF:ibm-mq-cve202138875-dos (208398) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208398,Assigned (20210816),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-38876,Candidate,"IBM i 7.2, 7.3, and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208404.",CONFIRM:https://www.ibm.com/support/pages/node/6537250 | URL:https://www.ibm.com/support/pages/node/6537250 | XF:ibm-i-cve202138876-xss (208404) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208404,Assigned (20210816),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-38877,,IBM Jazz for Service Management 1.1.3.10 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208405.,CONFIRM:https://www.ibm.com/support/pages/node/6491521 | URL:https://www.ibm.com/support/pages/node/6491521 | XF:ibm-jazz-cve202138877-xss (208405) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208405,Assigned (20210816),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-38878,Candidate,"IBM QRadar 7.3, 7.4, and 7.5 could allow a malicious actor to impersonate an actor due to key exchange without entity authentication. IBM X-Force ID: 208756.",CONFIRM:https://www.ibm.com/support/pages/node/6574787 | URL:https://www.ibm.com/support/pages/node/6574787 | XF:ibm-qradar-cve202138878-sec-bypass (208756) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/208756,Assigned (20210816),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-38879,Candidate,"IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 209057.",CONFIRM:https://www.ibm.com/support/pages/node/6597501 | URL:https://www.ibm.com/support/pages/node/6597501 | XF:ibm-jazz-cve202138879-info-disc (209057) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209057,Assigned (20210816),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-3888,Candidate,libmobi is vulnerable to Use of Out-of-range Pointer Offset,CONFIRM:https://huntr.dev/bounties/722b3acb-792b-4429-a98d-bb80efb8938d | URL:https://huntr.dev/bounties/722b3acb-792b-4429-a98d-bb80efb8938d | MISC:https://github.com/bfabiszewski/libmobi/commit/c78e186739b50d156cb3da5d08d70294f0490853 | URL:https://github.com/bfabiszewski/libmobi/commit/c78e186739b50d156cb3da5d08d70294f0490853,Assigned (20211015),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-38880,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-38881,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-38882,Candidate,IBM Spectrum Scale 5.1.0 through 5.1.1.1 could allow a privileged admin to destroy filesystem audit logging records before expiration time. IBM X-Force ID: 209164.,CONFIRM:https://www.ibm.com/support/pages/node/6516426 | URL:https://www.ibm.com/support/pages/node/6516426 | XF:ibm-specturm-cve202138882-file-manipulation (209164) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209164,Assigned (20210816),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-38883,Candidate,"IBM Business Automation Workflow 18.0, 19.0, 20,0 and 21.0 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209165.",CONFIRM:https://www.ibm.com/support/pages/node/6527270 | URL:https://www.ibm.com/support/pages/node/6527270 | XF:ibm-baw-cve202138883-xss (209165) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209165,Assigned (20210816),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-38884,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-38885,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-38886,Candidate,"IBM Cognos Analytics 11.1.7, 11.2.0, and 11.1.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 209399.",CONFIRM:https://security.netapp.com/advisory/ntap-20220602-0003/ | CONFIRM:https://www.ibm.com/support/pages/node/6570957 | URL:https://www.ibm.com/support/pages/node/6570957 | XF:ibm-cognos-cve202138886-csrf (209399) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209399,Assigned (20210816),None (candidate not yet proposed),
|
| 47 |
-
CVE-202-38887,Candidate,IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information from application response requests that could be used in further attacks against the system. IBM X-Force ID: 209401.,CONFIRM:https://www.ibm.com/support/pages/node/6510178 | URL:https://www.ibm.com/support/pages/node/6510178 | XF:ibm-infosphere-cve202138887-info-disc (209401) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209401,Assigned (20210816),None (candidate not yet proposed),
|
| 48 |
-
CVE-221-38888,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-38889,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-3889,Candidate,libmobi is vulnerable to Use of Out-of-range Pointer Offset,CONFIRM:https://huntr.dev/bounties/efb3e261-3f7d-4a45-8114-e0ace6b21516 | URL:https://huntr.dev/bounties/efb3e261-3f7d-4a45-8114-e0ace6b21516 | MISC:https://github.com/bfabiszewski/libmobi/commit/bec783e6212439a335ba6e8df7ab8ed610ca9a21 | URL:https://github.com/bfabiszewski/libmobi/commit/bec783e6212439a335ba6e8df7ab8ed610ca9a21,Assigned (20211015),None (candidate not yet proposed),
|
| 51 |
-
,Candidate,IBM Sterling Connect:Direct Web Services 1.0 and 6.0 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials. IBM X-Force ID: 209507.,CONFIRM:https://www.ibm.com/support/pages/node/6518586 | URL:https://www.ibm.com/support/pages/node/6518586 | XF:ibm-sterling-cve202138890-info-disc (209507) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209507,Assigned (20210816),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-38891,Candidate,IBM Sterling Connect:Direct Web Services 1.0 and 6.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 209508.,CONFIRM:https://www.ibm.com/support/pages/node/6518582 | URL:https://www.ibm.com/support/pages/node/6518582 | XF:ibm-sterling-cve202138891-info-disc (209508) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209508,Assigned (20210816),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-38892,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,CONFIRM:https://www.ibm.com/support/pages/node/6524704 | URL:https://www.ibm.com/support/pages/node/6524704 | XF:ibm-planning-cve202138892-code-exec (209511) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209511,Assigned (20210816),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-38893,Candidate,"IBM Business Process Manager 8.5 and 8.6 and IBM Business Automation Workflow 18.0, 19.0, 20.0 and 21.0 are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209512.",CONFIRM:https://www.ibm.com/support/pages/node/6526488 | URL:https://www.ibm.com/support/pages/node/6526488 | CONFIRM:https://www.ibm.com/support/pages/node/6527782 | URL:https://www.ibm.com/support/pages/node/6527782 | XF:ibm-baw-cve202138893-xss (209512) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209512,Assigned (20210816),None (candidate not yet proposed),
|
| 55 |
-
,Candidate,"IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 209515.",CONFIRM:https://www.ibm.com/support/pages/node/6538418 | URL:https://www.ibm.com/support/pages/node/6538418 | XF:ibm-sv-cve202138894-info-disc (209515) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209515,Assigned (20210816),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-38895,Candidate,"IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209563.",CONFIRM:https://www.ibm.com/support/pages/node/6538418 | URL:https://www.ibm.com/support/pages/node/6538418 | XF:ibm-sv-cve202138895-xss (209563) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209563,Assigned (20210816),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-38896,Candidate,IBM QRadar Advisor 2.5 through 2.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209566.,CONFIRM:https://www.ibm.com/support/pages/node/6506461 | URL:https://www.ibm.com/support/pages/node/6506461 | XF:ibm-qradar-cve202138896-xss (209566) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209566,Assigned (20210816),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-38897,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-38898,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-38899,Candidate,IBM Cloud Pak for Data 2.5 could allow a local user with special privileges to obtain highly sensitive information. IBM X-Force ID: 209575.,CONFIRM:https://www.ibm.com/support/pages/node/6490435 | URL:https://www.ibm.com/support/pages/node/6490435 | XF:ibm-cp4d-cve202138899-info-disc (209575) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209575,Assigned (20210816),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-3890,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211015),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-38900,Candidate,"IBM Business Process Manager 8.5 and 8.6 and IBM Business Automation Workflow 18.0, 19.0, 20.0 and 21.0 could allow a privileged user to obtain highly sensitive information due to improper access controls. IBM X-Force ID: 209607.",CONFIRM:https://www.ibm.com/support/pages/node/6527776 | URL:https://www.ibm.com/support/pages/node/6527776 | CONFIRM:https://www.ibm.com/support/pages/node/6528296 | URL:https://www.ibm.com/support/pages/node/6528296 | XF:ibm-baw-cve202138900-info-disc (209607) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209607,Assigned (20210816),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-38901,Cand?date,"IBM Spectrum Protect Operations Center 7.1, under special configurations, could allow a local user to obtain highly sensitive information. IBM X-Force ID: 209610.",CONFIRM:https://www.ibm.com/support/pages/node/6524924 | URL:https://www.ibm.com/support/pages/node/6524924 | XF:ibm-spectrum-cve202138901-info-disc (209610) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209610,Assigned (20210816),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-38902,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-38903,Candidate,"IBM Cognos Analytics 11.1.7, 11.2.0, and 11.1.7 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. IBM X-Force ID: 209691.",CONFIRM:https://security.netapp.com/advisory/ntap-20220602-0003/ | CONFIRM:https://www.ibm.com/support/pages/node/6570957 | URL:https://www.ibm.com/support/pages/node/6570957 | XF:ibm-cognos-cve202138903-xss (209691) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209691,Assigned (20210816),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-38904,Candidate,"IBM Cognos Analytics 11.1.7, 11.2.0, and 11.1.7 could allow a remote attacker to obtain credentials from a user's browser via incorrect autocomplete settings. IBM X-Force ID: 209693.",CONFIRM:https://security.netapp.com/advisory/ntap-20220602-0003/ | CONFIRM:https://www.ibm.com/support/pages/node/6570957 | URL:https://www.ibm.com/support/pages/node/6570957 | XF:ibm-cognos-cve202138904-info-disc (209693) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209693,Assigned (20210816),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-38905,Candidate,"IBM Cognos Analytics 11.1.7, 11.2.0, and 11.1.7 could allow an authenticated user to view report pages that they should not have access to. IBM X-Force ID: 209697.",CONFIRM:https://security.netapp.com/advisory/ntap-20220602-0003/ | CONFIRM:https://www.ibm.com/support/pages/node/6570957 | URL:https://www.ibm.com/support/pages/node/6570957 | XF:ibm-cognos-cve202138905-info-disc (209697) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209697,Assigned (20210816),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-38906,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-38907,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-38908,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 71 |
-
CVE@-202!1-389@09,Candidate,IBM Cognos Analytics 11.1.7 and 11.2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209706.,CONFIRM:https://security.netapp.com/advisory/ntap-20211223-0006/ | CONFIRM:https://www.ibm.com/support/pages/node/6520510 | URL:https://www.ibm.com/support/pages/node/6520510 | XF:ibm-cognos-cve202138909-xss (209706) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209706,Assigned (20210816),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-3891,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211015),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-38910,Candidate,"IBM DataPower Gateway V10CD, 10.0.1, and 2108.4.1 could allow a remote attacker to bypass security restrictions, caused by the improper validation of input. By sending a specially crafted JSON message, an attacker could exploit this vulnerability to modify structure and fields. IBM X-Force ID: 209824.",CONFIRM:https://www.ibm.com/support/pages/node/6562347 | URL:https://www.ibm.com/support/pages/node/6562347 | XF:ibm-datapower-cve202138910-sec-bypass (209824) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209824,Assigned (20210816),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-38911,Candidate,IBM Security Risk Manager on CP4S 1.7.0.0 stores user credentials in plain clear text which can be read by a an authenticatedl privileged user. IBM X-Force ID: 209940.,CONFIRM:https://www.ibm.com/support/pages/node/6505281 | URL:https://www.ibm.com/support/pages/node/6505281 | XF:ibm-cprm-cve202138911-info-disc (209940) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209940,Assigned (20210816),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-38912,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 76 |
-
CV|-2021-38913,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-38914,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-38915,Candidate,IBM Data Risk Manager 2.0.6 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 209947.,CONFIRM:https://www.ibm.com/support/pages/node/6497499 | URL:https://www.ibm.com/support/pages/node/6497499 | XF:ibm-cprm-cve202138915-info-disc (209947) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/209947,Assigned (20210816),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-38916,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-38917,Candidate,"IBM PowerVM Hypervisor FW860, FW940, and FW950 could allow an attacker that gains service access to the FSP can read and write arbitrary host system memory through a series of carefully crafted service procedures. IBM X-Force ID: 210018.",CONFIRM:https://www.ibm.com/support/pages/node/6525010 | URL:https://www.ibm.com/support/pages/node/6525010 | XF:ibm-powervm-cve202138917-sec-bypass (210018) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210018,Assigned (20210816),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-38918,Candidate,"IBM PowerVM Hypervisor FW860, FW940, FW950, and FW1010, through a specific sequence of VM management operations could lead to a violation of the isolation between peer VMs. IBM X-Force ID: 210019.",CONFIRM:https://www.ibm.com/support/pages/node/6525032 | URL:https://www.ibm.com/support/pages/node/6525032 | XF:ibm-powervm-cve202138918-info-disc (210019) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210019,Assigned (20210816),None (candidate not yet proposed),
|
| 82 |
-
,Candidate,"IBM QRadar SIEM 7.3, 7.4, and 7.5 in some senarios may reveal authorized service tokens to other QRadar users. IBM X-Force ID: 210021",CONFIRM:https://www.ibm.com/support/pages/node/6574787 | URL:https://www.ibm.com/support/pages/node/6574787 | XF:ibm-qradar-cve202138919-info-disc (210021) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210021,Assigned (20210816),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-3892,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.,,Assigned (20211018),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-38920,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-38921,Candidate,"IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210067.",CONFIRM:https://www.ibm.com/support/pages/node/6538418 | URL:https://www.ibm.com/support/pages/node/6538418 | XF:ibm-sam-cve202138921-info-disc (210067) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210067,Assigned (20210816),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-38922,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-38923,%Candidat|*e,IBM PowerVM Hypervisor FW1010 could allow a privileged user to gain access to another VM due to assigning duplicate WWPNs. IBM X-Force ID: 210162.,CONFIRM:https://www.ibm.com/support/pages/node/6495879 | URL:https://www.ibm.com/support/pages/node/6495879 | XF:ibm-powervm-cve202138923-sec-bypass (210162) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210162,Assigned (20210816),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-38924,Candidate,IBM Maximo Asset Management 7.6.1.1 and 7.6.1.2 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 210163.,CONFIRM:https://www.ibm.com/support/pages/node/6620059 | URL:https://www.ibm.com/support/pages/node/6620059 | XF:ibm-maximo-cve202138924-info-disc (210163) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210163,Assigned (20210816),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-38925,,IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210171.,CONFIRM:https://www.ibm.com/support/pages/node/6495905 | URL:https://www.ibm.com/support/pages/node/6495905 | XF:ibm-sterling-cve202138925-info-disc (210171) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210171,Assigned (20210816),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-38926,Candidate,"IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local user to gain privileges due to allowing modification of columns of existing tasks. IBM X-Force ID: 210321.",CONFIRM:https://security.netapp.com/advisory/ntap-20220114-0002/ | CONFIRM:https://www.ibm.com/support/pages/node/6523808 | URL:https://www.ibm.com/support/pages/node/6523808 | XF:ibm-db2-cve202138926-priv-escalation (210321) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210321,Assigned (20210816),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-38927,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-38928,Candidate,IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains. IBM X-Force ID: 210323.,MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/210323 | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210323 | MISC:https://www.ibm.com/support/pages/node/6852467 | URL:https://www.ibm.com/support/pages/node/6852467,Assigned (20210816),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-38929,Candidate,"IBM System Storage DS8000 Management Console (HMC) R8.5 88.5x.x.x, R9.1 89.1x.0.0, and R9.2 89.2x.0.0 could allow a remote attacker to obtain sensitive information through unpublished URLs. IBM X-Force ID: 210330.",CONFIRM:https://www.ibm.com/support/pages/node/6570741 | URL:https://www.ibm.com/support/pages/node/6570741 | XF:ibm-ss-cve202138929-info-disc (210330) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210330,Assigned (20210816),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-3893,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211018),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-38930,Candidate,"IBM System Storage DS8000 Management Console (HMC) R8.5 88.5x.x.x, R9.1 89.1x.0.0, and R9.2 89.2x.0.0 could allow a remote attacker to obtain sensitive information through unpublished URLs. IBM X-Force ID: 210331.",CONFIRM:https://www.ibm.com/support/pages/node/6570741 | URL:https://www.ibm.com/support/pages/node/6570741 | XF:ibm-ss-cve202138930-info-disc (210331) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210331,Assigned (20210816),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-38931,Candidate,"IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1, and 11.5 is vulnerable to an information disclosure as a result of a connected user having indirect read access to a table where they are not authorized to select from. IBM X-Force ID: 210418.",CONFIRM:https://security.netapp.com/advisory/ntap-20220114-0001/ | CONFIRM:https://www.ibm.com/support/pages/node/6523810 | URL:https://www.ibm.com/support/pages/node/6523810 | XF:ibm-db2-cve202138931-info-disc (210418) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210418,Assigned (20210816),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-38932,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-38933,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-38934,Candidate,"IBM Engineering Test Management 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 210671.",CONFIRM:https://www.ibm.com/support/pages/node/6615619 | URL:https://www.ibm.com/support/pages/node/6615619 | XF:ibm-engineering-cve202138934-xss (210671) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210671,Assigned (20210816),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-38935,Candidate,"IBM Maximo Asset Management 7.6.1.2 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 210892.",CONFIRM:https://www.ibm.com/support/pages/node/6557318 | URL:https://www.ibm.com/support/pages/node/6557318 | XF:ibm-maximo-cve202138935-info-disc (210892) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210892,Assigned (20210816),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-38936,Candidate,"IBM QRadar SIEM 7.3, 7.4, and 7.5 could disclose highly sensitive information to a privileged user. IBM X-Force ID: 210893.",CONFIRM:https://www.ibm.com/support/pages/node/6605429 | URL:https://www.ibm.com/support/pages/node/6605429 | XF:ibm-qradar-cve202138936-info-disc (210893) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210893,Assigned (20210816),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-38937,Candidate,"IBM PowerVM Hypervisor FW940, FW950, and FW1010 could allow an authenticated user to cause the system to crash using a specially crafted IBMi Hypervisor call. IBM X-Force ID: 210894.",CONFIRM:https://www.ibm.com/support/pages/node/6525014 | URL:https://www.ibm.com/support/pages/node/6525014 | XF:ibm-powervm-cve202138937-dos (210894) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/210894,Assigned (20210816),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-38938,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-38939,Candidate,"IBM QRadar SIEM 7.3, 7.4, and 7.5 stores potentially sensitive information in log files that could be read by an user with access to creating domains. IBM X-Force ID: 211037.",CONFIRM:https://www.ibm.com/support/pages/node/6574787 | URL:https://www.ibm.com/support/pages/node/6574787 | XF:ibm-qradar-cve202138939-info-disc (211037) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211037,Assigned (20210816),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-3894,andidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,MISC:https://www.cve.org/CVERecord?id=CVE-2021-3894,Assigned (20211020),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-38940,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-38941,Candidate,IBM CloudPak for Multicloud Monitoring 2.0 and 2.3 has a few containers running in privileged mode which is vulnerable to host information leakage or destruction if unauthorized access to these containers could execute arbitrary commands. IBM X-Force ID: 211048.,CONFIRM:https://www.ibm.com/support/pages/node/6599639 | URL:https://www.ibm.com/support/pages/node/6599639 | XF:ibm-cpmm-cve202138941-priv-escalation (211048) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211048,Assigned (20210816),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-38942,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-38943,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-38944,Candidate,"IBM DataPower Gateway 10.0.2.0 through 1.0.3.0, 10.0.1.0 through 10.0.1.5, and 2018.4.1.0 through 2018.4.1.18 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 211236.",CONFIRM:https://www.ibm.com/support/pages/node/6587070 | URL:https://www.ibm.com/support/pages/node/6587070 | XF:ibm-datapower-cve202138944-header-injection (211236) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211236,Assigned (20210816),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-38945,Candidate,"IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 could allow a remote attacker to upload arbitrary files, caused by improper content validation. IBM X-Force ID: 211238.",CONFIRM:https://security.netapp.com/advisory/ntap-20220729-0002/ | CONFIRM:https://www.ibm.com/support/pages/node/6597241 | URL:https://www.ibm.com/support/pages/node/6597241 | XF:ibm-cognos-cve202138945-file-upload (211238) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211238,Assigned (20210816),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-38946,Candidate,"IBM Cognos Analytics 11.1.7, 11.2.0, and 11.1.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 211240.",CONFIRM:https://security.netapp.com/advisory/ntap-20220602-0003/ | CONFIRM:https://www.ibm.com/support/pages/node/6570957 | URL:https://www.ibm.com/support/pages/node/6570957 | XF:ibm-cognos-cve202138946-xss (211240) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211240,Assigned (20210816),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-38947,Cand%dat?,IBM Spectrum Copy Data Management 2.2.13 and earlier uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 211242.,CONFIRM:https://www.ibm.com/support/pages/node/6525554 | URL:https://www.ibm.com/support/pages/node/6525554 | XF:ibm-spectrum-cve202138947-info-disc (211242) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211242,Assigned (20210816),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-38948,Candidate,IBM InfoSphere Information Server 11.7 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 211402.,CONFIRM:https://www.ibm.com/support/pages/node/6509632 | URL:https://www.ibm.com/support/pages/node/6509632 | XF:ibm-infosphere-cve202138948-xxe (211402) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211402,Assigned (20210816),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-38949,Candiate,"IBM MQ 7.5, 8.0, 9.0 LTS, 9.1 CD, and 9.1 LTS stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 211403.",CONFIRM:https://www.ibm.com/support/pages/node/6516424 | URL:https://www.ibm.com/support/pages/node/6516424 | XF:ibm-mq-cve202138949-info-disc (211403) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211403,Assigned (20210816),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-3895,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211020),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-38950,Candidate,IBM MQ on HPE NonStop 8.0.4 and 8.1.0 is vulnerable to a privilege escalation attack when SharedBindingsUserId is set to effective. IBM X-ForceID: 211404.,CONFIRM:https://www.ibm.com/support/pages/node/6525810 | URL:https://www.ibm.com/support/pages/node/6525810 | XF:ibm-mq-cve202138950-priv-escalation (211404) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211404,Assigned (20210816),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-38951,Candidate,"IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to a denial of service, caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume all available CPU resources. IBM X-Force ID: 211405.",CONFIRM:https://www.ibm.com/support/pages/node/6524674 | URL:https://www.ibm.com/support/pages/node/6524674 | XF:ibm-websphere-cve202138951-dos (211405) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211405,Assigned (20210816),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-38952,Candidate,IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 211408.,CONFIRM:https://www.ibm.com/support/pages/node/6575551 | URL:https://www.ibm.com/support/pages/node/6575551 | XF:ibm-infosphere-cve202138952-xss (211408) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211408,Assigned (20210816),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-38953,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-38954,Candidate,IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could disclose sensitive version information that could aid in future attacks against the system. IBM X-Force ID: 211414.,CONFIRM:https://www.ibm.com/support/pages/node/6599607 | URL:https://www.ibm.com/support/pages/node/6599607 | XF:ibm-sterling-cve202138954-info-disc (211414) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211414,Assigned (20210816),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-38955,Candidate,"IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a local user with elevated privileges to cause a denial of service due to a file creation vulnerability in the audit commands. IBM X-Force ID: 211825.",CONFIRM:https://www.ibm.com/support/pages/node/6560236 | URL:https://www.ibm.com/support/pages/node/6560236 | XF:ibm-aix-cve202138955-dos (211825) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/211825,Assigned (20210816),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-38956,Candidate,"IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could disclose sensitive version information in HTTP response headers that could aid in further attacks against the system. IBM X-Force ID: 212038",CONFIRM:https://www.ibm.com/support/pages/node/6538418 | URL:https://www.ibm.com/support/pages/node/6538418 | XF:ibm-sv-cve202138956-info-disc (212038) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212038,Assigned (20210816),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-38957,Candidate,"IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could disclose sensitive information due to hazardous input validation during QR code generation. IBM X-Force ID: 212040.",CONFIRM:https://www.ibm.com/support/pages/node/6538418 | URL:https://www.ibm.com/support/pages/node/6538418 | XF:ibm-sv-cve202138957-info-disc (212040) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212040,Assigned (20210816),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1022.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-38958,Candidate,IBM MQ Appliance 9.2 CD and 9.2 LTS is affected by a denial of service attack caused by a concurrency issue. IBM X-Force ID: 212042,CONFIRM:https://www.ibm.com/support/pages/node/6519420 | URL:https://www.ibm.com/support/pages/node/6519420 | XF:ibm-mq-cve202138958-dos (212043) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212043,Assigned (20210816),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-38959,,"IBM SPSS Statistics for Windows 24.0, 25.0, 26.0, 27.0, 27.0.1, and 28.0 could allow a local user to cause a denial of service by writing arbitrary files to admin protected directories on the system. IBM X-Force ID: 212046.",CONFIRM:https://www.ibm.com/support/pages/node/6516680 | URL:https://www.ibm.com/support/pages/node/6516680 | XF:ibm-spss-cve202138959-dos (212046) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212046,Assigned (20210816),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-3896,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.,,Assigned (20211022),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-38960,Candidate,"IBM OPENBMC OP920, OP930, and OP940 could allow an unauthenticated user to obtain sensitive information. IBM X-Force ID: 212047.",CONFIRM:https://www.ibm.com/support/pages/node/6529322 | URL:https://www.ibm.com/support/pages/node/6529322 | XF:ibm-openbmc-cve202138960-info-disc (212047) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212047,Assigned (20210816),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-38961,Candidate,IBM OPENBMC OP910 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212049.,CONFIRM:https://www.ibm.com/support/pages/node/6536720 | URL:https://www.ibm.com/support/pages/node/6536720 | XF:ibm-openbmc-cve202138961-xss (212049) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212049,Assigned (20210816),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-38962,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 8 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-38964,C*ndi?ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-38965,Candidate,"IBM FileNet Content Manager 5.5.4, 5.5.6, and 5.5.7 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 212346.",CONFIRM:https://www.ibm.com/support/pages/node/6509840 | URL:https://www.ibm.com/support/pages/node/6509840 | XF:ibm-filenet-cve202138965-command-exec (212346) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212346,Assigned (20210816),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-38966,Candidate,IBM Cloud Pak for Automation 21.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212357.,CONFIRM:https://www.ibm.com/support/pages/node/6526488 | URL:https://www.ibm.com/support/pages/node/6526488 | XF:ibm-baw-cve202138966-xss (212357) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212357,Assigned (20210816),None (candidate not yet proposed),
|
| 12 |
-
@CVE?*-2021-3896$7,Candidate,IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local privileged user to inject and execute malicious code. IBM X-Force ID: 212441.,CONFIRM:https://www.ibm.com/support/pages/node/6512826 | URL:https://www.ibm.com/support/pages/node/6512826 | XF:ibm-mq-cve202138967-code-exec (212441) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212441,Assigned (20210816),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-38968,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 14 |
-
#CVE-$202#1-38*969,Candidate,"IBM Spectrum Virtualize 8.2, 8.3, and 8.4 could allow an attacker to allow unauthorized access due to the reuse of support generated credentials. IBM X-Force ID: 212609.",CONFIRM:https://www.ibm.com/support/pages/node/6584337 | URL:https://www.ibm.com/support/pages/node/6584337 | XF:ibm-spectrum-cve202138969-auth (212609) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212609,Assigned (20210816),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-3897,Candidate,An authentication bypass vulnerability was discovered in an internal service of the Lenovo Fan Power Controller2 (FPC2) and Lenovo System Management Module (SMM) firmware during an that could allow an unauthenticated attacker to execute commands on the SMM and FPC2. SMM2 is not affected.,MISC:https://support.lenovo.com/us/en/product_security/LEN-72615 | URL:https://support.lenovo.com/us/en/product_security/LEN-72615,Assigned (20211022),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-38970,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-38971,Candidate,"IBM Data Virtualization on Cloud Pak for Data 1.3.0, 1.4.1, 1.5.0, 1.7.1 and 1.7.3 could allow an authorized user to bypass data masking rules and obtain sensitve information. IBM X-Force ID: 212620.",CONFIRM:https://www.ibm.com/support/pages/node/6551076 | URL:https://www.ibm.com/support/pages/node/6551076 | XF:ibm-cp-cve202138971-info-disc (212620) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212620,Assigned (20210816),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-38972,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.",CONFIRM:https://www.ibm.com/support/pages/node/6515530 | URL:https://www.ibm.com/support/pages/node/6515530 | XF:ibm-tivoli-cve202138972-input-validation (212775) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212775,Assigned (20210816),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-38973,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.",CONFIRM:https://www.ibm.com/support/pages/node/6515528 | URL:https://www.ibm.com/support/pages/node/6515528 | XF:ibm-tivoli-cve202138973-input-validation (212778) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212778,Assigned (20210816),None (candidate not yet proposed),
|
| 20 |
-
,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to cause a denial of service using specially crafted HTTP requests. IBM X-Force ID: 212779.",CONFIRM:https://www.ibm.com/support/pages/node/6516046 | URL:https://www.ibm.com/support/pages/node/6516046 | XF:ibm-tivoli-cve202138974-dos (212779) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212779,Assigned (20210816),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-38975,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow an authenticated user to to obtain sensitive information from a specially crafted HTTP request. IBM X-Force ID: 212780.",CONFIRM:https://www.ibm.com/support/pages/node/6516044 | URL:https://www.ibm.com/support/pages/node/6516044 | XF:ibm-tivoli-cve202138975-info-disc (212780) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212780,Assigned (20210816),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-38976,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 stores user credentials in plain clear text which can be read by a local user. X-Force ID: 212781.",CONFIRM:https://www.ibm.com/support/pages/node/6516038 | URL:https://www.ibm.com/support/pages/node/6516038 | XF:ibm-tivoli-cve202138976-info-disc (212781) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212781,Assigned (20210816),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-%$977,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 212782.",CONFIRM:https://www.ibm.com/support/pages/node/6516052 | URL:https://www.ibm.com/support/pages/node/6516052 | XF:ibm-tivoli-cve202138977-info-disc (212782) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212782,Assigned (20210816),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-38978,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 212783.",CONFIRM:https://www.ibm.com/support/pages/node/6516050 | URL:https://www.ibm.com/support/pages/node/6516050 | XF:ibm-tivoli-cve202138978-info-disc (212783) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212783,Assigned (20210816),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-38979,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but the software does not also use a salt as part of the input. IBM X-Force ID: 212785.",CONFIRM:https://www.ibm.com/support/pages/node/6516034 | URL:https://www.ibm.com/support/pages/node/6516034 | XF:ibm-tivoli-cve202138979-info-disc (212785) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212785,Assigned (20210816),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-3898,Candidate,Versions of Motorola Ready For and Motorola Device Help Android applications prior to 2021-04-08 do not properly verify the server certificate which could lead to the communication channel being accessible by an attacker.,MISC:https://support.lenovo.com/us/en/product_security/LEN-58311 | URL:https://support.lenovo.com/us/en/product_security/LEN-58311,Assigned (20211022),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-38980,Candidate,"IBM Tivoli Key Lifecycle Manager (IBM Security Guardium Key Lifecycle Manager) 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212786.",CONFIRM:https://www.ibm.com/support/pages/node/6518326 | URL:https://www.ibm.com/support/pages/node/6518326 | XF:ibm-tivoli-cve202138980-info-disc (212786) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212786,Assigned (20210816),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-38981,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 212788.",CONFIRM:https://www.ibm.com/support/pages/node/6516048 | URL:https://www.ibm.com/support/pages/node/6516048 | XF:ibm-tivoli-cve202138981-info-disc (212788) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212788,Assigned (20210816),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-38982,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212791.",CONFIRM:https://www.ibm.com/support/pages/node/6516042 | URL:https://www.ibm.com/support/pages/node/6516042 | XF:ibm-tivoli-cve202138982-xss (212791) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212791,Assigned (20210816),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-38983,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212792.",CONFIRM:https://www.ibm.com/support/pages/node/6516036 | URL:https://www.ibm.com/support/pages/node/6516036 | XF:ibm-tivoli-cve202138983-info-disc (212792) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212792,Assigned (20210816),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-38984,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 212793.",CONFIRM:https://www.ibm.com/support/pages/node/6516032 | URL:https://www.ibm.com/support/pages/node/6516032 | XF:ibm-tivoli-cve202138984-info-disc (212793) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212793,Assigned (20210816),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-38985,Candidate,"IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, 4.0, and 4.1 receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.",CONFIRM:https://www.ibm.com/support/pages/node/6515526 | URL:https://www.ibm.com/support/pages/node/6515526 | XF:ibm-tivoli-cve202138985-input-validation (212799) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212799,Assigned (20210816),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-38986,Candidate,IBM MQ Appliance 9.2 CD and 9.2 LTS does not invalidate session after logout which could allow an authenticated user to impersonate another user on the system. IBM X-Force ID: 212942.,CONFIRM:https://www.ibm.com/support/pages/node/6560032 | URL:https://www.ibm.com/support/pages/node/6560032 | XF:ibm-mq-cve202138986-session-fixation (212942) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212942,Assigned (20210816),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-38987,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-38988,Candidate,"IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212950.",CONFIRM:https://www.ibm.com/support/pages/node/6561281 | URL:https://www.ibm.com/support/pages/node/6561281 | XF:ibm-aix-cve202138988-dos (212950) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212950,Assigned (20210816),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-38989,Candidate,"IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 212951.",CONFIRM:https://www.ibm.com/support/pages/node/6561277 | URL:https://www.ibm.com/support/pages/node/6561277 | XF:ibm-aix-cve202138989-dos (212951) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212951,Assigned (20210816),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-3899,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211023),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-38990,Candidate,"IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the mount command which could lead to code execution. IBM X-Force ID: 212952.",CONFIRM:https://www.ibm.com/support/pages/node/6515496 | URL:https://www.ibm.com/support/pages/node/6515496 | CONFIRM:https://www.ibm.com/support/pages/node/6538700 | URL:https://www.ibm.com/support/pages/node/6538700 | XF:ibm-aix-cve202138990-code-exec (212952) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212952,Assigned (20210816),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-38991,Candidate,"IBM AIX 7.0, 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the lscore command which could lead to code execution. IBM X-Force ID: 212953.",CONFIRM:https://www.ibm.com/support/pages/node/6538952 | URL:https://www.ibm.com/support/pages/node/6538952 | XF:ibm-aix-cve202138991-code-exec (212953) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212953,Assigned (20210816),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-38992,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-38993,Candidate,"IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the smbcd daemon to cause a denial of service. IBM X-Force ID: 212962.",CONFIRM:https://www.ibm.com/support/pages/node/6559320 | URL:https://www.ibm.com/support/pages/node/6559320 | XF:ibm-aix-cve202138993-dos (212962) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/212962,Assigned (20210816),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-38994,Candidate,"IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 213072.",CONFIRM:https://www.ibm.com/support/pages/node/6558948 | URL:https://www.ibm.com/support/pages/node/6558948 | XF:ibm-aix-cve202138994-dos (213072) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213072,Assigned (20210816),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-38995,Candidate,"IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 213073.",CONFIRM:https://www.ibm.com/support/pages/node/6558948 | URL:https://www.ibm.com/support/pages/node/6558948 | XF:ibm-aix-cve202138995-dos (213073) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213073,Assigned (20210816),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-38996,Candidate,"IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 213076.",CONFIRM:https://www.ibm.com/support/pages/node/6560390 | URL:https://www.ibm.com/support/pages/node/6560390 | XF:ibm-aix-cve202138997-dos (213076) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213076,Assigned (20210816),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-38997,,"IBM API Connect V10.0.0.0 through V10.0.5.0, V10.0.1.0 through V10.0.1.7, and V2018.4.1.0 through 2018.4.1.19 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 213212.",MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/213212 | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213212 | MISC:https://www.ibm.com/support/pages/node/6842621 | URL:https://www.ibm.com/support/pages/node/6842621,Assigned (20210816),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-38998,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-38999,Candidate,IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace.,CONFIRM:https://www.ibm.com/support/pages/node/6519418 | URL:https://www.ibm.com/support/pages/node/6519418 | XF:ibm-mq-cve202138999-info-disc (213214) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213214,Assigned (20210816),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-3900,Candidate,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76 | URL:https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76 | MISC:https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635 | URL:https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635,Assigned (20211023),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-39000,Candidate,IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local attacker to obtain sensitive information by inclusion of sensitive data within diagnostics. IBM X-Force ID: 213215.,CONFIRM:https://www.ibm.com/support/pages/node/6519422 | URL:https://www.ibm.com/support/pages/node/6519422 | XF:ibm-mq-cve202139000-info-disc (213215) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213215,Assigned (20210816),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-39001,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-39002,Candidate,"IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.",CONFIRM:https://security.netapp.com/advisory/ntap-20220114-0002/ | CONFIRM:https://www.ibm.com/support/pages/node/6523802 | URL:https://www.ibm.com/support/pages/node/6523802 | XF:ibm-db2-cve202139002-info-disc (213217) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213217,Assigned (20210816),None (candidate not yet proposed),
|
| 52 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-39004,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-39005,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-39006,Cand|date,IBM QRadar WinCollect Agent 10.0 and 10.0.1 could allow an attacker to obtain sensitive information due to missing best practices. IBM X-Force ID: 213549.,CONFIRM:https://www.ibm.com/support/pages/node/6596947 | URL:https://www.ibm.com/support/pages/node/6596947 | XF:ibm-qradar-cve202139006-info-disc (213549) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213549,Assigned (20210816),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-39007,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-39008,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-39009,Candidate,"IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 213554.",CONFIRM:https://security.netapp.com/advisory/ntap-20221014-0005/ | CONFIRM:https://www.ibm.com/support/pages/node/6615285 | URL:https://www.ibm.com/support/pages/node/6615285 | XF:ibm-cognos-cve202139009-info-disc (213554) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213554,Assigned (20210816),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-3901,Candidate,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464 | URL:https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464 | MISC:https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2 | URL:https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2,Assigned (20211024),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-39010,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-39011,Candidate,IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.6.0 stores potentially sensitive information in log files that could be read by a privileged user. IBM X-Force ID: 213645.,MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/213645 | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213645 | MISC:https://www.ibm.com/support/pages/node/6856403 | URL:https://www.ibm.com/support/pages/node/6856403,Assigned (20210816),None (candidate not yet proposed),
|
| 62 |
-
CVE-202139012,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-39013,Candidate,"IBM Cloud Pak for Security (CP4S) 1.7.2.0, 1.7.1.0, and 1.7.0.0 could allow an authenticated user to obtain sensitive information in HTTP responses that could be used in further attacks against the system. IBM X-Force ID: 213651.",CONFIRM:https://www.ibm.com/support/pages/node/6529200 | URL:https://www.ibm.com/support/pages/node/6529200 | XF:ibm-cp4s-cve202139013-info-disc (213651) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213651,Assigned (20210816),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-39014,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-39015,Candidate,"IBM Engineering Lifecycle Optimization - Publishing 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213655.",CONFIRM:https://www.ibm.com/support/pages/node/6603333 | URL:https://www.ibm.com/support/pages/node/6603333 | XF:ibm-engineering-cve202139015-xss (213655) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213655,Assigned (20210816),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-39016,Candidate,"IBM Engineering Lifecycle Optimization - Publishing 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 does not sufficiently monitor or control transmitted network traffic volume, so that an actor can cause the software to transmit more traffic than should be allowed for that actor. IBM X-Force ID: 213722.",CONFIRM:https://www.ibm.com/support/pages/node/6603335 | URL:https://www.ibm.com/support/pages/node/6603335 | XF:ibm-engineering-cve202139016-sec-bypass (213722) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213722,Assigned (20210816),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-39017,Candidate,"IBM Engineering Lifecycle Optimization - Publishing 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could allow a remote attacker to upload arbitrary files, caused by improper access controls. IBM X-Force ID: 213725.",CONFIRM:https://www.ibm.com/support/pages/node/6603341 | URL:https://www.ibm.com/support/pages/node/6603341 | XF:ibm-engineering-cve202139017-file-upload (213725) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213725,Assigned (20210816),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-39018,Candidate,"IBM Engineering Lifecycle Optimization - Publishing 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could disclose sensitive information in a SQL error message that could aid in further attacks against the system. IBM X-Force ID: 213726.",CONFIRM:https://www.ibm.com/support/pages/node/6603345 | URL:https://www.ibm.com/support/pages/node/6603345 | XF:ibm-engineering-cve202139018-info-disc (213726) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213726,Assigned (20210816),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-39019,Candidate,"IBM Engineering Lifecycle Optimization - Publishing 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 could disclose highly sensitive information through an HTTP GET request to an authenticated user. IBM X-Force ID: 213728.",CONFIRM:https://www.ibm.com/support/pages/node/6603355 | URL:https://www.ibm.com/support/pages/node/6603355 | XF:ibm-engineering-cve202139019-info-disc (213728) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213728,Assigned (20210816),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-3902,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211024),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-39020,Candidate,"IBM Guardium Data Encryption (GDE) 4.0.0.7 and lower stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 213855.",CONFIRM:https://www.ibm.com/support/pages/node/6579773 | URL:https://www.ibm.com/support/pages/node/6579773 | XF:ibm-guardium-cve202139020-info-disc (213855) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213855,Assigned (20210816),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-39021,Candidate,"IBM Guardium Data Encryption (GDE) 5.0.0.2 behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which could facilitate username enumeration. IBM X-Force ID: 213856.",CONFIRM:https://www.ibm.com/support/pages/node/6552552 | URL:https://www.ibm.com/support/pages/node/6552552 | XF:ibm-guardium-cve202139021-info-disc (213856) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213856,Assigned (20210816),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-39022,Candidate,"IBM Guardium Data Encryption (GDE) 4.0.0.0 and 5.0.0.0 saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by spreadsheet software. IBM X-Force ID: 213858.",CONFIRM:https://www.ibm.com/support/pages/node/6562379 | URL:https://www.ibm.com/support/pages/node/6562379 | XF:ibm-guardium-cve202139022-csv-injection (213858) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213858,Assigned (20210816),None (candidate not yet proposed),
|
| 74 |
-
CVE-202@-39023,Candidate,IBM Guardium Data Encryption (GDE) 4.0.0 and 5.0.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 213860.,CONFIRM:https://www.ibm.com/support/pages/node/6582473 | URL:https://www.ibm.com/support/pages/node/6582473 | XF:ibm-guardium-cve202139023-info-disc (213860) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213860,Assigned (20210816),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-39024,Candidate,IBM Guardium Data Encryption (GDE) 4.0.0.0 and 5.0.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213862.,CONFIRM:https://www.ibm.com/support/pages/node/6584143 | URL:https://www.ibm.com/support/pages/node/6584143 | XF:ibm-guardium-cve202139024-xss (213862) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213862,Assigned (20210816),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-39025,Candidate,IBM Guardium Data Encryption (GDE) 4.0.0.0 and 5.0.0.0 could disclose internal IP address information when the web backend is down. IBM X-Force 213863.,CONFIRM:https://www.ibm.com/support/pages/node/6562169 | URL:https://www.ibm.com/support/pages/node/6562169 | XF:ibm-guardium-cve202139025-info-disc (213863) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213863,Assigned (20210816),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-39026,Candidate,"IBM Guardium Data Encryption (GDE) 5.0.0.2 and 5.0.0.3 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 213964.",CONFIRM:https://www.ibm.com/support/pages/node/6557184 | URL:https://www.ibm.com/support/pages/node/6557184 | XF:ibm-guardium-cve202139026-info-disc (213864) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213864,Assigned (20210816),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-39027,Candidate,"IBM Guardium Data Encryption (GDE) 4.0.0 and 5.0.0 prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. IBM X-Force ID: 213865.",CONFIRM:https://www.ibm.com/support/pages/node/6582499 | URL:https://www.ibm.com/support/pages/node/6582499 | XF:ibm-guardium-cve202139027-sec-bypass (213865) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213865,Assigned (20210816),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-39028,Candidate,"IBM Engineering Lifecycle Optimization - Publishing 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 213866.",CONFIRM:https://www.ibm.com/support/pages/node/6603347 | URL:https://www.ibm.com/support/pages/node/6603347 | XF:ibm-engineering-cve202139028-header-injection (213866) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213866,Assigned (20210816),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-39029,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-3903,Candidate,vim is vulnerable to Heap-based Buffer Overflow,CONFIRM:https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 | URL:https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 | FEDORA:FEDORA-2021-a5e55a9e02 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ | FEDORA:FEDORA-2021-af135cabe2 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ | FEDORA:FEDORA-2021-b0ac29efb1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | MISC:https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 | URL:https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 | MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1,Assigned (20211025),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-39030,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-39031,Candidate,"IBM WebSphere Application Server - Liberty 17.0.0.3 through 22.0.0.1 could allow a remote authenticated attacker to conduct an LDAP injection. By using a specially crafted request, an attacker could exploit this vulnerability and could result in in granting permission to unauthorized resources. IBM X-Force ID: 213875.",CONFIRM:https://www.ibm.com/support/pages/node/6550488 | URL:https://www.ibm.com/support/pages/node/6550488 | XF:ibm-websphere-cve202139031-ldap-injection (213875) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213875,Assigned (20210816),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-39032,Candidate,IBM Sterling Gentran:Server for Microsoft Windows 5.3 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 213962.,CONFIRM:https://www.ibm.com/support/pages/node/6540668 | URL:https://www.ibm.com/support/pages/node/6540668 | XF:ibm-sterling-cve202139032-info-disc (213962) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213962,Assigned (20210816),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-39033,Ca%nd@idate|*,IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5 and 6.1.0.0 through 6.1.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 213963.,CONFIRM:https://www.ibm.com/support/pages/node/6573049 | URL:https://www.ibm.com/support/pages/node/6573049 | XF:ibm-sterling-cve202139033-info-disc (213963) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213963,Assigned (20210816),None (candidate not yet proposed),
|
| 86 |
-
,Candidate,IBM MQ 9.1 LTS is vulnerable to a denial of service attack caused by an issue within the channel process. IBM X-Force ID: 213964.,CONFIRM:https://www.ibm.com/support/pages/node/6556466 | URL:https://www.ibm.com/support/pages/node/6556466 | XF:ibm-mq-cve202139034-dos (213964) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213964,Assigned (20210816),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-39035,Candidate,"IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.5, 6.1.0.0 through 6.1.0.4, and 6.1.1.0 through 6.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 213965.",CONFIRM:https://www.ibm.com/support/pages/node/6612499 | URL:https://www.ibm.com/support/pages/node/6612499 | XF:ibm-sterling-cve202139035-xss (213965) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213965,Assigned (20210816),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-39036,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-39037,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-39038,Candidate,"IBM WebSphere Application Server 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 22.0.0.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 213968.",CONFIRM:https://www.ibm.com/support/pages/node/6559044 | URL:https://www.ibm.com/support/pages/node/6559044 | XF:ibm-websphere-cve202139038-clickjacking (213968) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/213968,Assigned (20210816),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-39039,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-3904,Candidate,grav is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d | URL:https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d | MISC:https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d | URL:https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d,Assigned (20211025),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-39040,Candidate,IBM Planning Analytics Workspace 2.0 could be vulnerable to malicious file upload by not validating the file types or sizes. Attackers can make use of this weakness and upload malicious executable files into the system and it can be sent to victim for performing further attacks. IBM X-Force ID: 214025.,CONFIRM:https://www.ibm.com/support/pages/node/6574003 | URL:https://www.ibm.com/support/pages/node/6574003 | XF:ibm-planning-cve202139040-file-upload (214025) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214025,Assigned (20210816),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-39041,Candidate,"IBM QRadar SIEM 7.3, 7.4, and 7.5 may be vulnerable to partial denial of service attack, resulting in some protocols not listening to specified ports. IBM X-Force ID: 214028.",CONFIRM:https://www.ibm.com/support/pages/node/6602749 | URL:https://www.ibm.com/support/pages/node/6602749 | XF:ibm-qradar-cve202139041-dos (214028) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214028,Assigned (20210816),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-39042,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-39043,Candidate,"IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 214032.",CONFIRM:https://www.ibm.com/support/pages/node/6587797 | URL:https://www.ibm.com/support/pages/node/6587797 | XF:ibm-jazz-cve202139043-xss (214032) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214032,Assigned (20210816),None (candidate not yet proposed),
|
| 97 |
-
,Candidate,IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 214210.,CONFIRM:https://www.ibm.com/support/pages/node/6527892 | URL:https://www.ibm.com/support/pages/node/6527892 | XF:ibm-ftm-cve202139044-csrf (214210) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214210,Assigned (20210816),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-39045,,"IBM Cognos Analytics 11.1.7, 11.2.0, and 11.2.1 could allow a local attacker to obtain information due to the autocomplete feature on password input fields. IBM X-Force ID: 214345.",CONFIRM:https://security.netapp.com/advisory/ntap-20221014-0005/ | CONFIRM:https://www.ibm.com/support/pages/node/6615285 | URL:https://www.ibm.com/support/pages/node/6615285 | XF:ibm-cognos-cve202139045-info-disc (214345) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214345,Assigned (20210816),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-39046,Candidate,"IBM Business Automation Workflow 18.0, 19.0, 20.0, and 21.0 and IBM Business Process Manager 8.5 and 8.6 stores user credentials in plain clear text which can be read by a lprivileged user. IBM X-Force ID: 214346.",CONFIRM:https://www.ibm.com/support/pages/node/6564387 | URL:https://www.ibm.com/support/pages/node/6564387 | XF:ibm-baw-cve202139046-info-disc (214346) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214346,Assigned (20210816),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-39047,andidate,"IBM Planning Analytics 2.0 and IBM Cognos Analytics 11.2.1, 11.2.0, and 11.1.7 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 214349.",CONFIRM:https://security.netapp.com/advisory/ntap-20220729-0002/ | CONFIRM:https://www.ibm.com/support/pages/node/6565099 | URL:https://www.ibm.com/support/pages/node/6565099 | CONFIRM:https://www.ibm.com/support/pages/node/6597241 | URL:https://www.ibm.com/support/pages/node/6597241 | XF:ibm-cognos-cve202139047-xss (214349) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214349,Assigned (20210816),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-39048,Candidate,"IBM Spectrum Protect Client 7.1 and 8.1 is vulnerable to a stack based buffer overflow, caused by improper bounds checking. A local attacker could exploit this vulnerability and cause a denial of service. IBM X-Force ID: 214438.",CONFIRM:https://www.ibm.com/support/pages/node/6524706 | URL:https://www.ibm.com/support/pages/node/6524706 | GENTOO:GLSA-202209-02 | URL:https://security.gentoo.org/glsa/202209-02 | XF:ibm-spectrum-cve202139048-bo (214438) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214438,Assigned (20210816),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-39049,Candidate,"IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214439.",CONFIRM:https://www.ibm.com/support/pages/node/6525256 | URL:https://www.ibm.com/support/pages/node/6525256 | XF:ibm-i2-cve202139049-bo (214439) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214439,Assigned (20210816),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-3905,Candidate,A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.,MISC:https://access.redhat.com/security/cve/CVE-2021-3905 | URL:https://access.redhat.com/security/cve/CVE-2021-3905 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2019692 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2019692 | MISC:https://github.com/openvswitch/ovs-issues/issues/226 | URL:https://github.com/openvswitch/ovs-issues/issues/226 | MISC:https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 | URL:https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 | MISC:https://ubuntu.com/security/CVE-2021-3905 | URL:https://ubuntu.com/security/CVE-2021-3905,Assigned (20211026),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-39050,Candidate,"IBM i2 Analyst's Notebook 9.2.0, 9.2.1, and 9.2.2 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local attacker could overflow a buffer and gain lower level privileges. IBM X-Force ID: 214440.",CONFIRM:https://www.ibm.com/support/pages/node/6525258 | URL:https://www.ibm.com/support/pages/node/6525258 | XF:ibm-i2-cve202139050-bo (214440) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214440,Assigned (20210816),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-39051,Candidate,"IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.14.3 is vulnerable to server-side request forgery, caused by improper input of application server registration function. A remote attacker could exploit this vulnerability using the host address and port fields of the application server registration form in the portal UI to enumerate and attack services that are running on those hosts. IBM X-Force ID: 214441.",CONFIRM:https://www.ibm.com/support/pages/node/6562479 | URL:https://www.ibm.com/support/pages/node/6562479 | XF:ibm-spectrum-cve202139051-ssrf (214441) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214441,Assigned (20210816),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-39052,Candidate,IBM Spectrum Copy Data Management 2.2.13 and earlier could allow a remote attacker to access the Spring Boot console without authorization. IBM X-Force ID: 214523.,CONFIRM:https://www.ibm.com/support/pages/node/6525554 | URL:https://www.ibm.com/support/pages/node/6525554 | XF:ibm-spectrum-cve202139052-sec-bypass (214523) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214523,Assigned (20210816),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-39053,Candidate,"IBM Spectrum Copy Data Management 2.2.13 and earlier could allow a remote attacker to obtain sensitive information, caused by the improper handling of requests for Spectrum Copy Data Management Admin Console. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 214524.",CONFIRM:https://www.ibm.com/support/pages/node/6525554 | URL:https://www.ibm.com/support/pages/node/6525554 | XF:ibm-spectrum-cve202139053-info-disc (214524) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214524,Assigned (20210816),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-39054,Candidate,"IBM Spectrum Copy Data Management 2.2.13 and earlier could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 214525.",CONFIRM:https://www.ibm.com/support/pages/node/6525554 | URL:https://www.ibm.com/support/pages/node/6525554 | XF:ibm-spectrum-cve202139054-clikcjacking (214525) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214525,Assigned (20210816),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-39055,Candidate,IBM Spectrum Copy Data Management 2.2.0.0 through 2.2.14.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 214534.,CONFIRM:https://www.ibm.com/support/pages/node/6562479 | URL:https://www.ibm.com/support/pages/node/6562479 | XF:ibm-spectrum-cve202139055-xss (214534) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214534,Assigned (20210816),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-39056,Candidate,"The IBM i 7.1, 7.2, 7.3, and 7.4 Extended Dynamic Remote SQL server (EDRSQL) could allow a remote authenticated user to send a specially crafted request and cause a denial of service. IBM X-Force ID: 214537.",CONFIRM:https://www.ibm.com/support/pages/node/6540294 | URL:https://www.ibm.com/support/pages/node/6540294 | XF:ibm-i-cve202139056-dos (214537) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214537,Assigned (20210816),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-39057,Candidate,"IBM Spectrum Protect Plus 10.1.0.0 through 10.1.8.x is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 214616.",CONFIRM:https://www.ibm.com/support/pages/node/6525346 | URL:https://www.ibm.com/support/pages/node/6525346 | XF:ibm-spectrum-cve202139057-ssrf (214616) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214616,Assigned (20210816),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-39058,Candidate,IBM Spectrum Copy Data Management 2.2.13 and earlier uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 214617.,CONFIRM:https://www.ibm.com/support/pages/node/6525554 | URL:https://www.ibm.com/support/pages/node/6525554 | XF:ibm-spectrum-cve202139058-info-disc (214617) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214617,Assigned (20210816),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-39059,Candidate,"IBM Jazz Foundation (IBM Jazz Team Server 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 214619.",CONFIRM:https://www.ibm.com/support/pages/node/6584347 | URL:https://www.ibm.com/support/pages/node/6584347 | XF:ibm-jazz-cve202139059-xss (214619) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214619,Assigned (20210816),None (candidate not yet proposed),
|
| 114 |
-
,Candidate,bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type,CONFIRM:https://huntr.dev/bounties/f115bdf5-c06b-4627-a6fa-ba6904a43ba3 | URL:https://huntr.dev/bounties/f115bdf5-c06b-4627-a6fa-ba6904a43ba3 | MISC:https://github.com/bookstackapp/bookstack/commit/64937ab826b56d086af9ecea532510d37520ebc8 | URL:https://github.com/bookstackapp/bookstack/commit/64937ab826b56d086af9ecea532510d37520ebc8,Assigned (20211026),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-39060,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-39061,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-39062,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-39063,Candidate,IBM Spectrum Protect Plus 10.1.0.0 through 10.1.8.x uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information due to a misconfiguration in access control headers. IBM X-Force ID: 214956.,CONFIRM:https://www.ibm.com/support/pages/node/6525346 | URL:https://www.ibm.com/support/pages/node/6525346 | XF:ibm-spectrum-cve202139063-cors (214956) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214956,Assigned (20210816),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-39064,Candidate,IBM Spectrum Copy Data Management 2.2.13 and earlier has weak authentication and password rules and incorrectly handles default credentials for the Spectrum Copy Data Management Admin console. IBM X-Force ID: 214957.,CONFIRM:https://www.ibm.com/support/pages/node/6525554 | URL:https://www.ibm.com/support/pages/node/6525554 | XF:ibm-spectrum-cve202139064-info-disc (214957) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214957,Assigned (20210816),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-39065,Candidate,"IBM Spectrum Copy Data Management 2.2.13 and earlier could allow a remote attacker to execute arbitrary commands on the system, caused by improper validation of user-supplied input by the Spectrum Copy Data Management Admin Console login and uploadcertificate function . A remote attacker could inject arbitrary shell commands which would be executed on the affected system. IBM X-Force ID: 214958.",CONFIRM:https://www.ibm.com/support/pages/node/6525554 | URL:https://www.ibm.com/support/pages/node/6525554 | XF:ibm-spectrum-cve202139065-command-exec (214958) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/214958,Assigned (20210816),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-39066,Candidate,IBM Financial Transaction Manager 3.2.4 does not invalidate session any existing session identifier gives an attacker the opportunity to steal authenticated sessions. IBM X-Force ID: 215040.,CONFIRM:https://www.ibm.com/support/pages/node/6527892 | URL:https://www.ibm.com/support/pages/node/6527892 | XF:ibm-ftm-cve202139066-session-fixation (215040) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215040,Assigned (20210816),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-39067,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-39068,Candidate,IBM Curam Social Program Management 8.0.1 and 7.0.11 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 215306.,CONFIRM:https://www.ibm.com/support/pages/node/6570589 | URL:https://www.ibm.com/support/pages/node/6570589 | XF:ibm-curam-cve202139068-xss (215306) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/215306,Assigned (20210816),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-39069,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210816),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1023.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table1024.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table1025.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-39293,Candidate,"In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.",CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf | CONFIRM:https://groups.google.com/g/golang-announce/c/dx9d7IOseHw | CONFIRM:https://security.netapp.com/advisory/ntap-20220217-0009/,Assigned (20210819),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-39294,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210819),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-39295,Candida!e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210819),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-39296,Candidate,"In OpenBMC 2.9, crafted IPMI messages allow an attacker to bypass authentication and gain full control of the system.",CONFIRM:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00737.html | MISC:https://github.com/google/security-research/security/advisories/GHSA-gg9x-v835-m48q | MISC:https://github.com/openbmc/openbmc,Assigned (20210819),None (candidate not yet proposed),
|
| 6 |
-
CV-2021-39297,Candidate,Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.,MISC:https://support.hp.com/us-en/document/ish_5661066-5661090-16 | URL:https://support.hp.com/us-en/document/ish_5661066-5661090-16,Assigned (20210819),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-39298,andidate,A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.,MISC:https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027 | URL:https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027 | MISC:https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032 | URL:https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032,Assigned (20210819),None (candidate not yet proposed),
|
| 8 |
-
CVE-$!20!21-3929$9,Candidate,Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.,MISC:https://support.hp.com/us-en/document/ish_5661066-5661090-16 | URL:https://support.hp.com/us-en/document/ish_5661066-5661090-16,Assigned (20210819),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-3930,Candiate,"An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.",CONFIRM:https://security.netapp.com/advisory/ntap-20220225-0007/ | GENTOO:GLSA-202208-27 | URL:https://security.gentoo.org/glsa/202208-27 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2020588 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2020588 | MLIST:[debian-lts-announce] 20220404 [SECURITY] [DLA 2970-1] qemu security update | URL:https://lists.debian.org/debian-lts-announce/2022/04/msg00002.html | MLIST:[debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update | URL:https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html,Assigned (20211105),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-39300,Candidate,Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.,MISC:https://support.hp.com/us-en/document/ish_5661066-5661090-16 | URL:https://support.hp.com/us-en/document/ish_5661066-5661090-16,Assigned (20210819),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-39301,Candidate,Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.,MISC:https://support.hp.com/us-en/document/ish_5661066-5661090-16 | URL:https://support.hp.com/us-en/document/ish_5661066-5661090-16,Assigned (20210819),None (candidate not yet proposed),
|
| 12 |
-
CV-2021-39302,Candidate,"MISP 2.4.148, in certain configurations, allows SQL injection via the app/Model/Log.php $conditions['org'] value.",MISC:https://github.com/MISP/MISP/commit/20d9020b76d1f6790c4d84e020d0cc97c929f66b,Assigned (20210819),None (candidate not yet proposed),
|
| 13 |
-
CVE*-$2021-393?03!,Candidate,"The server in Jamf Pro before 10.32.0 has an SSRF vulnerability, aka PI-006352. NOTE: Jamf Nation will also publish an article about this vulnerability.",CONFIRM:https://community.jamf.com/t5/jamf-pro/what-s-new-in-jamf-pro-10-32-release/m-p/246505 | CONFIRM:https://docs.jamf.com/10.32.0/jamf-pro/release-notes/Resolved_Issues.html | MISC:https://blog.assetnote.io/2021/11/30/jamf-ssrf/ | MISC:https://www.jamf.com/resources/product-documentation/jamf-pro-release-notes/,Assigned (20210819),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-39304,Candi!da|t|e,Proofpoint Enterprise Protection before 8.12.0-2108090000 allows security control bypass.,MISC:https://www.proofpoint.com/us/blog | MISC:https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2021-0007,Assigned (20210820),None (candidate not yet proposed),
|
| 15 |
-
CVE-021-39305,andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210820),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-3906,Candidate,"A stack buffer overflow was discovered on Realtek RTL8195AM device before 2.0.10, it exists in the client code when an attacker sends a big size Authentication challenge text in WEP security.",MISC:https://www.amebaiot.com/en/security_bulletin/cve-2021-39306/ | MISC:https://www.realtek.com,Assigned (20210820),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-39307,@an$idate,"PDFTron's WebViewer UI 8.0 or below renders dangerous URLs as hyperlinks in supported documents, including JavaScript URLs, allowing the execution of arbitrary JavaScript code.",MISC:https://research.nccgroup.com/2021/09/14/technical-advisory-pdftron-javascript-urls-allowed-in-webviewer-ui-cve-2021-39307/ | MISC:https://www.pdftron.com/webviewer/,Assigned (20210820),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-39308,#an@idate,"The WooCommerce myghpay Payment Gateway WordPess plugin is vulnerable to Reflected Cross-Site Scripting via the clientref parameter found in the ~/processresponse.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.0.",MISC:https://plugins.trac.wordpress.org/browser/woo-myghpay-payment-gateway/trunk/processresponse.php?rev=2410420#L134 | URL:https://plugins.trac.wordpress.org/browser/woo-myghpay-payment-gateway/trunk/processresponse.php?rev=2410420#L134 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39308 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39308,Assigned (20210820),None (candidate not yet proposed),
|
| 19 |
-
C*VE$-|2021-39309,Ca|ndid$a!te,"The Parsian Bank Gateway for Woocommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via and parameter due to a var_dump() on $_POST variables found in the ~/vendor/dpsoft/parsian-payment/sample/rollback-payment.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.",MISC:https://plugins.trac.wordpress.org/browser/parsian-bank-gateway-for-woocommerce/tags/1.0/vendor/dpsoft/parsian-payment/sample/rollback-payment.php#L39 | URL:https://plugins.trac.wordpress.org/browser/parsian-bank-gateway-for-woocommerce/tags/1.0/vendor/dpsoft/parsian-payment/sample/rollback-payment.php#L39 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39309 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39309,Assigned (20210820),None (candidate not yet proposed),
|
| 20 |
-
CVE-2#0#21-3!93#1,Candidate,snipe-it is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f | URL:https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f | MISC:https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e | URL:https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e,Assigned (20211105),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-39310,Cndidate,"The Real WYSIWYG WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of PHP_SELF in the ~/real-wysiwyg.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.2.",MISC:https://plugins.trac.wordpress.org/browser/real-wysiwyg/tags/0.0.2/real-wysiwyg.php#L213 | URL:https://plugins.trac.wordpress.org/browser/real-wysiwyg/tags/0.0.2/real-wysiwyg.php#L213 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39310 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39310,Assigned (20210820),None (candidate not yet proposed),
|
| 22 |
-
CVE-$2?021|-!39311,Candidate,"The link-list-manager WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the category parameter found in the ~/llm.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.",MISC:https://plugins.trac.wordpress.org/browser/link-list-manager/tags/1.0/llm.php#L191 | URL:https://plugins.trac.wordpress.org/browser/link-list-manager/tags/1.0/llm.php#L191 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39311 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39311,Assigned (20210820),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-39312,Candidate,"The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.",MISC:http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html | MISC:https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php | URL:https://plugins.trac.wordpress.org/browser/seo-local-rank/tags/2.2.2/admin/vendor/datatables/examples/resources/examples.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39312,Assigned (20210820),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-39313,Ca*n*di#date,"The Simple Image Gallery WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the msg parameter found in the ~/simple-image-gallery.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.6.",MISC:https://plugins.trac.wordpress.org/browser/simple-responsive-image-gallery/tags/1.0.6/simple-image-gallery.php#L420 | URL:https://plugins.trac.wordpress.org/browser/simple-responsive-image-gallery/tags/1.0.6/simple-image-gallery.php#L420 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39313 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39313,Assigned (20210820),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-393#4,Candid@te,"The WooCommerce EnvioPack WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the dataid parameter found in the ~/includes/functions.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.",MISC:https://plugins.trac.wordpress.org/browser/woo-enviopack/trunk/includes/functions.php?rev=2239846#L605 | URL:https://plugins.trac.wordpress.org/browser/woo-enviopack/trunk/includes/functions.php?rev=2239846#L605 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39314 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39314,Assigned (20210820),None (candidate not yet proposed),
|
| 26 |
-
CVE-?021-39315,Candidate,"The Magic Post Voice WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the ids parameter found in the ~/inc/admin/main.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.",MISC:https://plugins.trac.wordpress.org/browser/magic-post-voice/trunk/inc/admin/main.php#L14 | URL:https://plugins.trac.wordpress.org/browser/magic-post-voice/trunk/inc/admin/main.php#L14 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39315 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39315,Assigned (20210820),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-39316,Candidate,"The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter.",MISC:http://packetstormsecurity.com/files/165146/WordPress-DZS-Zoomsounds-6.45-Arbitrary-File-Read.html | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39316 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39316,Assigned (20210820),None (candidate not yet proposed),
|
| 28 |
-
CVE-021-39317,Can#idate,A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer <=1.0.6 WordPress Themes: accesspress-basic <= 3.2.1 accesspress-lite <= 2.92 accesspress-mag <= 2.6.5 accesspress-parallax <= 4.5 accesspress-root <= 2.5 accesspress-store <= 2.4.9 agency-lite <= 1.1.6 arrival <= 1.4.2 bingle <= 1.0.4 bloger <= 1.2.6 brovy <= 1.3 construction-lite <= 1.2.5 doko <= 1.0.27 edict-lite <= 1.1.4 eightlaw-lite <= 2.1.5 eightmedi-lite <= 2.1.8 eight-sec <= 1.1.4 eightstore-lite <= 1.2.5 enlighten <= 1.3.5 fotography <= 2.4.0 opstore <= 1.4.3 parallaxsome <= 1.3.6 punte <= 1.1.2 revolve <= 1.3.1 ripple <= 1.2.0 sakala <= 1.0.4 scrollme <= 2.1.0 storevilla <= 1.4.1 swing-lite <= 1.1.9 the100 <= 1.1.2 the-launcher <= 1.3.2 the-monday <= 1.4.1 ultra-seven <= 1.2.8 uncode-lite <= 1.3.3 vmag <= 1.2.7 vmagazine-lite <= 1.3.5 vmagazine-news <= 1.0.5 wpparallax <= 2.0.6 wp-store <= 1.1.9 zigcy-baby <= 1.0.6 zigcy-cosmetics <= 1.0.5 zigcy-lite <= 2.0.9,MISC:https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/ | URL:https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes/ | MISC:https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php | URL:https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php | MISC:https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php | URL:https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php | MISC:https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/ | URL:https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin/,Assigned (20210820),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021#39318,Candidate,"The H5P CSS Editor WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the h5p-css-file parameter found in the ~/h5p-css-editor.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.",MISC:https://plugins.trac.wordpress.org/browser/h5p-css-editor/tags/1.0/h5p-css-editor.php#L50 | URL:https://plugins.trac.wordpress.org/browser/h5p-css-editor/tags/1.0/h5p-css-editor.php#L50 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39318 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39318,Assigned (20210820),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-39319,Candidate,"The duoFAQ - Responsive, Flat, Simple FAQ WordPess plugin is vulnerable to Reflected Cross-Site Scripting via the msg parameter found in the ~/duogeek/duogeek-panel.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.8.",MISC:https://plugins.trac.wordpress.org/browser/duofaq-responsive-flat-simple-faq/tags/1.4.8/duogeek/duogeek-panel.php#L388 | URL:https://plugins.trac.wordpress.org/browser/duofaq-responsive-flat-simple-faq/tags/1.4.8/duogeek/duogeek-panel.php#L388 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39319 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39319,Assigned (20210820),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-3932,Candidate,twill is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/6ef21e34-f6d9-445a-b657-375c53dc2b43 | URL:https://huntr.dev/bounties/6ef21e34-f6d9-445a-b657-375c53dc2b43 | MISC:https://github.com/area17/twill/commit/81d80d1fbbdd8bb73c020f03c623fd4487bd9b78 | URL:https://github.com/area17/twill/commit/81d80d1fbbdd8bb73c020f03c623fd4487bd9b78,Assigned (20211105),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-39320,Candidate,"The underConstruction plugin <= 1.18 for WordPress echoes out the raw value of `$GLOBALS['PHP_SELF']` in the ucOptions.php file. On certain configurations including Apache+modPHP, this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path.",MISC:https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 | URL:https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39320 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39320,Assigned (20210820),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-39321,Candi$ate,Version 3.3.23 of the Sassy Social Share WordPress plugin is vulnerable to PHP Object Injection via the wp_ajax_heateor_sss_import_config AJAX action due to deserialization of unvalidated user supplied inputs via the import_config function found in the ~/admin/class-sassy-social-share-admin.php file. This can be exploited by underprivileged authenticated users due to a missing capability check on the import_config function.,MISC:https://plugins.trac.wordpress.org/changeset/2600464/sassy-social-share/trunk/admin/class-sassy-social-share-admin.php | URL:https://plugins.trac.wordpress.org/changeset/2600464/sassy-social-share/trunk/admin/class-sassy-social-share-admin.php | MISC:https://www.wordfence.com/blog/2021/10/vulnerability-patched-in-sassy-social-share-plugin/ | URL:https://www.wordfence.com/blog/2021/10/vulnerability-patched-in-sassy-social-share-plugin/ | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39321 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39321,Assigned (20210820),None (candidate not yet proposed),
|
| 34 |
-
CV#E#-|2021-3932|2,Candidate,The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of `$_SERVER['PHP_SELF']` in its main file. On certain configurations including Apache+modPHP this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path.,MISC:https://wpvulndb.com/vulnerabilities/5e0bf0b6-9809-426b-b1d4-1fb653083b58 | URL:https://wpvulndb.com/vulnerabilities/5e0bf0b6-9809-426b-b1d4-1fb653083b58 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39322 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39322,Assigned (20210820),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-39323,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210820),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-39324,Candi?a@e,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210820),None (candidate not yet proposed),
|
| 37 |
-
CVE-201-39325,Candidate,"The OptinMonster WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to insufficient input validation in the load_previews function found in the ~/OMAPI/Output.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.6.0.",MISC:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2595758%40optinmonster&new=2595758%40optinmonster&sfp_email=&sfph_mail=#file2 | URL:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2595758%40optinmonster&new=2595758%40optinmonster&sfp_email=&sfph_mail=#file2 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39325 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39325,Assigned (20210820),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-39326,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210820),None (candidate not yet proposed),
|
| 39 |
-
CVE-202*-39327,Canidate,"The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.",MISC:http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html | MISC:https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2021-39327 | MISC:https://www.exploit-db.com/exploits/50382 | MISC:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2591118%40bulletproof-security&new=2591118%40bulletproof-security&sfp_email=&sfph_mail= | URL:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2591118%40bulletproof-security&new=2591118%40bulletproof-security&sfp_email=&sfph_mail= | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39327,Assigned (20210820),None (candidate not yet proposed),
|
| 40 |
-
CVE-201-39328,Candidate,"The Simple Job Board WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping on the $job_board_privacy_policy_label variable echo'd out via the ~/admin/settings/class-simple-job-board-settings-privacy.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.9.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Simple%20Job%20Board%E2%80%94Stored%20Cross-Site%20Scripting%20-%202.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Simple%20Job%20Board%E2%80%94Stored%20Cross-Site%20Scripting%20-%202.md | MISC:https://plugins.trac.wordpress.org/changeset/2617364/simple-job-board/trunk/admin/settings/class-simple-job-board-settings-privacy.php | URL:https://plugins.trac.wordpress.org/changeset/2617364/simple-job-board/trunk/admin/settings/class-simple-job-board-settings-privacy.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39328 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39328,Assigned (20210820),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-39329,Candiate,"The JobBoardWP WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/includes/admin/class-metabox.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.0.7. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/JobBoardWP%20%E2%80%93%20Job%20Board%20Listings%20and%20Submissions.md | URL:https://github.com/BigTiger2020/word-press/blob/main/JobBoardWP%20%E2%80%93%20Job%20Board%20Listings%20and%20Submissions.md | MISC:https://plugins.trac.wordpress.org/browser/jobboardwp/trunk/includes/admin/class-metabox.php#L165 | URL:https://plugins.trac.wordpress.org/browser/jobboardwp/trunk/includes/admin/class-metabox.php#L165 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39329 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39329,Assigned (20210820),None (candidate not yet proposed),
|
| 42 |
-
CVE2021-3933,Candidte,"An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths.",DEBIAN:DSA-5299 | URL:https://www.debian.org/security/2022/dsa-5299 | FEDORA:FEDORA-2022-18e14f460c | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/ | GENTOO:GLSA-202210-31 | URL:https://security.gentoo.org/glsa/202210-31 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2019783 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2019783 | MLIST:[debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update | URL:https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html,Assigned (20211108),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-39330,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-24608. Reason: This candidate is a duplicate of CVE-2021-24608. Notes: All CVE users should reference CVE-2021-24608 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.,,Assigned (20210820),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-39331,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210820),None (candidate not yet proposed),
|
| 45 |
-
VE-2021-39332,Candidate,"The Business Manager WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization found throughout the plugin which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.4.5. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39332 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39332,Assigned (20210820),None (candidate not yet proposed),
|
| 46 |
-
@VE-2*21-39333,Candidate,"The Hashthemes Demo Importer Plugin <= 1.1.1 for WordPress contained several AJAX functions which relied on a nonce which was visible to all logged-in users for access control, allowing them to execute a function that truncated nearly all database tables and removed the contents of wp-content/uploads.",MISC:https://www.wordfence.com/blog/2021/10/site-deletion-vulnerability-in-hashthemes-plugin/ | URL:https://www.wordfence.com/blog/2021/10/site-deletion-vulnerability-in-hashthemes-plugin/,Assigned (20210820),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-39334,Candidate,"The Job Board Vanila WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via the psjb_exp_in and the psjb_curr_in parameters found in the ~/job-settings.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.0. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Job%20Board%20Vanila%20Plugin-2.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Job%20Board%20Vanila%20Plugin-2.md | MISC:https://plugins.trac.wordpress.org/browser/job-board-vanilla/trunk/job-settings.php | URL:https://plugins.trac.wordpress.org/browser/job-board-vanilla/trunk/job-settings.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39334 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39334,Assigned (20210820),None (candidate not yet proposed),
