Remotely alerts

CVE-2019-18945

on Oct. 19, 2021, 12:19 p.m.

Micro Focus Solutions Business Manager Application Repository versions prior to 11.7.1 are vulnerable to privilege escalation vulnerability.

Learn more

Tags:  Permissions RequiredRelease NotesVendor Advisory

CVE-2021-38179

on Oct. 19, 2021, 12:49 a.m.

Debug function of Admin UI of SAP Business One Integration is enabled by default. This allows Admin User to see the captured packet contents which may include User credentials.

Learn more

Tags:  Permissions Required

CVE-2021-38183

on Oct. 19, 2021, 12:30 a.m.

SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim and executed by the web browser, resulting in Cross-Site Scripting vulnerability.

Learn more

Tags:  Permissions Required

CVE-2021-40500

on Oct. 18, 2021, 6:21 p.m.

SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an unauthenticated attacker to exploit missing XML validations at endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can enable the attacker to retrieve arbitrary files from the server.

Learn more

Tags:  Permissions Required

CVE-2021-22930

on April 6, 2022, 1:57 p.m.

Node.js before 16.6.0, 14.17.4, and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-22958

on Oct. 15, 2021, 1:35 a.m.

A Server-Side Request Forgery vulnerability was found in concrete5 < 8.5.5 that allowed a decimal notation encoded IP address to bypass the limitations in place for localhost allowing interaction with local services. Impact can vary depending on services exposed.CVSSv2.0 AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N

Learn more

Tags:  Issue TrackingPermissions RequiredThird Party Advisory

CVE-2021-39201

on Oct. 14, 2021, 11:15 p.m.

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. ### Impact The issue allows an authenticated but low-privileged user (like contributor/author) to execute XSS in the editor. This bypasses the restrictions imposed on users who do not have the permission to post `unfiltered_html`. ### …

Learn more

Tags:  Permissions Required

CVE-2021-39200

on Dec. 14, 2021, 9:38 p.m.

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions output data of the function wp_die() can be leaked under certain conditions, which can include data like nonces. It can then be used to perform actions on your behalf. This has been …

Learn more

Tags:  Permissions Required

CVE-2021-31556

on Oct. 13, 2021, 2:15 a.m.

An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. MWOAuthConsumerSubmitControl.php does not ensure that the length of an RSA key will fit in a MySQL blob.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30625

on Dec. 9, 2021, 7:58 p.m.

Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30626

on Oct. 12, 2021, 10:51 p.m.

Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30627

on Oct. 12, 2021, 10:50 p.m.

Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30629

on Oct. 12, 2021, 10:47 p.m.

Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30630

on Oct. 12, 2021, 10:46 p.m.

Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30632

on Oct. 12, 2021, 10:43 p.m.

Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30633

on Nov. 23, 2021, 9:48 p.m.

Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-39873

on Oct. 12, 2021, 7:58 p.m.

In all versions of GitLab CE/EE, there exists a content spoofing vulnerability which may be leveraged by attackers to trick users into visiting a malicious website by spoofing the content in an error response.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-39868

on Oct. 12, 2021, 7:47 p.m.

In all versions of GitLab CE/EE since version 8.12, an authenticated low-privileged malicious user may create a project with unlimited repository size by modifying values in a project export.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-39884

on Oct. 12, 2021, 4:55 p.m.

In all versions of GitLab EE since version 8.13, an endpoint discloses names of private groups that have access to a project to low privileged users that are part of that project.

Learn more

Tags:  Permissions Required

CVE-2021-39885

on May 12, 2022, 9:15 p.m.

A Stored XSS in merge request creation page in all versions of Gitlab EE starting from 13.7 before 14.1.7, all versions starting from 14.2 before 14.2.5, and all versions starting from 14.3 before 14.3.1 allows an attacker to execute arbitrary JavaScript code on the victim's behalf via malicious approval rule names

Learn more

Tags:  Permissions Required

CVE-2021-39870

on Oct. 9, 2021, 3:31 a.m.

In all versions of GitLab CE/EE since version 11.11, an instance that has the setting to disable Repo by URL import enabled is bypassed by an attacker making a crafted API call.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-39881

on Oct. 9, 2021, 3:31 a.m.

In all versions of GitLab CE/EE since version 7.7, the application may let a malicious user create an OAuth client application with arbitrary scope names which may allow the malicious user to trick unsuspecting users to authorize the malicious client application using the spoofed scope name and description.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-39889

on Oct. 9, 2021, 3:29 a.m.

