Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Total 210374 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-3842 3 Debian, Fedoraproject, Nltk 3 Debian Linux, Fedora, Nltk 2022-01-12 5.0 MEDIUM 7.5 HIGH
nltk is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-43852 1 Oroinc 1 Oroplatform 2022-01-12 6.8 MEDIUM 8.8 HIGH
OroPlatform is a PHP Business Application Platform. In affected versions by sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. This issue has been patched in version 4.2.8. Users unable to upgrade may configure a firewall to drop requests containing next strings: `__proto__` , `constructor[prototype]`, and `constructor.prototype` to mitigate this issue.
CVE-2021-31522 1 Apache 1 Kylin 2022-01-12 7.5 HIGH 9.8 CRITICAL
Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
CVE-2021-44351 1 Naviwebs 1 Navigate Cms 2022-01-12 5.0 MEDIUM 7.5 HIGH
An arbitrary file read vulnerability exists in NavigateCMS 2.9 via /navigate/navigate_download.php id parameter.
CVE-2017-13892 1 Apple 2 Mac Os X, Macos 2022-01-12 5.0 MEDIUM 7.5 HIGH
An issue existed in the handling of Contact sharing. This issue was addressed with improved handling of user information. This issue is fixed in macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan. Sharing contact information may lead to unexpected data sharing.
CVE-2021-41043 1 Tcpdump 1 Tcpslice 2022-01-12 4.3 MEDIUM 5.5 MEDIUM
Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.
CVE-2021-46076 1 Vehicle Service Management System Project 1 Vehicle Service Management System 2022-01-12 6.5 MEDIUM 8.8 HIGH
Sourcecodester Vehicle Service Management System 1.0 is vulnerable to File upload. An attacker can upload a malicious php file in multiple endpoints it leading to Code Execution.
CVE-2021-36737 1 Apache 1 Pluto 2022-01-12 4.3 MEDIUM 6.1 MEDIUM
The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact
CVE-2022-21642 1 Discourse 1 Discourse 2022-01-12 4.0 MEDIUM 4.3 MEDIUM
Discourse is an open source platform for community discussion. In affected versions when composing a message from topic the composer user suggestions reveals whisper participants. The issue has been patched in stable version 2.7.13 and beta version 2.8.0.beta11. There is no workaround for this issue and users are advised to upgrade.
CVE-2021-45830 1 Hdfgroup 1 Hdf5 2022-01-12 4.3 MEDIUM 5.5 MEDIUM
A heap-based buffer overflow vulnerability exists in HDF5 1.13.1-1 via H5F_addr_decode_len in /hdf5/src/H5Fint.c, which could cause a Denial of Service.
CVE-2022-0122 1 Digitalbazaar 1 Forge 2022-01-12 5.8 MEDIUM 6.1 MEDIUM
forge is vulnerable to URL Redirection to Untrusted Site
CVE-2021-40111 1 Apache 1 James 2022-01-12 4.0 MEDIUM 6.5 MEDIUM
In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated to exploit this vulnerability. This affected Apache James prior to version 3.6.1. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade.
CVE-2020-15933 1 Fortinet 1 Fortimail 2022-01-12 5.0 MEDIUM 5.3 MEDIUM
A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.
CVE-2021-20133 1 Dlink 2 Dir-2640-us, Dir-2640-us Firmware 2022-01-12 7.1 HIGH 6.1 MEDIUM
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credentials, hardcoded plaintext passwords for other services, configuration files, and private keys can be disclosed in this fashion. Improper handling of filenames that identify virtual resources, such as "/dev/urandom" allows an attacker to effect a denial of service attack against the command line interfaces of the Quagga services (zebra and ripd).
CVE-2021-20132 1 Dlink 2 Dir-2640-us, Dir-2640-us Firmware 2022-01-12 8.3 HIGH 8.8 HIGH
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the router (i.e., as the "admin" user, UID 0).
CVE-2021-40110 1 Apache 1 James 2022-01-12 5.0 MEDIUM 7.5 HIGH
In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE2J regular expression engine to execute regex in linear time without back-tracking.
CVE-2021-20134 1 Dlink 2 Dir-2640-us, Dir-2640-us Firmware 2022-01-12 7.4 HIGH 8.4 HIGH
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by either Quagga service (zebra or ripd). Subsequent log messages will be appended to the file, prefixed by a timestamp and some logging metadata. Remote code execution can be achieved by using this vulnerability to append to a shell script on the router's filesystem, and then awaiting or triggering the execution of that script. A remote, unauthenticated root shell can easily be obtained on the device in this fashion.
CVE-2021-34797 1 Apache 1 Geode 2022-01-12 5.0 MEDIUM 7.5 HIGH
Apache Geode versions up to 1.12.4 and 1.13.4 are vulnerable to a log file redaction of sensitive information flaw when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix "sysprop-", "javax.net.ssl", or "security-". This issue is fixed by overhauling the log file redaction in Apache Geode versions 1.12.5, 1.13.5, and 1.14.0.
CVE-2017-13905 1 Apple 5 Iphone Os, Mac Os X, Macos and 2 more 2022-01-12 6.8 MEDIUM 8.1 HIGH
A race condition was addressed with additional validation. This issue is fixed in tvOS 11.2, iOS 11.2, macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan, watchOS 4.2. An application may be able to gain elevated privileges.
CVE-2021-45896 1 Nokia 2 Fastmile, Fastmile Firmware 2022-01-12 6.0 MEDIUM 8.8 HIGH
Nokia FastMile 3TG00118ABAD52 devices allow privilege escalation by an authenticated user via is_ctc_admin=1 to login_web_app.cgi and use of Import Config File.