Latest CVE Feed
-
5.5
MEDIUMCVE-2021-31552
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly executed certain rules related to blocking accounts after account creation. Such rules would allow for user accounts to be created while blocking only the IP... Read more
Affected Products : mediawiki- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-31551
An issue was discovered in the PageForms extension for MediaWiki through 1.35.2. Crafted payloads for Token-related query parameters allowed for XSS on certain PageForms-managed MediaWiki pages.... Read more
Affected Products : mediawiki- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-31550
An issue was discovered in the CommentBox extension for MediaWiki through 1.35.2. Via crafted configuration variables, a malicious actor could introduce XSS payloads into various layers.... Read more
Affected Products : mediawiki- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-31549
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The Special:AbuseFilter/examine form allowed for the disclosure of suppressed MediaWiki usernames to unprivileged users.... Read more
Affected Products : mediawiki- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-31548
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. A MediaWiki user who is partially blocked or was unsuccessfully blocked could bypass AbuseFilter and have their edits completed.... Read more
Affected Products : mediawiki- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-31547
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. Its AbuseFilterCheckMatch API reveals suppressed edits and usernames to unprivileged users through the iteration of crafted AbuseFilter rules.... Read more
Affected Products : mediawiki- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-31546
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly logged sensitive suppression deletions, which should not have been visible to users with access to view AbuseFilter log data.... Read more
Affected Products : mediawiki- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-31545
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The page_recent_contributors leaked the existence of certain deleted MediaWiki usernames, related to rev_deleted.... Read more
Affected Products : mediawiki- Published: Apr. 22, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-31542
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.... Read more
- Published: May. 05, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-31540
Wowza Streaming Engine through 4.8.5 (in a default installation) has incorrect file permissions of configuration files in the conf/ directory. A regular local user is able to read and write to all the configuration files, e.g., modify the application serv... Read more
Affected Products : streaming_engine- Published: Apr. 23, 2021
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2021-31539
Wowza Streaming Engine before 4.8.8.01 (in a default installation) has cleartext passwords stored in the conf/admin.password file. A regular local user is able to read usernames and passwords.... Read more
Affected Products : streaming_engine- Published: Apr. 23, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-31537
SIS SIS-REWE Go before 7.7 SP17 allows XSS: rewe/prod/web/index.php (affected parameters are config, version, win, db, pwd, and user) and /rewe/prod/web/rewe_go_check.php (version and all other parameters).... Read more
Affected Products : sis-rewe_go- Published: May. 11, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-31535
LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests wi... Read more
- Published: May. 27, 2021
- Modified: Nov. 21, 2024
-
6.8
MEDIUMCVE-2021-31532
NXP LPC55S6x microcontrollers (0A and 1B), i.MX RT500 (silicon rev B1 and B2), i.MX RT600 (silicon rev A0, B0), LPC55S6x, LPC55S2x, LPC552x (silicon rev 0A, 1B), LPC55S1x, LPC551x (silicon rev 0A) and LPC55S0x, LPC550x (silicon rev 0A) include an undocume... Read more
- Published: May. 06, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-31525
net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.... Read more
- Published: May. 27, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-31523
The Debian xscreensaver 5.42+dfsg1-1 package for XScreenSaver has cap_net_raw enabled for the /usr/libexec/xscreensaver/sonar file, which allows local users to gain privileges because this is arguably incompatible with the design of the Mesa 3D Graphics l... Read more
Affected Products : xscreensaver- Published: Apr. 21, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-31522
Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.... Read more
Affected Products : kylin- Published: Jan. 06, 2022
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-31521
Trend Micro InterScan Web Security Virtual Appliance version 6.5 was found to have a reflected cross-site scripting (XSS) vulnerability in the product's Captive Portal.... Read more
Affected Products : interscan_web_security_virtual_appliance- Published: Jun. 17, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-31520
A weak session token authentication bypass vulnerability in Trend Micro IM Security 1.6 and 1.6.5 could allow an remote attacker to guess currently logged-in administrators' session session token in order to gain access to the product's web management int... Read more
Affected Products : im_security- Published: May. 10, 2021
- Modified: Nov. 21, 2024