In all versions of GitLab EE since version 14.1, due to an insecure direct object reference vulnerability, an endpoint may reveal the protected branch name to a malicious user who makes a crafted API call with the ID of the protected branch.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-39887

on Oct. 8, 2021, 7:02 p.m.

A stored Cross-Site Scripting vulnerability in the GitLab Flavored Markdown in GitLab CE/EE version 8.4 and above allowed an attacker to execute arbitrary JavaScript code on the victim's behalf.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-41011

on Oct. 5, 2021, 5:08 p.m.

LINE client for iOS before 11.15.0 might expose authentication information for a certain service to external entities under certain conditions. This is usually impossible, but in combination with a server-side bug, attackers could get this information.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-40097

on Oct. 1, 2021, 8:37 p.m.

An issue was discovered in Concrete CMS through 8.5.5. Authenticated path traversal leads to to remote code execution via uploaded PHP code, related to the bFilename parameter.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-40103

on Oct. 1, 2021, 8:34 p.m.

An issue was discovered in Concrete CMS through 8.5.5. Path Traversal can lead to Arbitrary File Reading and SSRF.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-40104

on Oct. 1, 2021, 8:32 p.m.

An issue was discovered in Concrete CMS through 8.5.5. There is an SVG sanitizer bypass.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-40105

on Oct. 1, 2021, 8:30 p.m.

An issue was discovered in Concrete CMS through 8.5.5. There is XSS via Markdown Comments.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-40099

on Sept. 30, 2021, 4:58 p.m.

An issue was discovered in Concrete CMS through 8.5.5. Fetching the update json scheme over HTTP leads to remote code execution.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-40109

on Sept. 30, 2021, 3:32 p.m.

A SSRF issue was discovered in Concrete CMS through 8.5.5. Users can access forbidden files on their local network. A user with permissions to upload files from external sites can upload a URL that redirects to an internal resource of any file type. The redirect is followed and loads the contents of the file from …

Learn more

Tags:  Permissions Required

CVE-2021-33691

on Sept. 28, 2021, 3:05 p.m.

NWDI Notification Service versions - 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.SAP NetWeaver Development Infrastructure Notification Service allows a threat actor to send crafted scripts to a victim. If the victim has an active session when the crafted script gets executed, the threat actor could compromise information …

Learn more

Tags:  Permissions Required

CVE-2021-38176

on Dec. 6, 2021, 2:45 p.m.

Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query or inject ABAP code to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system.

Learn more

Tags:  Permissions Required

CVE-2021-39128

on Aug. 1, 2022, 4:13 p.m.

Affected versions of Atlassian Jira Server or Data Center using the Jira Service Management addon allow remote attackers with JIRA Administrators access to execute arbitrary Java code via a server-side template injection vulnerability in the Email Template feature. The affected versions of Jira Server or Data Center are before version 8.13.12, and from version 8.14.0 …

Learn more

Tags:  Permissions RequiredIssue TrackingVendor AdvisoryExploitMailing ListThird Party Advisory

CVE-2021-30604

on Sept. 24, 2021, 11:15 p.m.

Use after free in ANGLE in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30602

on Nov. 17, 2021, 12:15 a.m.

Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30601

on Sept. 24, 2021, 11:15 p.m.

Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30599

on Sept. 24, 2021, 11:15 p.m.

Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30597

on Sept. 24, 2021, 11:15 p.m.

Use after free in Browser UI in Google Chrome on Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30593

on Sept. 24, 2021, 11:15 p.m.

Out of bounds read in Tab Strip in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30590

on Sept. 24, 2021, 11:15 p.m.

Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30583

on Dec. 8, 2021, 9:57 p.m.

Insufficient policy enforcement in image handling in iOS in Google Chrome on iOS prior to 92.0.4515.107 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

Learn more

Tags:  Third Party AdvisoryPermissions Required

CVE-2021-30576

on Dec. 8, 2021, 10 p.m.

Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredThird Party AdvisoryExploitIssue TrackingPatch

CVE-2021-30575

on Sept. 24, 2021, 11:15 p.m.

Out of bounds write in Autofill in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-30574

on Sept. 24, 2021, 11:15 p.m.

Use after free in protocol handling in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-30573

on Dec. 10, 2021, 6:59 p.m.

Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredThird Party AdvisoryExploitIssue TrackingPatch

CVE-2021-30569

on Sept. 24, 2021, 11:15 p.m.

Use after free in sqlite in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-30568

on Sept. 24, 2021, 11:15 p.m.

