Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-20753 1 Cybozu 1 Garoon 2021-08-24 3.5 LOW 5.4 MEDIUM
Cross-site scripting vulnerability in Scheduler of Cybozu Garoon 4.0.0 to 5.0.2 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
CVE-2021-22936 1 Pulsesecure 1 Pulse Connect Secure 2021-08-24 4.3 MEDIUM 6.1 MEDIUM
A vulnerability in Pulse Connect Secure before 9.1R12 could allow a threat actor to perform a cross-site script attack against an authenticated administrator via an unsanitized web parameter.
CVE-2021-39268 1 Salesagility 1 Suitecrm 2021-08-24 4.3 MEDIUM 6.1 MEDIUM
Persistent cross-site scripting (XSS) in the web interface of SuiteCRM before 7.11.19 allows a remote attacker to introduce arbitrary JavaScript via malicious SVG files. This occurs because the clean_file_output protection mechanism can be bypassed.
CVE-2021-39267 1 Salesagility 1 Suitecrm 2021-08-24 4.3 MEDIUM 6.1 MEDIUM
Persistent cross-site scripting (XSS) in the web interface of SuiteCRM before 7.11.19 allows a remote attacker to introduce arbitrary JavaScript via a Content-Type Filter bypass to upload malicious files. This occurs because text/html is blocked, but other types that allow JavaScript execution (such as text/xml) are not blocked.
CVE-2020-23341 1 Atutor 1 Atutor 2021-08-24 4.3 MEDIUM 6.1 MEDIUM
A reflected cross site scripting (XSS) vulnerability in the /header.tmpl.php component of ATutor 2.2.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
CVE-2021-35936 1 Apache 1 Airflow 2021-08-24 5.0 MEDIUM 5.3 MEDIUM
If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2.
CVE-2021-38709 1 Compo 1 Composr Cms 2021-08-24 4.3 MEDIUM 6.1 MEDIUM
In ocProducts Composr CMS before 10.0.38, an attacker can inject JavaScript via the staff_messaging messaging system for XSS.
CVE-2021-38315 1 Smartypantsplugins 1 Sp Project \& Document Manager 2021-08-24 4.3 MEDIUM 6.1 MEDIUM
The SP Project & Document Manager WordPress plugin is vulnerable to attribute-based Reflected Cross-Site Scripting via the from and to parameters in the ~/functions.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 4.25.
CVE-2021-34667 1 Calendar Plugin Project 1 Calendar Plugin 2021-08-24 4.3 MEDIUM 6.1 MEDIUM
The Calendar_plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of `$_SERVER['PHP_SELF']` in the ~/calendar.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.
CVE-2021-21973 1 Vmware 2 Cloud Foundation, Vcenter Server 2021-08-24 5.0 MEDIUM 5.3 MEDIUM
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CVE-2019-5538 1 Vmware 1 Vcenter Server 2021-08-24 4.3 MEDIUM 5.9 MEDIUM
Sensitive information disclosure vulnerability resulting from a lack of certificate validation during the File-Based Backup and Restore operations of VMware vCenter Server Appliance (6.7 before 6.7u3a and 6.5 before 6.5u3d) may allow a malicious actor to intercept sensitive data in transit over SCP. A malicious actor with man-in-the-middle positioning between vCenter Server Appliance and a backup target may be able to intercept sensitive data in transit during File-Based Backup and Restore operations.
CVE-2019-5537 1 Vmware 1 Vcenter Server 2021-08-24 4.3 MEDIUM 5.9 MEDIUM
Sensitive information disclosure vulnerability resulting from a lack of certificate validation during the File-Based Backup and Restore operations of VMware vCenter Server Appliance (6.7 before 6.7u3a and 6.5 before 6.5u3d) may allow a malicious actor to intercept sensitive data in transit over FTPS and HTTPS. A malicious actor with man-in-the-middle positioning between vCenter Server Appliance and a backup target may be able to intercept sensitive data in transit during File-Based Backup and Restore operations.
CVE-2021-34657 1 Typofr Project 1 Typofr 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The 2TypoFR WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the text function found in the ~/vendor/Org_Heigl/Hyphenator/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.11.
CVE-2021-34658 1 Keszites 1 Simple Popup Newsletter 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Simple Popup Newsletter WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/simple-popup-newsletter.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.7.
CVE-2021-34659 1 Sizmic 1 Plugmatter Pricing Table 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Plugmatter Pricing Table Lite WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the `email` parameter in the ~/license.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.32.
CVE-2021-3635 3 Fedoraproject, Linux, Redhat 3 Fedora, Linux Kernel, Enterprise Linux 2021-08-23 4.9 MEDIUM 4.4 MEDIUM
A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands.
