Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-25816 1 Hashicorp 1 Vault 2021-09-07 4.9 MEDIUM 6.8 MEDIUM
HashiCorp Vault and Vault Enterprise versions 1.0 and newer allowed leases created with a batch token to outlive their TTL because expiration time was not scheduled correctly. Fixed in 1.4.7 and 1.5.4.
CVE-2021-29801 1 Ibm 2 Aix, Vios 2021-09-07 7.2 HIGH 7.8 HIGH
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the kernel to gain root privileges. IBM X-Force ID: 203977.
CVE-2021-29862 1 Ibm 2 Aix, Vios 2021-09-07 4.9 MEDIUM 5.5 MEDIUM
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to cause a denial of service. IBM X-Force ID: 206086.
CVE-2021-1590 1 Cisco 103 Nexus 3000, Nexus 3048, Nexus 31108pc-v and 100 more 2021-09-03 4.3 MEDIUM 5.3 MEDIUM
A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a login process to unexpectedly restart, causing a denial of service (DoS) condition. This vulnerability is due to a logic error in the implementation of the system login block-for command when an attack is detected and acted upon. An attacker could exploit this vulnerability by performing a brute-force login attack on an affected device. A successful exploit could allow the attacker to cause a login process to reload, which could result in a delay during authentication to the affected device.
CVE-2017-16875 1 Teluu 1 Pjsip 2021-09-02 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. The ioqueue component may issue a double key unregistration after an attacker initiates a socket connection with specific settings and sequences. Such double key unregistration will trigger an integer overflow, which may cause ioqueue backends to reject future key registrations.
CVE-2021-39271 1 Bscw 1 Bscw Classic 2021-09-02 6.5 MEDIUM 8.8 HIGH
OrbiTeam BSCW Classic before 7.4.3 allows authenticated remote code execution (RCE) during archive extraction via attacker-supplied Python code in the class attribute of a .bscw file. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3.
CVE-2021-40177 1 Zohocorp 1 Manageengine Log360 2021-09-01 7.5 HIGH 9.8 CRITICAL
Zoho ManageEngine Log360 before Build 5225 allows remote code execution via BCP file overwrite.
CVE-2020-4829 1 Ibm 2 Aix, Vios 2021-08-31 7.2 HIGH 7.8 HIGH
IBM AIX 7.1, 7.2, and VIOS 3.1 could allow a local user to exploit a vulnerability in the ksu user command to gain root privileges. IBM X-Force ID: 189960.
CVE-2014-0930 1 Ibm 2 Aix, Vios 2021-08-31 4.7 MEDIUM N/A
The ptrace system call in IBM AIX 5.3, 6.1, and 7.1, and VIOS 2.2.x, allows local users to cause a denial of service (system crash) or obtain sensitive information from kernel memory via a crafted PT_LDINFO operation.
CVE-2020-4887 1 Ibm 2 Aix, Vios 2021-08-31 2.1 LOW 5.5 MEDIUM
IBM AIX 7.1, 7.2 and AIX VIOS 3.1 could allow a local user to exploit a vulnerability in the gencore user command to create arbitrary files in any directory. IBM X-Force ID: 190911.
CVE-2021-23432 1 Mootools Project 1 Mootools 2021-08-31 7.5 HIGH 9.8 CRITICAL
This affects all versions of package mootools. This is due to the ability to pass untrusted input to Object.merge()
CVE-2021-23406 1 Pac-resolver Project 1 Pac-resolver 2021-08-30 7.5 HIGH 9.8 CRITICAL
This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.
CVE-2021-23413 1 Jszip Project 1 Jszip 2021-08-27 5.0 MEDIUM 5.3 MEDIUM
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance.
CVE-2017-7728 1 Ismartalarm 2 Cubeone, Cubeone Firmware 2021-08-25 7.5 HIGH 9.8 CRITICAL
On iSmartAlarm cube devices, there is authentication bypass leading to remote execution of commands (e.g., setting the alarm on/off), related to incorrect cryptography.
CVE-2021-29983 2 Google, Mozilla 2 Android, Firefox 2021-08-25 4.3 MEDIUM 6.5 MEDIUM
Firefox for Android could get stuck in fullscreen mode and not exit it even after normal interactions that should cause it to exit. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 91.
CVE-2021-23424 1 Ansi-html Project 1 Ansi-html 2021-08-24 5.0 MEDIUM 7.5 HIGH
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
CVE-2021-37707 1 Shopware 1 Shopware 2021-08-24 5.0 MEDIUM 7.5 HIGH
Shopware is an open source eCommerce platform. Versions prior to 6.4.3.1 contain a vulnerability that allows manipulation of product reviews via API. Version 6.4.3.1 contains a patch. As workarounds for older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.
CVE-2021-38546 1 Creative 8 Pebble, Pebble Firmware, Pebble Plus and 5 more 2021-08-23 4.3 MEDIUM 5.9 MEDIUM
CREATIVE Pebble devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.