|
| 48 |
-
CV#-2021-3#335,Candida!t!e?,"The WpGenius Job Listing WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/src/admin/class/class-wpgenious-job-listing-options.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.0.2. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/WpGenius%20Job%20Listing.md | URL:https://github.com/BigTiger2020/word-press/blob/main/WpGenius%20Job%20Listing.md | MISC:https://plugins.trac.wordpress.org/browser/wpgenious-job-listing/trunk/src/admin/class/class-wpgenious-job-listing-options.php | URL:https://plugins.trac.wordpress.org/browser/wpgenious-job-listing/trunk/src/admin/class/class-wpgenious-job-listing-options.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39335 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39335,Assigned (20210820),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-39336,Canidate,"The Job Manager WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/admin-jobs.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 0.7.25. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Job%20Manager.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Job%20Manager.md | MISC:https://plugins.trac.wordpress.org/browser/job-manager/trunk/admin-jobs.php#L244 | URL:https://plugins.trac.wordpress.org/browser/job-manager/trunk/admin-jobs.php#L244 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39336 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39336,Assigned (20210820),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-39337,Candi@ate,"The job-portal WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/admin/jobs_function.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 0.0.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/job-portal.md | URL:https://github.com/BigTiger2020/word-press/blob/main/job-portal.md | MISC:https://plugins.trac.wordpress.org/browser/job-portal/trunk/admin/jobs_function.php#L99 | URL:https://plugins.trac.wordpress.org/browser/job-portal/trunk/admin/jobs_function.php#L99 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39337 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39337,Assigned (20210820),None (candidate not yet proposed),
|
| 51 |
-
CVE-20@?-39338,Candidate,"The MyBB Cross-Poster WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/classes/MyBBXPSettings.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.0. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/MyBB%20Cross-Poster.md | URL:https://github.com/BigTiger2020/word-press/blob/main/MyBB%20Cross-Poster.md | MISC:https://plugins.trac.wordpress.org/browser/mybb-cross-poster/trunk/classes/MyBBXPSettings.php | URL:https://plugins.trac.wordpress.org/browser/mybb-cross-poster/trunk/classes/MyBBXPSettings.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39338 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39338,Assigned (20210820),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-39339,Candidate,"The Telefication WordPress plugin is vulnerable to Open Proxy and Server-Side Request Forgery via the ~/bypass.php file due to a user-supplied URL request value that gets called by a curl requests. This affects versions up to, and including, 1.8.0.",MISC:https://plugins.trac.wordpress.org/browser/telefication/tags/1.8.0/bypass.php | URL:https://plugins.trac.wordpress.org/browser/telefication/tags/1.8.0/bypass.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39339 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39339,Assigned (20210820),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-3934,Candidate,ohmyzsh is vulnerable to Improper Neutralization of Special Elements used in an OS Command,CONFIRM:https://huntr.dev/bounties/ad2b5c3f-a3ce-4407-94dc-354c723310ce | URL:https://huntr.dev/bounties/ad2b5c3f-a3ce-4407-94dc-354c723310ce | MISC:https://github.com/ohmyzsh/ohmyzsh/commit/6cb41b70a6d04301fd50cd5862ecd705ba226c0e | URL:https://github.com/ohmyzsh/ohmyzsh/commit/6cb41b70a6d04301fd50cd5862ecd705ba226c0e,Assigned (20211108),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-39340,Candida$|,"The Notification WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/src/classes/Utils/Settings.php file which made it possible for attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 7.2.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Notification.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Notification.md | MISC:https://plugins.trac.wordpress.org/browser/notification/tags/7.2.4/src/classes/Utils/Settings.php#L167 | URL:https://plugins.trac.wordpress.org/browser/notification/tags/7.2.4/src/classes/Utils/Settings.php#L167 | MISC:https://wordfence.com/vulnerability-advisories/#CVE-2021-39340 | URL:https://wordfence.com/vulnerability-advisories/#CVE-2021-39340,Assigned (20210820),None (candidate not yet proposed),
|
| 55 |
-
C@E-2021-39341,Candida$e,"The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4.",MISC:https://plugins.trac.wordpress.org/browser/optinmonster/trunk/OMAPI/RestApi.php?rev=2606519#L1460 | URL:https://plugins.trac.wordpress.org/browser/optinmonster/trunk/OMAPI/RestApi.php?rev=2606519#L1460 | MISC:https://wordfence.com/vulnerability-advisories/#CVE-2021-39341 | URL:https://wordfence.com/vulnerability-advisories/#CVE-2021-39341 | MISC:https://www.wordfence.com/blog/2021/10/1000000-sites-affected-by-optinmonster-vulnerabilities/ | URL:https://www.wordfence.com/blog/2021/10/1000000-sites-affected-by-optinmonster-vulnerabilities/,Assigned (20210820),None (candidate not yet proposed),
|
| 56 |
-
@CVE-202#!1-39342,Candidate,"The Credova_Financial WordPress plugin discloses a site's associated Credova API account username and password in plaintext via an AJAX action whenever a site user goes to checkout on a page that has the Credova Financing option enabled. This affects versions up to, and including, 1.4.8.",MISC:https://plugins.trac.wordpress.org/changeset/2606811/credova-financial/trunk/credova-financial.php | URL:https://plugins.trac.wordpress.org/changeset/2606811/credova-financial/trunk/credova-financial.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39342 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39342,Assigned (20210820),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-39343,#C$andida%te?,"The MPL-Publisher WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/libs/PublisherController.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.30.2. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/MPL-Publisher.md | URL:https://github.com/BigTiger2020/word-press/blob/main/MPL-Publisher.md | MISC:https://plugins.trac.wordpress.org/browser/mpl-publisher/trunk/libs/PublisherController.php#L35 | URL:https://plugins.trac.wordpress.org/browser/mpl-publisher/trunk/libs/PublisherController.php#L35 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39343 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39343,Assigned (20210820),None (candidate not yet proposed),
|
| 58 |
-
C*#VE#-2!021-39344,Candidate,"The KJM Admin Notices WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/admin/class-kjm-admin-notices-admin.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.0.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/KJM%20Admin%20Notices.md | URL:https://github.com/BigTiger2020/word-press/blob/main/KJM%20Admin%20Notices.md | MISC:https://plugins.trac.wordpress.org/browser/kjm-admin-notices/trunk/admin/class-kjm-admin-notices-admin.php | URL:https://plugins.trac.wordpress.org/browser/kjm-admin-notices/trunk/admin/class-kjm-admin-notices-admin.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39344 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39344,Assigned (20210820),None (candidate not yet proposed),
|
| 59 |
-
CVE-021-39345,Candidae,"The HAL WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/wp-hal.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.1.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/HAL.md | URL:https://github.com/BigTiger2020/word-press/blob/main/HAL.md | MISC:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2614075%40hal&new=2614075%40hal&sfp_email=&sfph_mail= | URL:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2614075%40hal&new=2614075%40hal&sfp_email=&sfph_mail= | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39345 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39345,Assigned (20210820),None (candidate not yet proposed),
|
| 60 |
-
?CVE-20%21-3#9!346,Cndidate,"The Google Maps Easy WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/modules/marker_groups/views/tpl/mgrEditMarkerGroup.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.9.33. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Google%20Maps%20Easy.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Google%20Maps%20Easy.md | MISC:https://plugins.trac.wordpress.org/changeset/2620851/google-maps-easy/trunk/modules/marker_groups/views/tpl/mgrEditMarkerGroup.php | URL:https://plugins.trac.wordpress.org/changeset/2620851/google-maps-easy/trunk/modules/marker_groups/views/tpl/mgrEditMarkerGroup.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39346 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39346,Assigned (20210820),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-39347,Candidate,The Stripe for WooCommerce WordPress plugin is missing a capability check on the save() function found in the ~/includes/admin/class-wc-stripe-admin-user-edit.php file that makes it possible for attackers to configure their account to use other site users unique STRIPE identifier and make purchases with their payment accounts. This affects versions 3.0.0 - 3.3.9.,MISC:https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php | URL:https://plugins.trac.wordpress.org/changeset/2601162/woo-stripe-payment/trunk/includes/admin/class-wc-stripe-admin-user-edit.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39347,Assigned (20210820),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-39348,Candidate,"The LearnPress WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping on the $custom_profile parameter found in the ~/inc/admin/views/backend-user-profile.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 4.1.3.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. Please note that this is seperate from CVE-2021-24702.",MISC:https://github.com/BigTiger2020/word-press/blob/main/LearnPress.md | URL:https://github.com/BigTiger2020/word-press/blob/main/LearnPress.md | MISC:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2614592%40learnpress&new=2614592%40learnpress&sfp_email=&sfph_mail= | URL:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2614592%40learnpress&new=2614592%40learnpress&sfp_email=&sfph_mail= | MISC:https://wordfence.com/vulnerability-advisories/#CVE-2021-39348 | URL:https://wordfence.com/vulnerability-advisories/#CVE-2021-39348,Assigned (20210820),None (candidate not yet proposed),
|
| 63 |
-
CV-2021-39349,Cndidate,"The Author Bio Box WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/includes/admin/class-author-bio-box-admin.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 3.3.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Author%20Bio%20Box.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Author%20Bio%20Box.md | MISC:https://plugins.trac.wordpress.org/changeset/2613798/author-bio-box/tags/3.3.2/includes/admin/class-author-bio-box-admin.php | URL:https://plugins.trac.wordpress.org/changeset/2613798/author-bio-box/tags/3.3.2/includes/admin/class-author-bio-box-admin.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39349 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39349,Assigned (20210820),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-3935,Candidate,"When PgBouncer is configured to use ""cert"" authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of TLS certificate verification and encryption. This flaw affects PgBouncer versions prior to 1.16.1.",FEDORA:FEDORA-2021-761cda0b77 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/ | MISC:http://www.pgbouncer.org/changelog.html#pgbouncer-116x | URL:http://www.pgbouncer.org/changelog.html#pgbouncer-116x | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2021251 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2021251 | MLIST:[debian-lts-announce] 20220214 [SECURITY] [DLA 2922-1] pgbouncer security update | URL:https://lists.debian.org/debian-lts-announce/2022/02/msg00016.html,Assigned (20211108),None (candidate not yet proposed),
|
| 65 |
-
CVE-*021-3%350,Candiate,"The FV Flowplayer Video Player WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the player_id parameter found in the ~/view/stats.php file which allows attackers to inject arbitrary web scripts, in versions 7.5.0.727 - 7.5.2.727.",MISC:https://plugins.trac.wordpress.org/changeset/2580834/fv-wordpress-flowplayer/trunk/view/stats.php | URL:https://plugins.trac.wordpress.org/changeset/2580834/fv-wordpress-flowplayer/trunk/view/stats.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39350 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39350,Assigned (20210820),None (candidate not yet proposed),
|
| 66 |
-
|CVE?-2@021-39351,Candidate,The WP Bannerize WordPress plugin is vulnerable to authenticated SQL injection via the id parameter found in the ~/Classes/wpBannerizeAdmin.php file which allows attackers to exfiltrate sensitive information from vulnerable sites. This issue affects versions 2.0.0 - 4.0.2.,MISC:https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681 | URL:https://plugins.trac.wordpress.org/browser/wp-bannerize/trunk/Classes/wpBannerizeAdmin.php#L1681 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39351,Assigned (20210820),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-393$!,Candidate,"The Catch Themes Demo Import WordPress plugin is vulnerable to arbitrary file uploads via the import functionality found in the ~/inc/CatchThemesDemoImport.php file, in versions up to and including 1.7, due to insufficient file type validation. This makes it possible for an attacker with administrative privileges to upload malicious files that can be used to achieve remote code execution.",MISC:http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html | MISC:http://packetstormsecurity.com/files/165463/WordPress-Catch-Themes-Demo-Import-Shell-Upload.html | MISC:https://github.com/Hacker5preme/Exploits/tree/main/Wordpress/CVE-2021-39352 | MISC:https://www.exploit-db.com/exploits/50580 | MISC:https://github.com/BigTiger2020/word-press/blob/main/Catch%20Themes%20Demo%20Import.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Catch%20Themes%20Demo%20Import.md | MISC:https://plugins.trac.wordpress.org/changeset/2617555/catch-themes-demo-import/trunk/inc/CatchThemesDemoImport.php | URL:https://plugins.trac.wordpress.org/changeset/2617555/catch-themes-demo-import/trunk/inc/CatchThemesDemoImport.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39352 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39352,Assigned (20210820),None (candidate not yet proposed),
|
| 68 |
-
CVE-021-39353,Cadidate,"The Easy Registration Forms WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the ajax_add_form function found in the ~/includes/class-form.php file which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 2.1.1.",MISC:https://plugins.trac.wordpress.org/browser/easy-registration-forms/tags/2.1.1/includes/class-form.php#L256 | URL:https://plugins.trac.wordpress.org/browser/easy-registration-forms/tags/2.1.1/includes/class-form.php#L256 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39353 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39353,Assigned (20210820),None (candidate not yet proposed),
|
| 69 |
-
CVE-021-39354,Cndidate,"The Easy Digital Downloads WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the $start_date and $end_date parameters found in the ~/includes/admin/payments/class-payments-table.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.11.2.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Easy%20Digital%20Downloads.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Easy%20Digital%20Downloads.md | MISC:https://plugins.trac.wordpress.org/changeset/2616149/easy-digital-downloads/trunk/includes/admin/payments/class-payments-table.php | URL:https://plugins.trac.wordpress.org/changeset/2616149/easy-digital-downloads/trunk/includes/admin/payments/class-payments-table.php | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39354 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39354,Assigned (20210820),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-39355,C%$andida%t*e,"The Indeed Job Importer WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/indeed-job-importer/trunk/indeed-job-importer.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.0.5. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Indeed%20Job%20Importer.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Indeed%20Job%20Importer.md | MISC:https://plugins.trac.wordpress.org/browser/indeed-job-importer/trunk/indeed-job-importer.php#L224 | URL:https://plugins.trac.wordpress.org/browser/indeed-job-importer/trunk/indeed-job-importer.php#L224 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39355 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-39355,Assigned (20210820),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-39356,Canddate,"The Content Staging WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via several parameters that are echo'd out via the ~/templates/settings.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.0.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Content%20Staging.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Content%20Staging.md | MISC:https://plugins.trac.wordpress.org/browser/content-staging/trunk/templates/settings.php | URL:https://plugins.trac.wordpress.org/browser/content-staging/trunk/templates/settings.php | MISC:https://wordfence.com/vulnerability-advisories/#CVE-2021-39356 | URL:https://wordfence.com/vulnerability-advisories/#CVE-2021-39356,Assigned (20210820),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-39357,C!an#di*date,"The Leaky Paywall WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via the ~/class.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 4.16.5. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.",MISC:https://github.com/BigTiger2020/word-press/blob/main/Leaky%20Paywall.md | URL:https://github.com/BigTiger2020/word-press/blob/main/Leaky%20Paywall.md | MISC:https://plugins.trac.wordpress.org/changeset/2615195/leaky-paywall/trunk/class.php | URL:https://plugins.trac.wordpress.org/changeset/2615195/leaky-paywall/trunk/class.php | MISC:https://wordfence.com/vulnerability-advisories/#CVE-2021-39357 | URL:https://wordfence.com/vulnerability-advisories/#CVE-2021-39357,Assigned (20210820),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-3938,Candidate,"In GNOME libgfbgraph through 0.2.4, gfbgraph-photo.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.",FEDORA:FEDORA-2021-743a0aafa0 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXXAF56BYLSES4UCLXKFCODZXTNAZ2G6/ | FEDORA:FEDORA-2021-7cccd2784c | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UYI47UX6S5PAOWVWQ2KID64MCTXTH7SE/ | FEDORA:FEDORA-2021-9c737bb848 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRCVZUNPTNFQQQCEZVP7RYY6OKHPDBC5/ | MISC:https://blogs.gnome.org/mcatanzaro/2021/05/25/reminder-soupsessionsync-and-soupsessionasync-default-to-no-tls-certificate-verification/ | MISC:https://gitlab.gnome.org/GNOME/libgfbgraph/-/issues/17,Assigned (20210822),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-39359,Candidate,"In GNOME libgda through 6.0.0, gda-web-provider.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.",FEDORA:FEDORA-2021-06510d73f1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRPPP47WRCAPAEJGRMEKYYJZBQCYXTLQ/ | FEDORA:FEDORA-2021-084f819da6 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLMVVIJNY5NMOT3FH36RFBWOTPVW7GME/ | MISC:https://blogs.gnome.org/mcatanzaro/2021/05/25/reminder-soupsessionsync-and-soupsessionasync-default-to-no-tls-certificate-verification/ | MISC:https://gitlab.gnome.org/GNOME/libgda/-/issues/249,Assigned (20210822),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-393@,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211108),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-39360,andidate,"In GNOME libzapojit through 0.0.3, zpj-skydrive.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.",FEDORA:FEDORA-2021-77ce69dba6 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG7TUICJM4QJHI4QJ2RHOSQE2QWD3KO3/ | FEDORA:FEDORA-2021-7f5a82ef57 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNSIMQXP6VQWJXI7VW7ZCLCS4NWW465T/ | FEDORA:FEDORA-2021-c3395a5df6 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDXCHOCVP3VSAKDBQSLER2DQHFIOUHAT/ | MISC:https://blogs.gnome.org/mcatanzaro/2021/05/25/reminder-soupsessionsync-and-soupsessionasync-default-to-no-tls-certificate-verification/ | MISC:https://gitlab.gnome.org/GNOME/libzapojit/-/issues/4,Assigned (20210822),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-39361,Candidate,"In GNOME evolution-rss through 0.3.96, network-soup.c does not enable TLS certificate verification on the SoupSessionSync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.",MISC:https://blogs.gnome.org/mcatanzaro/2021/05/25/reminder-soupsessionsync-and-soupsessionasync-default-to-no-tls-certificate-verification/ | MISC:https://gitlab.gnome.org/GNOME/evolution-rss/-/issues/11,Assigned (20210822),None (candidate not yet proposed),
|
| 78 |
-
CVE-2$@1-39362,Candidat,"An XSS issue was discovered in ReCaptcha Solver 5.7. A response from Anti-Captcha.com, RuCaptcha.com, 2captcha.com, DEATHbyCAPTCHA.com, ImageTyperz.com, or BestCaptchaSolver.com in setCaptchaCode() is inserted into the DOM as HTML, resulting in full control over the user's browser by these servers.",MISC:https://thesamarkand.tumblr.com/post/660171228514009088/xss-vulnerability-in-recaptcha-solver-by-dozz,Assigned (20210822),None (candidate not yet proposed),
|
| 79 |
-
CVE2021-39363,andidate,Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow a video replay attack after ARP cache poisoning has been achieved.,CONFIRM:https://buildings.honeywell.com/content/dam/hbtbt/en/documents/downloads/Security_Notification_SN_2022-01-26-01_CVE-2021-39363_Command_Injection_HDZP252DI.pdf | MISC:https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices | MISC:https://www.honeywell.com/us/en/product-security,Assigned (20210822),None (candidate not yet proposed),
|
| 80 |
-
CVE-201-39364,Candidate,Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow command spoofing (for camera control) after ARP cache poisoning has been achieved.,CONFIRM:https://buildings.honeywell.com/content/dam/hbtbt/en/documents/downloads/Security_Notification_SN_2022-01-26-02_CVE-2021-39364_Video_Replay_HBW2PER1.pdf | MISC:https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices | MISC:https://www.honeywell.com/us/en/product-security,Assigned (20210822),None (candidate not yet proposed),
|
| 81 |
-
?CVE-#2?021-39365,C|ndid@te,"In GNOME grilo though 0.3.13, grl-net-wc.c does not enable TLS certificate verification on the SoupSessionAsync objects it creates, leaving users vulnerable to network MITM attacks. NOTE: this is similar to CVE-2016-20011.",DEBIAN:DSA-4964 | URL:https://www.debian.org/security/2021/dsa-4964 | MISC:https://blogs.gnome.org/mcatanzaro/2021/05/25/reminder-soupsessionsync-and-soupsessionasync-default-to-no-tls-certificate-verification/ | MISC:https://gitlab.gnome.org/GNOME/grilo/-/issues/146 | MLIST:[debian-lts-announce] 20210921 [SECURITY] [DLA 2762-1] grilo security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00010.html,Assigned (20210822),None (candidate not yet proposed),
|
| 82 |
-
CV|-2021-393?6,Ca*didate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210822),None (candidate not yet proposed),
|
| 83 |
-
CVE-@021-39#67,Candidate,Canon Oce Print Exec Workgroup 1.3.2 allows Host header injection.,MISC:https://github.com/IthacaLabs/Canon/tree/main/OCE_Print_Exec_Workgroup_Version_1_3_2/HHI,Assigned (20210822),None (candidate not yet proposed),
|
| 84 |
-
CV-2021-39368,Ca$ndida?t*e$,Canon Oce Print Exec Workgroup 1.3.2 allows XSS via the lang parameter.,MISC:https://github.com/IthacaLabs/Canon/tree/main/OCE_Print_Exec_Workgroup_Version_1_3_2/XSS_HTMLi,Assigned (20210822),None (candidate not yet proposed),
|
| 85 |
-
CV-2021-39369,Canddate,"In Philips (formerly Carestream) Vue MyVue PACS through 12.2.x.x, the VideoStream function allows Path Traversal by authenticated users to access files stored outside of the web root.",MISC:https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | URL:https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01 | MISC:https://www.usa.philips.com/healthcare | URL:https://www.usa.philips.com/healthcare | MISC:https://www.youtube.com/watch?v=7zC84TNpIxw | URL:https://www.youtube.com/watch?v=7zC84TNpIxw,Assigned (20210822),None (candidate not yet proposed),
|
| 86 |
-
CVE-021-3937,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211108),None (candidate not yet proposed),
|
| 87 |
-
CVE-202#-39370,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210822),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-9371,Candidate,An XML external entity (XXE) injection in PyWPS before 4.4.5 allows an attacker to view files on the application server filesystem by assigning a path to the entity. OWSLib 0.24.1 may also be affected.,MISC:https://github.com/geopython/OWSLib/issues/790 | MISC:https://github.com/geopython/pywps/pull/616 | MLIST:[debian-lts-announce] 20210904 [SECURITY] [DLA 2754-1] pywps security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00001.html,Assigned (20210822),None (candidate not yet proposed),
|
| 89 |
-
CV-2021-39372,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-3973,Canddate,"Samsung Drive Manager 2.0.104 on Samsung H3 devices allows attackers to bypass intended access controls on disk management. WideCharToMultiByte, WideCharStr, and MultiByteStr can contribute to password exposure.",MISC:https://github.com/bosslabdcu/Vulnerability-Reporting/security/advisories/GHSA-j3f7-346q-97f4,Assigned (20210823),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-9374,%?ndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 92 |
-
CVE-202-39375,Candidate,Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the WAdvancedFilter/getDimensionItemsByCode FilterValue parameter.,MISC:https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/,Assigned (20210823),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-39376,Candidate,Philips Healthcare Tasy Electronic Medical Record (EMR) 3.06 allows SQL injection via the CorCad_F2/executaConsultaEspecifico IE_CORPO_ASSIST or CD_USUARIO_CONVENIO parameter.,MISC:https://diesec.home.blog/2021/08/24/philips-tasy-emr-3-06-sql-injection-cve-2021-39375cve-2021-39376/,Assigned (20210823),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-39377,Candidate,A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the index.php username parameter.,MISC:https://github.com/OS4ED/openSIS-Classic | MISC:https://github.com/security-n/CVE-2021-39377 | MISC:https://opensis.com/,Assigned (20210823),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-39378,Cndidate,A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the NamesList.php str parameter.,MISC:https://github.com/OS4ED/openSIS-Classic | MISC:https://github.com/security-n/CVE-2021-39378 | MISC:https://opensis.com/,Assigned (20210823),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-39379,Candidate,A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the ResetUserInfo.php password_stn_id parameter.,MISC:https://github.com/OS4ED/openSIS-Classic | MISC:https://github.com/security-n/CVE-2021-39379 | MISC:https://opensis.com/,Assigned (20210823),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-3938,C|ndi$ate,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063 | URL:https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063 | MISC:https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9 | URL:https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9,Assigned (20211108),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-393*0,andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-39381,Can*idate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 100 |
-
CVE-2#@021-?393#82,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 101 |
-
@CVE-2021$-?39#383,Candidate,DWSurvey v3.2.0 was discovered to contain a remote command execution (RCE) vulnerability via the component /sysuser/SysPropertyAction.java.,MISC:https://github.com/wkeyuan/DWSurvey/issues/81,Assigned (20210823),None (candidate not yet proposed),
|
| 102 |
-
CVE-202139384,Candidate,DWSurvey v3.2.0 was discovered to contain an arbitrary file write vulnerability via the component /utils/ToHtmlServlet.java.,MISC:https://github.com/wkeyuan/DWSurvey/issues/80,Assigned (20210823),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-3935,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-39386,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-39387,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-39388,Can#dida#%te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-39389,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 108 |
-
CVE@-2$021-393*9,Candidate,"Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1.",MISC:https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/1950149 | URL:https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/1950149 | MISC:https://ubuntu.com/security/notices/USN-5149-1 | URL:https://ubuntu.com/security/notices/USN-5149-1,Assigned (20211109),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-39390,*Candi?dat$e,Stored XSS in PartKeepr 1.4.0 Edit section in multiple api endpoints via name parameter.,MISC:https://demo.partkeepr.org/ | MISC:https://github.com/partkeepr/PartKeepr/issues/1237 | MISC:https://partkeepr.org/,Assigned (20210823),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-39391,Candidate,"Cross Site Scripting (XSS) vulnerability exists in the admin panel in Beego v2.0.1 via the URI path in an HTTP request, which is activated by administrators viewing the ""Request Statistics"" page.",MISC:https://github.com/beego/beego | MISC:https://github.com/beego/beego/issues/4727,Assigned (20210823),None (candidate not yet proposed),
|
| 111 |
-
CVE-20*@21-*39$392,Candidate,"The management tool in MyLittleBackup up to and including 1.7 allows remote attackers to execute arbitrary code because machineKey is hardcoded (the same for all customers' installations) in web.config, and can be used to send serialized ASP code.",MISC:http://www.mylittlebackup.com/mlb/zip/mlb_1.7.zip | MISC:https://gist.github.com/omriinbar/65827626e63f15e3e50557e2d9d61281,Assigned (20210823),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-3933,Candidate,mm-wiki v0.2.1 was discovered to contain a cross-site scripting (XSS) vulnerability via the markdown editor.,MISC:https://github.com/phachon/mm-wiki/issues/315,Assigned (20210823),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-39394,C?ndidate,mm-wiki v0.2.1 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily add user accounts and modify user information.,MISC:https://github.com/phachon/mm-wiki/issues/316,Assigned (20210823),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-39395,andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-39396,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-39397,Ca@$|ndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-39398,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-39399,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-3940,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2021. Notes: none.,,Assigned (20211109),None (candidate not yet proposed),
|
| 120 |
-
CVE-202*1-39$4!00,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-39401,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 122 |
-
C@*-2021-39402,Candidate,MaianAffiliate v.1.0 is suffers from code injection by adding a new product via the admin panel. The injected payload is reflected on the affiliate main page for all authenticated and unauthenticated visitors.,MISC:https://github.com/mari0x00/MaianAffiliate-Code-execution-and-XSS | MISC:https://www.maianscriptworld.co.uk/,Assigned (20210823),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-3403,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-3904,Candidate,MaianAffiliate v1.0 allows an authenticated administrative user to save an XSS to the database.,MISC:https://github.com/mari0x00/MaianAffiliate-Code-execution-and-XSS,Assigned (20210823),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1026.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-39405,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-39406,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 4 |
-
|VE-2021-3!407,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-39408,Candidate,Cross Site Scripting (XSS) vulnerability exists in Online Student Rate System 1.0 via the page parameter on the index.php file,MISC:https://github.com/StefanDorresteijn/CVE-2021-39408,Assigned (20210823),None (candidate not yet proposed),
|
| 6 |
-
CVE-202139409,Candidate,A vulnerability exists in Online Student Rate System v1.0 that allows any user to register as an administrator without needing to be authenticated.,MISC:https://github.com/StefanDorresteijn/CVE-2021-39409,Assigned (20210823),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-3941,Candidate,"In ImfChromaticities.cpp routine RGBtoXYZ(), there are some division operations such as `float Z = (1 - chroma.white.x - chroma.white.y) * Y / chroma.white.y;` and `chroma.green.y * (X + Z))) / d;` but the divisor is not checked for a 0 value. A specially crafted file could trigger a divide-by-zero condition which could affect the availability of programs linked with OpenEXR.",DEBIAN:DSA-5299 | URL:https://www.debian.org/security/2022/dsa-5299 | FEDORA:FEDORA-2022-18e14f460c | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2JSMJ7HLWFPYYV7IAQZD5ZUUUN7RWBN/ | GENTOO:GLSA-202210-31 | URL:https://security.gentoo.org/glsa/202210-31 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2019789 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2019789 | MLIST:[debian-lts-announce] 20221211 [SECURITY] [DLA 3236-1] openexr security update | URL:https://lists.debian.org/debian-lts-announce/2022/12/msg00022.html,Assigned (20211109),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-39410,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-39411,Candidate,"Multiple Cross Site Scripting (XSS) vulnerabilities exist in PHPGurukul Hospital Management System 4.0 via the (1) searchdata parameter in (a) doctor/search.php and (b) admin/patient-search.php, and the (2) fromdate and (3) todate parameters in admin/betweendates-detailsreports.php.",MISC:https://sisl.lab.uic.edu/projects/chess/hmsp/,Assigned (20210823),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-39412,Candidate,"Multiple Cross Site Scripting (XSS) vulnerabilities exists in PHPGurukul Shopping v3.1 via the (1) callback parameter in (a) server_side/scripts/id_jsonp.php, (b) server_side/scripts/jsonp.php, and (c) scripts/objects_jsonp.php, the (2) value parameter in examples_support/editable_ajax.php, and the (3) PHP_SELF parameter in captcha/index.php.",MISC:https://sisl.lab.uic.edu/projects/chess/php-gurukul-shopping/,Assigned (20210823),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-39413,Candidate,"Multiple Cross Site Scripting (XSS) vulnerabilities exits in SEO Panel v4.8.0 via the (1) to_time parameter in (a) backlinks.php, (b) analytics.php, (c) log.php, (d) overview.php, (e) pagespeed.php, (f) rank.php, (g) review.php, (h) saturationchecker.php, (i) social_media.php, and (j) reports.php; the (2) from_time parameter in (a) backlinks.php, (b) analytics.php, (c) log.php, (d) overview.php, (e) pagespeed.php, (f) rank.php, (g) review.php, (h) saturationchecker.php, (i) social_media.php, (j) webmaster-tools.php, and (k) reports.php; the (3) order_col parameter in (a) analytics.php, (b) review.php, (c) social_media.php, and (d) webmaster-tools.php; and the (4) pageno parameter in (a) alerts.php, (b) log.php, (c) keywords.php, (d) proxy.php, (e) searchengine.php, and (f) siteauditor.php.",MISC:https://sisl.lab.uic.edu/projects/chess/seo-panel/,Assigned (20210823),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-39414,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-39415,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-39416,Candidate,"Multiple Cross Site Scripting (XSS) vulnerabilities exists in Remote Clinic v2.0 in (1) patients/register-patient.php via the (a) Contact, (b) Email, (c) Weight, (d) Profession, (e) ref_contact, (f) address, (g) gender, (h) age, and (i) serial parameters; in (2) patients/edit-patient.php via the (a) Contact, (b) Email, (c) Weight, Profession, (d) ref_contact, (e) address, (f) serial, (g) age, and (h) gender parameters; in (3) staff/edit-my-profile.php via the (a) Title, (b) First Name, (c) Last Name, (d) Skype, and (e) Address parameters; and in (4) clinics/settings.php via the (a) portal_name, (b) guardian_short_name, (c) guardian_name, (d) opening_time, (e) closing_time, (f) access_level_5, (g) access_level_4, (h) access_level_ 3, (i) access_level_2, (j) access_level_1, (k) currency, (l) mobile_number, (m) address, (n) patient_contact, (o) patient_address, and (p) patient_email parameters.",MISC:https://github.com/remoteclinic/RemoteClinic/issues/17 | MISC:https://remoteclinic.io | MISC:https://sisl.lab.uic.edu/projects/chess/remote-clinic/,Assigned (20210823),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-39417,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-39418,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-39419,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-3942,Candidate,Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with use of Link-Local Multicast Name Resolution or LLMNR.,MISC:https://support.hp.com/us-en/document/ish_5948778-5949142-16/hpsbpi03780 | URL:https://support.hp.com/us-en/document/ish_5948778-5949142-16/hpsbpi03780,Assigned (20211109),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-39420,Candidate,Multiple Cross Site Scripting (XSS) vulnerabilities exist in VFront 0.99.5 via the (1) s parameter in search_all.php and the (2) msg parameter in add.attach.php.,MISC:https://sisl.lab.uic.edu/projects/chess/vfront0-99-5/,Assigned (20210823),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-39421,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-39422,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-39423,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-39424,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 24 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-39426,Candidate,An issue was discovered in /Upload/admin/admin_notify.php in Seacms 11.4 allows attackers to execute arbitrary php code via the notify1 parameter when the action parameter equals set.,MISC:https://github.com/seacms-com/seacms/issues/21 | URL:https://github.com/seacms-com/seacms/issues/21,Assigned (20210823),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-?9427,Candidate,Cross site scripting vulnerability in 188Jianzhan 2.10 allows attackers to execute arbitrary code via the username parameter to /admin/reg.php.,MISC:https://github.com/vtime-tech/188Jianzhan/issues/4,Assigned (20210823),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-39428,Candidate,Cross Site Scripting (XSS) vulnerability in Users.php in eyoucms 1.5.4 allows remote attackers to run arbitrary code and gain escalated privilege via the filename for edit_users_head_pic.,MISC:https://github.com/eyoucms/eyoucms/issues/14,Assigned (20210823),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-39429,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-3943,Candidate,"A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A remote code execution risk when restoring backup files was identified.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2021963 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2021963 | MISC:https://moodle.org/mod/forum/discuss.php?d=429095 | URL:https://moodle.org/mod/forum/discuss.php?d=429095,Assigned (20211110),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-39430,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-39431,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-39432,Candidate,diplib v3.0.0 is vulnerable to Double Free.,MISC:https://github.com/DIPlib/diplib/commit/8b9a2670ce66ff2fd5addf592f7825e1f5adb5b5 | MISC:https://github.com/DIPlib/diplib/issues/80,Assigned (20210823),None (candidate not yet proposed),
|
| 33 |
-
,Candidate,A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user.,MISC:https://biqs-drive.be/ | MISC:https://github.com/PinkDraconian/CVE-2021-39433/blob/main/README.md,Assigned (20210823),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-39434,Candidate,"A default username and password for an administrator account was discovered in ZKTeco ZKTime 10.0 through 11.1.0, builds 20180901, 20190510.1, 20200309.3, 20200930, 20201231, and 20210220.",MISC:https://www.cnvd.org.cn/flaw/show/CNVD-2018-26041,Assigned (20210823),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-39435,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-39436,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-39437,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 38 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-39439,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-3944,Candidte,bookstack is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9 | URL:https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9 | MISC:https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb | URL:https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb,Assigned (20211110),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-39440,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-39441,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-39442,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-39443,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-39444,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-39445,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-39446,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-39447,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-39448,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 50 |
-
CVE-021-39449,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-3945,Candidate,django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/745f483c-70ed-441f-ab2e-7ac1305439a4 | URL:https://huntr.dev/bounties/745f483c-70ed-441f-ab2e-7ac1305439a4 | MISC:https://github.com/django-helpdesk/django-helpdesk/commit/2c7065e0c4296e0c692fb4a7ee19c7357583af30 | URL:https://github.com/django-helpdesk/django-helpdesk/commit/2c7065e0c4296e0c692fb4a7ee19c7357583af30,Assigned (20211111),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-39450,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-39451,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-39452,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-39453,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-39454,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-39455,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-39456,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-39457,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-39458,Candidate,Triggering an error page of the import process in Yakamara Media Redaxo CMS version 5.12.1 allows an authenticated CMS user has to alternate the files of a vaild file backup. This leads of leaking the database credentials in the environment variables.,MISC:https://github.com/evildrummer/CVE-2021-XYZ2 | MISC:https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39458,Assigned (20210823),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-39459,Candidate,Remote code execution in the modules component in Yakamara Media Redaxo CMS version 5.12.1 allows an authenticated CMS user to execute code on the hosting system via a module containing malicious PHP code.,MISC:https://github.com/evildrummer/CVE-2021-XYZ | MISC:https://github.com/evildrummer/MyOwnCVEs/tree/main/CVE-2021-39459,Assigned (20210823),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-3946,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211111),None (candidate not yet proposed),
|
| 63 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-39461,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-39462,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-39463,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-39464,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-39465,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-39466,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 70 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-39468,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-39469,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-3947,Candidate,A stack-buffer-overflow was found in QEMU in the NVME component. The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory. A malicious user could use this flaw leading to disclosure of sensitive information.,CONFIRM:https://security.netapp.com/advisory/ntap-20220318-0003/ | GENTOO:GLSA-202208-27 | URL:https://security.gentoo.org/glsa/202208-27 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2021869 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2021869,Assigned (20211111),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-39470,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-39471,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-39472,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-39473,Candidate,Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields.,MISC:https://github.com/Saibamen/HotelManager | MISC:https://github.com/Saibamen/HotelManager/issues/49,Assigned (20210823),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-39474,Candidate,Vulnerability in the product Docsis 3.0 UBC1319BA00 Router supported affected version 1319010201r009. The vulnerability allows an attacker with privileges and network access through the ping.cmd component to execute commands on the device.,MISC:https://saikotwolf.medium.com/f9ed24e14e51 | MISC:https://www.ubeeinteractive.com/?product=ubc1319,Assigned (20210823),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-39475,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-39476,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-39477,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-39478,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-39479,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-3948,Candidate,"An incorrect default permissions vulnerability was found in the mig-controller. Due to an incorrect cluster namespaces handling an attacker may be able to migrate a malicious workload to the target cluster, impacting confidentiality, integrity, and availability of the services located on that cluster.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2022017 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2022017,Assigned (20211111),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-39480,Candidate,Bingrep v0.8.5 was discovered to contain a memory allocation failure which can cause a Denial of Service (DoS).,MISC:https://github.com/m4b/bingrep/issues/30,Assigned (20210823),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-39481,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-39482,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-39483,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 89 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-39485,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-39486,Candidate,"A Stored XSS via Malicious File Upload exists in Gila CMS version 2.2.0. An attacker can use this to steal cookies, passwords or to run arbitrary code on a victim's browser.",MISC:https://www.navidkagalwalla.com/gila-cms-vulnerabilities,Assigned (20210823),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-39487,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-39488,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-39489,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-3949,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211111),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-39490,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-39491,Candidate,A Cross Site Scripting (XSS) vulnerability exists in Yogesh Ojha reNgine v1.0 via the Scan Engine name file in the Scan Engine deletion confirmation modal box . .,MISC:https://github.com/yogeshojha/rengine/issues/460,Assigned (20210823),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-39492,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-39493,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-39494,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-39495,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-39496,Candidate,"Eyoucms 1.5.4 lacks sanitization of input data, allowing an attacker to inject malicious code into `filename` param to trigger Reflected XSS.",MISC:https://github.com/KietNA-HPT/CVE | MISC:https://github.com/eyoucms/eyoucms/releases/tag/v1.5.4,Assigned (20210823),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-39497,Candidate,"eyoucms 1.5.4 lacks sanitization of input data, allowing an attacker to inject a url to trigger blind SSRF via the saveRemote() function.",MISC:http://hptcybersec.com/ssrf_PoC.jpg | MISC:https://github.com/KietNA-HPT/CVE | MISC:https://github.com/eyoucms/eyoucms/releases/tag/v1.5.4,Assigned (20210823),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-3998,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-39499,Candidate,A Cross-site scripting (XSS) vulnerability in Users in Qiong ICP EyouCMS 1.5.4 allows remote attackers to inject arbitrary web script or HTML via the `title` parameter in bind_email function.,MISC:https://github.com/KietNA-HPT/CVE | MISC:https://github.com/eyoucms/eyoucms/issues/18,Assigned (20210823),None (candidate not yet proposed),
|
| 106 |
-
,Candidate,django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e | URL:https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e | MISC:https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60 | URL:https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60,Assigned (20211112),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-39500,Candidate,"Eyoucms 1.5.4 is vulnerable to Directory Traversal. Due to a lack of input data sanitizaton in param tpldir, filename, type, nid an attacker can inject ""../"" to escape and write file to writeable directories.",MISC:https://github.com/KietNA-HPT/CVE | MISC:https://github.com/eyoucms/eyoucms/releases/tag/v1.5.4,Assigned (20210823),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-39501,Candidate,EyouCMS 1.5.4 is vulnerable to Open Redirect. An attacker can redirect a user to a malicious url via the Logout function.,MISC:https://github.com/KietNA-HPT/CVE | MISC:https://github.com/eyoucms/eyoucms/issues/17,Assigned (20210823),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-39502,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-39503,Candidate,"PHPMyWind 5.6 is vulnerable to Remote Code Execution. Becase input is filtered without ""<, >, ?, =, `,...."" In WriteConfig() function, an attacker can inject php code to /include/config.cache.php file.",MISC:https://github.com/KietNA-HPT/CVE | MISC:https://github.com/gaozhifeng/PHPMyWind/issues/15,Assigned (20210823),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-39504,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-39505,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-39506,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-39507,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-39508,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-39509,Candidate,"An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.",MISC:https://github.com/doudoudedi/main-DIR-816_A2_Command-injection | MISC:https://github.com/doudoudedi/main-DIR-816_A2_Command-injection/blob/main/injection.md | MISC:https://www.dlink.com/en/security-bulletin/,Assigned (20210823),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-3951,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211112),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-39510,Candidate,"An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.",MISC:https://github.com/doudoudedi/main-DIR-816_A1_Command-injection | MISC:https://github.com/doudoudedi/main-DIR-816_A1_Command-injection/blob/main/injection_A1.md | MISC:https://www.dlink.com/en/security-bulletin/,Assigned (20210823),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-39511,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-39512,|andida%e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-39513,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-39514,Candidate,An issue was discovered in libjpeg through 2020021. An uncaught floating point exception in the function ACLosslessScan::ParseMCU() located in aclosslessscan.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/thorfdbg/libjpeg/issues/36,Assigned (20210823),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-39515,Candidate,An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function SampleInterleavedLSScan::ParseMCU() located in sampleinterleavedlsscan.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/thorfdbg/libjpeg/issues/37,Assigned (20210823),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-39516,Candidate,An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function HuffmanDecoder::Get() located in huffmandecoder.hpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/thorfdbg/libjpeg/issues/42,Assigned (20210823),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1027.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
,Candidate,An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::ReconstructUnsampled() located in blockbitmaprequester.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/thorfdbg/libjpeg/issues/33,Assigned (20210823),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-39518,Candidate,An issue was discovered in libjpeg through 2020021. LineBuffer::FetchRegion() in linebuffer.cpp has a heap-based buffer overflow.,MISC:https://github.com/thorfdbg/libjpeg/issues/35,Assigned (20210823),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-39519,Candidate,An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::PullQData() located in blockbitmaprequester.cpp It allows an attacker to cause Denial of Service.,MISC:https://github.com/thorfdbg/libjpeg/issues/28,Assigned (20210823),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-3952,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211112),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-39520,,An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::PushReconstructedData() located in blockbitmaprequester.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/thorfdbg/libjpeg/issues/34,Assigned (20210823),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-39521,,An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function bit_read_BB() located in bits.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/LibreDWG/libredwg/issues/262,Assigned (20210823),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-39522,Candidate,An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2len() in bits.c has a heap-based buffer overflow.,MISC:https://github.com/LibreDWG/libredwg/issues/255,Assigned (20210823),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-39523,Candidate,An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function check_POLYLINE_handles() located in decode.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/LibreDWG/libredwg/issues/251,Assigned (20210823),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-39524,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-39525,Candidate,An issue was discovered in libredwg through v0.10.1.3751. bit_read_fixed() in bits.c has a heap-based buffer overflow.,MISC:https://github.com/LibreDWG/libredwg/issues/261,Assigned (20210823),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-39526,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-39527,Candidate,An issue was discovered in libredwg through v0.10.1.3751. appinfo_private() in decode.c has a heap-based buffer overflow.,MISC:https://github.com/LibreDWG/libredwg/issues/252,Assigned (20210823),None (candidate not yet proposed),
|
| 14 |
-
,Candidate,An issue was discovered in libredwg through v0.10.1.3751. dwg_free_MATERIAL_private() in dwg.spec has a double free.,MISC:https://github.com/LibreDWG/libredwg/issues/256,Assigned (20210823),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-39529,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-3953,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211112),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-39530,Candidate,An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2nlen() in bits.c has a heap-based buffer overflow.,MISC:https://github.com/LibreDWG/libredwg/issues/258,Assigned (20210823),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-39531,Candidate,An issue was discovered in libslax through v0.22.1. slaxLexer() in slaxlexer.c has a stack-based buffer overflow.,MISC:https://github.com/Juniper/libslax/issues/53,Assigned (20210823),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-39532,Candidate,An issue was discovered in libslax through v0.22.1. A NULL pointer dereference exists in the function slaxLexer() located in slaxlexer.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/Juniper/libslax/issues/50,Assigned (20210823),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-39533,Candidate,An issue was discovered in libslax through v0.22.1. slaxLexer() in slaxlexer.c has a heap-based buffer overflow.,MISC:https://github.com/Juniper/libslax/issues/51,Assigned (20210823),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-39534,Canidate,An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow.,MISC:https://github.com/Juniper/libslax/issues/52,Assigned (20210823),None (candidate not yet proposed),
|
| 22 |
-
,Candidate,An issue was discovered in libxsmm through v1.16.1-93. A NULL pointer dereference exists in JIT code. It allows an attacker to cause Denial of Service.,MISC:https://github.com/hfp/libxsmm/issues/398,Assigned (20210823),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-39536,Candidate,An issue was discovered in libxsmm through v1.16.1-93. The JIT code has a heap-based buffer overflow.,MISC:https://github.com/hfp/libxsmm/issues/402,Assigned (20210823),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-39537,Candidate,An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.,CONFIRM:https://support.apple.com/kb/HT213443 | CONFIRM:https://support.apple.com/kb/HT213444 | CONFIRM:https://support.apple.com/kb/HT213488 | FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13 | URL:http://seclists.org/fulldisclosure/2022/Oct/28 | FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13 | URL:http://seclists.org/fulldisclosure/2022/Oct/41 | FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6 | URL:http://seclists.org/fulldisclosure/2022/Oct/43 | FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7 | URL:http://seclists.org/fulldisclosure/2022/Oct/45 | MISC:http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup | MISC:https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html | MISC:https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html,Assigned (20210823),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-39538,,An issue was discovered in pdftools through 20200714. A NULL pointer dereference exists in the function node::ObjNode::Value() located in objnode.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/leonhad/pdftools/issues/4,Assigned (20210823),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-39539,Candidate,An issue was discovered in pdftools through 20200714. A NULL pointer dereference exists in the function node::BDCNode::~BDCNode() located in bdcnode.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/leonhad/pdftools/issues/6,Assigned (20210823),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-3954,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211112),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-39540,Candidate,An issue was discovered in pdftools through 20200714. A stack-buffer-overflow exists in the function Analyze::AnalyzePages() located in analyze.cpp. It allows an attacker to cause code Execution.,MISC:https://github.com/leonhad/pdftools/issues/2,Assigned (20210823),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-39541,Candidate,An issue was discovered in pdftools through 20200714. A NULL pointer dereference exists in the function Analyze::AnalyzeXref() located in analyze.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/leonhad/pdftools/issues/3,Assigned (20210823),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-39542,Candidate,An issue was discovered in pdftools through 20200714. A NULL pointer dereference exists in the function Font::Size() located in font.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/leonhad/pdftools/issues/5,Assigned (20210823),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-39543,Candidate,An issue was discovered in pdftools through 20200714. A NULL pointer dereference exists in the function Analyze::AnalyzeRoot() located in analyze.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/leonhad/pdftools/issues/1,Assigned (20210823),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-39544,Candidate,An issue was discovered in sela through 20200412. file::WavFile::writeToFile() in wav_file.c has a heap-based buffer overflow.,MISC:https://github.com/sahaRatul/sela/issues/25,Assigned (20210823),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-39545,Candidate,An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function rice::RiceDecoder::process() located in rice_decoder.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/sahaRatul/sela/issues/31,Assigned (20210823),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-39546,#andida#e,An issue was discovered in sela through 20200412. rice::RiceDecoder::process() in rice_decoder.cpp has a heap-based buffer overflow.,MISC:https://github.com/sahaRatul/sela/issues/29,Assigned (20210823),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-39547,Cand@dat$,An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function lpc::SampleGenerator::process() located in sample_generator.cpp. It allows an attacker to cause Denial of Service.,MISC:https://github.com/sahaRatul/sela/issues/32,Assigned (20210823),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-3948,Candidate,An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function frame::FrameDecoder::process() located in frame_decoder.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/sahaRatul/sela/issues/28,Assigned (20210823),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-39549,Candidate,An issue was discovered in sela through 20200412. A NULL pointer dereference exists in the function file::WavFile::WavFile() located in wav_file.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/sahaRatul/sela/issues/27,Assigned (20210823),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-3955,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211112),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-39550,Candidate,An issue was discovered in sela through 20200412. file::SelaFile::readFromFile() in sela_file.cpp has a heap-based buffer overflow.,MISC:https://github.com/sahaRatul/sela/issues/30,Assigned (20210823),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-39551,,An issue was discovered in sela through 20200412. file::SelaFile::readFromFile() in sela_file.c has a heap-based buffer overflow.,MISC:https://github.com/sahaRatul/sela/issues/26,Assigned (20210823),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-39552,Candidate,An issue was discovered in sela through 20200412. file::WavFile::readFromFile() in wav_file.c has a heap-based buffer overflow.,MISC:https://github.com/sahaRatul/sela/issues/23,Assigned (20210823),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-39553,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function grealloc() located in gmem.cc. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/103,Assigned (20210823),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-39554,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function Lexer::Lexer() located in Lexer.cc. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/100,Assigned (20210823),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-39555,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D0() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/99,Assigned (20210823),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-39556,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function InfoOutputDev::type3D1() located in InfoOutputDev.cc. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/105,Assigned (20210823),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-39557,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function copyString() located in gmem.cc. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/97,Assigned (20210823),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-39558,Candidate,An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function VectorGraphicOutputDev::drawGeneralImage() located in VectorGraphicOutputDev.cc. It allows an attacker to cause code Execution.,MISC:https://github.com/matthiaskramm/swftools/issues/106,Assigned (20210823),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-39559,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function GString::~GString() located in GString.cc. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/101,Assigned (20210823),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-3956,Candidate,"A read-only authentication bypass vulnerability was reported in the Third Quarter 2021 release of Lenovo XClarity Controller (XCC) firmware affecting XCC devices configured in LDAP Authentication Only Mode and using an LDAP server that supports “unauthenticated bind”, such as Microsoft Active Directory. An unauthenticated user can gain read-only access to XCC in such a configuration, thereby allowing the XCC device configuration to be viewed but not changed. XCC devices configured to use local authentication, LDAP Authentication + Authorization Mode, or LDAP servers that support only “authenticated bind” and/or “anonymous bind” are not affected.",MISC:https://support.lenovo.com/us/en/product_security/LEN-72074 | URL:https://support.lenovo.com/us/en/product_security/LEN-72074,Assigned (20211112),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-39560,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-39561,Candidate,An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function Gfx::opSetFillColorN() located in Gfx.cc. It allows an attacker to cause code Execution.,MISC:https://github.com/matthiaskramm/swftools/issues/102,Assigned (20210823),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-39562,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function FileStream::makeSubStream() located in Stream.cc. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/98,Assigned (20210823),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-39563,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/115,Assigned (20210823),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-39564,Candidate,An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function swf_DumpActions() located in swfaction.c. It allows an attacker to cause code Execution.,MISC:https://github.com/matthiaskramm/swftools/issues/116,Assigned (20210823),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-39565,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-39566,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-39567,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-39568,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-39569,Candidate,An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function OpAdvance() located in swfaction.c. It allows an attacker to cause code Execution.,MISC:https://github.com/matthiaskramm/swftools/issues/114,Assigned (20210823),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-3957,Candidate,kimai2 is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691 | URL:https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691 | MISC:https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3 | URL:https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3,Assigned (20211114),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-39570,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-39571,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-39572,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-39573,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-39574,Candidate,An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function pool_read() located in pool.c. It allows an attacker to cause code Execution.,MISC:https://github.com/matthiaskramm/swftools/issues/124,Assigned (20210823),None (candidate not yet proposed),
|
| 66 |
-
VE-2021-39575,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function dump_method() located in abc.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/128,Assigned (20210823),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-39576,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-39577,Candidate,An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function main() located in swfdump.c. It allows an attacker to cause code Execution.,MISC:https://github.com/matthiaskramm/swftools/issues/121,Assigned (20210823),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-39578,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-3957$,Candidate,An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function string_hash() located in q.c. It allows an attacker to cause code Execution.,MISC:https://github.com/matthiaskramm/swftools/issues/125,Assigned (20210823),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-3958,Candidate,Improper Handling of Parameters vulnerability in Ipack Automation Systems Ipack SCADA Software allows : Blind SQL Injection.This issue affects Ipack SCADA Software: from unspecified before 1.1.0.,MISC:https://github.com/paradessia/cve/blob/main/Ipack-Scada-Automation.txt | URL:https://github.com/paradessia/cve/blob/main/Ipack-Scada-Automation.txt,Assigned (20211115),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-39580,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-39581,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-39582,Candidate,An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function swf_GetPlaceObject() located in swfobject.c. It allows an attacker to cause code Execution.,MISC:https://github.com/matthiaskramm/swftools/issues/122,Assigned (20210823),None (candidate not yet proposed),
|
| 75 |
-
,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function pool_lookup_string2() located in pool.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/136,Assigned (20210823),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-39584,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function namespace_set_hash() located in pool.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/130,Assigned (20210823),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-39585,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function traits_dump() located in abc.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/133,Assigned (20210823),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-39586,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-39587,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_DumpABC() located in abc.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/129,Assigned (20210823),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-39588,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_ReadABC() located in abc.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/131,Assigned (20210823),None (candidate not yet proposed),
|
| 81 |
-
,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function parse_metadata() located in abc.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/132,Assigned (20210823),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-3959,Candidate,A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService component of Bitdefender Endpoint Security Tools allows an attacker to proxy requests to the relay server. This issue affects: Bitdefender Bitdefender GravityZone versions prior to 3.3.8.272,MISC:https://www.bitdefender.com/support/security-advisories/server-side-request-forgery-in-bitdefender-gravityzone-update-server-in-relay-mode-va-10145 | URL:https://www.bitdefender.com/support/security-advisories/server-side-request-forgery-in-bitdefender-gravityzone-update-server-in-relay-mode-va-10145,Assigned (20211115),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-39590,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function params_dump() located in abc.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/137,Assigned (20210823),None (candidate not yet proposed),
|
| 84 |
-
,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_GetShapeBoundingBox() located in swfshape.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/135,Assigned (20210823),None (candidate not yet proposed),
|
| 85 |
-
C@E-2021-39592,,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function pool_lookup_uint() located in pool.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/138,Assigned (20210823),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-39593,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_FontExtract_DefineFontInfo() located in swftext.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/139,Assigned (20210823),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-39594,Candidate,Other An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function updateusage() located in swftext.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/142,Assigned (20210823),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-39595,Candidate,An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function rfx_alloc() located in mem.c. It allows an attacker to cause code Execution.,MISC:https://github.com/matthiaskramm/swftools/issues/141,Assigned (20210823),None (candidate not yet proposed),
|
| 89 |
-
CV-2021-39596,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function code_parse() located in code.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/146,Assigned (20210823),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-39597,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function code_dump2() located in code.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/143,Assigned (20210823),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-39598,Candidate,An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function callcode() located in code.c. It allows an attacker to cause Denial of Service.,MISC:https://github.com/matthiaskramm/swftools/issues/145,Assigned (20210823),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-39599,Candi#at@,Multiple Cross Site Scripting (XSS) vulnerabilities exists in CXUUCMS 3.1 in the search and c parameters in (1) public/search.php and in the (2) c parameter in admin.php.,MISC:https://github.com/cbkhwx/cxuucmsv3/issues/7,Assigned (20210823),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-3960,Candidate,Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects Bitdefender GravityZone versions prior to 3.3.8.272,MISC:https://www.bitdefender.com/support/security-advisories/privilege-escalation-via-the-gravityzone-productmanager-updateserver-kitsmanager-api-va-10146 | URL:https://www.bitdefender.com/support/security-advisories/privilege-escalation-via-the-gravityzone-productmanager-updateserver-kitsmanager-api-va-10146,Assigned (20211115),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-39600,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-39601,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-39602,Candidate,"A Buffer Overflow vulnerabilty exists in Miniftpd 1.0 in the do_mkd function in the ftpproto.c file, which could let a remote malicious user cause a Denial of Service.",MISC:https://github.com/Gabe-commiter/Miniftpd/issues/1,Assigned (20210823),None (candidate not yet proposed),
|
| 97 |
-
CV#*E-2021#-39603*,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-39604,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-39605,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-39606,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 101 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-39608,Candidate,"Remote Code Execution (RCE) vulnerabilty exists in FlatCore-CMS 2.0.7 via the upload addon plugin, which could let a remote malicious user exeuct arbitrary php code.",MISC:http://packetstormsecurity.com/files/164047/FlatCore-CMS-2.0.7-Remote-Code-Execution.html | MISC:https://github.com/flatCore/flatCore-CMS/issues/52,Assigned (20210823),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-39609,Candidate,Cross Site Scripting (XSS) vulnerability exiss in FlatCore-CMS 2.0.7 via the upload image function.,MISC:https://github.com/flatCore/flatCore-CMS/issues/53 | MISC:https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-39609 | MISC:https://www.nu11secur1ty.com/2021/08/cve-2021-39609.html,Assigned (20210823),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-3961,Candidate,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/5987aed5-6613-4937-8a3e-d48009b7da10 | URL:https://huntr.dev/bounties/5987aed5-6613-4937-8a3e-d48009b7da10 | MISC:https://github.com/snipe/snipe-it/commit/7ce5993f5ae9d713a0955c2fd8e2dff7a7ce886e | URL:https://github.com/snipe/snipe-it/commit/7ce5993f5ae9d713a0955c2fd8e2dff7a7ce886e,Assigned (20211116),None (candidate not yet proposed),
|
| 105 |
-
C?V*E-2021-|39610,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-39611,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 107 |
-
CV*E-20*2@1-396#12,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-39613,Candidate,"** UNSUPPORTED WHEN ASSIGNED ** D-Link DVG-3104MS version 1.0.2.0.3, 1.0.2.0.4, and 1.0.2.0.4E contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.",MISC:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10237 | MISC:https://www.dlink.com/en/security-bulletin/ | MISC:https://www.nussko.com/advisories/advisory-2021-08-01.txt,Assigned (20210823),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-39614,Candidate,"D-Link DVX-2000MS contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file. As weak passwords have been used, the plaintext passwords can be recovered from the hash values.",MISC:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10236 | MISC:https://www.dlink.com/en/security-bulletin/ | MISC:https://www.nussko.com/advisories/advisory-2021-08-01.txt,Assigned (20210823),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-39615,Candidate,"** UNSUPPORTED WHEN ASSIGNED ** D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file.If an attacker succeeds in recovering the cleartext password of the identified hash value, he will be able to log in via SSH or Telnet and thus gain access to the underlying embedded Linux operating system on the device. Fixed in version 2.12/2. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.",MISC:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10235 | MISC:https://www.dlink.com/en/security-bulletin/ | MISC:https://www.nussko.com/advisories/advisory-2021-08-02.txt,Assigned (20210823),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-39616,,Summary:Product: AndroidVersions: Android SoCAndroid ID: A-204686438,MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01,Assigned (20210823),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-39617,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210823),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-39618,Candidate,"In multiple methods of EuiccNotificationManager.java, there is a possible way to install existing packages without user consent due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196855999",MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01,Assigned (20210823),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-39619,Candidate,"In updatePackageMappingsData of UsageStatsService.java, there is a possible way to bypass security and privacy settings of app usage due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-197399948",MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01,Assigned (20210823),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-3962,Candidate,"A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",MISC:https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e | MISC:https://github.com/ImageMagick/ImageMagick/issues/4446 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2023196 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2023196,Assigned (20211116),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-39620,Candidate,"In ipcSetDataReference of Parcel.cpp, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-203847542",MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01,Assigned (20210823),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-39621,Candidate,"In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126319",MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01,Assigned (20210823),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-39622,Candidate,"In GBoard, there is a possible way to bypass Factory Reset Protection due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-192663648",MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01,Assigned (20210823),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-39623,Candidate,"In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348",MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01,Assigned (20210823),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-39624,Candidate,"In PackageManager, there is a possible permanent denial of service due to resource exhaustion. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-67862680",MISC:https://source.android.com/security/bulletin/2022-06-01 | URL:https://source.android.com/security/bulletin/2022-06-01,Assigned (20210823),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-39625,Candidate,"In showCarrierAppInstallationNotification of EuiccNotificationManager.java, there is a possible way to gain an access to MediaProvider content due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695347",MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01,Assigned (20210823),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-39626,,"In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695497",MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01,Assigned (20210823),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-39627,Candidate,"In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126549",MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01,Assigned (20210823),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-39628,Candidate,"In StatusBar.java, there is a possible disclosure of notification content on the lockscreen due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-189575031",MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01,Assigned (20210823),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1028.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table1029.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
"Name","Status","Description","References","Phase","Votes","Comments"
|
| 2 |
-
CVE-2021-39629,Candidate,"In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197353344","MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 3 |
-
CVE-2021-3963,Candidate,"kimai2 is vulnerable to Cross-Site Request Forgery (CSRF)","CONFIRM:https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8 | URL:https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8 | MISC:https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514 | URL:https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514",Assigned (20211116),"None (candidate not yet proposed)",""
|
| 4 |
-
CVE-2021-39630,Candidate,"In executeRequest of OverlayManagerService.java, there is a possible way to control fabricated overlays from adb shell due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-202768292","MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 5 |
-
CVE-2021-39631,Candidate,"In clear_data_dlg_text of strings.xml, there is a possible situation when ""Clear storage"" functionality sets up the wrong security/privacy expectations due to a misleading message. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-193890833","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 6 |
-
CVE-2021-39632,Candidate,"In inotify_cb of events.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-202159709","MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 7 |
-
CVE-2021-39633,Candidate,"In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150694665References: Upstream kernel","MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 8 |
-
CVE-2021-39634,Candidate,"In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204450605References: Upstream kernel","MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 9 |
-
CVE-2021-39635,Candidate,"ims_ex is a vendor system service used to manage VoLTE in unisoc devices,But it does not verify the caller's permissions,so that normal apps (No phone permissions) can obtain some VoLTE sensitive information and manage VoLTE calls.Product: AndroidVersions: Android SoCAndroid ID: A-206492634","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 10 |
-
CVE-2021-39636,Candidate,"In do_ipt_get_ctl and do_ipt_set_ctl of ip_tables.c, there is a possible way to leak kernel information due to uninitialized data. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-120612905References: Upstream kernel","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 11 |
-
CVE-2021-39637,Candidate,"In CreateDeviceInfo of trusty_remote_provisioning_context.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-193579873References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 12 |
-
CVE-2021-39638,Candidate,"In periodic_io_work_func of lwis_periodic_io.c, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195607566References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 13 |
-
CVE-2021-39639,Candidate,"In TBD of fvp.c, there is a possible way to glitch CPU behavior due to a missing permission check. This could lead to local escalation of privilege with physical access to device internals with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198291476References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 14 |
-
CVE-2021-3964,Candidate,"elgg is vulnerable to Authorization Bypass Through User-Controlled Key","CONFIRM:https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a | URL:https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a | MISC:https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744 | URL:https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744",Assigned (20211116),"None (candidate not yet proposed)",""
|
| 15 |
-
CVE-2021-39640,Candidate,"In __dwc3_gadget_ep0_queue of ep0.c, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-157294279References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 16 |
-
CVE-2021-39641,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-126949257References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 17 |
-
CVE-2021-39642,Candidate,"In synchronous_process_io_entries of lwis_ioctl.c, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195731663References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 18 |
-
CVE-2021-39643,Candidate,"In ic_startRetrieveEntryValue of acropora/app/identity/ic.c, there is a possible bypass of defense-in-depth due to missing validation of the return value. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195573629References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 19 |
-
CVE-2021-39644,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-199809304References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 20 |
-
CVE-2021-39645,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-199805112References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 21 |
-
CVE-2021-39646,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-201537251References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 22 |
-
CVE-2021-39647,Candidate,"In mon_smc_load_sp of gs101-sc/plat/samsung/exynos/soc/exynos9845/smc_booting.S, there is a possible reinitialization of TEE due to improper locking. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198713939References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 23 |
-
CVE-2021-39648,Candidate,"In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 24 |
-
CVE-2021-39649,Candidate,"In regmap_exit of regmap.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174049006References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 25 |
-
CVE-2021-3965,Candidate,"Certain HP DesignJet products may be vulnerable to unauthenticated HTTP requests which allow viewing and downloading of print job previews.","MISC:https://support.hp.com/us-en/document/ish_5268198-5268230-16 | URL:https://support.hp.com/us-en/document/ish_5268198-5268230-16",Assigned (20211116),"None (candidate not yet proposed)",""
|
| 26 |
-
CVE-2021-39650,Candidate,"In (TBD) of (TBD), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-169763055References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 27 |
-
CVE-2021-39651,Candidate,"In TBD of TBD, there is a possible way to access PIN protected settings bypassing PIN confirmation due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-193438173References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 28 |
-
CVE-2021-39652,Candidate,"In sec_ts_parsing_cmds of (TBD), there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194499021References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 29 |
-
CVE-2021-39653,Candidate,"In (TBD) of (TBD), there is a possible way to boot with a hidden debug policy due to a missing warning to the user. This could lead to local escalation of privilege after preparing the device, hiding the warning, and passing the phone to a new user, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-193443223References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-06-01 | URL:https://source.android.com/security/bulletin/pixel/2022-06-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 30 |
-
CVE-2021-39654,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 31 |
-
CVE-2021-39655,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-192641593References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 32 |
-
CVE-2021-39656,Candidate,"In __configfs_open_file of file.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174049066References: Upstream kernel","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 33 |
-
CVE-2021-39657,Candidate,"In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel","MISC:https://source.android.com/security/bulletin/pixel/2021-12-01 | URL:https://source.android.com/security/bulletin/pixel/2021-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 34 |
-
CVE-2021-39658,Candidate,"ismsEx service is a vendor service in unisoc equipment。ismsEx service is an extension of sms system service,but it does not check the permissions of the caller,resulting in permission leaks。Third-party apps can use this service to arbitrarily modify and set system properties。Product: AndroidVersions: Android SoCAndroid ID: A-207479207","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 35 |
-
CVE-2021-39659,Candidate,"In sortSimPhoneAccountsForEmergency of CreateConnectionProcessor.java, there is a possible prevention of access to emergency calling due to an unhandled exception. In rare instances, this could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-208267659","MISC:https://source.android.com/security/bulletin/2022-01-01 | URL:https://source.android.com/security/bulletin/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 36 |
-
CVE-2021-3966,Candidate,"usb device bluetooth class includes a buffer overflow related to implementation of net_buf_add_mem.","MISC:https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hfxq-3w6x-fv2m | URL:https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hfxq-3w6x-fv2m",Assigned (20211116),"None (candidate not yet proposed)",""
|
| 37 |
-
CVE-2021-39660,Candidate,"In TBD of TBD, there is a possible way to archive arbitrary code execution in kernel due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-254742984","MISC:https://source.android.com/security/bulletin/2022-12-01 | URL:https://source.android.com/security/bulletin/2022-12-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 38 |
-
CVE-2021-39661,Candidate,"In _PMRLogicalOffsetToPhysicalOffset of the PowerVR kernel driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-246824784","MISC:https://source.android.com/security/bulletin/2022-11-01 | URL:https://source.android.com/security/bulletin/2022-11-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 39 |
-
CVE-2021-39662,Candidate,"In checkUriPermission of MediaProvider.java , there is a possible way to gain access to the content of media provider collections due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-197302116","MISC:https://source.android.com/security/bulletin/2022-05-01 | URL:https://source.android.com/security/bulletin/2022-05-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 40 |
-
CVE-2021-39663,Candidate,"In openFileAndEnforcePathPermissionsHelper of MediaProvider.java, there is a possible bypass of a permissions check due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-200682135","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 41 |
-
CVE-2021-39664,Candidate,"In LoadedPackage::Load of LoadedArsc.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure when parsing an APK file with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-203938029","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 42 |
-
CVE-2021-39665,Candidate,"In checkSpsUpdated of AAVCAssembler.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-204077881","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 43 |
-
CVE-2021-39666,Candidate,"In extract of MediaMetricsItem.h, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-204445255","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 44 |
-
CVE-2021-39667,Candidate,"In ih264d_parse_decode_slice of ih264d_parse_slice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-205702093","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 45 |
-
CVE-2021-39668,Candidate,"In onActivityViewReady of DetailDialog.kt, there is a possible Intent Redirect due to a confused deputy. This could lead to local escalation of privilege that allows actions performed as the System UI, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-193445603","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 46 |
-
CVE-2021-39669,Candidate,"In onCreate of InstallCaCertificateWarning.java, there is a possible way to mislead an user about CA installation circumstances due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-196969991","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 47 |
-
CVE-2021-3967,Candidate,"Improper Access Control in GitHub repository zulip/zulip prior to 4.10.","CONFIRM:https://huntr.dev/bounties/2928a625-0467-4a0a-b4e2-e27322786686 | URL:https://huntr.dev/bounties/2928a625-0467-4a0a-b4e2-e27322786686 | MISC:https://github.com/zulip/zulip/commit/d5db254ca8167995a1654d1c45ffc74b2fade39a | URL:https://github.com/zulip/zulip/commit/d5db254ca8167995a1654d1c45ffc74b2fade39a",Assigned (20211117),"None (candidate not yet proposed)",""
