Latest CVE Feed
-
7.3
HIGHCVE-2021-32553
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.... Read more
- Published: Jun. 12, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-32552
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.... Read more
- Published: Jun. 12, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-32551
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.... Read more
- Published: Jun. 12, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-32550
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.... Read more
- Published: Jun. 12, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-32549
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-13 package apport hooks, it could expose private data to other local users.... Read more
- Published: Jun. 12, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-32548
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.... Read more
- Published: Jun. 12, 2021
- Modified: Nov. 21, 2024
-
7.3
HIGHCVE-2021-32547
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.... Read more
- Published: Jun. 12, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-32546
Missing input validation in internal/db/repo_editor.go in Gogs before 0.12.8 allows an attacker to execute code remotely. An unprivileged attacker (registered user) can overwrite the Git configuration in his repository. This leads to Remote Command Execut... Read more
Affected Products : gogs- Published: Jun. 02, 2022
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-32545
Pexip Infinity before 26 allows remote denial of service because of missing RTMP input validation.... Read more
- Published: Jan. 15, 2022
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-32544
Special characters of IGT search function in igt+ are not filtered in specific fields, which allow remote authenticated attackers can inject malicious JavaScript and carry out DOM-based XSS (Cross-site scripting) attacks.... Read more
Affected Products : igt\+- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-32543
The CTS Web transaction system related to authentication management is implemented incorrectly. After login, remote attackers can manipulate cookies to access other accounts and trade in the stock market with spoofed identity.... Read more
Affected Products : cts_web- Published: May. 28, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-32542
The parameters of the specific functions in the CTS Web trading system do not filter special characters, which allows unauthenticated attackers can remotely perform reflected XSS and obtain the users’ connection token that triggered the attack.... Read more
Affected Products : cts_web- Published: May. 28, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-32541
The CTS Web transaction system related to authentication and session management is implemented incorrectly, which allows remote unauthenticated attackers can send a large number of valid usernames, and force those logged-in account to log out, causing the... Read more
Affected Products : cts_web- Published: May. 28, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-32540
Add announcement function in the 101EIP system does not filter special characters, which allows authenticated users to inject JavaScript and perform a stored XSS attack.... Read more
Affected Products : 101eip- Published: May. 28, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-32539
Add event in calendar function in the 101EIP system does not filter special characters in specific fields, which allows remote authenticated users to inject JavaScript and perform a stored XSS attack.... Read more
Affected Products : 101eip- Published: May. 28, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-32538
ARTWARE CMS parameter of image upload function does not filter the type of upload files which allows remote attackers can upload arbitrary files without logging in, and further execute code unrestrictedly.... Read more
Affected Products : artware_cms- Published: Jul. 07, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-32537
Realtek HAD contains a driver crashed vulnerability which allows local side attackers to send a special string to the kernel driver in a user’s mode. Due to unexpected commands, the kernel driver will cause the system crashed.... Read more
Affected Products : hda_driver- Published: Jul. 07, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-32536
The login page in the MCUsystem does not filter with special characters, which allows remote attackers can inject JavaScript without privilege and thus perform reflected XSS attacks.... Read more
Affected Products : mcusystem- Published: Jun. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-32535
The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrator’s permission and execute arbitrary functions. The referred vulnerability has been solved with the updated version of QSAN SAN... Read more
Affected Products : sanos- Published: Jul. 07, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-32534
QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SAN... Read more
Affected Products : sanos- Published: Jul. 07, 2021
- Modified: Nov. 21, 2024