Latest CVE Feed
-
8.8
HIGHCVE-2021-22142
Kibana contains an embedded version of the Chromium browser that the Reporting feature uses to generate the downloadable reports. If a user with permissions to generate reports is able to render arbitrary HTML with this browser, they may be able to levera... Read more
Affected Products : kibana- EPSS Score: %0.47
- Published: Nov. 22, 2023
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-22140
Elastic App Search versions after 7.11.0 and before 7.12.0 contain an XML External Entity Injection issue (XXE) in the App Search web crawler beta feature. Using this vector, an attacker whose website is being crawled by App Search could craft a malicious... Read more
Affected Products : elastic_app_search- EPSS Score: %0.37
- Published: May. 13, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-22139
Kibana versions before 7.12.1 contain a denial of service vulnerability was found in the webhook actions due to a lack of timeout or a limit on the request size. An attacker with permissions to create webhook actions could drain the Kibana host connection... Read more
Affected Products : kibana- EPSS Score: %0.39
- Published: May. 13, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-22138
In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitor... Read more
- EPSS Score: %0.11
- Published: May. 13, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-22137
In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This c... Read more
- EPSS Score: %0.16
- Published: May. 13, 2021
- Modified: Nov. 21, 2024
-
3.6
LOWCVE-2021-22136
In Kibana versions before 7.12.0 and 6.8.15 a flaw in the session timeout was discovered where the xpack.security.session.idleTimeout setting is not being respected. This was caused by background polling activities unintentionally extending authenticated ... Read more
Affected Products : kibana- EPSS Score: %0.11
- Published: May. 13, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-22135
Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an inde... Read more
- EPSS Score: %0.24
- Published: May. 13, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-22134
A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document.... Read more
Affected Products : elasticsearch communications_cloud_native_core_automated_test_suite elasticsearch- EPSS Score: %0.25
- Published: Mar. 08, 2021
- Modified: Nov. 21, 2024
-
2.7
LOWCVE-2021-22133
The Elastic APM agent for Go versions before 1.11.0 can leak sensitive HTTP header information when logging the details during an application panic. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the ... Read more
Affected Products : apm_agent- EPSS Score: %0.07
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
4.8
MEDIUMCVE-2021-22132
Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain s... Read more
Affected Products : elasticsearch communications_cloud_native_core_automated_test_suite elasticsearch- EPSS Score: %1.71
- Published: Jan. 14, 2021
- Modified: Nov. 21, 2024
-
6.4
MEDIUMCVE-2021-22131
A improper validation of certificate with host mismatch in Fortinet FortiTokenAndroid version 5.0.3 and below, Fortinet FortiTokeniOS version 5.2.0 and below, Fortinet FortiTokenWinApp version 4.0.3 and below allows attacker to retrieve information disclo... Read more
Affected Products : fortitoken_mobile- EPSS Score: %0.05
- Published: Jul. 18, 2022
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2021-22130
A stack-based buffer overflow vulnerability in FortiProxy physical appliance CLI 2.0.0 to 2.0.1, 1.2.0 to 1.2.9, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 may allow an authenticated, remote attacker to perform a Denial of Service attack by running the `diagnose sys ... Read more
Affected Products : fortiproxy- EPSS Score: %0.62
- Published: Jun. 03, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-22129
Multiple instances of incorrect calculation of buffer size in the Webmail and Administrative interface of FortiMail before 6.4.5 may allow an authenticated attacker with regular webmail access to trigger a buffer overflow and to possibly execute unauthori... Read more
Affected Products : fortimail- EPSS Score: %0.45
- Published: Jul. 09, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-22128
An improper access control vulnerability in FortiProxy SSL VPN portal 2.0.0, 1.2.9 and below versions may allow an authenticated, remote attacker to access internal service such as the ZebOS Shell on the FortiProxy appliance through the Quick Connection f... Read more
Affected Products : fortiproxy- EPSS Score: %0.38
- Published: Mar. 04, 2021
- Modified: Nov. 21, 2024
-
8.0
HIGHCVE-2021-22127
An improper input validation vulnerability in FortiClient for Linux 6.4.x before 6.4.3, FortiClient for Linux 6.2.x before 6.2.9 may allow an unauthenticated attacker to execute arbitrary code on the host operating system as root via tricking the user int... Read more
Affected Products : forticlient- EPSS Score: %0.31
- Published: Apr. 06, 2022
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-22125
An instance of improper neutralization of special elements in the sniffer module of FortiSandbox before 3.2.2 may allow an authenticated administrator to execute commands on the underlying system's shell via altering the content of its configuration file.... Read more
Affected Products : fortisandbox- EPSS Score: %0.31
- Published: Jul. 20, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-22124
An uncontrolled resource consumption (denial of service) vulnerability in the login modules of FortiSandbox 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6; and FortiAuthenticator before 6.0.6 may allow an unauthenticated attacker to bri... Read more
- EPSS Score: %1.14
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-22123
An OS command injection vulnerability in FortiWeb's management interface 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x may allow a remote authenticated attacker to execute arbitrary commands on the system via the SAML server configuration page.... Read more
Affected Products : fortiweb- EPSS Score: %85.70
- Published: Jun. 01, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-22122
An improper neutralization of input during web page generation in FortiWeb GUI interface 6.3.0 through 6.3.7 and version before 6.2.4 may allow an unauthenticated, remote attacker to perform a reflected cross site scripting attack (XSS) by injecting malic... Read more
Affected Products : fortiweb- EPSS Score: %68.96
- Published: Feb. 08, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-22119
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux... Read more
- EPSS Score: %5.59
- Published: Jun. 29, 2021
- Modified: Nov. 21, 2024