|
| 48 |
-
CVE-2021-39670,Candidate,"In setStream of WallpaperManager.java, there is a possible way to cause a permanent DoS due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-204087139","MISC:https://source.android.com/security/bulletin/2022-05-01 | URL:https://source.android.com/security/bulletin/2022-05-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 49 |
-
CVE-2021-39671,Candidate,"In code generated by aidl_const_expressions.cpp, there is a possible out of bounds read due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-206718630","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 50 |
-
CVE-2021-39672,Candidate,"In fastboot, there is a possible secure boot bypass due to a configuration error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android SoC Android ID: A-202018701","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 51 |
-
CVE-2021-39673,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 52 |
-
CVE-2021-39674,Candidate,"In btm_sec_connected and btm_sec_disconnected of btm_sec.cc file , there is a possible use after free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-201083442","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 53 |
-
CVE-2021-39675,Candidate,"In GKI_getbuf of gki_buffer.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-205729183","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 54 |
-
CVE-2021-39676,Candidate,"In writeThrowable of AndroidFuture.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-197228210","MISC:https://source.android.com/security/bulletin/2022-02-01 | URL:https://source.android.com/security/bulletin/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 55 |
-
CVE-2021-39677,Candidate,"In startVideoStream() there is a possibility of an OOB Read in the heap, when the camera buffer is ‘zero’ in size.Product: AndroidVersions: Android-11Android ID: A-205097028","MISC:https://source.android.com/security/bulletin/aaos/2022-02-01 | URL:https://source.android.com/security/bulletin/aaos/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 56 |
-
CVE-2021-39678,Candidate,"In <TBD> of <TBD>, there is a possible bypass of Factory Reset Protection due to <TBD>. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171742549References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-01-01 | URL:https://source.android.com/security/bulletin/pixel/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 57 |
-
CVE-2021-39679,Candidate,"In init of vendor_graphicbuffer_meta.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188745089References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-01-01 | URL:https://source.android.com/security/bulletin/pixel/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 58 |
-
CVE-2021-3968,Candidate,"vim is vulnerable to Heap-based Buffer Overflow","CONFIRM:https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528 | URL:https://huntr.dev/bounties/00d62924-a7b4-4a61-ba29-acab2eaa1528 | FEDORA:FEDORA-2021-5cd9df120e | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ | FEDORA:FEDORA-2021-b0ac29efb1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69 | URL:https://github.com/vim/vim/commit/a062006b9de0b2947ab5fb376c6e67ef92a8cd69 | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1",Assigned (20211117),"None (candidate not yet proposed)",""
|
| 59 |
-
CVE-2021-39680,Candidate,"In sec_SHA256_Transform of sha256_core.c, there is a possible way to read heap data due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-197965864References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-01-01 | URL:https://source.android.com/security/bulletin/pixel/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 60 |
-
CVE-2021-39681,Candidate,"In delete_protocol of main.c, there is a possible arbitrary code execution due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-200251074References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-01-01 | URL:https://source.android.com/security/bulletin/pixel/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 61 |
-
CVE-2021-39682,Candidate,"In mgm_alloc_page of memory_group_manager.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-201677538References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-01-01 | URL:https://source.android.com/security/bulletin/pixel/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 62 |
-
CVE-2021-39683,Candidate,"In copy_from_mbox of sss_ice_util.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-202003354References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-01-01 | URL:https://source.android.com/security/bulletin/pixel/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 63 |
-
CVE-2021-39684,Candidate,"In target_init of gs101/abl/target/slider/target.c, there is a possible allocation of RWX memory due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-203250788References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-01-01 | URL:https://source.android.com/security/bulletin/pixel/2022-01-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 64 |
-
CVE-2021-39685,Candidate,"In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 65 |
-
CVE-2021-39686,Candidate,"In several functions of binder.c, there is a possible way to represent the wrong domain to SELinux due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-200688826References: Upstream kernel","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 66 |
-
CVE-2021-39687,Candidate,"In HandleTransactionIoEvent of actuator_driver.cc, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204421047References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-02-01 | URL:https://source.android.com/security/bulletin/pixel/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 67 |
-
CVE-2021-39688,Candidate,"In TBD of TBD, there is a possible out of bounds read due to TBD. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206039140References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-02-01 | URL:https://source.android.com/security/bulletin/pixel/2022-02-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 68 |
-
CVE-2021-39689,Candidate,"In multiple functions of odsign_main.cpp, there is a possible way to persist system attack due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-206090748","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 69 |
-
CVE-2021-3969,Candidate,"A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3that could allow a local attacker to elevate privileges.","MISC:https://support.lenovo.com/us/en/product_security/LEN-75210 | URL:https://support.lenovo.com/us/en/product_security/LEN-75210",Assigned (20211117),"None (candidate not yet proposed)",""
|
| 70 |
-
CVE-2021-39690,Candidate,"In setDisplayPadding of WallpaperManagerService.java, there is a possible way to cause a persistent DoS due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-204316511","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 71 |
-
CVE-2021-39691,Candidate,"In WindowManager, there is a possible tapjacking attack due to an incorrect window flag when processing user input. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-157929241","MISC:https://source.android.com/security/bulletin/2022-06-01 | URL:https://source.android.com/security/bulletin/2022-06-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 72 |
-
CVE-2021-39692,Candidate,"In onCreate of SetupLayoutActivity.java, there is a possible way to setup a work profile bypassing user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-209611539","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 73 |
-
CVE-2021-39693,Candidate,"In onUidStateChanged of AppOpsService.java, there is a possible way to access location without a visible indicator due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-208662370","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 74 |
-
CVE-2021-39694,Candidate,"In parse of RoleParser.java, there is a possible way for default apps to get permissions explicitly denied by the user due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-202312327","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 75 |
-
CVE-2021-39695,Candidate,"In createOrUpdate of BasePermission.java, there is a possible permission bypass due to a logic error in the code. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-209607944","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 76 |
-
CVE-2021-39696,Candidate,"In Task.java, there is a possible escalation of privilege due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-185810717","MISC:https://source.android.com/security/bulletin/2022-08-01 | URL:https://source.android.com/security/bulletin/2022-08-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 77 |
-
CVE-2021-39697,Candidate,"In checkFileUriDestination of DownloadProvider.java, there is a possible way to bypass external storage private directories protection due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-200813547","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 78 |
-
CVE-2021-39698,Candidate,"In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 79 |
-
CVE-2021-39699,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 80 |
-
CVE-2021-3970,Candidate,"A potential vulnerability in LenovoVariable SMI Handler due to insufficient validation in some Lenovo Notebook models BIOS may allow an attacker with local access and elevated privileges to execute arbitrary code.","MISC:https://support.lenovo.com/us/en/product_security/LEN-73440 | URL:https://support.lenovo.com/us/en/product_security/LEN-73440",Assigned (20211117),"None (candidate not yet proposed)",""
|
| 81 |
-
CVE-2021-39700,Candidate,"In the policies of adbd.te, there was a logic error which caused the CTS Listening Ports Test to report invalid results. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-201645790","MISC:https://source.android.com/security/bulletin/2022-05-01 | URL:https://source.android.com/security/bulletin/2022-05-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 82 |
-
CVE-2021-39701,Candidate,"In serviceConnection of ControlsProviderLifecycleManager.kt, there is a possible way to keep service running in foreground without notification or permission due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-212286849","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 83 |
-
CVE-2021-39702,Candidate,"In onCreate of RequestManageCredentials.java, there is a possible way for a third party app to install certificates without user approval due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-205150380","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 84 |
-
CVE-2021-39703,Candidate,"In updateState of UsbDeviceManager.java, there is a possible unauthorized access of files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-207057578","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 85 |
-
CVE-2021-39704,Candidate,"In deleteNotificationChannelGroup of NotificationManagerService.java, there is a possible way to run foreground service without user notification due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-209965481","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 86 |
-
CVE-2021-39705,Candidate,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 87 |
-
CVE-2021-39706,Candidate,"In onResume of CredentialStorage.java, there is a possible way to cleanup content of credentials storage due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-200164168","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 88 |
-
CVE-2021-39707,Candidate,"In onReceive of AppRestrictionsFragment.java, there is a possible way to start a phone call without permissions due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-200688991","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 89 |
-
CVE-2021-39708,Candidate,"In gatt_process_notification of gatt_cl.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-206128341","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 90 |
-
CVE-2021-39709,Candidate,"In sendSipAccountsRemovedNotification of SipAccountRegistry.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-208817618","MISC:https://source.android.com/security/bulletin/2022-03-01 | URL:https://source.android.com/security/bulletin/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 91 |
-
CVE-2021-3971,Candidate,"A potential vulnerability by a driver used during older manufacturing processes on some consumer Lenovo Notebook devices that was mistakenly included in the BIOS image could allow an attacker with elevated privileges to modify firmware protection region by modifying an NVRAM variable.","MISC:https://support.lenovo.com/us/en/product_security/LEN-73440 | URL:https://support.lenovo.com/us/en/product_security/LEN-73440",Assigned (20211117),"None (candidate not yet proposed)",""
|
| 92 |
-
CVE-2021-39710,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-202160245References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 93 |
-
CVE-2021-39711,Candidate,"In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 94 |
-
CVE-2021-39712,Candidate,"In TBD of TBD, there is a possible user after free vulnerability due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176918884References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 95 |
-
CVE-2021-39713,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-173788806References: Upstream kernel","MISC:http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html | MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01 | MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 96 |
-
CVE-2021-39714,Candidate,"In ion_buffer_kmap_get of ion.c, there is a possible use-after-free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205573273References: Upstream kernel","MISC:https://source.android.com/security/bulletin/pixel/2022-08-01 | URL:https://source.android.com/security/bulletin/pixel/2022-08-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 97 |
-
CVE-2021-39715,Candidate,"In __show_regs of process.c, there is a possible leak of kernel memory and addresses due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-178379135References: Upstream kernel","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 98 |
-
CVE-2021-39716,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-206977562References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 99 |
-
CVE-2021-39717,Candidate,"In iaxxx_btp_write_words of iaxxx-btp.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198653629References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 100 |
-
CVE-2021-39718,Candidate,"In ProtocolStkProactiveCommandAdapter::Init of protocolstkadapter.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205035540References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 101 |
-
CVE-2021-39719,Candidate,"In lwis_top_register_io of lwis_device_top.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205995178References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 102 |
-
CVE-2021-3972,Candidate,"A potential vulnerability by a driver used during manufacturing process on some consumer Lenovo Notebook devices' BIOS that was mistakenly not deactivated may allow an attacker with elevated privileges to modify secure boot setting by modifying an NVRAM variable.","MISC:https://support.lenovo.com/us/en/product_security/LEN-73440 | URL:https://support.lenovo.com/us/en/product_security/LEN-73440",Assigned (20211117),"None (candidate not yet proposed)",""
|
| 103 |
-
CVE-2021-39720,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-207433926References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 104 |
-
CVE-2021-39721,Candidate,"In TBD of TBD, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195726151References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 105 |
-
CVE-2021-39722,Candidate,"In ProtocolStkProactiveCommandAdapter::Init of protocolstkadapter.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204585345References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 106 |
-
CVE-2021-39723,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-209014813References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 107 |
-
CVE-2021-39724,Candidate,"In TuningProviderBase::GetTuningTreeSet of tuning_provider_base.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205753190References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 108 |
-
CVE-2021-39725,Candidate,"In gasket_free_coherent_memory_all of gasket_page_table.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151454974References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 109 |
-
CVE-2021-39726,Candidate,"In cd_ParseMsg of cd_codec.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-181782896References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 110 |
-
CVE-2021-39727,Candidate,"In eicPresentationRetrieveEntryValue of acropora/app/identity/libeic/EicPresentation.c, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196388042References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 111 |
-
CVE-2021-39728,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 112 |
-
CVE-2021-39729,Candidate,"In the TitanM chip, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-202006191References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 113 |
-
CVE-2021-3973,Candidate,"vim is vulnerable to Heap-based Buffer Overflow","CONFIRM:https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e | URL:https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e | FEDORA:FEDORA-2021-5cd9df120e | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ | FEDORA:FEDORA-2021-b0ac29efb1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 | URL:https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847 | MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1",Assigned (20211117),"None (candidate not yet proposed)",""
|
| 114 |
-
CVE-2021-39730,Candidate,"In TBD of TBD, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206472503References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 115 |
-
CVE-2021-39731,Candidate,"In ProtocolStkProactiveCommandAdapter::Init of protocolstkadapter.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205036834References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 116 |
-
CVE-2021-39732,Candidate,"In copy_io_entries of lwis_ioctl.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205992503References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 117 |
-
CVE-2021-39733,Candidate,"In amcs_cdev_unlocked_ioctl of audiometrics.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-206128522References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 118 |
-
CVE-2021-39734,Candidate,"In sendMessage of OneToOneChatImpl.java (? TBD), there is a possible way to send an RCS message without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208650395References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 119 |
-
CVE-2021-39735,Candidate,"In gasket_alloc_coherent_memory of gasket_page_table.c, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151455484References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 120 |
-
CVE-2021-39736,Candidate,"In prepare_io_entry and prepare_response of lwis_ioctl.c and lwis_periodic_io.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205995773References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 121 |
-
CVE-2021-39737,Candidate,"Product: AndroidVersions: Android kernelAndroid ID: A-208229524References: N/A","MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 122 |
-
CVE-2021-39738,Candidate,"In CarSetings, there is a possible to pair BT device bypassing user's consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-216190509","MISC:https://source.android.com/security/bulletin/aaos/2022-05-01 | URL:https://source.android.com/security/bulletin/aaos/2022-05-01",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 123 |
-
CVE-2021-39739,Candidate,"In ArrayMap, there is a possible leak of the content of SMS messages due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-184525194","MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 124 |
-
CVE-2021-3974,Candidate,"vim is vulnerable to Use After Free","CONFIRM:https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4 | URL:https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4 | FEDORA:FEDORA-2021-5cd9df120e | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ | FEDORA:FEDORA-2021-b0ac29efb1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 | URL:https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 | MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html | MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1",Assigned (20211117),"None (candidate not yet proposed)",""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table103.csv
DELETED
|
@@ -1,77 +0,0 @@
|
|
| 1 |
-
CWE-ID,Name,Weakness Abstraction,Status,Description,Extended Description,Related Weaknesses,Weakness Ordinalities,Applicable Platforms,Background Details,Alternate Terms,Modes Of Introduction,Exploitation Factors,Likelihood of Exploit,Common Consequences,Detection Methods,Potential Mitigations,Observed Examples,Functional Areas,Affected Resources,Taxonomy Mappings,Related Attack Patterns,Notes
|
| 2 |
-
524,Use of Cache Containing Sensitive Information,Base,Incomplete,"The code uses a cache that contains sensitive information, but the cache can be read by an actor outside of the intended control sphere.","Applications may use caches to improve efficiency when communicating with remote entities or performing intensive calculations. A cache maintains a pool of objects, threads, connections, pages, financial data, passwords, or other resources to minimize the time it takes to initialize and access these resources. If the cache is accessible to unauthorized actors, attackers can read the cache and obtain this sensitive information.",::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,::PHASE:Architecture and Design:DESCRIPTION:Protect information stored in cache.::PHASE:Architecture and Design:DESCRIPTION:Do not store unnecessarily sensitive information in the cache.::PHASE:Architecture and Design:DESCRIPTION:Consider using encryption in the cache.::,,,,,::204::,
|
| 3 |
-
525,Use of Web Browser Cache Containing Sensitive Information,Variant,Incomplete,The web application does not use an appropriate caching policy that specifies the extent to which each web page and associated form fields should be cached.,,::NATURE:ChildOf:CWE ID:524:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::,,,"::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:Browsers often store information in a client-side cache, which can leave behind sensitive information for other users to find and exploit, such as passwords or credit card numbers. The locations at most risk include public terminals, such as those in libraries and Internet cafes.::",,::PHASE:Architecture and Design:DESCRIPTION:Protect information stored in cache.::PHASE:Architecture and Design Implementation:DESCRIPTION:Use a restrictive caching policy for forms and web pages that potentially contain sensitive information.::PHASE:Architecture and Design:DESCRIPTION:Do not store unnecessarily sensitive information in the cache.::PHASE:Architecture and Design:DESCRIPTION:Consider using encryption in the cache.::,,,,::TAXONOMY NAME:OWASP Top Ten 2004:ENTRY ID:A2:ENTRY NAME:Broken Access Control:MAPPING FIT:CWE More Specific::TAXONOMY NAME:OWASP Top Ten 2004:ENTRY ID:A3:ENTRY NAME:Broken Authentication and Session Management:MAPPING FIT:CWE More Specific::,::37::,
|
| 4 |
-
526,Cleartext Storage of Sensitive Information in an Environment Variable,Variant,Incomplete,The product uses an environment variable to store unencrypted sensitive information.,"Information stored in an environment variable can be accessible by other processes with the execution context, including child processes that dependencies are executed in, or serverless functions in cloud environments. An environment variable's contents can also be inserted into messages, headers, log files, or other outputs. Often these other dependencies have no need to use the environment variable in question. A weakness that discloses environment variables could expose this information.",::NATURE:ChildOf:CWE ID:312:VIEW ID:1000:ORDINAL:Primary::NATURE:PeerOf:CWE ID:214:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,"::PHASE:Architecture and Design:DESCRIPTION:Encrypt information stored in the environment variable to protect it from being exposed to an unauthorized user. If encryption is not feasible or is considered too expensive for the business use of the application, then consider using a properly protected configuration file instead of an environment variable. It should be understood that unencrypted information in a config file is also not guaranteed to be protected, but it is still a better choice, because it reduces attack surface related to weaknesses such as CWE-214. In some settings, vaults might be a feasible option for safer data transfer. Users should be notified of the business choice made to not protect the sensitive information through encryption.::PHASE:Implementation:DESCRIPTION:If the environment variable is not necessary for the desired behavior, then remove it entirely, or clear it to an empty value.::",::REFERENCE:CVE-2022-43691:DESCRIPTION:CMS shows sensitive server-side information from environment variables when run in Debug mode.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-43691::REFERENCE:CVE-2022-27195:DESCRIPTION:Plugin for an automation server inserts environment variable contents into build XML files.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-27195::REFERENCE:CVE-2022-25264:DESCRIPTION:CI/CD tool logs environment variables related to passwords add Contribution to content history.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-25264::,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,,
|
| 5 |
-
527,Exposure of Version-Control Repository to an Unauthorized Control Sphere,Variant,Incomplete,"The product stores a CVS, git, or other repository in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.","Version control repositories such as CVS or git store version-specific metadata and other details within subdirectories. If these subdirectories are stored on a web server or added to an archive, then these could be used by an attacker. This information may include usernames, filenames, path root, IP addresses, and detailed diff data about how files have been changed - which could reveal source code snippets that were never intended to be made public.",::NATURE:ChildOf:CWE ID:552:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Operation:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data:IMPACT:Read Files or Directories::,,"::PHASE:Operation Distribution System Configuration:DESCRIPTION:Recommendations include removing any CVS directories and repositories from the production server, disabling the use of remote CVS repositories, and ensuring that the latest CVS patches and version updates have been performed.::",,,,,,
|
| 6 |
-
528,Exposure of Core Dump File to an Unauthorized Control Sphere,Variant,Draft,"The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.",,::NATURE:ChildOf:CWE ID:552:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Operation:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data:IMPACT:Read Files or Directories::,,::PHASE:System Configuration:DESCRIPTION:Protect the core dump files from unauthorized access.::,,,,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:MEM06-C:ENTRY NAME:Ensure that sensitive data is not written out to disk::,,
|
| 7 |
-
529,Exposure of Access Control List Files to an Unauthorized Control Sphere,Variant,Incomplete,The product stores access control list files in a directory or other container that is accessible to actors outside of the intended control sphere.,Exposure of these access control list files may give the attacker information about the configuration of the site or system. This information may then be used to bypass the intended security policy or identify trusted systems from which an attack can be launched.,::NATURE:ChildOf:CWE ID:552:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Operation:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::,,,::SCOPE:Confidentiality:SCOPE:Access Control:IMPACT:Read Application Data:IMPACT:Bypass Protection Mechanism::,,::PHASE:System Configuration:DESCRIPTION:Protect access control list files.::,,,,,,
|
| 8 |
-
530,Exposure of Backup File to an Unauthorized Control Sphere,Variant,Incomplete,A backup file is stored in a directory or archive that is made accessible to unauthorized actors.,"Often, older backup files are renamed with an extension such as .~bk to distinguish them from production files. The source code for old files that have been renamed in this manner and left in the webroot can often be retrieved. This renaming may have been performed automatically by the web server, or manually by the administrator.",::NATURE:ChildOf:CWE ID:552:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Operation:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::,,,"::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:At a minimum, an attacker who retrieves this file would have all the information contained in it, whether that be database calls, the format of parameters accepted by the application, or simply information regarding the architectural structure of your site.::",,::PHASE:Policy:DESCRIPTION:Recommendations include implementing a security policy within your organization that prohibits backing up web application source code in the webroot.::,,,,,,
|
| 9 |
-
531,Inclusion of Sensitive Information in Test Code,Variant,Incomplete,"Accessible test applications can pose a variety of security risks. Since developers or administrators rarely consider that someone besides themselves would even know about the existence of these applications, it is common for them to contain sensitive information or functions.",,::NATURE:ChildOf:CWE ID:540:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Testing::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,::PHASE:Distribution Installation:DESCRIPTION:Remove test code before deploying the application into production.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP28:ENTRY NAME:Unexpected access points::,,
|
| 10 |
-
532,,Base,Incomplete,Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.,"While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for: Server log files (e.g. server.log). This can give information on whatever application left the file. Usually this can give full path names and system information, and sometimes usernames and passwords. log files that are used for debugging",::NATURE:ChildOf:CWE ID:538:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:200:VIEW ID:1003:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design:NOTE:COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.::PHASE:Implementation::PHASE:Operation::,,,"::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:Logging sensitive user data often provides attackers with an additional, less-protected path to acquiring the information.::",,::PHASE:Architecture and Design Implementation:DESCRIPTION:Consider seriously the sensitivity of the information written into log files. Do not write secrets into the log files.::PHASE:Distribution:DESCRIPTION:Remove debug log files before deploying the application into production.::PHASE:Operation:DESCRIPTION:Protect log files against unauthorized read/write.::PHASE:Implementation:DESCRIPTION:Adjust configurations appropriately when software is transitioned from a debug state to production.::,::REFERENCE:CVE-2017-9615:DESCRIPTION:verbose logging stores admin credentials in a world-readablelog file:LINK:https://www.cve.org/CVERecord?id=CVE-2017-9615::REFERENCE:CVE-2018-1999036:DESCRIPTION:SSH password for private key stored in build log:LINK:https://www.cve.org/CVERecord?id=CVE-2018-1999036::,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:FIO13-J:ENTRY NAME:Do not log sensitive information outside a trust boundary::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,::215::,
|
| 11 |
-
535,Exposure of Information Through Shell Error Message,Variant,Incomplete,"A command shell error message indicates that there exists an unhandled exception in the web application code. In many cases, an attacker can leverage the conditions that cause these errors in order to gain unauthorized access to the system.",,::NATURE:ChildOf:CWE ID:211:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,,,,,,,
|
| 12 |
-
536,Servlet Runtime Error Message Containing Sensitive Information,Variant,Incomplete,A servlet error message indicates that there exists an unhandled exception in your web application code and may provide useful information to an attacker.,,::NATURE:ChildOf:CWE ID:211:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::,,,"::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:The error message may contain the location of the file in which the offending function is located. This may disclose the web root's absolute path as well as give the attacker the location of application files or configuration information. It may even disclose the portion of code that failed. In many cases, an attacker can use the data to launch further attacks against the system.::",,,,,,,,
|
| 13 |
-
537,Java Runtime Error Message Containing Sensitive Informtion,Variant,Incomplete,"In many cases, an attacker can leverage the conditions that cause unhandled exception errors in order to gain unauthorized access to the system.",,::NATURE:ChildOf:CWE ID:211:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,::PHASE:Implementation:DESCRIPTION:Do not expose sensitive error information to the user.::,,,,,,
|
| 14 |
-
538,Insertion of Sensitive Information into Externally-Accessible File or Directory,Base,Draft,"The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.",,::NATURE:ChildOf:CWE ID:200:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::PHASE:Operation:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::,,,::SCOPE:Confidentiality:IMPACT:Read Files or Directories::,,::PHASE:Architecture and Design Operation System Configuration:DESCRIPTION:Do not expose file and directory information to the user.::,,,,,::95::,"::TYPE:Maintenance:NOTE:Depending on usage, this could be a weakness or a category. Further study of all its children is needed, and the entire sub-tree may need to be clarified. The current organization is based primarily on the exposure of sensitive information as a consequence, instead of as a primary weakness.::TYPE:Maintenance:NOTE:There is a close relationship with CWE-552, which is more focused on weaknesses. As a result, it may be more appropriate to convert CWE-538 to a category.::"
|
| 15 |
-
539,Use of Persistent Cookies Containing Sensitive Information,Variant,Incomplete,"The web application uses persistent cookies, but the cookies contain sensitive information.","Cookies are small bits of data that are sent by the web application but stored locally in the browser. This lets the application use the cookie to pass information between pages and store variable information. The web application controls what information is stored in a cookie and how it is used. Typical types of information stored in cookies are session identifiers, personalization and customization information, and in rare cases even usernames to enable automated logins. There are two different types of cookies: session cookies and persistent cookies. Session cookies just live in the browser's memory and are not stored anywhere, but persistent cookies are stored on the browser's hard drive. This can cause security and privacy issues depending on the information stored in the cookie and how it is accessed.",::NATURE:ChildOf:CWE ID:552:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,::PHASE:Architecture and Design:DESCRIPTION:Do not store sensitive information in persistent cookies.::,,,,,::21::31::39::59::60::,
|
| 16 |
-
540,Inclusion of Sensitive Information in Source Code,Base,Incomplete,Source code on a web server or repository often contains sensitive information and should generally not be accessible to users.,"There are situations where it is critical to remove source code from an area or server. For example, obtaining Perl source code on a system allows an attacker to understand the logic of the script and extract extremely useful information such as code bugs or logins and passwords.",::NATURE:ChildOf:CWE ID:538:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,::PHASE:Architecture and Design System Configuration:DESCRIPTION:Recommendations include removing this script from the web server and moving it to a location not accessible from the Internet.::,,,,,,
|
| 17 |
-
541,Inclusion of Sensitive Information in an Include File,Variant,Incomplete,"If an include file source is accessible, the file can contain usernames and passwords, as well as sensitive information pertaining to the application and system.",,::NATURE:ChildOf:CWE ID:540:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,::PHASE:Architecture and Design:DESCRIPTION:Do not store sensitive information in include files.::PHASE:Architecture and Design System Configuration:DESCRIPTION:Protect include files from being exposed.::,,,,,,
|
| 18 |
-
543,Use of Singleton Pattern Without Synchronization in a Multithreaded Context,Variant,Incomplete,The product uses the singleton pattern when creating a resource within a multithreaded environment.,The use of a singleton pattern may not be thread-safe.,::NATURE:ChildOf:CWE ID:820:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:662:VIEW ID:1305:ORDINAL:Primary::NATURE:ChildOf:CWE ID:662:VIEW ID:1340:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:SCOPE:Integrity:IMPACT:Other:IMPACT:Modify Application Data::,,"::PHASE:Architecture and Design:DESCRIPTION:Use the Thread-Specific Storage Pattern. See References.::PHASE:Implementation:DESCRIPTION:Do not use member fields to store information in the Servlet. In multithreading environments, storing user data in Servlet member fields introduces a data access race condition.::PHASE:Implementation:DESCRIPTION:Avoid using the double-checked locking pattern in language versions that cannot guarantee thread safety. This pattern may be used to avoid the overhead of a synchronized call, but in certain versions of Java (for example), this has been shown to be unsafe because it still introduces a race condition (CWE-209).:EFFECTIVENESS:Limited::",,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:MSC07-J:ENTRY NAME:Prevent multiple instantiations of singleton objects::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP19:ENTRY NAME:Missing Lock::,,
|
| 19 |
-
544,,Base,Draft,"The product does not use a standardized method for handling errors throughout the code, which might introduce inconsistent error handling and resultant weaknesses.","If the product handles error messages individually, on a one-by-one basis, this is likely to result in inconsistent error handling. The causes of errors may be lost. Also, detailed information about the causes of an error may be unintentionally returned to the user.",::NATURE:ChildOf:CWE ID:755:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::,,,::SCOPE:Integrity:SCOPE:Other:IMPACT:Quality Degradation:IMPACT:Unexpected State:IMPACT:Varies by Context::,,"::PHASE:Architecture and Design:DESCRIPTION:define a strategy for handling errors of different severities, such as fatal errors versus basic log events. Use or create built-in language features, or an external package, that provides an easy-to-use API and define coding standards for the detection and handling of errors.::",,,,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:ERR00-C:ENTRY NAME:Adopt and implement a consistent and comprehensive error-handling policy::,,
|
| 20 |
-
546,SuspiciousComment,Variant,Draft,"The code contains comments that suggest the presence of bugs, incomplete functionality, or weaknesses.","Many suspicious comments, such as BUG, HACK, FIXME, LATER, LATER2, TODO, in the code indicate missing security functionality and checking. Others indicate code problems that programmers should fix, such as hard-coded variables, error handling, not using stored procedures, and performance issues.",::NATURE:ChildOf:CWE ID:1078:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation:NOTE:Suspicious comments could be an indication that there are problems in the source code that may need to be fixed and is an indication of poor quality. This could lead to further bugs and the introduction of weaknesses.::,,"::PHASE:Documentation:DESCRIPTION:Remove comments that suggest the presence of bugs, incomplete functionality, or weaknesses, before deploying the application.::",,,,,,
|
| 21 |
-
5#7,"Use of Hard-coded, Security-relevant Constants",Variant,Draft,"The product uses hard-coded constants instead of symbolic names for security-critical values, which increases the likelihood of mistakes during code maintenance or security policy change.","If the developer does not find all occurrences of the hard-coded constants, an incorrect policy decision may be made if one of the constants is not changed. Making changes to these values will require code changes that may be difficult or impossible once the system is released to the field. In addition, these hard-coded values may become available to attackers if the code is ever disclosed.",::NATURE:ChildOf:CWE ID:1078:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::,,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Varies by Context:IMPACT:Quality Degradation:NOTE:The existence of hardcoded constants could cause unexpected behavior and the introduction of weaknesses during code maintenance or when making changes to the code if all occurrences are not modified. The use of hardcoded constants is an indication of poor quality.::,,::PHASE:Implementation:DESCRIPTION:Avoid using hard-coded constants. Configuration files offer a more flexible solution.::,,,,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:DCL06-C:ENTRY NAME:Use meaningful symbolic constants to represent literal values in program logic::,,
|
| 22 |
-
548,Exposure of Information Through Directory Listing,Variant,Draft,"A directory listing is inappropriately exposed, yielding potentially sensitive information to attackers.",A directory listing provides an attacker with the complete index of all the resources located inside of the directory. The specific risks and consequences vary depending on which files are listed and accessible.,::NATURE:ChildOf:CWE ID:497:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::PHASE:Operation::,,,"::SCOPE:Confidentiality:IMPACT:Read Files or Directories:NOTE:Exposing the contents of a directory can lead to an attacker gaining access to source code or providing useful information for the attacker to devise exploits, such as creation times of files or any information that may be encoded in file names. The directory listing may also compromise private or confidential data.::",,"::PHASE:Architecture and Design System Configuration:DESCRIPTION:Recommendations include restricting access to important directories or files by adopting a need to know requirement for both the document and server root, and turning off features such as Automatic Directory Listings that could expose private files and provide information that could be utilized by an attacker when formulating or conducting an attack.::",,,,::TAXONOMY NAME:OWASP Top Ten 2004:ENTRY ID:A10:ENTRY NAME:Insecure Configuration Management:MAPPING FIT:CWE More Specific::TAXONOMY NAME:WASC:ENTRY ID:16:ENTRY NAME:Directory Indexing::,,
|
| 23 |
-
,Missing Password Field Masking,Base,Draft,"The product does not mask passwords during entry, increasing the potential for attackers to observe and capture passwords.",,::NATURE:ChildOf:CWE ID:522:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::,,,::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism::,,::PHASE:Implementation Requirements:DESCRIPTION:Recommendations include requiring all password fields in your web application be masked to prevent other users from seeing this information.::,,,,,,
|
| 24 |
-
550,Server-generated Error Message Containing Sensitive Information,Variant,Incomplete,"Certain conditions, such as network failure, will cause a server error message to be displayed.","While error messages in and of themselves are not dangerous, per se, it is what an attacker can glean from them that might cause eventual problems.",::NATURE:ChildOf:CWE ID:209:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation:NOTE:REALIZATION: This weakness is caused during implementation of an architectural security tactic.::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data::,,"::PHASE:Architecture and Design System Configuration:DESCRIPTION:Recommendations include designing and adding consistent error handling mechanisms which are capable of handling any user input to your web application, providing meaningful detail to end-users, and preventing error messages that might provide information useful to an attacker from being displayed.::",,,,,,
|
| 25 |
-
551,Incorrect Behavior Order: Authorization Before Parsing and Canonicalization,Base,Incomplete,"If a web server does not fully parse requested URLs before it examines them for authorization, it may be possible for an attacker to bypass authorization protection.","For instance, the character strings /./ and / both mean current directory. If /SomeDirectory is a protected directory and an attacker requests /./SomeDirectory, the attacker may be able to gain access to the resource if /./ is not converted to / before the authorization check is performed.",::NATURE:ChildOf:CWE ID:863:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:696:VIEW ID:1000::,,,,,::PHASE:Implementation:NOTE:REALIZATION: This weakness is caused during implementation of an architectural security tactic.::,,,::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism::,,::PHASE:Architecture and Design:DESCRIPTION:URL Inputs should be decoded and canonicalized to the application's current internal representation before being validated and processed for authorization. Make sure that your application does not decode the same input twice. Such errors could be used to bypass allowlist schemes by introducing dangerous inputs after they have been checked.::,,,,,,
|
| 26 |
-
552,Files or Directories Accessible to External Parties,Base,Draft,"The product makes files or directories accessible to unauthorized actors, even though they should not be.","Web servers, FTP servers, and similar servers may store a set of files underneath a root directory that is accessible to the server's users. Applications may store sensitive files underneath this root without also using access control to limit which users may request those files, if any. Alternately, an application might package multiple files or directories into an archive file (e.g., ZIP or tar), but the application might not exclude sensitive files that are underneath those directories. In cloud technologies and containers, this weakness might present itself in the form of public (i.e., anonymous) access being allowed/overwritten to storage accounts.",::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:668:VIEW ID:1003:ORDINAL:Primary::NATURE:ChildOf:CWE ID:285:VIEW ID:1000::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::TECHNOLOGY CLASS:Not Technology-Specific:TECHNOLOGY PREVALENCE:Undetermined::TECHNOLOGY CLASS:Cloud Computing:TECHNOLOGY PREVALENCE:Undetermined::,,,::PHASE:Implementation:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::PHASE:Operation:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::,,,::SCOPE:Confidentiality:SCOPE:Integrity:IMPACT:Read Files or Directories:IMPACT:Modify Files or Directories::,,"::PHASE:Implementation System Configuration Operation:DESCRIPTION:When storing data in the cloud (e.g., S3 buckets, Azure blobs, Google Cloud Storage, etc.), use the provider's controls to disable public access.::",,,::File or Directory::,::TAXONOMY NAME:OWASP Top Ten 2004:ENTRY ID:A10:ENTRY NAME:Insecure Configuration Management:MAPPING FIT:CWE More Specific::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:FIO15-C:ENTRY NAME:Ensure that file operations are performed in a secure directory::,::150::639::,
|
| 27 |
-
553,Command Shell in Externally Accessible Directory,Variant,Incomplete,A possible shell file exists in /cgi-bin/ or other accessible directories. This is extremely dangerous and can be used by an attacker to execute commands on the web server.,,::NATURE:ChildOf:CWE ID:552:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:IMPACT:Execute Unauthorized Code or Commands::,,::PHASE:Installation System Configuration:DESCRIPTION:Remove any Shells accessible under the web root folder and children directories.::,,,,,::650::,
|
| 28 |
-
55,ASP.NET Misconfiguration: Not Using Input Validation Framework,Variant,Draft,The ASP.NET application does not use an input validation framework.,,::NATURE:ChildOf:CWE ID:1173:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::,::LANGUAGE NAME:ASP.NET:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,"::SCOPE:Integrity:IMPACT:Unexpected State:NOTE:Unchecked input leads to cross-site scripting, process control, and SQL injection vulnerabilities, among others.::",,::PHASE:Architecture and Design:DESCRIPTION:Use the ASP.NET validation framework to check all program input before it is processed by the application. Example uses of the validation framework include checking to ensure that: Phone number fields contain only valid characters in phone numbers Boolean values are only T or F Free-form strings are of a reasonable length and composition::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP24:ENTRY NAME:Tainted input to command::,,
|
| 29 |
-
,J2EE Misconfiguration: Plaintext Password in Configuration File,Variant,Draft,The J2EE application stores a plaintext password in a configuration file.,"Storing a plaintext password in a configuration file allows anyone who can read the file to access the password-protected resource, making it an easy target for attackers.",::NATURE:ChildOf:CWE ID:260:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism::,,::PHASE:Architecture and Design:DESCRIPTION:Do not hardwire passwords into your software.::PHASE:Architecture and Design:DESCRIPTION:Use industry standard libraries to encrypt passwords before storage in configuration files.::,,,,,,
|
| 30 |
-
556,ASP.NET Misconfiguration: Use of Identity Impersonation,Variant,Incomplete,Configuring an ASP.NET application to run with impersonated credentials may give the application unnecessary privileges.,The use of impersonated credentials allows an ASP.NET application to run with either the privileges of the client on whose behalf it is executing or with arbitrary privileges granted in its configuration.,::NATURE:ChildOf:CWE ID:266:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Access Control:IMPACT:Gain Privileges or Assume Identity::,,::PHASE:Architecture and Design:DESCRIPTION:Use the least privilege principle.::,,,,,,
|
| 31 |
-
558,Use of getlogin() in Multithreaded Application,Variant,Draft,"The product uses the getlogin() function in a multithreaded context, potentially causing it to return incorrect values.","The getlogin() function returns a pointer to a string that contains the name of the user associated with the calling process. The function is not reentrant, meaning that if it is called from another process, the contents are not locked out and the value of the string can be changed by another process. This makes it very risky to use because the username can be changed by other processes, so the results of the function cannot be trusted.",::NATURE:ChildOf:CWE ID:663:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Integrity:SCOPE:Access Control:SCOPE:Other:IMPACT:Modify Application Data:IMPACT:Bypass Protection Mechanism:IMPACT:Other::,,"::PHASE:Architecture and Design:DESCRIPTION:Using names for security purposes is not advised. Names are easy to forge and can have overlapping user IDs, potentially causing confusion or impersonation.::PHASE:Implementation:DESCRIPTION:Use getlogin_r() instead, which is reentrant, meaning that other processes are locked out from changing the username.::",,,,::TAXONOMY NAME:7 Pernicious Kingdoms:ENTRY NAME:Often Misused: Authentication::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,,
|
| 32 |
-
560,Use of umask() with chmod-style Argument,Variant,Draft,The product calls umask() with an incorrect argument that is specified as if it is an argument to chmod().,,::NATURE:ChildOf:CWE ID:687:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Access Control:IMPACT:Read Files or Directories:IMPACT:Modify Files or Directories:IMPACT:Bypass Protection Mechanism::,,"::PHASE:Implementation:DESCRIPTION:Use umask() with the correct argument.::PHASE:Testing:DESCRIPTION:If you suspect misuse of umask(), you can use grep to spot call instances of umask().::",,,,,,"::TYPE:Other:NOTE:Some umask() manual pages begin with the false statement: umask sets the umask to mask & 0777 Although this behavior would better align with the usage of chmod(), where the user provided argument specifies the bits to enable on the specified file, the behavior of umask() is in fact opposite: umask() sets the umask to ~mask & 0777. The documentation goes on to describe the correct usage of umask(): The umask is used by open() to set initial file permissions on a newly-created file. Specifically, permissions in the umask are turned off from the mode argument to open(2) (so, for example, the common umask default value of 022 results in new files being created with permissions 0666 & ~022 = 0644 = rw-r--r-- in the usual case where the mode is specified as 0666).::"
|
| 33 |
-
561,,Base,Draft,"The product contains dead code, which can never be executed.",Dead code is code that can never be executed in a running program. The surrounding code makes it impossible for a section of code to ever be executed.,::NATURE:ChildOf:CWE ID:1164:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation:NOTE:Dead code that results from code that can never be executed is an indication of problems with the source code that needs to be fixed and is an indication of poor quality.::SCOPE:Other:IMPACT:Reduce Maintainability::,"::METHOD:Architecture or Design Review:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.) Formal Methods / Correct-By-Construction Cost effective for partial coverage: Attack Modeling:EFFECTIVENESS:High::METHOD:Automated Static Analysis - Binary or Bytecode:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Binary / Bytecode Quality Analysis Compare binary / bytecode to application permission manifest:EFFECTIVENESS:High::METHOD:Dynamic Analysis with Manual Results Interpretation:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Automated Monitored Execution:EFFECTIVENESS:SOAR Partial::METHOD:Automated Static Analysis:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Permission Manifest Analysis:EFFECTIVENESS:SOAR Partial::METHOD:Automated Static Analysis - Source Code:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Source Code Quality Analyzer Cost effective for partial coverage: Warning Flags Source code Weakness Analyzer Context-configured Source Code Weakness Analyzer:EFFECTIVENESS:High::METHOD:Dynamic Analysis with Automated Results Interpretation:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Cost effective for partial coverage: Web Application Scanner Web Services Scanner Database Scanners:EFFECTIVENESS:SOAR Partial::METHOD:Manual Static Analysis - Source Code:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Manual Source Code Review (not inspections) Cost effective for partial coverage: Focused Manual Spotcheck - Focused manual analysis of source:EFFECTIVENESS:High::",::PHASE:Implementation:DESCRIPTION:Remove dead code before deploying the application.::PHASE:Testing:DESCRIPTION:Use a static analysis tool to spot dead code.::,"::REFERENCE:CVE-2014-1266:DESCRIPTION:chain: incorrect goto in Apple SSL product bypasses certificate validation, allowing Adversary-in-the-Middle (AITM) attack (Apple goto fail bug). CWE-705 (Incorrect Control Flow Scoping) -> CWE-561 (Dead Code) -> CWE-295 (Improper Certificate Validation) -> CWE-393 (Return of Wrong Status Code) -> CWE-300 (Channel Accessible by Non-Endpoint).:LINK:https://www.cve.org/CVERecord?id=CVE-2014-1266::",,,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:MSC07-C:ENTRY NAME:Detect and remove dead code::TAXONOMY NAME:SEI CERT Perl Coding Standard:ENTRY ID:MSC00-PL:ENTRY NAME:Detect and remove dead code:MAPPING FIT:Exact::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP2:ENTRY NAME:Unused Entities::TAXONOMY NAME:OMG ASCMM:ENTRY ID:ASCMM-MNT-20::,,
|
| 34 |
-
#@562**,Return of Stack Variable Address,Base,Draft,"A function returns the address of a stack variable, which will cause unintended program behavior, typically in the form of a crash.","Because local variables are allocated on the stack, when a program returns a pointer to a local variable, it is returning a stack address. A subsequent function call is likely to re-use this same stack address, thereby overwriting the value of the pointer, which no longer corresponds to the same variable since a function's stack frame is invalidated when it returns. At best this will cause the value of the pointer to change unexpectedly. In many cases it causes the program to crash the next time the pointer is dereferenced.",::NATURE:ChildOf:CWE ID:758:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:672:VIEW ID:1000::NATURE:CanPrecede:CWE ID:825:VIEW ID:1000::,::ORDINALITY:Indirect::ORDINALITY:Primary::,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,"::SCOPE:Availability:SCOPE:Integrity:SCOPE:Confidentiality:IMPACT:Read Memory:IMPACT:Modify Memory:IMPACT:Execute Unauthorized Code or Commands:IMPACT:DoS: Crash, Exit, or Restart:NOTE:If the returned stack buffer address is dereferenced after the return, then an attacker may be able to modify or read memory, depending on how the address is used. If the address is used for reading, then the address itself may be exposed, or the contents that the address points to. If the address is used for writing, this can lead to a crash and possibly code execution.::",,::PHASE:Testing:DESCRIPTION:Use static analysis tools to spot return of the address of a stack variable.::,,,,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:DCL30-C:ENTRY NAME:Declare objects with appropriate storage durations:MAPPING FIT:CWE More Specific::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:POS34-C:ENTRY NAME:Do not call putenv() with a pointer to an automatic variable as the argument::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in computation::,,
|
| 35 |
-
563,Assignment to Variable without Use,Variant,Draft,"The variable's value is assigned but never used, making it a dead store.","After the assignment, the variable is either assigned another value or goes out of scope. It is likely that the variable is simply vestigial, but it is also possible that the unused variable points out a bug.",::NATURE:ChildOf:CWE ID:1164:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::,,,::TERM:Unused Variable::,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation:IMPACT:Varies by Context:NOTE:This weakness could be an indication of a bug in the program or a deprecated variable that was not removed and is an indication of poor quality. This could lead to further bugs and the introduction of weaknesses.::,,::PHASE:Implementation:DESCRIPTION:Remove unused variables from the code.::,,,,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:MSC00-C:ENTRY NAME:Compile cleanly at high warning levels::TAXONOMY NAME:SEI CERT Perl Coding Standard:ENTRY ID:MSC01-PL:ENTRY NAME:Detect and remove unused variables:MAPPING FIT:Imprecise::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP2:ENTRY NAME:Unused Entities::,,
|
| 36 |
-
564,SQL Injection: Hibernate,Variant,Incomplete,Using Hibernate to execute a dynamic SQL statement built with user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands.,,::NATURE:ChildOf:CWE ID:89:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:89:VIEW ID:928:ORDINAL:Primary::NATURE:ChildOf:CWE ID:89:VIEW ID:1305:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:IMPACT:Read Application Data:IMPACT:Modify Application Data::,,"::PHASE:Requirements:DESCRIPTION:A non-SQL style database which is not subject to this flaw may be chosen.::PHASE:Architecture and Design:DESCRIPTION:Follow the principle of least privilege when creating user accounts to a SQL database. Users should only have the minimum privileges necessary to use their account. If the requirements of the system indicate that a user can read and modify their own data, then limit their privileges so they cannot read/write others' data.::PHASE:Architecture and Design:DESCRIPTION:For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.::PHASE:Implementation:DESCRIPTION:Implement SQL strings using prepared statements that bind variables. Prepared statements that do not bind variables can be vulnerable to attack.::PHASE:Implementation:DESCRIPTION:Use vigorous allowlist style checking on any user input that may be used in a SQL command. Rather than escape meta-characters, it is safest to disallow them entirely. Reason: Later use of data that have been entered in the database may neglect to escape meta-characters before use. Narrowly define the set of safe characters based on the expected value of the parameter in the request.::",,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP24:ENTRY NAME:Tainted input to command::,::109::,
|
| 37 |
-
56,Reliance on Cookies and Validation without Integrity Checking,Base,Incomplete,"The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.","Attackers can easily modify cookies, within the browser or by implementing the client-side code outside of the browser. Reliance on cookies without detailed validation and integrity checking can allow attackers to bypass authentication, conduct injection attacks such as SQL injection and cross-site scripting, or otherwise modify inputs in unexpected ways.",::NATURE:ChildOf:CWE ID:642:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:669:VIEW ID:1003:ORDINAL:Primary::NATURE:ChildOf:CWE ID:602:VIEW ID:1000::,,,,,::PHASE:Architecture and Design:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::PHASE:Implementation::,,,::SCOPE:Access Control:IMPACT:Gain Privileges or Assume Identity:NOTE:It is dangerous to use cookies to set a user's privileges. The cookie can be manipulated to escalate an attacker's privileges to an administrative level.::,,"::PHASE:Architecture and Design:DESCRIPTION:Avoid using cookie data for a security-related decision.::PHASE:Implementation:DESCRIPTION:Perform thorough input validation (i.e.: server side validation) on the cookie data if you're going to use it for a security related decision.::PHASE:Architecture and Design:DESCRIPTION:Add integrity checks to detect tampering.::PHASE:Architecture and Design:DESCRIPTION:Protect critical cookies from replay attacks, since cross-site scripting or other attacks may allow attackers to steal a strongly-encrypted cookie that also passes integrity checks. This mitigation applies to cookies that should only be valid during a single transaction or session. By enforcing timeouts, you may limit the scope of an attack. As part of your integrity check, use an unpredictable, server-side value that is not exposed to the client.::",,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP29:ENTRY NAME:Faulty endpoint authentication::,::226::31::39::,"::TYPE:Relationship:NOTE:This problem can be primary to many types of weaknesses in web applications. A developer may perform proper validation against URL parameters while assuming that attackers cannot modify cookies. As a result, the program might skip basic input validation to enable cross-site scripting, SQL injection, price tampering, and other attacks..::"
|
| 38 |
-
5##**66,Authorization Bypass Through User-Controled SQL Primary Key,Variant,Incomplete,"The product uses a database table that includes records that should not be accessible to an actor, but it executes a SQL statement with a primary key that can be controlled by that actor.","When a user can set a primary key to any value, then the user can modify the key to point to unauthorized records. Database access control errors occur when: Data enters a program from an untrusted source. The data is used to specify the value of a primary key in a SQL query. The untrusted source does not have the permissions to be able to access all rows in the associated table.",::NATURE:ChildOf:CWE ID:639:VIEW ID:1000:ORDINAL:Primary::,,::TECHNOLOGY NAME:Database Server:TECHNOLOGY PREVALENCE:Often::,,,::PHASE:Architecture and Design:NOTE:COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.::PHASE:Implementation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Access Control:IMPACT:Read Application Data:IMPACT:Modify Application Data:IMPACT:Bypass Protection Mechanism::,,"::PHASE:Implementation:DESCRIPTION:Assume all input is malicious. Use a standard input validation mechanism to validate all input for length, type, syntax, and business rules before accepting the data. Use an accept known good validation strategy.::PHASE:Implementation:DESCRIPTION:Use a parameterized query AND make sure that the accepted values conform to the business rules. Construct your SQL statement accordingly.::",,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP25:ENTRY NAME:Tainted input to variable::,,
|
| 39 |
-
532,Insertion of Sensitive Information into Log File,Base,Incomplete,Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.,"While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers. Different log files may be produced and stored for: Server log files (e.g. server.log). This can give information on whatever application left the file. Usually this can give full path names and system information, and sometimes usernames and passwords. log files that are used for debugging",::NATURE:ChildOf:CWE ID:538:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:200:VIEW ID:1003:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design:NOTE:COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.::PHASE:Implementation::PHASE:Operation::,,,"::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:Logging sensitive user data often provides attackers with an additional, less-protected path to acquiring the information.::",,::PHASE:Architecture and Design Implementation:DESCRIPTION:Consider seriously the sensitivity of the information written into log files. Do not write secrets into the log files.::PHASE:Distribution:DESCRIPTION:Remove debug log files before deploying the application into production.::PHASE:Operation:DESCRIPTION:Protect log files against unauthorized read/write.::PHASE:Implementation:DESCRIPTION:Adjust configurations appropriately when software is transitioned from a debug state to production.::,::REFERENCE:CVE-2017-9615:DESCRIPTION:verbose logging stores admin credentials in a world-readablelog file:LINK:https://www.cve.org/CVERecord?id=CVE-2017-9615::REFERENCE:CVE-2018-1999036:DESCRIPTION:SSH password for private key stored in build log:LINK:https://www.cve.org/CVERecord?id=CVE-2018-1999036::,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:FIO13-J:ENTRY NAME:Do not log sensitive information outside a trust boundary::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,::215::,
|
| 40 |
-
524,cinq cent vingt-quatre,,,year,,,,,,,,,,,,,,,,,,
|
| 41 |
-
525,cinq cent vingt-cinq,,,year,,,,,,,,,,,,,,,,,,
|
| 42 |
-
526,cinq cent vingt-six,,,year,,,,,,,,,,,,,,,,,,
|
| 43 |
-
527,cinq cent vingt-sept,,,year,,,,,,,,,,,,,,,,,,
|
| 44 |
-
528,cinq cent vingt-huit,,,year,,,,,,,,,,,,,,,,,,
|
| 45 |
-
529,cinq cent vingt-neuf,,,year,,,,,,,,,,,,,,,,,,
|
| 46 |
-
530,cinq cent trente,,,year,,,,,,,,,,,,,,,,,,
|
| 47 |
-
531,cinq cent trente et un,,,year,,,,,,,,,,,,,,,,,,
|
| 48 |
-
532,cinq cent trente-deux,,,year,,,,,,,,,,,,,,,,,,
|
| 49 |
-
535,cinq trente-cinq cent,,,year,,,,,,,,,,,,,,,,,,
|
| 50 |
-
536,cinq cent trente-six,,,year,,,,,,,,,,,,,,,,,,
|
| 51 |
-
537,cinq cent trente-sept,,,year,,,,,,,,,,,,,,,,,,
|
| 52 |
-
53,cinq cent trente-huit,,,year,,,,,,,,,,,,,,,,,,
|
| 53 |
-
539,,,,year,,,,,,,,,,,,,,,,,,
|
| 54 |
-
540,cinq cent quarante,,,year,,,,,,,,,,,,,,,,,,
|
| 55 |
-
541,cinq cent quarante et un,,,year,,,,,,,,,,,,,,,,,,
|
| 56 |
-
543,cinq cent quarante-trois,,,year,,,,,,,,,,,,,,,,,,
|
| 57 |
-
544,,,,year,,,,,,,,,,,,,,,,,,
|
| 58 |
-
546,cinq cent q*@uarante-s$ix,,,year,,,,,,,,,,,,,,,,,,
|
| 59 |
-
547,cinq cent quarante-sept,,,year,,,,,,,,,,,,,,,,,,
|
| 60 |
-
548,quarante-huit cent cinq,,,year,,,,,,,,,,,,,,,,,,
|
| 61 |
-
549,cinq cent quarante-neuf,,,year,,,,,,,,,,,,,,,,,,
|
| 62 |
-
550,,,,year,,,,,,,,,,,,,,,,,,
|
| 63 |
-
51,cinq cent cinquante et un,,,year,,,,,,,,,,,,,,,,,,
|
| 64 |
-
552,cinq cent cinquante-deux,,,year,,,,,,,,,,,,,,,,,,
|
| 65 |
-
553,cinq cent cinquante-trois,,,year,,,,,,,,,,,,,,,,,,
|
| 66 |
-
554,cinq cent cinquante-quatre,,,year,,,,,,,,,,,,,,,,,,
|
| 67 |
-
555,cinqcentcinquante-cinq,,,year,,,,,,,,,,,,,,,,,,
|
| 68 |
-
556,cinq cent cinquant-six,,,year,,,,,,,,,,,,,,,,,,
|
| 69 |
-
558,cinq cent cinquante-huit,,,year,,,,,,,,,,,,,,,,,,
|
| 70 |
-
560,cinq cent soixante,,,year,,,,,,,,,,,,,,,,,,
|
| 71 |
-
561,cinq cent soixante et un,,,year,,,,,,,,,,,,,,,,,,
|
| 72 |
-
562,cinq cent soixante-deux,,,year,,,,,,,,,,,,,,,,,,
|
| 73 |
-
563,cinq cent soixante-trois,,,year,,,,,,,,,,,,,,,,,,
|
| 74 |
-
564,cinq cent soixante-quatre,,,year,,,,,,,,,,,,,,,,,,
|
| 75 |
-
55,cinq cent soixante-cinq,,,year,,,,,,,,,,,,,,,,,,
|
| 76 |
-
566,cinq cent soixante-six,,,year,,,,,,,,,,,,,,,,,,
|
| 77 |
-
532,cinq cent trente deux,,,year,,,,,,,,,,,,,,,,,,
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1030.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-39740,,"In Messaging, there is a possible way to bypass attachment restrictions due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-209965112",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-39741,Candidate,"In Keymaster, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-173567719",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-39742,Candidate,"In Voicemail, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-186405602",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-39743,,"In PackageManager, there is a possible way to update the last usage time of another package due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-201534884",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-39744,Candidate,"In DevicePolicyManager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-192369136",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-39745,Candidate,"In DevicePolicyManager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-206127671",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 8 |
-
,,"In PermissionController, there is a possible way to delete some local files due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-194696395",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-39747,Candidate,"In Settings Provider, there is a possible way to list values of non-readable global settings due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-208268457",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-39748,,"In InputMethodEditor, there is a possible way to access some files accessible to Settings due to an unsafe PendingIntent. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-203777141",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-39749,Candidate,"In WindowManager, there is a possible way to start non-exported and protected activities due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-205996115",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-3975,Candidate,A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.,CONFIRM:https://security.netapp.com/advisory/ntap-20221201-0002/ | MISC:https://access.redhat.com/security/cve/CVE-2021-3975 | URL:https://access.redhat.com/security/cve/CVE-2021-3975 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2024326 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2024326 | MISC:https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7 | URL:https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7 | MISC:https://ubuntu.com/security/CVE-2021-3975 | URL:https://ubuntu.com/security/CVE-2021-3975,Assigned (20211118),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-39750,Candidate,"In PackageManager, there is a possible way to change the splash screen theme of other apps due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-206474016",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-39751,Candidate,"In Settings, there is a possible way to read Bluetooth device names without proper permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-172838801",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 15 |
-
,Candidate,"In Bubbles, there is a possible way to interfere with Bubbles due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-202756848",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-39753,Candidate,"In DomainVerificationService, there is a possible way to access app domain verification information due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-200035185",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-39754,Candidate,"In ContextImpl, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions:Android ID: A-207133709",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-39755,Candidate,"In DevicePolicyManager, there is a possible way to reveal the existence of an installed package without proper query permissions due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-204995407",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-39756,Candidate,"In Framework, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-184354287",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-39757,,"In PermissionController, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-176094662",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-39758,,"In WindowManager, there is a possible way to start a foreground activity from the background due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-205130886",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-39759,Candidate,"In libstagefright, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-180200830",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-3976,Candidate,kimai2 is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406 | URL:https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406 | MISC:https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e | URL:https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e,Assigned (20211118),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-39760,Candidate,"In AudioService, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-194110526",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-39761,Candidate,"In Media, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-179783181",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 26 |
-
CVE-021-39762,Candidate,"In tremolo, there is a possible out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-210625816",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-39763,Candidate,"In Settings, there is a possible way to make the user enable WiFi due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-199176115",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-39764,Candidate,"In Settings, there is a possible way to display an incorrect app name due to improper input validation. This could lead to local escalation of privilege via app spoofing with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-170642995",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-39765,,"In Gallery, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-201535427",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-39766,Candidate,"In Settings, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-198296421",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-39767,Candidate,"In miniadb, there is a possible way to get read/write access to recovery system properties due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-201308542",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-39768,Candidate,"In Settings, there is a possible way to add an auto-connect WiFi network without the user's consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-202017876",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-39769,Candidate,"In Device Policy, there is a possible way to determine whether an app is installed, without query permissions, due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-193663287",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-3977,Candidate,invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde | URL:https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde | MISC:https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f | URL:https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f,Assigned (20211118),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-39770,Candidate,"In Framework, there is a possible disclosure of the device owner package due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-193033501",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-39771,Candidate,"In Settings, there is a possible way to misrepresent which app wants to add a wifi network due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-198661951",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-39772,Candidate,"In Bluetooth, there is a possible way to access the a2dp audio control switch due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-181962322",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-39773,Candidate,"In VpnManagerService, there is a possible disclosure of installed VPN packages due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-191276656",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-39774,Candidate,"In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-205989472",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-39775,Candidate,"In People, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-206465854",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-39776,Candidate,"In NFC, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-192614125",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 42 |
-
,Candidate,"In Telephony, there is a possible way to determine whether an app is installed, without query permissions, due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-194743207",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-39778,Candidate,"In Telecomm, there is a possible way to determine whether an app is installed, without query permissions, due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-196406138",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-39779,Candidate,"In getCallStateUsingPackage of Telecom Service, there is a missing permission check. This could lead to local information disclosure of the call state with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-190400974",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-3978,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211118),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-39780,Candidate,"In Traceur, there is a possible bypass of developer settings requirements for capturing system traces due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-204992293",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-39781,Candidate,"In SmsController, there is a possible information disclosure due to a permissions bypass. This could lead to local escalation of privilege and sending sms with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-195311502",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-39782,Candidate,"In Telephony, there is a possible unauthorized modification of the PLMN SIM file due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-202760015",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-39783,Candidate,"In rcsservice, there is a possible way to modify TTY mode due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-197960597",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-39784,,"In CellBroadcastReceiver, there is a possible path to enable specific cellular features due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-200163477",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-39785,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-39786,Candidate,"In NFC, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-192551247",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-39787,Candidate,"In SystemUI, there is a possible arbitrary Activity launch due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-202506934",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-39788,Candidate,"In TelecomManager, there is a possible way to check if a particular self managed phone account was registered on the device due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-191768014",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-39789,Candidate,"In Telecom, there is a possible leak of TTY mode change due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-203880906",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-3979,Candidate,"A key length flaw was found in Red Hat Ceph Storage. An attacker can exploit the fact that the key length is incorrectly passed in an encryption algorithm to create a non random key, which is weaker and can be exploited for loss of confidentiality and integrity on encrypted disks.",MISC:FEDORA-2022-d832fd2f45 | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPOK44BESMIFW6BIOGCN452AKKOIIT6Q/ | MISC:https://access.redhat.com/security/cve/CVE-2021-3979 | URL:https://access.redhat.com/security/cve/CVE-2021-3979 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2024788 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2024788 | MISC:https://github.com/ceph/ceph/commit/47c33179f9a15ae95cc1579a421be89378602656 | URL:https://github.com/ceph/ceph/commit/47c33179f9a15ae95cc1579a421be89378602656 | MISC:https://github.com/ceph/ceph/pull/44765 | URL:https://github.com/ceph/ceph/pull/44765 | MISC:https://tracker.ceph.com/issues/54006 | URL:https://tracker.ceph.com/issues/54006,Assigned (20211119),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-39790,Candidate,"In Dialer, there is a possible way to manipulate visual voicemail settings due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-186405146",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-39791,Candidate,"In WallpaperManagerService, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-194112606",MISC:https://source.android.com/security/bulletin/android-12l | URL:https://source.android.com/security/bulletin/android-12l,Assigned (20210823),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-39792,Candidate,"In usb_gadget_giveback_request of core.c, there is a possible use after free out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161010552References: Upstream kernel",MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01,Assigned (20210823),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-39793,Candidate,"In kbase_jd_user_buf_pin_pages of mali_kbase_mem.c, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210470189References: N/A",MISC:https://source.android.com/security/bulletin/pixel/2022-03-01 | URL:https://source.android.com/security/bulletin/pixel/2022-03-01,Assigned (20210823),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-39794,Candidate,"In broadcastPortInfo of AdbService.java, there is a possible way for apps to run code as the shell user, if wireless debugging is enabled, due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-205836329",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-39795,Candidte,"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: Pulled from Android ASB#2022-04 publication (https://source.android.com/security/bulletin/2022-04-01) due to a functional regression. We will re-release this CVE at a future date, in a future publication that is currently TBD",,Assigned (20210823),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-3976,Candidate,"In HarmfulAppWarningActivity of HarmfulAppWarningActivity.java, there is a possible way to trick victim to install harmful app due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-205595291",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-39797,Candidate,"In several functions of of LauncherApps.java, there is a possible escalation of privilege due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-209607104",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-39798,Candidate,"In Bitmap_createFromParcel of Bitmap.cpp, there is a possible arbitrary code execution due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-213169612",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-39799,Candidate,"In AttributionSource of AttributionSource.java, there is a possible permission bypass due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-200288596",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-3980,Candidate,elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor,CONFIRM:https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac | URL:https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac | MISC:https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126 | URL:https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126,Assigned (20211119),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-39800,Candidate,"In ion_ioctl of ion-ioctl.c, there is a possible way to leak kernel head data due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208277166References: Upstream kernel",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-39801,Candidate,"In ion_ioctl of ion-ioctl.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-209791720References: Upstream kernel",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-39802,Candidate,"In change_pte_range of mprotect.c , there is a possible way to make a shared mmap writable due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-213339151References: Upstream kernel",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-39803,Candidate,"In ~Impl of C2AllocatorIon.cpp, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-193790350",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-39@04,Candidate,"In reinit of HeifDecoderImpl.cpp, there is a possible crash due to a missing null check. This could lead to remote persistent denial of service in the file picker with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-215002587",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-39805,Candidate,"In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure through Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-212694559",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-39806,andidate,"In closef of label_backends_android.c, there is a possible way to corrupt memory due to a double free. This could lead to local escalation of privilege during startup of servicemanager, if an attacker can trigger an initialization failure, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-215387420",MISC:https://source.android.com/security/bulletin/pixel/2022-06-01 | URL:https://source.android.com/security/bulletin/pixel/2022-06-01,Assigned (20210823),None (candidate not yet proposed),
|
| 75 |
-
,Candidate,"In handleNfcStateChanged of SecureNfcEnabler.java, there is a possible way to enable NFC from the Guest account due to a missing permission check. This could lead to local escalation of privilege from the Guest account with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-209446496",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-39808,Candidate,"In createNotificationChannelGroup of PreferencesHelper.java, there is a possible way for a service to run in foreground without user notification due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-209966086",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-39809,Candidate,"In avrc_ctrl_pars_vendor_rsp of avrc_pars_ct.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-205837191",MISC:https://source.android.com/security/bulletin/2022-04-01 | URL:https://source.android.com/security/bulletin/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-3981,Candidate,"A flaw in grub2 was found where its configuration file, known as grub.cfg, is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue, as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released.",MISC:FEDORA-2021-73d63662b0 | URL:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AI776L35DDYPCSAAJPJM3ZEQYSFZHBJX/ | MISC:GLSA-202209-12 | URL:https://security.gentoo.org/glsa/202209-12 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2024170 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2024170,Assigned (20211119),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-39810,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-39811,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-39812,Candidate,"In TBD of TBD, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205522359References: N/A",MISC:https://source.android.com/security/bulletin/pixel/2022-04-01 | URL:https://source.android.com/security/bulletin/pixel/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-39813,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-39814,Candidate,"In ppmp_validate_wsm of drm_fw.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216792660References: N/A",MISC:https://source.android.com/security/bulletin/pixel/2022-04-01 | URL:https://source.android.com/security/bulletin/pixel/2022-04-01,Assigned (20210823),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-39815,Candidate,"The PowerVR GPU driver allows unprivileged apps to allocated pinned memory, unpin it (which makes it available to be freed), and continue using the page in GPU calls. No privileges required and this results in kernel memory corruption.Product: AndroidVersions: Android SoCAndroid ID: A-232440670",MISC:https://source.android.com/security/bulletin/2022-08-01 | URL:https://source.android.com/security/bulletin/2022-08-01,Assigned (20210823),None (candidate not yet proposed),
|
| 85 |
-
CV-2021-39816,,"Adobe Bridge version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious Bridge file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/bridge/apsb21-69.html | URL:https://helpx.adobe.com/security/products/bridge/apsb21-69.html,Assigned (20210823),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-39817,Candidate,"Adobe Bridge version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious Bridge file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/bridge/apsb21-69.html | URL:https://helpx.adobe.com/security/products/bridge/apsb21-69.html,Assigned (20210823),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-39818,Candidate,"Adobe InCopy version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/incopy/apsb21-71.html | URL:https://helpx.adobe.com/security/products/incopy/apsb21-71.html,Assigned (20210823),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-39819,Candidate,"Adobe InCopy version 11.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious XML file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/incopy/apsb21-71.html | URL:https://helpx.adobe.com/security/products/incopy/apsb21-71.html,Assigned (20210823),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-3982,Candidate,"Linux distributions using CAP_SYS_NICE for gnome-shell may be exposed to a privilege escalation issue. An attacker, with low privilege permissions, may take advantage of the way CAP_SYS_NICE is currently implemented and eventually load code to increase its process scheduler priority leading to possible DoS of other services running in the same machine.",MISC:https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/2284 | URL:https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/2284 | MISC:https://gitlab.gnome.org/GNOME/mutter/-/merge_requests/2060 | URL:https://gitlab.gnome.org/GNOME/mutter/-/merge_requests/2060,Assigned (20211119),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-39820,Candidate,"Adobe InDesign versions 16.3 (and earlier), and 16.3.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/indesign/apsb21-73.html | URL:https://helpx.adobe.com/security/products/indesign/apsb21-73.html,Assigned (20210823),None (candidate not yet proposed),
|
| 91 |
-
,Candidate,"Adobe InDesign versions 16.3 (and earlier), and 16.3.1 (and earlier) are affected by an out-of-bounds read vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.",MISC:https://helpx.adobe.com/security/products/indesign/apsb21-73.html | URL:https://helpx.adobe.com/security/products/indesign/apsb21-73.html,Assigned (20210823),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-39822,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-39823,Candidate,"Adobe svg-native-viewer 8182d14dfad5d1e10f53ed830328d7d9a3cfa96d and earlier versions are affected by a heap buffer overflow vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/svg-native-viewer/apsb21-72.html | URL:https://helpx.adobe.com/security/products/svg-native-viewer/apsb21-72.html,Assigned (20210823),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-39824,Candidate,"Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious png file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html,Assigned (20210823),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-39825,Candidate,Photoshop Elements versions 2021 build 19.0 (20210304.m.156367) (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious TTF file.,MISC:https://helpx.adobe.com/security/products/photoshop_elements/apsb21-77.html | URL:https://helpx.adobe.com/security/products/photoshop_elements/apsb21-77.html,Assigned (20210823),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-39826,Candidate,Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by an arbitrary command execution vulnerability. An authenticated attacker could leverage this vulnerability to execute arbitrary commands. User interaction is required to abuse this vulnerability in that a user must open a maliciously crafted .epub file.,MISC:https://helpx.adobe.com/security/products/Digital-Editions/apsb21-80.html | URL:https://helpx.adobe.com/security/products/Digital-Editions/apsb21-80.html,Assigned (20210823),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-39827,Candidate,Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by an arbitrary file write vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to write an arbitrary file to the system. User interaction is required before product installation to abuse this vulnerability.,MISC:https://helpx.adobe.com/security/products/Digital-Editions/apsb21-80.html | URL:https://helpx.adobe.com/security/products/Digital-Editions/apsb21-80.html,Assigned (20210823),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-39828,#C@!!andidate,Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by a privilege escalation vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to escalate privileges. User interaction is required before product installation to abuse this vulnerability.,MISC:https://helpx.adobe.com/security/products/Digital-Editions/apsb21-80.html | URL:https://helpx.adobe.com/security/products/Digital-Editions/apsb21-80.html,Assigned (20210823),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-39829,Candidate,Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.,MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html,Assigned (20210823),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-3983,Candidate,kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413 | URL:https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413 | MISC:https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0 | URL:https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0,Assigned (20211119),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-39830,Candidate,"Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by a memory corruption vulnerability due to insecure handling of a malicious PDF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html,Assigned (20210823),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-39831,,Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.,MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html,Assigned (20210823),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-39832,Candidate,"Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by a memory corruption vulnerability due to insecure handling of a malicious PDF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html,Assigned (20210823),None (candidate not yet proposed),
