Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-3820 1 Inflect Project 1 Inflect 2022-07-29 5.0 MEDIUM 7.5 HIGH
inflect is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3810 1 Coder 1 Code-server 2022-07-29 7.8 HIGH 7.5 HIGH
code-server is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3804 1 Taro 1 Taro 2022-07-29 7.8 HIGH 7.5 HIGH
taro is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3803 1 Nth-check Project 1 Nth-check 2022-07-29 5.0 MEDIUM 7.5 HIGH
nth-check is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3795 1 Semver-regex Project 1 Semver-regex 2022-07-29 5.0 MEDIUM 7.5 HIGH
semver-regex is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-24728 1 Cozmoslabs 1 Membership \& Content Restriction - Paid Member Subscriptions 2022-07-29 6.5 MEDIUM 8.8 HIGH
The Membership & Content Restriction – Paid Member Subscriptions WordPress plugin before 2.4.2 did not sanitise, validate or escape its order and orderby parameters before using them in SQL statement, leading to Authenticated SQL Injections in the Members and Payments pages.
CVE-2021-3794 1 Vuelidate Project 1 Vuelidate 2022-07-29 5.0 MEDIUM 7.5 HIGH
vuelidate is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3777 1 Tmpl Project 1 Tmpl 2022-07-29 7.8 HIGH 7.5 HIGH
nodejs-tmpl is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3805 1 Object-path Project 1 Object-path 2022-07-29 5.0 MEDIUM 7.5 HIGH
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CVE-2021-3822 1 Jsoneditoronline 1 Jsoneditor 2022-07-29 5.0 MEDIUM 7.5 HIGH
jsoneditor is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3765 1 Validator Project 1 Validator 2022-07-29 5.0 MEDIUM 7.5 HIGH
validator.js is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-21959 1 Sealevel 2 Seaconnect 370w, Seaconnect 370w Firmware 2022-07-29 6.8 MEDIUM 8.1 HIGH
A misconfiguration exists in the MQTTS functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. This misconfiguration significantly simplifies a man-in-the-middle attack, which directly leads to control of device functionality.
CVE-2021-21962 1 Sealevel 2 Seaconnect 370w, Seaconnect 370w Firmware 2022-07-29 6.8 MEDIUM 8.1 HIGH
A heap-based buffer overflow vulnerability exists in the OTA Update u-download functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A series of specially-crafted MQTT payloads can lead to remote code execution. An attacker must perform a man-in-the-middle attack in order to trigger this vulnerability.
CVE-2021-24347 1 Smartypantsplugins 1 Sp Project \& Document Manager 2022-07-29 6.5 MEDIUM 8.8 HIGH
The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP".
CVE-2022-2268 1 Soflyy 1 Wp All Import 2022-07-29 6.5 MEDIUM 7.2 HIGH
The Import any XML or CSV File to WordPress plugin before 3.6.8 accepts all zip files and automatically extracts the zip file without validating the extracted file type. Allowing high privilege users such as admin to upload an arbitrary file like PHP, leading to RCE
CVE-2021-25094 1 Brandexponents 1 Tatsu 2022-07-29 6.8 MEDIUM 8.1 HIGH
The Tatsu WordPress plugin before 3.3.12 add_custom_font action can be used without prior authentication to upload a rogue zip file which is uncompressed under the WordPress's upload directory. By adding a PHP shell with a filename starting with a dot ".", this can bypass extension control implemented in the plugin. Moreover, there is a race condition in the zip extraction process which makes the shell file live long enough on the filesystem to be callable by an attacker.
CVE-2021-24312 1 Automattic 1 Wp Super Cache 2022-07-29 6.5 MEDIUM 7.2 HIGH
The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.
CVE-2022-2219 1 Brizy 1 Unyson 2022-07-29 N/A 7.2 HIGH
The Unyson WordPress plugin before 2.7.27 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
CVE-2021-44385 1 Reolink 2 Rlc-410w, Rlc-410w Firmware 2022-07-29 6.8 MEDIUM 7.7 HIGH
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetPtzSerial param is not object. An attacker can send an HTTP request to trigger this vulnerability.
CVE-2021-40412 1 Reolink 2 Rlc-410w, Rlc-410w Firmware 2022-07-29 6.5 MEDIUM 7.2 HIGH
An OScommand injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [8] the devname variable, that has the value of the name parameter provided through the SetDevName API, is not validated properly. This would lead to an OS command injection.
CVE-2021-40411 1 Reolink 2 Rlc-410w, Rlc-410w Firmware 2022-07-29 6.5 MEDIUM 7.2 HIGH
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [6] the dns_data->dns2 variable, that has the value of the dns2 parameter provided through the SetLocalLink API, is not validated properly. This would lead to an OS command injection.
CVE-2021-40410 1 Reolink 2 Rlc-410w, Rlc-410w Firmware 2022-07-29 6.5 MEDIUM 7.2 HIGH
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [4] the dns_data->dns1 variable, that has the value of the dns1 parameter provided through the SetLocal API, is not validated properly. This would lead to an OS command injection.
CVE-2021-21953 1 Anker 2 Eufy Homebase 2, Eufy Homebase 2 Firmware 2022-07-29 6.8 MEDIUM 8.1 HIGH
An authentication bypass vulnerability exists in the process_msg() function of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted man-in-the-middle attack can lead to increased privileges.
