Latest CVE Feed
-
5.4
MEDIUMCVE-2021-25326
Skyworth Digital Technology RN510 V.3.1.0.4 is affected by an incorrect access control vulnerability in/cgi-bin/test_version.asp. If Wi-Fi is connected but an unauthenticated user visits a URL, the SSID password and web UI password may be disclosed.... Read more
- EPSS Score: %0.12
- Published: Apr. 09, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-25325
MISP 2.4.136 has XSS via galaxy cluster element values to app/View/GalaxyElements/ajax/index.ctp. Reference types could contain javascript: URLs.... Read more
- EPSS Score: %0.37
- Published: Jan. 19, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-25324
MISP 2.4.136 has Stored XSS in the galaxy cluster view via a cluster name to app/View/GalaxyClusters/view.ctp.... Read more
- EPSS Score: %0.32
- Published: Jan. 19, 2021
- Modified: Nov. 21, 2024
-
9.1
CRITICALCVE-2021-25323
The default setting of MISP 2.4.136 did not enable the requirements (aka require_password_confirmation) to provide the previous password when changing a password.... Read more
- EPSS Score: %0.26
- Published: Jan. 19, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-25322
A UNIX Symbolic Link (Symlink) Following vulnerability in python-HyperKitty of openSUSE Leap 15.2, Factory allows local attackers to escalate privileges from the user hyperkitty or hyperkitty-admin to root. This issue affects: openSUSE Leap 15.2 python-Hy... Read more
- EPSS Score: %0.12
- Published: Jun. 10, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-25321
A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to... Read more
Affected Products : leap linux_enterprise_server manager_server arpwatch factory openldap2 openstack_cloud_crowbar- EPSS Score: %0.11
- Published: Jun. 30, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-25320
A Improper Access Control vulnerability in Rancher, allows users in the cluster to make request to cloud providers by creating requests with the cloud-credential ID. Rancher in this case would attach the requested credentials without further checks This i... Read more
Affected Products : rancher- EPSS Score: %0.26
- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-25319
A Incorrect Default Permissions vulnerability in the packaging of virtualbox of openSUSE Factory allows local attackers in the vboxusers groupu to escalate to root. This issue affects: openSUSE Factory virtualbox version 6.1.20-1.1 and prior versions.... Read more
- EPSS Score: %0.09
- Published: May. 05, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-25318
A Incorrect Permission Assignment for Critical Resource vulnerability in Rancher allows users in the cluster to modify resources they should not have access to. This issue affects: Rancher versions prior to 2.5.9 ; Rancher versions prior to 2.4.16.... Read more
Affected Products : rancher- EPSS Score: %0.12
- Published: Jul. 15, 2021
- Modified: Nov. 21, 2024
-
3.3
LOWCVE-2021-25317
A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to... Read more
Affected Products : fedora leap linux_enterprise_server manager_server factory openldap2 cups openstack_cloud_crowbar- EPSS Score: %0.08
- Published: May. 05, 2021
- Modified: Nov. 21, 2024
-
3.3
LOWCVE-2021-25316
A Insecure Temporary File vulnerability in s390-tools of SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-SP2 allows local attackers to prevent VM live migrations This issue affects: SUSE Linux Enterprise Server 12-SP5 s390-tools versi... Read more
- EPSS Score: %0.04
- Published: Apr. 14, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-25315
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE Linux Enter... Read more
- EPSS Score: %0.16
- Published: Mar. 03, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-25314
A Creation of Temporary File With Insecure Permissions vulnerability in hawk2 of SUSE Linux Enterprise High Availability 12-SP3, SUSE Linux Enterprise High Availability 12-SP5, SUSE Linux Enterprise High Availability 15-SP2 allows local attackers to escal... Read more
- EPSS Score: %0.10
- Published: Apr. 14, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-25313
A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6.... Read more
- EPSS Score: %0.54
- Published: Mar. 05, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-25312
HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.... Read more
Affected Products : htcondor- EPSS Score: %0.46
- Published: Jan. 27, 2021
- Modified: Nov. 21, 2024
-
9.9
CRITICALCVE-2021-25311
condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.... Read more
Affected Products : htcondor- EPSS Score: %2.77
- Published: Jan. 27, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-25310
The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 devices allows remote authenticated attackers to execute system commands with root privileges via shell metacharacters in the ui_language POST parameter to the apply.cgi fo... Read more
- EPSS Score: %6.30
- Published: Feb. 02, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-25309
The telnet administrator service running on port 650 on Gigaset DX600A v41.00-175 devices does not implement any lockout or throttling functionality. This situation (together with the weak password policy that forces a 4-digit password) allows remote atta... Read more
- EPSS Score: %0.56
- Published: Mar. 02, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-25306
A buffer overflow vulnerability in the AT command interface of Gigaset DX600A v41.00-175 devices allows remote attackers to force a device reboot by sending relatively long AT commands.... Read more
- EPSS Score: %0.85
- Published: Mar. 02, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-25299
Nagios XI version xi-5.7.5 is affected by cross-site scripting (XSS). The vulnerability exists in the file /usr/local/nagiosxi/html/admin/sshterm.php due to improper sanitization of user-controlled input. A maliciously crafted URL, when clicked by an admi... Read more
Affected Products : nagios_xi- EPSS Score: %79.93
- Published: Feb. 15, 2021
- Modified: Nov. 21, 2024