|
| 104 |
-
C!VE-2021-3@98|33,Candidate,Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.,MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html,Assigned (20210823),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-39834,Candidate,Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.,MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html,Assigned (20210823),None (candidate not yet proposed),
|
| 106 |
-
CVE-202139835,Candidate,Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed PDF file that could result in disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.,MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html,Assigned (20210823),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-39836,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetIcon action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-39837,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm deleteItemAt action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-39838,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetCaption action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-39839,andidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm getItem action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-3984,Candidate,vim is vulnerable to Heap-based Buffer Overflow,CONFIRM:https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a | URL:https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a | FEDORA:FEDORA-2021-b0ac29efb1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 | URL:https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 | MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html | MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1,Assigned (20211119),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-39840,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForms that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-39841,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Type Confusion vulnerability. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-39842,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-39843,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-39844,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-39845,Candidte,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-39846,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a stack overflow vulnerability due to insecure handling of a crafted PDF file, potentially resulting in memory corruption in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted PDF file in Acrobat Reader.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 119 |
-
,Candidate,XMP Toolkit SDK version 2020.1 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file.,MISC:https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html | URL:https://helpx.adobe.com/security/products/xmpcore/apsb21-65.html,Assigned (20210823),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-39848,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-39849,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-3985,Candidate,kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4 | URL:https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4 | MISC:https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5 | URL:https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5,Assigned (20211119),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-39850,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-39851,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210823),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1031.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
"Name","Status","Description","References","Phase","Votes","Comments"
|
| 2 |
-
CVE-2021-39852,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 3 |
-
CVE-2021-39853,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 4 |
-
CVE-2021-39854,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 5 |
-
CVE-2021-39855,Candidate,"Acrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must open a maliciously crafted Microsoft Office file, or visit an attacker controlled web page.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 6 |
-
CVE-2021-39856,Candidate,"Acrobat Reader DC ActiveX Control versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to obtain NTLMv2 credentials. Exploitation of this issue requires user interaction in that a victim must visit an attacker controlled web page.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 7 |
-
CVE-2021-39857,Candidate,"Adobe Acrobat Reader DC add-on for Internet Explorer versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Information Disclosure vulnerability. An unauthenticated attacker could leverage this vulnerability to check for existence of local files. Exploitation of this issue requires user interaction in that a victim must visit an attacker controlled web page.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 8 |
-
CVE-2021-39858,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 9 |
-
CVE-2021-39859,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 10 |
-
CVE-2021-3986,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20211120),"None (candidate not yet proposed)",""
|
| 11 |
-
CVE-2021-39860,Candidate,"Acrobat Pro DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive user memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 12 |
-
CVE-2021-39861,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 13 |
-
CVE-2021-39862,Candidate,"Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 14 |
-
CVE-2021-39863,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 15 |
-
CVE-2021-39864,Candidate,"Adobe Commerce versions 2.4.2-p2 (and earlier), 2.4.3 (and earlier) and 2.3.7p1 (and earlier) are affected by a cross-site request forgery (CSRF) vulnerability via a Wishlist Share Link. Successful exploitation could lead to unauthorized addition to customer cart by an unauthenticated attacker. Access to the admin console is not required for successful exploitation.","MISC:https://helpx.adobe.com/security/products/magento/apsb21-86.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-86.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 16 |
-
CVE-2021-39865,Candidate,"Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-429/ | MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 17 |
-
CVE-2021-39866,Candidate,"A business logic error in the project deletion process in GitLab 13.6 and later allows persistent access via project access tokens.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39866.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39866.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/333175 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/333175 | MISC:https://hackerone.com/reports/1199561 | URL:https://hackerone.com/reports/1199561",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 18 |
-
CVE-2021-39867,Candidate,"In all versions of GitLab CE/EE since version 8.15, a DNS rebinding vulnerability in Gitea Importer may be exploited by an attacker to trigger Server Side Request Forgery (SSRF) attacks.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39867.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39867.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/214401 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/214401",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 19 |
-
CVE-2021-39868,Candidate,"In all versions of GitLab CE/EE since version 8.12, an authenticated low-privileged malicious user may create a project with unlimited repository size by modifying values in a project export.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39868.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39868.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/24649 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/24649 | MISC:https://hackerone.com/reports/420258 | URL:https://hackerone.com/reports/420258",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 20 |
-
CVE-2021-39869,Candidate,"In all versions of GitLab CE/EE since version 8.9, project exports may expose trigger tokens configured on that project.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39869.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39869.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/27044 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/27044 | MISC:https://hackerone.com/reports/497144 | URL:https://hackerone.com/reports/497144",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 21 |
-
CVE-2021-3987,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20211120),"None (candidate not yet proposed)",""
|
| 22 |
-
CVE-2021-39870,Candidate,"In all versions of GitLab CE/EE since version 11.11, an instance that has the setting to disable Repo by URL import enabled is bypassed by an attacker making a crafted API call.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39870.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39870.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/29748 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/29748 | MISC:https://hackerone.com/reports/630263 | URL:https://hackerone.com/reports/630263",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 23 |
-
CVE-2021-39871,Candidate,"In all versions of GitLab CE/EE since version 13.0, an instance that has the setting to disable Bitbucket Server import enabled is bypassed by an attacker making a crafted API call.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39871.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39871.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/340782 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/340782 | MISC:https://hackerone.com/reports/630263 | URL:https://hackerone.com/reports/630263",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 24 |
-
CVE-2021-39872,Candidate,"In all versions of GitLab CE/EE since version 14.1, an improper access control vulnerability allows users with expired password to still access GitLab through git and API through access tokens acquired before password expiration.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39872.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39872.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/337954 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/337954 | MISC:https://hackerone.com/reports/1285226 | URL:https://hackerone.com/reports/1285226",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 25 |
-
CVE-2021-39873,Candidate,"In all versions of GitLab CE/EE, there exists a content spoofing vulnerability which may be leveraged by attackers to trick users into visiting a malicious website by spoofing the content in an error response.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39873.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39873.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/27241 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/27241 | MISC:https://hackerone.com/reports/504961 | URL:https://hackerone.com/reports/504961",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 26 |
-
CVE-2021-39874,Candidate,"In all versions of GitLab CE/EE since version 11.0, the requirement to enforce 2FA is not honored when using git commands.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39874.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39874.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/222527 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/222527 | MISC:https://hackerone.com/reports/898477 | URL:https://hackerone.com/reports/898477",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 27 |
-
CVE-2021-39875,Candidate,"In all versions of GitLab CE/EE since version 13.6, it is possible to see pending invitations of any public group or public project by visiting an API endpoint.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39875.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39875.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/290985 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/290985 | MISC:https://hackerone.com/reports/1048259 | URL:https://hackerone.com/reports/1048259",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 28 |
-
CVE-2021-39876,Candidate,"In all versions of GitLab CE/EE since version 11.3, the endpoint for auto-completing Assignee discloses the members of private groups.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39876.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39876.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/29683 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/29683 | MISC:https://hackerone.com/reports/627507 | URL:https://hackerone.com/reports/627507",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 29 |
-
CVE-2021-39877,Candidate,"A vulnerability was discovered in GitLab starting with version 12.2 that allows an attacker to cause uncontrolled resource consumption with a specially crafted file.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39877.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39877.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/300095 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/300095 | MISC:https://hackerone.com/reports/1077021 | URL:https://hackerone.com/reports/1077021",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 30 |
-
CVE-2021-39878,Candidate,"A stored Reflected Cross-Site Scripting vulnerability in the Jira integration in GitLab version 13.0 up to 14.3.1 allowed an attacker to execute arbitrary javascript code.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39878.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39878.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/334043 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/334043 | MISC:https://hackerone.com/reports/1194254 | URL:https://hackerone.com/reports/1194254",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 31 |
-
CVE-2021-39879,Candidate,"Missing authentication in all versions of GitLab CE/EE since version 7.11.0 allows an attacker with access to a victim's session to disable two-factor authentication","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39879.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39879.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/338825 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/338825",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 32 |
-
CVE-2021-3988,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20211120),"None (candidate not yet proposed)",""
|
| 33 |
-
CVE-2021-39880,Candidate,"A Denial Of Service vulnerability in the apollo_upload_server Ruby gem in GitLab CE/EE all versions starting from 11.9 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting from 14.2 before 14.2.2 allows an attacker to deny access to all users via specially crafted requests to the apollo_upload_server middleware.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39880.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39880.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/330561 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/330561 | MISC:https://hackerone.com/reports/1181284 | URL:https://hackerone.com/reports/1181284",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 34 |
-
CVE-2021-39881,Candidate,"In all versions of GitLab CE/EE since version 7.7, the application may let a malicious user create an OAuth client application with arbitrary scope names which may allow the malicious user to trick unsuspecting users to authorize the malicious client application using the spoofed scope name and description.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39881.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/26695 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/26695 | MISC:https://hackerone.com/reports/494530 | URL:https://hackerone.com/reports/494530",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 35 |
-
CVE-2021-39882,Candidate,"In all versions of GitLab CE/EE, provided a user ID, anonymous users can use a few endpoints to retrieve information about any GitLab user.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39882.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39882.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/297473 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/297473",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 36 |
-
CVE-2021-39883,Candidate,"Improper authorization checks in all versions of GitLab EE starting from 13.11 before 14.1.7, all versions starting from 14.2 before 14.2.5, and all versions starting from 14.3 before 14.3.1 allows subgroup members to see epics from all parent subgroups.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39883.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39883.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/334279 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/334279",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 37 |
-
CVE-2021-39884,Candidate,"In all versions of GitLab EE since version 8.13, an endpoint discloses names of private groups that have access to a project to low privileged users that are part of that project.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39884.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39884.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/25414 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/25414 | MISC:https://hackerone.com/reports/447817 | URL:https://hackerone.com/reports/447817",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 38 |
-
CVE-2021-39885,Candidate,"A Stored XSS in merge request creation page in all versions of Gitlab EE starting from 13.7 before 14.1.7, all versions starting from 14.2 before 14.2.5, and all versions starting from 14.3 before 14.3.1 allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious approval rule names","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39885.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39885.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/341140 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/341140 | MISC:https://hackerone.com/reports/1342009 | URL:https://hackerone.com/reports/1342009",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 39 |
-
CVE-2021-39886,Candidate,"Permissions rules were not applied while issues were moved between projects of the same group in GitLab versions starting with 10.6 and up to 14.1.7 allowing users to read confidential Epic references.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39886.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39886.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/330520 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/330520",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 40 |
-
CVE-2021-39887,Candidate,"A stored Cross-Site Scripting vulnerability in the GitLab Flavored Markdown in GitLab CE/EE version 8.4 and above allowed an attacker to execute arbitrary JavaScript code on the victim's behalf.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39887.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39887.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/332903 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/332903 | MISC:https://hackerone.com/reports/1218174 | URL:https://hackerone.com/reports/1218174",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 41 |
-
CVE-2021-39888,Candidate,"In all versions of GitLab EE starting from 13.10 before 14.1.7, all versions starting from 14.2 before 14.2.5, and all versions starting from 14.3 before 14.3.1 a specific API endpoint may reveal details about a private group and other sensitive info inside issue and merge request templates.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39888.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39888.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/336446 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/336446 | MISC:https://hackerone.com/reports/1255128 | URL:https://hackerone.com/reports/1255128",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 42 |
-
CVE-2021-39889,Candidate,"In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39889.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39889.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/338062 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/338062 | MISC:https://hackerone.com/reports/1294017 | URL:https://hackerone.com/reports/1294017",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 43 |
-
CVE-2021-3989,Candidate,"showdoc is vulnerable to URL Redirection to Untrusted Site","CONFIRM:https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5 | URL:https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5 | MISC:https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614 | URL:https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614",Assigned (20211120),"None (candidate not yet proposed)",""
|
| 44 |
-
CVE-2021-39890,Candidate,"It was possible to bypass 2FA for LDAP users and access some specific pages with Basic Authentication in GitLab 14.1.1 and above.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39890.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39890.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/341522 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/341522",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 45 |
-
CVE-2021-39891,Candidate,"In all versions of GitLab CE/EE since version 8.0, access tokens created as part of admin's impersonation of a user are not cleared at the end of impersonation which may lead to unnecessary sensitive info disclosure.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39891.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39891.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/335137 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/335137",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 46 |
-
CVE-2021-39892,Candidate,"In all versions of GitLab CE/EE since version 12.0, a lower privileged user can import users from projects that they don't have a maintainer role on and disclose email addresses of those users.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39892.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39892.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/28440 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/28440 | MISC:https://hackerone.com/reports/542539 | URL:https://hackerone.com/reports/542539",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 47 |
-
CVE-2021-39893,Candidate,"A potential DOS vulnerability was discovered in GitLab starting with version 9.1 that allowed parsing files without authorisation.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39893.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39893.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/340076 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/340076",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 48 |
-
CVE-2021-39894,Candidate,"In all versions of GitLab CE/EE since version 8.0, a DNS rebinding vulnerability exists in Fogbugz importer which may be used by attackers to exploit Server Side Request Forgery attacks.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39894.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39894.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/214399 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/214399",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 49 |
-
CVE-2021-39895,Candidate,"In all versions of GitLab CE/EE since version 8.0, an attacker can set the pipeline schedules to be active in a project export so when an unsuspecting owner imports that project, pipelines are active by default on that project. Under specialized conditions, this may lead to information disclosure if the project is imported from an untrusted source.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39895.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39895.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/337824 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/337824 | MISC:https://hackerone.com/reports/1272535 | URL:https://hackerone.com/reports/1272535",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 50 |
-
CVE-2021-39896,Candidate,"In all versions of GitLab CE/EE since version 8.0, when an admin uses the impersonate feature twice and stops impersonating, the admin may be logged in as the second user they impersonated, which may lead to repudiation issues.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39896.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39896.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/339362 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/339362",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 51 |
-
CVE-2021-39897,Candidate,"Improper access control in GitLab CE/EE version 10.5 and above allowed subgroup members with inherited access to a project from a parent group to still have access even after the subgroup is transferred","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39897.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39897.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/341017 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/341017 | MISC:https://hackerone.com/reports/1330806 | URL:https://hackerone.com/reports/1330806",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 52 |
-
CVE-2021-39898,Candidate,"In all versions of GitLab CE/EE since version 10.6, a project export leaks the external webhook token value which may allow access to the project which it was exported from.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39898.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39898.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/33734 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/33734 | MISC:https://hackerone.com/reports/698068 | URL:https://hackerone.com/reports/698068",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 53 |
-
CVE-2021-39899,Candidate,"In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39899.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39899.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/339154 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/339154",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 54 |
-
CVE-2021-3990,Candidate,"showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)","CONFIRM:https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f | URL:https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f | MISC:https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0 | URL:https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0",Assigned (20211120),"None (candidate not yet proposed)",""
|
| 55 |
-
CVE-2021-39900,Candidate,"Information disclosure from SendEntry in GitLab starting with 10.8 allowed exposure of full URL of artifacts stored in object-storage with a temporary availability via Rails logs.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39900.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39900.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/325088 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/325088",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 56 |
-
CVE-2021-39901,Candidate,"In all versions of GitLab CE/EE since version 11.10, an admin of a group can see the SCIM token of that group by visiting a specific endpoint.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39901.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39901.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/11640 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/11640 | MISC:https://hackerone.com/reports/565884 | URL:https://hackerone.com/reports/565884",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 57 |
-
CVE-2021-39902,Candidate,"Incorrect Authorization in GitLab CE/EE 13.4 or above allows a user with guest membership in a project to modify the severity of an incident.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39902.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39902.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/341479 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/341479 | MISC:https://hackerone.com/reports/1341674 | URL:https://hackerone.com/reports/1341674",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 58 |
-
CVE-2021-39903,Candidate,"In all versions of GitLab CE/EE since version 13.0, a privileged user, through an API call, can change the visibility level of a group or a project to a restricted option even after the instance administrator sets that visibility option as restricted in settings.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39903.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39903.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/300017 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/300017 | MISC:https://hackerone.com/reports/1086781 | URL:https://hackerone.com/reports/1086781",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 59 |
-
CVE-2021-39904,Candidate,"An Improper Access Control vulnerability in the GraphQL API in all versions of GitLab CE/EE starting from 13.1 before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 allows a Merge Request creator to resolve discussions and apply suggestions after a project owner has locked the Merge Request","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39904.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39904.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/295298 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/295298 | MISC:https://hackerone.com/reports/1063420 | URL:https://hackerone.com/reports/1063420",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 60 |
-
CVE-2021-39905,Candidate,"An information disclosure vulnerability in the GitLab CE/EE API since version 8.9.6 allows a user to see basic information on private groups that a public project has been shared with","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39905.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39905.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/28226 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/28226 | MISC:https://hackerone.com/reports/538029 | URL:https://hackerone.com/reports/538029",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 61 |
-
CVE-2021-39906,Candidate,"Improper validation of ipynb files in GitLab CE/EE version 13.5 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39906.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39906.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/341566 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/341566 | MISC:https://hackerone.com/reports/1347600 | URL:https://hackerone.com/reports/1347600",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 62 |
-
CVE-2021-39907,Candidate,"A potential DOS vulnerability was discovered in GitLab CE/EE starting with version 13.7. The stripping of EXIF data from certain images resulted in high CPU usage.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39907.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39907.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/299869 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/299869 | MISC:https://hackerone.com/reports/1083182 | URL:https://hackerone.com/reports/1083182",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 63 |
-
CVE-2021-39908,Candidate,"In all versions of GitLab CE/EE starting from 0.8.0 before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 certain Unicode characters can be abused to commit malicious code into projects without being noticed in merge request or source code viewer UI.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39908.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39908.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/337193 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/337193 | MISC:https://hackerone.com/reports/1280077 | URL:https://hackerone.com/reports/1280077",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 64 |
-
CVE-2021-39909,Candidate,"Lack of email address ownership verification in the CODEOWNERS feature in all versions of GitLab EE starting from 11.3 before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 allows an attacker to bypass CODEOWNERS Merge Request approval requirement under rare circumstances","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39909.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39909.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/335191 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/335191 | MISC:https://hackerone.com/reports/1237750 | URL:https://hackerone.com/reports/1237750",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 65 |
-
CVE-2021-3991,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20211120),"None (candidate not yet proposed)",""
|
| 66 |
-
CVE-2021-39910,Candidate,"An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab was vulnerable to HTML Injection through the Swagger UI feature.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39910.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39910.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/325901 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/325901 | MISC:https://hackerone.com/reports/1133656 | URL:https://hackerone.com/reports/1133656",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 67 |
-
CVE-2021-39911,Candidate,"An improper access control flaw in all versions of GitLab CE/EE starting from 13.9 before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 exposes private email address of Issue and Merge Requests assignee to Webhook data consumers","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39911.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39911.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/297470 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/297470",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 68 |
-
CVE-2021-39912,Candidate,"A potential DoS vulnerability was discovered in GitLab CE/EE starting with version 13.7. Using a malformed TIFF images was possible to trigger memory exhaustion.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39912.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39912.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/341363 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/341363 | MISC:https://hackerone.com/reports/1330882 | URL:https://hackerone.com/reports/1330882",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 69 |
-
CVE-2021-39913,Candidate,"Accidental logging of system root password in the migration log in all versions of GitLab CE/EE before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 allows an attacker with local file system access to obtain system root-level privileges","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39913.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39913.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/28074 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/28074",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 70 |
-
CVE-2021-39914,Candidate,"A regular expression denial of service issue in GitLab versions 8.13 to 14.2.5, 14.3.0 to 14.3.3 and 14.4.0 could cause excessive usage of resources when a specially crafted username was used when provisioning a new user","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39914.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39914.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/289948 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/289948",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 71 |
-
CVE-2021-39915,Candidate,"Improper access control in the GraphQL API in GitLab CE/EE affecting all versions starting from 13.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to see the names of project access tokens on arbitrary projects","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39915.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39915.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/340803 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/340803 | MISC:https://hackerone.com/reports/1336059 | URL:https://hackerone.com/reports/1336059",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 72 |
-
CVE-2021-39916,Candidate,"Lack of an access control check in the External Status Check feature allowed any authenticated user to retrieve the configuration of any External Status Check in GitLab EE starting from 14.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39916.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39916.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/343379 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/343379 | MISC:https://hackerone.com/reports/1372216 | URL:https://hackerone.com/reports/1372216",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 73 |
-
CVE-2021-39917,Candidate,"An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.9 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression related to quick actions features was susceptible to catastrophic backtracking that could cause a DOS attack.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39917.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39917.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/338486 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/338486 | MISC:https://hackerone.com/reports/1277918 | URL:https://hackerone.com/reports/1277918",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 74 |
-
CVE-2021-39918,Candidate,"Incorrect Authorization in GitLab EE affecting all versions starting from 11.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows a user to add comments to a vulnerability which cannot be accessed.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39918.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39918.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/329916 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/329916 | MISC:https://hackerone.com/reports/1180043 | URL:https://hackerone.com/reports/1180043",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 75 |
-
CVE-2021-39919,Candidate,"In all versions of GitLab CE/EE starting version 14.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, the reset password token and new user email token are accidentally logged which may lead to information disclosure.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39919.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39919.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/342445 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/342445",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 76 |
-
CVE-2021-3992,Candidate,"kimai2 is vulnerable to Improper Access Control","CONFIRM:https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93 | URL:https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93 | MISC:https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5 | URL:https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5",Assigned (20211121),"None (candidate not yet proposed)",""
|
| 77 |
-
CVE-2021-39920,Candidate,"NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39920.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39920.json | DEBIAN:DSA-5019 | URL:https://www.debian.org/security/2021/dsa-5019 | FEDORA:FEDORA-2021-3747cf6107 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/ | FEDORA:FEDORA-2021-97bd631e0a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/ | GENTOO:GLSA-202210-04 | URL:https://security.gentoo.org/glsa/202210-04 | MISC:https://gitlab.com/wireshark/wireshark/-/issues/17705 | URL:https://gitlab.com/wireshark/wireshark/-/issues/17705 | MISC:https://www.wireshark.org/security/wnpa-sec-2021-15.html | URL:https://www.wireshark.org/security/wnpa-sec-2021-15.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 78 |
-
CVE-2021-39921,Candidate,"NULL pointer exception in the Modbus dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39921.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39921.json | DEBIAN:DSA-5019 | URL:https://www.debian.org/security/2021/dsa-5019 | FEDORA:FEDORA-2021-3747cf6107 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/ | FEDORA:FEDORA-2021-97bd631e0a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/ | GENTOO:GLSA-202210-04 | URL:https://security.gentoo.org/glsa/202210-04 | MISC:https://gitlab.com/wireshark/wireshark/-/issues/17703 | URL:https://gitlab.com/wireshark/wireshark/-/issues/17703 | MISC:https://www.wireshark.org/security/wnpa-sec-2021-14.html | URL:https://www.wireshark.org/security/wnpa-sec-2021-14.html | MLIST:[debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00015.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 79 |
-
CVE-2021-39922,Candidate,"Buffer overflow in the C12.22 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39922.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39922.json | DEBIAN:DSA-5019 | URL:https://www.debian.org/security/2021/dsa-5019 | FEDORA:FEDORA-2021-3747cf6107 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/ | FEDORA:FEDORA-2021-97bd631e0a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/ | GENTOO:GLSA-202210-04 | URL:https://security.gentoo.org/glsa/202210-04 | MISC:https://gitlab.com/wireshark/wireshark/-/issues/17636 | URL:https://gitlab.com/wireshark/wireshark/-/issues/17636 | MISC:https://www.wireshark.org/security/wnpa-sec-2021-12.html | URL:https://www.wireshark.org/security/wnpa-sec-2021-12.html | MLIST:[debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00015.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 80 |
-
CVE-2021-39923,Candidate,"Large loop in the PNRP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39923.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39923.json | DEBIAN:DSA-5019 | URL:https://www.debian.org/security/2021/dsa-5019 | MISC:https://gitlab.com/wireshark/wireshark/-/issues/17684 | URL:https://gitlab.com/wireshark/wireshark/-/issues/17684 | MISC:https://www.wireshark.org/security/wnpa-sec-2021-11.html | URL:https://www.wireshark.org/security/wnpa-sec-2021-11.html | MLIST:[debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00015.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 81 |
-
CVE-2021-39924,Candidate,"Large loop in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39924.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39924.json | DEBIAN:DSA-5019 | URL:https://www.debian.org/security/2021/dsa-5019 | FEDORA:FEDORA-2021-3747cf6107 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/ | FEDORA:FEDORA-2021-97bd631e0a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/ | GENTOO:GLSA-202210-04 | URL:https://security.gentoo.org/glsa/202210-04 | MISC:https://gitlab.com/wireshark/wireshark/-/issues/17677 | URL:https://gitlab.com/wireshark/wireshark/-/issues/17677 | MISC:https://www.wireshark.org/security/wnpa-sec-2021-10.html | URL:https://www.wireshark.org/security/wnpa-sec-2021-10.html | MLIST:[debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00015.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 82 |
-
CVE-2021-39925,Candidate,"Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39925.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39925.json | DEBIAN:DSA-5019 | URL:https://www.debian.org/security/2021/dsa-5019 | FEDORA:FEDORA-2021-3747cf6107 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/ | FEDORA:FEDORA-2021-97bd631e0a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/ | GENTOO:GLSA-202210-04 | URL:https://security.gentoo.org/glsa/202210-04 | MISC:https://gitlab.com/wireshark/wireshark/-/issues/17635 | URL:https://gitlab.com/wireshark/wireshark/-/issues/17635 | MISC:https://www.wireshark.org/security/wnpa-sec-2021-09.html | URL:https://www.wireshark.org/security/wnpa-sec-2021-09.html | MLIST:[debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00015.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 83 |
-
CVE-2021-39926,Candidate,"Buffer overflow in the Bluetooth HCI_ISO dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39926.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39926.json | DEBIAN:DSA-5019 | URL:https://www.debian.org/security/2021/dsa-5019 | FEDORA:FEDORA-2021-3747cf6107 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/ | FEDORA:FEDORA-2021-97bd631e0a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/ | GENTOO:GLSA-202210-04 | URL:https://security.gentoo.org/glsa/202210-04 | MISC:https://gitlab.com/wireshark/wireshark/-/issues/17649 | URL:https://gitlab.com/wireshark/wireshark/-/issues/17649 | MISC:https://www.wireshark.org/security/wnpa-sec-2021-08.html | URL:https://www.wireshark.org/security/wnpa-sec-2021-08.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 84 |
-
CVE-2021-39927,Candidate,"Server side request forgery protections in GitLab CE/EE versions between 8.4 and 14.4.4, between 14.5.0 and 14.5.2, and between 14.6.0 and 14.6.1 would fail to protect against attacks sending requests to localhost on port 80 or 443 if GitLab was configured to run on a port other than 80 or 443","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39927.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39927.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/340476 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/340476",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 85 |
-
CVE-2021-39928,Candidate,"NULL pointer exception in the IEEE 802.11 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39928.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39928.json | DEBIAN:DSA-5019 | URL:https://www.debian.org/security/2021/dsa-5019 | FEDORA:FEDORA-2021-3747cf6107 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/ | FEDORA:FEDORA-2021-97bd631e0a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/ | GENTOO:GLSA-202210-04 | URL:https://security.gentoo.org/glsa/202210-04 | MISC:https://gitlab.com/wireshark/wireshark/-/issues/17704 | URL:https://gitlab.com/wireshark/wireshark/-/issues/17704 | MISC:https://www.wireshark.org/security/wnpa-sec-2021-13.html | URL:https://www.wireshark.org/security/wnpa-sec-2021-13.html | MLIST:[debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00015.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 86 |
-
CVE-2021-39929,Candidate,"Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39929.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39929.json | DEBIAN:DSA-5019 | URL:https://www.debian.org/security/2021/dsa-5019 | FEDORA:FEDORA-2021-3747cf6107 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6AJFIYIHS3TYDD2EBYBJ5KKE52X34BJ/ | FEDORA:FEDORA-2021-97bd631e0a | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YEWTIRMC2MFQBZ2O5M4CJHJM4JPBHLXH/ | GENTOO:GLSA-202210-04 | URL:https://security.gentoo.org/glsa/202210-04 | MISC:https://gitlab.com/wireshark/wireshark/-/issues/17651 | URL:https://gitlab.com/wireshark/wireshark/-/issues/17651 | MISC:https://www.wireshark.org/security/wnpa-sec-2021-07.html | URL:https://www.wireshark.org/security/wnpa-sec-2021-07.html | MLIST:[debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00015.html",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 87 |
-
CVE-2021-3993,Candidate,"showdoc is vulnerable to Cross-Site Request Forgery (CSRF)","CONFIRM:https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9 | URL:https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9 | MISC:https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871 | URL:https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871",Assigned (20211122),"None (candidate not yet proposed)",""
|
| 88 |
-
CVE-2021-39930,Candidate,"Missing authorization in GitLab EE versions between 12.4 and 14.3.6, between 14.4.0 and 14.4.4, and between 14.5.0 and 14.5.2 allowed an attacker to access a user's custom project and group templates","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39930.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39930.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/26103 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/26103 | MISC:https://hackerone.com/reports/475240 | URL:https://hackerone.com/reports/475240",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 89 |
-
CVE-2021-39931,Candidate,"An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.11 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Under specific condition an unauthorised project member was allowed to delete a protected branches due to a business logic error.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39931.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39931.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/340445 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/340445 | MISC:https://hackerone.com/reports/1318379 | URL:https://hackerone.com/reports/1318379",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 90 |
-
CVE-2021-39932,Candidate,"An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Using large payloads, the diff feature could be used to trigger high load time for users reviewing code changes.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39932.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39932.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/217360 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/217360",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 91 |
-
CVE-2021-39933,Candidate,"An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression used for handling user input (notes, comments, etc) was susceptible to catastrophic backtracking that could cause a DOS attack.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39933.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39933.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/340449 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/340449 | MISC:https://hackerone.com/reports/1320077 | URL:https://hackerone.com/reports/1320077",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 92 |
-
CVE-2021-39934,Candidate,"Improper access control allows any project member to retrieve the service desk email address in GitLab CE/EE versions starting 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39934.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39934.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/342823 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/342823 | MISC:https://hackerone.com/reports/1360744 | URL:https://hackerone.com/reports/1360744",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 93 |
-
CVE-2021-39935,Candidate,"An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39935.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39935.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/346187 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/346187 | MISC:https://hackerone.com/reports/1236965 | URL:https://hackerone.com/reports/1236965",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 94 |
-
CVE-2021-39936,Candidate,"Improper access control in GitLab CE/EE affecting all versions starting from 10.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker in possession of a deploy token to access a project's disabled wiki.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39936.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39936.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/241767 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/241767 | MISC:https://hackerone.com/reports/964057 | URL:https://hackerone.com/reports/964057",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 95 |
-
CVE-2021-39937,Candidate,"A collision in access memoization logic in all versions of GitLab CE/EE before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, leads to potential elevated privileges in groups and projects under rare circumstances","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39937.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39937.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/336802 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/336802",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 96 |
-
CVE-2021-39938,Candidate,"A vulnerable regular expression pattern in GitLab CE/EE since version 8.15 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to cause uncontrolled resource consumption leading to Denial of Service via specially crafted deploy Slash commands","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39938.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39938.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/344873 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/344873",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 97 |
-
CVE-2021-39939,Candidate,"An uncontrolled resource consumption vulnerability in GitLab Runner affecting all versions starting from 13.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker triggering a job with a specially crafted docker image to exhaust resources on runner manager","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39939.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39939.json | MISC:https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28630 | URL:https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28630",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 98 |
-
CVE-2021-3994,Candidate,"django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd | URL:https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd | MISC:https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06 | URL:https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06",Assigned (20211122),"None (candidate not yet proposed)",""
|
| 99 |
-
CVE-2021-39940,Candidate,"An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab Maven Package registry is vulnerable to a regular expression denial of service when a specifically crafted string is sent.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39940.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39940.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/263116 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/263116 | MISC:https://hackerone.com/reports/997961 | URL:https://hackerone.com/reports/997961",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 100 |
-
CVE-2021-39941,Candidate,"An information disclosure vulnerability in GitLab CE/EE versions 12.0 to 14.3.6, 14.4 to 14.4.4, and 14.5 to 14.5.2 allowed non-project members to see the default branch name for projects that restrict access to the repository to project members","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39941.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39941.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/33864 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/33864 | MISC:https://hackerone.com/reports/706361 | URL:https://hackerone.com/reports/706361",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 101 |
-
CVE-2021-39942,Candidate,"A denial of service vulnerability in GitLab CE/EE affecting all versions starting from 12.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows low-privileged users to bypass file size limits in the NPM package repository to potentially cause denial of service.","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39942.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39942.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/297492 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/297492 | MISC:https://hackerone.com/reports/1071861 | URL:https://hackerone.com/reports/1071861",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 102 |
-
CVE-2021-39943,Candidate,"An authorization logic error in the External Status Check API in GitLab EE affecting all versions starting from 14.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allowed a user to update the status of the check via an API call","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39943.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39943.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/343604 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/343604 | MISC:https://hackerone.com/reports/1375393 | URL:https://hackerone.com/reports/1375393",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 103 |
-
CVE-2021-39944,Candidate,"An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A permissions validation flaw allowed group members with a developer role to elevate their privilege to a maintainer on projects they import","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39944.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39944.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/336531 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/336531 | MISC:https://hackerone.com/reports/1256017 | URL:https://hackerone.com/reports/1256017",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 104 |
-
CVE-2021-39945,Candidate,"Improper access control in the GitLab CE/EE API affecting all versions starting from 9.4 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an author of a Merge Request to approve the Merge Request even after having their project access revoked","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39945.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39945.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/331675 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/331675 | MISC:https://hackerone.com/reports/1198317 | URL:https://hackerone.com/reports/1198317",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 105 |
-
CVE-2021-39946,Candidate,"Improper neutralization of user input in GitLab CE/EE versions 14.3 to 14.3.6, 14.4 to 14.4.4, and 14.5 to 14.5.2 allowed an attacker to exploit XSS by abusing the generation of the HTML code related to emojis","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39946.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39946.json | MISC:https://gitlab.com/gitlab-org/gitlab/-/issues/345657 | URL:https://gitlab.com/gitlab-org/gitlab/-/issues/345657 | MISC:https://hackerone.com/reports/1398305 | URL:https://hackerone.com/reports/1398305",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 106 |
-
CVE-2021-39947,Candidate,"In specific circumstances, trace file buffers in GitLab Runner versions up to 14.3.4, 14.4 to 14.4.2, and 14.5 to 14.5.2 would re-use the file descriptor 0 for multiple traces and mix the output of several jobs","CONFIRM:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39947.json | URL:https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39947.json | MISC:https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28732 | URL:https://gitlab.com/gitlab-org/gitlab-runner/-/issues/28732",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 107 |
-
CVE-2021-39948,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 108 |
-
CVE-2021-39949,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 109 |
-
CVE-2021-3995,Candidate,"A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.","CONFIRM:https://security.netapp.com/advisory/ntap-20221209-0002/ | FULLDISC:20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) | URL:http://seclists.org/fulldisclosure/2022/Dec/4 | MISC:http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2024631https://access.redhat.com/security/cve/CVE-2021-3995 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2024631https://access.redhat.com/security/cve/CVE-2021-3995 | MISC:https://github.com/util-linux/util-linux/commit/57202f5713afa2af20ffbb6ab5331481d0396f8d | URL:https://github.com/util-linux/util-linux/commit/57202f5713afa2af20ffbb6ab5331481d0396f8d | MISC:https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes | URL:https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes | MISC:https://www.openwall.com/lists/oss-security/2022/01/24/2 | URL:https://www.openwall.com/lists/oss-security/2022/01/24/2 | MLIST:[oss-security] 20221130 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) | URL:http://www.openwall.com/lists/oss-security/2022/11/30/2",Assigned (20211122),"None (candidate not yet proposed)",""
|
| 110 |
-
CVE-2021-39950,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 111 |
-
CVE-2021-39951,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 112 |
-
CVE-2021-39952,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 113 |
-
CVE-2021-39953,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 114 |
-
CVE-2021-39954,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 115 |
-
CVE-2021-39955,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 116 |
-
CVE-2021-39956,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 117 |
-
CVE-2021-39957,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 118 |
-
CVE-2021-39958,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 119 |
-
CVE-2021-39959,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 120 |
-
CVE-2021-3996,Candidate,"A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.","CONFIRM:https://security.netapp.com/advisory/ntap-20221209-0002/ | FULLDISC:20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) | URL:http://seclists.org/fulldisclosure/2022/Dec/4 | MISC:http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html | MISC:https://access.redhat.com/security/cve/CVE-2021-3996 | URL:https://access.redhat.com/security/cve/CVE-2021-3996 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2024628 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2024628 | MISC:https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb | URL:https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb | MISC:https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes | URL:https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes | MISC:https://www.openwall.com/lists/oss-security/2022/01/24/2 | URL:https://www.openwall.com/lists/oss-security/2022/01/24/2 | MLIST:[oss-security] 20221130 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) | URL:http://www.openwall.com/lists/oss-security/2022/11/30/2",Assigned (20211122),"None (candidate not yet proposed)",""
|
| 121 |
-
CVE-2021-39960,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 122 |
-
CVE-2021-39961,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 123 |
-
CVE-2021-39962,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
| 124 |
-
CVE-2021-39963,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210823),"None (candidate not yet proposed)",""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1032.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-39964,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 3 |
-
CVE-20|1-3|965,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-39966,Candidate,There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/11/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/11/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-39967,Candidate,There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/11/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/11/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-39968,,Changlian Blocklist has a Business Logic Errors vulnerability .Successful exploitation of this vulnerability may expand the attack surface of the message class.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-39969,,There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/11/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/11/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-3997,Candidate,A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.,MISC:https://access.redhat.com/security/cve/CVE-2021-3997 | URL:https://access.redhat.com/security/cve/CVE-2021-3997 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2024639 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2024639 | MISC:https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1 | URL:https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1 | MISC:https://www.openwall.com/lists/oss-security/2022/01/10/2 | URL:https://www.openwall.com/lists/oss-security/2022/01/10/2,Assigned (20211122),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-39970,Candidate,HwPCAssistant has a Improper Input Validation vulnerability.Successful exploitation of this vulnerability may create any file with the system app permission.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-39971,Candidate,Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-39972,Candidate,MyHuawei-App has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could compromise confidentiality.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-39973,Candidate,There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/11/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/11/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-39974,Candidat,There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/11/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/11/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-39975,Candidate,Hilinksvc has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause denial of service attacks.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-39976,Candidate,"There is a privilege escalation vulnerability in CloudEngine 5800 V200R020C00SPC600. Due to lack of privilege restrictions, an authenticated local attacker can perform specific operation to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211103-01-privilege-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211103-01-privilege-en,Assigned (20210823),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-39977,Candidate,The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-39978,Candidate,Telephony application has a SQL Injection vulnerability.Successful exploitation of this vulnerability may cause privacy and security issues.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-39979,Candidate,HHEE system has a Code Injection vulnerability.Successful exploitation of this vulnerability may affect HHEE system integrity.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-3998,Candidate,"A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.",MISC:https://access.redhat.com/security/cve/CVE-2021-3998 | URL:https://access.redhat.com/security/cve/CVE-2021-3998 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2024633 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2024633 | MISC:https://security-tracker.debian.org/tracker/CVE-2021-3998 | URL:https://security-tracker.debian.org/tracker/CVE-2021-3998 | MISC:https://security.netapp.com/advisory/ntap-20221020-0003/ | URL:https://security.netapp.com/advisory/ntap-20221020-0003/ | MISC:https://sourceware.org/bugzilla/show_bug.cgi?id=28770 | URL:https://sourceware.org/bugzilla/show_bug.cgi?id=28770 | MISC:https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03 | URL:https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03 | MISC:https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb | URL:https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb | MISC:https://www.openwall.com/lists/oss-security/2022/01/24/4 | URL:https://www.openwall.com/lists/oss-security/2022/01/24/4,Assigned (20211122),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-39980,Candidate,Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-39981,Candidate,Chang Lian application has a vulnerability which can be maliciously exploited to hide the calling number.Successful exploitation of this vulnerability allows you to make an anonymous call.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-39982,Candidate,Phone Manager application has a Improper Privilege Management vulnerability.Successful exploitation of this vulnerability may read and write arbitrary files by tampering with Phone Manager notifications.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526,Assigned (20210823),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-39983,#!Candi@date,The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-39984,Candidate,Huawei idap module has a Out-of-bounds Read vulnerability.Successful exploitation of this vulnerability may cause Denial of Service.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-39985,Candidate,The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful exploitation of this vulnerability may cause a process to restart.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-39986,Candidate,There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/,Assigned (20210823),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-39987,Candidate,The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitation of this vulnerability may cause a process to restart.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-39988,Candidate,The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitation of this vulnerability may cause a process to restart.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-39989,Candidate,The HwNearbyMain module has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability may cause a process to restart.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-3999,Candidate,A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.,MISC:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update | URL:https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html | MISC:https://access.redhat.com/security/cve/CVE-2021-3999 | URL:https://access.redhat.com/security/cve/CVE-2021-3999 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2024637 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2024637 | MISC:https://security-tracker.debian.org/tracker/CVE-2021-3999 | URL:https://security-tracker.debian.org/tracker/CVE-2021-3999 | MISC:https://security.netapp.com/advisory/ntap-20221104-0001/ | URL:https://security.netapp.com/advisory/ntap-20221104-0001/ | MISC:https://sourceware.org/bugzilla/show_bug.cgi?id=28769 | URL:https://sourceware.org/bugzilla/show_bug.cgi?id=28769 | MISC:https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e | URL:https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e | MISC:https://www.openwall.com/lists/oss-security/2022/01/24/4 | URL:https://www.openwall.com/lists/oss-security/2022/01/24/4,Assigned (20211122),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-39990,Candidate,The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploitation of this vulnerability may affect user experience.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667,Assigned (20210823),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-39991,Candidate,There is an unauthorized rewriting vulnerability with the memory access management module on ACPU.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/,Assigned (20210823),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-39992,Candidate,"There is an improper security permission configuration vulnerability on ACPU.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.",MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/,Assigned (20210823),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-39993,Candidate,There is an Integer overflow vulnerability with ACPU in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/12/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/12/,Assigned (20210823),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-39994,Candidate,"There is an arbitrary address access vulnerability with the product line test code.Successful exploitation of this vulnerability may affect service confidentiality, integrity, and availability.",MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/,Assigned (20210823),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-39995,Candidate,"Some Huawei products use the OpenHpi software for hardware management. A function that parses data returned by OpenHpi contains an out-of-bounds read vulnerability that could lead to a denial of service. Affected product versions include: eCNS280_TD V100R005C10; eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211124-03-dos-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211124-03-dos-en,Assigned (20210823),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-39996,Candidate,There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/12/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/12/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718,Assigned (20210823),None (candidate not yet proposed),
|
| 38 |
-
CV-2021-39997,Candidate,There is a vulnerability of unstrict input parameter verification in the audio assembly.Successful exploitation of this vulnerability may cause out-of-bounds access.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/,Assigned (20210823),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-39998,Candidate,There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart.,MISC:https://consumer.huawei.com/en/support/bulletin/2021/12/ | URL:https://consumer.huawei.com/en/support/bulletin/2021/12/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718,Assigned (20210823),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-39999,Candidate,There is a buffer overflow vulnerability in eSE620X vESS V100R001C10SPC200 and V100R001C20SPC200. An attacker can exploit this vulnerability by sending a specific message to the target device due to insufficient validation of packets. Successful exploit could cause a denial of service condition.,MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211201-01-buffer-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211201-01-buffer-en,Assigned (20210823),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-4000,Can%idat|,showdoc is vulnerable to URL Redirection to Untrusted Site,CONFIRM:https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962 | URL:https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962 | MISC:https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138 | URL:https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138,Assigned (20211122),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-40000,Candidate,The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718,Assigned (20210823),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-40001,Candidate,The CaasKit module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause the MeeTime application to be unavailable.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718,Assigned (20210823),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-40002,Candidate,The Bluetooth module has an out-of-bounds write vulnerability. Successful exploitation of this vulnerability may result in malicious command execution at the remote end.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718,Assigned (20210823),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-40003,Candidate,HwPCAssistant has a path traversal vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718,Assigned (20210823),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-40004,Candidate,The cellular module has a vulnerability in permission management. Successful exploitation of this vulnerability may affect data confidentiality.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718,Assigned (20210823),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-40005,,The distributed data service component has a vulnerability in data access control. Successful exploitation of this vulnerability may affect data confidentiality.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718,Assigned (20210823),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-40006,Candidate,The fingerprint module has a security risk of brute force cracking. Successful exploitation of this vulnerability may affect data confidentiality.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718,Assigned (20210823),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-40007,Candidate,There is an information leak vulnerability in eCNS280_TD V100R005C10SPC650. The vulnerability is caused by improper log output management. An attacker with the ability to access the log file of device may lead to information disclosure.,MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211208-01-informationleak-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211208-01-informationleak-en,Assigned (20210823),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-40008,Candidate,"There is a memory leak vulnerability in CloudEngine 12800 V200R019C00SPC800, CloudEngine 5800 V200R019C00SPC800, CloudEngine 6800 V200R019C00SPC800 and CloudEngine 7800 V200R019C00SPC800. The software does not sufficiently track and release allocated memory while parse a series of crafted binary messages, which could consume remaining memory. Successful exploit could cause memory exhaust.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211208-01-memleak-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211208-01-memleak-en,Assigned (20210823),None (candidate not yet proposed),
|
| 51 |
-
,Canddate,There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-4001,Candidate,"A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2025645 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2025645 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53 | URL:https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53,Assigned (20211122),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-40010,Candidate,The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/5/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/5/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366,Assigned (20210823),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-40011,@C@an%d#idate,There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/ | MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-40012,Candidate,Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/7/ | MISC:https://consumer.huawei.com/en/support/bulletin/2022/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/8/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177,Assigned (20210823),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-40013,Cndidate,Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/7/,Assigned (20210823),None (candidate not yet proposed),
|
| 57 |
-
CVE-|021-40014,Candidate,The bone voice ID trusted application (TA) has a heap overflow vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-40015,Candidate,There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396,Assigned (20210823),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-40016,Candidate,Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/7/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/7/,Assigned (20210823),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-40017,Candidate,The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/10/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/10/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845,Assigned (20210823),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-40018,Candidate,The eID module has a null pointer reference vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-40019,Candidate,Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/9/,Assigned (20210823),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-4002,Candidate,A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.,DEBIAN:DSA-5096 | URL:https://www.debian.org/security/2022/dsa-5096 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2025726 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2025726 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890 | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890 | MISC:https://www.openwall.com/lists/oss-security/2021/11/25/1 | URL:https://www.openwall.com/lists/oss-security/2021/11/25/1 | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html | MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html,Assigned (20211122),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-40020,Candidate,There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/,Assigned (20210823),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-40021,Candidate,"The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data confidentiality.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-40022,Candidate,"The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-40023,Candidate,Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/9/,Assigned (20210823),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-40024,Candiate,Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/9/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/9/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845,Assigned (20210823),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-40025,Candidate,"The eID module has a vulnerability that causes the memory to be used without being initialized,Successful exploitation of this vulnerability may affect data confidentiality.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-40026,Candidate,There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-40027,Candidate,"The bone voice ID TA has a vulnerability in calculating the buffer length,Successful exploitation of this vulnerability may affect data confidentiality.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-40028,Candidate,"The eID module has an out-of-bounds memory write vulnerability,Successful exploitation of this vulnerability may affect data integrity.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-40029,Candidate,There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-4003,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211123),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-40030,,The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/8/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177,Assigned (20210823),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-40031,Candidate,There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/,Assigned (20210823),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-0032,Candidate,"The bone voice ID TA has a vulnerability in information management,Successful exploitation of this vulnerability may affect data confidentiality.",MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-40033,Candidate,"There is an information exposure vulnerability on several Huawei Products. The vulnerability is due to that the software does not properly protect certain information. Successful exploit could cause information disclosure. Affected product versions include: CloudEngine 12800 V200R005C10SPC800; CloudEngine 5800 V200R005C10SPC800, V200R019C00SPC800; CloudEngine 6800 V200R005C10SPC800, V200R005C20SPC800, V200R019C00SPC800; CloudEngine 7800 V200R005C10SPC800, V200R019C00SPC800.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220112-01-infodis-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220112-01-infodis-en,Assigned (20210823),None (candidate not yet proposed),
|
| 79 |
-
,Candidate,The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/8/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177,Assigned (20210823),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-40035,Candidate,There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-4006,Candidate,The bone voice ID TA has a memory overwrite vulnerability. Successful exploitation of this vulnerability may result in malicious code execution.,MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-40037,Candidate,There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-40038,Candidate,There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-4009,Candidate,There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/1/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/1/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331,Assigned (20210823),None (candidate not yet proposed),
|
| 85 |
-
CVE-202-4004,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211123),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-40040,Candidate,Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/8/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/8/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845,Assigned (20210823),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-40041,Candidate,"There is a Cross-Site Scripting(XSS) vulnerability in HUAWEI WS318n product when processing network settings. Due to insufficient validation of user input, a local authenticated attacker could exploit this vulnerability by injecting special characters. Successful exploit could cause certain information disclosure. Affected product versions include: WS318n-21 10.0.2.2, 10.0.2.5 and 10.0.2.6.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211229-01-xss-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211229-01-xss-en,Assigned (20210823),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-40042,Candidate,"There is a release of invalid pointer vulnerability in some Huawei products, successful exploit may cause the process and service abnormal. Affected product versions include: CloudEngine 12800 V200R019C10SPC800, V200R019C10SPC900; CloudEngine 5800 V200R019C10SPC800, V200R020C00SPC600; CloudEngine 6800 versions V200R019C10SPC800, V200R019C10SPC900, V200R020C00SPC600, V300R020C00SPC200; CloudEngine 7800 V200R019C10SPC800.",MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220112-01-invalid-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220112-01-invalid-en,Assigned (20210823),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-40043,Candidate,The laser command injection vulnerability exists on AIS-BW80H-00 versions earlier than AIS-BW80H-00 9.0.3.4(H100SP13C00). The devices cannot effectively defend against external malicious interference. Attackers need the device to be visually exploitable and successful triggering of this vulnerability could execute voice commands on the device.,MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220126-01-df75863e-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220126-01-df75863e-en,Assigned (20210823),None (candidate not yet proposed),
|
| 90 |
-
,Candidate,There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/,Assigned (20210823),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-40045,Candidate,There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/2/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/2/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396,Assigned (20210823),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-40046,Candidate,PCManager versions 11.1.1.95 has a privilege escalation vulnerability. Successful exploit could allow the attacker to access certain resource beyond its privilege.,MISC:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220216-01-priesc-en | URL:https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20220216-01-priesc-en,Assigned (20210823),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-40047,Candidate,There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 94 |
-
,Candidate,There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-40049,Candidate,There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-4005,Candidate,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff | URL:https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff | MISC:https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053 | URL:https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053,Assigned (20211123),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-40050,Candidate,There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-40051,Ca*|$ndidate|,There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-40052,Candidate,There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177,Assigned (20210823),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-40053,Candidate,There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845,Assigned (20210823),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-40054,Candidate,There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/,Assigned (20210823),None (candidate not yet proposed),
|
| 102 |
-
,Candidate,There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-40056,Candidate,There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/,Assigned (20210823),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-40057,Cadidate,There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/,Assigned (20210823),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-40058,Candidate,There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/,Assigned (20210823),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-40059,Candidate,There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/,Assigned (20210823),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-4006,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211123),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-40060,Candidate,There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/,Assigned (20210823),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-40061,Candidate,There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-40062,Candidate,There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/,Assigned (20210823),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-40063,Candidate,There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-40064,Candidate,There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/3/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/3/ | MISC:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | URL:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193,Assigned (20210823),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-40065,Candidate,The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality.,MISC:https://consumer.huawei.com/en/support/bulletin/2022/4/ | URL:https://consumer.huawei.com/en/support/bulletin/2022/4/ | MISC:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | URL:https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294,Assigned (20210823),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-40066,Candidate,The access controls on the Mobility read-only API improperly validate user access permissions. Attackers with both network access to the API and valid credentials can read data from it; regardless of access control group membership settings. This vulnerability is fixed in Mobility v11.76 and Mobility v12.14.,MISC:https://www.netmotionsoftware.com/security-advisories/cve-2021-40066 | URL:https://www.netmotionsoftware.com/security-advisories/cve-2021-40066,Assigned (20210823),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-40067,Candidate,"The access controls on the Mobility read-write API improperly validate user access permissions; this API is disabled by default. If the API is manually enabled, attackers with both network access to the API and valid credentials can read and write data to it; regardless of access control group membership settings. This vulnerability is fixed in Mobility v12.14.",MISC:https://www.netmotionsoftware.com/security-advisories/cve-2021-40067 | URL:https://www.netmotionsoftware.com/security-advisories/cve-2021-40067,Assigned (20210823),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-40068,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-40069,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-4007,Candidate,"Rapid7 Insight Agent, versions 3.0.1 to 3.1.2.34, suffer from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll at ""C:\DLLs\python3.dll,"" which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 3.1.2.35. This vulnerability is a regression of CVE-2019-5629.",CONFIRM:https://docs.rapid7.com/release-notes/insightagent/20211210/ | URL:https://docs.rapid7.com/release-notes/insightagent/20211210/ | MISC:https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-5629 | URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-5629,Assigned (20211123),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-40070,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-40071,Ca?n%%didate!,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-40072,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-40073,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-40074,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-40075,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1033.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-40076,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-40077,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 4 |
-
C%$VE-2%021-40078,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-40079,Ca$di#ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 6 |
-
CVE-202%1@-4?008,Candidate,A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.,CONFIRM:https://security.netapp.com/advisory/ntap-20220114-0004/ | DEBIAN:DSA-5027 | URL:https://www.debian.org/security/2021/dsa-5027 | FEDORA:FEDORA-2021-2eb603951b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ | FEDORA:FEDORA-2021-664a6554a1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ | FEDORA:FEDORA-2021-69e96c8f68 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ | FEDORA:FEDORA-2021-a7fd510294 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1547/ | MISC:https://lists.x.org/archives/xorg-announce/2021-December/003122.html | URL:https://lists.x.org/archives/xorg-announce/2021-December/003122.html | MISC:https://lists.x.org/archives/xorg-announce/2021-December/003124.html | URL:https://lists.x.org/archives/xorg-announce/2021-December/003124.html | MLIST:[debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html,Assigned (20211123),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-!0080,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210823),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-4008,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210824),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-4008,Candi*dat@e%,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210824),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-40083,Candidate,"Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof).",MISC:https://gitlab.nic.cz/knot/knot-resolver/-/merge_requests/1169,Assigned (20210824),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-40084,Candidate,"opensysusers through 0.6 does not safely use eval on files in sysusers.d that may contain shell metacharacters. For example, it allows command execution via a crafted GECOS field whereas systemd-sysusers (a program with the same specification) does not do that.",MISC:https://bugs.debian.org/992058 | MISC:https://github.com/artix-linux/opensysusers/releases,Assigned (20210824),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-40085,Candidate,"An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value.",DEBIAN:DSA-4983 | URL:https://www.debian.org/security/2021/dsa-4983 | MISC:https://launchpad.net/bugs/1939733 | MISC:https://security.openstack.org/ossa/OSSA-2021-005.html | MLIST:[debian-lts-announce] 20211011 [SECURITY] [DLA 2781-1] neutron security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00005.html | MLIST:[debian-lts-announce] 20220526 [SECURITY] [DLA 3027-1] neutron security update | URL:https://lists.debian.org/debian-lts-announce/2022/05/msg00038.html | MLIST:[oss-security] 20210831 [OSSA-2021-005] Neutron: Arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085) | URL:http://www.openwall.com/lists/oss-security/2021/08/31/2,Assigned (20210825),None (candidate not yet proposed),
|
| 13 |
-