Heap buffer overflow in WebGL in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-30567

on Sept. 24, 2021, 11:15 p.m.

Use after free in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to open DevTools to potentially exploit heap corruption via specific user gesture.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30565

on Sept. 24, 2021, 11:15 p.m.

Out of bounds write in Tab Groups in Google Chrome on Linux and ChromeOS prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-37531

on Feb. 2, 2022, 9:31 p.m.

SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will …

Learn more

Tags:  Permissions Required

CVE-2021-33672

on Sept. 24, 2021, 2:55 p.m.

Due to missing encoding in SAP Contact Center's Communication Desktop component- version 700, an attacker could send malicious script in chat message. When the message is accepted by the chat recipient, the script gets executed in their scope. Due to the usage of ActiveX in the application, the attacker can further execute operating system level …

Learn more

Tags:  Permissions Required

CVE-2021-33673

on Sept. 24, 2021, 2:22 p.m.

Under certain conditions, SAP Contact Center - version 700,does not sufficiently encode user-controlled inputs and persists in them. This allows an attacker to exploit a Stored Cross-Site Scripting (XSS) vulnerability when a user browses through the employee directory and to execute arbitrary code on the victim's browser. Due to the usage of ActiveX in the …

Learn more

Tags:  Permissions Required

CVE-2021-33674

on Sept. 24, 2021, 2:06 p.m.

Under certain conditions, SAP Contact Center - version 700, does not sufficiently encode user-controlled inputs. This allows an attacker to exploit a Reflected Cross-Site Scripting (XSS) vulnerability when creating a new email and to execute arbitrary code on the victim's browser.

Learn more

Tags:  Permissions Required

CVE-2021-33675

on Sept. 24, 2021, 2:02 p.m.

Under certain conditions, SAP Contact Center - version 700, does not sufficiently encode user-controlled inputs. This allows an attacker to exploit a Reflected Cross-Site Scripting (XSS) vulnerability through phishing and to execute arbitrary code on the victim's browser.

Learn more

Tags:  Permissions Required

CVE-2021-39203

on Aug. 5, 2022, 11 a.m.

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions authenticated users who don't have permission to view private post types/data can bypass restrictions in the block editor under certain conditions. This affected WordPress 5.8 beta during the testing period. It's fixed …

Learn more

Tags:  Permissions Required

CVE-2021-33679

on Sept. 24, 2021, 1:55 p.m.

The SAP BusinessObjects BI Platform version - 420 allows an attacker, who has basic access to the application, to inject a malicious script while creating a new module document, file, or folder. When another user visits that page, the stored malicious script will execute in their session, hence allowing the attacker to compromise their confidentiality …

Learn more

Tags:  Permissions Required

CVE-2021-39202

on Sept. 24, 2021, 1:53 p.m.

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database. In affected versions the widgets editor introduced in WordPress 5.8 beta 1 has improper handling of HTML input in the Custom HTML feature. This leads to stored XSS in the custom HTML widget. This has …

Learn more

Tags:  Permissions Required

CVE-2021-33685

on Sept. 24, 2021, 1:15 p.m.

SAP Business One version - 10.0 allows low-level authorized attacker to traverse the file system to access files or directories that are outside of the restricted directory. A successful attack allows access to high level sensitive data

Learn more

Tags:  Permissions Required

CVE-2020-8284

on May 13, 2022, 8:57 p.m.

A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.

Learn more

Tags:  Permissions Required

CVE-2021-21489

on Sept. 22, 2021, 8:46 p.m.

SAP NetWeaver Enterprise Portal versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user related data, resulting in Stored Cross-Site Scripting (XSS) vulnerability. This would allow an attacker with administrative privileges to store a malicious script on the portal. The execution of the script content by a victim registered on the …

Learn more

Tags:  Permissions Required

CVE-2021-22205

on Nov. 17, 2021, 5:15 p.m.

An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2020-6324

on July 1, 2022, 7:24 p.m.

SAP Netweaver AS ABAP(BSP Test Application sbspext_table), version-700,701,720,730,731,740,750,751,752,753,754,755, allows an unauthenticated attacker to send polluted URL to the victim, when the victim clicks on this URL, the attacker can read, modify the information available in the victim?s browser leading to Reflected Cross Site Scripting.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-20733

on Sept. 21, 2021, 5:45 p.m.

Improper authorization in handler for custom URL scheme vulnerability in ????????? (asken diet) for Android versions from v.3.0.0 to v.4.2.x allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-36741

on July 2, 2022, 9:16 p.m.

