Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-15234 1 Ory 1 Fosite 2021-11-18 4.9 MEDIUM 4.8 MEDIUM
ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite before version 0.34.1, the OAuth 2.0 Client's registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using strings.ToLower while they should have been compared with a simple string match. This allows an attacker to register a client with allowed redirect URL https://example.com/callback. Then perform an OAuth2 flow and requesting redirect URL https://example.com/CALLBACK. Instead of an error (invalid redirect URL), the browser is redirected to https://example.com/CALLBACK with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example). This vulnerability has been patched in ORY Fosite v0.34.1.
CVE-2021-26322 1 Amd 114 Epyc 7232p, Epyc 7232p Firmware, Epyc 7251 and 111 more 2021-11-18 5.0 MEDIUM 7.5 HIGH
Persistent platform private key may not be protected with a random IV leading to a potential “two time pad attack”.
CVE-2021-42361 1 Codepeople 1 Contact Form Email 2021-11-18 2.1 LOW 4.8 MEDIUM
The Contact Form Email WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the name parameter found in the ~/trunk/cp-admin-int-list.inc.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.3.24. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
CVE-2020-15233 1 Ory 1 Fosite 2021-11-18 4.9 MEDIUM 4.8 MEDIUM
ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1.
CVE-2020-16152 1 Extremenetworks 1 Aerohive Netconfig 2021-11-18 10.0 HIGH 9.8 CRITICAL
The NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file.
CVE-2020-15227 2 Debian, Nette 2 Debian Linux, Application 2021-11-18 7.5 HIGH 9.8 CRITICAL
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
CVE-2020-16102 1 Gallagher 1 Command Centre 2021-11-18 6.4 MEDIUM 8.2 HIGH
Improper Authentication vulnerability in Gallagher Command Centre Server allows an unauthenticated remote attacker to create items with invalid configuration, potentially causing the server to crash and fail to restart. This issue affects: Gallagher Command Centre 8.30 versions prior to 8.30.1299(MR2); 8.20 versions prior to 8.20.1218(MR4); 8.10 versions prior to 8.10.1253(MR6); 8.00 versions prior to 8.00.1252(MR7); version 7.90 and prior versions.
CVE-2020-15248 1 Octobercms 1 October 2021-11-18 4.6 MEDIUM 4.2 MEDIUM
October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.470, backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access. Issue has been patched in Build 470 (v1.0.470) & v1.1.1.
CVE-2020-15247 1 Octobercms 1 October 2021-11-18 4.4 MEDIUM 5.2 MEDIUM
October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.319 and before version 1.0.469, an authenticated backend user with the cms.manage_pages, cms.manage_layouts, or cms.manage_partials permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to cms.enableSafeMode being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having cms.enableSafeMode enabled, but would be a problem for anyone relying on cms.enableSafeMode to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
CVE-2020-15246 1 Octobercms 1 October 2021-11-18 5.0 MEDIUM 7.5 HIGH
October is a free, open-source, self-hosted CMS platform based on the Laravel PHP Framework. In October CMS from version 1.0.421 and before version 1.0.469, an attacker can read local files on an October CMS server via a specially crafted request. Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
CVE-2020-15238 3 Blueman Project, Debian, Fedoraproject 3 Blueman, Debian Linux, Fedora 2021-11-18 6.9 MEDIUM 7.0 HIGH
Blueman is a GTK+ Bluetooth Manager. In Blueman before 2.1.4, the DhcpClient method of the D-Bus interface to blueman-mechanism is prone to an argument injection vulnerability. The impact highly depends on the system configuration. If Polkit-1 is disabled and for versions lower than 2.0.6, any local user can possibly exploit this. If Polkit-1 is enabled for version 2.0.6 and later, a possible attacker needs to be allowed to use the `org.blueman.dhcp.client` action. That is limited to users in the wheel group in the shipped rules file that do have the privileges anyway. On systems with ISC DHCP client (dhclient), attackers can pass arguments to `ip link` with the interface name that can e.g. be used to bring down an interface or add an arbitrary XDP/BPF program. On systems with dhcpcd and without ISC DHCP client, attackers can even run arbitrary scripts by passing `-c/path/to/script` as an interface name. Patches are included in 2.1.4 and master that change the DhcpClient D-Bus method(s) to accept BlueZ network object paths instead of network interface names. A backport to 2.0(.8) is also available. As a workaround, make sure that Polkit-1-support is enabled and limit privileges for the `org.blueman.dhcp.client` action to users that are able to run arbitrary commands as root anyway in /usr/share/polkit-1/rules.d/blueman.rules.
