Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-12488 1 Vivo 1 Jovi Smart Scene 2021-11-15 2.1 LOW 5.5 MEDIUM
The attacker can access the sensitive information stored within the jovi Smart Scene module by entering carefully constructed commands without requesting permission.
CVE-2021-43523 2 Uclibc, Uclibc-ng Project 2 Uclibc, Uclibc-ng 2021-11-15 6.8 MEDIUM 9.6 CRITICAL
In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names returned by DNS servers via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo can lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur.
CVE-2021-41253 1 Zyantific 1 Zydis 2021-11-15 6.8 MEDIUM 8.1 HIGH
Zydis is an x86/x86-64 disassembler library. Users of Zydis versions v3.2.0 and older that use the string functions provided in `zycore` in order to append untrusted user data to the formatter buffer within their custom formatter hooks can run into heap buffer overflows. Older versions of Zydis failed to properly initialize the string object within the formatter buffer, forgetting to initialize a few fields, leaving their value to chance. This could then in turn cause zycore functions like `ZyanStringAppend` to make incorrect calculations for the new target size, resulting in heap memory corruption. This does not affect the regular uncustomized Zydis formatter, because Zydis internally doesn't use the string functions in zycore that act upon these fields. However, because the zycore string functions are the intended way to work with the formatter buffer for users of the library that wish to extend the formatter, we still consider this to be a vulnerability in Zydis. This bug is patched starting in version 3.2.1. As a workaround, users may refrain from using zycore string functions in their formatter hooks until updating to a patched version.
CVE-2021-3060 1 Paloaltonetworks 2 Pan-os, Prisma Access 2021-11-15 9.3 HIGH 8.1 HIGH
An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers with Prisma Access 2.1 Preferred and Prisma Access 2.1 Innovation firewalls are impacted by this issue.
CVE-2021-3059 1 Paloaltonetworks 1 Pan-os 2021-11-15 7.6 HIGH 8.1 HIGH
An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers that have Prisma Access 2.1 Preferred or Prisma Access 2.1 Innovation firewalls are impacted by this issue.
CVE-2021-3058 1 Paloaltonetworks 1 Pan-os 2021-11-15 9.0 HIGH 7.2 HIGH
An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. This issue does not impact Prisma Access firewalls.
CVE-2021-3056 1 Paloaltonetworks 1 Pan-os 2021-11-15 8.5 HIGH 8.8 HIGH
A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.
CVE-2020-23890 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted JPG file. Related to Data from Faulting Address is used as one or more arguments in a subsequent Function Call starting at JPGCodec+0x753648.
CVE-2020-23898 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in Editor+0x5ea2 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.
CVE-2020-23897 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in Editor!TMethodImplementationIntercept+0x54dcec of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.
CVE-2020-23896 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in Editor+0x576b of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.
CVE-2020-23895 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in Editor+0x76af of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.
CVE-2020-23893 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in Editor!TMethodImplementationIntercept+0x3c3682 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.
CVE-2020-23891 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in Editor+0x5cd7 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.
CVE-2020-23899 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in Editor+0x5f91 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.
CVE-2020-23894 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in ntdll!RtlpCoalesceFreeBlocks+0x268 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tiff file.
CVE-2020-23901 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in Editor+0x5d15 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file.
CVE-2020-23900 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file. Related to Data from Faulting Address controls Code Flow starting at Editor!TMethodImplementationIntercept+0x57a3b.
CVE-2021-40504 1 Sap 1 Netweaver Application Server For Abap 2021-11-13 4.0 MEDIUM 4.9 MEDIUM
A certain template role in SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, contains transport authorizations, which exceed expected display only permissions.
CVE-2021-40261 1 Casap Automated Enrollment System Project 1 Casap Automated Enrollment System 2021-11-13 4.3 MEDIUM 6.1 MEDIUM
Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester CASAP Automated Enrollment System 1.0 via the (1) user_username and (2) category parameters in save_class.php, the (3) firstname, (4) class, and (5) status parameters in student_table.php, the (6) category and (7) class_name parameters in add_class1.php, the (8) fname, (9) mname,(10) lname, (11) address, (12) class, (13) gfname, (14) gmname, (15) glname, (16) rship, (17) status, (18) transport, and (19) route parameters in add_student.php, the (20) fname, (21) mname, (22) lname, (23) address, (24) class, (25) fgname, (26) gmname, (27) glname, (28) rship, (29) status, (30) transport, and (31) route parameters in save_stud.php,the (32) status, (33) fname, and (34) lname parameters in add_user.php, the (35) username, (36) firstname, and (37) status parameters in users.php, the (38) fname, (39) lname, and (40) status parameters in save_user.php, and the (41) activity_log, (42) aprjun, (43) class, (44) janmar, (45) Julsep,(46) octdec, (47) Students and (48) users parameters in table_name.
