Latest CVE Feed
-
6.5
MEDIUMCVE-2021-28146
The team sync HTTP API in Grafana Enterprise 7.4.x before 7.4.5 has an Incorrect Access Control issue. On Grafana instances using an external authentication service, this vulnerability allows any authenticated user to add external groups to existing teams... Read more
Affected Products : grafana- EPSS Score: %0.34
- Published: Mar. 22, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-28145
Concrete CMS (formerly concrete5) before 8.5.5 allows remote authenticated users to conduct XSS attacks via a crafted survey block. This requires at least Editor privileges.... Read more
- EPSS Score: %0.20
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-28144
prog.cgi on D-Link DIR-3060 devices before 1.11b04 HF2 allows remote authenticated users to inject arbitrary commands in an admin or root context because SetVirtualServerSettings calls CheckArpTables, which calls popen unsafely.... Read more
- EPSS Score: %5.06
- Published: Mar. 11, 2021
- Modified: Nov. 21, 2024
-
8.0
HIGHCVE-2021-28143
/jsonrpc on D-Link DIR-841 3.03 and 3.04 devices allows authenticated command injection via ping, ping6, or traceroute (under System Tools).... Read more
- EPSS Score: %20.62
- Published: Mar. 11, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-28142
CITSmart before 9.1.2.28 mishandles the "filtro de autocomplete."... Read more
Affected Products : citsmart- EPSS Score: %6.22
- Published: Apr. 06, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-28139
The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32... Read more
- EPSS Score: %0.46
- Published: Sep. 07, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-28136
The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of multiple LMP IO Capability Request packets during the pairing process, allowing attackers in radio range to trigger memory corruption (and ... Read more
- EPSS Score: %0.29
- Published: Sep. 07, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-28135
The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (crash) in ESP32 by flooding the tar... Read more
Affected Products : esp-idf- EPSS Score: %0.23
- Published: Sep. 07, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-28134
Clipper before 1.0.5 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal API.... Read more
Affected Products : clipper- EPSS Score: %8.18
- Published: Mar. 11, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-28133
Zoom through 5.5.4 sometimes allows attackers to read private information on a participant's screen, even though the participant never attempted to share the private part of their screen. When a user shares a specific application window via the Share Scre... Read more
Affected Products : zoom- EPSS Score: %1.32
- Published: Mar. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-28132
LUCY Security Awareness Software through 4.7.x allows unauthenticated remote code execution because the Migration Tool (in the Support section) allows upload of .php files within a system.tar.gz file. The .php file becomes accessible with a public/system/... Read more
Affected Products : security_awareness- EPSS Score: %3.11
- Published: Mar. 11, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-28131
Impala sessions use a 16 byte secret to verify that the session is not being hijacked by another user. However, these secrets appear in the Impala logs, therefore Impala users with access to the logs can use another authenticated user's sessions with spec... Read more
Affected Products : impala- EPSS Score: %0.59
- Published: Jul. 22, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-28130
Dr.Web Firewall 12.5.2.4160 on Windows incorrectly restricts applications signed by Dr.Web. A DLL for a custom payload within a legitimate binary (e.g., frwl_svc.exe) bypasses firewall filters.... Read more
- EPSS Score: %0.06
- Published: Sep. 24, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-28129
While working on Apache OpenOffice 4.1.8 a developer discovered that the DEB package did not install using root, but instead used a userid and groupid of 500. This both caused issues with desktop integration and could allow a crafted attack on files owned... Read more
Affected Products : openoffice- EPSS Score: %0.22
- Published: Oct. 07, 2021
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2021-28128
In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.... Read more
Affected Products : strapi- EPSS Score: %0.26
- Published: May. 06, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-28127
An issue was discovered in Stormshield SNS through 4.2.1. A brute-force attack can occur.... Read more
Affected Products : stormshield_network_security- EPSS Score: %0.22
- Published: Jul. 01, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-28126
index.jsp in TranzWare e-Commerce Payment Gateway (TWEC PG) before 3.1.27.5 had a Stored cross-site scripting (XSS) vulnerability... Read more
Affected Products : tranzware_e-commerce_payment_gateway- EPSS Score: %0.24
- Published: Mar. 19, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-28125
Apache Superset up to and including 1.0.1 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashb... Read more
Affected Products : superset- EPSS Score: %4.82
- Published: Apr. 27, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-28124
A man-in-the-middle vulnerability in Cohesity DataPlatform support channel in version 6.3 up to 6.3.1g, 6.4 up to 6.4.1c and 6.5.1 through 6.5.1b. Missing server authentication in impacted versions can allow an attacker to Man-in-the-middle (MITM) support... Read more
- EPSS Score: %0.30
- Published: Apr. 02, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-28123
Undocumented Default Cryptographic Key Vulnerability in Cohesity DataPlatform version 6.3 prior 6.3.1g, 6.4 up to 6.4.1c and 6.5.1 through 6.5.1b. The ssh key can provide an attacker access to the linux system in the affected version.... Read more
- EPSS Score: %0.84
- Published: Apr. 02, 2021
- Modified: Nov. 21, 2024