CVE-2020-15266 1 Google 1 Tensorflow 2021-11-18 5.0 MEDIUM 7.5 HIGH
In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. The issue is patched in eccb7ec454e6617738554a255d77f08e60ee0808 and TensorFlow 2.4.0 will be released containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
CVE-2021-43617 1 Laravel 1 Framework 2021-11-18 7.5 HIGH 9.8 CRITICAL
Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. NOTE: this CVE Record is for Laravel Framework, and is unrelated to any reports concerning incorrectly written user applications for image upload.
CVE-2020-15244 1 Openmage 1 Magento 2021-11-18 6.5 MEDIUM 7.2 HIGH
In Magento (rubygems openmage/magento-lts package) before versions 19.4.8 and 20.0.4, an admin user can generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. The issue is patched in versions 19.4.8 and 20.0.4.
CVE-2020-15240 1 Auth0 1 Omniauth-auth0 2021-11-18 5.8 MEDIUM 9.1 CRITICAL
omniauth-auth0 (rubygems) versions >= 2.3.0 and < 2.4.1 improperly validate the JWT token signature when using the `jwt_validator.verify` method. Improper validation of the JWT token signature can allow an attacker to bypass authentication and authorization. You are affected by this vulnerability if all of the following conditions apply: 1. You are using `omniauth-auth0`. 2. You are using `JWTValidator.verify` method directly OR you are not authenticating using the SDK’s default Authorization Code Flow. The issue is patched in version 2.4.1.
CVE-2020-15269 1 Sparksolutions 1 Spree 2021-11-18 6.4 MEDIUM 9.1 CRITICAL
In Spree before versions 3.7.11, 4.0.4, or 4.1.11, expired user tokens could be used to access Storefront API v2 endpoints. The issue is patched in versions 3.7.11, 4.0.4 and 4.1.11. A workaround without upgrading is described in the linked advisory.
CVE-2020-15256 1 Object-path Project 1 Object-path 2021-11-18 6.8 MEDIUM 9.8 CRITICAL
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. The issue is fixed in object-path version 0.11.5 As a workaround, don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0.
CVE-2020-15245 1 Sylius 1 Sylius 2021-11-18 4.0 MEDIUM 4.3 MEDIUM
In Sylius before versions 1.6.9, 1.7.9 and 1.8.3, the user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (guest or normal one). The issue has been patched in Sylius 1.6.9, 1.7.9 and 1.8.3. As a workaround, you may resolve this issue on your own by creating a custom event listener, which will listen to the sylius.customer.pre_update event. You can determine that email has been changed if customer email and user username are different. They are synchronized later on. Pay attention, to email changing behavior for administrators. You may need to skip this logic for them. In order to achieve this, you should either check master request path info, if it does not contain /admin prefix or adjust event triggered during customer update in the shop. You can find more information on how to customize the event here.
CVE-2020-15262 1 Webpack-subresource-integrity Project 1 Webpack-subresource-integrity 2021-11-18 5.0 MEDIUM 3.7 LOW
In webpack-subresource-integrity before version 1.5.1, all dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected. This issue is patched in version 1.5.1.
CVE-2020-15255 1 Anuko 1 Time Tracker 2021-11-18 6.0 MEDIUM 7.3 HIGH
In Anuko Time Tracker before verion 1.19.23.5325, due to not properly filtered user input a CSV export of a report could contain cells that are treated as formulas by spreadsheet software (for example, when a cell value starts with an equal sign). This is fixed in version 1.19.23.5325.
CVE-2020-15252 1 Xwiki 1 Xwiki 2021-11-18 9.0 HIGH 8.8 HIGH
In XWiki before version 12.5 and 11.10.6, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. This is patched in XWiki 12.5 and XWiki 11.10.6.
CVE-2020-15157 3 Canonical, Debian, Linuxfoundation 3 Ubuntu Linux, Debian Linux, Containerd 2021-11-18 2.6 LOW 6.1 MEDIUM
In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to the cloud virtual instance which can grant access to other cloud resources in the account. The default containerd resolver is used by the cri-containerd plugin (which can be used by Kubernetes), the ctr development tool, and other client programs that have explicitly linked against it. This vulnerability has been fixed in containerd 1.2.14. containerd 1.3 and later are not affected. If you are using containerd 1.3 or later, you are not affected. If you are using cri-containerd in the 1.2 series or prior, you should ensure you only pull images from trusted sources. Other container runtimes built on top of containerd but not using the default resolver (such as Docker) are not affected.
