Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-38900 1 Ibm 3 Business Automation Workflow, Business Process Manager, Workflow Process Service 2022-07-12 4.0 MEDIUM 6.5 MEDIUM
IBM Business Process Manager 8.5 and 8.6 and IBM Business Automation Workflow 18.0, 19.0, 20.0 and 21.0 could allow a privileged user to obtain highly sensitive information due to improper access controls. IBM X-Force ID: 209607.
CVE-2021-44877 1 Dalmark 1 Systeam Enterprise Resource Planning 2022-07-12 5.0 MEDIUM 7.5 HIGH
Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. A broken access control vulnerability has been found while using a temporary generated token in order to consume api resources. The vulnerability allows an unauthenticated attacker to use an api endpoint to generate a temporary JWT token that is designed to reference the correct tenant prior to authentication, to request system configuration parameters using direct api requests. The correct exploitation of this vulnerability causes sensitive information exposure. In case the tenant has an smtp credential set, the full credential information is disclosed.
CVE-2021-45091 1 Stormshield 1 Endpoint Security 2022-07-12 4.0 MEDIUM 4.3 MEDIUM
Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control.
CVE-2021-45089 1 Stormshield 1 Endpoint Security 2022-07-12 2.3 LOW 5.2 MEDIUM
Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control.
CVE-2021-22057 2 Linux, Vmware 2 Linux Kernel, Workspace One Access 2022-07-12 7.5 HIGH 9.8 CRITICAL
VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 contain an authentication bypass vulnerability. A malicious actor, who has successfully provided first-factor authentication, may be able to obtain second-factor authentication provided by VMware Verify.
CVE-2021-43441 1 Iorder Project 1 Iorder 2022-07-12 5.0 MEDIUM 5.3 MEDIUM
An HTML Injection Vulnerability in iOrder 1.0 allows the remote attacker to execute Malicious HTML codes via the signup form
CVE-2021-43439 1 Iresturant Project 1 Iresturant 2022-07-12 10.0 HIGH 9.8 CRITICAL
RCE in Add Review Function in iResturant 1.0 Allows remote attacker to execute commands remotely
CVE-2021-32499 1 Sick 1 Sopas Engineering Tool 2022-07-12 5.0 MEDIUM 7.5 HIGH
SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the command line arguments to pass in any value to the Emulator executable.
CVE-2021-0673 2 Google, Mediatek 28 Android, Mt6779, Mt6781 and 25 more 2022-07-12 4.6 MEDIUM 7.8 HIGH
In Audio Aurisys HAL, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05977326; Issue ID: ALPS05977326.
CVE-2021-44857 1 Mediawiki 1 Mediawiki 2022-07-12 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=mcrundo followed by action=mcrrestore to replace the content of any arbitrary page (that the user doesn't have edit rights for). This applies to any public wiki, or a private wiki that has at least one page set in $wgWhitelistRead.
CVE-2020-35210 1 Atomix 1 Atomix 2022-07-12 4.0 MEDIUM 6.5 MEDIUM
A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.
CVE-2021-45092 1 Cybelesoft 1 Thinfinity Virtualui 2022-07-12 7.5 HIGH 9.8 CRITICAL
Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter.
CVE-2021-27856 1 Fatpipeinc 6 Ipvpn, Ipvpn Firmware, Mpvpn and 3 more 2022-07-12 7.5 HIGH 9.8 CRITICAL
FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 includes an account named "cmuser" that has administrative privileges and no password. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA002.
