Latest CVE Feed
-
9.8
CRITICALCVE-2021-38188
An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely.... Read more
Affected Products : iced-x86- EPSS Score: %0.36
- Published: Aug. 08, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38187
An issue was discovered in the anymap crate through 0.12.1 for Rust. It violates soundness via conversion of a *u8 to a *u64.... Read more
Affected Products : anymap- EPSS Score: %0.36
- Published: Aug. 08, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-38186
An issue was discovered in the comrak crate before 0.10.1 for Rust. It mishandles & characters, leading to XSS via &# HTML entities.... Read more
Affected Products : comrak- EPSS Score: %0.20
- Published: Aug. 08, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-38183
SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim and exe... Read more
Affected Products : netweaver- EPSS Score: %0.60
- Published: Oct. 12, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-38182
Due to insufficient input validation of Kyma, authenticated users can pass a Header of their choice and escalate privileges which can completely compromise the cluster.... Read more
Affected Products : kyma- EPSS Score: %0.39
- Published: Dec. 14, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-38181
SAP NetWeaver AS ABAP and ABAP Platform - versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.... Read more
- EPSS Score: %0.47
- Published: Oct. 12, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38180
SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel (CSV injection) due to improper sanitation during the data export. An attacker could thereby execute arbitrary commands on the victim's computer but only i... Read more
Affected Products : business_one- EPSS Score: %1.55
- Published: Oct. 12, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-38179
Debug function of Admin UI of SAP Business One Integration is enabled by default. This allows Admin User to see the captured packet contents which may include User credentials.... Read more
Affected Products : business_one- EPSS Score: %0.34
- Published: Oct. 12, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-38178
The software logistics system of SAP NetWeaver AS ABAP and ABAP Platform versions - 700, 701, 702, 710, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, enables a malicious user to transfer ABAP code artifacts or content, by-passing the established quali... Read more
- EPSS Score: %0.45
- Published: Oct. 12, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-38177
SAP CommonCryptoLib version 8.5.38 or lower is vulnerable to null pointer dereference vulnerability when an unauthenticated attacker sends crafted malicious data in the HTTP requests over the network, this causes the SAP application to crash and has high ... Read more
Affected Products : commoncryptolib- EPSS Score: %3.08
- Published: Sep. 14, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-38176
Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query or inject ABAP code to gain access to Backend Database. On successfu... Read more
- EPSS Score: %0.72
- Published: Sep. 14, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-38175
SAP Analysis for Microsoft Office - version 2.8, allows an attacker with high privileges to read sensitive data over the network, and gather or change information in the current system without user interaction. The attack would not lead to an impact on th... Read more
Affected Products : analysis_for_microsoft_office- EPSS Score: %0.23
- Published: Sep. 14, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-38174
When a user opens manipulated files received from untrusted sources in SAP 3D Visual Enterprise Viewer version - 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.... Read more
Affected Products : 3d_visual_enterprise_viewer- EPSS Score: %0.29
- Published: Sep. 14, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38173
Btrbk before 0.31.2 allows command execution because of the mishandling of remote hosts filtering SSH commands using ssh_filter_btrbk.sh in authorized_keys.... Read more
- EPSS Score: %0.20
- Published: Aug. 07, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38172
perM 0.4.0 has a Buffer Overflow related to strncpy. (Debian initially fixed this in 0.4.0-7.)... Read more
Affected Products : perm- EPSS Score: %1.17
- Published: Feb. 05, 2022
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38171
adts_decode_extradata in libavformat/adtsenc.c in FFmpeg 4.4 does not check the init_get_bits return value, which is a necessary step because the second argument to init_get_bits can be crafted.... Read more
- EPSS Score: %0.24
- Published: Aug. 21, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-38169
Roxy-WI through 5.2.2.0 allows command injection via /app/funct.py and /api/api_funct.py.... Read more
Affected Products : roxy-wi- EPSS Score: %3.15
- Published: Aug. 07, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-38168
Roxy-WI through 5.2.2.0 allows authenticated SQL injection via select_servers.... Read more
Affected Products : roxy-wi- EPSS Score: %0.32
- Published: Aug. 07, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-38167
Roxy-WI through 5.2.2.0 allows SQL Injection via check_login. An unauthenticated attacker can extract a valid uuid to bypass authentication.... Read more
Affected Products : roxy-wi- EPSS Score: %1.05
- Published: Aug. 07, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-38166
In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.... Read more
- EPSS Score: %0.10
- Published: Aug. 07, 2021
- Modified: Nov. 21, 2024