CVE-2022-2240 1 Emarketdesign 1 Request A Quote 2022-07-29 N/A 8.8 HIGH
The Request a Quote WordPress plugin through 2.3.7 does not validate uploaded CSV files, allowing unauthenticated users to attach a malicious CSV file to a quote, which could lead to a CSV injection once an admin download and open it
CVE-2021-3649 1 Chatwoot 1 Chatwoot 2022-07-29 5.0 MEDIUM 7.5 HIGH
chatwoot is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-21819 1 Dlink 2 Dir-3040, Dir-3040 Firmware 2022-07-29 9.0 HIGH 7.2 HIGH
A code execution vulnerability exists in the Libcli Test Environment functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2021-21818 1 Dlink 2 Dir-3040, Dir-3040 Firmware 2022-07-29 5.0 MEDIUM 7.5 HIGH
A hard-coded password vulnerability exists in the Zebra IP Routing Manager functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to a denial of service. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2021-21808 1 Accusoft 1 Imagegear 2022-07-29 6.8 MEDIUM 8.8 HIGH
A memory corruption vulnerability exists in the PNG png_palette_process functionality of Accusoft ImageGear 19.9. A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide malicious inputs to trigger this vulnerability.
CVE-2021-21782 1 Accusoft 1 Imagegear 2022-07-29 6.8 MEDIUM 8.8 HIGH
An out-of-bounds write vulnerability exists in the SGI format buffer size processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2021-21776 1 Accusoft 1 Imagegear 2022-07-29 6.8 MEDIUM 8.8 HIGH
An out-of-bounds write vulnerability exists in the SGI Format Buffer Size Processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2021-21773 1 Accusoft 1 Imagegear 2022-07-29 6.8 MEDIUM 7.8 HIGH
An out-of-bounds write vulnerability exists in the TIFF header count-processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2020-13585 1 Accusoft 1 Imagegear 2022-07-29 6.8 MEDIUM 8.8 HIGH
An out-of-bounds write vulnerability exists in the PSD Header processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2020-13572 1 Accusoft 1 Imagegear 2022-07-29 6.8 MEDIUM 8.8 HIGH
A heap overflow vulnerability exists in the way the GIF parser decodes LZW compressed streams in Accusoft ImageGear 19.8. A specially crafted malformed file can trigger a heap overflow, which can result in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2020-13571 1 Accusoft 1 Imagegear 2022-07-29 6.8 MEDIUM 8.8 HIGH
An out-of-bounds write vulnerability exists in the SGI RLE decompression functionality of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2020-13561 1 Accusoft 1 Imagegear 2022-07-29 6.8 MEDIUM 8.8 HIGH
An out-of-bounds write vulnerability exists in the TIFF parser of Accusoft ImageGear 19.8. A specially crafted malformed file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
CVE-2022-1481 2 Apple, Google 2 Macos, Chrome 2022-07-29 N/A 8.8 HIGH
Use after free in Sharing in Google Chrome on Mac prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
CVE-2022-1364 1 Google 1 Chrome 2022-07-29 N/A 8.8 HIGH
Type confusion in V8 Turbofan in Google Chrome prior to 100.0.4896.127 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-35634 1 Cgal 1 Computational Geometry Algorithms Library 2022-07-29 6.8 MEDIUM 8.8 HIGH
A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sface() sfh->boundary_entry_objects Sloop_of. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger this vulnerability.
CVE-2020-35633 1 Cgal 1 Computational Geometry Algorithms Library 2022-07-29 6.8 MEDIUM 8.8 HIGH
A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_sface() store_sm_boundary_item() Edge_of.A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger this vulnerability.
CVE-2021-21849 2 Debian, Gpac 2 Debian Linux, Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow when the library encounters an atom using the “tfra” FOURCC code due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
CVE-2021-21848 2 Debian, Gpac 2 Debian Linux, Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. The library will actually reuse the parser for atoms with the “stsz” FOURCC code when parsing atoms that use the “stz2” FOURCC code and can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
CVE-2021-21842 2 Debian, Gpac 2 Debian Linux, Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow when processing an atom using the 'ssix' FOURCC code, due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
CVE-2021-21841 2 Debian, Gpac 2 Debian Linux, Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input when reading an atom using the 'sbgp' FOURCC code can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
CVE-2021-21840 2 Debian, Gpac 2 Debian Linux, Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input used to process an atom using the “saio” FOURCC code cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
CVE-2021-21836 2 Debian, Gpac 2 Debian Linux, Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input using the “ctts” FOURCC code can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
CVE-2021-21835 1 Gpac 1 Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input when decoding the atom associated with the “csgp” FOURCC can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
CVE-2021-24739 1 Shapedplugin 1 Logo Carousel 2022-07-29 5.5 MEDIUM 8.1 HIGH
The Logo Carousel WordPress plugin before 3.4.2 allows users with a role as low as Contributor to duplicate and view arbitrary private posts made by other users via the Carousel Duplication feature
CVE-2021-21834 2 Debian, Gpac 2 Debian Linux, Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
An exploitable integer overflow vulnerability exists within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input when decoding the atom for the “co64” FOURCC can cause an integer overflow due to unchecked arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.
CVE-2021-21862 1 Gpac 1 Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
Multiple exploitable integer truncation vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an improper memory allocation resulting in a heap-based buffer overflow that causes memory corruption The implementation of the parser used for the “Xtra” FOURCC code is handled. An attacker can convince a user to open a video to trigger this vulnerability.
CVE-2021-21858 2 Debian, Gpac 2 Debian Linux, Gpac 2022-07-29 6.8 MEDIUM 8.8 HIGH
Multiple exploitable integer overflow vulnerabilities exist within the MPEG-4 decoding functionality of the GPAC Project on Advanced Content library v1.0.1. A specially crafted MPEG-4 input can cause an integer overflow due to unchecked addition arithmetic resulting in a heap-based buffer overflow that causes memory corruption. An attacker can convince a user to open a video to trigger this vulnerability.