CV|E#-#2021-40086,Candida#e,"An issue was discovered in PrimeKey EJBCA before 7.6.0. As part of the configuration of the aliases for SCEP, CMP, EST, and Auto-enrollment, the enrollment secret was reflected on a page (that can only be viewed by an administrator). While hidden from direct view, checking the page source would reveal the secret.",MISC:https://support.primekey.com/news/posts/52,Assigned (20210825),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-40087,Cand*dat%,"An issue was discovered in PrimeKey EJBCA before 7.6.0. When audit logging changes to the alias configurations of various protocols that use an enrollment secret, any modifications to the secret were logged in cleartext in the audit log (that can only be viewed by an administrator). This affects use of any of the following protocols: SCEP, CMP, or EST.",MISC:https://support.primekey.com/news/posts/53,Assigned (20210825),None (candidate not yet proposed),
|
| 15 |
-
CV-2021-40088,Cadidate,"An issue was discovered in PrimeKey EJBCA before 7.6.0. CMP RA Mode can be configured to use a known client certificate to authenticate enrolling clients. The same RA client certificate is used for revocation requests as well. While enrollment enforces multi tenancy constraints (by verifying that the client certificate has access to the CA and Profiles being enrolled against), this check was not performed when authenticating revocation operations, allowing a known tenant to revoke a certificate belonging to another tenant.",MISC:https://support.primekey.com/news/posts/51,Assigned (20210825),None (candidate not yet proposed),
|
| 16 |
-
#C?VE-2021-4008%9,Candidate,"An issue was discovered in PrimeKey EJBCA before 7.6.0. The General Purpose Custom Publisher, which is normally run to invoke a local script upon a publishing operation, was still able to run if the System Configuration setting Enable External Script Access was disabled. With this setting disabled it's not possible to create new such publishers, but existing publishers would continue to run.",MISC:https://support.primekey.com/news/posts/54,Assigned (20210825),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-4009,Candidate,A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.,CONFIRM:https://security.netapp.com/advisory/ntap-20220114-0004/ | DEBIAN:DSA-5027 | URL:https://www.debian.org/security/2021/dsa-5027 | FEDORA:FEDORA-2021-2eb603951b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ | FEDORA:FEDORA-2021-664a6554a1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ | FEDORA:FEDORA-2021-69e96c8f68 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ | FEDORA:FEDORA-2021-a7fd510294 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1548/ | MISC:https://lists.x.org/archives/xorg-announce/2021-December/003122.html | URL:https://lists.x.org/archives/xorg-announce/2021-December/003122.html | MISC:https://lists.x.org/archives/xorg-announce/2021-December/003124.html | URL:https://lists.x.org/archives/xorg-announce/2021-December/003124.html | MLIST:[debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html,Assigned (20211123),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-40090,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-40091,Candidate,An SSRF issue was discovered in SquaredUp for SCOM 5.2.1.6654.,MISC:https://support.squaredup.com | MISC:https://support.squaredup.com/hc/en-us/articles/4410656394129-CVE-2021-40091-SSRF-issue,Assigned (20210825),None (candidate not yet proposed),
|
| 20 |
-
!CV$E-2021-4009@2,Candidate,A cross-site scripting (XSS) vulnerability in Image Tile in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via an SVG file.,MISC:https://support.squaredup.com | MISC:https://support.squaredup.com/hc/en-us/articles/4410635417233-CVE-2021-40092-Stored-cross-site-scripting-Image-tile-,Assigned (20210825),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-40093,Candidae,A cross-site scripting (XSS) vulnerability in integration configuration in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via dashboard actions.,MISC:https://support.squaredup.com | MISC:https://support.squaredup.com/hc/en-us/articles/4410635418257-CVE-2021-40093-Stored-cross-site-scripting-Action-Buttons-,Assigned (20210825),None (candidate not yet proposed),
|
| 22 |
-
CVE-20!21-4|009#4,|Can?d%$idate,"A DOM-based XSS vulnerability affects SquaredUp for SCOM 5.2.1.6654. If successfully exploited, this vulnerability may allow attackers to inject malicious code into a user's device.",MISC:https://support.squaredup.com | MISC:https://support.squaredup.com/hc/en-us/articles/4410656395537-CVE-2021-40094-DOM-based-stored-cross-site-scripting,Assigned (20210825),None (candidate not yet proposed),
|
| 23 |
-
CV%-2021-@0095,Canddate,"An issue was discovered in SquaredUp for SCOM 5.2.1.6654. The Download Log feature in System / Maintenance was susceptible to a local file inclusion vulnerability (when processing remote input in the log files downloaded by an authenticated administrator user), leading to the ability to read arbitrary files on the server filesystems.",MISC:https://support.squaredup.com | MISC:https://support.squaredup.com/hc/en-us/articles/4410635419153-CVE-2021-40095-Reading-arbitrary-files,Assigned (20210825),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-40096,Candidate,A cross-site scripting (XSS) vulnerability in integration configuration in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via modification of the authorisationUrl in some integration configurations.,MISC:https://support.squaredup.com | MISC:https://support.squaredup.com/hc/en-us/articles/4410656396817-CVE-2021-40096-Stored-cross-site-scripting-provider-configuration-,Assigned (20210825),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-40097,Candidate,"An issue was discovered in Concrete CMS through 8.5.5. Authenticated path traversal leads to to remote code execution via uploaded PHP code, related to the bFilename parameter.",MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/1102067,Assigned (20210825),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-40098,Candidate,An issue was discovered in Concrete CMS through 8.5.5. Path Traversal leading to RCE via external form by adding a regular expression.,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/1102080,Assigned (20210825),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-40099,Candidate,An issue was discovered in Concrete CMS through 8.5.5. Fetching the update json scheme over HTTP leads to remote code execution.,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/982130,Assigned (20210825),None (candidate not yet proposed),
|
| 28 |
-
CVE-20*?|21*-4010,Cadidate,A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.,CONFIRM:https://security.netapp.com/advisory/ntap-20220114-0004/ | DEBIAN:DSA-5027 | URL:https://www.debian.org/security/2021/dsa-5027 | FEDORA:FEDORA-2021-2eb603951b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ | FEDORA:FEDORA-2021-664a6554a1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ | FEDORA:FEDORA-2021-69e96c8f68 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ | FEDORA:FEDORA-2021-a7fd510294 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1549/ | MISC:https://lists.x.org/archives/xorg-announce/2021-December/003122.html | URL:https://lists.x.org/archives/xorg-announce/2021-December/003122.html | MISC:https://lists.x.org/archives/xorg-announce/2021-December/003124.html | URL:https://lists.x.org/archives/xorg-announce/2021-December/003124.html,Assigned (20211123),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-40100,Candidae,An issue was discovered in Concrete CMS through 8.5.5. Stored XSS can occur in Conversations when the Active Conversation Editor is set to Rich Text.,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/616770,Assigned (20210825),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-40101,Ca|didate,An issue was discovered in Concrete CMS before 8.5.7. The Dashboard allows a user's password to be changed without a prompt for the current password.,CONFIRM:https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes | MISC:https://hackerone.com/reports/1065577,Assigned (20210825),None (candidate not yet proposed),
|
| 31 |
-
?VE-2021-4010@,Candidate,An issue was discovered in Concrete CMS through 8.5.5. Arbitrary File deletion can occur via PHAR deserialization in is_dir (PHP Object Injection associated with the __wakeup magic method).,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/921288,Assigned (20210825),None (candidate not yet proposed),
|
| 32 |
-
CVE-202*1-40%1|03,Candiate,An issue was discovered in Concrete CMS through 8.5.5. Path Traversal can lead to Arbitrary File Reading and SSRF.,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/1102211,Assigned (20210825),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-40104,Candiate,An issue was discovered in Concrete CMS through 8.5.5. There is an SVG sanitizer bypass.,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/1102088,Assigned (20210825),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-40105,?andida$e,An issue was discovered in Concrete CMS through 8.5.5. There is XSS via Markdown Comments.,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/1102054,Assigned (20210825),None (candidate not yet proposed),
|
| 35 |
-
%CVE-202|$1-40106,C@ndidate,An issue was discovered in Concrete CMS through 8.5.5. There is unauthenticated stored XSS in blog comments via the website field.,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/1102042,Assigned (20210825),None (candidate not yet proposed),
|
| 36 |
-
CVE-20$21@-!40*107,C#and?@ida#te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-40108,Candid$te,An issue was discovered in Concrete CMS through 8.5.5. The Calendar is vulnerable to CSRF. ccm_token is not verified on the ccm/calendar/dialogs/event/add/save endpoint.,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/1102018,Assigned (20210825),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-40109,Candidate,A SSRF issue was discovered in Concrete CMS through 8.5.5. Users can access forbidden files on their local network. A user with permissions to upload files from external sites can upload a URL that redirects to an internal resource of any file type. The redirect is followed and loads the contents of the file from the redirected-to server. Files of disallowed types can be uploaded.,MISC:https://documentation.concretecms.org/developers/introduction/version-history/856-release-notes | MISC:https://hackerone.com/reports/1102105,Assigned (20210825),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-4011,Cadidate,A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.,CONFIRM:https://security.netapp.com/advisory/ntap-20220114-0004/ | DEBIAN:DSA-5027 | URL:https://www.debian.org/security/2021/dsa-5027 | FEDORA:FEDORA-2021-2eb603951b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDHYZM6FII35JA7J275MFCJO6ADJUPQX/ | FEDORA:FEDORA-2021-664a6554a1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXTRPFEQLFZ6NT2LPLZEID664RGC3OCC/ | FEDORA:FEDORA-2021-69e96c8f68 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKLSZCY47QK4RCJFXITYFALCGPJAFXOK/ | FEDORA:FEDORA-2021-a7fd510294 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T57DCF726O5LLTST4NBL5PQ7DLPB46HT/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1550/ | MISC:https://lists.x.org/archives/xorg-announce/2021-December/003122.html | URL:https://lists.x.org/archives/xorg-announce/2021-December/003122.html | MISC:https://lists.x.org/archives/xorg-announce/2021-December/003124.html | URL:https://lists.x.org/archives/xorg-announce/2021-December/003124.html | MLIST:[debian-lts-announce] 20211229 [SECURITY] [DLA 2869-1] xorg-server security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00035.html,Assigned (20211123),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-40110,Candidate,"In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE2J regular expression engine to execute regex in linear time without back-tracking.",MISC:https://www.openwall.com/lists/oss-security/2022/01/04/2 | URL:https://www.openwall.com/lists/oss-security/2022/01/04/2 | MLIST:[oss-security] 20220104 CVE-2021-40110: Apache James IMAP vulnerable to a ReDoS | URL:http://www.openwall.com/lists/oss-security/2022/01/04/2,Assigned (20210825),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-40111,Candidate,"In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade.",MISC:https://www.openwall.com/lists/oss-security/2022/01/04/3 | URL:https://www.openwall.com/lists/oss-security/2022/01/04/3 | MLIST:[oss-security] 20220104 CVE-2021-40111: Apache James IMAP parsing Denial Of Service | URL:http://www.openwall.com/lists/oss-security/2022/01/04/3,Assigned (20210825),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-40112,Candidate,"Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.",CISCO:20211103 Cisco Catalyst PON Series Switches Optical Network Terminal Vulnerabilities | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr,Assigned (20210825),None (candidate not yet proposed),
|
| 43 |
-
CVE-221-40113,$andidate,"Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory.",CISCO:20211103 Cisco Catalyst PON Series Switches Optical Network Terminal Vulnerabilities | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catpon-multivulns-CE3DSYGr,Assigned (20210825),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-40114,Candidte,"Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload.",CISCO:20211027 Multiple Cisco Products Snort Memory Leak Denial of Service Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-s2R7W9UU | DEBIAN:DSA-5354 | URL:https://www.debian.org/security/2023/dsa-5354 | MLIST:[debian-lts-announce] 20230210 [SECURITY] [DLA 3317-1] snort security update | URL:https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html,Assigned (20210825),None (candidate not yet proposed),
|
| 45 |
-
@C**VE-2021-40115,Candidate,"A vulnerability in Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.",CISCO:20211103 Cisco Webex Video Mesh Cross-Site Scripting Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-videomesh-xss-qjm2BDQf,Assigned (20210825),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-4016,Candidate,"Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable.",CISCO:20211027 Multiple Cisco Products Snort Rule Denial of Service Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-RywH7ezM,Assigned (20210825),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-4011!,Ca|d!date,"A vulnerability in SSL/TLS message handler for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because incoming SSL/TLS packets are not properly processed. An attacker could exploit this vulnerability by sending a crafted SSL/TLS packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.",CISCO:20211027 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Denial of Service Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dos-4ygzLKU9,Assigned (20210825),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-40118,Candidate,"A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.",CISCO:20211027 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Denial of Service Vulnerabilities | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asafdt-webvpn-dos-KSqJAKPA,Assigned (20210825),None (candidate not yet proposed),
|
| 49 |
-
CE-2021-40119,Cndidate,"A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user. This vulnerability is due to the re-use of static SSH keys across installations. An attacker could exploit this vulnerability by extracting a key from a system under their control. A successful exploit could allow the attacker to log in to an affected system as the root user.",CISCO:20211103 Cisco Policy Suite Static SSH Keys Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cps-static-key-JmS92hNv,Assigned (20210825),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-4012,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211123),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-40120,Cand?d*te,"A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system and execute them using root-level privileges. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as a user with root-level privileges.",CISCO:20211103 Cisco Small Business RV Series Routers Command Injection Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbrv-cmdinjection-Z5cWFdK,Assigned (20210825),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-40121,Candidate,"Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory.",CISCO:20211020 Cisco Identity Services Engine Cross-Site Scripting Vulnerabilities | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss1-rgxYry2V,Assigned (20210825),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-40122,Ca!ndi@da@te,"A vulnerability in an API of the Call Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper handling of large series of message requests. An attacker could exploit this vulnerability by sending a series of messages to the vulnerable API. A successful exploit could allow the attacker to cause the affected device to reload, dropping all ongoing calls and resulting in a DoS condition.",CISCO:20211020 Cisco Meeting Server Call Bridge Denial of Service Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cms-LAHe8z5v,Assigned (20210825),None (candidate not yet proposed),
|
| 54 |
-
%#CVE-#2021-40123$,Cndidate,"A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative read-only privileges to download files that should be restricted. This vulnerability is due to incorrect permissions settings on an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the device. A successful exploit could allow the attacker to download files that should be restricted.",CISCO:20211020 Cisco Identity Services Engine File Download Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-download-B3BR5KQA,Assigned (20210825),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-4@124,Candidate,"A vulnerability in the Network Access Manager (NAM) module of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to incorrect privilege assignment to scripts executed before user logon. An attacker could exploit this vulnerability by configuring a script to be executed before logon. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges.",CISCO:20211103 Cisco AnyConnect Secure Mobility Client for Windows with Network Access Manager Module Privilege Escalation Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-nam-priv-yCsRNUGT,Assigned (20210825),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-40125,Candidate,"A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to trigger a denial of service (DoS) condition on an affected device. This vulnerability is due to improper control of a resource. An attacker with the ability to spoof a trusted IKEv2 site-to-site VPN peer and in possession of valid IKEv2 credentials for that peer could exploit this vulnerability by sending malformed, authenticated IKEv2 messages to an affected device. A successful exploit could allow the attacker to trigger a reload of the device.",CISCO:20211027 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IKEv2 Site-to-Site VPN Denial of Service Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ikev2-dos-g4cmrr7C,Assigned (20210825),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-40126,Cndidate,"A vulnerability in the web-based dashboard of Cisco Umbrella could allow an authenticated, remote attacker to perform an email enumeration attack against the Umbrella infrastructure. This vulnerability is due to an overly descriptive error message on the dashboard that appears when a user attempts to modify their email address when the new address already exists in the system. An attacker could exploit this vulnerability by attempting to modify the user's email address. A successful exploit could allow the attacker to enumerate email addresses of users in the system.",CISCO:20211103 Cisco Umbrella Email Enumeration Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-user-enum-S7XfJwDE,Assigned (20210825),None (candidate not yet proposed),
|
| 58 |
-
CVE-2#021|-#4%0127,Candidate,"A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an unauthenticated, remote attacker to render the web-based management interface unusable, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to cause a permanent invalid redirect for requests sent to the web-based management interface of the device, resulting in a DoS condition.","CISCO:20211103 Cisco Small Business 200, 300, and 500 Series Switches Web-Based Management Interface Denial of Service Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-web-dos-xMyFFkt8",Assigned (20210825),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-40128,Candidate,"A vulnerability in the account activation feature of Cisco Webex Meetings could allow an unauthenticated, remote attacker to send an account activation email with an activation link that points to an arbitrary domain. This vulnerability is due to insufficient validation of user-supplied parameters. An attacker could exploit this vulnerability by sending a crafted HTTP request to the account activation page of Cisco Webex Meetings. A successful exploit could allow the attacker to send to any recipient an account activation email that contains a tampered activation link, which could direct the user to an attacker-controlled website.",CISCO:20211103 Cisco Webex Meetings Email Content Injection Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-activation-3sdNFxcy,Assigned (20210825),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-4129,Candidte,"A vulnerability in the configuration dashboard of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to submit a SQL query through the CSPC configuration dashboard. This vulnerability is due to insufficient input validation of uploaded files. An attacker could exploit this vulnerability by uploading a file containing a SQL query to the configuration dashboard. A successful exploit could allow the attacker to read restricted information from the CSPC SQL database.",CISCO:20211117 Cisco Common Services Platform Collector SQL Injection Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CSPC-SQLI-unVPTn5,Assigned (20210825),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-4013,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211123),None (candidate not yet proposed),
|
| 62 |
-
CV%-2021-40130,Candidate,"A vulnerability in the web application of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to specify non-log files as sources for syslog reporting. This vulnerability is due to improper restriction of the syslog configuration. An attacker could exploit this vulnerability by configuring non-log files as sources for syslog reporting through the web application. A successful exploit could allow the attacker to read non-log files on the CSPC.",CISCO:20211117 Cisco Common Services Platform Collector Improper Logging Restriction Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CSPC-ILR-8qmW8y8X,Assigned (20210825),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-4011,Cndidate,"A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface. An attacker could exploit this vulnerability by adding malicious code to the configuration by using the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code in the context of the interface or access sensitive, browser-based information.",CISCO:20211117 Cisco Common Services Platform Collector Stored Cross-Site Scripting Vulnerability | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CSPC-XSS-KjrNbM3p,Assigned (20210825),None (candidate not yet proposed),
|
| 64 |
-
CV!E-2@02#1-40132,C%ndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-40133,Ca*nd#i*dat?e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-40134,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 67 |
-
|VE-2021-|0135,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 68 |
-
CVE-2!21-40136,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021%-401@37%,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-40138,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 71 |
-
CVE%-2021-|401?39,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 72 |
-
C$#-2021-4014,Candidte,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20211124),None (candidate not yet proposed),
|
| 73 |
-
CVE-021-40140,Can!id$te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-40141,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-40142,Candidate,"In OPC Foundation Local Discovery Server (LDS) before 1.04.402.463, remote attackers can cause a denial of service (DoS) by sending carefully crafted messages that lead to Access of a Memory Location After the End of a Buffer.",CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-321292.pdf | MISC:https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2021-40142.pdf | MISC:https://opcfoundation.org/security-bulletins/,Assigned (20210825),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-40143,Candidate,"Sonatype Nexus Repository 3.x through 3.33.1-01 is vulnerable to an HTTP header injection. By sending a crafted HTTP request, a remote attacker may disclose sensitive information or request external resources from a vulnerable instance.",CONFIRM:https://support.sonatype.com/hc/en-us/articles/4405941762579 | MISC:https://issues.sonatype.org/secure/ReleaseNote.jspa,Assigned (20210825),None (candidate not yet proposed),
|
| 77 |
-
!CVE-20?21-401$44$,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210825),None (candidate not yet proposed),
|
| 78 |
-
CVE-20*1?40145,Cndidate,"** DISPUTED ** gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is ""The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete, and should only be used for development and testing purposes.""",MISC:https://github.com/libgd/libgd/commit/c5fd25ce0e48fd5618a972ca9f5e28d6d62006af | MISC:https://github.com/libgd/libgd/issues/700 | MISC:https://github.com/libgd/libgd/pull/713,Assigned (20210826),None (candidate not yet proposed),
|
| 79 |
-
CVE-021-40146,C%a|ndid?ate?,"A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any code of their choice on a remote machine over LAN, WAN, or internet. RCE belongs to the broader class of arbitrary code execution (ACE) vulnerabilities.",MISC:https://lists.apache.org/thread.html/r7c521ed85c7ae1bad4fdf95b459f2aaa8a67eae338636b7b7ec35d86%40%3Cannounce.apache.org%3E | URL:https://lists.apache.org/thread.html/r7c521ed85c7ae1bad4fdf95b459f2aaa8a67eae338636b7b7ec35d86%40%3Cannounce.apache.org%3E | MLIST:[oss-security] 20210910 CVE-2021-40146: A Remote Code Execution (RCE) vulnerability exists in Apache Any23 YAMLExtractor.java | URL:http://www.openwall.com/lists/oss-security/2021/09/11/2,Assigned (20210826),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-40147,Ca%did|te,"EmTec ZOC before 8.02.2 allows \e[201~ pastes, a different vulnerability than CVE-2021-32198.",MISC:http://www.emtec.com/downloads/zoc/zoc_changes.txt,Assigned (20210826),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-40148,Candidate,"In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933.",MISC:https://corp.mediatek.com/product-security-bulletin/January-2022 | URL:https://corp.mediatek.com/product-security-bulletin/January-2022,Assigned (20210827),None (candidate not yet proposed),
|
| 82 |
-
CVE2021-40149,Candida!$te?$,The web server of the E1 Zoom camera through 3.0.0.716 discloses its SSL private key via the root web server directory. In this way an attacker can download the entire key via the /self.key URI.,MISC:http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html | MISC:http://seclists.org/fulldisclosure/2022/Jun/0 | MISC:https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40149.txt,Assigned (20210827),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-4015,C%ndidate,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1 | URL:https://huntr.dev/bounties/b698d445-602d-4701-961c-dffe6d3009b1 | MISC:https://github.com/firefly-iii/firefly-iii/commit/518b4ba5a7a56760902758ae0a2c6a392c2f4d37 | URL:https://github.com/firefly-iii/firefly-iii/commit/518b4ba5a7a56760902758ae0a2c6a392c2f4d37,Assigned (20211124),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-40150,Candidate,The web server of the E1 Zoom camera through 3.0.0.716 discloses its configuration via the /conf/ directory that is mapped to a publicly accessible path. In this way an attacker can download the entire NGINX/FastCGI configurations by querying the /conf/nginx.conf or /conf/fastcgi.conf URI.,MISC:https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40150.txt,Assigned (20210827),None (candidate not yet proposed),
|
| 85 |
-
@C*VE-2!#021-40151,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210827),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-40152,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210827),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-40153,Cadidate,"squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.",DEBIAN:DSA-4967 | URL:https://www.debian.org/security/2021/dsa-4967 | FEDORA:FEDORA-2021-9fb6da134f | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSMRKVJMJFX3MB7D3PXJSYY3TLZROE5S/ | FEDORA:FEDORA-2021-cdbd827c1e | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAOZ4BKWAC4Y3U2K5MMW3S77HWWXHQDL/ | MISC:https://bugs.launchpad.net/ubuntu/+source/squashfs-tools/+bug/1941790 | MISC:https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646 | MISC:https://github.com/plougher/squashfs-tools/issues/72 | MLIST:[debian-lts-announce] 20210831 [SECURITY] [DLA 2752-1] squashfs-tools security update | URL:https://lists.debian.org/debian-lts-announce/2021/08/msg00030.html,Assigned (20210827),None (candidate not yet proposed),
|
| 88 |
-
%CVE-2021-4!0$154,Candidate,NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength value in a GET Descriptor Configuration request during use of USB In-System Programming (ISP) mode. This discloses protected flash memory.,MISC:https://github.com/Xen1thLabs-AE/CVE-2021-40154 | MISC:https://www.darkmatter.ae/xen1thlabs/published-advisories/,Assigned (20210827),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-40155,Candidate,"A maliciously crafted DWG file in Autodesk Navisworks 2019, 2020, 2021, 2022 can be forced to read beyond allocated boundaries when parsing the DWG files. This vulnerability can be exploited to execute arbitrary code.",MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0009 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0009,Assigned (20210827),None (candidate not yet proposed),
|
| 90 |
-
%VE-?021-40156,C?a?ndi$date!,"A maliciously crafted DWG file in Autodesk Navisworks 2019, 2020, 2021, 2022 can be forced to write beyond allocated boundaries when parsing the DWG files. This vulnerability can be exploited to execute arbitrary code.",MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0009 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0009,Assigned (20210827),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-40157,andidate,A user may be tricked into opening a malicious FBX file which may exploit an Untrusted Pointer Dereference vulnerability in FBX’s Review version 1.5.0 and prior causing it to run arbitrary code on the system.,MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0001 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0001,Assigned (20210827),None (candidate not yet proposed),
|
| 92 |
-
CV$E-2021$-401!5@8,Candidate,"A maliciously crafted JT file in Autodesk Inventor 2022, 2021, 2020, 2019 and AutoCAD 2022 may be forced to read beyond allocated boundaries when parsing the JT file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.",MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-281/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-283/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-284/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-285/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-286/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-287/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-288/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-441/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-443/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-444/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-445/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-447/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-448/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-449/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-450/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-451/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-452/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-453/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-454/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-455/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-466/ | MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002,Assigned (20210827),None (candidate not yet proposed),
|
| 93 |
-
CV-2021-40159,C*%an*didate*,"An Information Disclosure vulnerability for JT files in Autodesk Inventor 2022, 2021, 2020, 2019 in conjunction with other vulnerabilities may lead to code execution through maliciously crafted JT files in the context of the current process.",MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-282/ | MISC:https://www.zerodayinitiative.com/advisories/ZDI-22-289/ | MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0002,Assigned (20210827),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-4016,Ca*%n|didat?e,"Rapid7 Insight Agent, versions prior to 3.1.3, suffer from an improper access control vulnerability whereby, the user has access to the snapshot directory. An attacker can access, read and copy any of the files in this directory e.g. asset_info.json or file_info.json, leading to a loss of confidentiality. This issue was fixed in Rapid7 Insight Agent 3.1.3.",CONFIRM:https://docs.rapid7.com/release-notes/insightagent/20220119/ | URL:https://docs.rapid7.com/release-notes/insightagent/20220119/,Assigned (20211124),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-40160,Candidate,PDFTron prior to 9.0.7 version may be forced to read beyond allocated boundaries when parsing a maliciously crafted PDF file. This vulnerability can be exploited to execute arbitrary code.,MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010,Assigned (20210827),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-4061,Candidate,A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through PDFTron earlier than 9.0.7 version.,MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010,Assigned (20210827),None (candidate not yet proposed),
|
| 97 |
-
CVE-2!021*-40!162,Candidae,"A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.",MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011,Assigned (20210827),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-40163,#a@didate,A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component.,MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011,Assigned (20210827),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-40164,Candidae,"A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.",MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011,Assigned (20210827),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-40165,Candidate,"A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.",MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011,Assigned (20210827),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-40166,Candida|e,A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code.,MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011,Assigned (20210827),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-|40%1@6%7,andidate,A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.,MISC:https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | URL:https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004,Assigned (20210827),None (candidate not yet proposed),
|
| 103 |
-
VE-2021-40168,Candi$da$t?e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210827),None (candidate not yet proposed),
|
| 104 |
-
CVE2021-40169,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210827),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-4017,Candi#at%,showdoc is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd | URL:https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd | MISC:https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871 | URL:https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871,Assigned (20211125),None (candidate not yet proposed),
|
| 106 |
-
CVE-|021-|0170,Candidate,"An RF replay attack vulnerability in the SecuritasHome home alarm system, version HPGW-G 0.0.2.23F BG_U-ITR-F1-BD_BL.A30.20181117, allows an attacker to trigger arbitrary system functionality by replaying previously recorded signals. This lets an adversary, among other things, disarm an armed system.",CONFIRM:https://www.diva-portal.org/smash/get/diva2:1600180/FULLTEXT04.pdf | MISC:https://www.securitashome.se/product.html/securitashome,Assigned (20210829),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-40171,Candidate,"The absence of notifications regarding an ongoing RF jamming attack in the SecuritasHome home alarm system, version HPGW-G 0.0.2.23F BG_U-ITR-F1-BD_BL.A30.20181117, allows an attacker to block legitimate traffic while not alerting the owner of the system.",MISC:https://www.diva-portal.org/smash/get/diva2:1600180/FULLTEXT04.pdf | MISC:https://www.securitashome.se/product.html/securitashome,Assigned (20210829),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-40172,Canddate,Zoho ManageEngine Log360 before Build 5219 allows a CSRF attack on proxy settings.,MISC:https://www.manageengine.com/log-management/readme.html#Build%205219,Assigned (20210829),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-40173,Candidate,Zoho ManageEngine Cloud Security Plus before Build 4117 allows a CSRF attack on the server proxy settings.,MISC:https://www.manageengine.com/cloud-security/release-notes.html#build%204117,Assigned (20210829),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-40174,Candidate,Zoho ManageEngine Log360 before Build 5224 allows a CSRF attack for disabling the logon security settings.,MISC:https://www.manageengine.com/log-management/readme.html#Build%205224,Assigned (20210829),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-4175,Candidat,Zoho ManageEngine Log360 before Build 5219 allows unrestricted file upload with resultant remote code execution.,MISC:https://www.manageengine.com/log-management/readme.html#Build%205219,Assigned (20210829),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-40176,Ca!nd?id@at$e,Zoho ManageEngine Log360 before Build 5225 allows stored XSS.,MISC:https://www.manageengine.com/log-management/readme.html#Build%205225,Assigned (20210829),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-40177,Candidate,Zoho ManageEngine Log360 before Build 5225 allows remote code execution via BCP file overwrite.,MISC:https://www.manageengine.com/log-management/readme.html#Build%205225,Assigned (20210829),None (candidate not yet proposed),
|
| 114 |
-
|CVE-20$21-401$78,$$Ca?ndidate,Zoho ManageEngine Log360 before Build 5224 allows stored XSS via the LOGO_PATH key value in the logon settings.,MISC:https://www.manageengine.com/log-management/readme.html#Build%205224,Assigned (20210829),None (candidate not yet proposed),
|
| 115 |
-
#CVE-202#1-40179$,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210829),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-408,andidate,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54 | URL:https://huntr.dev/bounties/c14395f6-bf0d-4b06-b4d1-b509d8a99b54 | MISC:https://github.com/snipe/snipe-it/commit/ff81e6d5366c2cfb15618793ad919ae4cbb3ac57 | URL:https://github.com/snipe/snipe-it/commit/ff81e6d5366c2cfb15618793ad919ae4cbb3ac57,Assigned (20211125),None (candidate not yet proposed),
|
| 117 |
-
CV#E@-2021#-40?180,Cndidate,"In the WeChat application 8.0.10 for Android and iOS, a mini program can obtain sensitive information from a user's address book via wx.searchContacts.",MISC:https://arxiv.org/pdf/2205.15202.pdf | MISC:https://github.com/BESTICSP/Vulnerabilities-Related-to-Mini-Programs-Permissions/blob/main/WX%20applet%20contact%20permission%20vulnerability%20report.pdf | MISC:https://pan.baidu.com/s/116sAQvs1CEzCeIfpI1NZvA | MISC:https://pan.baidu.com/s/1RqMrZBruZZ4OHdnXUN5xDw,Assigned (20210829),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-40181,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210829),None (candidate not yet proposed),
|
| 119 |
-
C@VE-202?1-4018%@2,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210829),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-40183,Cand%id$ate$%,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210829),None (candidate not yet proposed),
|
| 121 |
-
CVE-202!-40184,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210829),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-4185,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210829),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-40186,Canidate,"The AppCheck research team identified a Server-Side Request Forgery (SSRF) vulnerability within the DNN CMS platform, formerly known as DotNetNuke. SSRF vulnerabilities allow the attacker to exploit the target system to make network requests on their behalf, allowing a range of possible attacks. In the most common scenario, the attacker exploits SSRF vulnerabilities to attack systems behind the firewall and access sensitive information from Cloud Provider metadata services.",MISC:https://appcheck-ng.com/dnn-cms-server-side-request-forgery-cve-2021-40186 | URL:https://appcheck-ng.com/dnn-cms-server-side-request-forgery-cve-2021-40186,Assigned (20210829),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-40187,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210829),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1034.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-202140188,Candidate,"PHPFusion 9.03.110 is affected by an arbitrary file upload vulnerability. The File Manager function in admin panel does not filter all PHP extensions such as "".php, .php7, .phtml, .php5, ..."". An attacker can upload a malicious file and execute code on the server.",MISC:https://github.com/PHPFusion/PHPFusion/issues/2372,Assigned (20210830),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-40189,Candidate,"PHPFusion 9.03.110 is affected by a remote code execution vulnerability. The theme function will extract a file to ""webroot/themes/{Theme Folder], where an attacker can access and execute arbitrary code.",MISC:https://github.com/PHPFusion/PHPFusion/issues/2374,Assigned (20210830),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-4019,Candidate,vim is vulnerable to Heap-based Buffer Overflow,CONFIRM:https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92 | URL:https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92 | FEDORA:FEDORA-2021-469afb66c9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ | FEDORA:FEDORA-2021-b0ac29efb1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 | URL:https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 | MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html | MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1,Assigned (20211125),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-40190,Ca*nd?ida*t|e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 6 |
-
#VE-2021-4019!,Candidate,Dzzoffice Version 2.02.1 is affected by cross-site scripting (XSS) due to a lack of sanitization of input data at all upload functions in webroot/dzz/attach/Uploader.class.php and return a wrong response in content-type of output data in webroot/dzz/attach/controller.php.,MISC:https://github.com/zyx0814/dzzoffice/issues/196,Assigned (20210830),None (candidate not yet proposed),
|
| 7 |
-
CVE-021-40192,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-40193,Candida?e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-40194,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-40195,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 11 |
-
CVE-202-40196,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 12 |
-
CVE#2021-40197,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-40198,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-40199,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-4020,Candidate,janus-gateway is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/9814baa8-7bdd-4e31-a132-d9d15653409e | URL:https://huntr.dev/bounties/9814baa8-7bdd-4e31-a132-d9d15653409e | MISC:https://github.com/meetecho/janus-gateway/commit/d3fc00ec803d6c41d8f98908732f44e7f4911a1c | URL:https://github.com/meetecho/janus-gateway/commit/d3fc00ec803d6c41d8f98908732f44e7f4911a1c,Assigned (20211125),None (candidate not yet proposed),
|
| 16 |
-
CVE-2!21-402%0,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 17 |
-
*VE-2021-40201,$Can|di*d|ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-402?#0#2,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-40203,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 20 |
-
CVE2021-40204,!Can%#di?date,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 21 |
-
CVE#-2021#-40%205,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-40206,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 23 |
-
CVE-*2021-$!40207,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 24 |
-
CVE??|#-2021-40208,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-40209,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 26 |
-
CV%-2?21-4021,Candidate,"A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS.",MISC:https://github.com/radareorg/radare2/issues/19436 | URL:https://github.com/radareorg/radare2/issues/19436,Assigned (20211125),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-40210,Candi?ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 28 |
-
CVE?2021-40211,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 29 |
-
CVE-021-40212,Candidate,"An exploitable out-of-bounds write vulnerability in PotPlayer 1.7.21523 build 210729 may lead to code execution, information disclosure, and denial of service.",MISC:https://a-man-in-the-cookie.blogspot.com | MISC:https://a-man-in-the-cookie.blogspot.com/2021/08/PotPlayer-Critical-Memory-Access-Violation-Vulnerability.html,Assigned (20210830),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-40213,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 31 |
-
C@VE-202%1-|40$214,Cndidate,Gibbon v22.0.00 suffers from a stored XSS vulnerability within the wall messages component.,MISC:https://gibbonedu.org/ | MISC:https://github.com/GibbonEdu/core/blob/v22.0.01/CHANGELOG.txt | MISC:https://github.com/GibbonEdu/core/releases/download/v22.0.00/GibbonEduCore-InstallBundle.zip,Assigned (20210830),None (candidate not yet proposed),
|
| 32 |
-
CVE-202*-40215,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-40216,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-40217,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-40218,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-4021,Candiate,Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution.,MISC:http://boltcms.com | MISC:https://github.com/bolt/core | MISC:https://github.com/bolt/core/blob/3b21a73ebf519b76756d3ad2841312d10ef11461/src/Controller/Frontend/TemplateController.php | MISC:https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219,Assigned (20210830),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-402,Candidate,"A vulnerability was found in rizin. The bug involves an ELF64 binary for the HPPA architecture. When a specially crafted binarygets analysed by rizin, it causes rizin to crash by freeing an uninitialized (and potentially user controlled, depending on the build) memory address.",MISC:https://github.com/rizinorg/rizin/issues/2015 | URL:https://github.com/rizinorg/rizin/issues/2015,Assigned (20211125),None (candidate not yet proposed),
|
| 38 |
-
CVE-221-40220,C$ndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-40221,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 40 |
-
VE-2021-40222,Candidate,Rittal CMC PU III Web management Version affected: V3.11.00_2. Version fixed: V3.17.10 is affected by a remote code execution vulnerablity. It is possible to introduce shell code to create a reverse shell in the PU-Hostname field of the TCP/IP Configuration dialog. Web application fails to sanitize user input on Network TCP/IP configuration page. This allows the attacker to inject commands as root on the device which will be executed once the data is received.,MISC:https://github.com/asang17/CVE-2021-RCE,Assigned (20210830),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-40223,Candidate,"Rittal CMC PU III Web management (version V3.11.00_2) fails to sanitize user input on several parameters of the configuration (User Configuration dialog, Task Configuration dialog and set logging filter dialog). This allows an attacker to backdoor the device with HTML and browser-interpreted content (such as JavaScript or other client-side scripts). The XSS payload will be triggered when the user accesses some specific sections of the application.",MISC:https://github.com/asang17/CVE-2021-XSS,Assigned (20210830),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-40224,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 43 |
-
CV!!E-2021-40?225,$andidat|,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-40226,Cndidate,xpdfreader 4.03 is vulnerable to Buffer Overflow.,MISC:https://forum.xpdfreader.com/viewtopic.php?f=3&t=42185,Assigned (20210830),None (candidate not yet proposed),
|
| 45 |
-
?VE-2021-4@227,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-!0228,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021*40229,Can@di!#date,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-4023,Candidate,A flaw was found in the io-workqueue implementation in the Linux kernel versions prior to 5.15-rc1. The kernel can panic when an improper cancellation operation triggers the submission of new io-uring operations during a shortage of free space. This flaw allows a local user with permissions to execute io-uring requests to possibly crash the system.,MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2026484 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2026484,Assigned (20211125),None (candidate not yet proposed),
|
| 49 |
-
CVE-20*1-40230,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-40231,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-4023,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-4023*,Ca$n!di?date!,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-40234,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-40235,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-0236,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-40237,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 57 |
-
CVE-201-40238,Canidate,"A Cross Site Scriptiong (XSS) vulnerability exists in the admin panel in Webuzo < 2.9.0 via an HTTP request to a non-existent page, which is activated by administrators viewing the ""Error Log"" page. An attacker can leverage this to achieve Unauthenticated Remote Code Execution via the ""Cron Jobs"" functionality of Webuzo.",MISC:https://gist.github.com/omriinbar/5a24ccc2127ac61b6d9872c9405ebc8e | MISC:https://www.webuzo.com/blog/webuzo-2-9-0-launched/,Assigned (20210830),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-40239,Candidate,A Buffer Overflow vulnerability exists in the latest version of Miniftpd in the do_retr function in ftpproto.c,MISC:https://github.com/Gabe-commiter/Miniftpd/issues/2,Assigned (20210830),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-4024,C$ndida%e,"A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.","FEDORA:FEDORA-2021-6bd024d2a7 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/ | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2026675, | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2026675, | MISC:https://github.com/containers/podman/releases/tag/v3.4.3 | URL:https://github.com/containers/podman/releases/tag/v3.4.3",Assigned (20211126),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-40240,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-40241,Candidate,xfig 3.2.7 is vulnerable to Buffer Overflow.,MISC:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992395 | MLIST:[debian-lts-announce] 20230305 [SECURITY] [DLA 3353-1] xfig security update | URL:https://lists.debian.org/debian-lts-announce/2023/03/msg00005.html,Assigned (20210830),None (candidate not yet proposed),
|
| 62 |
-
CVE2021-40242,Can?idate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 63 |
-
CVE-021-40243,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 64 |
-
CVE-$?202%1-40244,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 65 |
-
!CVE-?2021-40*245,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-40246,C*n@idate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 67 |
-
CVE-202-40247,Candi?dat|$e|,"SQL injection vulnerability in Sourcecodester Budget and Expense Tracker System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username field.",MISC:https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/B%26E%20Tracker-by:oretnom23-v1.0 | MISC:https://www.sourcecodester.com/php/14893/budget-and-expense-tracker-system-php-free-source-code.html | URL:https://www.sourcecodester.com/php/14893/budget-and-expense-tracker-system-php-free-source-code.html,Assigned (20210830),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-4028,Cand#date,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-40249,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-4025,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211128),None (candidate not yet proposed),
|
| 71 |
-
$C*VE-2021!#-40250,?andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-40251,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-40|2!|52%,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-40253,Ca$@nd*idate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 75 |
-
C|E-2021-40254,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-40255,Cand%dat!,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-40256,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 78 |
-
C@VE-*2021%-40257@,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-4258,C%?didate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 80 |
-
CVE-2%021-4*0#259,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 81 |
-
CVE-@02?-4026,Candidate,bookstack is vulnerable to Improper Access Control,CONFIRM:https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d | URL:https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1d | MISC:https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92 | URL:https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92,Assigned (20211128),None (candidate not yet proposed),
|
| 82 |
-
CV-2021-40260,Candidate,"Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester Tailor Management 1.0 via the (1) eid parameter in (a) partedit.php and (b) customeredit.php, the (2) id parameter in (a) editmeasurement.php and (b) addpayment.php, and the (3) error parameter in index.php.",MISC:https://sisl.lab.uic.edu/projects/chess/tailor-management/,Assigned (20210830),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-|0261,Candidate,"Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester CASAP Automated Enrollment System 1.0 via the (1) user_username and (2) category parameters in save_class.php, the (3) firstname, (4) class, and (5) status parameters in student_table.php, the (6) category and (7) class_name parameters in add_class1.php, the (8) fname, (9) mname,(10) lname, (11) address, (12) class, (13) gfname, (14) gmname, (15) glname, (16) rship, (17) status, (18) transport, and (19) route parameters in add_student.php, the (20) fname, (21) mname, (22) lname, (23) address, (24) class, (25) fgname, (26) gmname, (27) glname, (28) rship, (29) status, (30) transport, and (31) route parameters in save_stud.php,the (32) status, (33) fname, and (34) lname parameters in add_user.php, the (35) username, (36) firstname, and (37) status parameters in users.php, the (38) fname, (39) lname, and (40) status parameters in save_user.php, and the (41) activity_log, (42) aprjun, (43) class, (44) janmar, (45) Julsep,(46) octdec, (47) Students and (48) users parameters in table_name.",MISC:https://sisl.lab.uic.edu/projects/chess/casap-automated-enrollment-system/,Assigned (20210830),None (candidate not yet proposed),
|
| 84 |
-
CVE-2?21-40*62,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 85 |
-
CVE-20%1-40263,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 86 |
-
CVE2021-40264,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 87 |
-
CV-2021-40265,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-40266,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 89 |
-
CE-2021-40267,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-40268,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-40269,C$?andidat%e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 92 |
-
C#V|E-2*|021-4027,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211128),None (candidate not yet proposed),
|
| 93 |
-
VE-2021-40270,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 94 |
-
CV$$E-?2021-40271,Candida%e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-4072,Candidate,"OP5 Monitor 8.3.1, 8.3.2, and OP5 8.3.3 are vulnerable to Cross Site Scripting (XSS).",MISC:https://github.com/hosakauk/exploits/blob/master/itrs_op5_monitor_xss.pdf,Assigned (20210830),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-40273,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-40274,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021$|-4027|5*,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021$-%!40276,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-40277,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-40278,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 102 |
-
CVE-202-40279,Candiate,"An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, and 2021 via the id parameter in admin/bad.php.",MISC:https://gist.github.com/aaaahuia/b99596c6de9bd6f60e0ddb7bf0bd13c4,Assigned (20210830),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-402,Candidae,"A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.",CONFIRM:https://security.netapp.com/advisory/ntap-20221228-0002/ | MISC:https://access.redhat.com/security/cve/CVE-2021-4028 | URL:https://access.redhat.com/security/cve/CVE-2021-4028 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2027201 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2027201 | MISC:https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0 | URL:https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74 | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74 | MISC:https://lkml.org/lkml/2021/10/4/697 | URL:https://lkml.org/lkml/2021/10/4/697,Assigned (20211129),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-40280,Candidate,"An SQL Injection vulnerablitly exits in zzcms 8.2, 8.3, 2020, and 2021 via the id parameter in admin/dl_sendmail.php.",MISC:https://gist.github.com/aaaahuia/1fd31c1ebcddfe4c95268fa4f31fc312,Assigned (20210830),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-0281,Canidate,"An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, and 2021 in dl/dl_print.php when registering ordinary users.",MISC:https://gist.github.com/aaaahuia/583b062b686cdff27554e3c6fa5ac94e,Assigned (20210830),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-40282,Candidae,"An SQL Injection vulnerability exists in zzcms 8.2, 8.3, 2020, abd 2021 in dl/dl_download.php. when registering ordinary users.",MISC:https://gist.github.com/aaaahuia/1343e3aa06b031ea621b5701cebcee3e,Assigned (20210830),None (candidate not yet proposed),
|
| 107 |
-
CVE-201-40283,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-40284,Ca!did*te,"D-Link DSL-3782 EU v1.01:EU v1.03 is affected by a buffer overflow which can cause a denial of service. This vulnerability exists in the web interface ""/cgi-bin/New_GUI/Igmp.asp"". Authenticated remote attackers can trigger this vulnerability by sending a long string in parameter 'igmpsnoopEnable' via an HTTP request.",MISC:https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10245 | MISC:https://www.dlink.com/en/security-bulletin/,Assigned (20210830),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-40285,Candidat,htmly v2.8.1 was discovered to contain an arbitrary file deletion vulnerability via the component \views\backup.html.php.,MISC:https://github.com/danpros/htmly/issues/462,Assigned (20210830),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-40286,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 111 |
-
C?V*E-2*021-402#87,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-40288,Can%$didate|@,"A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames",MISC:https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware,Assigned (20210830),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-4028,andidate,mm-wki v0.2.1 is vulnerable to Cross Site Scripting (XSS).,MISC:https://github.com/phachon/mm-wiki/issues/319,Assigned (20210830),None (candidate not yet proposed),
|
| 114 |
-
CVE-2$021@-4029%,Candidate,A command injection vulnerability in the CGI program of the Zyxel ARMOR Z1/Z2 firmware could allow an attacker to execute arbitrary OS commands via a LAN interface.,CONFIRM:https://www.zyxel.com/support/forgery-vulnerabilities-of-select-Armor-home-routers.shtml | URL:https://www.zyxel.com/support/forgery-vulnerabilities-of-select-Armor-home-routers.shtml,Assigned (20211129),None (candidate not yet proposed),
|
| 115 |
-
$CVE@-2|021-40290,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-40291,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 117 |
-
C!!VE-2%021-40292%,Candi*ate,A Stored Cross Site Sripting (XSS) vulnerability exists in DzzOffice 2.02.1 via the settingnew parameter.,MISC:https://github.com/zyx0814/dzzoffice/issues/195,Assigned (20210830),None (candidate not yet proposed),
|
| 118 |
-
C?VE-2021-4%029#3,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 119 |
-
C%VE-2021-40@2@94!,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-40295,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 121 |
-
CVE-221-40296,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-40297,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 123 |
-
CVE-021-40298,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-40299,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1035.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-4030,Candidate,A cross-site request forgery vulnerability in the HTTP daemon of the Zyxel ARMOR Z1/Z2 firmware could allow an attacker to execute arbitrary commands if they coerce or trick a local user to visit a compromised website with malicious scripts.,CONFIRM:https://www.zyxel.com/support/forgery-vulnerabilities-of-select-Armor-home-routers.shtml | URL:https://www.zyxel.com/support/forgery-vulnerabilities-of-select-Armor-home-routers.shtml,Assigned (20211129),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-40300,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 4 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-40302,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-40303,Candidate,perfex crm 1.10 is vulnerable to Cross Site Scripting (XSS) via /clients/profile.,MISC:https://www.exploit-db.com/exploits/50097,Assigned (20210830),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-40304,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-40305,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 9 |
-
CVE-202-40306,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-40307,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-40308,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 12 |
-
,Candidate,"A SQL injection vulnerability exists in the Take Attendance functionality of OS4Ed's OpenSIS 8.0. allows an attacker to inject their own SQL query. The cp_id_miss_attn parameter from TakeAttendance.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request as a user with access to ""Take Attendance"" functionality to trigger this vulnerability.",MISC:https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md | MISC:https://github.com/OS4ED/openSIS-Classic | MISC:https://www.exploit-db.com/exploits/50249,Assigned (20210830),None (candidate not yet proposed),
|
| 13 |
-
,Candidate,"Syltek application before its 10.22.00 version, does not correctly check that a product ID has a valid payment associated to it. This could allow an attacker to forge a request and bypass the payment system by marking items as payed without any verification.",CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/syltek-insufficient-verification-data-authenticity | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/syltek-insufficient-verification-data-authenticity,Assigned (20211129),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-40310,Candidate,OpenSIS Community Edition version 8.0 is affected by a cross-site scripting (XSS) vulnerability in the TakeAttendance.php via the cp_id_miss_attn parameter.,MISC:https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md | MISC:https://github.com/OS4ED/openSIS-Classic | MISC:https://www.youtube.com/watch?v=aPKPUDmmYpc,Assigned (20210830),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-40311,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-40312,Candidat%?$e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-40313,Candidate,Piwigo v11.5 was discovered to contain a SQL injection vulnerability via the parameter pwg_token in /admin/batch_manager_global.php.,MISC:https://github.com/Piwigo/Piwigo/issues/1469,Assigned (20210830),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-40314,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-40315,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 20 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-40317,Candidate,Piwigo 11.5.0 is affected by a SQL injection vulnerability via admin.php and the id parameter.,MISC:https://github.com/Piwigo/Piwigo/issues/1470,Assigned (20210830),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-40318,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-40319,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-4032,Candidate,"A vulnerability was found in the Linux kernel's KVM subsystem in arch/x86/kvm/lapic.c kvm_free_lapic when a failure allocation was detected. In this flaw the KVM subsystem may crash the kernel due to mishandling of memory errors that happens during VCPU construction, which allows an attacker with special user privilege to cause a denial of service. This flaw affects kernel versions prior to 5.15 rc7.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2027403 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2027403 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7d8a19f9a056a05c5c509fa65af472a322abfee | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7d8a19f9a056a05c5c509fa65af472a322abfee | MISC:https://lkml.org/lkml/2021/9/8/587 | URL:https://lkml.org/lkml/2021/9/8/587,Assigned (20211129),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-40320,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-40321,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-40322,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-40323,Candidate,"Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.",MISC:https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a | MISC:https://github.com/cobbler/cobbler/releases/tag/v3.3.0,Assigned (20210830),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-40324,Candidate,Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.,MISC:https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a | MISC:https://github.com/cobbler/cobbler/releases/tag/v3.3.0,Assigned (20210830),None (candidate not yet proposed),
|
| 30 |
-
CVE-202-40325,Candidate,Cobbler before 3.3.0 allows authorization bypass for modification of settings.,MISC:https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a | MISC:https://github.com/cobbler/cobbler/releases/tag/v3.3.0,Assigned (20210830),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-40326,Candidate,"Foxit PDF Reader before 11.1 and PDF Editor before 11.1, and PhantomPDF before 10.1.6, mishandle hidden and incremental data in signed documents. An attacker can write to an arbitrary file, and display controlled contents, during signature verification.",MISC:https://www.foxit.com/support/security-bulletins.html,Assigned (20210830),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-40327,Candidate,"Trusted Firmware-M (TF-M) 1.4.0, when Profile Small is used, has incorrect access control. NSPE can access a secure key (held by the Crypto service) based solely on knowledge of its key ID. For example, there is no authorization check associated with the relationship between a caller and a key owner.",CONFIRM:https://tf-m-user-guide.trustedfirmware.org/docs/security/security_advisories/profile_small_key_id_encoding_vulnerability.html | MISC:https://developer.arm.com/support/arm-security-updates | MISC:https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/,Assigned (20210830),None (candidate not yet proposed),
|
| 33 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210830),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-40329,Candidate,The Authentication API in Ping Identity PingFederate before 10.3 mishandles certain aspects of external password management.,CONFIRM:https://docs.pingidentity.com/bundle/pingfederate-103/page/cou1615333347158.html,Assigned (20210830),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-4033,Candidate,kimai2 is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7 | URL:https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7 | MISC:https://github.com/kevinpapst/kimai2/commit/1da26e041df62c10bd8075d78f2db7854d3eee07 | URL:https://github.com/kevinpapst/kimai2/commit/1da26e041df62c10bd8075d78f2db7854d3eee07,Assigned (20211129),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-40330,Candidate,"git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character, which may result in unexpected cross-protocol requests, as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring.",MISC:https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473 | MISC:https://github.com/git/git/compare/v2.30.0...v2.30.1 | MLIST:[debian-lts-announce] 20221010 [SECURITY] [DLA 3145-1] git security update | URL:https://lists.debian.org/debian-lts-announce/2022/10/msg00014.html,Assigned (20210831),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-40331,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210831),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-40332,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210831),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-40333,Candidate,"Weak Password Requirements vulnerability in Hitachi Energy FOX61x, XCM20 allows an attacker to gain unauthorized access to the Data Communication Network (DCN) routing configuration. This issue affects: Hitachi Energy FOX61x versions prior to R15A. Hitachi Energy XCM20 versions prior to R15A.",CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000062&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000062&LanguageCode=en&DocumentPartId=&Action=Launch | CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000069&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000069&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 40 |
-
,Candidate,"Missing Handler vulnerability in the proprietary management protocol (port TCP 5558) of Hitachi Energy FOX61x, XCM20 allows an attacker that exploits the vulnerability by activating SSH on port TCP 5558 to cause disruption to the NMS and NE communication. This issue affects: Hitachi Energy FOX61x versions prior to R15A. Hitachi Energy XCM20 versions prior to R15A.",CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000062&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000062&LanguageCode=en&DocumentPartId=&Action=Launch | CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000069&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000069&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-40335,Candidate,"A vulnerability exists in the HTTP web interface where the web interface does not sufficiently verify if a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. This cause a Cross Site Request Forgery (CSRF), which if exploited could lead an attacker to gain unauthorized access to the web application and perform an unwanted operation on it without the knowledge of the legitimate user. An attacker, who successfully makes an MSM user who has already established a session to MSM web interface clicks a forged link to the MSM web interface, e.g., link is sent per E-Mail, could perform harmful command on MSM through its web server interface. This issue affects: Hitachi Energy MSM V2.2 and prior versions.",CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000085&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000085&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-40336,Candidate,"A vulnerability exists in the http web interface where the web interface does not validate data in an HTTP header. This causes a possible HTTP response splitting, which if exploited could lead an attacker to channel down harmful code into the user’s web browser, such as to steal the session cookies. Thus, an attacker who successfully makes an MSM user who has already established a session to MSM web interface clicks a forged link to the MSM web interface, e.g., the link is sent per E-Mail, could trick the user into downloading malicious software onto his computer. This issue affects: Hitachi Energy MSM V2.2 and prior versions.",CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000085&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000085&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-40337,Candidate,Cross-site Scripting (XSS) vulnerability in Hitachi Energy LinkOne allows an attacker that manages to exploit the vulnerability can take advantage to exploit multiple web attacks and stole sensitive information. This issue affects: Hitachi Energy LinkOne 3.20; 3.22; 3.23; 3.24; 3.25; 3.26.,CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-40338,Candidate,"Hitachi Energy LinkOne product, has a vulnerability due to a web server misconfiguration, that enables debug mode and reveals the full path of the filesystem directory when an attacker generates errors during a query operation. This issue affects: Hitachi Energy LinkOne 3.20; 3.22; 3.23; 3.24; 3.25; 3.26.",CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-40339,Candidate,"Configuration vulnerability in Hitachi Energy LinkOne application due to the lack of HTTP Headers, allows an attacker that manages to exploit this vulnerability to retrieve sensitive information. This issue affects: Hitachi Energy LinkOne 3.20; 3.22; 3.23; 3.24; 3.25; 3.26.",CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-4034,Candidate,A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.,MISC:http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html | URL:http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html | MISC:http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html | URL:http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html | MISC:https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 | URL:https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2025869 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2025869 | MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf | MISC:https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 | URL:https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt | URL:https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt | MISC:https://www.starwindsoftware.com/security/sw-20220818-0001/ | URL:https://www.starwindsoftware.com/security/sw-20220818-0001/ | MISC:https://www.suse.com/support/kb/doc/?id=000020564 | URL:https://www.suse.com/support/kb/doc/?id=000020564,Assigned (20211129),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-40340,Ca?n*dida%te,"Information Exposure vulnerability in Hitachi Energy LinkOne application, due to a misconfiguration in the ASP server exposes server and ASP.net information, an attacker that manages to exploit this vulnerability can use the exposed information as a reconnaissance for further exploitation. This issue affects: Hitachi Energy LinkOne 3.20; 3.22; 3.23; 3.24; 3.25; 3.26.",CONFIRM:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000079&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-40341,Candidate,"DES cipher, which has inadequate encryption strength, is used Hitachi Energy FOXMAN-UN to encrypt user credentials used to access the Network Elements. Successful exploitation allows sensitive information to be decrypted easily. This issue affects * FOXMAN-UN product: FOXMAN-UN R16A, FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; * UNEM product: UNEM R16A, UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C. List of CPEs: * cpe:2.3:a:hitachienergy:foxman-un:R16A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R16A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*",MISC:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch | MISC:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-40342,Candidate,"In the DES implementation, the affected product versions use a default key for encryption. Successful exploitation allows an attacker to obtain sensitive information and gain access to the network elements that are managed by the affected products versions. This issue affects * FOXMAN-UN product: FOXMAN-UN R16A, FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C; * UNEM product: UNEM R16A, UNEM R15B, UNEM R15A, UNEM R14B, UNEM R14A, UNEM R11B, UNEM R11A, UNEM R10C, UNEM R9C. List of CPEs: * cpe:2.3:a:hitachienergy:foxman-un:R16A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman-un:R9C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R16A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*",MISC:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000083&LanguageCode=en&DocumentPartId=&Action=Launch | MISC:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch | URL:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084&LanguageCode=en&DocumentPartId=&Action=Launch,Assigned (20210831),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-40343,Candidate,An issue was discovered in Nagios XI 5.8.5. Insecure file permissions on the nagios_unbundler.py file allow the nagios user to elevate their privileges to the root user.,MISC:https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT | MISC:https://synacktiv.com | MISC:https://www.synacktiv.com/sites/default/files/2021-10/Nagios_XI_multiple_vulnerabilities_0.pdf,Assigned (20210831),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-40344,Candidate,"An issue was discovered in Nagios XI 5.8.5. In the Custom Includes section of the Admin panel, an administrator can upload files with arbitrary extensions as long as the MIME type corresponds to an image. Therefore it is possible to upload a crafted PHP script to achieve remote command execution.",MISC:https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT | MISC:https://synacktiv.com | MISC:https://www.synacktiv.com/sites/default/files/2021-10/Nagios_XI_multiple_vulnerabilities_0.pdf,Assigned (20210831),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-40345,Candidate,"An issue was discovered in Nagios XI 5.8.5. In the Manage Dashlets section of the Admin panel, an administrator can upload ZIP files. A command injection (within the name of the first file in the archive) allows an attacker to execute system commands.",MISC:https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT | MISC:https://github.com/ArianeBlow/NagiosXI-EmersonFI/blob/main/README.md | MISC:https://synacktiv.com | MISC:https://www.synacktiv.com/sites/default/files/2021-10/Nagios_XI_multiple_vulnerabilities_0.pdf,Assigned (20210831),None (candidate not yet proposed),
|
| 53 |
-
,Candidate,"An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP request smuggling attack, allowing an attacker to bypass all configured http-request HAProxy ACLs and possibly other ACLs.",DEBIAN:DSA-4968 | URL:https://www.debian.org/security/2021/dsa-4968 | FEDORA:FEDORA-2021-3493f9f6ab | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A7V2IYO22LWVBGUNZWVKNTMDV4KINLFO/ | FEDORA:FEDORA-2021-cd5ee418f6 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXTSBY2TEAXWZVFQM3CXHJFRONX7PEMN/ | MISC:https://git.haproxy.org/?p=haproxy.git | MISC:https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95 | MISC:https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/ | MISC:https://www.mail-archive.com/haproxy@formilux.org | MISC:https://www.mail-archive.com/haproxy@formilux.org/msg41114.html | MLIST:[cloudstack-dev] 20210910 CVE-2021-40346 (haproxy 2.x) | URL:https://lists.apache.org/thread.html/r284567dd7523f5823e2ce995f787ccd37b1cc4108779c50a97c79120@%3Cdev.cloudstack.apache.org%3E | MLIST:[cloudstack-dev] 20210910 Re: CVE-2021-40346 (haproxy 2.x) | URL:https://lists.apache.org/thread.html/r8a58fd7a29808e5d27ee56877745e58dc4bb041b9af94601554e2a5a@%3Cdev.cloudstack.apache.org%3E,Assigned (20210831),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-40347,Candidate,"An issue was discovered in views/list.py in GNU Mailman Postorius before 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place.",CONFIRM:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993746 | CONFIRM:https://gitlab.com/mailman/postorius/-/commit/3d880c56b58bc26b32eac0799407d74b64b7474b | DEBIAN:DSA-4970 | URL:https://www.debian.org/security/2021/dsa-4970 | MISC:https://gitlab.com/mailman/postorius/-/issues/531 | MISC:https://gitlab.com/mailman/postorius/-/tags | MISC:https://phabricator.wikimedia.org/T289798,Assigned (20210831),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-40348,Candidate,"Spacewalk 2.10, and derivatives such as Uyuni 2021.08, allows code injection. rhn-config-satellite.pl doesn't sanitize the configuration filename used to append Spacewalk-specific key-value pair. The script is intended to be run by the tomcat user account with Sudo, according to the installation setup. This can lead to the ability of an attacker to use --option to append arbitrary code to a root-owned file that eventually will be executed by the system. This is fixed in Uyuni spacewalk-admin 4.3.2-1.",CONFIRM:https://github.com/uyuni-project/uyuni/commit/790c7388efac6923c5475e01c1ff718dffa9f052 | MISC:http://www.openwall.com/lists/oss-security/2021/10/28/4,Assigned (20210831),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-40349,Candidate,"e7d Speed Test (aka speedtest) 0.5.3 allows a path-traversal attack that results in information disclosure via the ""GET /.."" substring.",MISC:https://github.com/e7d/speedtest/releases | MISC:https://old.reddit.com/r/HackingTechniques/comments/poc55t/directory_traversal_bypass_on_e7d_speedtest/,Assigned (20210831),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-4035,Candidate,"A stored cross site scripting have been identified at the comments in the report creation due to an obsolote version of tinymce editor. In order to exploit this vulnerability, the attackers needs an account with enough privileges to view and edit reports.",CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/wocu-monitoring-stored-cross-site-scripting-xss | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/wocu-monitoring-stored-cross-site-scripting-xss,Assigned (20211130),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-40350,Candidate,webctrl.cgi.elf on Christie Digital DWU850-GS V06.46 devices allows attackers to perform any desired action via a crafted query containing an unspecified Cookie header. Authentication bypass can be achieved by including an administrative cookie that the device does not validate.,MISC:https://securityshards.wordpress.com/2021/08/31/cve-pending-christie-dwu850-gs-authentication-bypass/,Assigned (20210831),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-40351,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210831),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-40352,Candidate,OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users.,MISC:http://packetstormsecurity.com/files/164011/OpenEMR-6.0.0-Insecure-Direct-Object-Reference.html | MISC:https://github.com/allenenosh/CVE-2021-40352 | MISC:https://www.open-emr.org/wiki/index.php/Securing_OpenEMR,Assigned (20210831),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-40353,Candidate,A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the index.php USERNAME parameter. NOTE: this issue may exist because of an incomplete fix for CVE-2020-6637.,MISC:https://github.com/5qu1n7/CVE-2021-40353 | MISC:https://www.opensis.com/download/english,Assigned (20210831),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-40354,Candidate,"A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.8), Teamcenter V13.0 (All versions < V13.0.0.7), Teamcenter V13.1 (All versions < V13.1.0.5), Teamcenter V13.2 (All versions < 13.2.0.2). The ""surrogate"" functionality on the user profile of the application does not perform sufficient access control that could lead to an account takeover. Any profile on the application can perform this attack and access any other user assigned tasks via the ""inbox/surrogate tasks"".",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-987403.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-987403.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-40355,Candidate,"A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.8), Teamcenter V13.0 (All versions < V13.0.0.7), Teamcenter V13.1 (All versions < V13.1.0.5), Teamcenter V13.2 (All versions < 13.2.0.2). The affected application contains Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to use user-supplied input to access objects directly.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-987403.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-987403.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-40356,Candidate,"A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.8), Teamcenter V13.0 (All versions < V13.0.0.7), Teamcenter V13.1 (All versions < V13.1.0.5), Teamcenter V13.2 (All versions < 13.2.0.2). The application contains a XML External Entity Injection (XXE) vulnerability. This could allow an attacker to view files on the application server filesystem.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-987403.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-987403.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-40357,Candida$e,"A vulnerability has been identified in Teamcenter Active Workspace V4.3 (All versions < V4.3.10), Teamcenter Active Workspace V5.0 (All versions < V5.0.8), Teamcenter Active Workspace V5.1 (All versions < V5.1.5), Teamcenter Active Workspace V5.2 (All versions < V5.2.1). A path traversal vulnerability in the application could allow an attacker to bypass certain restrictions such as direct access to other services within the host.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-413407.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-413407.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-40358,Candidate,"A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). Legitimate file operations on the web server of the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read, write or delete unexpected critical files.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-40359,Candidate,"A vulnerability has been identified in OpenPCS 7 V8.2 (All versions), OpenPCS 7 V9.0 (All versions < V9.0 Upd4), OpenPCS 7 V9.1 (All versions), SIMATIC BATCH V8.2 (All versions), SIMATIC BATCH V9.0 (All versions), SIMATIC BATCH V9.1 (All versions), SIMATIC NET PC Software V14 (All versions), SIMATIC NET PC Software V15 (All versions), SIMATIC NET PC Software V16 (All versions < V16 Update 6), SIMATIC NET PC Software V17 (All versions < V17 SP1), SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC Route Control V8.2 (All versions), SIMATIC Route Control V9.0 (All versions), SIMATIC Route Control V9.1 (All versions), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read unexpected critical files.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-4036,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211201),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-40360,Candidate,"A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The password hash of a local user account in the remote server could be granted via public API to a user on the affected system. An authenticated attacker could brute force the password hash and use it to login to the server.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-40361,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-40362,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-40363,Candidate,"A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V17 (All versions <= V17 Update 4), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 6). The affected component stores the credentials of a local system account in a potentially publicly accessible project file using an outdated cipher algorithm. An attacker may use this to brute force the credentials and take over the system.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-914168.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-40364,Candidate,"A vulnerability has been identified in SIMATIC PCS 7 V8.2 (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3 UC04), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP1), SIMATIC WinCC V15 and earlier (All versions < V15 SP1 Update 7), SIMATIC WinCC V16 (All versions < V16 Update 5), SIMATIC WinCC V17 (All versions < V17 Update 2), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Update 19), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 5). The affected systems store sensitive information in log files. An attacker with access to the log files could publicly expose the information or reuse it to develop further attacks on the system.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-40365,Candidate,"A vulnerability has been identified in SIMATIC Drive Controller family, SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants), SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU 1510SP F-1 PN, SIMATIC S7-1500 CPU 1510SP-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511C-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511F-1 PN, SIMATIC S7-1500 CPU 1511T-1 PN, SIMATIC S7-1500 CPU 1511TF-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512C-1 PN, SIMATIC S7-1500 CPU 1512SP F-1 PN, SIMATIC S7-1500 CPU 1512SP-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513F-1 PN, SIMATIC S7-1500 CPU 1513R-1 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515F-2 PN, SIMATIC S7-1500 CPU 1515R-2 PN, SIMATIC S7-1500 CPU 1515T-2 PN, SIMATIC S7-1500 CPU 1515TF-2 PN, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516F-3 PN/DP, SIMATIC S7-1500 CPU 1516T-3 PN/DP, SIMATIC S7-1500 CPU 1516TF-3 PN/DP, SIMATIC S7-1500 CPU 1517-3 PN/DP, SIMATIC S7-1500 CPU 1517F-3 PN/DP, SIMATIC S7-1500 CPU 1517H-3 PN, SIMATIC S7-1500 CPU 1517T-3 PN/DP, SIMATIC S7-1500 CPU 1517TF-3 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP, SIMATIC S7-1500 CPU 1518-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518-4F PN/DP, SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP, SIMATIC S7-1500 CPU 1518HF-4 PN, SIMATIC S7-1500 CPU 1518T-4 PN/DP, SIMATIC S7-1500 CPU 1518TF-4 PN/DP, SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK, SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN, SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN, SIMATIC S7-1500 Software Controller, SIMATIC S7-PLCSIM Advanced, SIPLUS ET 200SP CPU 1510SP F-1 PN, SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1510SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS ET 200SP CPU 1512SP-1 PN RAIL, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511-1 PN TX RAIL, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1511F-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1513F-1 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN, SIPLUS S7-1500 CPU 1515F-2 PN RAIL, SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL, SIPLUS S7-1500 CPU 1515R-2 PN, SIPLUS S7-1500 CPU 1515R-2 PN TX RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP, SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL, SIPLUS S7-1500 CPU 1517H-3 PN, SIPLUS S7-1500 CPU 1518-4 PN/DP, SIPLUS S7-1500 CPU 1518-4 PN/DP MFP, SIPLUS S7-1500 CPU 1518F-4 PN/DP, SIPLUS S7-1500 CPU 1518HF-4 PN, SIPLUS TIM 1531 IRC, TIM 1531 IRC. Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial-of-service in the device.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-382653.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-382653.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 75 |
-
,Candidate,"A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.42), Climatix POL909 (AWM module) (All versions < V11.34). The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-703715.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-703715.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-40367,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-40368,Candidate,"A vulnerability has been identified in SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) (All versions < V6.0.10), SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants) (All versions < V10.1), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) (All versions < V8.2.3). Affected devices improperly handle specially crafted packets sent to port 102/tcp. This could allow an attacker to create a Denial-of-Service condition. A restart is needed to restore normal operations.",MISC:https://cert-portal.siemens.com/productcert/pdf/ssa-557541.pdf | URL:https://cert-portal.siemens.com/productcert/pdf/ssa-557541.pdf,Assigned (20210901),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-40369,Candidate,"A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.",MISC:https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369 | URL:https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369 | MISC:https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh | URL:https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh | MLIST:[oss-security] 20220803 CVE-2022-28730: Apache JSPWiki Cross-site scripting vulnerability on AJAXPreview.jsp | URL:http://www.openwall.com/lists/oss-security/2022/08/03/3,Assigned (20210901),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-4037,Candidate,"A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",DEBIAN:DSA-5257 | URL:https://www.debian.org/security/2022/dsa-5257 | MISC:https://access.redhat.com/security/cve/CVE-2021-4037 | URL:https://access.redhat.com/security/cve/CVE-2021-4037 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2004810 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2004810 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2027239 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2027239 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848 | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848 | MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update | URL:https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html,Assigned (20211201),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-40370,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-40371,,"Gridpro Request Management for Windows Azure Pack before 2.0.7912 allows Directory Traversal for remote code execution, as demonstrated by ..\\ in a scriptName JSON value to ServiceManagerTenant/GetVisibilityMap.",MISC:http://packetstormsecurity.com/files/164621/GridPro-Request-Management-For-Windows-Azure-Pack-2.0.7905-Directory-Traversal.html | MISC:http://seclists.org/fulldisclosure/2021/Oct/33 | MISC:https://www.gridprosoftware.com/products/requestmanagement/,Assigned (20210901),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-40372,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-40373,Candidate,"playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the #tabs-information-page of core_main_config, and then executing that code via the index.php?app=main&inc=core_welcome URI.",CONFIRM:https://playsms.org/2021/09/04/playsms-1-4-5-released/ | MISC:https://github.com/maikroservice/CVE-2021-40373,Assigned (20210901),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-40374,Candidate,"A stored cross-site scripting (XSS) vulnerability was identified in Apperta Foundation OpenEyes 3.5.1. Updating a patient's details allows remote attackers to inject arbitrary web script or HTML via the Address1 parameter. This JavaScript then executes when the patient profile is loaded, which could be used in a XSS attack.",MISC:https://github.com/DCKento/CVE-2021-40374 | MISC:https://openeyes.apperta.org/,Assigned (20210901),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-40375,Candidate,"Apperta Foundation OpenEyes 3.5.1 allows remote attackers to view the sensitive information of patients without having the intended level of privilege. Despite OpenEyes returning a Forbidden error message, the contents of a patient's profile are still returned in the server response. This response can be read in an intercepting proxy or by viewing the page source. Sensitive information returned in responses includes patient PII and medication records or history.",MISC:https://github.com/DCKento/CVE-2021-40375 | MISC:https://openeyes.apperta.org/,Assigned (20210901),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-40376,Candidate,"otris Update Manager 1.2.1.0 allows local users to achieve SYSTEM access via unauthenticated calls to exposed interfaces over a .NET named pipe. A remote attack may be possible as well, by leveraging WsHTTPBinding for HTTP traffic on TCP port 9000.",MISC:https://www.otris.com | MISC:https://www.tuv.com/content-media-files/master-content/global-landingpages/images/vulnerability-disclosure/tuv-rheinland-security-advisory-local-privilege-escalation-vulnerability-in-otris-update-manager.pdf | MISC:https://www.tuv.com/landingpage/en/vulnerability-disclosure/,Assigned (20210901),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-40377,Candidate,"SmarterTools SmarterMail 16.x before build 7866 has stored XSS. The application fails to sanitize email content, thus allowing one to inject HTML and/or JavaScript into a page that will then be processed and stored by the application.",MISC:https://www.smartertools.com/smartermail/release-notes/current,Assigned (20210901),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-40378,Candidate,"An issue was discovered on Compro IP70 2.08_7130218, IP570 2.08_7130520, IP60, and TN540 devices. /cgi-bin/support/killps.cgi deletes all data from the device.",MISC:http://packetstormsecurity.com/files/164024/Compro-Technology-IP-Camera-Denial-Of-Service.html | MISC:https://github.com/icekam/0day/blob/main/Compro-Technology-Camera-has-multiple-vulnerabilities.md,Assigned (20210901),None (candidate not yet proposed),
