Latest CVE Feed
-
5.3
MEDIUMCVE-2021-41114
TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP Host header. TYPO3 uses the HTTP Host header, for exam... Read more
Affected Products : typo3- Published: Oct. 05, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-41113
TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the new TYPO3 v11 feature that allows users to create and share deep links in the backend user interface is vulnerable to cross-site-re... Read more
Affected Products : typo3- Published: Oct. 05, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-41112
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In versions prior to 3.4.5, authenticated users could craft a request to modify or delete System or Project level Calendars, without appropriate authorizatio... Read more
Affected Products : rundeck- Published: Feb. 28, 2022
- Modified: Nov. 21, 2024
-
6.4
MEDIUMCVE-2021-41111
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definition... Read more
Affected Products : rundeck- Published: Feb. 28, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-41110
cwlviewer is a web application to view and share Common Workflow Language workflows. Versions prior to 1.3.1 contain a Deserialization of Untrusted Data vulnerability. Commit number f6066f09edb70033a2ce80200e9fa9e70a5c29de (dated 2021-09-30) contains a pa... Read more
Affected Products : cwlviewer- Published: Oct. 01, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41109
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to version 4.10.4, for regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currentl... Read more
Affected Products : parse-server- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
4.4
MEDIUMCVE-2021-41106
JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tok... Read more
- Published: Sep. 28, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41105
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is suscepti... Read more
Affected Products : freeswitch- Published: Oct. 25, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41104
ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined ba... Read more
- Published: Sep. 28, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-41103
containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unpriv... Read more
- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024
-
5.7
MEDIUMCVE-2021-41101
wire-server is an open-source back end for Wire, a secure collaboration platform. Before version 2.106.0, the CORS ` Access-Control-Allow-Origin ` header set by `nginz` is set for all subdomains of `.wire.com` (including `wire.com`). This means that if so... Read more
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-41100
Wire-server is the backing server for the open source wire secure messaging application. In affected versions it is possible to trigger email address change of a user with only the short-lived session token in the `Authorization` header. As the short-live... Read more
- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41099
Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code execution. The vulnerability involves ... Read more
- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41098
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted do... Read more
Affected Products : nokogiri- Published: Sep. 27, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-41097
aurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses `aurelia-path` package to... Read more
Affected Products : aurelia-path- Published: Sep. 27, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41096
Rucky is a USB HID Rubber Ducky Launch Pad for Android. Versions 2.2 and earlier for release builds and versions 425 and earlier for nightly builds suffer from use of a weak cryptographic algorithm (RSA/ECB/PKCS1Padding). The issue will be patched in v2.3... Read more
Affected Products : rucky- Published: Sep. 27, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-41095
Discourse is an open source discussion platform. There is a cross-site scripting (XSS) vulnerability in versions 2.7.7 and earlier of the `stable` branch, versions 2.8.0.beta6 and earlier of the `beta` branch, and versions 2.8.0.beta6 and earlier of the `... Read more
Affected Products : discourse- Published: Sep. 27, 2021
- Modified: Nov. 21, 2024
-
4.6
MEDIUMCVE-2021-41094
Wire is an open source secure messenger. Users of Wire by Bund may bypass the mandatory encryption at rest feature by simply disabling their device passcode. Upon launching, the app will attempt to enable encryption at rest by generating encryption keys v... Read more
Affected Products : wire- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-41093
Wire is an open source secure messenger. In affected versions if the an attacker gets an old but valid access token they can take over an account by changing the email. This issue has been resolved in version 3.86 which uses a new endpoint which additiona... Read more
Affected Products : wire- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-41092
Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a... Read more
- Published: Oct. 04, 2021
- Modified: Nov. 21, 2024