Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Total 210374 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-31326 1 Dlink 2 Dir-816, Dir-816 Firmware 2022-07-12 9.0 HIGH 9.8 CRITICAL
D-Link DIR-816 A2 1.10 B05 allows unauthenticated attackers to arbitrarily reset the device via a crafted tokenid parameter to /goform/form2Reboot.cgi.
CVE-2021-45878 1 Garo 6 Wallbox Glb, Wallbox Glb Firmware, Wallbox Gtb and 3 more 2022-07-12 6.4 MEDIUM 9.1 CRITICAL
Multiple versions of GARO Wallbox GLB/GTB/GTC are affected by incorrect access control. Lack of access control on the web manger pages allows any user to view and modify information.
CVE-2021-36100 1 Otrs 3 Otrs, Otrs Itsm, Otrs Storm 2022-07-12 9.0 HIGH 8.8 HIGH
Specially crafted string in OTRS system configuration can allow the execution of any system command.
CVE-2021-39383 1 Diaowen 1 Dwsurvey 2022-07-12 7.5 HIGH 9.8 CRITICAL
DWSurvey v3.2.0 was discovered to contain a remote command execution (RCE) vulnerability via the component /sysuser/SysPropertyAction.java.
CVE-2020-15388 1 Broadcom 1 Fabric Operating System 2022-07-12 4.0 MEDIUM 6.5 MEDIUM
A vulnerability in the Brocade Fabric OS before Brocade Fabric OS v9.0.1a, v8.2.3, v8.2.0_CBN4, and v7.4.2h could allow an authenticated CLI user to abuse the history command to write arbitrary content to files.
CVE-2021-39046 1 Ibm 2 Business Automation Workflow, Business Process Manager 2022-07-12 4.0 MEDIUM 4.9 MEDIUM
IBM Business Automation Workflow 18.0, 19.0, 20.0, and 21.0 and IBM Business Process Manager 8.5 and 8.6 stores user credentials in plain clear text which can be read by a lprivileged user. IBM X-Force ID: 214346.
CVE-2021-45968 2 Jivesoftware, Pascom 2 Jive, Cloud Phone System 2022-07-12 5.0 MEDIUM 7.5 HIGH
An issue was discovered in xmppserver jar in the XMPP Server component of the JIve platform, as used in Pascom Cloud Phone System before 7.20.x (and in other products). An endpoint in the backend Tomcat server of the Pascom allows SSRF, a related issue to CVE-2019-18394.
CVE-2021-45967 2 Igniterealtime, Pascom Cloud Phone System 2 Openfire, * 2022-07-12 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Pascom Cloud Phone System before 7.20.x. A configuration error between NGINX and a backend Tomcat server leads to a path traversal in the Tomcat server, exposing unintended endpoints.
CVE-2021-45966 1 Pascom 1 Cloud Phone System 2022-07-12 10.0 HIGH 9.8 CRITICAL
An issue was discovered in Pascom Cloud Phone System before 7.20.x. In the management REST API, /services/apply in exd.pl allows remote attackers to execute arbitrary code via shell metacharacters.
CVE-2021-43961 1 Sonatype 1 Nexus Repository Manager 2022-07-12 4.3 MEDIUM 4.3 MEDIUM
Sonatype Nexus Repository Manager 3.36.0 allows HTML Injection.
CVE-2021-39792 1 Google 1 Android 2022-07-12 1.9 LOW 4.1 MEDIUM
In usb_gadget_giveback_request of core.c, there is a possible use after free out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161010552References: Upstream kernel
CVE-2021-39734 1 Google 1 Android 2022-07-12 4.6 MEDIUM 7.8 HIGH
In sendMessage of OneToOneChatImpl.java (? TBD), there is a possible way to send an RCS message without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208650395References: N/A
CVE-2021-39706 1 Google 1 Android 2022-07-12 9.3 HIGH 7.8 HIGH
In onResume of CredentialStorage.java, there is a possible way to cleanup content of credentials storage due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12Android ID: A-200164168
CVE-2021-39697 1 Google 1 Android 2022-07-12 7.2 HIGH 7.8 HIGH
In checkFileUriDestination of DownloadProvider.java, there is a possible way to bypass external storage private directories protection due to a missing permission check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-200813547
CVE-2021-39689 1 Google 1 Android 2022-07-12 7.2 HIGH 6.7 MEDIUM
In multiple functions of odsign_main.cpp, there is a possible way to persist system attack due to a logic error in the code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-206090748
CVE-2021-39686 1 Google 1 Android 2022-07-12 6.9 MEDIUM 7.0 HIGH
In several functions of binder.c, there is a possible way to represent the wrong domain to SELinux due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-200688826References: Upstream kernel
CVE-2021-45852 1 Projectworlds 1 Hospital Management System In Php 2022-07-12 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Projectworlds Hospital Management System v1.0. Unauthorized malicious attackers can add patients without restriction via add_patient.php.
CVE-2021-38971 1 Ibm 1 Data Virtualization On Cloud Pak For Data 2022-07-12 4.0 MEDIUM 4.9 MEDIUM
IBM Data Virtualization on Cloud Pak for Data 1.3.0, 1.4.1, 1.5.0, 1.7.1 and 1.7.3 could allow an authorized user to bypass data masking rules and obtain sensitve information. IBM X-Force ID: 212620.
CVE-2021-41850 3 Bluproducts, Luna, Wikomobile 10 G9, G90, G90 Firmware and 7 more 2022-07-12 7.2 HIGH 7.8 HIGH
An issue was discovered in Luna Simo PPR1.180610.011/202001031830. A pre-installed app with a package name of com.skyroam.silverhelper writes three IMEI values to system properties at system startup. The system property values can be obtained via getprop by all third-party applications co-located on the device, even those with no permissions granted, exposing the IMEI values to processes without enforcing any access control.
CVE-2021-41848 3 Bluproducts, Luna, Wikomobile 10 G9, G90, G90 Firmware and 7 more 2022-07-12 7.2 HIGH 7.8 HIGH
An issue was discovered in Luna Simo PPR1.180610.011/202001031830. It mishandles software updates such that local third-party apps can provide a spoofed software update file that contains an arbitrary shell script and arbitrary ARM binary, where both will be executed as the root user with an SELinux domain named osi. To exploit this vulnerability, a local third-party app needs to have write access to external storage to write the spoofed update at the expected path. The vulnerable system binary (i.e., /system/bin/osi_bin) does not perform any authentication of the update file beyond ensuring that it is encrypted with an AES key (that is hard-coded in the vulnerable system binary). Processes executing with the osi SELinux domain can programmatically perform the following actions: install apps, grant runtime permissions to apps (including permissions with protection levels of dangerous and development), access extensive Personally Identifiable Information (PII) using the programmatically grant permissions, uninstall apps, set the default launcher app to a malicious launcher app that spoofs other apps, set a network proxy to intercept network traffic, unload kernel modules, set the default keyboard to a keyboard that has keylogging functionality, examine notification contents, send text messages, and more. The spoofed update can optionally contain an arbitrary ARM binary that will be locally stored in internal storage and executed at system startup to achieve persistent code execution as the root user with the osi SELinux domain. This ARM binary will continue to execute at startup even if the app that provided the spoofed update is uninstalled.