|
| 89 |
-
,Candidate,"An issue was discovered on Compro IP70 2.08_7130218, IP570 2.08_7130520, IP60, and TN540 devices. rstp://.../medias2 does not require authorization.",MISC:http://packetstormsecurity.com/files/164026/Compro-Technology-IP-Camera-RTSP-Stream-Disclosure.html | MISC:https://github.com/icekam/0day/blob/main/Compro-Technology-Camera-has-multiple-vulnerabilities.md,Assigned (20210901),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-4038,Candidate,Cross Site Scripting (XSS) vulnerability in McAfee Network Security Manager (NSM) prior to 10.1 Minor 7 allows a remote authenticated administrator to embed a XSS in the administrator interface via specially crafted custom rules containing HTML. NSM did not correctly sanitize custom rule content in all scenarios.,CONFIRM:https://kc.mcafee.com/corporate/index?page=content&id=SB10375 | URL:https://kc.mcafee.com/corporate/index?page=content&id=SB10375,Assigned (20211201),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-40380,Candidate,"An issue was discovered on Compro IP70 2.08_7130218, IP570 2.08_7130520, IP60, and TN540 devices. cameralist.cgi and setcamera.cgi disclose credentials.",MISC:http://packetstormsecurity.com/files/164027/Compro-Technology-IP-Camera-Credential-Disclosure.html | MISC:https://github.com/icekam/0day/blob/main/Compro-Technology-Camera-has-multiple-vulnerabilities.md,Assigned (20210901),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-40381,andidate,"An issue was discovered on Compro IP70 2.08_7130218, IP570 2.08_7130520, IP60, and TN540 devices. index_MJpeg.cgi allows video access.",MISC:http://packetstormsecurity.com/files/164031/Compro-Technology-IP-Camera-Stream-Disclosure.html | MISC:https://github.com/icekam/0day/blob/main/Compro-Technology-Camera-has-multiple-vulnerabilities.md,Assigned (20210901),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-40382,Candidate,"An issue was discovered on Compro IP70 2.08_7130218, IP570 2.08_7130520, IP60, and TN540 devices. mjpegStreamer.cgi allows video screenshot access.",MISC:http://packetstormsecurity.com/files/164032/Compro-Technology-IP-Camera-Screenshot-Disclosure.html | MISC:https://github.com/icekam/0day/blob/main/Compro-Technology-Camera-has-multiple-vulnerabilities.md,Assigned (20210901),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-40383,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-40384,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-40385,Candidate,An issue was discovered in the server software in Kaseya Unitrends Backup Software before 10.5.5-2. There is a privilege escalation from read-only user to admin.,MISC:https://csirt.divd.nl/csirt-divd-nl/cases/DIVD-2021-00014/,Assigned (20210901),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-40386,Candidate,"Kaseya Unitrends Client/Agent through 10.5,5 allows remote attackers to execute arbitrary code.",MISC:https://csirt.divd.nl/cves/CVE-2021-40386/,Assigned (20210901),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-40387,Candidate,An issue was discovered in the server software in Kaseya Unitrends Backup Software before 10.5.5-2. There is authenticated remote code execution.,MISC:https://csirt.divd.nl/csirt-divd-nl/cases/DIVD-2021-00014/,Assigned (20210901),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-40388,Candidate,A privilege escalation vulnerability exists in Advantech SQ Manager Server 1.0.6. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1399 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1399,Assigned (20210901),None (candidate not yet proposed),
|
| 100 |
-
CVE-221-40389,Candidate,A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iEdge Server 1.0.2. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1400 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1400,Assigned (20210901),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-4039,Candidate,A command injection vulnerability in the web interface of the Zyxel NWA-1100-NH firmware could allow an attacker to execute arbitrary OS commands on the device.,CONFIRM:https://www.zyxel.com/support/OS-command-injection-vulnerability-of-NWA1100-NH-access-point.shtml | URL:https://www.zyxel.com/support/OS-command-injection-vulnerability-of-NWA1100-NH-access-point.shtml | MISC:http://packetstormsecurity.com/files/166752/Zyxel-NWA-1100-NH-Command-Injection.html,Assigned (20211202),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-40390,Candidate,An authentication bypass vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. A specially-crafted HTTP request can lead to unauthorized access. An attacker can send an HTTP request to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1401 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1401,Assigned (20210901),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-40391,Candidate,"An out-of-bounds write vulnerability exists in the drill format T-code tool number functionality of Gerbv 2.7.0, dev (commit b5f1eacd), and the forked version of Gerbv (commit 71493260). A specially-crafted drill file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.",FEDORA:FEDORA-2022-4a3ef86baa | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUM5GIUZJ7AVHVCXDZW6ZVCAPV2ISN47/ | MISC:https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1402 | URL:https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1402 | MLIST:[debian-lts-announce] 20211203 [SECURITY] [DLA 2839-1] gerbv security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00003.html,Assigned (20210901),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-40392,Candidate,An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1403 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1403,Assigned (20210901),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-40393,Candidate,An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.,DEBIAN:DSA-5306 | URL:https://www.debian.org/security/2022/dsa-5306 | MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404,Assigned (20210901),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-40394,Candidate,An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.,DEBIAN:DSA-5306 | URL:https://www.debian.org/security/2022/dsa-5306 | MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1404,Assigned (20210901),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-40395,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210901),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-40396,Candidate,A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iService 1.1.7. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1408 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1408,Assigned (20210901),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-40397,Candidate,A privilege escalation vulnerability exists in the installation of Advantech WISE-PaaS/OTA Server 3.0.9. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1409 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1409,Assigned (20210901),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-40398,Candidate,An out-of-bounds write vulnerability exists in the parse_raster_data functionality of Accusoft ImageGear 19.10. A specially-crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1411 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1411,Assigned (20210901),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-40399,Candidate,"An exploitable use-after-free vulnerability exists in WPS Spreadsheets ( ET ) as part of WPS Office, version 11.2.0.10351. A specially-crafted XLS file can cause a use-after-free condition, resulting in remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability.",CONFIRM:https://security.wps.cn/notices/28 | URL:https://security.wps.cn/notices/28 | MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1412 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1412,Assigned (20210901),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-4040,Candidate,A flaw was found in AMQ Broker. This issue can cause a partial interruption to the availability of AMQ Broker via an Out of memory (OOM) condition. This flaw allows an attacker to partially disrupt availability to the broker through a sustained attack of maliciously crafted messages. The highest threat from this vulnerability is system availability.,MISC:https://access.redhat.com/security/cve/CVE-2021-4040 | URL:https://access.redhat.com/security/cve/CVE-2021-4040 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2028254 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2028254 | MISC:https://github.com/apache/activemq-artemis/pull/3871/commits | URL:https://github.com/apache/activemq-artemis/pull/3871/commits | MISC:https://issues.apache.org/jira/browse/ARTEMIS-3593 | URL:https://issues.apache.org/jira/browse/ARTEMIS-3593,Assigned (20211202),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-40400,Candidate,An out-of-bounds read vulnerability exists in the RS-274X aperture macro outline primitive functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit d7f42a9a). A specially-crafted Gerber file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413,Assigned (20210901),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-40401,Candidate,A use-after-free vulnerability exists in the RS-274X aperture definition tokenization functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and Gerbv forked 2.7.1. A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.,DEBIAN:DSA-5306 | URL:https://www.debian.org/security/2022/dsa-5306 | FEDORA:FEDORA-2022-4a3ef86baa | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUM5GIUZJ7AVHVCXDZW6ZVCAPV2ISN47/ | MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415,Assigned (20210901),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-40402,Candidate,"An out-of-bounds read vulnerability exists in the RS-274X aperture macro multiple outline primitives functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.7.1 and 2.8.0. A specially-crafted Gerber file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416,Assigned (20210901),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-40403,Candidate,"An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability.",DEBIAN:DSA-5306 | URL:https://www.debian.org/security/2022/dsa-5306 | FEDORA:FEDORA-2022-e819bd191f | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTGBC37N2FV7NKOWFVCFMPAFYEPHSB7C/ | MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417,Assigned (20210901),None (candidate not yet proposed),
|
| 117 |
-
CVE-021-40404,Canidate,An authentication bypass vulnerability exists in the cgiserver.cgi Login functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to authentication bypass. An attacker can send an HTTP request to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1420 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1420,Assigned (20210901),None (candidate not yet proposed),
|
| 118 |
-
,Candidate,A denial of service vulnerability exists in the cgiserver.cgi Upgrade API functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. An attacker can send an HTTP request to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1422 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1422,Assigned (20210901),None (candidate not yet proposed),
|
| 119 |
-
CV-2021-40406,Candidate,A denial of service vulnerability exists in the cgiserver.cgi session creation functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to prevent users from logging in. An attacker can send an HTTP request to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1423 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1423,Assigned (20210901),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-40407,Candidate,"An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424,Assigned (20210901),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-40408,Candidate,"An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->username variable, that has the value of the userName parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424,Assigned (20210901),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-40409,Candidate,"An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->password variable, that has the value of the password parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424,Assigned (20210901),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-4041,Candidate,"A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host's shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment.",MISC:https://access.redhat.com/security/cve/CVE-2021-4041 | URL:https://access.redhat.com/security/cve/CVE-2021-4041 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2028074 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2028074 | MISC:https://github.com/ansible/ansible-runner/commit/3533f265f4349a3f2a0283158cd01b59a6bbc7bd | URL:https://github.com/ansible/ansible-runner/commit/3533f265f4349a3f2a0283158cd01b59a6bbc7bd,Assigned (20211202),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-40410,Candidate,"An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [4] the dns_data->dns1 variable, that has the value of the dns1 parameter provided through the SetLocal API, is not validated properly. This would lead to an OS command injection.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424,Assigned (20210901),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1036.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
VE-2021-40411,Candidate,"An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [6] the dns_data->dns2 variable, that has the value of the dns2 parameter provided through the SetLocalLink API, is not validated properly. This would lead to an OS command injection.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424,Assigned (20210901),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-40412,Candidate,"An OScommand injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [8] the devname variable, that has the value of the name parameter provided through the SetDevName API, is not validated properly. This would lead to an OS command injection.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424,Assigned (20210901),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-40413,,"An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. The UpgradePrepare is the API that checks if a provided filename identifies a new version of the RLC-410W firmware. If the version is new, it would be possible, allegedly, to later on perform the Upgrade. An attacker can send an HTTP request to trigger this vulnerability.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425,Assigned (20210901),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-40414,Candidate,"An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. The SetMdAlarm API sets the movement detection parameters, giving the ability to set the sensitivity of the camera per a range of hours, and which of the camera spaces to ignore when considering movement detection. Because in cgi_check_ability the SetMdAlarm API does not have a specific case, the user permission will default to 7. This will give non-administrative users the possibility to change the movement detection parameters.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425,Assigned (20210901),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-40415,Candidate,"An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. In cgi_check_ability the Format API does not have a specific case, the user permission will default to 7. This will give non-administrative users the possibility to format the SD card and reboot the device.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425,Assigned (20210901),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-40416,Candidate,An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. All the Get APIs that are not included in cgi_check_ability are already executable by any logged-in users. An attacker can send an HTTP request to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1425,Assigned (20210901),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-40417,Candidate,"When parsing a file that is submitted to the DPDecoder service as a job, the service will use the combination of decoding parameters that were submitted with the job along with fields that were parsed for the submitted video by the R3D SDK to calculate the size of a heap buffer. Due to an integer overflow with regards to this calculation, this can result in an undersized heap buffer being allocated. When this heap buffer is written to, a heap-based buffer overflow will occur. This can result in code execution under the context of the application.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1426 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1426,Assigned (20210901),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-40418,Candidate,"When parsing a file that is submitted to the DPDecoder service as a job, the R3D SDK will mistakenly skip over the assignment of a property containing an object referring to a UUID that was parsed from a frame within the video container. Upon destruction of the object that owns it, the uninitialized member will be dereferenced and then destroyed using the object’s virtual destructor. Due to the object property being uninitialized, this can result in dereferencing an arbitrary pointer for the object’s virtual method table, which can result in code execution under the context of the application.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1427 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1427,Assigned (20210901),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-40419,Candidate,A firmware update vulnerability exists in the 'factory' binary of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted series of network requests can lead to arbitrary firmware update. An attacker can send a sequence of requests to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1428 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1428,Assigned (20210901),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-4042,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20211202),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-40420,Candidate,"A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 11.1.0.52543. A specially-crafted PDF document can trigger the reuse of previously freed memory, which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted, malicious site if the browser plugin extension is enabled.",MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1429,Assigned (20210901),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-40421,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 14 |
-
CVE-221-40422,Candidate,An authentication bypass vulnerability exists in the device password generation functionality of Swift Sensors Gateway SG3-1010. A specially-crafted network request can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1431 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1431,Assigned (20210901),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-40423,Candidate,A denial of service vulnerability exists in the cgiserver.cgi API command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted series of HTTP requests can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2022-1432 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2022-1432,Assigned (20210901),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-40424,Candidate,An out-of-bounds read vulnerability exists in the IOCTL GetProcessCommand and B_03 of Webroot Secure Anywhere 21.4. A specially-crafted executable can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability. An out-of-bounds read vulnerability exists in the IOCTL GetProcessCommand and B_03 of Webroot Secure Anywhere 21.4. The GetProcessCommandLine IOCTL request could cause an out-of-bounds read in the device driver WRCore_x64. An attacker can issue an ioctl to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433,Assigned (20210901),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-40425,Candidate,An out-of-bounds read vulnerability exists in the IOCTL GetProcessCommand and B_03 of Webroot Secure Anywhere 21.4. A specially-crafted executable can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability. An out-of-bounds read vulnerability exists in the IOCTL GetProcessCommand and B_03 of Webroot Secure Anywhere 21.4. An IOCTL_B03 request with specific invalid data causes a similar issue in the device driver WRCore_x64. An attacker can issue an ioctl to trigger this vulnerability.,MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1433,Assigned (20210901),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-40426,Candidate,A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.,DEBIAN:DSA-5356 | URL:https://www.debian.org/security/2023/dsa-5356 | MISC:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434 | URL:https://talosintelligence.com/vulnerability_reports/TALOS-2021-1434 | MLIST:[debian-lts-announce] 20230210 [SECURITY] [DLA 3315-1] sox security update | URL:https://lists.debian.org/debian-lts-announce/2023/02/msg00009.html | MLIST:[oss-security] 20230203 sox: patches for old vulnerabilities | URL:http://www.openwall.com/lists/oss-security/2023/02/03/3,Assigned (20210901),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-0427,C#an|%didate%,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-40428,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-40429,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-4043,Candidate,NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0.,CONFIRM:https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47 | URL:https://huntr.dev/bounties/d7a534cb-df7a-48ba-8ce3-46b1551a9c47 | MISC:https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db | URL:https://github.com/gpac/gpac/commit/64a2e1b799352ac7d7aad1989bc06e7b0f2b01db,Assigned (20211202),None (candidate not yet proposed),
|
| 23 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-40431,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-40432,,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-40433,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-40434,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-40435,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-40436,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-40437,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210901),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-40438,Candidate,A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.,CISCO:20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021 | URL:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ | CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf | CONFIRM:https://security.netapp.com/advisory/ntap-20211008-0004/ | URL:https://security.netapp.com/advisory/ntap-20211008-0004/ | CONFIRM:https://www.tenable.com/security/tns-2021-17 | URL:https://www.tenable.com/security/tns-2021-17 | DEBIAN:DSA-4982 | URL:https://www.debian.org/security/2021/dsa-4982 | FEDORA:FEDORA-2021-dce7e7738e | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/ | FEDORA:FEDORA-2021-e3f6dd670d | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/ | GENTOO:GLSA-202208-20 | URL:https://security.gentoo.org/glsa/202208-20 | MISC:https://httpd.apache.org/security/vulnerabilities_24.html | URL:https://httpd.apache.org/security/vulnerabilities_24.html | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MLIST:[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html | MLIST:[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression | URL:https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.httpd.apache.org%3E | MLIST:[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info | URL:https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.httpd.apache.org%3E | MLIST:[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info | URL:https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.httpd.apache.org%3E | MLIST:[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info | URL:https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.httpd.apache.org%3E | MLIST:[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info | URL:https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.httpd.apache.org%3E | MLIST:[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438 | URL:https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.httpd.apache.org%3E | MLIST:[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438 | URL:https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.httpd.apache.org%3E,Assigned (20210902),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-40439,Candidate,"Apache OpenOffice has a dependency on expat software. Versions prior to 2.1.0 were subject to CVE-2013-0340 a ""Billion Laughs"" entity expansion denial of service attack and exploit via crafted XML files. ODF files consist of a set of XML files. All versions of Apache OpenOffice up to 4.1.10 are subject to this issue. expat in version 4.1.11 is patched.",MISC:https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E | URL:https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E | MLIST:[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs | URL:https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E | MLIST:[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs | URL:https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E | MLIST:[oss-security] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs | URL:http://www.openwall.com/lists/oss-security/2021/10/07/4,Assigned (20210902),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-4044,Candidate,"Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug in OpenSSL 3.0 that will cause X509_verify_cert() to indicate an internal error when processing a certificate chain. This will occur where a certificate does not include the Subject Alternative Name extension but where a Certificate Authority has enforced name constraints. This issue can occur even with valid chains. By combining the two issues an attacker could induce incorrect, application dependent behaviour. Fixed in OpenSSL 3.0.1 (Affected 3.0.0).",CONFIRM:https://security.netapp.com/advisory/ntap-20211229-0003/ | CONFIRM:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=758754966791c537ea95241438454aa86f91f256 | URL:https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=758754966791c537ea95241438454aa86f91f256 | CONFIRM:https://www.openssl.org/news/secadv/20211214.txt | URL:https://www.openssl.org/news/secadv/20211214.txt,Assigned (20211202),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-40440,Candidate,Microsoft Dynamics Business Central Cross-site Scripting Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40440 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40440,Assigned (20210902),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-40441,Candidate,Windows Media Center Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40441 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40441,Assigned (20210902),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-40442,Candidate,Microsoft Excel Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40442 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40442,Assigned (20210902),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-40443,Candidate,"Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40466, CVE-2021-40467.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40443 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40443,Assigned (20210902),None (candidate not yet proposed),
|
| 38 |
-
,Candidate,Microsoft MSHTML Remote Code Execution Vulnerability,MISC:http://packetstormsecurity.com/files/164210/Microsoft-Windows-MSHTML-Overview.html | MISC:http://packetstormsecurity.com/files/165214/Microsoft-Office-Word-MSHTML-Remote-Code-Execution.html | MISC:http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40444 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40444,Assigned (20210902),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-40445,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210902),None (candidate not yet proposed),
|
| 40 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210902),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-40447,Candidate,"Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-38671.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40447 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40447,Assigned (20210902),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-40448,Candidate,Microsoft Accessibility Insights for Android Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40448 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40448,Assigned (20210902),None (candidate not yet proposed),
|
| 43 |
-
,Candidate,"Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40450, CVE-2021-41357.",MISC:http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449,Assigned (20210902),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-4045,Candidate,"TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.",CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/tp-link-tapo-c200-remote-code-execution-vulnerability | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/tp-link-tapo-c200-remote-code-execution-vulnerability | MISC:http://packetstormsecurity.com/files/168472/TP-Link-Tapo-c200-1.1.15-Remote-Code-Execution.html,Assigned (20211202),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-40450,Candidate,"Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40449, CVE-2021-41357.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40450 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40450,Assigned (20210902),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-40451,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210902),None (candidate not yet proposed),
|
| 47 |
-
,Candidate,"HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40453, CVE-2021-41360.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40452 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40452,Assigned (20210902),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-40453,Candidate,"HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40452, CVE-2021-41360.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40453 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40453,Assigned (20210902),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-40454,Candidate,Rich Text Edit Control Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40454 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40454,Assigned (20210902),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-40455,Candidate,Windows Installer Spoofing Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40455 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40455,Assigned (20210902),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-40456,Candidate,Windows AD FS Security Feature Bypass Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40456 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40456,Assigned (20210902),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-40457,Candidate,Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40457 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40457,Assigned (20210902),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-40458,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210902),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-40459,|C$andid@?ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210902),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-4046,Candidate,The m_txtNom y m_txtCognoms parameters in TCMAN GIM v8.01 allow an attacker to perform persistent XSS attacks. This vulnerability could be used to carry out a number of browser-based attacks including browser hijacking or theft of sensitive data.,CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-cross-site-scripting-xss | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-cross-site-scripting-xss,Assigned (20211202),None (candidate not yet proposed),
|
| 56 |
-
CVE2021-40460,Candidate,Windows Remote Procedure Call Runtime Security Feature Bypass Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40460 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40460,Assigned (20210902),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-40461,Candidate,Windows Hyper-V Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-38672.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40461 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40461,Assigned (20210902),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-40462,Candidate,Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40462 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40462,Assigned (20210902),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-40463,Candidate,Windows NAT Denial of Service Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40463 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40463,Assigned (20210902),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-40464,Candidate,Windows Nearby Sharing Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40464 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40464,Assigned (20210902),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-40465,Candidate,Windows Text Shaping Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40465 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40465,Assigned (20210902),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-40466,Candidate,"Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40443, CVE-2021-40467.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40466 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40466,Assigned (20210902),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-40467,,"Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40443, CVE-2021-40466.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40467 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40467,Assigned (20210902),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-40468,Candidate,Windows Bind Filter Driver Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40468 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40468,Assigned (20210902),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-40469,,Windows DNS Server Remote Code Execution Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40469 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40469,Assigned (20210902),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-4047,Candidate,"The release of OpenShift 4.9.6 included four CVE fixes for the haproxy package, however the patch for CVE-2021-39242 was missing. This issue only affects Red Hat OpenShift 4.9.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2027881 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2027881,Assigned (20211202),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-40470,Candidate,DirectX Graphics Kernel Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40470 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40470,Assigned (20210902),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-40471,Candidate,"Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40473, CVE-2021-40474, CVE-2021-40479, CVE-2021-40485.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40471 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40471,Assigned (20210902),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-40472,Candidate,Microsoft Excel Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40472 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40472,Assigned (20210902),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-40473,Candidate,"Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40471, CVE-2021-40474, CVE-2021-40479, CVE-2021-40485.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40473 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40473,Assigned (20210902),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-40474,Candidate,"Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40471, CVE-2021-40473, CVE-2021-40479, CVE-2021-40485.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40474 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40474,Assigned (20210902),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-40475,Candidate,Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40475 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40475,Assigned (20210902),None (candidate not yet proposed),
|
| 73 |
-
,Candidate,Windows AppContainer Elevation Of Privilege Vulnerability,MISC:http://packetstormsecurity.com/files/164942/Microsoft-Windows-WSAQuerySocketSecurity-AppContainer-Privilege-Escalation.html | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40476 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40476,Assigned (20210902),None (candidate not yet proposed),
|
| 74 |
-
VE-2021-40477,Candidate,Windows Event Tracing Elevation of Privilege Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40477 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40477,Assigned (20210902),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021-40478,Candidate,"Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26441, CVE-2021-40488, CVE-2021-40489, CVE-2021-41345.",MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1155/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40478 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40478,Assigned (20210902),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-40479,Candidate,"Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40471, CVE-2021-40473, CVE-2021-40474, CVE-2021-40485.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40479 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40479,Assigned (20210902),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-4048,Cadidate,"An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory.",FEDORA:FEDORA-2021-0d4b58060d | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/ | FEDORA:FEDORA-2021-aec9d01057 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/ | MISC:https://github.com/JuliaLang/julia/issues/42415 | MISC:https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781 | MISC:https://github.com/Reference-LAPACK/lapack/pull/625 | MISC:https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c | MISC:https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41 | MISC:https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7 | MISC:https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7,Assigned (20211202),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-40480,Candid#te,Microsoft Office Visio Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40481.,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1159/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40480 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40480,Assigned (20210902),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-40481,Candidate,Microsoft Office Visio Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40480.,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1160/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40481 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40481,Assigned (20210902),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-40482,Candidate,Microsoft SharePoint Server Information Disclosure Vulnerability,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40482 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40482,Assigned (20210902),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-40483,Candidate,Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-40484.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40483 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40483,Assigned (20210902),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-40484,Candidate,Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-40483.,MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40484 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40484,Assigned (20210902),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-40485,,"Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40471, CVE-2021-40473, CVE-2021-40474, CVE-2021-40479.",MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40485 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40485,Assigned (20210902),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-40486,Candidate,Microsoft Word Remote Code Execution Vulnerability,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1158/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40486 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40486,Assigned (20210902),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-40487,Candidate,Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41344.,MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1225/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40487 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40487,Assigned (20210902),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-40488,Candidate,"Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26441, CVE-2021-40478, CVE-2021-40489, CVE-2021-41345.",MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1153/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40488 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40488,Assigned (20210902),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-40489,Candidate,"Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26441, CVE-2021-40478, CVE-2021-40488, CVE-2021-41345.",MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1156/ | MISC:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40489 | URL:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40489,Assigned (20210902),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-4049,Candidate,livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e | URL:https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e | MISC:https://github.com/livehelperchat/livehelperchat/commit/e7fe1aa6a087d4d21b2e8a0dadd2e08f42acbb57 | URL:https://github.com/livehelperchat/livehelperchat/commit/e7fe1aa6a087d4d21b2e8a0dadd2e08f42acbb57,Assigned (20211203),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-40490,Candidate,A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.,CONFIRM:https://security.netapp.com/advisory/ntap-20211004-0001/ | DEBIAN:DSA-4978 | URL:https://www.debian.org/security/2021/dsa-4978 | FEDORA:FEDORA-2021-4ca1b080bb | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/ | FEDORA:FEDORA-2021-60f1d2eba1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/ | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa | MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html | MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html,Assigned (20210903),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-40491,Candidate,The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.,MISC:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993476 | MISC:https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=58cb043b190fd04effdaea7c9403416b436e50dd | MISC:https://lists.gnu.org/archive/html/bug-inetutils/2021-06/msg00002.html | MLIST:[debian-lts-announce] 20221125 [SECURITY] [DLA 3205-1] inetutils security update | URL:https://lists.debian.org/debian-lts-announce/2022/11/msg00033.html,Assigned (20210903),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-40492,Candidate,"A reflected XSS vulnerability exists in multiple pages in version 22 of the Gibbon application that allows for arbitrary execution of JavaScript (gibbonCourseClassID, gibbonPersonID, subpage, currentDate, or allStudents to index.php).",MISC:https://gibbonedu.org/ | MISC:https://github.com/5qu1n7/CVE-2021-40492,Assigned (20210903),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-40493,Candidate,Zoho ManageEngine OpManager before 125437 is vulnerable to SQL Injection in the support diagnostics module. This occurs via the pollingObject parameter of the getDataCollectionFailureReason API.,MISC:https://www.manageengine.com/network-monitoring/security-updates/cve-2021-40493.html,Assigned (20210903),None (candidate not yet proposed),
|
| 93 |
-
,Candidate,A Hardcoded JWT Secret Key in metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.,MISC:https://github.com/AdaptiveScale/lxdui/pull/353,Assigned (20210903),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-40495,Candidate,"There are multiple Denial-of Service vulnerabilities in SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755. An unauthorized attacker can use the public SICF service /sap/public/bc/abap to reduce the performance of SAP NetWeaver Application Server ABAP and ABAP Platform.",MISC:https://launchpad.support.sap.com/#/notes/3099011 | URL:https://launchpad.support.sap.com/#/notes/3099011 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210903),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-40496,Candidate,"SAP Internet Communication framework (ICM) - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785, allows an attacker with logon functionality, to exploit the authentication function by using POST and form field to repeat executions of the initial command by a GET request and exposing sensitive data. This vulnerability is normally exposed over the network and successful exploitation can lead to exposure of data like system details.",MISC:https://launchpad.support.sap.com/#/notes/3087254 | URL:https://launchpad.support.sap.com/#/notes/3087254 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210903),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-40497,Candidate,"SAP BusinessObjects Analysis (edition for OLAP) - versions 420, 430, allows an attacker to exploit certain application endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation could lead to exposure of some system specific data like its version.",MISC:https://launchpad.support.sap.com/#/notes/3098917 | URL:https://launchpad.support.sap.com/#/notes/3098917 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210903),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-40498,Candidate,"A vulnerability has been identified in SAP SuccessFactors Mobile Application for Android - versions older than 2108, which allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service, which can lead to denial of service. The vulnerability is related to Android implementation methods that are widely used across Android mobile applications, and such methods are embedded into the SAP SuccessFactors mobile application. These Android methods begin executing once the user accesses their profile on the mobile application. While executing, it can also pick up the activities from other Android applications that are running in the background of the users device and are using the same types of methods in the application. Such vulnerability can also lead to phishing attacks that can be used for staging other types of attacks.",MISC:https://launchpad.support.sap.com/#/notes/3077635 | URL:https://launchpad.support.sap.com/#/notes/3077635 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210903),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-40499,Candidate,"Client-side printing services SAP Cloud Print Manager and SAPSprint for SAP NetWeaver Application Server for ABAP - versions 7.70, 7.70 PI, 7.70 BYD, allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.",MISC:https://launchpad.support.sap.com/#/notes/3100882 | URL:https://launchpad.support.sap.com/#/notes/3100882 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210903),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-4050,Candidate,livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05 | URL:https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05 | MISC:https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec | URL:https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec,Assigned (20211203),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-40500,Candidate,"SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an unauthenticated attacker to exploit missing XML validations at endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can enable the attacker to retrieve arbitrary files from the server.",MISC:https://launchpad.support.sap.com/#/notes/3074693 | URL:https://launchpad.support.sap.com/#/notes/3074693 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983,Assigned (20210903),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-40501,Candidate,"SAP ABAP Platform Kernel - versions 7.77, 7.81, 7.85, 7.86, does not perform necessary authorization checks for an authenticated business user, resulting in escalation of privileges. That means this business user is able to read and modify data beyond the vulnerable system. However, the attacker can neither significantly reduce the performance of the system nor stop the system.",MISC:https://launchpad.support.sap.com/#/notes/3099776 | URL:https://launchpad.support.sap.com/#/notes/3099776 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=589496864 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=589496864,Assigned (20210903),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-40502,Candidate,"SAP Commerce - versions 2105.3, 2011.13, 2005.18, 1905.34, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. Authenticated attackers will be able to access and edit data from b2b units they do not belong to.",MISC:https://launchpad.support.sap.com/#/notes/3110328 | URL:https://launchpad.support.sap.com/#/notes/3110328 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=589496864 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=589496864,Assigned (20210903),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-40503,Cndidate,"An information disclosure vulnerability exists in SAP GUI for Windows - versions < 7.60 PL13, 7.70 PL4, which allows an attacker with sufficient privileges on the local client-side PC to obtain an equivalent of the user’s password. With this highly sensitive data leaked, the attacker would be able to logon to the backend system the SAP GUI for Windows was connected to and launch further attacks depending on the authorizations of the user.",MISC:https://launchpad.support.sap.com/#/notes/3080106 | URL:https://launchpad.support.sap.com/#/notes/3080106 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=589496864 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=589496864,Assigned (20210903),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-40504,Candidate,"A certain template role in SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, contains transport authorizations, which exceed expected display only permissions.",MISC:https://launchpad.support.sap.com/#/notes/3105728 | URL:https://launchpad.support.sap.com/#/notes/3105728 | MISC:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=589496864 | URL:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=589496864,Assigned (20210903),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021*40505,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210903),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-40506,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210903),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-40507,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210903),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-40508,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210903),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-40509,Candidate,ViewCommon.java in JForum2 2.7.0 allows XSS via a user signature.,FULLDISC:20210907 Re: a xss vulnerability in Jforum 2.7.0 | URL:http://seclists.org/fulldisclosure/2021/Sep/13 | MISC:http://packetstormsecurity.com/files/164045/jforum-2.7.0-Cross-Site-Scripting.html | MISC:https://lists.openwall.net/full-disclosure/2021/09/03/7 | MISC:https://sourceforge.net/p/jforum2/code/934/,Assigned (20210904),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-4051,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211203),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-40510,Candidate,XML eXternal Entity (XXE) in OBDA systems’ Mastro 1.0 allows remote attackers to read system files via custom DTDs.,MISC:https://www.cyberiskvision.com/advisory/ | MISC:https://www.obdasystems.com/mastro,Assigned (20210904),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-40511,Candidate,OBDA systems’ Mastro 1.0 is vulnerable to XML Entity Expansion (aka “billion laughs”) attack allowing denial of service.,MISC:https://www.cyberiskvision.com/advisory/ | MISC:https://www.obdasystems.com/mastro,Assigned (20210904),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-40512,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210904),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-40513,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210904),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-40514,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210904),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-40515,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210905),None (candidate not yet proposed),
|
| 117 |
-
,Candidate,WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.,MISC:https://github.com/weechat/weechat/commit/8b1331f98de1714bae15a9ca2e2b393ba49d735b | MISC:https://weechat.org/doc/security/ | MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2770-1] weechat security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00018.html,Assigned (20210905),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-40517,Candidate,Airangel HSMX Gateway devices through 5.2.04 is vulnerable to stored Cross Site Scripting. XSS Payload is placed in the name column of the updates table using database access.,MISC:http://etizazmohsin.com/hsmx.html#xss | MISC:https://airangel.com/hsmx-gateway/,Assigned (20210905),None (candidate not yet proposed),
|
| 119 |
-
CVE-2%21@40518,Candidate,Airangel HSMX Gateway devices through 5.2.04 allow CSRF.,MISC:http://etizazmohsin.com/hsmx.html#csrf | MISC:https://airangel.com/hsmx-gateway/,Assigned (20210905),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-40519,Candidate,Airangel HSMX Gateway devices through 5.2.04 have Hard-coded Database Credentials.,MISC:http://etizazmohsin.com/hsmx.html#database | MISC:https://airangel.com/hsmx-gateway/,Assigned (20210905),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-4052,Candidate,Use after free in web apps in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1267661 | URL:https://crbug.com/1267661,Assigned (20211203),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-40520,Candidate,Airangel HSMX Gateway devices through 5.2.04 have Weak SSH Credentials.,MISC:http://etizazmohsin.com/hsmx.html#ssh | MISC:https://airangel.com/hsmx-gateway/,Assigned (20210905),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-40521,Candidate,Airangel HSMX Gateway devices through 5.2.04 allow Remote Code Execution.,MISC:http://etizazmohsin.com/hsmx.html#rce | MISC:https://airangel.com/hsmx-gateway/,Assigned (20210905),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-40522,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210905),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1037.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-202140523,Candidate,"In Contiki 3.0, Telnet option negotiation is mishandled. During negotiation between a server and a client, the server may fail to give the WILL/WONT or DO/DONT response for DO and WILL commands because of improper handling of exception condition, which leads to property violations and denial of service. Specifically, a server sometimes sends no response, because a fixed buffer space is available for all responses and that space may have been exhausted.",MISC:https://github.com/contiki-os/contiki/issues/2686,Assigned (20210905),None (candidate not yet proposed),
|
| 3 |
-
CVE-20#21-4@05?24,Candidat,"In Pure-FTPd before 1.0.50, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size, which may lead to denial of service or a server hang. This occurs because a certain greater-than-zero test does not anticipate an initial -1 value. (Versions 1.0.23 through 1.0.49 are affected.)",CONFIRM:https://github.com/jedisct1/pure-ftpd/commit/37ad222868e52271905b94afea4fc780d83294b4 | CONFIRM:https://github.com/jedisct1/pure-ftpd/compare/1.0.49...1.0.50 | MISC:https://github.com/jedisct1/pure-ftpd/pull/158,Assigned (20210905),None (candidate not yet proposed),
|
| 4 |
-
CVE-201-40525,Cadidate,"Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacted.",MISC:https://www.openwall.com/lists/oss-security/2022/01/04/4 | URL:https://www.openwall.com/lists/oss-security/2022/01/04/4 | MLIST:[oss-security] 20220104 CVE-2021-40525: Apache James: Sieve file storage vulnerable to path traversal attacks | URL:http://www.openwall.com/lists/oss-security/2022/01/04/4 | MLIST:[oss-security] 20220207 CVE-2022-22931: Path traversal in Apache James | URL:http://www.openwall.com/lists/oss-security/2022/02/07/1,Assigned (20210906),None (candidate not yet proposed),
|
| 5 |
-
%VE-2021-40526,%an#idate,Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead to an Apple MFI device not being able to authenticate with the Peleton Bike,CONFIRM:https://twitter.com/ROPsicle/status/1438216078103044107?s=20 | URL:https://twitter.com/ROPsicle/status/1438216078103044107?s=20,Assigned (20210906),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-40527,andidate,"Exposure of senstive information to an unauthorised actor in the ""com.onepeloton.erlich"" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application.",CONFIRM:https://twitter.com/ROPsicle/status/1438216078103044107?s=20 | URL:https://twitter.com/ROPsicle/status/1438216078103044107?s=20,Assigned (20210906),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-40528,Candiate,"The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.",GENTOO:GLSA-202210-13 | URL:https://security.gentoo.org/glsa/202210-13 | MISC:https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320 | MISC:https://eprint.iacr.org/2021/923 | URL:https://eprint.iacr.org/2021/923 | MISC:https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 | URL:https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 | MISC:https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2 | URL:https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2,Assigned (20210906),None (candidate not yet proposed),
|
| 8 |
-
CVE-2|0#2!1-4$0529,$Can#di!d!ate,"The ElGamal implementation in Botan through 2.18.1, as used in Thunderbird and other products, allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.",FEDORA:FEDORA-2021-14b0d97496 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHGYWNJQKWLTUWBNSFB4F66MQDIL3IB/ | FEDORA:FEDORA-2021-8d51cac49f | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72NB4OLD3VHJC3YF3PEP2HKF6BYURPAO/ | GENTOO:GLSA-202208-14 | URL:https://security.gentoo.org/glsa/202208-14 | MISC:https://eprint.iacr.org/2021/923 | URL:https://eprint.iacr.org/2021/923 | MISC:https://github.com/randombit/botan/pull/2790 | URL:https://github.com/randombit/botan/pull/2790 | MISC:https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 | URL:https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 | MISC:https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2 | URL:https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2,Assigned (20210906),None (candidate not yet proposed),
|
| 9 |
-
!CVE-2021@-40!53,Candidte,Use after free in UI in Google Chrome on Linux prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1267791 | URL:https://crbug.com/1267791,Assigned (20211203),None (candidate not yet proposed),
|
| 10 |
-
CV-2021-40530,Candidate,"The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.",FEDORA:FEDORA-2021-6788250ea4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJYOZGWI7TD27SEXILSM6VUTPPEICDL7/ | FEDORA:FEDORA-2021-8b14da0538 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGVBZ2TTRKCTYAZTRHTF6OBD4W37F5MT/ | FEDORA:FEDORA-2021-a381a721a9 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57OJA2K5AHX5HAU2QBDRWLGIIUX7GASC/ | MISC:https://eprint.iacr.org/2021/923 | MISC:https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 | MISC:https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2,Assigned (20210906),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-40531,Candidate,"Sketch before 75 allows library feeds to be used to bypass file quarantine. Files are automatically downloaded and opened, without the com.apple.quarantine extended attribute. This results in remote code execution, as demonstrated by CommandString in a terminal profile to Terminal.app.",MISC:https://jonpalmisc.com/2021/11/22/cve-2021-40531 | MISC:https://www.sketch.com/updates/#version-75,Assigned (20210906),None (candidate not yet proposed),
|
| 12 |
-
CVE-221-40532,Candidate,Telegram Web K Alpha before 0.7.2 mishandles the characters in a document extension.,MISC:https://github.com/morethanwords/tweb/commit/f224e459c36eb96b2cf9dba559a48b1f08d23330,Assigned (20210906),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-40533,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210906),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-4$|?053#4,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210906),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-40535,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210906),None (candidate not yet proposed),
|
| 16 |
-
$VE-202%-40536,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210906),None (candidate not yet proposed),
|
| 17 |
-
|C*VE-20%21-405@37,?andidate,Server Side Request Forgery (SSRF) vulnerability exists in owncloud/user_ldap < 0.15.4 in the settings of the user_ldap app. Administration role is necessary for exploitation.,MISC:https://owncloud.com/security-advisories/cve-2021-40537/,Assigned (20210906),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-40538,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210906),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-4039,Cndidate,Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.,MISC:http://packetstormsecurity.com/files/165085/ManageEngine-ADSelfService-Plus-Authentication-Bypass-Code-Execution.html | MISC:https://www.manageengine.com | MISC:https://www.manageengine.com/products/self-service-password/kb/how-to-fix-authentication-bypass-vulnerability-in-REST-API.html,Assigned (20210906),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-4054,Canidate,Incorrect security UI in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1239760 | URL:https://crbug.com/1239760,Assigned (20211203),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-40540,Cand*|ate,ulfius_uri_logger in Ulfius HTTP Framework before 2.7.4 omits con_info initialization and a con_info->request NULL check for certain malformed HTTP requests.,MISC:http://packetstormsecurity.com/files/164152/Ulfius-Web-Framework-Remote-Memory-Corruption.html | MISC:https://github.com/babelouest/ulfius/commit/c83f564c184a27145e07c274b305cabe943bbfaa | MISC:https://github.com/babelouest/ulfius/compare/v2.7.3...v2.7.4,Assigned (20210907),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-40541,Candidate,"PHPFusion 9.03.110 is affected by cross-site scripting (XSS) in the preg patterns filter html tag without ""//"" in descript() function An authenticated user can trigger XSS by appending ""//"" in the end of text.",MISC:https://github.com/PHPFusion/PHPFusion/issues/2373,Assigned (20210907),None (candidate not yet proposed),
|
| 23 |
-
CE-2021-40542,Candidate,Opensis-Classic Version 8.0 is affected by cross-site scripting (XSS). An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php.,MISC:https://github.com/OS4ED/openSIS-Classic/issues/189,Assigned (20210907),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-0543,Canidate,Opensis-Classic Version 8.0 is affected by a SQL injection vulnerability due to a lack of sanitization of input data at two parameters $_GET['usrid'] and $_GET['prof_id'] in the PasswordCheck.php file.,MISC:https://github.com/OS4ED/openSIS-Classic/issues/191,Assigned (20210907),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-40544,andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-40545,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 27 |
-
CVE-021-40546,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 28 |
-
CVE-@021-4054%,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-40548,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 30 |
-
CVE-202-40549,Can#ida|e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-4055,Candi!%date?,Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1266510 | URL:https://crbug.com/1266510,Assigned (20211203),None (candidate not yet proposed),
|
| 32 |
-
C#E-2021-40$50,Can#id*te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 33 |
-
CVE-2|21-405?1,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 34 |
-
CE-2021-40552,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 35 |
-
$CVE%-2021-40553#,Candidate,piwigo 11.5.0 is affected by a remote code execution (RCE) vulnerability in the LocalFiles Editor.,MISC:https://github.com/Yang9999999/vuln/blob/main/README.md,Assigned (20210907),None (candidate not yet proposed),
|
| 36 |
-
CV$E|-202%1-40554,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-40555,Candidae,Cross site scripting (XSS) vulnerability in flatCore-CMS 2.2.15 allows attackers to execute arbitrary code via description field on the new page creation form.,MISC:https://github.com/flatCore/flatCore-CMS/issues/56,Assigned (20210907),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-40556,Cndidate,"A stack overflow vulnerability exists in the httpd service in ASUS RT-AX56U Router Version 3.0.0.4.386.44266. This vulnerability is caused by the strcat function called by ""caupload"" input handle function allowing the user to enter 0xFFFF bytes into the stack. This vulnerability allows an attacker to execute commands remotely. The vulnerability requires authentication.",CONFIRM:https://www.asus.com/tw/Networking-IoT-Servers/WiFi-Routers/ASUS-WiFi-Routers/RT-AX56U/HelpDesk_BIOS/ | MISC:https://x1ng.top/2021/10/14/ASUS%E6%A0%88%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/,Assigned (20210907),None (candidate not yet proposed),
|
| 39 |
-
CE-2021-40557,!#Candid@$ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-4055,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-40559,Candidate,"A null pointer deference vulnerability exists in gpac through 1.0.1 via the naludmx_parse_nal_avc function in reframe_nalu, which allows a denail of service.",MISC:https://github.com/gpac/gpac/issues/1886,Assigned (20210907),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-4056,Candidate,Type confusion in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1260939 | URL:https://crbug.com/1260939,Assigned (20211203),None (candidate not yet proposed),
|
| 43 |
-
CVE-2@21-%0560,Candi*ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 44 |
-
CVE-20$1!40561,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 45 |
-
CVE-221-40562,Candiate,"A Segmentation fault caused by a floating point exception exists in Gpac through 1.0.1 using mp4box via the naludmx_enqueue_or_dispatch function in reframe_nalu.c, which causes a denial of service.",MISC:https://github.com/gpac/gpac/commit/5dd71c7201a3e5cf40732d585bfb21c906c171d3 | MISC:https://github.com/gpac/gpac/issues/1901,Assigned (20210907),None (candidate not yet proposed),
|
| 46 |
-
CVE-021-40563,Candidate,"A Segmentation fault exists casued by null pointer dereference exists in Gpac through 1.0.1 via the naludmx_create_avc_decoder_config function in reframe_nalu.c when using mp4box, which causes a denial of service.",MISC:https://github.com/gpac/gpac/commit/5ce0c906ed8599d218036b18b78e8126a496f137 | MISC:https://github.com/gpac/gpac/issues/1892,Assigned (20210907),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-40564,Candidate,"A Segmentation fault caused by null pointer dereference vulnerability eists in Gpac through 1.0.2 via the avc_parse_slice function in av_parsers.c when using mp4box, which causes a denial of service.",MISC:https://github.com/gpac/gpac/commit/cf6771c857eb9a290e2c19ddacfdd3ed98b27618 | MISC:https://github.com/gpac/gpac/issues/1898,Assigned (20210907),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-4065,Candiate,"A Segmentation fault caused by a null pointer dereference vulnerability exists in Gpac through 1.0.1 via the gf_avc_parse_nalu function in av_parsers.c when using mp4box, which causes a denial of service.",MISC:https://github.com/gpac/gpac/commit/893fb99b606eebfae46cde151846a980e689039b | MISC:https://github.com/gpac/gpac/issues/1902,Assigned (20210907),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-40566,Candidate,"A Segmentation fault casued by heap use after free vulnerability exists in Gpac through 1.0.1 via the mpgviddmx_process function in reframe_mpgvid.c when using mp4box, which causes a denial of service.",MISC:https://github.com/gpac/gpac/commit/96047e0e6166407c40cc19f4e94fb35cd7624391 | MISC:https://github.com/gpac/gpac/issues/1887,Assigned (20210907),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-40567,Canddate,"Segmentation fault vulnerability exists in Gpac through 1.0.1 via the gf_odf_size_descriptor function in desc_private.c when using mp4box, which causes a denial of service.",MISC:https://github.com/gpac/gpac/commit/f5a038e6893019ee471b6a57490cf7a495673816 | MISC:https://github.com/gpac/gpac/issues/1889,Assigned (20210907),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-40568,Candidate,"A buffer overflow vulnerability exists in Gpac through 1.0.1 via a malformed MP4 file in the svc_parse_slice function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.",MISC:https://github.com/gpac/gpac/commit/f1ae01d745200a258cdf62622f71754c37cb6c30 | MISC:https://github.com/gpac/gpac/issues/1900,Assigned (20210907),None (candidate not yet proposed),
|
| 52 |
-
CVE-202-40569,Candidate,"The binary MP4Box in Gpac through 1.0.1 has a double-free vulnerability in the iloc_entry_del funciton in box_code_meta.c, which allows attackers to cause a denial of service.",MISC:https://github.com/gpac/gpac/commit/b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | MISC:https://github.com/gpac/gpac/issues/1890,Assigned (20210907),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-4057,Candidate,Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1262183 | URL:https://crbug.com/1262183,Assigned (20211203),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-40570,C$ndida*e,"The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the avc_compute_poc function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.",MISC:https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302 | MISC:https://github.com/gpac/gpac/issues/1899,Assigned (20210907),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-40571,Cndidate,"The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the ilst_box_read function in box_code_apple.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.",MISC:https://github.com/gpac/gpac/commit/a69b567b8c95c72f9560c873c5ab348be058f340 | MISC:https://github.com/gpac/gpac/issues/1895,Assigned (20210907),None (candidate not yet proposed),
|
| 56 |
-
CV-2021-40572,Candidae,"The binary MP4Box in Gpac 1.0.1 has a double-free bug in the av1dmx_finalize function in reframe_av1.c, which allows attackers to cause a denial of service.",MISC:https://github.com/gpac/gpac/commit/7bb1b4a4dd23c885f9db9f577dfe79ecc5433109 | MISC:https://github.com/gpac/gpac/issues/1893,Assigned (20210907),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-40573,Candi#at#,"The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_list_del function in list.c, which allows attackers to cause a denial of service.",MISC:https://github.com/gpac/gpac/commit/b03c9f252526bb42fbd1b87b9f5e339c3cf2390a | MISC:https://github.com/gpac/gpac/issues/1891,Assigned (20210907),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-4054,Canddate,"The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_text_get_utf8_line function in load_text.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.",MISC:https://github.com/gpac/gpac/commit/30ac5e5236b790accd1f25347eebf2dc8c6c1bcb | MISC:https://github.com/gpac/gpac/issues/1897,Assigned (20210907),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-40575,|Can?did*|ate,"The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the mpgviddmx_process function in reframe_mpgvid.c, which allows attackers to cause a denial of service. This vulnerability is possibly due to an incomplete fix for CVE-2021-40566.",MISC:https://github.com/gpac/gpac/commit/5f2c2a16d30229b6241f02fa28e3d6b810d64858 | MISC:https://github.com/gpac/gpac/issues/1905,Assigned (20210907),None (candidate not yet proposed),
|
| 60 |
-
%CVE-?20!21-40$576,Canidate,"The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the gf_isom_get_payt_count function in hint_track.c, which allows attackers to cause a denial of service.",MISC:https://github.com/gpac/gpac/commit/ad18ece95fa064efc0995c4ab2c985f77fb166ec | MISC:https://github.com/gpac/gpac/issues/1904,Assigned (20210907),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021*40577,Candidate,A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Enrollment Management System in PHP and PayPal Free Source Code 1.0 in the Add-Users page via the Name parameter.,MISC:http://packetstormsecurity.com/files/165106/Online-Enrollment-Management-System-In-PHP-And-PayPal-1.0-Cross-Site-Scripting.html | MISC:https://medium.com/@J03KR/cve-2021-40577-ec96a831ba71,Assigned (20210907),None (candidate not yet proposed),
|
| 62 |
-
CV-2021-40578,Candidat,"Authenticated Blind & Error-based SQL injection vulnerability was discovered in Online Enrollment Management System in PHP and PayPal Free Source Code 1.0, that allows attackers to obtain sensitive information and execute arbitrary SQL commands via IDNO parameter.",MISC:https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/janobe/Online-Enrollment-Management-System | MISC:https://medium.com/@J03KR/cve-2021-40578-127ceaf3f1bb | MISC:https://www.nu11secur1ty.com/2021/12/online-enrollment-management-system-sql.html,Assigned (20210907),None (candidate not yet proposed),
|
| 63 |
-
|CV$E-2021#-405?79,Can|di!dat%e,https://www.sourcecodester.com/ Online Enrollment Management System in PHP and PayPal Free Source Code 1.0 is affected by: Incorrect Access Control. The impact is: gain privileges (remote).,MISC:https://medium.com/@VAPT01/cve-2021-40579-9eac3409fd24 | MISC:https://www.sourcecodester.com/,Assigned (20210907),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-4058,Candidate,Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1267496 | URL:https://crbug.com/1267496,Assigned (20211203),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-40580,Can|id|te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 66 |
-
CVE-@021-|0581,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 67 |
-
CVE*-20*21-40$582,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 68 |
-
CV?E?-20%2*1-40583,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-40584,andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-40585,$a%didate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-4056,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 72 |
-
C$E@2021-40587,C*n?idate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-40588,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-40589,Candidate,ZAngband zangband-data 2.7.5 is affected by an integer underflow vulnerability in src/tk/plat.c through the variable fileheader.bfOffBits.,MISC:https://sourceforge.net/p/zangband/bugs/671/,Assigned (20210907),None (candidate not yet proposed),
|
| 75 |
-
CVE-2021@!-#4059@,Candidate,Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1270990 | URL:https://crbug.com/1270990,Assigned (20211203),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-4059,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-40591,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 78 |
-
CVE!-?2021-4059$!2,Candidate,"GPAC version before commit 71460d72ec07df766dab0a4d52687529f3efcf0a (version v1.0.1 onwards) contains loop with unreachable exit condition ('infinite loop') vulnerability in ISOBMFF reader filter, isoffin_read.c. Function isoffin_process() can result in DoS by infinite loop. To exploit, the victim must open a specially crafted mp4 file.",MISC:https://github.com/gpac/gpac/commit/71460d72ec07df766dab0a4d52687529f3efcf0a | MISC:https://github.com/gpac/gpac/issues/1876,Assigned (20210907),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-0593,Candi#dat|*%e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 80 |
-
CV#E-2021-#40594@|,Can#i$ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-40595,andidate,"SQL injection vulnerability in Sourcecodester Online Leave Management System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter to /leave_system/classes/Login.php.",MISC:https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-03 | MISC:https://www.sourcecodester.com/php/14910/online-leave-management-system-php-free-source-code.html | URL:https://www.sourcecodester.com/php/14910/online-leave-management-system-php-free-source-code.html,Assigned (20210907),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-40596,Canddate,"SQL injection vulnerability in Login.php in sourcecodester Online Learning System v2 by oretnom23, allows attackers to execute arbitrary SQL commands via the faculty_id parameter.",MISC:https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-07,Assigned (20210907),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-40597,Candidate,The firmware of EDIMAX IC-3140W Version 3.11 is hardcoded with Administrator username and password.,MISC:https://drive.google.com/file/d/1DZCzVULjchY0rSJBXIPr0gJM1qWCcAZ5/view?usp=sharing | MISC:https://drive.google.com/file/d/1ZPFwAoO8tAD0zrWwVZ9W6-CUCrcM0Exm/view?usp=sharing | MISC:https://www.edimax.com/edimax/download/download/data/edimax/global/download/,Assigned (20210907),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-4058,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-40599,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 86 |
-
CVE@2#21-4060,?Candida?te@#,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211203),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-40600,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-4%60*,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-40602,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-40603,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-40604,Candidate,A Server-Side Request Forgery (SSRF) vulnerability in IPS Community Suite before 4.6.2 allows remote authenticated users to request arbitrary URLs or trigger deserialization via phar protocol when generating class names dynamically. In some cases an exploitation is possible by an unauthenticated user.,MISC:https://invisioncommunity.com/release-notes/462-r99/,Assigned (20210907),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-40605,Candi!!da*te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-40606,Candidat,The gf_bs_write_data function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.,MISC:https://github.com/gpac/gpac/issues/1885,Assigned (20210907),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-40607,Candidate,The schm_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.,MISC:https://github.com/gpac/gpac/issues/1879,Assigned (20210907),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-40608,Cand%|ate,The gf_hinter_track_finalize function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.,MISC:https://github.com/gpac/gpac/issues/1883,Assigned (20210907),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-40609,!C?|andidate,The GetHintFormat function in GPAC 1.0.1 allows attackers to cause a denial of service via a crafted file in the MP4Box command.,MISC:https://github.com/gpac/gpac/issues/1894,Assigned (20210907),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-4061,Candid$te,Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1271456 | URL:https://crbug.com/1271456,Assigned (20211203),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-40610,Canidate,Emlog Pro v 1.0.4 cross-site scripting (XSS) in Emlog Pro background management.,MISC:https://github.com/blackQvQ/emlog/issues/1,Assigned (20210907),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-40611,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 100 |
-
CVE-202140612,Candidate,"An issue was discovered in Opmantek Open-AudIT after 3.5.0. Without authentication, a vulnerability in code_igniter/application/controllers/util.php allows an attacker perform command execution without echoes.",MISC:https://community.opmantek.com/pages/viewpage.action?pageId=65504438 | MISC:https://github.com/Opmantek/open-audit/commit/c7595cbb092e410a487f03c0eb536cf19e538860,Assigned (20210907),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-40613,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 102 |
-
C!E-2!21-40614,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-40615,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-40616,Cadidate,thinkcmf v5.1.7 has an unauthorized vulnerability. The attacker can modify the password of the administrator account with id 1 through the background user management group permissions. The use condition is that the background user management group authority is required.,MISC:https://github.com/thinkcmf/thinkcmf/issues/722,Assigned (20210907),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-40617,Candidate,An SQL Injection vulnerability exists in openSIS Community Edition version 8.0 via ForgotPassUserName.php.,MISC:https://github.com/OS4ED/openSIS-Classic/issues/192,Assigned (20210907),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-40618,Candida@|,"An SQL Injection vulnerability exists in openSIS Classic 8.0 via the 1) ADDR_CONT_USRN, 2) ADDR_CONT_PSWD, 3) SECN_CONT_USRN or 4) SECN_CONT_PSWD parameters in HoldAddressFields.php.",MISC:https://github.com/OS4ED/openSIS-Classic/issues/193,Assigned (20210907),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-40619,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-4062,Candidae,Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1272403 | URL:https://crbug.com/1272403,Assigned (20211203),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-40620,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-4021,C|ndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 111 |
-
CVE?-20?21-40@622*,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 112 |
-
C@|VE-%202#1-40623,?C|an%d#idate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 113 |
-
CV*E-2$02%1-*40624,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-40625,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-40626,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 116 |
-
CVE-20#1-40627,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 117 |
-
CVE$?021-40628,#*Candi!d*ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 118 |
-
CVE-202140629,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 119 |
-
CV|E-20#@21-4063,Candidate,Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1273176 | URL:https://crbug.com/1273176,Assigned (20211203),None (candidate not yet proposed),
|
| 120 |
-
CVE-?021-4@630,Cand@ida?@te@,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-40631,Ca$didate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 122 |
-
CVE2021-40632,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 123 |
-
C%E|2021-40633,C?$an$#didate,A memory leak (out-of-memory) in gif2rgb in util/gif2rgb.c in giflib 5.1.4 allows remote attackers trigger an out of memory exception or denial of service via a gif format file.,MISC:https://sourceforge.net/p/giflib/bugs/157/,Assigned (20210907),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-40634,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1038.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-40635,Candidate,"OS4ED openSIS 8.0 is affected by SQL injection in ChooseCpSearch.php, ChooseRequestSearch.php. An attacker can inject a SQL query to extract information from the database.",MISC:https://github.com/OS4ED/openSIS-Classic/issues/195,Assigned (20210907),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-40636,Candidate,"OS4ED openSIS 8.0 is affected by SQL Injection in CheckDuplicateName.php, which can extract information from the database.",MISC:https://github.com/OS4ED/openSIS-Classic/issues/198,Assigned (20210907),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-40637,Candidate,OS4ED openSIS 8.0 is affected by cross-site scripting (XSS) in EmailCheckOthers.php. An attacker can inject JavaScript code to get the user's cookie and take over the working session of user.,MISC:https://github.com/OS4ED/openSIS-Classic/issues/199,Assigned (20210907),None (candidate not yet proposed),
|
| 5 |
-
CVE-2021-40638,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-40639,Candidate,Improper access control in Jfinal CMS 5.1.0 allows attackers to access sensitive information via /classes/conf/db.properties&config=filemanager.config.js.,MISC:http://jfinalcms.com | MISC:https://github.com/jflyfox/jfinal_cms | MISC:https://github.com/jflyfox/jfinal_cms/issues/27,Assigned (20210907),None (candidate not yet proposed),
|
| 7 |
-
CVE-2021-4064,Candidate,Use after free in screen capture in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1273197 | URL:https://crbug.com/1273197,Assigned (20211203),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-40640,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-40641,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-40642,Candidate,"Textpattern CMS v4.8.7 and older vulnerability exists through Sensitive Cookie in HTTPS Session Without 'Secure' Attribute via textpattern/lib/txplib_misc.php. The secure flag is not set for txp_login session cookie in the application. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site.",MISC:https://github.com/textpattern/textpattern/commit/211fab0093999f59b0b61682aa988ac7d8337aa9 | MISC:https://www.huntr.dev/bounties/aadbe434-a376-443b-876f-2a1cbab7847b/,Assigned (20210907),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-40643,Candidate,"EyesOfNetwork before 07-07-2021 has a Remote Code Execution vulnerability on the mail options configuration page. In the location of the ""sendmail"" application in the ""cacti"" configuration page (by default/usr/sbin/sendmail) it is possible to execute any command, which will be executed when we make a test of the configuration (""send test mail"").",MISC:https://eyesofnetwork.com | MISC:https://www.eyesofnetwork.com/en/news/vulnerabilite-cacti,Assigned (20210907),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-40644,Candidate,An SQL Injection vulnerability exists in oasys oa_system as of 9/7/2021 in resources/mappers/notice-mapper.xml.,MISC:https://gitee.com/aaluoxiang/oa_system | MISC:https://github.com/novysodope/VulReq/blob/main/oa_system,Assigned (20210907),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-40645,Candidate,An SQL Injection vulnerability exists in glorylion JFinalOA as of 9/7/2021 in the defkey parameter getHaveDoneTaskDataList method of the FlowTaskController.,MISC:https://gitee.com/glorylion/JFinalOA | MISC:https://github.com/novysodope/VulReq/blob/main/JFinalOA,Assigned (20210907),None (candidate not yet proposed),
|
| 14 |
-
CVE-2021-40646,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 15 |
-
CVE-2021-40647,Candidate,"In man2html 1.6g, a specific string being read in from a file will overwrite the size parameter in the top chunk of the heap. This at least causes the program to segmentation abort if the heap size parameter isn't aligned correctly. In version before GLIBC version 2.29 and aligned correctly, it allows arbitrary write anywhere in the programs memory.",MISC:https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933,Assigned (20210907),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-40648,Candidate,"In man2html 1.6g, a filename can be created to overwrite the previous size parameter of the next chunk and the fd, bk, fd_nextsize, bk_nextsize of the current chunk. The next chunk is then freed later on, causing a freeing of an arbitrary amount of memory.",MISC:https://gist.github.com/untaman/cb58123fe89fc65e3984165db5d40933,Assigned (20210907),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-40649,Candidate,"In Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the application and not have the HttpOnly flag set.",MISC:http://connx.com | MISC:https://github.com/l00neyhacker/CVE-2021-40649,Assigned (20210907),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-4065,Candidate,Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1273674 | URL:https://crbug.com/1273674,Assigned (20211203),None (candidate not yet proposed),
|
| 19 |
-
CVE-2021-40650,Candidate,"In Connx Version 6.2.0.1269 (20210623), a cookie can be issued by the application and not have the secure flag set.",MISC:http://connx.com | MISC:https://github.com/l00neyhacker/CVE-2021-40650,Assigned (20210907),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-40651,Candidate,"OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.",MISC:https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md | MISC:https://www.exploit-db.com/exploits/50259 | MISC:https://youtu.be/wFwlbXANRCo,Assigned (20210907),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-40652,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-40653,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-40654,Candidate,An information disclosure issue exist in D-LINK-DIR-615 B2 2.01mt. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page,MISC:https://github.com/Ilovewomen/D-LINK-DIR-615 | MISC:https://www.dlink.com/en/security-bulletin/,Assigned (20210907),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-40655,Candidate,An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page,MISC:https://github.com/Ilovewomen/D-LINK-DIR-605/ | MISC:https://www.dlink.com/en/security-bulletin/,Assigned (20210907),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-40656,Ca#didate,libsixel before 1.10 is vulnerable to Buffer Overflow in libsixel/src/quant.c:867.,MISC:https://github.com/libsixel/libsixel/issues/25,Assigned (20210907),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-40657,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 27 |
-
CVE-2021-40658,Candidate,Textpattern 4.8.7 is affected by a HTML injection vulnerability through “Content>Write>Body”.,MISC:https://tanmay26.medium.com/textpattern-4-8-7-is-affected-by-html-injection-in-the-body-parameter-1a7be2441b70,Assigned (20210907),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-40659,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 29 |
-
,Candidate,Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1274499 | URL:https://crbug.com/1274499,Assigned (20211203),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-40660,Candidate,An issue was discovered in Delight Nashorn Sandbox 0.2.0. There is an ReDoS vulnerability that can be exploited to launching a denial of service (DoS) attack.,MISC:https://github.com/javadelight/delight-nashorn-sandbox/issues/117,Assigned (20210907),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-40661,Candidate,"A remote, unauthenticated, directory traversal vulnerability was identified within the web interface used by IND780 Advanced Weighing Terminals Build 8.0.07 March 19, 2018 (SS Label 'IND780_8.0.07'), Version 7.2.10 June 18, 2012 (SS Label 'IND780_7.2.10'). It was possible to traverse the folders of the affected host by providing a traversal path to the 'webpage' parameter in AutoCE.ini This could allow a remote unauthenticated adversary to access additional files on the affected system. This could also allow the adversary to perform further enumeration against the affected host to identify the versions of the systems in use, in order to launch further attacks in future.",MISC:https://sidsecure.au/blog/cve-2021-40661/?_sm_pdc=1&_sm_rid=MRRqb4KBDnjBMJk24b40LMS3SKqPMqb4KVn32Kr | MISC:https://www.mt.com/au/en/home/products/Industrial_Weighing_Solutions/Terminals-and-Controllers/terminals-bench-floor-scales/advanced-bench-floor-applications/IND780/IND780_.html#overviewpm,Assigned (20210907),None (candidate not yet proposed),
|
| 32 |
-
CVE-2021-40662,Candidat,A Cross-Site Request Forgery (CSRF) in Chamilo LMS 1.11.14 allows attackers to execute arbitrary commands on victim hosts via user interaction with a crafted URL.,MISC:https://febin0x4e4a.wordpress.com/2022/03/22/cve-2021-40662-chamilo-lms-1-11-14-rce/ | MISC:https://febinj.medium.com/cve-2021-40662-chamilo-lms-1-11-14-rce-5301bad245d7 | MISC:https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-83-2021-08-11-High-impact-Moderate-risk-Cross-Site-Request-Forgery-CSRF-leading-to-Remote-Code-Execution,Assigned (20210907),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-40663,Candidate,deep.assign npm package 0.0.0-alpha.0 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').,CONFIRM:https://security.netapp.com/advisory/ntap-20220826-0002/ | MISC:https://github.com/janbialostok/deep-assign/issues/1 | MISC:https://www.npmjs.com/package/deep.assign,Assigned (20210907),None (candidate not yet proposed),
|
| 34 |
-
