Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-24853 | 1 Qr Redirector Project | 1 Qr Redirector | 2021-11-19 | 4.3 MEDIUM | 4.3 MEDIUM |
The QR Redirector WordPress plugin before 1.6 does not have capability and CSRF checks when saving bulk QR Redirector settings via the qr_save_bulk AJAX action, which could allow any authenticated user, such as subscriber to change the redirect response status code of arbitrary QR Redirects | |||||
CVE-2021-33106 | 1 Intel | 1 Safestring Library | 2021-11-19 | 4.6 MEDIUM | 7.8 HIGH |
Integer overflow in the Safestring library maintained by Intel(R) may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2021-43047 | 1 Tibco | 1 Partnerexpress | 2021-11-19 | 8.5 HIGH | 9.0 CRITICAL |
The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain easily exploitable Stored and Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below. | |||||
CVE-2021-0620 | 2 Google, Mediatek | 77 Android, Mt5522, Mt5527 and 74 more | 2021-11-19 | 2.1 LOW | 5.5 MEDIUM |
In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381. | |||||
CVE-2021-24802 | 1 Gesundheit-bewegt | 1 Colorful Categories | 2021-11-19 | 4.3 MEDIUM | 6.5 MEDIUM |
The Colorful Categories WordPress plugin before 2.0.15 does not enforce nonce checks which could allow attackers to make a logged in admin or editor change taxonomy colors via a CSRF attack | |||||
CVE-2021-0621 | 2 Google, Mediatek | 76 Android, Mt5522, Mt5527 and 73 more | 2021-11-19 | 2.1 LOW | 5.5 MEDIUM |
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383. | |||||
CVE-2021-24796 | 1 My Tickets Project | 1 My Tickets | 2021-11-19 | 4.3 MEDIUM | 6.1 MEDIUM |
The My Tickets WordPress plugin before 1.8.31 does not properly sanitise and escape the Email field of booked tickets before outputting it in the Payment admin dashboard, which could allow unauthenticated users to perform Cross-Site Scripting attacks against admins | |||||
CVE-2021-33086 | 1 Intel | 206 Nuc 10 Performance Kit Nuc10i3fnh, Nuc 10 Performance Kit Nuc10i3fnh Firmware, Nuc 10 Performance Kit Nuc10i3fnhf and 203 more | 2021-11-19 | 4.9 MEDIUM | 5.5 MEDIUM |
Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access. | |||||
CVE-2021-3939 | 1 Canonical | 2 Accountsservice, Ubuntu Linux | 2021-11-19 | 7.2 HIGH | 7.8 HIGH |
Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1. | |||||
CVE-2021-26325 | 1 Amd | 40 Epyc 7232p, Epyc 7232p Firmware, Epyc 72f3 and 37 more | 2021-11-19 | 2.1 LOW | 5.5 MEDIUM |
Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service. | |||||
CVE-2021-43048 | 1 Tibco | 1 Partnerexpress | 2021-11-19 | 10.0 HIGH | 9.8 CRITICAL |
The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below. | |||||
CVE-2021-26331 | 1 Amd | 116 Epyc 7001, Epyc 7001 Firmware, Epyc 7002 and 113 more | 2021-11-19 | 7.2 HIGH | 7.8 HIGH |
AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution. | |||||
CVE-2021-41269 | 1 Cron-utils Project | 1 Cron-utils | 2021-11-19 | 6.8 MEDIUM | 9.8 CRITICAL |
cron-utils is a Java library to define, parse, validate, migrate crons as well as get human readable descriptions for them. In affected versions A template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected. The issue was patched and a new version was released. Please upgrade to version 9.1.6. There are no known workarounds known. | |||||
CVE-2021-26330 | 1 Amd | 116 Epyc 7001, Epyc 7001 Firmware, Epyc 7002 and 113 more | 2021-11-19 | 2.1 LOW | 5.5 MEDIUM |
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources. | |||||
CVE-2021-41266 | 1 Min | 1 Minio Console | 2021-11-19 | 6.8 MEDIUM | 9.8 CRITICAL |
Minio console is a graphical user interface for the for MinIO operator. Minio itself is a multi-cloud object storage project. Affected versions are subject to an authentication bypass issue in the Operator Console when an external IDP is enabled. All users on release v0.12.2 and before are affected and are advised to update to 0.12.3 or newer. Users unable to upgrade should add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes service account token. | |||||
CVE-2021-26327 | 1 Amd | 40 Epyc 7003, Epyc 7003 Firmware, Epyc 72f3 and 37 more | 2021-11-19 | 2.1 LOW | 5.5 MEDIUM |
Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality. | |||||
CVE-2021-26321 | 1 Amd | 114 Epyc 7232p, Epyc 7232p Firmware, Epyc 7251 and 111 more | 2021-11-19 | 4.9 MEDIUM | 5.5 MEDIUM |
Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP. | |||||
CVE-2021-0619 | 2 Google, Mediatek | 47 Android, Mt6739, Mt6758 and 44 more | 2021-11-19 | 2.1 LOW | 5.5 MEDIUM |
In ape extractor, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561395; Issue ID: ALPS05561395. | |||||
CVE-2021-26323 | 1 Amd | 40 Epyc 7232p, Epyc 7232p Firmware, Epyc 72f3 and 37 more | 2021-11-19 | 4.6 MEDIUM | 7.8 HIGH |
Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity. | |||||
CVE-2021-43046 | 1 Tibco | 1 Partnerexpress | 2021-11-19 | 9.3 HIGH | 8.8 HIGH |
The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain an easily exploitable vulnerability that allows an unauthenticated attacker with network access to obtain session tokens for the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below. |