CVE-2021-38547 1 Logitech 4 S120, S120 Firmware, Z120 and 1 more 2021-08-23 4.3 MEDIUM 5.9 MEDIUM
Logitech Z120 and S120 speakers through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.
CVE-2021-38545 1 Raspberrypi 4 Raspberry Pi 3 Model B\+, Raspberry Pi 3 Model B\+ Firmware, Raspberry Pi 4 Model B and 1 more 2021-08-23 4.3 MEDIUM 5.9 MEDIUM
Raspberry Pi 3 B+ and 4 B devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the Raspberry Pi supplies power to some speakers. The power indicator LED of the Raspberry Pi is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects the Raspberry Pi's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the Raspberry Pi, we can recover the sound played by the speakers.
CVE-2021-38548 1 Jbl 2 Go 2, Go 2 Firmware 2021-08-23 4.3 MEDIUM 5.9 MEDIUM
JBL Go 2 devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.
CVE-2021-38544 1 Sony 4 Srs-xb33, Srs-xb33 Firmware, Srs-xb43 and 1 more 2021-08-23 4.3 MEDIUM 5.9 MEDIUM
Sony SRS-XB33 and SRS-XB43 devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.
CVE-2021-38543 1 Tp-link 2 Ue330, Ue330 Firmware 2021-08-23 4.3 MEDIUM 5.9 MEDIUM
TP-Link UE330 USB splitter devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the USB splitter supplies power to some speakers. The power indicator LED of the USB splitter is connected directly to the power line, as a result, the intensity of the USB splitter's power indicator LED is correlative to its power consumption. The sound played by the connected speakers affects the USB splitter's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the USB splitter, we can recover the sound played by the connected speakers.
CVE-2021-28121 1 Virtual Robots.txt Project 1 Virtual Robots.txt 2021-08-23 7.5 HIGH 9.8 CRITICAL
Virtual Robots.txt before 1.10 does not block HTML tags in the robots.txt field.
CVE-2021-38589 1 Cpanel 1 Cpanel 2021-08-20 5.5 MEDIUM 8.1 HIGH
In cPanel before 96.0.13, scripts/fix-cpanel-perl does not properly restrict the overwriting of files (SEC-588).
CVE-2021-38365 1 Tonewinner 2 Winner Desktop Speakers, Winner Desktop Speakers Firmware 2021-08-20 4.3 MEDIUM 3.7 LOW
Winner (aka ToneWinner) desktop speakers through 2021-08-09 allow remote attackers to recover speech signals from the power-indicator LED via a telescope and an electro-optical sensor, aka a "Glowworm" attack.
CVE-2021-38549 1 Benda 2 Miracase Hmub500, Miracase Hmub500 Firmware 2021-08-20 4.3 MEDIUM 5.9 MEDIUM
MIRACASE MHUB500 USB splitters through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the USB splitter supplies power to some speakers. The power indicator LED of the USB splitter is connected directly to the power line, as a result, the intensity of the USB splitter's power indicator LED is correlative to its power consumption. The sound played by the connected speakers affects the USB splitter's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the USB splitter, we can recover the sound played by the connected speakers.
CVE-2021-37222 1 Rcdcap Project 1 Rcdcap 2021-08-20 7.5 HIGH 9.8 CRITICAL
Parsers in the open source project RCDCAP before 1.0.5 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via specially crafted packets.
CVE-2021-38586 1 Cpanel 1 Cpanel 2021-08-20 2.1 LOW 4.4 MEDIUM
In cPanel before 98.0.1, /scripts/cpan_config performs unsafe operations on files (SEC-589).
CVE-2021-37696 1 Tmerc-cogs Project 1 Tmerc-cogs 2021-08-20 4.0 MEDIUM 6.5 MEDIUM
tmerc-cogs are a collection of open source plugins for the Red Discord bot. A vulnerability has been found in the code that allows any user to access sensitive information by crafting a specific MassDM message. Issue is patched in commit 92325be650a6c17940cc52611797533ed95dbbe1. All users are advised to update to the current commit. As a workaround users may unload the MassDM cog or globally disable the `[p]massdm` command.
CVE-2021-37697 1 Tmerc-cogs Project 1 Tmerc-cogs 2021-08-20 4.0 MEDIUM 6.5 MEDIUM
tmerc-cogs are a collection of open source plugins for the Red Discord bot. A vulnerability has been found in the code that allows any user to access sensitive information by crafting a specific membership event message. Issue is patched in commit d63c49b4cfc30c795336e4fff08cba3795e0fcc0. As a workaround users may unload the Welcome cog.
CVE-2021-38188 1 Iced-x86 Project 1 Iced-x86 2021-08-20 7.5 HIGH 9.8 CRITICAL
An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely.
CVE-2021-38591 1 Google 1 Android 2021-08-20 2.1 LOW 3.3 LOW
An issue was discovered on LG mobile devices with Android OS P and Q software for mt6762/mt6765/mt6883. Attackers can change some of the NvRAM content by leveraging the misconfiguration of a debug command. The LG ID is LVE-SMP-210005 (August 2021).