CVE-20?1-$0664,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-40665,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-40666,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-40667,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-40668,Candidate,"The Android application HTTP File Server (Version 1.4.1) by 'slowscript' is affected by a path traversal vulnerability that permits arbitrary directory listing, file read, and file write.",MISC:https://eddiez.me/path-traversal-in-slowscript-httpfileserver/ | MISC:https://play.google.com/store/apps/details?id=slowscript.httpfileserver,Assigned (20210907),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-40669,Canidate,SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords parameter under the coreframe/app/promote/admin/index.php file.,MISC:https://github.com/wuzhicms/wuzhicms/issues/196,Assigned (20210907),None (candidate not yet proposed),
|
| 40 |
-
CVE-2021-4067,Candidate,Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1274641 | URL:https://crbug.com/1274641,Assigned (20211203),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-40670,Candidate,SQL Injection vulnerability exists in Wuzhi CMS 4.1.0 via the keywords iparameter under the /coreframe/app/order/admin/card.php file.,MISC:https://github.com/wuzhicms/wuzhicms/issues/197,Assigned (20210907),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-40671,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 43 |
-
,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 44 |
-
,Ca$didate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-40674,Candidate,An SQL injection vulnerability exists in Wuzhi CMS v4.1.0 via the KeyValue parameter in coreframe/app/order/admin/index.php.,MISC:https://github.com/wuzhicms/wuzhicms/issues/198,Assigned (20210907),None (candidate not yet proposed),
|
| 46 |
-
CVE-2021-40675,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-40676,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-40677,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 49 |
-
CVE-2021-40678,Candidate,"In Piwigo 11.5.0, there exists a persistent cross-site scripting in the single mode function through /admin.php?page=batch_manager&mode=unit.",MISC:https://github.com/Piwigo/Piwigo/issues/1476,Assigned (20210907),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-40679,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-4068,Candidate,Insufficient data validation in new tab page in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.,DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | FEDORA:FEDORA-2021-6a292e2cf4 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1265197 | URL:https://crbug.com/1265197,Assigned (20211203),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-40680,Candidat,"There is a Directory Traversal vulnerability in Artica Proxy (4.30.000000 SP206 through SP255, and VMware appliance 4.30.000000 through SP273) via the filename parameter to /cgi-bin/main.cgi.",FULLDISC:20220422 CVE-2021-40680: Artica Proxy VMWare Appliance 4.30.000000 <=[SP273] Rev.1 | URL:http://seclists.org/fulldisclosure/2022/Apr/39,Assigned (20210907),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-40681,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-40682,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210907),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-40683,Candidate,"In Akamai EAA (Enterprise Application Access) Client before 2.3.1, 2.4.x before 2.4.1, and 2.5.x before 2.5.3, an unquoted path may allow an attacker to hijack the flow of execution.",CONFIRM:https://akamai.com/blog/news/eaa-client-escalation-of-privilege-vulnerability | MISC:https://www.akamai.com/products/enterprise-application-access,Assigned (20210907),None (candidate not yet proposed),
|
| 56 |
-
CVE-2021-40684,Candidate,"Talend ESB Runtime in all versions from 5.1 to 7.3.1-R2021-09, 7.2.1-R2021-09, 7.1.1-R2021-09, has an unauthenticated Jolokia HTTP endpoint which allows remote access to the JMX of the runtime container, which would allow an attacker the ability to read or modify the container or software running in the container.",MISC:https://help.talend.com/r/en-US/7.3/release-notes-esb-products | MISC:https://jira.talendforge.org/browse/SF-141,Assigned (20210907),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-40685,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-40686,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-40687,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-40688,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 61 |
-
CVE-2021-40689,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 62 |
-
CVE-2021-4069,Candidate,vim is vulnerable to Use After Free,CONFIRM:https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 | URL:https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 | FEDORA:FEDORA-2021-541ddd1f94 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ | FEDORA:FEDORA-2021-b0ac29efb1 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ | GENTOO:GLSA-202208-32 | URL:https://security.gentoo.org/glsa/202208-32 | MISC:https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 | URL:https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 | MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html | MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update | URL:https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html | MLIST:[oss-security] 20220114 Re: 3 new CVE's in vim | URL:http://www.openwall.com/lists/oss-security/2022/01/15/1,Assigned (20211205),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-40690,Candidate,"All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the ""secureValidation"" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.",DEBIAN:DSA-5010 | URL:https://www.debian.org/security/2021/dsa-5010 | MISC:https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E | URL:https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[cxf-issues] 20211027 [jira] [Created] (CXF-8613) High Security issues reported with Apache Santuario library bundled in CXF 3.4.4 | URL:https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E | MLIST:[debian-lts-announce] 20210927 [SECURITY] [DLA 2767-1] libxml-security-java security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html | MLIST:[poi-user] 20210923 Re: CVE-2021-40690 on xmlsec jar | URL:https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E | MLIST:[tomee-commits] 20210922 [tomee] 02/02: Update xmlsec to 2.2.3 to mitigate CVE-2021-40690 | URL:https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E | MLIST:[tomee-commits] 20210923 [jira] [Assigned] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability | URL:https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E | MLIST:[tomee-commits] 20210923 [jira] [Created] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability | URL:https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E | MLIST:[tomee-commits] 20210923 [jira] [Resolved] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability | URL:https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E | MLIST:[tomee-commits] 20210923 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability | URL:https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E | MLIST:[tomee-commits] 20211028 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability | URL:https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E,Assigned (20210908),None (candidate not yet proposed),
|
| 64 |
-
CVE-2021-40691,Candidate,A session hijack risk was identified in the Shibboleth authentication plugin.,MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2043411 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2043411,Assigned (20210908),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-40692,Candidate,Insufficient capability checks made it possible for teachers to download users outside of their courses.,MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2043414 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2043414,Assigned (20210908),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-40693,Candidate,"An authentication bypass risk was identified in the external database authentication functionality, due to a type juggling vulnerability.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2043417 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2043417,Assigned (20210908),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-40694,Candidate,Insufficient escaping of the LaTeX preamble made it possible for site administrators to read files available to the HTTP server system account.,MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2043421 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2043421,Assigned (20210908),None (candidate not yet proposed),
|
| 68 |
-
CVE-2021-40695,andidate,"It was possible for a student to view their quiz grade before it had been released, using a quiz web service.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2043424 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2043424,Assigned (20210908),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-40696,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210908),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-40697,Candidate,Adobe Framemaker versions 2019 Update 8 (and earlier) and 2020 Release Update 2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,MISC:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html | URL:https://helpx.adobe.com/security/products/framemaker/apsb21-74.html,Assigned (20210908),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-40698,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-40699,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-4070,Candidate,Off-by-one Error in GitHub repository v2fly/v2ray-core prior to 4.44.0.,CONFIRM:https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877 | URL:https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877 | MISC:https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c | URL:https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c,Assigned (20211205),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-40700,Candidate,"Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html,Assigned (20210908),None (candidate not yet proposed),
|
| 75 |
-
,Candidate,"Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html,Assigned (20210908),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-40702,Candidate,"Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious psd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html,Assigned (20210908),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-40703,,"Adobe Premiere Elements version 2021.2235820 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-78.html,Assigned (20210908),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-40704,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-40705,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-40706,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-40707,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-40708,Can%i%ate,Adobe Genuine Service versions 7.3 (and earlier) are affected by a privilege escalation vulnerability in the AGSService installer. An authenticated attacker could leverage this vulnerability to achieve read / write privileges to execute arbitrary code. User interaction is required to abuse this vulnerability.,MISC:https://helpx.adobe.com/security/products/integrity_service/apsb21-81.html | URL:https://helpx.adobe.com/security/products/integrity_service/apsb21-81.html,Assigned (20210908),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-40709,Candidate,Adobe Photoshop versions 21.2.11 (and earlier) and 22.5 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted SVG file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,MISC:https://helpx.adobe.com/security/products/photoshop/apsb21-84.html | URL:https://helpx.adobe.com/security/products/photoshop/apsb21-84.html,Assigned (20210908),None (candidate not yet proposed),
|
| 84 |
-
CVE-2021-4071,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211206),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-40710,Candidate,"Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .svg file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html | URL:https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html,Assigned (20210908),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-40711,Candidate,Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a stored XSS vulnerability when creating Content Fragments. An authenticated attacker can send a malformed POST request to achieve arbitrary code execution. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.,MISC:https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html | URL:https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html,Assigned (20210908),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-40712,Candidate,Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a improper input validation vulnerability via the path parameter. An authenticated attacker can send a malformed POST request to achieve server-side denial of service.,MISC:https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html | URL:https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html,Assigned (20210908),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-40713,Candidae,"Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a improper certificate validation vulnerability in the cold storage component. If an attacker can achieve a man in the middle when the cold server establishes a new certificate, they would be able to harvest sensitive information.",MISC:https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html | URL:https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html,Assigned (20210908),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-40714,,"Adobe Experience Manager version 6.5.9.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability via the accesskey parameter. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser",MISC:https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html | URL:https://helpx.adobe.com/security/products/experience-manager/apsb21-82.html,Assigned (20210908),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-40715,Candidate,"Adobe Premiere Pro version 15.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .exr file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html | URL:https://helpx.adobe.com/security/products/premiere_pro/apsb21-67.html,Assigned (20210908),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-40716,Candidate,XMP Toolkit SDK versions 2021.07 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,MISC:https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html | URL:https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html,Assigned (20210908),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-40717,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-40718,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-40719,Candidate,Adobe Connect version 11.2.3 (and earlier) is affected by a Deserialization of Untrusted Data vulnerability to achieve arbitrary method invocation when AMF messages are deserialized on an Adobe Connect server. An attacker can leverage this to execute remote code execution on the server.,MISC:https://helpx.adobe.com/security/products/connect/apsb21-91.html | URL:https://helpx.adobe.com/security/products/connect/apsb21-91.html,Assigned (20210908),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-4072,Candidate,elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955 | URL:https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955 | MISC:https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0 | URL:https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0,Assigned (20211206),None (candidate not yet proposed),
|
| 96 |
-
CVE-2021-40720,Candidate,Ops CLI version 2.0.4 (and earlier) is affected by a Deserialization of Untrusted Data vulnerability to achieve arbitrary code execution when the checkout_repo function is called on a maliciously crafted file. An attacker can leverage this to execute arbitrary code on the victim machine.,MISC:https://helpx.adobe.com/security/products/ops_cli/apsb21-88.html | URL:https://helpx.adobe.com/security/products/ops_cli/apsb21-88.html,Assigned (20210908),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-40721,Candidate,"Adobe Connect version 11.2.3 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.",MISC:https://helpx.adobe.com/security/products/connect/apsb21-91.html | URL:https://helpx.adobe.com/security/products/connect/apsb21-91.html,Assigned (20210908),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-40722,Candidate,"AEM Forms Cloud Service offering, as well as version 6.5.10.0 (and below) are affected by an XML External Entity (XXE) injection vulnerability that could be abused by an attacker to achieve RCE.",MISC:https://helpx.adobe.com/security/products/experience-manager/apsb21-103.html | URL:https://helpx.adobe.com/security/products/experience-manager/apsb21-103.html,Assigned (20210908),None (candidate not yet proposed),
|
| 99 |
-
CVE-2021-40723,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-40724,Candidate,Acrobat Reader for Android versions 21.8.0 (and earlier) are affected by a Path traversal vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,MISC:https://helpx.adobe.com/security/products/reader-mobile/apsb21-89.html | URL:https://helpx.adobe.com/security/products/reader-mobile/apsb21-89.html,Assigned (20210908),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-40725,Candidate,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForm listbox that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.",MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1250/ | MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210908),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-40726,,"Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability when processing AcroForm field that could result in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.",MISC:https://www.zerodayinitiative.com/advisories/ZDI-21-1249/ | MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-55.html,Assigned (20210908),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-40727,Candidate,Access of Memory Location After End of Buffer (CWE-788,MISC:https://helpx.adobe.com/security/products/indesign/apsb21-73.html | URL:https://helpx.adobe.com/security/products/indesign/apsb21-73.html,Assigned (20210908),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-40728,Candidate,"Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a use-after-free vulnerability in the processing of the GetURL function on a global object window that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-104.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-104.html,Assigned (20210908),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-40729,Candidate,"Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-104.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-104.html,Assigned (20210908),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-4073,Candidate,"The RegistrationMagic WordPress plugin made it possible for unauthenticated users to log in as any site user, including administrators, if they knew a valid username on the site due to missing identity validation in the social login function social_login_using_email() of the plugin. This affects versions equal to, and less than, 5.0.1.7.",MISC:https://plugins.trac.wordpress.org/changeset/2635173/custom-registration-form-builder-with-submission-manager/trunk/services/class_rm_user_services.php | URL:https://plugins.trac.wordpress.org/changeset/2635173/custom-registration-form-builder-with-submission-manager/trunk/services/class_rm_user_services.php | MISC:https://www.wordfence.com/blog/2021/12/authentication-bypass-vulnerability-patched-in-user-registration-plugin/ | URL:https://www.wordfence.com/blog/2021/12/authentication-bypass-vulnerability-patched-in-user-registration-plugin/ | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4073 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4073,Assigned (20211206),None (candidate not yet proposed),
|
| 107 |
-
CVE-2021-40730,Candidate,"Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a use-after-free that allow a remote attacker to disclose sensitive information on affected installations of of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG2000 images.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-104.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-104.html,Assigned (20210908),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-40731,Candidate,"Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by an out-of-bounds write vulnerability when parsing a crafted JPEG2000 file, which could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",MISC:https://helpx.adobe.com/security/products/acrobat/apsb21-104.html | URL:https://helpx.adobe.com/security/products/acrobat/apsb21-104.html,Assigned (20210908),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-40732,Candidate,XMP Toolkit version 2020.1 (and earlier) is affected by a null pointer dereference vulnerability that could result in leaking data from certain memory locations and causing a local denial of service in the context of the current user. User interaction is required to exploit this vulnerability in that the victim will need to open a specially crafted MXF file.,MISC:https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html | URL:https://helpx.adobe.com/security/products/xmpcore/apsb21-85.html,Assigned (20210908),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-40733,Candidate,"Adobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .psd file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/animate/apsb21-105.html | URL:https://helpx.adobe.com/security/products/animate/apsb21-105.html,Assigned (20210908),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-40734,,"Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/audition/apsb21-92.html | URL:https://helpx.adobe.com/security/products/audition/apsb21-92.html,Assigned (20210908),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-40735,Candidate,"Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/audition/apsb21-92.html | URL:https://helpx.adobe.com/security/products/audition/apsb21-92.html,Assigned (20210908),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-40736,Candidate,"Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/audition/apsb21-92.html | URL:https://helpx.adobe.com/security/products/audition/apsb21-92.html,Assigned (20210908),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-40737,Candidate,Adobe Audition version 14.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,MISC:https://helpx.adobe.com/security/products/audition/apsb21-92.html | URL:https://helpx.adobe.com/security/products/audition/apsb21-92.html,Assigned (20210908),None (candidate not yet proposed),
|
| 115 |
-
CVE-2021-40738,Candidate,"Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/audition/apsb21-92.html | URL:https://helpx.adobe.com/security/products/audition/apsb21-92.html,Assigned (20210908),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-40739,,"Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/audition/apsb21-92.html | URL:https://helpx.adobe.com/security/products/audition/apsb21-92.html,Assigned (20210908),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-4074,Candidate,"The WHMCS Bridge WordPress plugin is vulnerable to Stored Cross-Site Scripting via the cc_whmcs_bridge_url parameter found in the ~/whmcs-bridge/bridge_cp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 6.1. Due to missing authorization checks on the cc_whmcs_bridge_add_admin function, low-level authenticated users such as subscribers can exploit this vulnerability.",MISC:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2653041%40whmcs-bridge&new=2653041%40whmcs-bridge&sfp_email=&sfph_mail= | URL:https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2653041%40whmcs-bridge&new=2653041%40whmcs-bridge&sfp_email=&sfph_mail= | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4074 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4074,Assigned (20211206),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-40740,Candidate,"Adobe Audition version 14.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.",MISC:https://helpx.adobe.com/security/products/audition/apsb21-92.html | URL:https://helpx.adobe.com/security/products/audition/apsb21-92.html,Assigned (20210908),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-40741,Candidate,Adobe Audition version 14.4 (and earlier) is affected by an Access of Memory Location After End of Buffer vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,MISC:https://helpx.adobe.com/security/products/audition/apsb21-92.html | URL:https://helpx.adobe.com/security/products/audition/apsb21-92.html,Assigned (20210908),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-40742,Candidate,Adobe Audition version 14.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.,MISC:https://helpx.adobe.com/security/products/audition/apsb21-92.html | URL:https://helpx.adobe.com/security/products/audition/apsb21-92.html,Assigned (20210908),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-40743,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-40744,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-40745,Candidate,"Adobe Campaign version 21.2.1 (and earlier) is affected by a Path Traversal vulnerability that could lead to reading arbitrary server files. By leveraging an exposed XML file, an unauthenticated attacker can enumerate other files on the server.",MISC:https://helpx.adobe.com/security/products/campaign/apsb21-52.html | URL:https://helpx.adobe.com/security/products/campaign/apsb21-52.html,Assigned (20210908),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-40746,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210908),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1039.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table104.csv
DELETED
|
@@ -1,75 +0,0 @@
|
|
| 1 |
-
CWE-ID,Name,Weakness Abstraction,Status,Description,Extended Description,Related Weaknesses,Weakness Ordinalities,Applicable Platforms,Background Details,Alternate Terms,Modes Of Introduction,Exploitation Factors,Likelihood of Exploit,Common Consequences,Detection Methods,Potential Mitigations,Observed Examples,Functional Areas,Affected Resources,Taxonomy Mappings,Related Attack Patterns,Notes
|
| 2 |
-
567,Unsyn|chronized Access to Shared D#ata in a? Multithreade?d Context,Base,Draft,"The product does not properly synchronize shared data, such as static variables across threads, which can lead to undefined behavior and unpredictable data changes.","Within servlets, shared static variables are not protected from concurrent access, but servlets are multithreaded. This is a typical programming mistake in J2EE applications, since the multithreading is handled by the framework. When a shared variable can be influenced by an attacker, one thread could wind up modifying the variable to contain data that is not valid for a different thread that is also using the data within the variable. Note that this weakness is not unique to servlets.",::NATURE:ChildOf:CWE ID:820:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:662:VIEW ID:1305:ORDINAL:Primary::NATURE:ChildOf:CWE ID:662:VIEW ID:1340:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:488:VIEW ID:1000::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,"::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:IMPACT:Read Application Data:IMPACT:Modify Application Data:IMPACT:DoS: Instability:IMPACT:DoS: Crash, Exit, or Restart:NOTE:If the shared variable contains sensitive data, it may be manipulated or displayed in another user session. If this data is used to control the application, its value can be manipulated to cause the application to crash or perform poorly.::",,"::PHASE:Implementation:DESCRIPTION:Remove the use of static variables used between servlets. If this cannot be avoided, use synchronized access for these variables.::",,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:VNA00-J:ENTRY NAME:Ensure visibility when accessing shared primitive variables::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:VNA02-J:ENTRY NAME:Ensure that compound operations on shared variables are atomic::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP19:ENTRY NAME:Missing Lock::,::25::,
|
| 3 |
-
568,finalize() Method Without super.finalize(),Variant,Draft,The product contains a finalize() method that does not call super.finalize().,The Java Language Specification states that it is a good practice for a finalize() method to call super.finalize().,::NATURE:ChildOf:CWE ID:573:VIEW ID:1000::NATURE:ChildOf:CWE ID:459:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation::,,::PHASE:Implementation:DESCRIPTION:Call the super.finalize() method.::PHASE:Testing:DESCRIPTION:Use static analysis tools to spot such issues in your code.::,,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:MET12-J:ENTRY NAME:Do not use finalizers::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP28:ENTRY NAME:Unexpected access points::,,
|
| 4 |
-
570,Expression is Always alse,Base,Draft,The product contains an expression that will always evaluate to false.,,::NATURE:ChildOf:CWE ID:710:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:561:VIEW ID:1000::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation:IMPACT:Varies by Context::,,::PHASE:Testing:DESCRIPTION:Use Static Analysis tools to spot such conditions.::,,,,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:MSC00-C:ENTRY NAME:Compile cleanly at high warning levels::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in computation::,,
|
| 5 |
-
571,Expression is Always True,Base,Draft,The product contains an expression that will always evaluate to true.,,::NATURE:ChildOf:CWE ID:710:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:561:VIEW ID:1000::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation:IMPACT:Varies by Context::,,::PHASE:Testing:DESCRIPTION:Use Static Analysis tools to spot such conditions.::,,,,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:MSC00-C:ENTRY NAME:Compile cleanly at high warning levels::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in computation::,,
|
| 6 |
-
572,Call to Thread run() instead of start(),Variant,Draft,"The product calls a thread's run() method instead of calling start(), which causes the code to run in the thread of the caller instead of the callee.","In most cases a direct call to a Thread object's run() method is a bug. The programmer intended to begin a new thread of control, but accidentally called run() instead of start(), so the run() method will execute in the caller's thread of control.",::NATURE:ChildOf:CWE ID:821:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation:IMPACT:Varies by Context::,,::PHASE:Implementation:DESCRIPTION:Use the start() method instead of the run() method.::,,,::System Process::,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:THI00-J:ENTRY NAME:Do not invoke Thread.run()::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,,
|
| 7 |
-
573,,Class,Draft,"The product does not follow or incorrectly follows the specifications as required by the implementation language, environment, framework, protocol, or platform.","When leveraging external functionality, such as an API, it is important that the caller does so in accordance with the requirements of the external functionality or else unintended behaviors may result, possibly leaving the system vulnerable to any number of exploits.",::NATURE:ChildOf:CWE ID:710:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Primary::,,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation:IMPACT:Varies by Context::,,,"::REFERENCE:CVE-2006-7140:DESCRIPTION:Crypto implementation removes padding when it shouldn't, allowing forged signatures:LINK:https://www.cve.org/CVERecord?id=CVE-2006-7140::REFERENCE:CVE-2006-4339:DESCRIPTION:Crypto implementation removes padding when it shouldn't, allowing forged signatures:LINK:https://www.cve.org/CVERecord?id=CVE-2006-4339::",,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:MET10-J:ENTRY NAME:Follow the general contract when implementing the compareTo() method::,,
|
| 8 |
-
574,EJB Bad Practices: Use of Synchronization Primitives,Variant,Draft,The product violates the Enterprise JavaBeans (EJB) specification by using thread synchronization primitives.,"The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container. In this case, the product violates the following EJB guideline: An enterprise bean must not use thread synchronization primitives to synchronize execution of multiple instances. The specification justifies this requirement in the following way: This rule is required to ensure consistent runtime semantics because while some EJB containers may use a single JVM to execute all enterprise bean's instances, others may distribute the instances across multiple JVMs.",::NATURE:ChildOf:CWE ID:695:VIEW ID:1000::NATURE:ChildOf:CWE ID:821:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation::,,::PHASE:Implementation:DESCRIPTION:Do not use Synchronization Primitives when writing EJBs.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,,
|
| 9 |
-
575,EJB Bad Practices: Use of AWT Swing,Variant,Draft,The product violates the Enterprise JavaBeans (EJB) specification by using AWT/Swing.,"The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container. In this case, the product violates the following EJB guideline: An enterprise bean must not use the AWT functionality to attempt to output information to a display, or to input information from a keyboard. The specification justifies this requirement in the following way: Most servers do not allow direct interaction between an application program and a keyboard/display attached to the server system.",::NATURE:ChildOf:CWE ID:695:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation::,,::PHASE:Architecture and Design:DESCRIPTION:Do not use AWT/Swing when writing EJBs.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,,
|
| 10 |
-
576,EJB Bad Practices: Use of J#va I|O,Variant,Draft,The product violates the Enterprise JavaBeans (EJB) specification by using the java.io package.,"The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container. In this case, the product violates the following EJB guideline: An enterprise bean must not use the java.io package to attempt to access files and directories in the file system. The specification justifies this requirement in the following way: The file system APIs are not well-suited for business components to access data. Business components should use a resource manager API, such as JDBC, to store data.",::NATURE:ChildOf:CWE ID:695:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation::,,::PHASE:Implementation:DESCRIPTION:Do not use Java I/O when writing EJBs.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,,
|
| 11 |
-
577,EJB Bad Practices: Use of Sockets,Variant,Draft,The product violates the Enterprise JavaBeans (EJB) specification by using sockets.,"The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container. In this case, the product violates the following EJB guideline: An enterprise bean must not attempt to listen on a socket, accept connections on a socket, or use a socket for multicast. The specification justifies this requirement in the following way: The EJB architecture allows an enterprise bean instance to be a network socket client, but it does not allow it to be a network server. Allowing the instance to become a network server would conflict with the basic function of the enterprise bean-- to serve the EJB clients.",::NATURE:ChildOf:CWE ID:573:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation::,,::PHASE:Architecture and Design Implementation:DESCRIPTION:Do not use Sockets when writing EJBs.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,,
|
| 12 |
-
578,EJB Bad Practices: Use of Class Loader,Variant,Draft,The product violates the Enterprise JavaBeans (EJB) specification by using the class loader.,"The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container. In this case, the product violates the following EJB guideline: The enterprise bean must not attempt to create a class loader; obtain the current class loader; set the context class loader; set security manager; create a new security manager; stop the JVM; or change the input, output, and error streams. The specification justifies this requirement in the following way: These functions are reserved for the EJB container. Allowing the enterprise bean to use these functions could compromise security and decrease the container's ability to properly manage the runtime environment.",::NATURE:ChildOf:CWE ID:573:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:SCOPE:Other:IMPACT:Execute Unauthorized Code or Commands:IMPACT:Varies by Context::,,::PHASE:Architecture and Design Implementation:DESCRIPTION:Do not use the Class Loader when writing EJBs.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,,
|
| 13 |
-
579,J2EE Bad Practices: Non-serializable Object Stored in Session,Variant,Draft,"The product stores a non-serializable object as an HttpSession attribute, which can hurt reliability.","A J2EE application can make use of multiple JVMs in order to improve application reliability and performance. In order to make the multiple JVMs appear as a single application to the end user, the J2EE container can replicate an HttpSession object across multiple JVMs so that if one JVM becomes unavailable another can step in and take its place without disrupting the flow of the application. This is only possible if all session data is serializable, allowing the session to be duplicated between the JVMs.",::NATURE:ChildOf:CWE ID:573:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation:NOTE:REALIZATION: This weakness is caused during implementation of an architectural security tactic.::,,,::SCOPE:Other:IMPACT:Quality Degradation::,,"::PHASE:Implementation:DESCRIPTION:In order for session replication to work, the values the product stores as attributes in the session must implement the Serializable interface.::",,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in computation::,,
|
| 14 |
-
#8!,clone() Method Without super.clone(),Variant,Draft,The product contains a clone() method that does not call super.clone() to obtain the new object.,"All implementations of clone() should obtain the new object by calling super.clone(). If a class does not follow this convention, a subclass's clone() method will return an object of the wrong type.",::NATURE:ChildOf:CWE ID:664:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:573:VIEW ID:1000::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Integrity:SCOPE:Other:IMPACT:Unexpected State:IMPACT:Quality Degradation::,,"::PHASE:Implementation:DESCRIPTION:Call super.clone() within your clone() method, when obtaining a new object.::PHASE:Implementation:DESCRIPTION:In some cases, you can eliminate the clone method altogether and use copy constructors.::",,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP28:ENTRY NAME:Unexpected access points::,,
|
| 15 |
-
581,Object Model Violation: Just One of Equals and Hashcode Defined,Base,Draft,The product does not maintain equal hashcodes for equal objects.,"Java objects are expected to obey a number of invariants related to equality. One of these invariants is that equal objects must have equal hashcodes. In other words, if a.equals(b) == true then a.hashCode() == b.hashCode().",::NATURE:ChildOf:CWE ID:573:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:697:VIEW ID:1000::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,"::SCOPE:Integrity:SCOPE:Other:IMPACT:Other:NOTE:If this invariant is not upheld, it is likely to cause trouble if objects of this class are stored in a collection. If the objects of the class in question are used as a key in a Hashtable or if they are inserted into a Map or Set, it is critical that equal objects have equal hashcodes.::",,::PHASE:Implementation:DESCRIPTION:Both Equals() and Hashcode() should be defined.::,,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:MET09-J:ENTRY NAME:Classes that define an equals() method must also define a hashCode() method::,,
|
| 16 |
-
582,"Array Declared Public, Final, and Static",Variant,Draft,"The product declares an array public, final, and static, which is not sufficient to prevent the array's contents from being modified.","Because arrays are mutable objects, the final constraint requires that the array object itself be assigned only once, but makes no guarantees about the values of the array elements. Since the array is public, a malicious program can change the values stored in the array. As such, in most cases an array declared public, final and static is a bug.",::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Primary::,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,"::Mobile code, in this case a Java Applet, is code that is transmitted across a network and executed on a remote machine. Because mobile code developers have little if any control of the environment in which their code will execute, special security concerns become relevant. One of the biggest environmental threats results from the risk that the mobile code will run side-by-side with other, potentially malicious, mobile code. Because all of the popular web browsers execute code from multiple sources together in the same JVM, many of the security guidelines for mobile code are focused on preventing manipulation of your objects' state and behavior by adversaries who have access to the same virtual machine where your product is running.::",,::PHASE:Implementation::,,,::SCOPE:Integrity:IMPACT:Modify Application Data::,,::PHASE:Implementation:DESCRIPTION:In most situations the array should be made private.::,,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:OBJ10-J:ENTRY NAME:Do not use public static nonfinal variables::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP28:ENTRY NAME:Unexpected Access Points::,,
|
| 17 |
-
583,finalize() Method Declared Public,Variant,Incomplete,The product violates secure coding principles for mobile code by declaring a finalize() method public.,"A product should never call finalize explicitly, except to call super.finalize() inside an implementation of finalize(). In mobile code situations, the otherwise error prone practice of manual garbage collection can become a security threat if an attacker can maliciously invoke a finalize() method because it is declared with public access.",::NATURE:ChildOf:CWE ID:668:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:SCOPE:Availability:IMPACT:Alter Execution Logic:IMPACT:Execute Unauthorized Code or Commands:IMPACT:Modify Application Data::,,"::PHASE:Implementation:DESCRIPTION:If you are using finalize() as it was designed, there is no reason to declare finalize() with anything other than protected access.::",,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:MET12-J:ENTRY NAME:Do not use finalizers::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP28:ENTRY NAME:Unexpected access points::,,
|
| 18 |
-
,Return Inside Finally Block,Base,Draft,"The code has a return statement inside a finally block, which will cause any thrown exception in the try block to be discarded.",,::NATURE:ChildOf:CWE ID:705:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Alter Execution Logic::,,::PHASE:Implementation:DESCRIPTION:Do not use a return statement inside the finally block. The finally block should have cleanup code.::,,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:ERR04-J:ENTRY NAME:Do not complete abruptly from a finally block::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:ERR05-J:ENTRY NAME:Do not let checked exceptions escape from a finally block::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP6:ENTRY NAME:Incorrect Exception Behavior::,,
|
| 19 |
-
585,Empty Synchronized Block,Base,Draft,The product contains an empty synchronized block.,An empty synchronized block does not actually accomplish any synchronization and may indicate a troubled section of code. An empty synchronized block can occur because code no longer needed within the synchronized block is commented out without removing the synchronized block.,::NATURE:ChildOf:CWE ID:1071:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,"::SCOPE:Other:IMPACT:Other:NOTE:An empty synchronized block will wait until nobody else is using the synchronizer being specified. While this may be part of the desired behavior, because you haven't protected the subsequent code by placing it inside the synchronized block, nothing is stopping somebody else from modifying whatever it was you were waiting for while you run the subsequent code.::",,"::PHASE:Implementation:DESCRIPTION:When you come across an empty synchronized statement, or a synchronized statement in which the code has been commented out, try to determine what the original intentions were and whether or not the synchronized block is still necessary.::",,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP21:ENTRY NAME:Multiple locks/unlocks::,,
|
| 20 |
-
586,Explicit Call to Finalize(),Variant,Draft,The product makes an explicit call to the finalize() method from outside the finalizer.,"While the Java Language Specification allows an object's finalize() method to be called from outside the finalizer, doing so is usually a bad idea. For example, calling finalize() explicitly means that finalize() will be called more than once: the first time will be the explicit call and the last time will be the call that is made after the object is garbage collected.",::NATURE:ChildOf:CWE ID:1076:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Primary::,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Integrity:SCOPE:Other:IMPACT:Unexpected State:IMPACT:Quality Degradation::,,::PHASE:Implementation Testing:DESCRIPTION:Do not make explicit calls to finalize(). Use static analysis tools to spot such instances.::,,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:MET12-J:ENTRY NAME:Do not use finalizers::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,,
|
| 21 |
-
587,Assignment of a Fixed Address to a Pointer,Base,Draft,The product sets a pointer to a specific address other than NULL or 0.,"Using a fixed address is not portable, because that address will probably not be valid in all environments or platforms.",::NATURE:ChildOf:CWE ID:344:VIEW ID:1000::NATURE:ChildOf:CWE ID:758:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::,::LANGUAGE NAME:C:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C++:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:C#:LANGUAGE PREVALENCE:Undetermined::LANGUAGE CLASS:Assembly:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,"::SCOPE:Integrity:SCOPE:Confidentiality:SCOPE:Availability:IMPACT:Execute Unauthorized Code or Commands:NOTE:If one executes code at a known location, an attacker might be able to inject code there beforehand.::SCOPE:Availability:IMPACT:DoS: Crash, Exit, or Restart:IMPACT:Reduce Maintainability:IMPACT:Reduce Reliability:NOTE:If the code is ported to another platform or environment, the pointer is likely to be invalid and cause a crash.::SCOPE:Confidentiality:SCOPE:Integrity:IMPACT:Read Memory:IMPACT:Modify Memory:NOTE:The data at a known pointer location can be easily read or influenced by an attacker.::",,::PHASE:Implementation:DESCRIPTION:Never set a pointer to a fixed address.::,,,,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:INT36-C:ENTRY NAME:Converting a pointer to integer or integer to pointer:MAPPING FIT:Imprecise::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in computation::,,
|
| 22 |
-
588,Attempt to Access Child of a Non-structure Pointer,Variant,Incomplete,Casting a non-structure type to a structure type and accessing a field can lead to memory access errors or data corruption.,,::NATURE:ChildOf:CWE ID:704:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:758:VIEW ID:1000::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,"::SCOPE:Integrity:IMPACT:Modify Memory:NOTE:Adjacent variables in memory may be corrupted by assignments performed on fields after the cast.::SCOPE:Availability:IMPACT:DoS: Crash, Exit, or Restart:NOTE:Execution may end due to a memory access error.::",,::PHASE:Requirements:DESCRIPTION:The choice could be made to use a language that is not susceptible to these issues.::PHASE:Implementation:DESCRIPTION:Review of type casting operations can identify locations where incompatible types are cast.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP7:ENTRY NAME:Faulty Pointer Use::,,
|
| 23 |
-
589,Call to Non-ubiquitous API,Variant,Incomplete,The product uses an API function that does not exist on all versions of the target platform. This could cause portability problems or inconsistencies that allow denial of service or other consequences.,"Some functions that offer security features supported by the OS are not available on all versions of the OS in common use. Likewise, functions are often deprecated or made obsolete for security reasons and should not be used.",::NATURE:ChildOf:CWE ID:474:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::,,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Quality Degradation::,,::PHASE:Implementation:DESCRIPTION:Always test your code on any platform on which it is targeted to run on.::PHASE:Testing:DESCRIPTION:Test your code on the newest and oldest platform on which it is targeted to run on.::PHASE:Testing:DESCRIPTION:Develop a system to test for API functions that are not portable.::,,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:MET02-J:ENTRY NAME:Do not use deprecated or obsolete classes or methods::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:SER00-J:ENTRY NAME:Maintain serialization compatibility during class evolution::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP3:ENTRY NAME:Use of an improper API::,::96::,
|
| 24 |
-
59|%*0,Free of Memory not on the Heap,Variant,Incomplete,"The product calls free() on a pointer to memory that was not allocated using associated heap allocation functions such as malloc(), calloc(), or realloc().","When free() is called on an invalid pointer, the program's memory management data structures may become corrupted. This corruption can cause the program to crash or, in some circumstances, an attacker may be able to cause free() to operate on controllable memory locations to modify critical program variables or execute code.",::NATURE:ChildOf:CWE ID:762:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:123:VIEW ID:1000::,,,,,::PHASE:Implementation::,,,"::SCOPE:Integrity:SCOPE:Confidentiality:SCOPE:Availability:IMPACT:Execute Unauthorized Code or Commands:IMPACT:Modify Memory:NOTE:There is the potential for arbitrary code execution with privileges of the vulnerable program via a write, what where primitive. If pointers to memory which hold user information are freed, a malicious user will be able to write 4 bytes anywhere in memory.::",,"::PHASE:Implementation:DESCRIPTION:Only free pointers that you have called malloc on previously. This is the recommended solution. Keep track of which pointers point at the beginning of valid chunks and free them only once.::PHASE:Implementation:DESCRIPTION:Before freeing a pointer, the programmer should make sure that the pointer was previously allocated on the heap and that the memory belongs to the programmer. Freeing an unallocated pointer will cause undefined behavior in the program.::PHASE:Architecture and Design:STRATEGY:Libraries or Frameworks:DESCRIPTION:Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, glibc in Linux provides protection against free of invalid pointers.::PHASE:Architecture and Design:DESCRIPTION:Use a language that provides abstractions for memory allocation and deallocation.::PHASE:Testing:DESCRIPTION:Use a tool that dynamically detects memory management problems, such as valgrind.::",,,::Memory::,::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:MEM34-C:ENTRY NAME:Only free memory allocated dynamically:MAPPING FIT:Exact::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:WIN30-C:ENTRY NAME:Properly pair allocation and deallocation functions:MAPPING FIT:Imprecise::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP12:ENTRY NAME:Faulty Memory Release::,,"::TYPE:Other:NOTE:In C++, if the new operator was used to allocate the memory, it may be allocated with the malloc(), calloc() or realloc() family of functions in the implementation. Someone aware of this behavior might choose to map this problem to CWE-590 or to its parent, CWE-762, depending on their perspective.::"
|
| 25 |
-
591,Sensitive Data Storage in Improperly Locked Memory,Variant,Draft,"The product stores sensitive data in memory that is not locked, or that has been incorrectly locked, which might cause the memory to be written to swap files on disk by the virtual memory manager. This can make the data more accessible to external actors.","On Windows systems the VirtualLock function can lock a page of memory to ensure that it will remain present in memory and not be swapped to disk. However, on older versions of Windows, such as 95, 98, or Me, the VirtualLock() function is only a stub and provides no protection. On POSIX systems the mlock() call ensures that a page will stay resident in memory but does not guarantee that the page will not appear in the swap. Therefore, it is unsuitable for use as a protection mechanism for sensitive data. Some platforms, in particular Linux, do make the guarantee that the page will not be swapped, but this is non-standard and is not portable. Calls to mlock() also require supervisor privilege. Return values for both of these calls must be checked to ensure that the lock operation was actually successful.",::NATURE:ChildOf:CWE ID:413:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Implementation::,,,::SCOPE:Confidentiality:IMPACT:Read Application Data:IMPACT:Read Memory:NOTE:Sensitive data that is written to a swap file may be exposed.::,,::PHASE:Architecture and Design:DESCRIPTION:Identify data that needs to be protected from swapping and choose platform-appropriate protection mechanisms.::PHASE:Implementation:DESCRIPTION:Check return values to ensure locking operations are successful.::,,,::Memory::,::TAXONOMY NAME:OWASP Top Ten 2004:ENTRY ID:A8:ENTRY NAME:Insecure Storage:MAPPING FIT:CWE More Specific::TAXONOMY NAME:CERT C Secure Coding:ENTRY ID:MEM06-C:ENTRY NAME:Ensure that sensitive data is not written out to disk::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,,
|
| 26 |
-
93,,Variant,Draft,The product modifies the SSL context after connection creation has begun.,"If the program modifies the SSL_CTX object after creating SSL objects from it, there is the possibility that older SSL objects created from the original context could all be affected by that change.",::NATURE:ChildOf:CWE ID:666:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:1390:VIEW ID:1000::,,,,,::PHASE:Architecture and Design::PHASE:Implementation:NOTE:REALIZATION: This weakness is caused during implementation of an architectural security tactic.::,,,"::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism:NOTE:No authentication takes place in this process, bypassing an assumed protection of encryption.::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:The encrypted communication between a user and a trusted host may be subject to a sniffing attack.::",,"::PHASE:Architecture and Design:DESCRIPTION:Use a language or a library that provides a cryptography framework at a higher level of abstraction.::PHASE:Implementation:DESCRIPTION:Most SSL_CTX functions have SSL counterparts that act on SSL-type objects.::PHASE:Implementation:DESCRIPTION:Applications should set up an SSL_CTX completely, before creating SSL objects from it.::",,,,,::94::,
|
| 27 |
-
594,J2EE Framework: Saving Unerializable Objects to Disk,Variant,Incomplete,When the J2EE container attempts to write unserializable objects to disk there is no guarantee that the process will complete successfully.,"In heavy load conditions, most J2EE application frameworks flush objects to disk to manage memory requirements of incoming requests. For example, session scoped objects, and even application scoped objects, are written to disk when required. While these application frameworks do the real work of writing objects to disk, they do not enforce that those objects be serializable, thus leaving the web application vulnerable to crashes induced by serialization failure. An attacker may be able to mount a denial of service attack by sending enough requests to the server to force the web application to save objects to disk.",::NATURE:ChildOf:CWE ID:710:VIEW ID:1000:ORDINAL:Primary::,::ORDINALITY:Indirect::ORDINALITY:Primary::,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,"::SCOPE:Integrity:IMPACT:Modify Application Data:NOTE:Data represented by unserializable objects can be corrupted.::SCOPE:Availability:IMPACT:DoS: Crash, Exit, or Restart:NOTE:Non-serializability of objects can lead to system crash.::",,::PHASE:Architecture and Design Implementation:DESCRIPTION:All objects that become part of session and application scope must implement the java.io.Serializable interface to ensure serializability of containing objects.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in computation::,,
|
| 28 |
-
595,Comparison of Object References Instead of Object Contents,Variant,Incomplete,"The product compares object references instead of the contents of the objects themselves, preventing it from detecting equivalent objects.","For example, in Java, comparing objects using == usually produces deceptive results, since the == operator compares object references rather than values; often, this means that using == for strings is actually comparing the strings' references, not their values.",::NATURE:ChildOf:CWE ID:1025:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:JavaScript:LANGUAGE PREVALENCE:Undetermined::LANGUAGE NAME:PHP:LANGUAGE PREVALENCE:Undetermined::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Varies by Context:NOTE:This weakness can lead to erroneous results that can cause unexpected application behaviors.::,,"::PHASE:Implementation:DESCRIPTION:In Java, use the equals() method to compare objects instead of the == operator. If using ==, it is important for performance reasons that your objects are created by a static factory, not by a constructor.::",,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:EXP02-J:ENTRY NAME:Use the two-argument Arrays.equals() method to compare the contents of arrays::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:EXP02-J:ENTRY NAME:Use the two-argument Arrays.equals() method to compare the contents of arrays::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:EXP03-J:ENTRY NAME:Do not use the equality operators when comparing values of boxed primitives::,,
|
| 29 |
-
597,Use of Wrong Operator in String Comparison,Variant,Draft,"The product uses the wrong operator when comparing a string, such as using == when the .equals() method should be used instead.","In Java, using == or != to compare two strings for equality actually compares two objects for equality rather than their string values for equality. Chances are good that the two references will never be equal. While this weakness often only affects program correctness, if the equality is used for a security decision, the unintended comparison result could be leveraged to affect program security.",::NATURE:ChildOf:CWE ID:595:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:595:VIEW ID:1305:ORDINAL:Primary::NATURE:ChildOf:CWE ID:480:VIEW ID:1000::,,,,,::PHASE:Implementation::,,,::SCOPE:Other:IMPACT:Other::,,"::PHASE:Implementation:DESCRIPTION:Within Java, use .equals() to compare string values. Within JavaScript, use == to compare string values. Within PHP, use == to compare a numeric value to a string value. (PHP converts the string to a number.):EFFECTIVENESS:High::",,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:EXP03-J:ENTRY NAME:Do not use the equality operators when comparing values of boxed primitives::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:EXP03-J:ENTRY NAME:Do not use the equality operators when comparing values of boxed primitives::TAXONOMY NAME:SEI CERT Perl Coding Standard:ENTRY ID:EXP35-PL:ENTRY NAME:Use the correct operator type for comparing values:MAPPING FIT:CWE More Specific::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP1:ENTRY NAME:Glitch in computation::,,
|
| 30 |
-
598,,Variant,Draft,The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.,"The query string for the URL could be saved in the browser's history, passed through Referers to other web sites, stored in web logs, or otherwise recorded in other sources. If the query string contains sensitive information such as session identifiers, then attackers can use this information to launch further attacks.",::NATURE:ChildOf:CWE ID:201:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design::PHASE:Implementation::,,,"::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:At a minimum, attackers can garner information from query strings that can be utilized in escalating their method of attack, such as information about the internal workings of the application or database column names. Successful exploitation of query string parameter vulnerabilities could lead to an attacker impersonating a legitimate user, obtaining proprietary data, or simply executing actions not intended by the application developers.::",,"::PHASE:Implementation:DESCRIPTION:When sensitive information is sent, use the POST method (e.g. registration form).::",,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,,
|
| 31 |
-
599,Missing Validation of OpenSSL Certificate,Variant,Incomplete,The product uses OpenSSL and trusts or uses a certificate without using the SSL_get_verify_result() function to ensure that the certificate satisfies all necessary security requirements.,"This could allow an attacker to use an invalid certificate to claim to be a trusted host, use expired certificates, or conduct other attacks that could be detected if the certificate is properly validated.",::NATURE:ChildOf:CWE ID:295:VIEW ID:1000:ORDINAL:Primary::,,,,,::PHASE:Architecture and Design:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::PHASE:Implementation::,,,"::SCOPE:Confidentiality:IMPACT:Read Application Data:NOTE:The data read may not be properly secured, it might be viewed by an attacker.::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism:IMPACT:Gain Privileges or Assume Identity:NOTE:Trust afforded to the system in question may allow for spoofing or redirection attacks.::SCOPE:Access Control:IMPACT:Gain Privileges or Assume Identity:NOTE:If the certificate is not checked, it may be possible for a redirection or spoofing attack to allow a malicious host with a valid certificate to provide data under the guise of a trusted host. While the attacker in question may have a valid certificate, it may simply be a valid certificate for a different site. In order to ensure data integrity, we must check that the certificate is valid, and that it pertains to the site we wish to access.::",,::PHASE:Architecture and Design:DESCRIPTION:Ensure that proper authentication is included in the system design.::PHASE:Implementation:DESCRIPTION:Understand and properly implement all checks necessary to ensure the identity of entities involved in encrypted communications.::,,,,,,"::TYPE:Relationship:NOTE:CWE-295 and CWE-599 are very similar, although CWE-599 has a more narrow scope that is only applied to OpenSSL certificates. As a result, other children of CWE-295 can be regarded as children of CWE-599 as well. CWE's use of one-dimensional hierarchical relationships is not well-suited to handle different kinds of abstraction relationships based on concepts like types of resources (OpenSSL certificate as a child of any certificate) and types of behaviors (not validating expiration as a child of improper validation).::"
|
| 32 |
-
600,Uncaught Exception in Servlet ,Base,Draft,"The Servlet does not catch all exceptions, which may reveal sensitive debugging information.","When a Servlet throws an exception, the default error response the Servlet container sends back to the user typically includes debugging information. This information is of great value to an attacker. For example, a stack trace might show the attacker a malformed SQL query string, the type of database being used, and the version of the application container. This information enables the attacker to target known vulnerabilities in these components.",::NATURE:ChildOf:CWE ID:248:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:209:VIEW ID:1000::NATURE:PeerOf:CWE ID:390:VIEW ID:1000::,,,,::TERM:Missing Catch Block::,::PHASE:Implementation::,,,"::SCOPE:Confidentiality:SCOPE:Availability:IMPACT:Read Application Data:IMPACT:DoS: Crash, Exit, or Restart::",,::PHASE:Implementation:DESCRIPTION:Implement Exception blocks to handle all types of Exceptions.::,,,,::TAXONOMY NAME:The CERT Oracle Secure Coding Standard for Java (2011):ENTRY ID:ERR01-J:ENTRY NAME:Do not allow exceptions to expose sensitive information::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP4:ENTRY NAME:Unchecked Status Condition::,,"::TYPE:Maintenance:NOTE:The Missing Catch Block concept is probably broader than just Servlets, but the broader concept is not sufficiently covered in CWE.::"
|
| 33 |
-
601,URL Redirection to Untrusted Site (|?pen Redirect'),Base,Draft,"A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.","An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.",::NATURE:ChildOf:CWE ID:610:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:610:VIEW ID:1003:ORDINAL:Primary::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::TECHNOLOGY CLASS:Web Based:TECHNOLOGY PREVALENCE:Undetermined::,::Phishing is a general term for deceptive attempts to coerce private information from users that will be used for identity theft.::,::TERM:Open Redirect::TERM:Cross-site Redirect::TERM:Cross-domain Redirect::,::PHASE:Architecture and Design:NOTE:OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.::PHASE:Implementation::,,,"::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism:IMPACT:Gain Privileges or Assume Identity:NOTE:The user may be redirected to an untrusted page that contains malware which may then compromise the user's machine. This will expose the user to extensive risk and the user's interaction with the web server may also be compromised if the malware conducts keylogging or other attacks that steal credentials, personally identifiable information (PII), or other important data.::SCOPE:Access Control:SCOPE:Confidentiality:SCOPE:Other:IMPACT:Bypass Protection Mechanism:IMPACT:Gain Privileges or Assume Identity:IMPACT:Other:NOTE:The user may be subjected to phishing attacks by being redirected to an untrusted page. The phishing attack may point to an attacker controlled web page that appears to be a trusted web site. The phishers may then steal the user's credentials and then use these credentials to access the legitimate web site.::","::METHOD:Manual Static Analysis:DESCRIPTION:Since this weakness does not typically appear frequently within a single software package, manual white box techniques may be able to provide sufficient code coverage and reduction of false positives if all potentially-vulnerable operations can be assessed within limited time constraints.:EFFECTIVENESS:High::METHOD:Automated Dynamic Analysis:DESCRIPTION:Automated black box tools that supply URLs to every input may be able to spot Location header modifications, but test case coverage is a factor, and custom redirects may not be detected.::METHOD:Automated Static Analysis:DESCRIPTION:Automated static analysis tools may not be able to determine whether input influences the beginning of a URL, which is important for reducing false positives.::METHOD:Other:DESCRIPTION:Whether this issue poses a vulnerability will be subject to the intended behavior of the application. For example, a search engine might intentionally provide redirects to arbitrary URLs.::METHOD:Automated Static Analysis - Binary or Bytecode:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Bytecode Weakness Analysis - including disassembler + source code weakness analysis Binary Weakness Analysis - including disassembler + source code weakness analysis:EFFECTIVENESS:High::METHOD:Dynamic Analysis with Automated Results Interpretation:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Web Application Scanner Web Services Scanner Database Scanners:EFFECTIVENESS:High::METHOD:Dynamic Analysis with Manual Results Interpretation:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Fuzz Tester Framework-based Fuzzer:EFFECTIVENESS:High::METHOD:Manual Static Analysis - Source Code:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Manual Source Code Review (not inspections):EFFECTIVENESS:High::METHOD:Automated Static Analysis - Source Code:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Source code Weakness Analyzer Context-configured Source Code Weakness Analyzer:EFFECTIVENESS:High::METHOD:Architecture or Design Review:DESCRIPTION:According to SOAR, the following detection techniques may be useful: Highly cost effective: Formal Methods / Correct-By-Construction Cost effective for partial coverage: Inspection (IEEE 1028 standard) (can apply to requirements, design, source code, etc.):EFFECTIVENESS:High::","::PHASE:Implementation:STRATEGY:Input Validation:DESCRIPTION:Assume all input is malicious. Use an accept known good input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, boat may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as red or blue. Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright. Use a list of approved URLs or domains to be used for redirection.::PHASE:Architecture and Design:DESCRIPTION:Use an intermediate disclaimer page that provides the user with a clear warning that they are leaving the current site. Implement a long timeout before the redirect occurs, or force the user to click on the link. Be careful to avoid XSS problems (CWE-79) when generating the disclaimer page.::PHASE:Architecture and Design:STRATEGY:Enforcement by Conversion:DESCRIPTION:When the set of acceptable objects, such as filenames or URLs, is limited or known, create a mapping from a set of fixed input values (such as numeric IDs) to the actual filenames or URLs, and reject all other inputs. For example, ID 1 could map to /login.asp and ID 2 could map to http://www.example.com/. Features such as the ESAPI AccessReferenceMap [REF-45] provide this capability.::PHASE:Architecture and Design:DESCRIPTION:Ensure that no externally-supplied requests are honored by requiring that all redirect requests include a unique nonce generated by the application [REF-483]. Be sure that the nonce is not predictable (CWE-330).::PHASE:Architecture and Design Implementation:STRATEGY:Attack Surface Reduction:DESCRIPTION:Understand all the potential areas where untrusted inputs can enter your software: parameters or arguments, cookies, anything read from the network, environment variables, reverse DNS lookups, query results, request headers, URL components, e-mail, files, filenames, databases, and any external systems that provide data to the application. Remember that such inputs may be obtained indirectly through API calls. Many open redirect problems occur because the programmer assumed that certain inputs could not be modified, such as cookies and hidden form fields.::PHASE:Operation:STRATEGY:Firewall:DESCRIPTION:Use an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth.:EFFECTIVENESS:Moderate::",::REFERENCE:CVE-2005-4206:DESCRIPTION:URL parameter loads the URL into a frame and causes it to appear to be part of a valid page.:LINK:https://www.cve.org/CVERecord?id=CVE-2005-4206::REFERENCE:CVE-2008-2951:DESCRIPTION:An open redirect vulnerability in the search script in the software allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL as a parameter to the proper function.:LINK:https://www.cve.org/CVERecord?id=CVE-2008-2951::REFERENCE:CVE-2008-2052:DESCRIPTION:Open redirect vulnerability in the software allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the proper parameter.:LINK:https://www.cve.org/CVERecord?id=CVE-2008-2052::REFERENCE:CVE-2020-11053:DESCRIPTION:Chain: Go-based Oauth2 reverse proxy can send the authenticated user to another site at the end of the authentication flow. A redirect URL with HTML-encoded whitespace characters can bypass the validation (CWE-1289) to redirect to a malicious site (CWE-601):LINK:https://www.cve.org/CVERecord?id=CVE-2020-11053::,,,::TAXONOMY NAME:WASC:ENTRY ID:38:ENTRY NAME:URl Redirector Abuse::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP24:ENTRY NAME:Tainted input to command::,::178::,
|
| 34 |
-
602,Client-Side Enforcement of Server-Side Security,Class,Draft,The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.,"When the server relies on protection mechanisms placed on the client side, an attacker can modify the client-side behavior to bypass the protection mechanisms, resulting in potentially unexpected interactions between the client and server. The consequences will vary, depending on what the mechanisms are trying to protect.",::NATURE:ChildOf:CWE ID:693:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:471:VIEW ID:1000::NATURE:PeerOf:CWE ID:290:VIEW ID:1000::NATURE:PeerOf:CWE ID:300:VIEW ID:1000::,::ORDINALITY:Primary::,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::TECHNOLOGY CLASS:ICS/OT:TECHNOLOGY PREVALENCE:Undetermined::TECHNOLOGY CLASS:Mobile:TECHNOLOGY PREVALENCE:Undetermined::,,,"::PHASE:Architecture and Design:NOTE:COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.::PHASE:Architecture and Design:NOTE:Consider a product that consists of two or more processes or nodes that must interact closely, such as a client/server model. If the product uses protection schemes in the client in order to defend from attacks against the server, and the server does not use the same schemes, then an attacker could modify the client in a way that bypasses those schemes. This is a fundamental design flaw that is primary to many weaknesses.::",,,"::SCOPE:Access Control:SCOPE:Availability:IMPACT:Bypass Protection Mechanism:IMPACT:DoS: Crash, Exit, or Restart:NOTE:Client-side validation checks can be easily bypassed, allowing malformed or unexpected input to pass into the application, potentially as trusted data. This may lead to unexpected states, behaviors and possibly a resulting crash.::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism:IMPACT:Gain Privileges or Assume Identity:NOTE:Client-side checks for authentication can be easily bypassed, allowing clients to escalate their access levels and perform unintended actions.::",,"::PHASE:Architecture and Design:DESCRIPTION:For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server. Even though client-side checks provide minimal benefits with respect to server-side security, they are still useful. First, they can support intrusion detection. If the server receives input that should have been rejected by the client, then it may be an indication of an attack. Second, client-side error-checking can provide helpful feedback to the user about the expectations for valid input. Third, there may be a reduction in server-side processing time for accidental input errors, although this is typically a small savings.::PHASE:Architecture and Design:DESCRIPTION:If some degree of trust is required between the two entities, then use integrity checking and strong authentication to ensure that the inputs are coming from a trusted source. Design the product so that this trust is managed in a centralized fashion, especially if there are complex or numerous communication channels, in order to reduce the risks that the implementer will mistakenly omit a check in a single code path.::PHASE:Testing:DESCRIPTION:Use dynamic tools and techniques that interact with the software using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The software's operation may slow down, but it should not become unstable, crash, or generate incorrect results.::PHASE:Testing:DESCRIPTION:Use tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules.::","::REFERENCE:CVE-2022-33139:DESCRIPTION:SCADA system only uses client-side authentication, allowing adversaries to impersonate other users.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-33139::REFERENCE:CVE-2006-6994:DESCRIPTION:ASP program allows upload of .asp files by bypassing client-side checks.:LINK:https://www.cve.org/CVERecord?id=CVE-2006-6994::REFERENCE:CVE-2007-0163:DESCRIPTION:steganography products embed password information in the carrier file, which can be extracted from a modified client.:LINK:https://www.cve.org/CVERecord?id=CVE-2007-0163::REFERENCE:CVE-2007-0164:DESCRIPTION:steganography products embed password information in the carrier file, which can be extracted from a modified client.:LINK:https://www.cve.org/CVERecord?id=CVE-2007-0164::REFERENCE:CVE-2007-0100:DESCRIPTION:client allows server to modify client's configuration and overwrite arbitrary files.:LINK:https://www.cve.org/CVERecord?id=CVE-2007-0100::",,,::TAXONOMY NAME:OWASP Top Ten 2004:ENTRY ID:A1:ENTRY NAME:Unvalidated Input:MAPPING FIT:CWE More Specific::,::162::202::207::208::21::31::383::384::385::386::387::388::,
|
| 35 |
-
603,Use of Client-Side Authentication,Base,Draft,"A client/server product performs authentication within client code but not in server code, allowing server-side authentication to be bypassed via a modified client that omits the authentication check.",Client-side authentication is extremely weak and may be breached easily. Any attacker may read the source code and reverse-engineer the authentication mechanism to access parts of the application which would otherwise be protected.,::NATURE:ChildOf:CWE ID:1390:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:602:VIEW ID:1000::NATURE:PeerOf:CWE ID:300:VIEW ID:1000::NATURE:PeerOf:CWE ID:656:VIEW ID:1000::,,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::TECHNOLOGY CLASS:ICS/OT:TECHNOLOGY PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design:NOTE:COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.::PHASE:Implementation::,,,::SCOPE:Access Control:IMPACT:Bypass Protection Mechanism:IMPACT:Gain Privileges or Assume Identity::,,::PHASE:Architecture and Design:DESCRIPTION:Do not rely on client side data. Always perform server side authentication.::,"::REFERENCE:CVE-2022-33139:DESCRIPTION:SCADA system only uses client-side authentication, allowing adversaries to impersonate other users.:LINK:https://www.cve.org/CVERecord?id=CVE-2022-33139::REFERENCE:CVE-2006-0230:DESCRIPTION:Client-side check for a password allows access to a server using crafted XML requests from a modified client.:LINK:https://www.cve.org/CVERecord?id=CVE-2006-0230::",,,,,
|
| 36 |
-
60,Multiple Binds to the Same Port,Base,Draft,"When multiple sockets are allowed to bind to the same port, other services on that port may be stolen or spoofed.","On most systems, a combination of setting the SO_REUSEADDR socket option, and a call to bind() allows any process to bind to a port to which a previous process has bound with INADDR_ANY. This allows a user to bind to the specific address of a server bound to INADDR_ANY on an unprivileged port, and steal its UDP packets/TCP connection.",::NATURE:ChildOf:CWE ID:675:VIEW ID:1000:ORDINAL:Primary::NATURE:ChildOf:CWE ID:666:VIEW ID:1000::,::ORDINALITY:Primary::,::LANGUAGE CLASS:Not Language-Specific:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Architecture and Design::PHASE:Implementation::PHASE:Operation::,,,::SCOPE:Confidentiality:SCOPE:Integrity:IMPACT:Read Application Data:NOTE:Packets from a variety of network services may be stolen or the services spoofed.::,,::PHASE:Policy:DESCRIPTION:Restrict server socket address to known local addresses.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP32:ENTRY NAME:Multiple binds to the same port::,,
|
| 37 |
-
606,Unchecked Input for Loop Condition,Base,Draft,"The product does not properly check inputs that are used for loop conditions, potentially leading to a denial of service or other consequences because of excessive looping.",,::NATURE:ChildOf:CWE ID:1284:VIEW ID:1000:ORDINAL:Primary::NATURE:CanPrecede:CWE ID:834:VIEW ID:1000::,,,,,::PHASE:Implementation::,,,::SCOPE:Availability:IMPACT:DoS: Resource Consumption (CPU)::,,::PHASE:Implementation:DESCRIPTION:Do not use user-controlled data for loop conditions.::PHASE:Implementation:DESCRIPTION:Perform input validation.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP25:ENTRY NAME:Tainted input to variable::TAXONOMY NAME:OMG ASCSM:ENTRY ID:ASCSM-CWE-606::,,
|
| 38 |
-
607,Public Static Final Field References Mutable Object,Variant,Draft,"A public or protected static final field references a mutable object, which allows the object to be changed by malicious code, or accidentally from another package.",,::NATURE:ChildOf:CWE ID:471:VIEW ID:1000:ORDINAL:Primary::,,::LANGUAGE NAME:Java:LANGUAGE PREVALENCE:Undetermined::,,,::PHASE:Implementation::,,,::SCOPE:Integrity:IMPACT:Modify Application Data::,,::PHASE:Implementation:DESCRIPTION:Protect mutable objects by making them private. Restrict access to the getter and setter as well.::,,,,::TAXONOMY NAME:Software Fault Patterns:ENTRY ID:SFP23:ENTRY NAME:Exposed Data::,,
|
| 39 |
-
567,cinq cent soixante-sept ,,,year,,,,,,,,,,,,,,,,,,
|
| 40 |
-
568,cinq cent soixante-huit ,,,year,,,,,,,,,,,,,,,,,,
|
| 41 |
-
570,cinq cent soixante-dix ,,,year,,,,,,,,,,,,,,,,,,
|
| 42 |
-
571,cinq cent soixante et onze ,,,year,,,,,,,,,,,,,,,,,,
|
| 43 |
-
572,cinq cent soixante-douze ,,,year,,,,,,,,,,,,,,,,,,
|
| 44 |
-
573,cinq cent soixante-treize ,,,year,,,,,,,,,,,,,,,,,,
|
| 45 |
-
574,cinq cent soixante-quatorze ,,,year,,,,,,,,,,,,,,,,,,
|
| 46 |
-
575,cinq cent soixante-quinze ,,,year,,,,,,,,,,,,,,,,,,
|
| 47 |
-
576,cinq cent soixante-seize ,,,year,,,,,,,,,,,,,,,,,,
|
| 48 |
-
57,cinq cent soixante-dix-sept ,,,year,,,,,,,,,,,,,,,,,,
|
| 49 |
-
578,cinq cent soixante-dix-huit ,,,year,,,,,,,,,,,,,,,,,,
|
| 50 |
-
579,cinq cent soixante-dix-neuf ,,,year,,,,,,,,,,,,,,,,,,
|
| 51 |
-
580,cinq cent quatre-vigts ,,,year,,,,,,,,,,,,,,,,,,
|
| 52 |
-
581,quatre-vingt-un cent cinq,,,year,,,,,,,,,,,,,,,,,,
|
| 53 |
-
582,cinq cent quatre-vingt-deux ,,,year,,,,,,,,,,,,,,,,,,
|
| 54 |
-
583,cinq cent quatre-vingt-trois ,,,year,,,,,,,,,,,,,,,,,,
|
| 55 |
-
584,cinq cent quatre-vingt-quatre ,,,year,,,,,,,,,,,,,,,,,,
|
| 56 |
-
585,cinq cent quatre-vingt-cinq ,,,year,,,,,,,,,,,,,,,,,,
|
| 57 |
-
586,cinq cent quatre-vingt-six ,,,year,,,,,,,,,,,,,,,,,,
|
| 58 |
-
587, cinq cent quatre-vingt-sept ,,,year,,,,,,,,,,,,,,,,,,
|
| 59 |
-
588,cinq cent quatre-vingt-huit ,,,year,,,,,,,,,,,,,,,,,,
|
| 60 |
-
589,cinq cent quatre-vingt-neuf ,,,year,,,,,,,,,,,,,,,,,,
|
| 61 |
-
590,cinq cent quatre-vingt-dix ,,,year,,,,,,,,,,,,,,,,,,
|
| 62 |
-
591,cinq cent quatre-vingt-onze ,,,year,,,,,,,,,,,,,,,,,,
|
| 63 |
-
593,cinq cent quatre-vingt-treize ,,,year,,,,,,,,,,,,,,,,,,
|
| 64 |
-
594,cent cinq quatre-vingt-quatorze,,,year,,,,,,,,,,,,,,,,,,
|
| 65 |
-
595,cinq cent quatre-vingt-quinze ,,,year,,,,,,,,,,,,,,,,,,
|
| 66 |
-
597,cinq cent quatre-vingt-dix-sept ,,,year,,,,,,,,,,,,,,,,,,
|
| 67 |
-
598,cent cinq quatre-vingt-dix-huit,,,year,,,,,,,,,,,,,,,,,,
|
| 68 |
-
599,cinq cent quatre-vingt-dix-neuf ,,,year,,,,,,,,,,,,,,,,,,
|
| 69 |
-
600,six cents ,,,year,,,,,,,,,,,,,,,,,,
|
| 70 |
-
601,six cent un ,,,year,,,,,,,,,,,,,,,,,,
|
| 71 |
-
602,six cet deux ,,,year,,,,,,,,,,,,,,,,,,
|
| 72 |
-
603,six cent trois ,,,year,,,,,,,,,,,,,,,,,,
|
| 73 |
-
05,,,,year,,,,,,,,,,,,,,,,,,
|
| 74 |
-
606,six cent six ,,,year,,,,,,,,,,,,,,,,,,
|
| 75 |
-
607,,,,year,,,,,,,,,,,,,,,,,,
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1040.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
"Name","Status","Description","References","Phase","Votes","Comments"
|
| 2 |
-
CVE-2021-40747,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 3 |
-
CVE-2021-40748,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 4 |
-
CVE-2021-40749,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 5 |
-
CVE-2021-4075,Candidate,"snipe-it is vulnerable to Server-Side Request Forgery (SSRF)","CONFIRM:https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de | URL:https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de | MISC:https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e | URL:https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e",Assigned (20211206),"None (candidate not yet proposed)",""
|
| 6 |
-
CVE-2021-40750,Candidate,"Adobe Bridge version 11.1.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/bridge/apsb21-94.html | URL:https://helpx.adobe.com/security/products/bridge/apsb21-94.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 7 |
-
CVE-2021-40751,Candidate,"Adobe After Effects version 18.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 8 |
-
CVE-2021-40752,Candidate,"Adobe After Effects version 18.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 9 |
-
CVE-2021-40753,Candidate,"Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 10 |
-
CVE-2021-40754,Candidate,"Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 11 |
-
CVE-2021-40755,Candidate,"Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SGI file in the DoReadContinue function, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 12 |
-
CVE-2021-40756,Candidate,"Adobe After Effects version 18.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 13 |
-
CVE-2021-40757,Candidate,"Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 14 |
-
CVE-2021-40758,Candidate,"Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 15 |
-
CVE-2021-40759,Candidate,"Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 16 |
-
CVE-2021-4076,Candidate,"A flaw exists in tang, a network-based cryptographic binding server, which could result in leak of private keys.","MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2029814 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2029814 | MISC:https://github.com/latchset/tang/commit/e82459fda10f0630c3414ed2afbc6320bb9ea7c9 | URL:https://github.com/latchset/tang/commit/e82459fda10f0630c3414ed2afbc6320bb9ea7c9 | MISC:https://github.com/latchset/tang/pull/81 | URL:https://github.com/latchset/tang/pull/81",Assigned (20211207),"None (candidate not yet proposed)",""
|
| 17 |
-
CVE-2021-40760,Candidate,"Adobe After Effects version 18.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious .m4a file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 18 |
-
CVE-2021-40761,Candidate,"Adobe After Effects version 18.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html | URL:https://helpx.adobe.com/security/products/after_effects/apsb21-79.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 19 |
-
CVE-2021-40762,Candidate,"Adobe Character Animator version 4.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html | URL:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 20 |
-
CVE-2021-40763,Candidate,"Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a WAF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html | URL:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 21 |
-
CVE-2021-40764,Candidate,"Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html | URL:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 22 |
-
CVE-2021-40765,Candidate,"Adobe Character Animator version 4.4 (and earlier) is affected by a memory corruption vulnerability when parsing a M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html | URL:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 23 |
-
CVE-2021-40766,Candidate,"Adobe Character Animator version 4.4 (and earlier versions) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html | URL:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 24 |
-
CVE-2021-40767,Candidate,"Adobe Character Animator version 4.4 (and earlier) is affected by an Access of Memory Location After End of Buffer vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html | URL:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 25 |
-
CVE-2021-40768,Candidate,"Adobe Character Animator version 4.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html | URL:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 26 |
-
CVE-2021-40769,Candidate,"Adobe Character Animator version 4.4 (and earlier versions) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html | URL:https://helpx.adobe.com/security/products/character_animator/apsb21-95.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 27 |
-
CVE-2021-4077,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20211207),"None (candidate not yet proposed)",""
|
| 28 |
-
CVE-2021-40770,Candidate,"Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/prelude/apsb21-96.html | URL:https://helpx.adobe.com/security/products/prelude/apsb21-96.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 29 |
-
CVE-2021-40771,Candidate,"Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/prelude/apsb21-96.html | URL:https://helpx.adobe.com/security/products/prelude/apsb21-96.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 30 |
-
CVE-2021-40772,Candidate,"Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/prelude/apsb21-96.html | URL:https://helpx.adobe.com/security/products/prelude/apsb21-96.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 31 |
-
CVE-2021-40773,Candidate,"Adobe Prelude version 10.1 (and earlier) is affected by a null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/prelude/apsb21-96.html | URL:https://helpx.adobe.com/security/products/prelude/apsb21-96.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 32 |
-
CVE-2021-40774,Candidate,"Adobe Prelude version 10.1 (and earlier) is affected by a null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/prelude/apsb21-96.html | URL:https://helpx.adobe.com/security/products/prelude/apsb21-96.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 33 |
-
CVE-2021-40775,Candidate,"Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/prelude/apsb21-96.html | URL:https://helpx.adobe.com/security/products/prelude/apsb21-96.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 34 |
-
CVE-2021-40776,Candidate,"Adobe Lightroom Classic 10.3 (and earlier) are affected by a privilege escalation vulnerability in the Offline Lightroom Classic installer. An authenticated attacker could leverage this vulnerability to escalate privileges. User interaction is required before product installation to abuse this vulnerability.","MISC:https://helpx.adobe.com/security/products/lightroom/apsb21-97.html | URL:https://helpx.adobe.com/security/products/lightroom/apsb21-97.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 35 |
-
CVE-2021-40777,Candidate,"Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html | URL:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 36 |
-
CVE-2021-40778,Candidate,"Adobe Media Encoder 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html | URL:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 37 |
-
CVE-2021-40779,Candidate,"Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html | URL:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 38 |
-
CVE-2021-4078,Candidate,"Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.","DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1268738 | URL:https://crbug.com/1268738",Assigned (20211207),"None (candidate not yet proposed)",""
|
| 39 |
-
CVE-2021-40780,Candidate,"Adobe Media Encoder version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html | URL:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 40 |
-
CVE-2021-40781,Candidate,"Adobe Media Encoder 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html | URL:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 41 |
-
CVE-2021-40782,Candidate,"Adobe Media Encoder 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html | URL:https://helpx.adobe.com/security/products/media-encoder/apsb21-99.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 42 |
-
CVE-2021-40783,Candidate,"Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/premiere_rush/apsb21-101.html | URL:https://helpx.adobe.com/security/products/premiere_rush/apsb21-101.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 43 |
-
CVE-2021-40784,Candidate,"Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/premiere_rush/apsb21-101.html | URL:https://helpx.adobe.com/security/products/premiere_rush/apsb21-101.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 44 |
-
CVE-2021-40785,Candidate,"Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 45 |
-
CVE-2021-40786,Candidate,"Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 46 |
-
CVE-2021-40787,Candidate,"Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 47 |
-
CVE-2021-40788,Candidate,"Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 48 |
-
CVE-2021-40789,Candidate,"Adobe Premiere Elements 20210809.daily.2242976 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html | URL:https://helpx.adobe.com/security/products/premiere_elements/apsb21-106.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 49 |
-
CVE-2021-4079,Candidate,"Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets.","DEBIAN:DSA-5046 | URL:https://www.debian.org/security/2022/dsa-5046 | GENTOO:GLSA-202208-25 | URL:https://security.gentoo.org/glsa/202208-25 | MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html | MISC:https://crbug.com/1265806 | URL:https://crbug.com/1265806",Assigned (20211207),"None (candidate not yet proposed)",""
|
| 50 |
-
CVE-2021-40790,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 51 |
-
CVE-2021-40791,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 52 |
-
CVE-2021-40792,Candidate,"Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html | URL:https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 53 |
-
CVE-2021-40793,Candidate,"Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html | URL:https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 54 |
-
CVE-2021-40794,Candidate,"Adobe Premiere Pro version 15.4.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.","MISC:https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html | URL:https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 55 |
-
CVE-2021-40795,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 56 |
-
CVE-2021-40796,Candidate,"Adobe Premiere Pro 15.4.1 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.","MISC:https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html | URL:https://helpx.adobe.com/security/products/premiere_pro/apsb21-100.html",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 57 |
-
CVE-2021-40797,Candidate,"An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service.","CONFIRM:https://security.openstack.org/ossa/OSSA-2021-006.html | MISC:https://launchpad.net/bugs/1942179 | MLIST:[oss-security] 20210909 [OSSA-2021-006] Neutron: Routes middleware memory leak for nonexistent controllers (CVE-2021-40797) | URL:http://www.openwall.com/lists/oss-security/2021/09/09/2",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 58 |
-
CVE-2021-40798,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 59 |
-
CVE-2021-40799,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 60 |
-
CVE-2021-4080,Candidate,"crater is vulnerable to Unrestricted Upload of File with Dangerous Type","CONFIRM:https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db | URL:https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db | MISC:https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d | URL:https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d",Assigned (20211208),"None (candidate not yet proposed)",""
|
| 61 |
-
CVE-2021-40800,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 62 |
-
CVE-2021-40801,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 63 |
-
CVE-2021-40802,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 64 |
-
CVE-2021-40803,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 65 |
-
CVE-2021-40804,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 66 |
