Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-16566 1 Qacctv 2 Jooan A5 Ip Camera, Jooan A5 Ip Camera Firmware 2021-04-20 10.0 HIGH 9.8 CRITICAL
On Jooan IP Camera A5 2.3.36 devices, an insecure FTP server does not require authentication, which allows remote attackers to read or replace core system files including those used for authentication (such as passwd and shadow). This can be abused to take full root level control of the device.
CVE-2021-23371 1 Chrono-node Project 1 Chrono-node 2021-04-20 5.0 MEDIUM 7.5 HIGH
This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.
CVE-2020-28124 1 Lavalite 1 Lavalite 2021-04-19 3.5 LOW 5.4 MEDIUM
Cross Site Scripting (XSS) in LavaLite 5.8.0 via the Address field.
CVE-2021-28855 1 Entropymine 1 Deark 2021-04-19 4.3 MEDIUM 5.5 MEDIUM
In Deark before 1.5.8, a specially crafted input file can cause a NULL pointer dereference in the dbuf_write function (src/deark-dbuf.c).
CVE-2021-26830 1 Tribalsystems 1 Zenario 2021-04-19 6.4 MEDIUM 9.1 CRITICAL
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
CVE-2021-0471 1 Google 1 Android 2021-04-19 2.1 LOW 5.5 MEDIUM
In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444786
CVE-2020-24136 1 Wcms 1 Wcms 2021-04-19 7.8 HIGH 8.6 HIGH
Directory traversal in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the pagename parameter to wex/html.php.
CVE-2008-3218 2 Drupal, Fedoraproject 2 Drupal, Fedora 2021-04-19 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in Drupal 6.x before 6.3 allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) free tagging taxonomy terms, which are not properly handled on node preview pages, and (2) unspecified OpenID values.
CVE-2007-5593 2 Drupal, Fedoraproject 2 Drupal, Fedora 2021-04-19 6.8 MEDIUM N/A
install.php in Drupal 5.x before 5.3, when the configured database server is not reachable, allows remote attackers to execute arbitrary code via vectors that cause settings.php to be modified.
CVE-2007-5594 2 Drupal, Fedoraproject 2 Drupal, Fedora 2021-04-19 4.3 MEDIUM N/A
Drupal 5.x before 5.3 does not apply its Drupal Forms API protection against the user deletion form, which allows remote attackers to delete users via a cross-site request forgery (CSRF) attack.
CVE-2008-1729 1 Drupal 1 Drupal 2021-04-19 5.8 MEDIUM N/A
The menu system in Drupal 6 before 6.2 has incorrect menu settings, which allows remote attackers to (1) edit the profile pages of arbitrary users, and obtain sensitive information from (2) tracker and (3) blog pages, related to a missing check for the "access content" permission; and (4) allows remote authenticated users, with administration page view access, to edit content types.
CVE-2008-2271 1 Site Documentation Project 1 Site Documentation 2021-04-19 5.0 MEDIUM N/A
The Site Documentation Drupal module 5.x before 5.x-1.8 and 6.x before 6.x-1.1 allows remote authenticated users to gain privileges of other users by leveraging the "access content" permission to list tables and obtain session IDs from the database.
CVE-2021-28834 3 Debian, Fedoraproject, Kramdown Project 3 Debian Linux, Fedora, Kramdown 2021-04-19 6.8 MEDIUM 9.8 CRITICAL
Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated.
CVE-2021-26929 2 Debian, Horde 2 Debian Linux, Groupware 2021-04-19 4.3 MEDIUM 6.1 MEDIUM
An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.
CVE-2021-30046 1 Vigra Computer Vision Library Project 1 Vigra Computer Vision Library 2021-04-19 4.3 MEDIUM 6.5 MEDIUM
VIGRA Computer Vision Library Version-1-11-1 contains a segmentation fault vulnerability in the impex.hxx read_image_band() function, in which a crafted file can cause a denial of service.
CVE-2020-35775 1 Citsmart 1 Citsmart 2021-04-19 7.5 HIGH 9.8 CRITICAL
CITSmart before 9.1.2.23 allows LDAP Injection.
CVE-2019-0195 1 Apache 1 Tapestry 2021-04-19 7.5 HIGH 9.8 CRITICAL
Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol could be used to craft a Java deserialization attack, thus running malicious injected Java code. The vector would be the t:formdata parameter from the Form component.
CVE-2021-26805 1 Tsmuxer Project 1 Tsmuxer 2021-04-19 4.3 MEDIUM 5.5 MEDIUM
Buffer Overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a malicious WAV file.
CVE-2021-28060 1 Group-office 1 Group Office 2021-04-19 5.0 MEDIUM 5.3 MEDIUM
A Server-Side Request Forgery (SSRF) vulnerability in Group Office 6.4.196 allows a remote attacker to forge GET requests to arbitrary URLs via the url parameter to group/api/upload.php.
