Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2021-41121

    Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue h... Read more

    Affected Products : vyper
    • Published: Oct. 06, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-41120

    sylius/paypal-plugin is a paypal plugin for the Sylius development platform. In affected versions the URL to the payment page done after checkout was created with autoincremented payment id (/pay-with-paypal/{id}) and therefore it was easy to predict. The... Read more

    Affected Products : sylius paypal
    • Published: Oct. 05, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-41119

    Wire-server is the system server for the wire back-end services. Releases prior to v2022-03-01 are subject to a denial of service attack via a crafted object causing a hash collision. This collision causes the server to spend at least quadratic time parsi... Read more

    Affected Products : wire wire-server
    • Published: Apr. 13, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-41118

    The DynamicPageList3 extension is a reporting tool for MediaWiki, listing category members and intersections with various formats and details. In affected versions unsanitised input of regular expression date within the parameters of the DPL parser functi... Read more

    Affected Products : dynamicpagelist3
    • Published: Oct. 04, 2021
    • Modified: Nov. 21, 2024
  • 9.1

    CRITICAL
    CVE-2021-41117

    keypair is a a RSA PEM key generator written in javascript. keypair implements a lot of cryptographic primitives on its own or by borrowing from other libraries where possible, including node-forge. An issue was discovered where this library was generatin... Read more

    Affected Products : keypair
    • Published: Oct. 11, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-41116

    Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not... Read more

    Affected Products : tenable.sc composer
    • Published: Oct. 05, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-41115

    Zulip is an open source team chat server. In affected versions Zulip allows organization administrators on a server to configure "linkifiers" that automatically create links from messages that users send, detected via arbitrary regular expressions. Malici... Read more

    Affected Products : zulip zulip_server
    • Published: Oct. 07, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-41114

    TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP Host header. TYPO3 uses the HTTP Host header, for exam... Read more

    Affected Products : typo3
    • Published: Oct. 05, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-41113

    TYPO3 is an open source PHP based web content management system released under the GNU GPL. It has been discovered that the new TYPO3 v11 feature that allows users to create and share deep links in the backend user interface is vulnerable to cross-site-re... Read more

    Affected Products : typo3
    • Published: Oct. 05, 2021
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2021-41112

    Rundeck is an open source automation service with a web console, command line tools and a WebAPI. In versions prior to 3.4.5, authenticated users could craft a request to modify or delete System or Project level Calendars, without appropriate authorizatio... Read more

    Affected Products : rundeck
    • Published: Feb. 28, 2022
    • Modified: Nov. 21, 2024
  • 6.4

    MEDIUM
    CVE-2021-41111

    Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Prior to versions 3.4.5 and 3.3.15, an authenticated user with authorization to read webhooks in one project can craft a request to reveal Webhook definition... Read more

    Affected Products : rundeck
    • Published: Feb. 28, 2022
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-41110

    cwlviewer is a web application to view and share Common Workflow Language workflows. Versions prior to 1.3.1 contain a Deserialization of Untrusted Data vulnerability. Commit number f6066f09edb70033a2ce80200e9fa9e70a5c29de (dated 2021-09-30) contains a pa... Read more

    Affected Products : cwlviewer
    • Published: Oct. 01, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-41109

    Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to version 4.10.4, for regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currentl... Read more

    Affected Products : parse-server
    • Published: Sep. 30, 2021
    • Modified: Nov. 21, 2024
  • 4.4

    MEDIUM
    CVE-2021-41106

    JWT is a library to work with JSON Web Token and JSON Web Signature. Prior to versions 3.4.6, 4.0.4, and 4.1.5, users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tok... Read more

    Affected Products : jwt jwt
    • Published: Sep. 28, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-41105

    FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is suscepti... Read more

    Affected Products : freeswitch
    • Published: Oct. 25, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-41104

    ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined ba... Read more

    Affected Products : esphome_firmware esp32 esp8266 esphome
    • Published: Sep. 28, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-41103

    containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unpriv... Read more

    Affected Products : fedora debian_linux containerd
    • Published: Oct. 04, 2021
    • Modified: Nov. 21, 2024
  • 5.7

    MEDIUM
    CVE-2021-41101

    wire-server is an open-source back end for Wire, a secure collaboration platform. Before version 2.106.0, the CORS ` Access-Control-Allow-Origin ` header set by `nginz` is set for all subdomains of `.wire.com` (including `wire.com`). This means that if so... Read more

    Affected Products : wire wire_server
    • Published: Sep. 30, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-41100

    Wire-server is the backing server for the open source wire secure messaging application. In affected versions it is possible to trigger email address change of a user with only the short-lived session token in the `Authorization` header. As the short-live... Read more

    Affected Products : wire wire-server
    • Published: Oct. 04, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-41099

    Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code execution. The vulnerability involves ... Read more

    • Published: Oct. 04, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 293508 Results