CVE-2021-39655 1 Google 1 Android 2022-07-12 7.5 HIGH 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-192641593References: N/A
CVE-2021-39653 1 Google 1 Android 2022-07-12 4.6 MEDIUM 7.8 HIGH
In (TBD) of (TBD), there is a possible way to boot with a hidden debug policy due to a missing warning to the user. This could lead to local escalation of privilege after preparing the device, hiding the warning, and passing the phone to a new user, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-193443223References: N/A
CVE-2021-39651 1 Google 1 Android 2022-07-12 4.6 MEDIUM 7.8 HIGH
In TBD of TBD, there is a possible way to access PIN protected settings bypassing PIN confirmation due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-193438173References: N/A
CVE-2021-39648 1 Google 1 Android 2022-07-12 1.9 LOW 4.1 MEDIUM
In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel
CVE-2021-39645 1 Google 1 Android 2022-07-12 10.0 HIGH 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-199805112References: N/A
CVE-2021-39644 1 Google 1 Android 2022-07-12 7.5 HIGH 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-199809304References: N/A
CVE-2021-39643 1 Google 1 Android 2022-07-12 4.6 MEDIUM 6.7 MEDIUM
In ic_startRetrieveEntryValue of acropora/app/identity/ic.c, there is a possible bypass of defense-in-depth due to missing validation of the return value. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195573629References: N/A
CVE-2021-39641 1 Google 1 Android 2022-07-12 7.5 HIGH 9.8 CRITICAL
Product: AndroidVersions: Android kernelAndroid ID: A-126949257References: N/A
CVE-2021-39639 1 Google 1 Android 2022-07-12 7.2 HIGH 6.8 MEDIUM
In TBD of fvp.c, there is a possible way to glitch CPU behavior due to a missing permission check. This could lead to local escalation of privilege with physical access to device internals with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-198291476References: N/A
CVE-2021-39636 1 Google 1 Android 2022-07-12 2.1 LOW 4.4 MEDIUM
In do_ipt_get_ctl and do_ipt_set_ctl of ip_tables.c, there is a possible way to leak kernel information due to uninitialized data. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-120612905References: Upstream kernel
CVE-2021-1034 1 Google 1 Android 2022-07-12 2.1 LOW 3.3 LOW
In getLine1NumberForDisplay of PhoneInterfaceManager.java, there is apossible way to determine whether an app is installed, without querypermissions due to a missing permission check. This could lead to localinformation disclosure with no additional execution privileges needed. Userinteraction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-193441322
CVE-2021-1027 1 Google 1 Android 2022-07-12 4.6 MEDIUM 7.8 HIGH
In setTransactionState of SurfaceFlinger, there is possible arbitrary code execution in a privileged process due to improper casting. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-193033243
CVE-2021-1025 1 Google 1 Android 2022-07-12 2.1 LOW 5.5 MEDIUM
In hasNamedWallpaper of WallpaperManagerService.java, there is a possible way to determine whether an app is installed, without query permissions, due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-193800652
CVE-2021-1019 1 Google 1 Android 2022-07-12 4.4 MEDIUM 7.3 HIGH
In snoozeNotification of NotificationListenerService.java, there is a possible permission confusion due to a misleading user consent dialog. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-195031401
CVE-2021-1011 1 Google 1 Android 2022-07-12 2.1 LOW 5.5 MEDIUM
In setPackageStoppedState of PackageManagerService.java, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-188219307
CVE-2021-1010 1 Google 1 Android 2022-07-12 2.1 LOW 5.5 MEDIUM
In getSigningKeySet of PackageManagerService.java, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-189857801
CVE-2021-1004 1 Google 1 Android 2022-07-12 4.6 MEDIUM 7.8 HIGH
In getConfiguredNetworks of WifiServiceImpl.java, there is a possible way to determine whether an app is installed, without query permissions, due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-197749180
CVE-2021-0999 1 Google 1 Android 2022-07-12 4.6 MEDIUM 7.8 HIGH
In the broadcast definition in AndroidManifest.xml, there is a possible way to set the A2DP bluetooth device connection state due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-196858999