CVE-2021-38619 1 Openbaraza 1 Openbaraza Human Capital Management 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
openBaraza HCM 3.1.6 does not properly neutralize user-controllable input: an unauthenticated remote attacker can conduct a stored cross-site scripting (XSS) attack against an administrative user from hr/subscription.jsp and hr/application.jsp and and hr/index.jsp (with view=).
CVE-2021-34641 1 Seopress 1 Seopress 2021-08-23 3.5 LOW 5.4 MEDIUM
The SEOPress WordPress plugin is vulnerable to Stored Cross-Site-Scripting via the processPut function found in the ~/src/Actions/Api/TitleDescriptionMeta.php file which allows authenticated attackers to inject arbitrary web scripts, in versions 5.0.0 - 5.0.3.
CVE-2021-34643 1 Skaut-bazar Project 1 Skaut-bazar 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Skaut bazar WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/skaut-bazar.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.2.
CVE-2021-34642 1 Followistic 1 Smart Email Alerts 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Smart Email Alerts WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the api_key in the ~/views/settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.10.
CVE-2021-34644 1 Multiplayer-plugin Project 1 Multiplayer-plugin 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Multiplayer Games WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/multiplayergames.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.7.
CVE-2021-34651 1 Scribblemaps 1 Scribble Maps 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Scribble Maps WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the map parameter in the ~/includes/admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.
CVE-2021-34649 1 Simple-behace-portfolio Project 1 Simple-behace-portfolio 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Simple Behance Portfolio WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the `dark` parameter in the ~/titan-framework/iframe-font-preview.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.2.
CVE-2021-34652 1 Meowapps 1 Media Usage 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Media Usage WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter in the ~/mmu_admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.4.
CVE-2020-18702 1 Quokka Project 1 Quokka 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the 'Username' parameter in the component 'quokka/admin/actions.py'.
CVE-2021-38713 1 Imgurl Project 1 Imgurl 2021-08-23 3.5 LOW 5.4 MEDIUM
imgURL 2.31 allows XSS via an X-Forwarded-For HTTP header.
CVE-2020-25351 1 Rconfig 1 Rconfig 2021-08-23 4.0 MEDIUM 6.5 MEDIUM
An information disclosure vulnerability in rConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote authenticated attackers to read files on the system via a crafted request sent to to the /lib/crud/configcompare.crud.php script.
CVE-2019-18849 1 Tnef Project 1 Tnef 2021-08-23 4.3 MEDIUM 5.5 MEDIUM
In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
CVE-2020-25352 1 Rconfig 1 Rconfig 2021-08-23 3.5 LOW 5.4 MEDIUM
A stored cross-site scripting (XSS) vulnerability in the /devices.php function inrConfig 3.9.5 has been fixed for version 3.9.6. This vulnerability allowed remote attackers to perform arbitrary Javascript execution through entering a crafted payload into the 'Model' field then saving.
CVE-2021-27401 1 Mitel 1 Micollab 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Join Meeting page of Mitel MiCollab Web Client before 9.2 FP2 could allow an attacker to access (view and modify) user data by executing arbitrary code due to insufficient input validation, aka Cross-Site Scripting (XSS).
CVE-2020-18699 1 Talelin 1 Lin-cms-flask 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS) in Lin-CMS-Flask v0.1.1 allows remote attackers to execute arbitrary code by entering scripts in the the 'Username' parameter of the in component 'app/api/cms/user.py'.
CVE-2021-27402 1 Mitel 1 Micollab 2021-08-23 6.4 MEDIUM 6.5 MEDIUM
The SAS Admin portal of Mitel MiCollab before 9.2 FP2 could allow an unauthenticated attacker to access (view and modify) user data by injecting arbitrary directory paths due to improper URL validation, aka Directory Traversal.
CVE-2021-24471 1 Youtube Embed Project 1 Youtube Embed 2021-08-23 2.1 LOW 5.4 MEDIUM
The YouTube Embed WordPress plugin before 5.2.2 does not validate, escape or sanitise some of its shortcode attributes, leading to Stored XSS issues by 1. using w, h, controls, cc_lang, color, language, start, stop, or style parameter of youtube shortcode, 2. by using style, class, rel, target, width, height, or alt parameter of youtube_thumb shortcode, or 3. by embedding a video whose title or description contains XSS payload (if API key is configured).