CVE-2021-20032 1 Sonicwall 1 Analytics 2021-08-19 7.5 HIGH 9.8 CRITICAL
SonicWall Analytics 2.5 On-Prem is vulnerable to Java Debug Wire Protocol (JDWP) interface security misconfiguration vulnerability which potentially leads to Remote Code Execution. This vulnerability impacts Analytics On-Prem 2.5.2518 and earlier.
CVE-2021-38531 1 Netgear 24 Ac2100, Ac2100 Firmware, Ac2400 and 21 more 2021-08-19 6.5 MEDIUM 7.2 HIGH
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6260 before 1.1.0.78, R6700v2 before 1.2.0.76, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, and AC2400 before 1.2.0.76.
CVE-2020-24742 1 Qt 1 Qt 2021-08-19 6.8 MEDIUM 7.8 HIGH
An issue has been fixed in Qt versions 5.14.0 where QPluginLoader attempts to load plugins relative to the working directory, allowing attackers to execute arbitrary code via crafted files.
CVE-2021-38532 1 Netgear 2 Wac104, Wac104 Firmware 2021-08-19 6.5 MEDIUM 7.2 HIGH
NETGEAR WAC104 devices before 1.0.4.15 are affected by incorrect configuration of security settings.
CVE-2021-38515 1 Netgear 8 R6400, R6400 Firmware, R6700 and 5 more 2021-08-18 5.0 MEDIUM 7.5 HIGH
Certain NETGEAR devices are affected by denial of service. This affects R6400v2 before 1.0.4.98, R6700v3 before 1.0.4.98, R7900 before 1.0.3.18, and R8000 before 1.0.4.46.
CVE-2021-22902 1 Rubyonrails 1 Rails 2021-08-18 5.0 MEDIUM 7.5 HIGH
The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
CVE-2021-33699 1 Sap 1 Fiori Client 2021-08-17 3.3 LOW 6.5 MEDIUM
Task Hijacking is a vulnerability that affects the applications running on Android devices due to a misconfiguration in their AndroidManifest.xml with their Task Control features. This allows an unauthorized attacker or malware to takeover legitimate apps and to steal user's sensitive information.
CVE-2021-29922 1 Rust-lang 1 Rust 2021-08-17 6.4 MEDIUM 9.1 CRITICAL
library/std/src/net/parser.rs in Rust before 1.53.0 does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses, because of unexpected octal interpretation.
CVE-2020-36433 1 Aeplay 1 Chunky 2021-08-17 5.0 MEDIUM 7.5 HIGH
An issue was discovered in the chunky crate through 2020-08-25 for Rust. The Chunk API does not honor an alignment requirement.
CVE-2020-8250 1 Pulsesecure 1 Pulse Secure Desktop Client 2021-08-17 4.6 MEDIUM 7.8 HIGH
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.
CVE-2020-8248 1 Pulsesecure 1 Pulse Secure Desktop Client 2021-08-17 4.6 MEDIUM 7.8 HIGH
A vulnerability in the Pulse Secure Desktop Client (Linux) < 9.1R9 could allow local attackers to escalate privilege.
CVE-2020-8239 1 Pulsesecure 1 Pulse Secure Desktop Client 2021-08-17 7.5 HIGH 9.8 CRITICAL
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 is vulnerable to the client registry privilege escalation attack. This fix also requires Server Side Upgrade due to Standalone Host Checker Client (Windows) and Windows PDC.
CVE-2020-8255 1 Pulsesecure 1 Pulse Secure Desktop Client 2021-08-17 4.0 MEDIUM 4.9 MEDIUM
A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary file reading vulnerability is fixed using encrypted URL blacklisting that prevents these messages.
CVE-2020-8241 1 Pulsesecure 1 Pulse Secure Desktop Client 2021-08-17 5.1 MEDIUM 7.5 HIGH
A vulnerability in the Pulse Secure Desktop Client < 9.1R9 could allow the attacker to perform a MITM Attack if end users are convinced to connect to a malicious server.
CVE-2021-34432 1 Eclipse 1 Mosquitto 2021-08-17 5.0 MEDIUM 7.5 HIGH
In Eclipse Mosquitto versions 2.07 and earlier, the server will crash if the client tries to send a PUBLISH packet with topic length = 0.
CVE-2018-1262 2 Cloudfoundry, Pivotal Software 3 Cf-deployment, Cloud Foundry Uaa, Cloud Foundry Uaa-release 2021-08-17 6.5 MEDIUM 7.2 HIGH
Cloud Foundry Foundation UAA, versions 4.12.X and 4.13.X, introduced a feature which could allow privilege escalation across identity zones for clients performing offline validation. A zone administrator could configure their zone to issue tokens which impersonate another zone, granting up to admin privileges in the impersonated zone for clients performing offline token validation.
CVE-2021-38565 1 Foxitsoftware 2 Pdf Editor, Pdf Reader 2021-08-16 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Foxit PDF Reader before 11.0.1 and PDF Editor before 11.0.1. It allows writing to arbitrary files via submitForm.