Latest CVE Feed
-
9.8
CRITICALCVE-2021-37909
WriteRegistry function in TSSServiSign component does not filter and verify users’ input, remote attackers can rewrite to the registry without permissions thus perform hijack attacks to execute arbitrary code.... Read more
Affected Products : tssservisignadapter- EPSS Score: %1.84
- Published: Sep. 15, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-37867
Mattermost Boards plugin v0.10.0 and earlier fails to protect email addresses of all users via one of the Boards APIs, which allows authenticated and unauthorized users to access this information resulting in sensitive & private information disclosure.... Read more
Affected Products : mattermost_boards- EPSS Score: %0.23
- Published: Jan. 18, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-37866
Mattermost Boards plugin v0.10.0 and earlier fails to invalidate a session on the server-side when a user logged out of Boards, which allows an attacker to reuse old session token for authorization.... Read more
Affected Products : mattermost_boards- EPSS Score: %0.19
- Published: Jan. 18, 2022
- Modified: Nov. 21, 2024
-
5.7
MEDIUMCVE-2021-37865
Mattermost 6.2 and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of... Read more
- EPSS Score: %0.60
- Published: Jan. 18, 2022
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-37864
Mattermost 6.1 and earlier fails to sufficiently validate permissions while viewing archived channels, which allows authenticated users to view contents of archived channels even when this is denied by system administrators by directly accessing the APIs.... Read more
- EPSS Score: %0.22
- Published: Jan. 18, 2022
- Modified: Nov. 21, 2024
-
5.7
MEDIUMCVE-2021-37863
Mattermost 6.0 and earlier fails to sufficiently validate parameters during post creation, which allows authenticated attackers to cause a client-side crash of the web application via a maliciously crafted post.... Read more
- EPSS Score: %0.57
- Published: Dec. 17, 2021
- Modified: Nov. 21, 2024
-
5.8
MEDIUMCVE-2021-37862
Mattermost 6.0 and earlier fails to sufficiently validate the email address during registration, which allows attackers to trick users into signing up using attacker-controlled email addresses via crafted invitation token.... Read more
- EPSS Score: %0.17
- Published: Dec. 17, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-37861
Mattermost 6.0.2 and earlier fails to sufficiently sanitize user's password in audit logs when user creation fails.... Read more
- EPSS Score: %0.34
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-37860
Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.... Read more
- EPSS Score: %0.36
- Published: Sep. 22, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-37859
Fixed a bypass for a reflected cross-site scripting vulnerability affecting OAuth-enabled instances of Mattermost.... Read more
- EPSS Score: %45.09
- Published: Aug. 05, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-37852
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.... Read more
- EPSS Score: %0.04
- Published: Feb. 09, 2022
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-37851
Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 vers... Read more
- EPSS Score: %0.03
- Published: May. 11, 2022
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-37850
ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot.... Read more
- EPSS Score: %0.05
- Published: Nov. 08, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-37848
common/password.c in Pengutronix barebox through 2021.07.0 leaks timing information because strncmp is used during hash comparison.... Read more
Affected Products : barebox- EPSS Score: %0.32
- Published: Aug. 02, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-37847
crypto/digest.c in Pengutronix barebox through 2021.07.0 leaks timing information because memcmp is used during digest verification.... Read more
Affected Products : barebox- EPSS Score: %0.32
- Published: Aug. 02, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-37843
The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6... Read more
Affected Products : saml_single_sign_on- EPSS Score: %0.91
- Published: Aug. 02, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-37842
metakv in Couchbase Server 7.0.0 uses Cleartext for Storage of Sensitive Information. Remote Cluster XDCR credentials can get leaked in debug logs. Config key tombstone purging was added in Couchbase Server 7.0.0. This issue happens when a config key, whi... Read more
Affected Products : couchbase_server- EPSS Score: %0.16
- Published: Nov. 02, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-37841
Docker Desktop before 3.6.0 suffers from incorrect access control. If a low-privileged account is able to access the server running the Windows containers, it can lead to a full container compromise in both process isolation and Hyper-V isolation modes. T... Read more
Affected Products : desktop- EPSS Score: %0.09
- Published: Aug. 12, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-37840
aaPanel through 6.8.12 allows Cross-Site WebSocket Hijacking (CSWH) involving OS commands within WebSocket messages at a ws:// URL for /webssh (the victim must have configured Terminal with at least one host). Successful exploitation depends on the browse... Read more
Affected Products : aapanel- EPSS Score: %0.40
- Published: Aug. 02, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-37839
Apache Superset up to 1.5.1 allowed for authenticated users to access metadata information related to datasets they have no permission on. This metadata included the dataset name, columns and metrics.... Read more
Affected Products : superset- EPSS Score: %0.18
- Published: Jul. 06, 2022
- Modified: Nov. 21, 2024