CVE-2021-24518 1 Wpfront 1 Notification Bar 2021-08-23 3.5 LOW 4.8 MEDIUM
The WPFront Notification Bar WordPress plugin before 2.0.0.07176 does not sanitise or escape its Custom CSS setting, allowing high privilege users such as admin to set XSS payload in it even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue
CVE-2021-24445 1 Draftpress 1 My Site Audit 2021-08-23 3.5 LOW 5.5 MEDIUM
The My Site Audit WordPress plugin through 1.2.4 does not sanitise or escape the Audit Name field when creating an audit, allowing high privilege users to set JavaScript payloads in them, even when he unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue
CVE-2021-24535 1 Light Messages Project 1 Light Messages 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Light Messages WordPress plugin through 1.0 is lacking CSRF check when updating it's settings, and is not sanitising its Message Content in them (even with the unfiltered_html disallowed). As a result, an attacker could make a logged in admin update the settings to arbitrary values, and set a Cross-Site Scripting payload in the Message Content. Depending on the options set, the XSS payload can be triggered either in the backend only (in the plugin's settings), or both frontend and backend.
CVE-2021-32067 1 Mitel 1 Micollab 2021-08-23 6.4 MEDIUM 6.5 MEDIUM
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to view sensitive system information through an HTTP response due to insufficient output sanitization.
CVE-2021-24466 1 Verse-o-matic Project 1 Verse-o-matic 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
The Verse-O-Matic WordPress plugin through 4.1.1 does not have any CSRF checks in place, allowing attackers to make logged in administrators do unwanted actions, such as add/edit/delete arbitrary verses and change the settings. Due to the lack of sanitisation in the settings and verses, this could also lead to Stored Cross-Site Scripting issues
CVE-2021-24519 1 Vikwp 1 Car Rental Management System 2021-08-23 3.5 LOW 4.8 MEDIUM
The VikRentCar Car Rental Management System WordPress plugin before 1.1.10 does not sanitise the 'Text Next to Icon' field when adding or editing a Characteristic, allowing high privilege users such as admin to use XSS payload in it, leading to an authenticated Stored Cross-Site Scripting issue
CVE-2020-21066 1 Axiosys 1 Bento4 2021-08-23 4.3 MEDIUM 6.5 MEDIUM
An issue was discovered in Bento4 v1.5.1.0. There is a heap-buffer-overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a denial of service (program crash), as demonstrated by mp42aac.
CVE-2021-32069 1 Mitel 1 Micollab 2021-08-23 5.8 MEDIUM 4.8 MEDIUM
The AWV component of Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack due to improper TLS negotiation. A successful exploit could allow an attacker to view and modify data.
CVE-2021-38751 1 Exponentcms 1 Exponentcms 2021-08-23 4.3 MEDIUM 4.3 MEDIUM
A HTTP Host header attack exists in ExponentCMS 2.6 and below in /exponent_constants.php. A modified HTTP header can change links on the webpage to an arbitrary value, leading to a possible attack vector for MITM.
CVE-2021-38607 1 Crocoblock 1 Jetengine 2021-08-23 3.5 LOW 5.4 MEDIUM
Crocoblock JetEngine before 2.6.1 allows XSS by remote authenticated users via a custom form input.
CVE-2021-32070 1 Mitel 1 Micollab 2021-08-23 5.8 MEDIUM 5.4 MEDIUM
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to perform a clickjacking attack due to an insecure header response. A successful exploit could allow an attacker to modify the browser header and redirect users.
CVE-2021-38752 1 Online Catering Reservation System Project 1 Online Catering Reservation System 2021-08-23 3.5 LOW 5.4 MEDIUM
A cross-site scripting (XSS) vulnerability in Online Catering Reservation System using PHP on Sourcecodester allows an attacker to arbitrarily inject code in the search bar.
CVE-2021-38755 1 Hospital Management System Project 1 Hospital Management System 2021-08-23 5.0 MEDIUM 5.3 MEDIUM
Unauthenticated doctor entry deletion in Hospital Management System in admin-panel1.php.
CVE-2021-38757 1 Hospital Management System Project 1 Hospital Management System 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
Persistent cross-site scripting (XSS) in Hospital Management System targeted towards web admin through contact.php.
CVE-2021-38756 1 Hospital Management System Project 1 Hospital Management System 2021-08-23 4.3 MEDIUM 6.1 MEDIUM
Persistent cross-site scripting (XSS) in Hospital Management System targeted towards web admin through prescribe.php.
CVE-2021-38546 1 Creative 8 Pebble, Pebble Firmware, Pebble Plus and 5 more 2021-08-23 4.3 MEDIUM 5.9 MEDIUM
CREATIVE Pebble devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.
CVE-2021-38547 1 Logitech 4 S120, S120 Firmware, Z120 and 1 more 2021-08-23 4.3 MEDIUM 5.9 MEDIUM
Logitech Z120 and S120 speakers through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.