An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this …

Learn more

Tags:  Vendor AdvisoryPermissions Required

CVE-2020-10727

on Sept. 21, 2021, 5:05 p.m.

A flaw was found in ActiveMQ Artemis management API from version 2.7.0 up until 2.12.0, where a user inadvertently stores passwords in plaintext in the Artemis shadow file (etc/artemis-users.properties file) when executing the `resetUsers` operation. A local attacker can use this flaw to read the contents of the Artemis shadow file.

Learn more

Tags:  Permissions Required

CVE-2021-30549

on Sept. 21, 2021, 4:14 p.m.

Use after free in Spell check in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Issue TrackingPermissions RequiredThird Party Advisory

CVE-2021-30557

on Sept. 20, 2021, 6:55 p.m.

Use after free in TabGroups in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30556

on Sept. 20, 2021, 6:55 p.m.

Use after free in WebAudio in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30555

on Sept. 20, 2021, 6:55 p.m.

Use after free in Sharing in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and user gesture.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-30554

on Sept. 20, 2021, 6:55 p.m.

Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-29960

on Sept. 20, 2021, 6:48 p.m.

Firefox used to cache the last filename used for printing a file. When generating a filename for printing, Firefox usually suggests the web page title. The caching and suggestion techniques combined may have lead to the title of a website visited during private browsing mode being stored on disk. This vulnerability affects Firefox < 89.

Learn more

Tags:  Issue TrackingPermissions RequiredVendor Advisory

CVE-2021-29959

on Sept. 20, 2021, 6:48 p.m.

When a user has already allowed a website to access microphone and camera, disabling camera sharing would not fully prevent the website from re-enabling it without an additional prompt. This was only possible if the website kept recording with the microphone until re-enabling the camera. This vulnerability affects Firefox < 89.

Learn more

Tags:  Issue TrackingPermissions RequiredVendor Advisory

CVE-2021-30550

on Sept. 20, 2021, 5:02 p.m.

Use after free in Accessibility in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Issue TrackingPermissions RequiredThird Party Advisory

CVE-2021-30546

on Sept. 20, 2021, 5:02 p.m.

Use after free in Autofill in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Learn more

Tags:  Issue TrackingPermissions RequiredThird Party Advisory

CVE-2021-32688

on Sept. 20, 2021, 12:30 p.m.

Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the …

Learn more

Tags:  Permissions Required

CVE-2020-6797

on Sept. 16, 2021, 1:17 p.m.

By downloading a file with the .fileloc extension, a semi-privileged extension could launch an arbitrary application on the user's computer. The attacker is restricted as they are unable to download non-quarantined files or supply command line arguments to the application, limiting the impact. Note: this issue only occurs on Mac OSX. Other operating systems are …

Learn more

Tags:  Issue TrackingPermissions Required

CVE-2020-6402

on Sept. 16, 2021, 1:16 p.m.

Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.

Learn more

Tags:  Permissions Required

CVE-2021-36215

on Sept. 15, 2021, 5:53 p.m.

LINE client for iOS 10.21.3 and before allows address bar spoofing due to inappropriate address handling.

Learn more

Tags:  Permissions Required

CVE-2021-30605

on Sept. 15, 2021, 3:58 p.m.

Inappropriate implementation in the ChromeOS Readiness Tool installer on Windows prior to 1.0.2.0 loosens DCOM access rights on two objects allowing an attacker to potentially bypass discretionary access controls.

Learn more

Tags:  Permissions Required

CVE-2021-36216

on Sept. 15, 2021, 2:06 p.m.

LINE for Windows 6.2.1.2289 and before allows arbitrary code execution via malicious DLL injection.

Learn more

Tags:  Permissions Required

CVE-2021-35047

on Sept. 14, 2021, 6:46 p.m.

Vulnerability in the CommandPost, Collector, and Sensor components of Fidelis Network and Deception enables an attacker with user level access to the CLI to inject root level commands into the component and neighboring Fidelis components. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.7 and in version 9.4. Patches and updates …

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-35048

on Sept. 14, 2021, 6:46 p.m.

Vulnerability in Fidelis Network and Deception CommandPost enables unauthenticated SQL injection through the web interface. The vulnerability could lead to exposure of authentication tokens in some versions of Fidelis software. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.7 and in version 9.4. Patches and updates are available to address this …

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-35049

on Sept. 14, 2021, 6:46 p.m.