-
CVE-2021-40805,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 67 |
-
CVE-2021-40806,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 68 |
-
CVE-2021-40807,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 69 |
-
CVE-2021-40808,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 70 |
-
CVE-2021-40809,Candidate,"An issue was discovered in Jamf Pro before 10.32.0, aka PI-009921. An account can be granted incorrect privileges in response to authentication that uses specific sign-on workflows.","CONFIRM:https://docs.jamf.com/10.32.0/jamf-pro/release-notes/Resolved_Issues.html | MISC:https://blog.assetnote.io/2021/11/30/jamf-ssrf/ | MISC:https://www.jamf.com/resources/product-documentation/jamf-pro-release-notes/",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 71 |
-
CVE-2021-4081,Candidate,"pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3 | URL:https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3 | MISC:https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a | URL:https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a",Assigned (20211209),"None (candidate not yet proposed)",""
|
| 72 |
-
CVE-2021-40810,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 73 |
-
CVE-2021-40811,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 74 |
-
CVE-2021-40812,Candidate,"The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds read because of the lack of certain gdGetBuf and gdPutBuf return value checks.","MISC:https://github.com/libgd/libgd/commit/6f5136821be86e7068fcdf651ae9420b5d42e9a9 | MISC:https://github.com/libgd/libgd/issues/750#issuecomment-914872385",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 75 |
-
CVE-2021-40813,Candidate,"A cross-site scripting (XSS) vulnerability in the ""Zip content"" feature in Element-IT HTTP Commander 3.1.9 allows remote authenticated users to inject arbitrary web script or HTML via filenames.","MISC:https://www.element-it.com/products.aspx | MISC:https://www.exploit-db.com/exploits/50645",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 76 |
-
CVE-2021-40814,Candidate,"The Customer Photo Gallery addon before 2.9.4 for PrestaShop is vulnerable to SQL injection.","MISC:https://www.getastra.com/blog/911/plugin-exploit/prestashops-customer-photo-gallery-module-vulnerable-to-sql-injection-attacks/",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 77 |
-
CVE-2021-40815,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 78 |
-
CVE-2021-40816,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 79 |
-
CVE-2021-40817,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 80 |
-
CVE-2021-40818,Candidate,"scheme/webauthn.c in Glewlwyd SSO server through 2.5.3 has a buffer overflow during FIDO2 signature validation in webauthn registration.","MISC:https://bugs.debian.org/993867 | MISC:https://github.com/babelouest/glewlwyd/commit/0efd112bb62f566877750ad62ee828bff579b4e2",Assigned (20210908),"None (candidate not yet proposed)",""
|
| 81 |
-
CVE-2021-40819,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 82 |
-
CVE-2021-4082,Candidate,"pimcore is vulnerable to Cross-Site Request Forgery (CSRF)","CONFIRM:https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092 | URL:https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092 | MISC:https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28 | URL:https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28",Assigned (20211209),"None (candidate not yet proposed)",""
|
| 83 |
-
CVE-2021-40820,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 84 |
-
CVE-2021-40821,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 85 |
-
CVE-2021-40822,Candidate,"GeoServer through 2.18.5 and 2.19.x through 2.19.2 allows SSRF via the option for setting a proxy host.","CONFIRM:https://github.com/geoserver/geoserver/compare/2.19.2...2.19.3 | MISC:https://github.com/geoserver/geoserver/releases | MISC:https://osgeo-org.atlassian.net/browse/GEOS-10229 | MISC:https://osgeo-org.atlassian.net/browse/GEOS-10229?focusedCommentId=83508",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 86 |
-
CVE-2021-40823,Candidate,"A logic error in the room key sharing functionality of matrix-js-sdk (aka Matrix Javascript SDK) before 12.4.1 allows a malicious Matrix homeserver present in an encrypted room to steal room encryption keys (via crafted Matrix protocol messages) that were originally sent by affected Matrix clients participating in that room. This allows the homeserver to decrypt end-to-end encrypted messages sent by affected clients.","MISC:https://github.com/matrix-org/matrix-js-sdk/releases/tag/v12.4.1 | MISC:https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 87 |
-
CVE-2021-40824,Candidate,"A logic error in the room key sharing functionality of Element Android before 1.2.2 and matrix-android-sdk2 (aka Matrix SDK for Android) before 1.2.2 allows a malicious Matrix homeserver present in an encrypted room to steal room encryption keys (via crafted Matrix protocol messages) that were originally sent by affected Matrix clients participating in that room. This allows the attacker to decrypt end-to-end encrypted messages sent by affected clients.","MISC:https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.2.2 | MISC:https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 88 |
-
CVE-2021-40825,Candidate,"nLight ECLYPSE (nECY) system Controllers running software prior to 1.17.21245.754 contain a default key vulnerability. The nECY does not force a change to the key upon the initial configuration of an affected device. nECY system controllers utilize an encrypted channel to secure SensorViewTM configuration and monitoring software and nECY to nECY communications. Impacted devices are at risk of exploitation. A remote attacker with IP access to an impacted device could submit lighting control commands to the nECY by leveraging the default key. A successful attack may result in the attacker gaining the ability to modify lighting conditions or gain the ability to update the software on lighting devices. The impacted key is referred to as the SensorView Password in the nECY nLight Explorer Interface and the Gateway Password in the SensorView application. An attacker cannot authenticate to or modify the configuration or software of the nECY system controller.","MISC:https://insights.acuitybrands.com/psirt-blog-2369078/nlight-eclypse-default-key-vulnerabiliy | MISC:https://www.acuitybrands.com/products/detail/588952/nlight/necy-system-controller/nlight-eclypset-system-controller",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 89 |
-
CVE-2021-40826,Candidate,"Clementine Music Player through 1.3.1 is vulnerable to a User Mode Write Access Violation, affecting the MP3 file parsing functionality at clementine+0x3aa207. The vulnerability is triggered when the user opens a crafted MP3 file or loads a remote stream URL that is mishandled by Clementine. Attackers could exploit this issue to cause a crash (DoS) of the clementine.exe process or achieve arbitrary code execution in the context of the current logged-in Windows user.","MISC:https://voidsec.com/advisories/cve-2021-40826/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 90 |
-
CVE-2021-40827,Candidate,"Clementine Music Player through 1.3.1 (when a GLib 2.0.0 DLL is used) is vulnerable to a Read Access Violation on Block Data Move, affecting the MP3 file parsing functionality at memcpy+0x265. The vulnerability is triggered when the user opens a crafted MP3 file or loads a remote stream URL that is mishandled by Clementine. Attackers could exploit this issue to cause a crash (DoS) of the clementine.exe process or achieve arbitrary code execution in the context of the current logged-in Windows user.","MISC:https://voidsec.com/advisories/cve-2021-40827/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 91 |
-
CVE-2021-40828,Candidate,"Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows. This issue has been addressed in aws-c-io submodule versions 0.9.13 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.3.3 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.5.18 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Microsoft Windows.","MISC:https://github.com/aws/aws-iot-device-sdk-cpp-v2 | URL:https://github.com/aws/aws-iot-device-sdk-cpp-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-java-v2 | URL:https://github.com/aws/aws-iot-device-sdk-java-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-js-v2 | URL:https://github.com/aws/aws-iot-device-sdk-js-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-python-v2 | URL:https://github.com/aws/aws-iot-device-sdk-python-v2 | MISC:https://github.com/awslabs/aws-c-io/ | URL:https://github.com/awslabs/aws-c-io/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 92 |
-
CVE-2021-40829,Candidate,"Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS.","MISC:https://github.com/aws/aws-iot-device-sdk-cpp-v2 | URL:https://github.com/aws/aws-iot-device-sdk-cpp-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-java-v2 | URL:https://github.com/aws/aws-iot-device-sdk-java-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-js-v2 | URL:https://github.com/aws/aws-iot-device-sdk-js-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-python-v2 | URL:https://github.com/aws/aws-iot-device-sdk-python-v2 | MISC:https://github.com/awslabs/aws-c-io/ | URL:https://github.com/awslabs/aws-c-io/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 93 |
-
CVE-2021-4083,Candidate,"A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.","CONFIRM:https://security.netapp.com/advisory/ntap-20220217-0005/ | URL:https://security.netapp.com/advisory/ntap-20220217-0005/ | DEBIAN:DSA-5096 | URL:https://www.debian.org/security/2022/dsa-5096 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2029923 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2029923 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9 | URL:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9 | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html | MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update | URL:https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html",Assigned (20211209),"None (candidate not yet proposed)",""
|
| 94 |
-
CVE-2021-40830,Candidate,"The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to override the default trust store. This corrects this issue. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Linux/Unix. Amazon Web Services AWS-C-IO 0.10.4 on Linux/Unix.","MISC:https://github.com/aws/aws-iot-device-sdk-cpp-v2 | URL:https://github.com/aws/aws-iot-device-sdk-cpp-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-java-v2 | URL:https://github.com/aws/aws-iot-device-sdk-java-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-js-v2 | URL:https://github.com/aws/aws-iot-device-sdk-js-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-python-v2 | URL:https://github.com/aws/aws-iot-device-sdk-python-v2 | MISC:https://github.com/awslabs/aws-c-io/ | URL:https://github.com/awslabs/aws-c-io/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 95 |
-
CVE-2021-40831,Candidate,"The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to address this behavior. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.7.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.14.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.6.0 on macOS. Amazon Web Services AWS-C-IO 0.10.7 on macOS.","MISC:https://github.com/aws/aws-iot-device-sdk-cpp-v2 | URL:https://github.com/aws/aws-iot-device-sdk-cpp-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-java-v2 | URL:https://github.com/aws/aws-iot-device-sdk-java-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-js-v2 | URL:https://github.com/aws/aws-iot-device-sdk-js-v2 | MISC:https://github.com/aws/aws-iot-device-sdk-python-v2 | URL:https://github.com/aws/aws-iot-device-sdk-python-v2 | MISC:https://github.com/awslabs/aws-c-io/ | URL:https://github.com/awslabs/aws-c-io/",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 96 |
-
CVE-2021-40832,Candidate,"A Denial-of-Service (DoS) vulnerability was discovered in F-Secure Atlant whereby the AVRDL unpacking module component used in certain F-Secure products can crash while scanning a fuzzed files. The exploit can be triggered remotely by an attacker. A successful attack will result in Denial-of-Service (DoS) of the Anti-Virus engine.","MISC:https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | URL:https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | MISC:https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832 | URL:https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40832",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 97 |
-
CVE-2021-40833,Candidate,"A vulnerability affecting F-Secure antivirus engine was discovered whereby unpacking UPX file can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.","MISC:https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | URL:https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | MISC:https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833 | URL:https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40833",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 98 |
-
CVE-2021-40834,Candidate,"A user interface overlay vulnerability was discovered in F-secure SAFE Browser for Android. When user click on a specially crafted seemingly legitimate URL SAFE browser goes into full screen and hides the user interface. A remote attacker can leverage this to perform spoofing attack.","MISC:https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | URL:https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | MISC:https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40834 | URL:https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40834",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 99 |
-
CVE-2021-40835,Candidate,"An URL Address bar spoofing vulnerability was discovered in Safe Browser for iOS. When user clicks on a specially crafted a malicious URL, if user does not carefully pay attention to url, user may be tricked to think content may be coming from a valid domain, while it comes from another. This is performed by using a very long username part of the url so that user cannot see the domain name. A remote attacker can leverage this to perform url address bar spoofing attack. The fix is, browser no longer shows the user name part in address bar.","MISC:https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | URL:https://www.f-secure.com/en/business/programs/vulnerability-reward-program/hall-of-fame | MISC:https://www.f-secure.com/en/business/support-and-downloads/security-advisories | URL:https://www.f-secure.com/en/business/support-and-downloads/security-advisories",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 100 |
-
CVE-2021-40836,Candidate,"A vulnerability affecting F-Secure antivirus engine was discovered whereby scanning MS outlook .pst files can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.","MISC:https://www.f-secure.com/en/business/support-and-downloads/security-advisories | URL:https://www.f-secure.com/en/business/support-and-downloads/security-advisories",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 101 |
-
CVE-2021-40837,Candidate,"A vulnerability affecting F-Secure antivirus engine before Capricorn update 2022-02-01_01 was discovered whereby decompression of ACE file causes the scanner service to stop. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine.","MISC:https://www.f-secure.com/en/business/support-and-downloads/security-advisories/cve-2021-40837 | MISC:https://www.f-secure.com/en/business/support-and-downloads/security-advisories | URL:https://www.f-secure.com/en/business/support-and-downloads/security-advisories",Assigned (20210909),"None (candidate not yet proposed)",""
|
| 102 |
-
CVE-2021-40838,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 103 |
-
CVE-2021-40839,Candidate,"The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.","CONFIRM:https://security.netapp.com/advisory/ntap-20211008-0001/ | FEDORA:FEDORA-2022-02340931ec | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMVQRPDVSVZNGGX57CFKCYT3DEYO4QB6/ | FEDORA:FEDORA-2022-1033a2718b | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCLETLGVM5DBX6QNHQFW6TWGO5T3DENY/ | MISC:https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75 | MISC:https://github.com/aresch/rencode/pull/29 | MISC:https://pypi.org/project/rencode/#history | MISC:https://seclists.org/fulldisclosure/2021/Sep/16",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 104 |
-
CVE-2021-4084,Candidate,"pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CONFIRM:https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266 | URL:https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266 | MISC:https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065 | URL:https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065",Assigned (20211209),"None (candidate not yet proposed)",""
|
| 105 |
-
CVE-2021-40840,Candidate,"A Stored XSS issue exists in the admin/users user administration form in LiveConfig 2.12.2.","MISC:https://www.liveconfig.com/en/changelog/ | MISC:https://www.mgm-sp.com/en/liveconfig-2-12-2-vulnerabilities/",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 106 |
-
CVE-2021-40841,Candidate,"A Path Traversal vulnerability for a log file in LiveConfig 2.12.2 allows authenticated attackers to read files on the underlying server.","MISC:https://www.liveconfig.com/en/changelog/ | MISC:https://www.mgm-sp.com/en/liveconfig-2-12-2-vulnerabilities/",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 107 |
-
CVE-2021-40842,Candidate,"Proofpoint Insider Threat Management Server contains a SQL injection vulnerability in the Web Console. The vulnerability exists due to improper input validation on the database name parameter required in certain unauthenticated APIs. A malicious URL visited by anyone with network access to the server could be used to blindly execute arbitrary SQL statements on the backend database. Version 7.12.0 and all versions prior to 7.11.2 are affected.","MISC:https://www.proofpoint.com/us/security/security-advisories | MISC:https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2021-0008",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 108 |
-
CVE-2021-40843,Candidate,"Proofpoint Insider Threat Management Server contains an unsafe deserialization vulnerability in the Web Console. An attacker with write access to the local database could cause arbitrary code to execute with SYSTEM privileges on the underlying server when a Web Console user triggers retrieval of that data. When chained with a SQL injection vulnerability, the vulnerability could be exploited remotely if Web Console users click a series of maliciously crafted URLs. All versions prior to 7.11.2 are affected.","MISC:https://www.proofpoint.com/us/security/security-advisories | MISC:https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2021-0009",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 109 |
-
CVE-2021-40844,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 110 |
-
CVE-2021-40845,Candidate,"The web part of Zenitel AlphaCom XE Audio Server through 11.2.3.10, called AlphaWeb XE, does not restrict file upload in the Custom Scripts section at php/index.php. Neither the content nor extension of the uploaded files is checked, allowing execution of PHP code under the /cmd directory.","MISC:http://packetstormsecurity.com/files/164149/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html | MISC:http://packetstormsecurity.com/files/164160/Zenitel-AlphaCom-XE-Audio-Server-11.2.3.10-Shell-Upload.html | MISC:https://github.com/ricardojoserf/CVE-2021-40845 | MISC:https://ricardojoserf.github.io/CVE-2021-40845/",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 111 |
-
CVE-2021-40846,Candidate,"An issue was discovered in Rhinode Trading Paints through 2.0.36. TP Updater.exe uses cleartext HTTP to check, and request, updates. Thus, attackers can man-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.","MISC:https://axelp.io/YWDAC | MISC:https://www.tradingpaints.com/page/Privacy",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 112 |
-
CVE-2021-40847,Candidate,"The update process of the Circle Parental Control Service on various NETGEAR routers allows remote attackers to achieve remote code execution as root via a MitM attack. While the parental controls themselves are not enabled by default on the routers, the Circle update daemon, circled, is enabled by default. This daemon connects to Circle and NETGEAR to obtain version information and updates to the circled daemon and its filtering database. However, database updates from NETGEAR are unsigned and downloaded via cleartext HTTP. As such, an attacker with the ability to perform a MitM attack on the device can respond to circled update requests with a crafted, compressed database file, the extraction of which gives the attacker the ability to overwrite executable files with attacker-controlled code. This affects R6400v2 1.0.4.106, R6700 1.0.2.16, R6700v3 1.0.4.106, R6900 1.0.2.16, R6900P 1.3.2.134, R7000 1.0.11.123, R7000P 1.3.2.134, R7850 1.0.5.68, R7900 1.0.4.38, R8000 1.0.4.68, and RS400 1.5.0.68.","MISC:https://blog.grimm-co.com/2021/09/mama-always-told-me-not-to-trust.html | MISC:https://kb.netgear.com/000064039/Security-Advisory-for-Remote-Code-Execution-on-Some-Routers-PSV-2021-0204",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 113 |
-
CVE-2021-40848,Candidate,"In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, exported CSV files could contain characters that a spreadsheet program could interpret as a command, leading to execution of a malicious string locally on a device, aka CSV injection.","MISC:https://bugs.launchpad.net/mahara/+bug/1930471 | MISC:https://mahara.org/interaction/forum/topic.php?id=8950",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 114 |
-
CVE-2021-40849,Candidate,"In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, the account associated with a web services token is vulnerable to being exploited and logged into, resulting in information disclosure (at a minimum) and often escalation of privileges.","MISC:https://bugs.launchpad.net/mahara/+bug/1930469 | MISC:https://mahara.org/interaction/forum/topic.php?id=8949",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 115 |
-
CVE-2021-4085,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","",Assigned (20211209),"None (candidate not yet proposed)",""
|
| 116 |
-
CVE-2021-40850,Candidate,"TCMAN GIM is vulnerable to a SQL injection vulnerability inside several available webservice methods in /PC/WebService.asmx.","CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-sql-injection-vulnerability | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-sql-injection-vulnerability",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 117 |
-
CVE-2021-40851,Candidate,"TCMAN GIM is vulnerable to a lack of authorization in all available webservice methods listed in /PC/WebService.asmx. The exploitation of this vulnerability might allow a remote attacker to obtain information.","CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-sql-improper-authentication | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-sql-improper-authentication",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 118 |
-
CVE-2021-40852,Candidate,"TCMAN GIM is affected by an open redirect vulnerability. This vulnerability allows the redirection of user navigation to pages controlled by the attacker. The exploitation of this vulnerability might allow a remote attacker to obtain information.","CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-open-redirect-vulnerability | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-open-redirect-vulnerability",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 119 |
-
CVE-2021-40853,Candidate,"TCMAN GIM does not perform an authorization check when trying to access determined resources. A remote attacker could exploit this vulnerability to access URL that require privileges without having them. The exploitation of this vulnerability might allow a remote attacker to obtain sensible information.","CONFIRM:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-missing-authorization-vulnerability | URL:https://www.incibe-cert.es/en/early-warning/security-advisories/tcman-gim-missing-authorization-vulnerability",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 120 |
-
CVE-2021-40854,Candidate,"AnyDesk before 6.2.6 and 6.3.x before 6.3.3 allows a local user to obtain administrator privileges by using the Open Chat Log feature to launch a privileged Notepad process that can launch other applications.","MISC:https://anydesk.com/cve/2021-40854/",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 121 |
-
CVE-2021-40855,Candidate,"The EU Technical Specifications for Digital COVID Certificates before 1.1 mishandle certificate governance. A non-production public key certificate could have been used in production.","MISC:https://github.com/eu-digital-green-certificates/dgc-overview/security/advisories/GHSA-xcvc-p4fw-qmcj | MISC:https://www.consilium.europa.eu/en/policies/coronavirus/eu-digital-covid-certificate/",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 122 |
-
CVE-2021-40856,Candidate,"Auerswald COMfortel 1400 IP and 2600 IP before 2.8G devices allow Authentication Bypass via the /about/../ substring.","MISC:http://packetstormsecurity.com/files/165162/Auerswald-COMfortel-1400-2600-3600-IP-2.8F-Authentication-Bypass.html | MISC:https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses | MISC:https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/-auerswald-comfortel-1400-2600-3600-ip-authentication-bypass",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 123 |
-
CVE-2021-40857,Candidate,"Auerswald COMpact 5500R devices before 8.2B allow Privilege Escalation via the passwd=1 substring.","MISC:http://packetstormsecurity.com/files/165163/Auerswald-COMpact-8.0B-Privilege-Escalation.html | MISC:https://www.redteam-pentesting.de/advisories/rt-sa-2021-005 | MISC:https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses",Assigned (20210910),"None (candidate not yet proposed)",""
|
| 124 |
-
CVE-2021-40858,Candidate,"Auerswald COMpact 5500R devices before 8.2B allow Arbitrary File Disclosure. A sub-admin can read the cleartext Admin password via the fileName=../../etc/passwd substring.","MISC:http://packetstormsecurity.com/files/165166/Auerswald-COMpact-8.0B-Arbitrary-File-Disclosure.html | MISC:https://www.redteam-pentesting.de/advisories/rt-sa-2021-006 | MISC:https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses",Assigned (20210910),"None (candidate not yet proposed)",""
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1041.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CVE-2021-4859,Candi%ate,"Backdoors were discovered in Auerswald COMpact 5500R 7.8A and 8.0B devices, that allow attackers with access to the web based management application full administrative access to the device.",MISC:https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses | MISC:https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-007/-auerswald-compact-multiple-backdoors,Assigned (20210910),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-4086,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211209),None (candidate not yet proposed),
|
| 4 |
-
CVE-201-40860,Candidate,"A SQL Injection in the custom filter query component in Genesys intelligent Workload Distribution (IWD) before 9.0.013.11 allows an attacker to execute arbitrary SQL queries via the ql_expression parameter, with which all data in the database can be extracted and OS command execution is possible depending on the permissions and/or database engine.",MISC:https://docs.genesys.com/Documentation/IWD | MISC:https://www.offensity.com/en/blog/authenticated-sql-injection-in-the-genesys-iwd-manager-cve-2021-40860-and-cve-2021-40861/,Assigned (20210910),None (candidate not yet proposed),
|
| 5 |
-
CV!E@-2#|021-40861,Candidate,"A SQL Injection in the custom filter query component in Genesys intelligent Workload Distribution (IWD) 9.0.017.07 allows an attacker to execute arbitrary SQL queries via the value attribute, with which all data in the database can be extracted and OS command execution is possible depending on the permissions and/or database engine.",MISC:https://docs.genesys.com/Documentation/IWD | MISC:https://www.offensity.com/en/blog/authenticated-sql-injection-in-the-genesys-iwd-manager-cve-2021-40860-and-cve-2021-40861/,Assigned (20210910),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-40862,C#an|*didate!,"HashiCorp Terraform Enterprise up to v202108-1 contained an API endpoint that erroneously disclosed a sensitive URL to authenticated parties, which could be used for privilege escalation or unauthorized modification of a Terraform configuration. Fixed in v202109-1.",MISC:https://discuss.hashicorp.com/t/hcsec-2021-25-terraform-enterprise-configuration-versions-api-discloses-sensitive-url/29508,Assigned (20210910),None (candidate not yet proposed),
|
| 7 |
-
CVE-221-40863,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210910),None (candidate not yet proposed),
|
| 8 |
-
CVE-2021-40864,Cand*date,The Translate plugin 6.1.x through 6.3.x before 6.3.0.72 for ONLYOFFICE Document Server lacks escape calls for the msg.data and text fields.,MISC:https://github.com/ONLYOFFICE/plugin-translator/commit/2206c0179cb97e3b8b290a0ab5719b1f0f54542b | MISC:https://github.com/ONLYOFFICE/plugin-translator/compare/v6.3.0.71...v6.3.0.72,Assigned (20210910),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-0865,andidate,An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4,MISC:https://lists.apache.org/thread.html/r8d45e74299897b6734dd0f788c46a631009ce2eeb731523386f7a253%40%3Cuser.storm.apache.org%3E | URL:https://lists.apache.org/thread.html/r8d45e74299897b6734dd0f788c46a631009ce2eeb731523386f7a253%40%3Cuser.storm.apache.org%3E | MISC:https://seclists.org/oss-sec/2021/q4/45 | URL:https://seclists.org/oss-sec/2021/q4/45,Assigned (20210912),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-40866,Candidate,"Certain NETGEAR smart switches are affected by a remote admin password change by an unauthenticated attacker via the (disabled by default) /sqfs/bin/sccd daemon, which fails to check authentication when the authentication TLV is missing from a received NSDP packet. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.",MISC:https://gynvael.coldwind.pl/?id=740 | MISC:https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145,Assigned (20210913),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-40867,Candidate,"Certain NETGEAR smart switches are affected by an authentication hijacking race-condition vulnerability by an unauthenticated attacker who uses the same source IP address as an admin in the process of logging in (e.g., behind the same NAT device, or already in possession of a foothold on an admin's machine). This occurs because the multi-step HTTP authentication process is effectively tied only to the source IP address. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.",MISC:https://gynvael.coldwind.pl/?id=741 | MISC:https://kb.netgear.com/000063978/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Smart-Switches-PSV-2021-0140-PSV-2021-0144-PSV-2021-0145,Assigned (20210913),None (candidate not yet proposed),
|
| 12 |
-
CVE-202-40868,Candidae,"In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS.",MISC:http://packetstormsecurity.com/files/164255/Cloudron-6.2-Cross-Site-Scripting.html | MISC:https://packetstormsecurity.com/files/164183/Cloudron-6.2-Cross-Site-Scripting.html | MISC:https://www.cloudron.io/,Assigned (20210913),None (candidate not yet proposed),
|
| 13 |
-
CVE-2021-4086%,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 14 |
-
CVE-021-4087,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211209),None (candidate not yet proposed),
|
| 15 |
-
CVE-202-40870,Candidate,"An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.",MISC:http://packetstormsecurity.com/files/164461/Aviatrix-Controller-6.x-Path-Traversal-Code-Execution.html | MISC:https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html#security-note-9-11-2021 | MISC:https://wearetradecraft.com/advisories/tc-2021-0002/,Assigned (20210913),None (candidate not yet proposed),
|
| 16 |
-
CVE-2021-40871,Canidate,"An issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66. Remote attackers to cause a denial of service (DoS) by sending crafted messages to a OPC/UA client. The client process may crash unexpectedly because of a wrong type cast, and must be restarted.",MISC:https://industrial.softing.com/ | MISC:https://industrial.softing.com/fileadmin/sof-files/pdf/ia/support/Security_Bulletin-CVE-2021-40871.pdf,Assigned (20210913),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-40872,andidate,"An issue was discovered in Softing Industrial Automation uaToolkit Embedded before 1.40. Remote attackers to cause a denial of service (DoS) or login as an anonymous user (bypassing security checks) by sending crafted messages to a OPC/UA server. The server process may crash unexpectedly because of an invalid type cast, and must be restarted.",MISC:https://industrial.softing.com/ | MISC:https://industrial.softing.com/fileadmin/sof-files/pdf/ia/support/Security_Bulletin_CVE-2021-40872.pdf,Assigned (20210913),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-?08?3,?Ca*ndidat?e,"An issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66, and uaToolkit Embedded before 1.40. Remote attackers to cause a denial of service (DoS) by sending crafted messages to a client or server. The server process may crash unexpectedly because of a double free, and must be restarted.",MISC:https://industrial.softing.com/ | MISC:https://industrial.softing.com/fileadmin/sof-files/pdf/ia/support/Security_Bulletin_CVE-2021-40873.pdf,Assigned (20210913),None (candidate not yet proposed),
|
| 19 |
-
C#V%E-2021-$4087%4,C|a#ndidate|,"An issue was discovered in LemonLDAP::NG (aka lemonldap-ng) 2.0.13. When using the RESTServer plug-in to operate a REST password validation service (for another LemonLDAP::NG instance, for example) and using the Kerberos authentication method combined with another method with the Combination authentication plug-in, any password will be recognized as valid for an existing user.",MISC:https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2612,Assigned (20210913),None (candidate not yet proposed),
|
| 20 |
-
CVE-221-40875,Candidate,"Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.",MISC:http://packetstormsecurity.com/files/164270/Gurock-Testrail-7.2.0.3014-Improper-Access-Control.html | MISC:https://github.com/SakuraSamuraii/derailed | MISC:https://johnjhacking.com/blog/cve-2021-40875/ | MISC:https://www.gurock.com/testrail/tour/enterprise-edition,Assigned (20210913),None (candidate not yet proposed),
|
| 21 |
-
CVE-221-40876,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-40877,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-40878,Canidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-40879,?Cand*i#dat!e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 25 |
-
CVE#-202|1-40?8#8,C?an|#dida@te,"SQL injection vulnerability in Data Loss Protection (DLP) ePO extension 11.8.x prior to 11.8.100, 11.7.x prior to 11.7.101, and 11.6.401 allows a remote authenticated attacker to inject unfiltered SQL into the DLP part of the ePO database. This could lead to remote code execution on the ePO server with privilege escalation.",CONFIRM:https://kc.mcafee.com/corporate/index?page=content&id=SB10376 | URL:https://kc.mcafee.com/corporate/index?page=content&id=SB10376,Assigned (20211209),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-40880,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 27 |
-
CV*-2021-4088%,Candidae,An issue in the BAT file parameters of PublicCMS v4.0 allows attackers to execute arbitrary code.,MISC:https://github.com/sanluan/PublicCMS/issues/57,Assigned (20210913),None (candidate not yet proposed),
|
| 28 |
-
CVE-2021-40882,Canidate,A Cross Site Scripting (XSS) vulnerability exists in Piwigo 11.5.0 via the system album name and description of the location.,MISC:https://github.com/Piwigo/Piwigo/issues/1477,Assigned (20210913),None (candidate not yet proposed),
|
| 29 |
-
CVE-2021-40883,Candidate,A Remote Code Execution (RCE) vulnerability exists in emlog 5.3.1 via content/plugins.,MISC:https://github.com/emlog/emlog/issues/108,Assigned (20210913),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-40884,Ca@didat?,"Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of users in application.",MISC:https://github.com/projectsend/projectsend/issues/992,Assigned (20210913),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-40885,Candid!te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 32 |
-
CVE$-2*|0*21-40886,Candi?|dat#e,Projectsend version r1295 is affected by a directory traversal vulnerability. A user with Uploader role can add value `2` for `chunks` parameter to bypass `fileName` sanitization.,MISC:https://github.com/projectsend/projectsend/issues/993,Assigned (20210913),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-40887,Candidate,"Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder.",MISC:https://github.com/projectsend/projectsend/issues/994,Assigned (20210913),None (candidate not yet proposed),
|
| 34 |
-
C*VE-$2021-4!0888,Candidate,Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code.,MISC:https://github.com/projectsend/projectsend/issues/995 | MISC:https://github.com/projectsend/projectsend/releases/tag/r1295,Assigned (20210913),None (candidate not yet proposed),
|
| 35 |
-
CV#E$-|20*21-40889,Candi$da|te|,CMSUno version 1.7.2 is affected by a PHP code execution vulnerability. sauvePass action in {webroot}/uno/central.php file calls to file_put_contents() function to write username in password.php file when a user successfully changed their password. The attacker can inject malicious PHP code into password.php and then use the login function to execute code.,MISC:https://github.com/boiteasite/cmsuno/issues/19,Assigned (20210913),None (candidate not yet proposed),
|
| 36 |
-
CVE-2021-4089,Candidate,snipe-it is vulnerable to Improper Access Control,CONFIRM:https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862 | URL:https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862 | MISC:https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24 | URL:https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24,Assigned (20211209),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-40890,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-40891,Candi#dat$|e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-40892,C#ndida!e,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in validate-color v2.1.0 when handling crafted invalid rgb(a) strings.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/validate-color.js,Assigned (20210913),None (candidate not yet proposed),
|
| 40 |
-
CV-2021-40893,Candidate,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in validate-data v0.1.1 when validating crafted invalid emails.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/validate-data.js,Assigned (20210913),None (candidate not yet proposed),
|
| 41 |
-
CVE-202140894,Candidte,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in underscore-99xp v1.7.2 when the deepValueSearch function is called.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/underscore-99xp.mjs,Assigned (20210913),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-40895,Candidate,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in todo-regex v0.1.1 when matching crafted invalid TODO statements.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/todo-regex.js,Assigned (20210913),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-408@6,Canddate,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in that-value v0.1.3 when validating crafted invalid emails.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/that-value.js,Assigned (20210913),None (candidate not yet proposed),
|
| 44 |
-
CVE-2021-40897,Candidate,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in split-html-to-chars v1.0.5 when splitting crafted invalid htmls.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/split-html-to-chars.js,Assigned (20210913),None (candidate not yet proposed),
|
| 45 |
-
%VE-2021-408$8,Candidate,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in scaffold-helper v1.2.0 when copying crafted invalid files.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/scaffold-helper.js,Assigned (20210913),None (candidate not yet proposed),
|
| 46 |
-
CVE-221-40899,Candida?|,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in repo-git-downloader v0.1.1 when downloading crafted invalid git repositories.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/repo-git-downloader.js,Assigned (20210913),None (candidate not yet proposed),
|
| 47 |
-
CVE-2021-40*?,Can|idat#,"An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat.",CONFIRM:https://security.netapp.com/advisory/ntap-20220318-0010/ | URL:https://security.netapp.com/advisory/ntap-20220318-0010/ | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2025101 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2025101 | MISC:https://lore.kernel.org/linux-nfs/163692036074.16710.5678362976688977923.stgit@klimt.1015granger.net/ | URL:https://lore.kernel.org/linux-nfs/163692036074.16710.5678362976688977923.stgit@klimt.1015granger.net/,Assigned (20211210),None (candidate not yet proposed),
|
| 48 |
-
CVE-2021-40900,@andid|te,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in regexfn v1.0.5 when validating crafted invalid emails.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/regexfn.js,Assigned (20210913),None (candidate not yet proposed),
|
| 49 |
-
CE-2021-40901,Candidate,A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in scniro-validator v1.0.1 when validating crafted invalid emails.,MISC:https://github.com/yetingli/SaveResults/blob/main/js/scniro-validator.js,Assigned (20210913),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-40902,Canidate,"flatCore-CMS version 2.0.8 is affected by Cross Site Scripting (XSS) in the ""Create New Page"" option through the index page.",MISC:https://github.com/flatCore/flatCore-CMS/issues/57,Assigned (20210913),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-40903,Candidate,"A vulnerability in Antminer Monitor 0.50.0 exists because of backdoor or misconfiguration inside a settings file in flask server. Settings file has a predefined secret string, which would be randomly generated, however it is static.",MISC:https://github.com/anselal/antminer-monitor | MISC:https://packetstormsecurity.com/files/164048/Antminer-Monitor-0.5.0-Authentication-Bypass.html | MISC:https://www.exploit-db.com/exploits/50267,Assigned (20210913),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-40904,Candidate,"The web management console of CheckMK Raw Edition (versions 1.5.0 to 1.6.0) allows a misconfiguration of the web-app Dokuwiki (installed by default), which allows embedded php code. As a result, remote code execution is achieved. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session by a user with the role of administrator.",MISC:http://checkmk.com | MISC:https://github.com/Edgarloyola/CVE-2021-40904,Assigned (20210913),None (candidate not yet proposed),
|
| 53 |
-
CVE-#*$2@021-40905,#Ca|ndida*$te,"** DISPUTED ** The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of "".mkp"" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner.",MISC:http://checkmk.com | MISC:https://github.com/Edgarloyola/CVE-2021-40905,Assigned (20210913),None (candidate not yet proposed),
|
| 54 |
-
CVE-2021-40906,Ca%??ndidate,CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication.,MISC:http://checkmk.com | MISC:https://github.com/Edgarloyola/CVE-2021-40906,Assigned (20210913),None (candidate not yet proposed),
|
| 55 |
-
CVE-2021-40907,Candidate,"SQL injection vulnerability in Sourcecodester Storage Unit Rental Management System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter to /storage/classes/Login.php.",MISC:https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-08-09072021,Assigned (20210913),None (candidate not yet proposed),
|
| 56 |
-
CVE-021-40908,!andidat|,"SQL injection vulnerability in Login.php in Sourcecodester Purchase Order Management System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username parameter.",MISC:https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-09,Assigned (20210913),None (candidate not yet proposed),
|
| 57 |
-
CVE-2021-0909,Candidate,"Cross site scripting (XSS) vulnerability in sourcecodester PHP CRUD without Refresh/Reload using Ajax and DataTables Tutorial v1 by oretnom23, allows remote attackers to execute arbitrary code via the first_name, last_name, and email parameters to /ajax_crud.",MISC:https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/oretnom23/CVE-nu11-10-09102021,Assigned (20210913),None (candidate not yet proposed),
|
| 58 |
-
CVE-20|1-4091,Candidate,"A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An attacker could send a series of search requests, forcing the server to behave unexpectedly, and crash.",MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2030307 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2030307,Assigned (20211210),None (candidate not yet proposed),
|
| 59 |
-
CVE-2*0|2!1-40910,Candidate,There is a reflective cross-site scripting (XSS) vulnerability in the PHPCMS V9.6.3 management side.,MISC:https://gitee.com/phpcms/phpcms/issues/I493K8,Assigned (20210913),None (candidate not yet proposed),
|
| 60 |
-
CVE-2021-40911,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 61 |
-
CVE-201-40912,Ca?ndid%%at%e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 62 |
-
CVE-201-40913,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-40914,Cand$date,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 64 |
-
CVE-201-40915,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-40916,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 66 |
-
CVE-202?-40917,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-4918,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 68 |
-
CVE!-2%|021-40919,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-4092,Candidate,yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF),CONFIRM:https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e | URL:https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e | MISC:https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23 | URL:https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23,Assigned (20211210),None (candidate not yet proposed),
|
| 70 |
-
CE-2021-40920,Candidat!,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 71 |
-
CVE-2021-40921,Candidate,Cross-site scripting (XSS) vulnerability in _contactform.inc.php in Detector 0.8.5 and below version allows remote attackers to inject arbitrary web script or HTML via the cid parameter.,MISC:https://github.com/dmolsen/Detector/issues/35,Assigned (20210913),None (candidate not yet proposed),
|
| 72 |
-
CVE-2021-40922,C#an!dida@t*e,Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the last_name parameter.,MISC:https://github.com/pixeline/bugs | MISC:https://github.com/pixeline/bugs/issues/552,Assigned (20210913),None (candidate not yet proposed),
|
| 73 |
-
CVE-2021-40923,Candidat,Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the email parameter.,MISC:https://github.com/pixeline/bugs | MISC:https://github.com/pixeline/bugs/issues/552,Assigned (20210913),None (candidate not yet proposed),
|
| 74 |
-
CVE-221-40924,Canddate,Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the first_name parameter.,MISC:https://github.com/pixeline/bugs | MISC:https://github.com/pixeline/bugs/issues/552,Assigned (20210913),None (candidate not yet proposed),
|
| 75 |
-
CVE-20$1-4092*,@Cand#i?d*ate,"Cross-site scripting (XSS) vulnerability in dompdf/dompdf/www/demo.php infaveo-helpdesk v1.11.0 and below allow remote attackers to inject arbitrary web script or HTML via the $_SERVER[""PHP_SELF""] parameter.",MISC:https://github.com/ladybirdweb/faveo-helpdesk | MISC:https://github.com/ladybirdweb/faveo-helpdesk/issues/5423,Assigned (20210913),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-40926,Candidate,Cross-site scripting (XSS) vulnerability in demos/demo.mysqli.php in getID3 1.X and v2.0.0-beta allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter.,MISC:https://github.com/JamesHeinrich/getID3 | MISC:https://github.com/JamesHeinrich/getID3/issues/341,Assigned (20210913),None (candidate not yet proposed),
|
| 77 |
-
CVE-201-40927,Candidate,Cross-site scripting (XSS) vulnerability in callback.php in Spotify-for-Alfred 0.13.9 and below allows remote attackers to inject arbitrary web script or HTML via the error parameter.,MISC:https://github.com/citelao/Spotify-for-Alfred | MISC:https://github.com/citelao/Spotify-for-Alfred/issues/137,Assigned (20210913),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-40928,Ca!#nd|ida|te,Cross-site scripting (XSS) vulnerability in index.php in FlexTV beta development version allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF parameter.,MISC:https://github.com/d8ahazard/FlexTV | MISC:https://github.com/d8ahazard/FlexTV/issues/37,Assigned (20210913),None (candidate not yet proposed),
|
| 79 |
-
CVE-2021-40929,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 80 |
-
CVE-2#21-4093,Candidate,"A flaw was found in the KVM's AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",MISC:https://bugs.chromium.org/p/project-zero/issues/detail?id=2222 | URL:https://bugs.chromium.org/p/project-zero/issues/detail?id=2222 | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2028584 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2028584,Assigned (20211210),None (candidate not yet proposed),
|
| 81 |
-
CVE-2021-40930,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 82 |
-
?C%@VE-20|21-40931,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-40932,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 84 |
-
CVE-20|1-4#933,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-40934,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 86 |
-
CVE-202-40935,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 87 |
-
CVE-2021-40936,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 88 |
-
CVE-%*21-40937,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-40938,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-40939,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 91 |
-
CVE-2021-4094,Ca%didate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20211210),None (candidate not yet proposed),
|
| 92 |
-
CVE-2?21-409@0,C#and?ida$te,"Monstra 3.0.4 does not filter the case of php, which leads to an unrestricted file upload vulnerability.",MISC:https://github.com/monstra-cms/monstra/issues/471,Assigned (20210913),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-40941,C|and|ida*te,"In Bento4 1.6.0-638, there is an allocator is out of memory in the function AP4_Array<AP4_TrunAtom::Entry>::EnsureCapacity in Ap4Array.h:172, as demonstrated by GPAC. This can cause a denial of service (DOS).",MISC:https://github.com/axiomatic-systems/Bento4/issues/644,Assigned (20210913),None (candidate not yet proposed),
|
| 94 |
-
CVE-2021-40942,|#C|andidate?,"In GPAC MP4Box v1.1.0, there is a heap-buffer-overflow in the function filter_parse_dyn_args function in filter_core/filter.c:1454, as demonstrated by GPAC. This can cause a denial of service (DOS).",MISC:https://github.com/gpac/gpac/issues/1908,Assigned (20210913),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-40943,Candidate,"In Bento4 1.6.0-638, there is a null pointer reference in the function AP4_DescriptorListInspector::Action function in Ap4Descriptor.h:124 , as demonstrated by GPAC. This can cause a denial of service (DOS).",MISC:https://github.com/axiomatic-systems/Bento4/issues/643,Assigned (20210913),None (candidate not yet proposed),
|
| 96 |
-
CV-2021-40944,Candidate,"In GPAC MP4Box 1.1.0, there is a Null pointer reference in the function gf_filter_pid_get_packet function in src/filter_core/filter_pid.c:5394, as demonstrated by GPAC. This can cause a denial of service (DOS).",MISC:https://github.com/gpac/gpac/issues/1906,Assigned (20210913),None (candidate not yet proposed),
|
| 97 |
-
C*@VE$-2021-409%45,Can#$did$ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 98 |
-
CVE-2021-40946,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 99 |
-
C$E-20|1-40947,Can%id?te,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-4094,Candi|ate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-40949,andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-4095,Canidate,A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1.,FEDORA:FEDORA-2022-0816754490 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QIOQN7JJNN6ABIDGRSTVZA65MHRLMH2Q/ | FEDORA:FEDORA-2022-8efcea6e67 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT6573CGKVK3DU2632VVO5BVM4IU7SBV/ | MISC:https://bugzilla.redhat.com/show_bug.cgi?id=2031194 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=2031194 | MLIST:[oss-security] 20220117 Re: CVE-2021-4095: kernel: KVM: NULL pointer dereference in kvm_dirty_ring_get() in virt/kvm/dirty_ring.c | URL:http://www.openwall.com/lists/oss-security/2022/01/17/1,Assigned (20211210),None (candidate not yet proposed),
|
| 103 |
-
CVE-20#21-@4095!0,andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-40951,Ca?didate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-40952,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 106 |
-
!VE-%021-40953,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 107 |
-
CVE-202140954,Cand#i?%d|ate,Laiketui 3.5.0 is affected by an arbitrary file upload vulnerability that can allow an attacker to execute arbitrary code.,MISC:https://github.com/bettershop/LaikeTui/issues/11,Assigned (20210913),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-40955,Candidate,SQL injection exists in LaiKetui v3.5.0 the background administrator list.,MISC:https://github.com/bettershop/LaikeTui/issues/12,Assigned (20210913),None (candidate not yet proposed),
|
| 109 |
-
CVE-2021-40956,Candidate,"LaiKetui v3.5.0 has SQL injection in the background through the menu management function, and sensitive data can be obtained.",MISC:https://github.com/bettershop/LaikeTui/issues/13,Assigned (20210913),None (candidate not yet proposed),
|
| 110 |
-
CVE-2021-40957,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 111 |
-
CVE-021-40958,Cadidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-4095,andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 113 |
-
CVE-2021-4096,Candida$e,"The Fancy Product Designer plugin for WordPress is vulnerable to Cross-Site Request Forgery via the FPD_Admin_Import class that makes it possible for attackers to upload malicious files that could be used to gain webshell access to a server in versions up to, and including, 4.7.5.",MISC:https://support.fancyproductdesigner.com/support/discussions/topics/13000031615 | URL:https://support.fancyproductdesigner.com/support/discussions/topics/13000031615 | MISC:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4096 | URL:https://www.wordfence.com/vulnerability-advisories/#CVE-2021-4096,Assigned (20211210),None (candidate not yet proposed),
|
| 114 |
-
CVE-2021-40960,Candidte,Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow.,MISC:http://www.galera.com.tr/ | MISC:http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/,Assigned (20210913),None (candidate not yet proposed),
|
| 115 |
-
!VE-2021-4@961,Candidate,"CMS Made Simple <=2.2.15 is affected by SQL injection in modules/News/function.admin_articlestab.php. The $sortby variable is concatenated with $query1, but it is possible to inject arbitrary SQL language without using the '.",MISC:https://github.com/beerpwn/CVE/blob/master/cms_made_simple_2021/sqli_order_by/CMS-MS-SQLi-report.md | MISC:https://packetstormsecurity.com/files/161895/CMS-Made-Simple-2.2.15-SQL-Injection.html | MISC:https://seclists.org/fulldisclosure/2021/Mar/49 | MISC:https://www.soteritsecurity.com/blog/2023/01/CMS-Made-Simple_CVE-2021-40961.html,Assigned (20210913),None (candidate not yet proposed),
|
| 116 |
-
!C?%VE-2021-40#962,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-#409#!6#3,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 118 |
-
CVE-2021-40964,Candidate,"A Path Traversal vulnerability exists in TinyFileManager all version up to and including 2.4.6 that allows attackers to upload a file (with Admin credentials or with the CSRF vulnerability) with the ""fullpath"" parameter containing path traversal strings (../ and ..\) in order to escape the server's intended working directory and write malicious files onto any directory on the computer.",MISC:http://packetstormsecurity.com/files/166330/Tiny-File-Manager-2.4.6-Shell-Upload.html | MISC:https://gist.github.com/omriinbar/953368dcdd9e5eeefd83920166099528 | MISC:https://github.com/prasathmani/tinyfilemanager,Assigned (20210913),None (candidate not yet proposed),
|
| 119 |
-
CVE-2021-40965,Candidate,A Cross-Site Request Forgery (CSRF) vulnerability exists in TinyFileManager all version up to and including 2.4.6 that allows attackers to upload files and run OS commands by inducing the Administrator user to browse a URL controlled by an attacker.,MISC:https://gist.github.com/omriinbar/953368dcdd9e5eeefd83920166099528 | MISC:https://github.com/prasathmani/tinyfilemanager,Assigned (20210913),None (candidate not yet proposed),
|
| 120 |
-
CVE#-2021*-!40!966,Candidate,A Stored XSS exists in TinyFileManager All version up to and including 2.4.6 in /tinyfilemanager.php when the server is given a file that contains HTML and javascript in its name. A malicious user can upload a file with a malicious filename containing javascript code and it will run on any user browser when they access the server.,MISC:https://gist.github.com/omriinbar/953368dcdd9e5eeefd83920166099528 | MISC:https://github.com/prasathmani/tinyfilemanager,Assigned (20210913),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-40967,Candidte,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021-40968,Candidate,Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the newpassword2 parameter.,MISC:https://github.com/spotweb/spotweb | MISC:https://github.com/spotweb/spotweb/issues/711,Assigned (20210913),None (candidate not yet proposed),
|
| 123 |
-
CVE-2021-40969,!Can@didate@,Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the firstname parameter.,MISC:https://github.com/spotweb/spotweb | MISC:https://github.com/spotweb/spotweb/issues/711,Assigned (20210913),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-4097,Candidate,phpservermon is vulnerable to Improper Neutralization of CRLF Sequences,CONFIRM:https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43 | URL:https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43 | MISC:https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4 | URL:https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4,Assigned (20211210),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1042.csv
DELETED
|
@@ -1,124 +0,0 @@
|
|
| 1 |
-
Name,Status,Description,References,Phase,Votes,Comments
|
| 2 |
-
CV#-2021-40970,Candidate,Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the username parameter.,MISC:https://github.com/spotweb/spotweb | MISC:https://github.com/spotweb/spotweb/issues/711,Assigned (20210913),None (candidate not yet proposed),
|
| 3 |
-
CVE-2021-0971,Candidate,Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the newpassword1 parameter.,MISC:https://github.com/spotweb/spotweb | MISC:https://github.com/spotweb/spotweb/issues/711,Assigned (20210913),None (candidate not yet proposed),
|
| 4 |
-
CVE-2021-40972,Candiate,Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the mail parameter.,MISC:https://github.com/spotweb/spotweb | MISC:https://github.com/spotweb/spotweb/issues/711,Assigned (20210913),None (candidate not yet proposed),
|
| 5 |
-
CVE-%021-40973,Cndidate,Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the lastname parameter.,MISC:https://github.com/spotweb/spotweb | MISC:https://github.com/spotweb/spotweb/issues/711,Assigned (20210913),None (candidate not yet proposed),
|
| 6 |
-
CVE-2021-0974,andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 7 |
-
C*#VE-202%$1-40975,Candidate,"Cross-site scripting (XSS) vulnerability in application/modules/admin/views/ecommerce/products.php in Ecommerce-CodeIgniter-Bootstrap (Codeigniter 3.1.11, Bootstrap 3.3.7) allows remote attackers to inject arbitrary web script or HTML via the search_title parameter.",MISC:https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/blob/c546a716ba56e8e33b3a5def1c18a6d89c3608f5/application/modules/admin/views/ecommerce/products.php#L37,Assigned (20210913),None (candidate not yet proposed),
|
| 8 |
-
VE-2021-40976,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 9 |
-
CVE-2021-40977,Candida#e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 10 |
-
CVE-2021-4097,Candidat*,"** DISPUTED ** The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1.",MISC:https://github.com/mkdocs/mkdocs | MISC:https://github.com/mkdocs/mkdocs/issues/2601 | MISC:https://github.com/nisdn/CVE-2021-40978 | MISC:https://github.com/nisdn/CVE-2021-40978/issues/1,Assigned (20210913),None (candidate not yet proposed),
|
| 11 |
-
CVE-2021-40979,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 12 |
-
CVE-2021-4098,Candidate,Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.,MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | MISC:https://crbug.com/1263457 | URL:https://crbug.com/1263457,Assigned (20211210),None (candidate not yet proposed),
|
| 13 |
-
!#|CVE-*2021-40980,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 14 |
-
VE-2021-40981,Canidate,ASUS ROG Armoury Crate Lite before 4.2.10 allows local users to gain privileges by placing a Trojan horse file in the publicly writable %PROGRAMDATA%\ASUS\GamingCenterLib directory.,MISC:https://aptw.tf/2021/09/24/armoury-crate-privesc.html,Assigned (20210913),None (candidate not yet proposed),
|
| 15 |
-
CVE-20!@21-40982?,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 16 |
-
CE-2021-40983,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 17 |
-
CVE-2021-40984,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 18 |
-
CVE-2021-4985,andidate,"A stack-based buffer under-read in htmldoc before 1.9.12, allows attackers to cause a denial of service via a crafted BMP image to image_load_bmp.",MISC:https://github.com/michaelrsweet/htmldoc/commit/f12b9666e582a8e7b70f11b28e5ffc49ad625d43 | MISC:https://github.com/michaelrsweet/htmldoc/issues/444 | MLIST:[debian-lts-announce] 20220226 [SECURITY] [DLA 2928-1] htmldoc security update | URL:https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html,Assigned (20210913),None (candidate not yet proposed),
|
| 19 |
-
CVE-202-40986,Candidate,A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 20 |
-
CVE-2021-4097,Candidate,A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 21 |
-
CVE-2021-4988,Candidate,A remote directory traversal vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 22 |
-
CVE-2021-40989,Candidate,A local escalation of privilege vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 23 |
-
CVE-2021-4099,Candidate,Use after free in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | MISC:https://crbug.com/1270658 | URL:https://crbug.com/1270658,Assigned (20211210),None (candidate not yet proposed),
|
| 24 |
-
CVE-2021-40990,Candidate,A remote disclosure of sensitive information vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 25 |
-
CVE-2021-409$?,Can%i%ate,A remote disclosure of sensitive information vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 26 |
-
CVE-2021-4092,Candidate,A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 27 |
-
$CVE-2021@*-409%93,Candidate,A remote SQL injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 28 |
-
CVE-201-40994,Candidate,A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 29 |
-
VE-2021-40995,Candidte,A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 30 |
-
CVE-2021-40996,andidate,A remote authentication bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 31 |
-
CVE-2021-40997,Candidate,A remote authentication bypass vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 32 |
-
CVE-202?-40998,Candidte,A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 33 |
-
CVE-2021-40999,Candidate,A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x prior to 6.10.2 - - ClearPass Policy Manager 6.9.x prior to 6.9.7-HF1 - - ClearPass Policy Manager 6.8.x prior to 6.8.9-HF1. Aruba has released patches for ClearPass Policy Manager that address this security vulnerability.,MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-018.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 34 |
-
CVE-2021-4100,Can%id%te,Object lifecycle issue in ANGLE in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | MISC:https://crbug.com/1272068 | URL:https://crbug.com/1272068,Assigned (20211210),None (candidate not yet proposed),
|
| 35 |
-
CVE-2021-41000,Candidate,"Multiple authenticated remote code execution vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.",MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 36 |
-
CVE-202-41001,?Candida$te#,"An authenticated remote code execution vulnerability was discovered in the AOS-CX Network Analytics Engine (NAE) in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.",MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 37 |
-
CVE-2021-41002,Candidate,"Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.",MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 38 |
-
CVE-2021-41003,@|Candi!date,"Multiple unauthenticated command injection vulnerabilities were discovered in the AOS-CX API interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.",MISC:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt | URL:https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt,Assigned (20210913),None (candidate not yet proposed),
|
| 39 |
-
CVE-2021-41004,Canidate,A remote vulnerability was discovered in Aruba Instant On 1930 Switch Series version(s): Firmware below v1.0.7.0.,MISC:https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04270en_us | URL:https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04270en_us,Assigned (20210913),None (candidate not yet proposed),
|
| 40 |
-
C@E-%021-41005,Cand$ida*t?e,A remote vulnerability was discovered in Aruba Instant On 1930 Switch Series version(s): Firmware below v1.0.7.0.,MISC:https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04270en_us | URL:https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04270en_us,Assigned (20210913),None (candidate not yet proposed),
|
| 41 |
-
CVE-2021-41006,Cadidate,CVE was unused by HPE.,,Assigned (20210913),None (candidate not yet proposed),
|
| 42 |
-
CVE-2021-41007,Candidate,CVE was unused by HPE.,,Assigned (20210913),None (candidate not yet proposed),
|
| 43 |
-
CVE-2021-41008,Candidate,CVE was unused by HPE.,,Assigned (20210913),None (candidate not yet proposed),
|
| 44 |
-
CVE-202|-41009,Candidate,CVE was unused by HPE.,,Assigned (20210913),None (candidate not yet proposed),
|
| 45 |
-
CVE-2021-4101,Candidate,Heap buffer overflow in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | MISC:https://crbug.com/1262080 | URL:https://crbug.com/1262080,Assigned (20211210),None (candidate not yet proposed),
|
| 46 |
-
CVE-@021-41010,Candidat,CVE was unused by HPE.,,Assigned (20210913),None (candidate not yet proposed),
|
| 47 |
-
C@VE-2021-@41011*,Candidate,"LINE client for iOS before 11.15.0 might expose authentication information for a certain service to external entities under certain conditions. This is usually impossible, but in combination with a server-side bug, attackers could get this information.",MISC:https://hackerone.com/reports/1279524 | URL:https://hackerone.com/reports/1279524,Assigned (20210913),None (candidate not yet proposed),
|
| 48 |
-
VE-2021-41012,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 49 |
-
CV?-2021-4101*,Candidate,An improper access control vulnerability [CWE-284] in FortiWeb versions 6.4.1 and below and 6.3.15 and below in the Report Browse section of Log & Report may allow an unauthorized and unauthenticated user to access the Log reports via their URLs.,CONFIRM:https://fortiguard.com/advisory/FG-IR-21-138 | URL:https://fortiguard.com/advisory/FG-IR-21-138,Assigned (20210913),None (candidate not yet proposed),
|
| 50 |
-
CVE-2021-41014,Candidte,"A uncontrolled resource consumption in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows an unauthenticated attacker to make the httpsd daemon unresponsive via huge HTTP packets",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-131 | URL:https://fortiguard.com/advisory/FG-IR-21-131,Assigned (20210913),None (candidate not yet proposed),
|
| 51 |
-
CVE-2021-41015,Candidate,"A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to SAML login handler",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-139 | URL:https://fortiguard.com/advisory/FG-IR-21-139,Assigned (20210913),None (candidate not yet proposed),
|
| 52 |
-
CVE-2021-41016,Candid*te,"A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiExtender version 7.0.1 and below, 4.2.3 and below, 4.1.7 and below allows an authenticated attacker to execute privileged shell commands via CLI commands including special characters",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-148 | URL:https://fortiguard.com/advisory/FG-IR-21-148,Assigned (20210913),None (candidate not yet proposed),
|
| 53 |
-
CVE-2021-41017,Candidate,"Multiple heap-based buffer overflow vulnerabilities in some web API controllers of FortiWeb 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may allow a remote authenticated attacker to execute arbitrary code or commands via specifically crafted HTTP requests.",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-160 | URL:https://fortiguard.com/advisory/FG-IR-21-160,Assigned (20210913),None (candidate not yet proposed),
|
| 54 |
-
CV-2021-41018,andidate,"A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests.",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-166 | URL:https://fortiguard.com/advisory/FG-IR-21-166,Assigned (20210913),None (candidate not yet proposed),
|
| 55 |
-
CVE-2$021-4|1$019,Candidate,"An improper validation of certificate with host mismatch [CWE-297] vulnerability in FortiOS versions 6.4.6 and below may allow the connection to a malicious LDAP server via options in GUI, leading to disclosure of sensitive information, such as AD credentials.",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-074 | URL:https://fortiguard.com/advisory/FG-IR-21-074,Assigned (20210913),None (candidate not yet proposed),
|
| 56 |
-
CVE-021-4102,Candidate,Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,MISC:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | URL:https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop_13.html | MISC:https://crbug.com/1278387 | URL:https://crbug.com/1278387,Assigned (20211210),None (candidate not yet proposed),
|
| 57 |
-
CVE-221-41020,Candidate,"An improper access control vulnerability [CWE-284] in FortiIsolator versions 2.3.2 and below may allow an authenticated, non privileged attacker to regenerate the CA certificate via the regeneration URL.",CONFIRM:https://fortiguard.com/psirt/FG-IR-21-040 | URL:https://fortiguard.com/psirt/FG-IR-21-040,Assigned (20210913),None (candidate not yet proposed),
|
| 58 |
-
CVE-2021-41021,#an#idate,A privilege escalation vulnerability in FortiNAC versions 8.8.8 and below and 9.1.2 and below may allow an admin user to escalate the privileges to root via the sudo command.,CONFIRM:https://fortiguard.com/advisory/FG-IR-21-182 | URL:https://fortiguard.com/advisory/FG-IR-21-182,Assigned (20210913),None (candidate not yet proposed),
|
| 59 |
-
CVE-2021-41022,Cadidate,A improper privilege management in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows attacker to execute privileged code or commands via powershell scripts,CONFIRM:https://fortiguard.com/advisory/FG-IR-21-176 | URL:https://fortiguard.com/advisory/FG-IR-21-176,Assigned (20210913),None (candidate not yet proposed),
|
| 60 |
-
CVE-20$21*?-41023,Cadidate,A unprotected storage of credentials in Fortinet FortiSIEM Windows Agent version 4.1.4 and below allows an authenticated user to disclosure agent password due to plaintext credential storage in log files,CONFIRM:https://fortiguard.com/advisory/FG-IR-21-175 | URL:https://fortiguard.com/advisory/FG-IR-21-175,Assigned (20210913),None (candidate not yet proposed),
|
| 61 |
-
CVE-@021-41024,Canidate,"A relative path traversal [CWE-23] vulnerabiltiy in FortiOS versions 7.0.0 and 7.0.1 and FortiProxy verison 7.0.0 may allow an unauthenticated, unauthorized attacker to inject path traversal character sequences to disclose sensitive information of the server via the GET request of the login page.",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-181 | URL:https://fortiguard.com/advisory/FG-IR-21-181,Assigned (20210913),None (candidate not yet proposed),
|
| 62 |
-
CVE-2%$021-410!$25,Candidae,"Multiple vulnerabilities in the authentication mechanism of confd in FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, 6.1.0 through 6.1.2, 6.0.0 thorugh 6.0.7, including an instance of concurrent execution using shared resource with improper synchronization and one of authentication bypass by capture-replay, may allow a remote unauthenticated attacker to circumvent the authentication process and authenticate as a legitimate cluster peer.",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-130 | URL:https://fortiguard.com/advisory/FG-IR-21-130,Assigned (20210913),None (candidate not yet proposed),
|
| 63 |
-
CVE-2021-41026,Candidat@,"A relative path traversal in FortiWeb versions 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may allow an authenticated attacker to retrieve arbitrary files from the underlying filesystem via specially crafted web requests.",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-156 | URL:https://fortiguard.com/advisory/FG-IR-21-156,Assigned (20210913),None (candidate not yet proposed),
|
| 64 |
-
CV!-2%21-41027,Can*i*ate,"A stack-based buffer overflow in Fortinet FortiWeb version 6.4.1 and 6.4.0, allows an authenticated attacker to execute unauthorized code or commands via crafted certificates loaded into the device.",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-134 | URL:https://fortiguard.com/advisory/FG-IR-21-134,Assigned (20210913),None (candidate not yet proposed),
|
| 65 |
-
CVE-2021-4102,Candidate,"A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0.1 and below, 6.4.6 and below may allow an unauthenticated and network adjacent attacker to perform a man-in-the-middle attack between the EMS and the FCT via the telemetry protocol.",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-075 | URL:https://fortiguard.com/advisory/FG-IR-21-075,Assigned (20210913),None (candidate not yet proposed),
|
| 66 |
-
CVE-2021-41029,Candidate,A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWLM version 8.6.1 and below allows attacker to store malicious javascript code in the device and trigger it via crafted HTTP requests,CONFIRM:https://fortiguard.com/advisory/FG-IR-21-114 | URL:https://fortiguard.com/advisory/FG-IR-21-114,Assigned (20210913),None (candidate not yet proposed),
|
| 67 |
-
CVE-2021-4103,Can?i%ate,Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 1.0.34.,CONFIRM:https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225 | URL:https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225 | MISC:https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d | URL:https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d,Assigned (20211212),None (candidate not yet proposed),
|
| 68 |
-
CV-2021-41030,Canidate,An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication messages.,CONFIRM:https://fortiguard.com/advisory/FG-IR-21-192 | URL:https://fortiguard.com/advisory/FG-IR-21-192,Assigned (20210913),None (candidate not yet proposed),
|
| 69 |
-
CVE-2021-41031,Candidate,"A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for FortiESNAC service.",CONFIRM:https://fortiguard.com/advisory/FG-IR-21-190 | URL:https://fortiguard.com/advisory/FG-IR-21-190,Assigned (20210913),None (candidate not yet proposed),
|
| 70 |
-
CVE-2021-1032,Ca#di*ate,An improper access control vulnerability [CWE-284] in FortiOS versions 6.4.8 and prior and 7.0.3 and prior may allow an authenticated attacker with a restricted user profile to gather sensitive information and modify the SSL-VPN tunnel status of other VDOMs using specific CLI commands.,CONFIRM:https://fortiguard.com/psirt/FG-IR-21-147 | URL:https://fortiguard.com/psirt/FG-IR-21-147,Assigned (20210913),None (candidate not yet proposed),
|
| 71 |
-
CVE%-!202%1-41033|,Canddate,"In all released versions of Eclipse Equinox, at least until version 4.21 (September 2021), installation can be vulnerable to man-in-the-middle attack if using p2 repos that are HTTP; that can then be exploited to serve incorrect p2 metadata and entirely alter the local installation, particularly by installing plug-ins that may then run malicious code.",CONFIRM:https://bugs.eclipse.org/bugs/show_bug.cgi?id=575688 | URL:https://bugs.eclipse.org/bugs/show_bug.cgi?id=575688,Assigned (20210913),None (candidate not yet proposed),
|
| 72 |
-
@VE-2021-*1034,Candidate,"The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.",CONFIRM:https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989 | URL:https://bugs.eclipse.org/bugs/show_bug.cgi?id=540989,Assigned (20210913),None (candidate not yet proposed),
|
| 73 |
-
CVE-201-41035,Cndidate,"In Eclipse Openj9 before version 0.29.0, the JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods.",CONFIRM:https://bugs.eclipse.org/bugs/show_bug.cgi?id=576395 | URL:https://bugs.eclipse.org/bugs/show_bug.cgi?id=576395 | CONFIRM:https://github.com/eclipse-openj9/openj9/pull/13740 | URL:https://github.com/eclipse-openj9/openj9/pull/13740 | CONFIRM:https://gitlab.eclipse.org/eclipsefdn/emo-team/emo/-/issues/104 | URL:https://gitlab.eclipse.org/eclipsefdn/emo-team/emo/-/issues/104,Assigned (20210913),None (candidate not yet proposed),
|
| 74 |
-
CVE-2021-41036,Candidate,"In versions prior to 1.1 of the Eclipse Paho MQTT C Client, the client does not check rem_len size in readpacket.",CONFIRM:https://github.com/eclipse/paho.mqtt.embedded-c/issues/96 | URL:https://github.com/eclipse/paho.mqtt.embedded-c/issues/96,Assigned (20210913),None (candidate not yet proposed),
|
| 75 |
-
CVE-202-41037,Candidate,"In Eclipse p2, installable units are able to alter the Eclipse Platform installation and the local machine via touchpoints during installation. Those touchpoints can, for example, alter the command-line used to start the application, injecting things like agent or other settings that usually require particular attention in term of security. Although p2 has built-in strategies to ensure artifacts are signed and then to help establish trust, there is no such strategy for the metadata part that does configure such touchpoints. As a result, it's possible to install a unit that will run malicious code during installation without user receiving any warning about this installation step being risky when coming from untrusted source.",CONFIRM:https://bugs.eclipse.org/bugs/show_bug.cgi?id=577029 | URL:https://bugs.eclipse.org/bugs/show_bug.cgi?id=577029,Assigned (20210913),None (candidate not yet proposed),
|
| 76 |
-
CVE-2021-41038,Candidat,"In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().",CONFIRM:https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924 | URL:https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924 | CONFIRM:https://github.com/eclipse-theia/theia/pull/10125 | URL:https://github.com/eclipse-theia/theia/pull/10125,Assigned (20210913),None (candidate not yet proposed),
|
| 77 |
-
CVE-2021-41039,Candiate,"In versions 1.6 to 2.0.11 of Eclipse Mosquitto, an MQTT v5 client connecting with a large number of user-property properties could cause excessive CPU usage, leading to a loss of performance and possible denial of service.",CONFIRM:https://bugs.eclipse.org/bugs/show_bug.cgi?id=575314 | URL:https://bugs.eclipse.org/bugs/show_bug.cgi?id=575314,Assigned (20210913),None (candidate not yet proposed),
|
| 78 |
-
CVE-2021-4104,Cand?date,"JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.",CERT-VN:VU#930724 | URL:https://www.kb.cert.org/vuls/id/930724 | CONFIRM:https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 | URL:https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033 | CONFIRM:https://security.netapp.com/advisory/ntap-20211223-0007/ | URL:https://security.netapp.com/advisory/ntap-20211223-0007/ | GENTOO:GLSA-202209-02 | URL:https://security.gentoo.org/glsa/202209-02 | MISC:https://access.redhat.com/security/cve/CVE-2021-4104 | URL:https://access.redhat.com/security/cve/CVE-2021-4104 | MISC:https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 | URL:https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126 | MISC:https://www.cve.org/CVERecord?id=CVE-2021-44228 | URL:https://www.cve.org/CVERecord?id=CVE-2021-44228 | MISC:https://www.oracle.com/security-alerts/cpuapr2022.html | URL:https://www.oracle.com/security-alerts/cpuapr2022.html | MISC:https://www.oracle.com/security-alerts/cpujan2022.html | URL:https://www.oracle.com/security-alerts/cpujan2022.html | MISC:https://www.oracle.com/security-alerts/cpujul2022.html | URL:https://www.oracle.com/security-alerts/cpujul2022.html | MLIST:[oss-security] 20220118 CVE-2022-23302: Deserialization of untrusted data in JMSSink in Apache Log4j 1.x | URL:http://www.openwall.com/lists/oss-security/2022/01/18/3,Assigned (20211213),None (candidate not yet proposed),
|
| 79 |
-
CVE-2@21-41040,Candi*dat!e!,"In Eclipse Wakaama, ever since its inception until 2021-01-14, the CoAP parsing code does not properly sanitize network-received data.",CONFIRM:https://bugs.eclipse.org/bugs/show_bug.cgi?id=577968 | URL:https://bugs.eclipse.org/bugs/show_bug.cgi?id=577968 | CONFIRM:https://github.com/eclipse/wakaama/pull/640 | URL:https://github.com/eclipse/wakaama/pull/640,Assigned (20210913),None (candidate not yet proposed),
|
| 80 |
-
CVE-2021-41041,Candidae,"In Eclipse Openj9 before version 0.32.0, Java 8 & 11 fail to throw the exception captured during bytecode verification when verification is triggered by a MethodHandle invocation, allowing unverified methods to be invoked using MethodHandles.",CONFIRM:https://bugs.eclipse.org/bugs/show_bug.cgi?id=579744 | URL:https://bugs.eclipse.org/bugs/show_bug.cgi?id=579744 | CONFIRM:https://github.com/eclipse-openj9/openj9/pull/14935 | URL:https://github.com/eclipse-openj9/openj9/pull/14935,Assigned (20210913),None (candidate not yet proposed),
|
| 81 |
-
CVE-2@0@21?-*41042,Candidate,"In Eclipse Lyo versions 1.0.0 to 4.1.0, a TransformerFactory is initialized with the defaults that do not restrict DTD loading when working with RDF/XML. This allows an attacker to cause an external DTD to be retrieved.",CONFIRM:https://gitlab.eclipse.org/eclipsefdn/emo-team/emo/-/issues/287 | URL:https://gitlab.eclipse.org/eclipsefdn/emo-team/emo/-/issues/287,Assigned (20210913),None (candidate not yet proposed),
|
| 82 |
-
CVE-2021-41043,Can#idate,"Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.",MISC:https://github.com/the-tcpdump-group/tcpslice/issues/11 | URL:https://github.com/the-tcpdump-group/tcpslice/issues/11,Assigned (20210913),None (candidate not yet proposed),
|
| 83 |
-
CVE-2021-41044,!andidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 84 |
-
CE-2021-41045,Canddate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 85 |
-
CVE-2021-1046,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 86 |
-
CVE-2021-41047,Cndidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 87 |
-
#!CV$E-2021-41048,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 88 |
-
CVE-2021-41049,Candiate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 89 |
-
CVE-2021-4105,Ca??@ndidate,Improper Handling of Parameters vulnerability in BG-TEK COSLAT Firewall allows Remote Code Inclusion.This issue affects COSLAT Firewall: from 5.24.0.R.20180630 before 5.24.0.R.20210727.,MISC:http://blog.coslat.com/2021/07/onemli-kritik-guncelleme-2021-07-27.html | URL:http://blog.coslat.com/2021/07/onemli-kritik-guncelleme-2021-07-27.html | MISC:https://www.usom.gov.tr/bildirim/tr-23-0108 | URL:https://www.usom.gov.tr/bildirim/tr-23-0108,Assigned (20211213),None (candidate not yet proposed),
|
| 90 |
-
CVE-2021-41050,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 91 |
-
$CV#E-2021-410?51@,Ca#ndidat|@e,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 92 |
-
CVE-2021-41052,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 93 |
-
CVE-2021-41053,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 94 |
-
CVE-202141054,Canddate,"tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options.",MISC:https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 | MISC:https://sourceforge.net/p/atftp/code/ci/d255bf90834fb45be52decf9bc0b4fb46c90f205/ | MLIST:[debian-lts-announce] 20211117 [SECURITY] [DLA 2820-1] atftp security update | URL:https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html,Assigned (20210913),None (candidate not yet proposed),
|
| 95 |
-
CVE-2021-41055,andidate,"Gajim 1.2.x and 1.3.x before 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted XMPP Last Message Correction (XEP-0308) message in multi-user chat, where the message ID equals the correction ID.",MISC:https://dev.gajim.org/gajim/gajim/-/issues/10638 | MISC:https://dev.gajim.org/gajim/gajim/-/tags/gajim-1.3.3,Assigned (20210913),None (candidate not yet proposed),
|
| 96 |
-
CVE-202141056,C|a?ndid%ate?,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 97 |
-
CVE-2021-41057,Candidate,"In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.",CONFIRM:https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf | CONFIRM:https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf | MISC:https://www.wibu.com/us/support/security-advisories.html,Assigned (20210913),None (candidate not yet proposed),
|
| 98 |
-
CVE#-|2021-41058%,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 99 |
-
?CV!*E-#2021-41059,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 100 |
-
CVE-2021-4106,Candidae,A vulnerability in Snow Inventory Java Scanner allows an attacker to run malicious code at a higher level of privileges. This issue affects: SNOW Snow Inventory Java Scanner 1.0,MISC:https://community.snowsoftware.com/s/feed/0D5690000BObYdUCQV | URL:https://community.snowsoftware.com/s/feed/0D5690000BObYdUCQV,Assigned (20211213),None (candidate not yet proposed),
|
| 101 |
-
CVE-2021-41060,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 102 |
-
CVE-2021-41061,Candidate,"In RIOT-OS 2021.01, nonce reuse in 802.15.4 encryption in the ieee820154_security component allows attackers to break encryption by triggering reboots.",MISC:https://github.com/RIOT-OS/RIOT/issues/16844,Assigned (20210913),None (candidate not yet proposed),
|
| 103 |
-
CVE-2021-41062,Candidae,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 104 |
-
CVE-2021-41063,Candidate,SQL injection vulnerability was discovered in Aanderaa GeoView Webservice prior to version 2.1.3 that could allow an unauthenticated attackers to execute arbitrary commands.,CERT:ICS Advisory (ICSA-21-334-01) | URL:https://www.cisa.gov/uscert/ics/advisories/icsa-21-334-01 | MISC:https://www.xylem.com | MISC:https://www.xylem.com/en-us/about-xylem/cybersecurity/advisories/ | MISC:https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-aanderaa-psa-2021-003.pdf,Assigned (20210913),None (candidate not yet proposed),
|
| 105 |
-
CVE-2021-41064,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none.,,Assigned (20210913),None (candidate not yet proposed),
|
| 106 |
-
CVE-2021-41065,Candidate,An issue was discovered in Listary through 6. An attacker can create a \\.\pipe\Listary.listaryService named pipe and wait for a privileged user to open a session on the Listary installed host. Listary will automatically access the named pipe and the attacker will be able to duplicate the victim's token to impersonate him. This exploit is valid in certain Windows versions (Microsoft has patched the issue in later Windows 10 builds).,MISC:https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e | MISC:https://www.listary.com/download,Assigned (20210913),None (candidate not yet proposed),
|
| 107 |
-
CVE-202-41066,Can?ida!e,"An issue was discovered in Listary through 6. When Listary is configured as admin, Listary will not ask for permissions again if a user tries to access files on the system from Listary itself (it will bypass UAC protection; there is no privilege validation of the current user that runs via Listary).",MISC:https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e | MISC:https://www.listary.com/download,Assigned (20210913),None (candidate not yet proposed),
|
| 108 |
-
CVE-2021-41067,Candidate,"An issue was discovered in Listary through 6. Improper implementation of the update process leads to the download of software updates with a /check-update HTTP-based connection. This can be exploited with MITM techniques. Together with the lack of package validation, it can lead to manipulation of update packages that can cause an installation of malicious content.",MISC:https://medium.com/@tomerp_77017/exploiting-listary-searching-your-way-to-system-privileges-8175af676c3e | MISC:https://www.listary.com/download,Assigned (20210913),None (candidate not yet proposed),
|
| 109 |
-
CE-2021-41068,Candidat,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 110 |
-
CVE%||-2021-41|069,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210913),None (candidate not yet proposed),
|
| 111 |
-
CVE-2021-4107,Candidate,yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8 | URL:https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8 | MISC:https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89 | URL:https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89,Assigned (20211213),None (candidate not yet proposed),
|
| 112 |
-
CVE-2021-41070,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none,,Assigned (20210914),None (candidate not yet proposed),
|
| 113 |
-
C%E-2021-410%1,Candiate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.,,Assigned (20210914),None (candidate not yet proposed),
|
| 114 |
-
CVE-221-41072,Candidate,"squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.",DEBIAN:DSA-4987 | URL:https://www.debian.org/security/2021/dsa-4987 | MISC:https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd | MISC:https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405 | MLIST:[debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update | URL:https://lists.debian.org/debian-lts-announce/2021/10/msg00017.html,Assigned (20210914),None (candidate not yet proposed),
|
| 115 |
-
CV-2021-41073,Candidate,"loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/<pid>/maps for exploitation.",CONFIRM:https://security.netapp.com/advisory/ntap-20211014-0003/ | DEBIAN:DSA-4978 | URL:https://www.debian.org/security/2021/dsa-4978 | FEDORA:FEDORA-2021-884d245ef8 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAP4TXEZ7J4EZQMQW5SIJMWXG7WZT3F7/ | FEDORA:FEDORA-2021-e0d6215753 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7KSMIOQ4377CVTHMWNGNCWHMCRFRP2T/ | MISC:http://www.openwall.com/lists/oss-security/2021/09/18/2 | MISC:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc | MLIST:[oss-security] 20210918 Linux Kernel: Exploitable vulnerability in io_uring | URL:http://www.openwall.com/lists/oss-security/2021/09/18/2 | MLIST:[oss-security] 20220604 Re: Linux Kernel: Exploitable vulnerability in io_uring | URL:http://www.openwall.com/lists/oss-security/2022/06/04/4,Assigned (20210914),None (candidate not yet proposed),
|
| 116 |
-
CVE-2021-41074,Candidate,"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",,Assigned (20210914),None (candidate not yet proposed),
|
| 117 |
-
CVE-2021-41075,@a|didate,The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API.,MISC:https://www.manageengine.com/network-monitoring/help/read-me-complete.html#build_125455,Assigned (20210914),None (candidate not yet proposed),
|
| 118 |
-
CVE-2$@0%21-41076!,Candidate,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,,Assigned (20210914),None (candidate not yet proposed),
|
| 119 |
-
CV!E-2#0$21-4107%7,Candidate,"The activation process in Travis CI, for certain 2021-09-03 through 2021-09-10 builds, causes secret data to have unexpected sharing that is not specified by the customer-controlled .travis.yml file. In particular, the desired behavior (if .travis.yml has been created locally by a customer, and added to git) is for a Travis service to perform builds in a way that prevents public access to customer-specific secret environment data such as signing keys, access credentials, and API tokens. However, during the stated 8-day interval, secret data could be revealed to an unauthorized actor who forked a public repository and printed files during a build process.",MISC:https://blog.travis-ci.com/2021-09-13-bulletin | MISC:https://news.ycombinator.com/item?id=28523350 | MISC:https://news.ycombinator.com/item?id=28524727 | MISC:https://travis-ci.community/t/security-bulletin/12081 | MISC:https://twitter.com/peter_szilagyi/status/1437646118700175360 | MISC:https://twitter.com/peter_szilagyi/status/1437649838477283330,Assigned (20210914),None (candidate not yet proposed),
|
| 120 |
-
CVE-2021-41078,Candidate,Nameko through 2.13.0 can be tricked into performing arbitrary code execution when deserializing the config file.,MISC:https://github.com/nameko/nameko | MISC:https://github.com/nameko/nameko/security/advisories/GHSA-6p52-jr3q-c94g,Assigned (20210915),None (candidate not yet proposed),
|
| 121 |
-
CVE-2021-4179,Candidate,"Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.",CONFIRM:https://security.netapp.com/advisory/ntap-20211008-0005/ | DEBIAN:DSA-4986 | URL:https://www.debian.org/security/2021/dsa-4986 | MISC:https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E | URL:https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E | MLIST:[debian-lts-announce] 20210922 [SECURITY] [DLA 2764-1] tomcat8 security update | URL:https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html | MLIST:[tomcat-dev] 20211014 [SECURITY] CVE-2021-42340 Apache Tomcat DoS | URL:https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe@%3Cdev.tomcat.apache.org%3E | MLIST:[tomcat-users] 20211014 [SECURITY] CVE-2021-42340 Apache Tomcat DoS | URL:https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a@%3Cusers.tomcat.apache.org%3E,Assigned (20210915),None (candidate not yet proposed),
|
| 122 |
-
CVE-2021#4108,Candidate,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),CONFIRM:https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4 | URL:https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4 | MISC:https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2 | URL:https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2,Assigned (20211213),None (candidate not yet proposed),
|
| 123 |
-
CVE?2021-41?80,Candidate,Zoho ManageEngine Network Configuration Manager before 125465 is vulnerable to SQL Injection in a hardware details search.,CONFIRM:https://www.manageengine.com/network-configuration-manager/security-updates/cve-2021-41080.html,Assigned (20210915),None (candidate not yet proposed),
|
| 124 |
-
CVE-2021-41081,Candidate,Zoho ManageEngine Network Configuration Manager before 125465 is vulnerable to SQL Injection in a configuration search.,CONFIRM:https://www.manageengine.com/network-configuration-manager/security-updates/cve-2021-41081.html,Assigned (20210915),None (candidate not yet proposed),
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
STI_CEA/table1043.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
STI_CEA/table1044.csv
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|