Latest CVE Feed
-
6.5
MEDIUMCVE-2021-21298
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier has a vulnerability which allows arbitrary path traversal via the Projects API. If the Projects feature is enabled, a user with `projects.read`... Read more
Affected Products : node-red- EPSS Score: %0.36
- Published: Feb. 26, 2021
- Modified: Nov. 21, 2024
-
7.7
HIGHCVE-2021-21297
Node-Red is a low-code programming for event-driven applications built using nodejs. Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object... Read more
Affected Products : node-red- EPSS Score: %0.33
- Published: Feb. 26, 2021
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2021-21296
Fleet is an open source osquery manager. In Fleet before version 3.7.0 a malicious actor with a valid node key can send a badly formatted request that causes the Fleet server to exit, resulting in denial of service. This is possible only while a live quer... Read more
Affected Products : fleet- EPSS Score: %0.57
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2021-21295
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability ... Read more
- EPSS Score: %2.08
- Published: Mar. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-21294
Http4s (http4s-blaze-server) is a minimal, idiomatic Scala interface for HTTP services. Http4s before versions 0.21.17, 0.22.0-M2, and 1.0.0-M14 have a vulnerability which can lead to a denial-of-service. Blaze-core, a library underlying http4s-blaze-serv... Read more
Affected Products : http4s- EPSS Score: %0.53
- Published: Feb. 02, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-21293
blaze is a Scala library for building asynchronous pipelines, with a focus on network IO. All servers running blaze-core before version 0.14.15 are affected by a vulnerability in which unbounded connection acceptance leads to file handle exhaustion. Blaze... Read more
Affected Products : blaze- EPSS Score: %0.41
- Published: Feb. 02, 2021
- Modified: Nov. 21, 2024
-
6.3
MEDIUMCVE-2021-21292
Traccar is an open source GPS tracking system. In Traccar before version 4.12 there is an unquoted Windows binary path vulnerability. Only Windows versions are impacted. Attacker needs write access to the filesystem on the host machine. If Java path inclu... Read more
- EPSS Score: %0.06
- Published: Feb. 02, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-21291
OAuth2 Proxy is an open-source reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. In OAuth2 Proxy before version 7.0.0, for users that use the whit... Read more
Affected Products : oauth2_proxy- EPSS Score: %0.24
- Published: Feb. 02, 2021
- Modified: Nov. 21, 2024
-
6.2
MEDIUMCVE-2021-21290
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty before version 4.1.59.Final there is a vulnerability on Unix-like systems involvin... Read more
- EPSS Score: %0.02
- Published: Feb. 08, 2021
- Modified: Nov. 21, 2024
-
8.3
HIGHCVE-2021-21289
Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected us... Read more
- EPSS Score: %2.50
- Published: Feb. 02, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-21288
CarrierWave is an open-source RubyGem which provides a simple and flexible way to upload files from Ruby applications. In CarrierWave before versions 1.3.2 and 2.1.1 the download feature has an SSRF vulnerability, allowing attacks to provide DNS entries o... Read more
Affected Products : carrierwave- EPSS Score: %0.20
- Published: Feb. 08, 2021
- Modified: Nov. 21, 2024
-
7.7
HIGHCVE-2021-21287
MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from... Read more
Affected Products : minio- EPSS Score: %92.68
- Published: Feb. 01, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-21286
AVideo Platform is an open-source Audio and Video platform. It is similar to a self-hosted YouTube. In AVideo Platform before version 10.2 there is an authorization bypass vulnerability which enables an ordinary user to get admin control. This is fixed in... Read more
Affected Products : avideo- EPSS Score: %0.26
- Published: Feb. 01, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-21285
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.... Read more
- EPSS Score: %0.14
- Published: Feb. 02, 2021
- Modified: Nov. 21, 2024
-
6.8
MEDIUMCVE-2021-21284
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has ... Read more
- EPSS Score: %0.03
- Published: Feb. 02, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-21283
Flarum is an open source discussion platform for websites. The "Flarum Sticky" extension versions 0.1.0-beta.14 and 0.1.0-beta.15 has a cross-site scripting vulnerability. A change in release beta 14 of the Sticky extension caused the plain text content o... Read more
Affected Products : sticky- EPSS Score: %0.35
- Published: Jan. 26, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-21282
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In versions prior to 4.5, buffer overflow can be triggered by an input packet when using either of Contiki-NG's two RPL implementations in source-routing mode. T... Read more
Affected Products : contiki-ng- EPSS Score: %0.44
- Published: Jun. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-21281
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. A buffer overflow vulnerability exists in Contiki-NG versions prior to 4.6. After establishing a TCP socket using the tcp-socket library, it is possible for the ... Read more
Affected Products : contiki-ng- EPSS Score: %0.44
- Published: Jun. 18, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-21280
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. It is possible to cause an out-of-bounds write in versions of Contiki-NG prior to 4.6 when transmitting a 6LoWPAN packet with a chain of extension headers. Unfor... Read more
Affected Products : contiki-ng- EPSS Score: %0.41
- Published: Jun. 18, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-21279
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. In verions prior to 4.6, an attacker can perform a denial-of-service attack by triggering an infinite loop in the processing of IPv6 neighbor solicitation (NS) m... Read more
Affected Products : contiki-ng- EPSS Score: %0.30
- Published: Jun. 18, 2021
- Modified: Nov. 21, 2024