CVE-2021-37203 1 Siemens 2 Nx 1980, Solid Edge 2021-11-18 5.8 MEDIUM 7.1 HIGH
A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The plmxmlAdapterIFC.dll contains an out-of-bounds read while parsing user supplied IFC files which could result in a read past the end of an allocated buffer. This could allow an attacker to cause a denial-of-service condition or read sensitive information from memory locations.
CVE-2021-37202 1 Siemens 2 Nx 1980, Solid Edge 2021-11-18 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The IFC adapter in affected application contains a use-after-free vulnerability that could be triggered while parsing user-supplied IFC files. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-21627 1 Ruijie 2 Rg-uac, Rg-uac Firmware 2021-11-18 5.0 MEDIUM 7.5 HIGH
Ruijie RG-UAC commit 9071227 was discovered to contain a vulnerability in the component /current_action.php?action=reboot, which allows attackers to cause a denial of service (DoS) via unspecified vectors.
CVE-2020-12892 2 Amd, Microsoft 2 Radeon Software, Windows 10 2021-11-18 4.4 MEDIUM 7.8 HIGH
An untrusted search path in AMD Radeon settings Installer may lead to a privilege escalation or unauthorized code execution.
CVE-2021-39827 2 Adobe, Apple 2 Digital Editions, Macos 2021-11-18 6.8 MEDIUM 6.5 MEDIUM
Adobe Digital Editions 4.5.11.187646 (and earlier) are affected by an arbitrary file write vulnerability in the Digital Editions installer. An authenticated attacker could leverage this vulnerability to write an arbitrary file to the system. User interaction is required before product installation to abuse this vulnerability.
CVE-2021-30622 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30622 Use after free in WebApp Installs
CVE-2021-30624 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30624 Use after free in Autofill
CVE-2021-30623 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30623 Use after free in Bookmarks
CVE-2021-30621 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 4.3 MEDIUM 6.5 MEDIUM
Chromium: CVE-2021-30621 UI Spoofing in Autofill
CVE-2021-30620 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink
CVE-2021-30619 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 4.3 MEDIUM 6.5 MEDIUM
Chromium: CVE-2021-30619 UI Spoofing in Autofill
CVE-2021-30618 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30618 Inappropriate implementation in DevTools
CVE-2021-30606 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30606 Use after free in Blink
CVE-2021-30608 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30608 Use after free in Web Share
CVE-2021-30617 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 4.3 MEDIUM 6.5 MEDIUM
Chromium: CVE-2021-30617 Policy bypass in Blink
CVE-2021-30616 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30616 Use after free in Media
CVE-2021-30609 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30609 Use after free in Sign-In
CVE-2021-30614 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip
CVE-2021-30613 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30613 Use after free in Base internals
CVE-2021-30612 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30612 Use after free in WebRTC
CVE-2020-21639 1 Ruijie 2 Rg-uac 6000-e50, Rg-uac 6000-e50 Firmware 2021-11-18 4.3 MEDIUM 6.1 MEDIUM
Ruijie RG-UAC 6000-E50 commit 9071227 was discovered to contain a cross-site scripting (XSS) vulnerability via the rule_name parameter. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
CVE-2021-30611 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30611 Use after free in WebRTC
CVE-2021-30610 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30610 Use after free in Extensions API
CVE-2021-30607 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2021-11-18 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30607 Use after free in Permissions
CVE-2021-21814 1 Att 1 Xmill 2021-11-18 4.6 MEDIUM 7.8 HIGH
Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to strlen to determine the ending location of the char* passed in by the user, no checks are done to see if the passed in char* is longer than the staticly sized buffer data is memcpy‘d into, but after the memcpy a null byte is written to what is assumed to be the end of the buffer to terminate the char*, but without length checks, this null write occurs at an arbitrary offset from the buffer. An attacker can provide malicious input to trigger this vulnerability.
CVE-2021-21813 1 Att 1 Xmill 2021-11-18 4.6 MEDIUM 7.8 HIGH
Within the function HandleFileArg the argument filepattern is under control of the user who passes it in from the command line. filepattern is passed directly to memcpy copying the path provided by the user into a staticly sized buffer without any length checks resulting in a stack-buffer overflow.
CVE-2020-12963 2 Amd, Microsoft 2 Radeon Software, Windows 10 2021-11-18 7.2 HIGH 7.8 HIGH
An insufficient pointer validation vulnerability in the AMD Graphics Driver for Windows may allow unprivileged users to compromise the system.
CVE-2020-12929 2 Amd, Microsoft 2 Radeon Software, Windows 10 2021-11-18 4.6 MEDIUM 7.8 HIGH
Improper parameters validation in some trusted applications of the PSP contained in the AMD Graphics Driver may allow a local attacker to bypass security restrictions and achieve arbitrary code execution .