Latest CVE Feed
-
7.1
HIGHCVE-2021-41057
In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.... Read more
Affected Products : windows codemeter_runtime simatic_pcs_neo pss_cape pss_e pss_odms sicam_230 simatic_information_server simatic_process_historian simatic_wincc_oa +1 more products- Published: Nov. 14, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41055
Gajim 1.2.x and 1.3.x before 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted XMPP Last Message Correction (XEP-0308) message in multi-user chat, where the message ID equals the correction ID.... Read more
Affected Products : gajim- Published: Oct. 11, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41054
tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options.... Read more
- Published: Sep. 13, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-41043
Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.... Read more
Affected Products : tcpslice- Published: Jan. 05, 2022
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-41042
In Eclipse Lyo versions 1.0.0 to 4.1.0, a TransformerFactory is initialized with the defaults that do not restrict DTD loading when working with RDF/XML. This allows an attacker to cause an external DTD to be retrieved.... Read more
Affected Products : lyo- Published: Jul. 07, 2022
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-41041
In Eclipse Openj9 before version 0.32.0, Java 8 & 11 fail to throw the exception captured during bytecode verification when verification is triggered by a MethodHandle invocation, allowing unverified methods to be invoked using MethodHandles.... Read more
- Published: Apr. 27, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41040
In Eclipse Wakaama, ever since its inception until 2021-01-14, the CoAP parsing code does not properly sanitize network-received data.... Read more
Affected Products : wakaama- Published: Feb. 01, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41039
In versions 1.6 to 2.0.11 of Eclipse Mosquitto, an MQTT v5 client connecting with a large number of user-property properties could cause excessive CPU usage, leading to a loss of performance and possible denial of service.... Read more
Affected Products : mosquitto- Published: Dec. 01, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-41038
In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().... Read more
Affected Products : theia- Published: Nov. 10, 2021
- Modified: Nov. 21, 2024
-
10.0
CRITICALCVE-2021-41037
In Eclipse p2, installable units are able to alter the Eclipse Platform installation and the local machine via touchpoints during installation. Those touchpoints can, for example, alter the command-line used to start the application, injecting things like... Read more
Affected Products : equinox_p2- Published: Jul. 08, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-41036
In versions prior to 1.1 of the Eclipse Paho MQTT C Client, the client does not check rem_len size in readpacket.... Read more
Affected Products : paho_mqtt_c\/c\+\+_client- Published: Nov. 03, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-41035
In Eclipse Openj9 before version 0.29.0, the JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods.... Read more
Affected Products : openj9- Published: Oct. 25, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-41034
The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with a... Read more
Affected Products : che- Published: Sep. 29, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-41033
In all released versions of Eclipse Equinox, at least until version 4.21 (September 2021), installation can be vulnerable to man-in-the-middle attack if using p2 repos that are HTTP; that can then be exploited to serve incorrect p2 metadata and entirely a... Read more
Affected Products : equinox- Published: Sep. 13, 2021
- Modified: Nov. 21, 2024
-
6.3
MEDIUMCVE-2021-41032
An improper access control vulnerability [CWE-284] in FortiOS versions 6.4.8 and prior and 7.0.3 and prior may allow an authenticated attacker with a restricted user profile to gather sensitive information and modify the SSL-VPN tunnel status of other VDO... Read more
Affected Products : fortios- Published: May. 04, 2022
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-41031
A relative path traversal vulnerability [CWE-23] in FortiClient for Windows versions 7.0.2 and prior, 6.4.6 and prior and 6.2.9 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for For... Read more
Affected Products : forticlient- Published: Jul. 18, 2022
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-41030
An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication... Read more
Affected Products : forticlient_enterprise_management_server- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
6.4
MEDIUMCVE-2021-41029
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWLM version 8.6.1 and below allows attacker to store malicious javascript code in the device and trigger it via crafted HTTP requests... Read more
Affected Products : fortiwlm- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2021-41028
A combination of a use of hard-coded cryptographic key vulnerability [CWE-321] in FortiClientEMS 7.0.1 and below, 6.4.6 and below and an improper certificate validation vulnerability [CWE-297] in FortiClientWindows, FortiClientLinux and FortiClientMac 7.0... Read more
- Published: Dec. 16, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-41027
A stack-based buffer overflow in Fortinet FortiWeb version 6.4.1 and 6.4.0, allows an authenticated attacker to execute unauthorized code or commands via crafted certificates loaded into the device.... Read more
Affected Products : fortiweb- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024