Search Results (9783 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-3845 1 Ws Scrcpy Project 1 Ws Scrcpy 2024-11-21 7.5 High
ws-scrcpy is vulnerable to External Control of File Name or Path
CVE-2021-3836 1 Dbeaver 1 Dbeaver 2024-11-21 5.5 Medium
dbeaver is vulnerable to Improper Restriction of XML External Entity Reference
CVE-2021-3833 1 Artica 1 Integria Ims 2024-11-21 9.8 Critical
Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords.
CVE-2021-3829 1 Openwhyd 1 Openwhyd 2024-11-21 6.1 Medium
openwhyd is vulnerable to URL Redirection to Untrusted Site
CVE-2021-3828 1 Nltk 1 Nltk 2024-11-21 7.5 High
nltk is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3813 1 Chatwoot 1 Chatwoot 2024-11-21 6.5 Medium
Improper Privilege Management in GitHub repository chatwoot/chatwoot prior to v2.2.
CVE-2021-3779 1 Ruby-mysql Project 1 Ruby-mysql 2024-11-21 6.5 Medium
A malicious MySQL server can request local file content from a client using ruby-mysql prior to version 2.10.0 without explicit authorization from the user. This issue was resolved in version 2.10.0 and later.
CVE-2021-3664 1 Url-parse Project 1 Url-parse 2024-11-21 5.3 Medium
url-parse is vulnerable to URL Redirection to Untrusted Site
CVE-2021-3654 2 Openstack, Redhat 3 Nova, Openstack, Openstack Platform 2024-11-21 6.1 Medium
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
CVE-2021-3647 1 Uri.js Project 1 Uri.js 2024-11-21 6.1 Medium
URI.js is vulnerable to URL Redirection to Untrusted Site
CVE-2021-3639 2 Redhat, Uninett 2 Enterprise Linux, Mod Auth Mellon 2024-11-21 6.1 Medium
A flaw was found in mod_auth_mellon where it does not sanitize logout URLs properly. This issue could be used by an attacker to facilitate phishing attacks by tricking users into visiting a trusted web application URL that redirects to an external and potentially malicious server. The highest threat from this liability is to confidentiality and integrity.
CVE-2021-3614 1 Lenovo 42 100e 2nd Gen, 100e 2nd Gen Firmware, 300e 2nd Gen and 39 more 2024-11-21 6.4 Medium
A vulnerability was reported on some Lenovo Notebook systems that could allow an attacker with physical access to elevate privileges under certain conditions during a BIOS update performed by Lenovo Vantage.
CVE-2021-3565 3 Fedoraproject, Redhat, Tpm2-tools Project 3 Fedora, Enterprise Linux, Tpm2-tools 2024-11-21 5.9 Medium
A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.
CVE-2021-3531 2 Fedoraproject, Redhat 3 Fedora, Ceph, Ceph Storage 2024-11-21 5.3 Medium
A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes it can cause the rgw to crash, resulting in a denial of service. The greatest threat to the system is of availability.
CVE-2021-3530 2 Gnu, Netapp 2 Binutils, Ontap Select Deploy Administration Utility 2024-11-21 7.5 High
A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.
CVE-2021-3502 2 Avahi, Redhat 2 Avahi, Enterprise Linux 2024-11-21 5.5 Medium
A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.
CVE-2021-3461 1 Redhat 3 Keycloak, Red Hat Single Sign On, Single Sign-on 2024-11-21 7.1 High
A flaw was found in keycloak where keycloak may fail to logout user session if the logout request comes from external SAML identity provider and Principal Type is set to Attribute [Name].
CVE-2021-3454 1 Zephyrproject 1 Zephyr 2024-11-21 4.3 Medium
Truncated L2CAP K-frame causes assertion failure. Zephyr versions >= 2.4.0, >= v.2.50 contain Improper Handling of Length Parameter Inconsistency (CWE-130), Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3
CVE-2021-3444 3 Canonical, Debian, Linux 3 Ubuntu Linux, Debian Linux, Linux Kernel 2024-11-21 7.8 High
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
CVE-2021-3436 1 Zephyrproject 1 Zephyr 2024-11-21 4.3 Medium
BT: Possible to overwrite an existing bond during keys distribution phase when the identity address of the bond is known. Zephyr versions >= 1.14.2, >= 2.4.0, >= 2.5.0 contain Use of Multiple Resources with Duplicate Identifier (CWE-694). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63