CVE-2021-26832 1 Priority-software 1 Priority Enterprise Management System 2021-04-19 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS) in the "Reset Password" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.
CVE-2020-35418 1 Group-office 1 Group Office 2021-04-19 3.5 LOW 5.4 MEDIUM
Cross Site Scripting (XSS) in the contact page of Group Office CRM 6.4.196 by uploading a crafted svg file.
CVE-2020-35419 1 Group-office 1 Group Office 2021-04-19 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS) in Group Office CRM 6.4.196 via the SET_LANGUAGE parameter.
CVE-2021-27130 1 Online Reviewer System Project 1 Online Reviewer System 2021-04-19 7.5 HIGH 9.8 CRITICAL
Online Reviewer System 1.0 contains a SQL injection vulnerability through authentication bypass, which may lead to a reverse shell upload.
CVE-2020-35660 1 Monicahq 1 Monica 2021-04-19 3.5 LOW 5.4 MEDIUM
Cross Site Scripting (XSS) in Monica before 2.19.1 via the journal page.
CVE-2021-27112 1 Lightcms Project 1 Lightcms 2021-04-19 7.5 HIGH 9.8 CRITICAL
LightCMS v1.3.5 contains a remote code execution vulnerability in /app/Http/Controllers/Admin/NEditorController.php during the downloading of external images.
CVE-2021-27129 1 Casap Automated Enrollment System Project 1 Casap Automated Enrollment System 2021-04-19 3.5 LOW 5.4 MEDIUM
CASAP Automated Enrollment System version 1.0 contains a cross-site scripting (XSS) vulnerability through the Students > Edit > ROUTE parameter.
CVE-2021-20080 1 Zohocorp 1 Manageengine Servicedesk Plus 2021-04-19 4.3 MEDIUM 6.1 MEDIUM
Insufficient output sanitization in ManageEngine ServiceDesk Plus before version 11200 and ManageEngine AssetExplorer before version 6800 allows a remote, unauthenticated attacker to conduct persistent cross-site scripting (XSS) attacks by uploading a crafted XML asset file.
CVE-2021-21432 1 Go-vela 1 Vela 2021-04-19 3.5 LOW 6.5 MEDIUM
Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. An authentication mechanism added in version 0.7.0 enables some malicious user to obtain secrets utilizing the injected credentials within the `~/.netrc` file. Refer to the referenced GitHub Security Advisory for complete details. This is fixed in version 0.7.5.
CVE-2021-25358 1 Google 1 Android 2021-04-19 2.1 LOW 3.3 LOW
A vulnerability that stores IMSI values in an improper path prior to SMR APR-2021 Release 1 allows local attackers to access IMSI values without any permission via untrusted applications.
CVE-2021-25359 1 Google 1 Android 2021-04-19 2.1 LOW 3.3 LOW
An improper SELinux policy prior to SMR APR-2021 Release 1 allows local attackers to access AP information without proper permissions via untrusted applications.
CVE-2021-25360 1 Google 1 Android 2021-04-19 7.5 HIGH 9.8 CRITICAL
An improper input validation vulnerability in libswmfextractor library prior to SMR APR-2021 Release 1 allows attackers to execute arbitrary code on mediaextractor process.
CVE-2021-28142 1 Citsmart 1 Citsmart 2021-04-19 6.5 MEDIUM 8.8 HIGH
CITSmart before 9.1.2.28 mishandles the "filtro de autocomplete."
CVE-2021-27603 1 Sap 1 Netweaver As Abap 2021-04-19 4.0 MEDIUM 6.5 MEDIUM
An RFC enabled function module SPI_WAIT_MILLIS in SAP NetWeaver AS ABAP, versions - 731, 740, 750, allows to keep a work process busy for any length of time. An attacker could call this function module multiple times to block all work processes thereby causing Denial of Service and affecting the Availability of the SAP system.
CVE-2021-27605 1 Sap 1 Fiori Apps 2.0 For Travel Management In Sap Erp 2021-04-19 4.0 MEDIUM 4.3 MEDIUM
SAP's HCM Travel Management Fiori Apps V2, version - 608, does not perform proper authorization check, allowing an authenticated but unauthorized attacker to read personnel numbers of employees, resulting in escalation of privileges. However, the attacker can only read some information like last name, first name of the employees, so there is some loss of confidential information, Integrity and Availability are not impacted.
CVE-2021-21399 1 Ampache 1 Ampache 2021-04-19 5.0 MEDIUM 7.5 HIGH
Ampache is a web based audio/video streaming application and file manager. Versions prior to 4.4.1 allow unauthenticated access to Ampache using the subsonic API. To successfully make the attack you must use a username that is not part of the site to bypass the auth checks. For more details and workaround guidance see the referenced GitHub security advisory.
