Latest CVE Feed
-
6.5
MEDIUMCVE-2021-32728
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud... Read more
- EPSS Score: %0.45
- Published: Aug. 18, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-32727
Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.16.1, the Nextcloud Android client skipped a step that ... Read more
- EPSS Score: %0.17
- Published: Jul. 12, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-32726
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, webauthn tokens were not deleted after a user has been deleted. If a victim reused an earlier used username, the previous user could gain ... Read more
- EPSS Score: %0.55
- Published: Jul. 12, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-32725
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, default share permissions were not being respected for federated reshares of files and folders. The issue was fixed in versions 19.0.13, 2... Read more
- EPSS Score: %0.27
- Published: Jul. 12, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-32724
check-spelling is a github action which provides CI spell checking. In affected versions and for a repository with the [check-spelling action](https://github.com/marketplace/actions/check-spelling) enabled that triggers on `pull_request_target` (or `sched... Read more
Affected Products : check-spelling- EPSS Score: %0.32
- Published: Sep. 09, 2021
- Modified: Nov. 21, 2024
-
7.4
HIGHCVE-2021-32723
Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very lon... Read more
- EPSS Score: %0.37
- Published: Jun. 28, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-32722
GlobalNewFiles is a mediawiki extension. Versions prior to 48be7adb70568e20e961ea1cb70904454a671b1d are affected by an uncontrolled resource consumption vulnerability. A large amount of page moves within a short space of time could overwhelm Database serv... Read more
Affected Products : globalnewfiles- EPSS Score: %0.75
- Published: Jun. 28, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-32721
PowerMux is a drop-in replacement for Go's http.ServeMux. In PowerMux versions prior to 1.1.1, attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redire... Read more
Affected Products : powermux- EPSS Score: %0.20
- Published: Jun. 29, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-32720
Sylius is an Open Source eCommerce platform on top of Symfony. In versions of Sylius prior to 1.9.5 and 1.10.0-RC.1, part of the details (order ID, order number, items total, and token value) of all placed orders were exposed to unauthorized users. If exp... Read more
Affected Products : sylius- EPSS Score: %0.22
- Published: Jun. 28, 2021
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2021-32719
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper <sc... Read more
- EPSS Score: %0.07
- Published: Jun. 28, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-32718
RabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.17, a new user being added via management UI could lead to the user's bane being rendered in a confirmation message without proper `<script>` tag sanitization, potentia... Read more
- EPSS Score: %0.07
- Published: Jun. 28, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-32717
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility ... Read more
Affected Products : shopware- EPSS Score: %0.41
- Published: Jun. 24, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-32716
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get t... Read more
Affected Products : shopware- EPSS Score: %0.38
- Published: Jun. 24, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-32715
hyper is an HTTP library for rust. hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HT... Read more
Affected Products : hyper- EPSS Score: %0.30
- Published: Jul. 07, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-32714
hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstr... Read more
Affected Products : hyper- EPSS Score: %0.40
- Published: Jul. 07, 2021
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2021-32713
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-U... Read more
Affected Products : shopware- EPSS Score: %0.39
- Published: Jun. 24, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-32712
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or dir... Read more
Affected Products : shopware- EPSS Score: %0.30
- Published: Jun. 24, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-32711
Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-... Read more
Affected Products : shopware- EPSS Score: %0.39
- Published: Jun. 24, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-32710
Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly vi... Read more
Affected Products : shopware- EPSS Score: %0.27
- Published: Jun. 24, 2021
- Modified: Nov. 21, 2024
-
4.9
MEDIUMCVE-2021-32709
Shopware is an open source eCommerce platform. Creation of order credits was not validated by ACL in admin orders. Users are recommend to update to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly v... Read more
Affected Products : shopware- EPSS Score: %0.18
- Published: Jun. 24, 2021
- Modified: Nov. 21, 2024