CVE-2021-40260 1 Tailor Management System Project 1 Tailor Management System 2021-11-13 4.3 MEDIUM 6.1 MEDIUM
Multiple Cross Site Scripting (XSS) vulnerabilities exist in SourceCodester Tailor Management 1.0 via the (1) eid parameter in (a) partedit.php and (b) customeredit.php, the (2) id parameter in (a) editmeasurement.php and (b) addpayment.php, and the (3) error parameter in index.php.
CVE-2020-23572 1 Beescms 1 Beescms 2021-11-13 6.8 MEDIUM 8.8 HIGH
BEESCMS v4.0 was discovered to contain an arbitrary file upload vulnerability via the component /admin/upload.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.
CVE-2021-39420 1 Vfront 1 Vfront 2021-11-13 4.3 MEDIUM 6.1 MEDIUM
Multiple Cross Site Scripting (XSS) vulnerabilities exist in VFront 0.99.5 via the (1) s parameter in search_all.php and the (2) msg parameter in add.attach.php.
CVE-2021-24844 1 Wpaffiliatemanager 1 Affiliates Manager 2021-11-13 6.5 MEDIUM 7.2 HIGH
The Affiliates Manager WordPress plugin before 2.8.7 does not validate the orderby parameter before using it in an SQL statement in the admin dashboard, leading to an SQL Injection issue
CVE-2021-24840 1 Codesupply 1 Squaretype 2021-11-13 5.0 MEDIUM 5.3 MEDIUM
The Squaretype WordPress theme before 3.0.4 allows unauthenticated users to manipulate the query_vars used to retrieve the posts to display in one of its REST endpoint, without any validation. As a result, private and scheduled posts could be retrieved via a crafted request.
CVE-2021-24835 1 Wclovers 1 Frontend Manager For Woocommerce Along With Bookings Subscription Listings Compatible 2021-11-13 6.5 MEDIUM 8.8 HIGH
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible WordPress plugin before 6.5.12, when used in combination with another WCFM - WooCommerce Multivendor plugin such as WCFM - WooCommerce Multivendor Marketplace, does not escape the withdrawal_vendor parameter before using it in a SQL statement, allowing low privilege users such as Subscribers to perform SQL injection attacks
CVE-2021-24832 1 Wp Seo Redirect 301 Project 1 Wp Seo Redirect 301 2021-11-13 4.3 MEDIUM 4.3 MEDIUM
The WP SEO Redirect 301 WordPress plugin before 2.3.2 does not have CSRF in place when deleting redirects, which could allow attackers to make a logged in admin delete them via a CSRF attack
CVE-2020-23888 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV in Editor!TMethodImplementationIntercept+0x53f6c3 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted psd file.
CVE-2020-23889 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A User Mode Write AV starting at Editor!TMethodImplementationIntercept+0x4189c6 of WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted ico file.
CVE-2020-28137 1 Genexis 2 Platinum 4410, Platinum 4410 Firmware 2021-11-13 7.1 HIGH 6.5 MEDIUM
Cross site request forgery (CSRF) in Genexis Platinum 4410 V2-1.28, allows attackers to cause a denial of service by continuously restarting the router.
CVE-2021-41038 1 Eclipse 1 Theia 2021-11-13 4.3 MEDIUM 6.1 MEDIUM
In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().
CVE-2020-23902 1 Wildbit-soft 1 Wildbit Viewer 2021-11-13 4.3 MEDIUM 5.5 MEDIUM
A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file. Related to Data from Faulting Address may be used as a return value starting at Editor!TMethodImplementationIntercept+0x528a3.
CVE-2021-41427 1 Beeline 2 Smart Box, Smart Box Firmware 2021-11-12 4.3 MEDIUM 6.1 MEDIUM
Beeline Smart Box 2.0.38 is vulnerable to Cross Site Scripting (XSS) via the choose_mac parameter to setup.cgi.
CVE-2021-41426 1 Beeline 2 Smart Box, Smart Box Firmware 2021-11-12 6.8 MEDIUM 8.8 HIGH
Beeline Smart box 2.0.38 is vulnerable to Cross Site Request Forgery (CSRF) via mgt_end_user.htm.
