Latest CVE Feed
-
7.5
HIGHCVE-2021-36174
A memory allocation with excessive size value vulnerability in the license verification function of FortiPortal before 6.0.6 may allow an attacker to perform a denial of service attack via specially crafted license blobs.... Read more
Affected Products : fortiportal- EPSS Score: %0.33
- Published: Nov. 02, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-36173
A heap-based buffer overflow in the firmware signature verification function of FortiOS versions 7.0.1, 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, and 6.0.0 through 6.0.13 may allow an attacker to execute arbitrary code via specially crafted install... Read more
Affected Products : fortios fortigate_1800f fortigate_2200e fortigate_3300e fortigate_3600e fortigate_40f fortigate_60f fortigate-1100e fortigate-200f fortigate-2600f +4 more products- EPSS Score: %0.63
- Published: Dec. 08, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-36172
An improper restriction of XML external entity reference vulnerability in the parser of XML responses of FortiPortal before 6.0.6 may allow an attacker who controls the producer of XML reports consumed by FortiPortal to trigger a denial of service or read... Read more
Affected Products : fortiportal- EPSS Score: %0.28
- Published: Nov. 02, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-36171
The use of a cryptographically weak pseudo-random number generator in the password reset feature of FortiPortal before 6.0.6 may allow a remote unauthenticated attacker to predict parts of or the whole newly generated password within a given time frame.... Read more
Affected Products : fortiportal- EPSS Score: %0.46
- Published: Mar. 01, 2022
- Modified: Nov. 21, 2024
-
3.2
LOWCVE-2021-36170
An information disclosure vulnerability [CWE-200] in FortiAnalyzerVM and FortiManagerVM versions 7.0.0 and 6.4.6 and below may allow an authenticated attacker to read the FortiCloud credentials which were used to activate the trial license in cleartext.... Read more
- EPSS Score: %0.05
- Published: Oct. 06, 2021
- Modified: Nov. 21, 2024
-
6.6
MEDIUMCVE-2021-36169
A Hidden Functionality in Fortinet FortiOS 7.x before 7.0.1, FortiOS 6.4.x before 6.4.7 allows attacker to Execute unauthorized code or commands via specific hex read/write operations.... Read more
Affected Products : fortios- EPSS Score: %0.03
- Published: Dec. 13, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-36168
A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Fortinet FortiPortal 6.x before 6.0.5, FortiPortal 5.3.x before 5.3.6 and any FortiPortal before 6.2.5 allows authenticated attacker to disclosure information via crafted ... Read more
Affected Products : fortiportal- EPSS Score: %0.20
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-36167
An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater.... Read more
Affected Products : forticlient- EPSS Score: %0.30
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-36166
An improper authentication vulnerability in FortiMail before 7.0.1 may allow a remote attacker to efficiently guess one administrative account's authentication token by means of the observation of certain system's properties.... Read more
Affected Products : fortimail- EPSS Score: %0.48
- Published: Mar. 01, 2022
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-36165
RICON Industrial Cellular Router S9922L 16.10.3(3794) is affected by cleartext storage of sensitive information and sends username and password as base64.... Read more
- EPSS Score: %0.11
- Published: Sep. 28, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-36163
In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the seriali... Read more
Affected Products : dubbo- EPSS Score: %1.61
- Published: Sep. 07, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-36162
Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in or... Read more
Affected Products : dubbo- EPSS Score: %1.25
- Published: Sep. 07, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-36161
Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some ... Read more
Affected Products : dubbo- EPSS Score: %2.73
- Published: Sep. 09, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-36159
libfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers in... Read more
Affected Products : libfetch- EPSS Score: %1.01
- Published: Aug. 03, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-36158
In the xrdp package (in branches through 3.14) for Alpine Linux, RDP sessions are vulnerable to man-in-the-middle attacks because pre-generated RSA certificates and private keys are used.... Read more
Affected Products : aports- EPSS Score: %0.08
- Published: Jul. 05, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-36157
An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will... Read more
Affected Products : cortex- EPSS Score: %0.32
- Published: Aug. 03, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-36156
An issue was discovered in Grafana Loki through 2.2.1. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Loki will att... Read more
Affected Products : loki- EPSS Score: %0.40
- Published: Aug. 03, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-36155
LengthPrefixedMessageReader in gRPC Swift 1.1.0 and earlier allocates buffers of arbitrary length, which allows remote attackers to cause uncontrolled resource consumption and deny service.... Read more
Affected Products : grpc_swift- EPSS Score: %0.85
- Published: Jul. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-36154
HTTP2ToRawGRPCServerCodec in gRPC Swift 1.1.1 and earlier allows remote attackers to deny service via the delivery of many small messages within a single HTTP/2 frame, leading to Uncontrolled Recursion and stack consumption.... Read more
Affected Products : grpc_swift- EPSS Score: %0.85
- Published: Jul. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-36153
Mismanaged state in GRPCWebToHTTP2ServerCodec.swift in gRPC Swift 1.1.0 and 1.1.1 allows remote attackers to deny service by sending malformed requests.... Read more
Affected Products : grpc_swift- EPSS Score: %1.36
- Published: Jul. 09, 2021
- Modified: Nov. 21, 2024