CVE-2021-0994 1 Google 1 Android 2022-07-12 2.1 LOW 3.3 LOW
In requestRouteToHostAddress of ConnectivityService.java, there is a possible way to determine whether an app is installed, without query permissions, due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-193801134
CVE-2021-0993 1 Google 1 Android 2022-07-12 4.3 MEDIUM 6.5 MEDIUM
In getOffsetBeforeAfter of TextLine.java, there is a possible denial of service due to resource exhaustion. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-193849901
CVE-2021-0992 1 Google 1 Android 2022-07-12 1.9 LOW 3.3 LOW
In onCreate of PaymentDefaultDialog.java, there is a possible way to change a default payment app without user consent due to tapjack overlay. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-180104327
CVE-2021-0985 1 Google 1 Android 2022-07-12 4.6 MEDIUM 7.8 HIGH
In onReceive of AlertReceiver.java, there is a possible way to dismiss system dialog due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-190403923
CVE-2021-0982 1 Google 1 Android 2022-07-12 2.1 LOW 3.3 LOW
In getOrganizationNameForUser of DevicePolicyManagerService.java, there is a possible organization name disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-192368508
CVE-2021-0966 1 Google 1 Android 2022-07-12 2.1 LOW 5.5 MEDIUM
In code generated by BuildParcelFields of generate_cpp.cpp, there is a possible way for a crafted parcelable to reveal uninitialized memory of a target process due to uninitialized data. This could lead to local information disclosure across Binder transactions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12Android ID: A-198346478
CVE-2021-0965 1 Google 1 Android 2022-07-12 5.8 MEDIUM 8.8 HIGH
In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user's consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194300867
CVE-2021-0931 1 Google 1 Android 2022-07-12 4.7 MEDIUM 5.5 MEDIUM
In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-180747689
CVE-2021-0920 2 Debian, Google 2 Debian Linux, Android 2022-07-12 6.9 MEDIUM 6.4 MEDIUM
In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
CVE-2021-0799 1 Google 1 Android 2022-07-12 7.2 HIGH 7.8 HIGH
In ActivityThread.java, there is a possible way to collide the content provider's authorities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-197647956
CVE-2021-0769 1 Google 1 Android 2022-07-12 4.4 MEDIUM 7.3 HIGH
In onCreate of AllowBindAppWidgetActivity.java, there is a possible bypass of user interaction requirements due to unclear UI. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-184676316
CVE-2021-0653 1 Google 1 Android 2022-07-12 4.9 MEDIUM 5.5 MEDIUM
In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-177931370
CVE-2021-0649 1 Google 1 Android 2022-07-12 7.2 HIGH 7.8 HIGH
In stopVpnProfile of Vpn.java, there is a possible VPN profile reset due to a permissions bypass. This could lead to local escalation of privilege CONTROL_ALWAYS_ON_VPN with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-191382886
CVE-2021-0434 1 Google 1 Android 2022-07-12 6.9 MEDIUM 7.3 HIGH
In onReceive of BluetoothPermissionRequest.java, there is a possible phishing attack allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-167403112
CVE-2021-44657 1 Stackstorm 1 Stackstorm 2022-07-12 9.0 HIGH 8.8 HIGH
In StackStorm versions prior to 3.6.0, the jinja interpreter was not run in sandbox mode and thus allows execution of unsafe system commands. Jinja does not enable sandboxed mode by default due to backwards compatibility. Stackstorm now sets sandboxed mode for jinja by default.
CVE-2021-43899 1 Microsoft 2 Wireless Display Adapter, Wireless Display Adapter Firmware 2022-07-12 7.5 HIGH 9.8 CRITICAL
Microsoft 4K Wireless Display Adapter Remote Code Execution Vulnerability
CVE-2021-43893 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-07-12 6.0 MEDIUM 7.5 HIGH
Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
CVE-2021-43891 1 Microsoft 1 Visual Studio Code 2022-07-12 6.8 MEDIUM 7.8 HIGH
Visual Studio Code Remote Code Execution Vulnerability
CVE-2021-43883 1 Microsoft 10 Windows 10, Windows 11, Windows 7 and 7 more 2022-07-12 4.6 MEDIUM 7.8 HIGH
Windows Installer Elevation of Privilege Vulnerability