CVE-2017-6910 2 Kaazing, Tenefit 2 Kaazing Gateway, Kaazing Websocket Gateway 2021-04-19 5.0 MEDIUM 7.5 HIGH
The HTTP and WebSocket engine components in the server in Kaazing Gateway before 4.5.3 hotfix-1, Gateway - JMS Edition before 4.0.5 hotfix-15, 4.0.6 before hotfix-4, 4.0.7, 4.0.9 before hotfix-19, 4.4.x before 4.4.2 hotfix-1, 4.5.x before 4.5.3 hotfix-1, and Gateway Community and Enterprise Editions before 5.6.0 allow remote attackers to bypass intended access restrictions and obtain sensitive information via vectors related to HTTP request handling.
CVE-2021-24154 1 Themeeditor 1 Theme Editor 2021-04-19 4.0 MEDIUM 4.9 MEDIUM
The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd
CVE-2021-29379 1 Dlink 2 Dir-802, Dir-802 Firmware 2021-04-19 5.8 MEDIUM 8.8 HIGH
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on D-Link DIR-802 A1 devices through 1.00b05. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2019-17656 1 Fortinet 2 Fortios, Fortiproxy 2021-04-19 4.0 MEDIUM 6.5 MEDIUM
A Stack-based Buffer Overflow vulnerability in the HTTPD daemon of FortiOS 6.0.10 and below, 6.2.2 and below and FortiProxy 1.0.x, 1.1.x, 1.2.9 and below, 2.0.0 and below may allow an authenticated remote attacker to crash the service by sending a malformed PUT request to the server. Fortinet is not aware of any successful exploitation of this vulnerability that would lead to code execution.
CVE-2013-1054 1 Canonical 2 Ubuntu Linux, Unity-firefox-extension 2021-04-19 4.3 MEDIUM 6.5 MEDIUM
The unity-firefox-extension package could be tricked into destroying the Unity webapps context, causing Firefox to crash. This could be achieved by spinning the event loop inside the webapps initialization callback. Fixed in 3.0.0+14.04.20140416-0ubuntu1.14.04.1 by shipping an empty package, thus disabling the extension entirely.
CVE-2021-1459 1 Cisco 8 Rv110w, Rv110w Firmware, Rv130 and 5 more 2021-04-19 10.0 HIGH 9.8 CRITICAL
A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the affected device. Cisco has not released software updates that address this vulnerability.
CVE-2015-7855 4 Debian, Netapp, Ntp and 1 more 11 Debian Linux, Clustered Data Ontap, Data Ontap and 8 more 2021-04-19 4.0 MEDIUM 6.5 MEDIUM
The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.
CVE-2021-23372 1 Mongo-express Project 1 Mongo-express 2021-04-19 5.0 MEDIUM 7.5 HIGH
All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash.
CVE-2021-29435 1 Trestle-auth Project 1 Trestle-auth 2021-04-19 4.3 MEDIUM 6.5 MEDIUM
trestle-auth is an authentication plugin for the Trestle admin framework. A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials. The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems.
CVE-2021-29438 1 Nextcloud\/dialogs Project 1 Nextcloud\/dialogs 2021-04-19 4.3 MEDIUM 5.4 MEDIUM
The Nextcloud dialogs library (npm package @nextcloud/dialogs) before 3.1.2 insufficiently escaped text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability. The vulnerability has been patched in version 3.1.2 If you need to display HTML in the toast, explicitly pass the `options.isHTML` config flag.
CVE-2015-5219 10 Canonical, Debian, Fedoraproject and 7 more 20 Ubuntu Linux, Debian Linux, Fedora and 17 more 2021-04-19 5.0 MEDIUM 7.5 HIGH
The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
CVE-2016-3179 1 Miniupnp Project 1 Minissdpd 2021-04-19 2.1 LOW 5.5 MEDIUM
The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (invalid free and daemon crash) via vectors related to error handling.
CVE-2020-9499 2 Dahua, Dahuasecurity 38 N54a4p, Ipc-hx2xxx, Ipc-hx2xxx Firmware and 35 more 2021-04-19 6.5 MEDIUM 7.2 HIGH
Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down.
CVE-2021-29439 1 Getgrav 1 Grav Admin 2021-04-19 6.5 MEDIUM 7.2 HIGH
The Grav admin plugin prior to version 1.10.11 does not correctly verify caller's privileges. As a consequence, users with the permission `admin.login` can install third-party plugins and their dependencies. By installing the right plugin, an attacker can obtain an arbitrary code execution primitive and elevate their privileges on the instance. The vulnerability has been addressed in version 1.10.11. As a mitigation blocking access to the `/admin` path from untrusted sources will reduce the probability of exploitation.
CVE-2021-1474 1 Cisco 1 Umbrella 2021-04-19 6.8 MEDIUM 8.6 HIGH
Multiple vulnerabilities in the Admin audit log export feature and Scheduled Reports feature of Cisco Umbrella could allow an authenticated, remote attacker to perform formula and link injection attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.