Latest CVE Feed
-
5.4
MEDIUMCVE-2021-38149
index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS.... Read more
Affected Products : patient_management_system- EPSS Score: %0.16
- Published: Aug. 06, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38148
Obsidian before 0.12.12 does not require user confirmation for non-http/https URLs.... Read more
Affected Products : obsidian- EPSS Score: %0.50
- Published: Aug. 07, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-38147
Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to download arbitrary files, such as reports containing sensitive information, because authentication is not required for API access to processexecution/DownloadExcelFile/Domain_... Read more
Affected Products : holmes- EPSS Score: %63.25
- Published: Nov. 29, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-38146
The File Download API in Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to read arbitrary files via absolute path traversal in the SearchString JSON field in /home/download POST data.... Read more
Affected Products : holmes- EPSS Score: %45.09
- Published: Nov. 22, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38145
An issue was discovered in Form Tools through 3.0.20. SQL Injection can occur via the export_group_id field when a low-privileged user (client) tries to export a form with data, e.g., manipulation of modules/export_manager/export.php?export_group_id=1&exp... Read more
Affected Products : core- EPSS Score: %2.77
- Published: Aug. 31, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-38144
An issue was discovered in Form Tools through 3.0.20. A low-privileged user can trigger Reflected XSS when a viewing a form via the submission_id parameter, e.g., clients/forms/edit_submission.php?form_id=1&view_id=1&submission_id=[XSS].... Read more
Affected Products : core- EPSS Score: %0.41
- Published: Aug. 31, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-38143
An issue was discovered in Form Tools through 3.0.20. When an administrator creates a customer account, it is possible for the customer to log in and proceed with a change of name and last name. However, these fields are vulnerable to XSS payload insertio... Read more
Affected Products : core- EPSS Score: %1.07
- Published: Aug. 31, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-38142
Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgr... Read more
Affected Products : mirrorop_windows_sender- EPSS Score: %0.09
- Published: Sep. 07, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38140
The set_user extension module before 2.0.1 for PostgreSQL allows a potential privilege escalation using RESET SESSION AUTHORIZATION after set_user().... Read more
Affected Products : set_user- EPSS Score: %0.36
- Published: Aug. 10, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-38138
OneNav beta 0.9.12 allows XSS via the Add Link feature. NOTE: the vendor's position is that there intentionally is not any XSS protection at present, because the attack risk is largely limited to a compromised account; however, XSS protection is planned f... Read more
- EPSS Score: %0.35
- Published: Aug. 05, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-38137
Corero SecureWatch Managed Services 9.7.2.0020 does not correctly check swa-monitor and cns-monitor user’s privileges, allowing a user to perform actions not belonging to his role.... Read more
Affected Products : securewatch_managed_services- EPSS Score: %0.21
- Published: Aug. 06, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-38136
Corero SecureWatch Managed Services 9.7.2.0020 is affected by a Path Traversal vulnerability via the snap_file parameter in the /it-IT/splunkd/__raw/services/get_snapshot HTTP API endpoint. A ‘low privileged’ attacker can read any file on the target host.... Read more
Affected Products : securewatch_managed_services- EPSS Score: %0.38
- Published: Aug. 06, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-38130
A potential Information leakage vulnerability has been identified in versions of Micro Focus Voltage SecureMail Mail Relay prior to 7.3.0.1. The vulnerability could be exploited to create an information leakage attack.... Read more
Affected Products : voltage_securemail- EPSS Score: %0.26
- Published: Feb. 04, 2022
- Modified: Nov. 21, 2024
-
3.3
LOWCVE-2021-38129
Escalation of privileges vulnerability in Micro Focus in Micro Focus Operations Agent, affecting versions 12.x up to and including 12.21. The vulnerability could be exploited by a non-privileged local user to access system monitoring data collected by Ope... Read more
Affected Products : operations_agent- EPSS Score: %0.05
- Published: Jan. 25, 2022
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-38127
Potential vulnerabilities have been identified in Micro Focus ArcSight Enterprise Security Manager, affecting versions 7.4.x and 7.5.x. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS).... Read more
Affected Products : arcsight_enterprise_security_manager arcsight_enterprise_security_manager_express- EPSS Score: %0.24
- Published: Jan. 14, 2022
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-38126
Potential vulnerabilities have been identified in Micro Focus ArcSight Enterprise Security Manager, affecting versions 7.4.x and 7.5.x. The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS).... Read more
Affected Products : arcsight_enterprise_security_manager arcsight_enterprise_security_manager_express- EPSS Score: %0.24
- Published: Jan. 14, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38125
Unauthenticated remote code execution in Micro Focus Operations Bridge containerized, affecting versions 2021.05, 2021.08, and newer versions of Micro Focus Operations Bridge containerized if the deployment was upgraded from 2021.05 or 2021.08. The vulner... Read more
Affected Products : operations_bridge- EPSS Score: %1.66
- Published: Apr. 11, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38124
Remote Code Execution vulnerability in Micro Focus ArcSight Enterprise Security Manager (ESM) product, affecting versions 7.0.2 through 7.5. The vulnerability could be exploited resulting in remote code execution.... Read more
Affected Products : arcsight_enterprise_security_manager- EPSS Score: %2.10
- Published: Sep. 28, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-38123
Open Redirect vulnerability in Micro Focus Network Automation, affecting Network Automation versions 10.4x, 10.5x, 2018.05, 2018.11, 2019.05, 2020.02, 2020.08, 2020.11, 2021.05. The vulnerability could allow redirect users to malicious websites after auth... Read more
Affected Products : network_automation- EPSS Score: %0.23
- Published: Sep. 07, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-38115
read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.... Read more
Affected Products : libgd- EPSS Score: %0.29
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024