Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2021-32566

    Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.... Read more

    Affected Products : debian_linux traffic_server
    • Published: Jun. 30, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-32565

    Invalid values in the Content-Length header sent to Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.... Read more

    Affected Products : debian_linux traffic_server
    • Published: Jun. 29, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-32563

    An issue was discovered in Thunar before 4.16.7 and 4.17.x before 4.17.2. When called with a regular file as a command-line argument, it delegates to a different program (based on the file type) without user confirmation. This could be used to achieve cod... Read more

    Affected Products : thunar
    • Published: May. 11, 2021
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2021-32561

    OctoPrint before 1.6.0 allows XSS because API error messages include the values of input parameters.... Read more

    Affected Products : octoprint
    • Published: May. 11, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-32560

    The Logging subsystem in OctoPrint before 1.6.0 has incorrect access control because it attempts to manage files that are not *.log files.... Read more

    Affected Products : octoprint
    • Published: May. 11, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-32558

    An issue was discovered in Sangoma Asterisk 13.x before 13.38.3, 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before 18.5.1, and Certified Asterisk before 16.8-cert10. If the IAX2 channel driver receives a packet that contains an unsupported media fo... Read more

    • Published: Jul. 30, 2021
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2021-32557

    It was discovered that the process_report() function in data/whoopsie-upload-all allowed arbitrary file writes via symlinks.... Read more

    Affected Products : apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 3.8

    LOW
    CVE-2021-32556

    It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.... Read more

    Affected Products : apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-32555

    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.... Read more

    Affected Products : ubuntu_linux apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-32554

    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.... Read more

    Affected Products : ubuntu_linux apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-32553

    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.... Read more

    Affected Products : ubuntu_linux openjdk apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-32552

    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.... Read more

    Affected Products : ubuntu_linux apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-32551

    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-15 package apport hooks, it could expose private data to other local users.... Read more

    Affected Products : ubuntu_linux apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-32550

    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-14 package apport hooks, it could expose private data to other local users.... Read more

    Affected Products : ubuntu_linux apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-32549

    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-13 package apport hooks, it could expose private data to other local users.... Read more

    Affected Products : ubuntu_linux apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-32548

    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-8 package apport hooks, it could expose private data to other local users.... Read more

    Affected Products : ubuntu_linux apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-32547

    It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-lts package apport hooks, it could expose private data to other local users.... Read more

    Affected Products : ubuntu_linux apport
    • Published: Jun. 12, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-32546

    Missing input validation in internal/db/repo_editor.go in Gogs before 0.12.8 allows an attacker to execute code remotely. An unprivileged attacker (registered user) can overwrite the Git configuration in his repository. This leads to Remote Command Execut... Read more

    Affected Products : gogs
    • Published: Jun. 02, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-32545

    Pexip Infinity before 26 allows remote denial of service because of missing RTMP input validation.... Read more

    Affected Products : pexip_infinity infinity
    • Published: Jan. 15, 2022
    • Modified: Nov. 21, 2024
  • 5.4

    MEDIUM
    CVE-2021-32544

    Special characters of IGT search function in igt+ are not filtered in specific fields, which allow remote authenticated attackers can inject malicious JavaScript and carry out DOM-based XSS (Cross-site scripting) attacks.... Read more

    Affected Products : igt\+
    • Published: May. 11, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 293261 Results