CVE-2021-40519 1 Airangel 10 Hsmx-app-100, Hsmx-app-1000, Hsmx-app-1000 Firmware and 7 more 2021-11-12 6.4 MEDIUM 10.0 CRITICAL
Airangel HSMX Gateway devices through 5.2.04 have Hard-coded Database Credentials.
CVE-2020-23876 1 Science-miner 1 Pdf2xml 2021-11-12 5.0 MEDIUM 7.5 HIGH
pdf2xml v2.0 was discovered to contain a memory leak in the function TextPage::testLinkedText.
CVE-2020-23872 1 Science-miner 1 Pdf2xml 2021-11-12 5.0 MEDIUM 7.5 HIGH
A NULL pointer dereference in the function TextPage::restoreState of pdf2xml v2.0 allows attackers to cause a denial of service (DoS).
CVE-2020-23877 1 Science-miner 1 Pdf2xml 2021-11-12 7.5 HIGH 9.8 CRITICAL
pdf2xml v2.0 was discovered to contain a stack buffer overflow in the component getObjectStream.
CVE-2020-23878 1 Flowpaper 1 Pdf2json 2021-11-12 7.5 HIGH 9.8 CRITICAL
pdf2json v0.71 was discovered to contain a stack buffer overflow in the component XRef::fetch.
CVE-2020-23879 1 Flowpaper 1 Pdf2json 2021-11-12 5.0 MEDIUM 7.5 HIGH
pdf2json v0.71 was discovered to contain a NULL pointer dereference in the component ObjectStream::getObject.
CVE-2021-40521 1 Airangel 10 Hsmx-app-100, Hsmx-app-1000, Hsmx-app-1000 Firmware and 7 more 2021-11-12 10.0 HIGH 9.8 CRITICAL
Airangel HSMX Gateway devices through 5.2.04 allow Remote Code Execution.
CVE-2021-40517 1 Airangel 10 Hsmx-app-100, Hsmx-app-1000, Hsmx-app-1000 Firmware and 7 more 2021-11-12 3.5 LOW 5.4 MEDIUM
Airangel HSMX Gateway devices through 5.2.04 is vulnerable to stored Cross Site Scripting. XSS Payload is placed in the name column of the updates table using database access.
CVE-2021-42026 1 Mendix 1 Mendix 2021-11-12 4.0 MEDIUM 4.3 MEDIUM
A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control read access for certain client actions. This could allow authenticated attackers to retrieve the changedDate attribute of arbitrary objects, even when they don't have read access to them.
CVE-2020-23884 1 Nomacs 1 Nomacs 2021-11-12 4.3 MEDIUM 5.5 MEDIUM
A buffer overflow in Nomacs v3.15.0 allows attackers to cause a denial of service (DoS) via a crafted MNG file.
CVE-2021-42025 1 Mendix 1 Mendix 2021-11-12 6.8 MEDIUM 6.5 MEDIUM
A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects in some cases, regardless whether they have write access to it.
CVE-2021-33618 1 Dolibarr 1 Dolibarr 2021-11-12 4.3 MEDIUM 6.1 MEDIUM
Dolibarr ERP and CRM 13.0.2 allows XSS via object details, as demonstrated by > and < characters in the onpointermove attribute of a BODY element to the user-management feature.
CVE-2021-33816 1 Dolibarr 1 Dolibarr 2021-11-12 7.5 HIGH 9.8 CRITICAL
The website builder module in Dolibarr 13.0.2 allows remote PHP code execution because of an incomplete protection mechanism in which system, exec, and shell_exec are blocked but backticks are not blocked.
CVE-2021-40501 1 Sap 1 Abap Platform Kernel 2021-11-12 5.5 MEDIUM 8.1 HIGH
SAP ABAP Platform Kernel - versions 7.77, 7.81, 7.85, 7.86, does not perform necessary authorization checks for an authenticated business user, resulting in escalation of privileges. That means this business user is able to read and modify data beyond the vulnerable system. However, the attacker can neither significantly reduce the performance of the system nor stop the system.
CVE-2021-38887 1 Ibm 1 Infosphere Information Server 2021-11-12 4.0 MEDIUM 6.5 MEDIUM
IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information from application response requests that could be used in further attacks against the system. IBM X-Force ID: 209401.
CVE-2021-25975 1 Publify Project 1 Publify 2021-11-12 3.5 LOW 5.4 MEDIUM
In publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS as a result of an unrestricted file upload. This issue allows a user with “publisher” role to inject malicious JavaScript via the uploaded html file.