Vulnerability in Fidelis Network and Deception CommandPost enables authenticated command injection through the web interface. The vulnerability could allow a specially crafted HTTP request to execute system commands on the CommandPost and return results in an HTTP response in an authenticated session. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.7 …

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-35050

on Sept. 14, 2021, 6:46 p.m.

User credentials stored in a recoverable format within Fidelis Network and Deception CommandPost. In the event that an attacker gains access to the CommandPost, these values could be decoded and used to login to the application. The vulnerability is present in Fidelis Network and Deception versions prior to 9.3.3. This vulnerability has been addressed in …

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-21142

on Sept. 14, 2021, 6:43 p.m.

Use after free in Payments in Google Chrome on Mac prior to 88.0.4324.146 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.

Learn more

Tags:  Permissions Required

CVE-2021-29242

on Sept. 14, 2021, 6:18 p.m.

CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-32766

on Sept. 14, 2021, 5:28 p.m.

Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with "Upload Only" privileges. (aka "File …

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-37629

on Sept. 14, 2021, 4:16 p.m.

Nextcloud Richdocuments is an open source collaborative office suite. In affected versions there is a lack of rate limiting on the Richdocuments OCS endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. It is recommended that the Nextcloud Richdocuments app is upgraded to either 3.8.4 or 4.2.1 to resolve. For users …

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2019-15594

on Sept. 14, 2021, 12:44 p.m.

GitLab 11.8 and later contains a security vulnerability that allows a user to obtain details of restricted pipelines via the merge request endpoint.

Learn more

Tags:  Permissions Required

CVE-2019-10882

on Sept. 14, 2021, 12:09 p.m.

The Netskope client service, v57 before 57.2.0.219 and v60 before 60.2.0.214, running with NT\SYSTEM privilege, accepts network connections from localhost. The connection handling function in this service suffers from a stack based buffer overflow in "doHandshakefromServer" function. Local users can use this vulnerability to trigger a crash of the service and potentially cause additional impact …

Learn more

Tags:  Permissions RequiredRelease NotesVendor Advisory

CVE-2019-9815

on Sept. 8, 2021, 5:22 p.m.

If hyperthreading is not disabled, a timing attack vulnerability exists, similar to previous Spectre attacks. Apple has shipped macOS 10.14.5 with an option to disable hyperthreading in applications running untrusted code in a thread through a new sysctl. Firefox now makes use of it on the main thread and any worker threads. *Note: users need …

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2017-11281

on Sept. 8, 2021, 5:21 p.m.

Adobe Flash Player has an exploitable memory corruption vulnerability in the text handling function. Successful exploitation could lead to arbitrary code execution. This affects 26.0.0.151 and earlier.

Learn more

Tags:  PatchVendor AdvisoryThird Party AdvisoryVDB EntryIssue TrackingPermissions RequiredExploitBroken Link

CVE-2013-2555

on Sept. 8, 2021, 5:19 p.m.

Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK & Compiler before 3.7.0.1530 allows remote attackers to …

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-22256

on Aug. 31, 2021, 7:04 p.m.

Improper authorization in GitLab CE/EE affecting all versions since 12.6 allowed guest users to create issues for Sentry errors and track their status

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-22242

on Aug. 31, 2021, 6:36 p.m.

Insufficient input sanitization in Mermaid markdown in GitLab CE/EE version 11.4 and up allows an attacker to exploit a stored cross-site scripting vulnerability via a specially-crafted markdown

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-27618

on Aug. 27, 2021, 5:38 p.m.

The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not check the file type extension of the file uploaded from local source. An attacker could craft a malicious file and upload it to the application, which could lead to denial of service and impact the availability …

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-27617

on Aug. 27, 2021, 5:38 p.m.

The Integration Builder Framework of SAP Process Integration versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document uploaded from local source. An attacker can craft a malicious XML which when uploaded and parsed by the application, could lead to Denial-of-service conditions due to consumption of a large amount …

Learn more

Tags:  Permissions RequiredVendor Advisory

CVE-2021-22246

on Aug. 26, 2021, 2:44 a.m.

A vulnerability was discovered in GitLab versions before 14.0.2, 13.12.6, 13.11.6. GitLab Webhook feature could be abused to perform denial of service attacks.

Learn more

Tags:  Permissions RequiredThird Party Advisory

CVE-2021-22238

on Aug. 26, 2021, 2:40 a.m.

An issue has been discovered in GitLab affecting all versions starting with 13.3. GitLab was vulnerable to a stored XSS by using the design feature in issues.

Learn more

Tags:  Permissions RequiredThird Party Advisory