Remotely alerts

CVE-2021-38389

on Oct. 20, 2021, 10:17 p.m.

Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.

Learn more

Tags:  MitigationThird Party AdvisoryUS Government Resource

CVE-2021-33023

on Oct. 20, 2021, 10:16 p.m.

Advantech WebAccess versions 9.02 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute code.

Learn more

Tags:  MitigationThird Party AdvisoryUS Government Resource

CVE-2021-38452

on Oct. 19, 2021, 1:34 p.m.

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-27268

on Oct. 19, 2021, 12:19 p.m.

In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, a client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass checks for default PINs via Bluetooth Low Energy.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-27266

on Oct. 19, 2021, 12:18 p.m.

In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, a client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass user authentication checks via Bluetooth Low Energy.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-26869

on Oct. 19, 2021, 12:03 p.m.

ARC Informatique PcVue prior to version 12.0.17 is vulnerable to information exposure, allowing unauthorized users to access session data of legitimate users. This issue also affects third-party systems based on the Web Services Toolkit.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-27664

on Oct. 18, 2021, 6:59 p.m.

Under certain configurations an unauthenticated remote user could be given access to credentials stored in the exacqVision Server.

Learn more

Tags:  MitigationThird Party AdvisoryUS Government Resource

CVE-2021-27665

on Oct. 16, 2021, 12:42 a.m.

An unauthenticated remote user could exploit a potential integer overflow condition in the exacqVision Server with a specially crafted script and cause denial-of-service condition.

Learn more

Tags:  MitigationThird Party AdvisoryUS Government Resource

CVE-2021-38396

on Oct. 13, 2021, 8:14 p.m.

The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted USB.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38394

on Oct. 13, 2021, 7:48 p.m.

An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38398

on Oct. 13, 2021, 7:17 p.m.

The affected device uses off-the-shelf software components that contain unpatched vulnerabilities. A malicious attacker with physical access to the affected device could exploit these vulnerabilities.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38400

on Oct. 13, 2021, 5:55 p.m.

An attacker with physical access to Boston Scientific Zoom Latitude Model 3120 can remove the hard disk drive or create a specially crafted USB to extract the password hash for brute force reverse engineering of the system password.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38392

on Oct. 13, 2021, 5:54 p.m.

A skilled attacker with physical access to the affected device can gain access to the hard disk drive of the device to change the telemetry region and could use this setting to interrogate or program an implantable device in any region in the world.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-27384

on Oct. 12, 2021, 10:15 a.m.

A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants) (All versions …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-12030

on July 8, 2022, 6:20 p.m.

There is a flaw in the code used to configure the internal gateway firewall when the gateway's VLAN feature is enabled. If a user enables the VLAN setting, the internal gateway firewall becomes disabled resulting in exposure of all ports used by the gateway.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38412

on Oct. 5, 2021, 2:11 p.m.

Properly formatted POST requests to multiple resources on the HTTP and HTTPS web servers of the Digi PortServer TS 16 Rack device do not require authentication or authentication tokens. This vulnerability could allow an attacker to enable the SNMP service and manipulate the community strings to achieve further control in.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38406

on Oct. 4, 2021, 6:13 p.m.

Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38404

on Oct. 4, 2021, 6:12 p.m.

Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38402

on Oct. 4, 2021, 6:11 p.m.

Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-26556

on Sept. 29, 2021, 9:15 a.m.

Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, able to conduct a successful brute-force attack on an insufficiently random AuthValue before the provisioning procedure times out, to complete authentication by leveraging Malleable Commitment.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-27662

on Sept. 28, 2021, 12:58 a.m.

The KT-1 door controller is susceptible to replay or man-in-the-middle attacks where an attacker can record and replay TCP packets. This issue affects Johnson Controls KT-1 all versions up to and including 3.01

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-33011

on Sept. 23, 2021, 10:04 p.m.

All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus Series,TOYOPUC-PC3J/PC2J Series, TOYOPUC-Nano Series products may not be able to properly process an ICMP flood, which may allow an attacker to deny Ethernet communications between affected devices.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-12002

on Sept. 23, 2021, 1:42 p.m.

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-12006

on Sept. 23, 2021, 1:42 p.m.

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-12010

on Sept. 23, 2021, 1:41 p.m.

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow an authenticated user to use a specially crafted file to delete files outside the application’s control.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-12019

on Sept. 23, 2021, 1:39 p.m.

WebAccess Node Version 8.4.4 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-12026

on Sept. 23, 2021, 1:39 p.m.

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-12038

on Sept. 23, 2021, 1:34 p.m.

Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer software: Version 32 and prior) is vulnerable. A memory corruption vulnerability exists in the algorithm that matches square …

Learn more

Tags:  MitigationPatchThird Party AdvisoryUS Government Resource

CVE-2020-14498

on Sept. 23, 2021, 1:34 p.m.

HMS Industrial Networks AB eCatcher all versions prior to 6.5.5. The affected product is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-14499

on Sept. 23, 2021, 1:33 p.m.

Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-14511

on Sept. 23, 2021, 1:19 p.m.

Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4).

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-14524

on Sept. 23, 2021, 1:17 p.m.

Softing Industrial Automation all versions prior to the latest build of version 4.47.0, The affected product is vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-25179

on Sept. 23, 2021, 1:17 p.m.

GE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-25192

on Sept. 23, 2021, 1:17 p.m.

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows sensitive information to be displayed without proper authorization.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-25194

on Sept. 23, 2021, 1:16 p.m.

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has improper privilege management, which may allow an attacker with user privileges to perform requests with administrative privileges.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-30720

on Sept. 22, 2021, 2:22 p.m.

A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.

Learn more

Tags:  Vendor AdvisoryThird Party AdvisoryUS Government Resource

CVE-2020-9972

on Sept. 22, 2021, 2:22 p.m.

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.

Learn more

Tags:  Vendor AdvisoryPatchUS Government ResourceExploit

CVE-2021-31342

on Sept. 21, 2021, 7:16 p.m.

The ugeom2d.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-31343

on Sept. 21, 2021, 7:16 p.m.

The jutil.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocation structure. An attacker could leverage this vulnerability to execute code in …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32931

on Sept. 21, 2021, 6:16 p.m.

An uninitialized pointer in FATEK Automation FvDesigner, Versions 1.5.88 and prior may be exploited while the application is processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32939

on Sept. 21, 2021, 6:16 p.m.

FATEK Automation FvDesigner, Versions 1.5.88 and prior is vulnerable to an out-of-bounds write while processing project files, allowing an attacker to craft a project file that may permit arbitrary code execution.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32947

on Sept. 21, 2021, 6:16 p.m.

FATEK Automation FvDesigner, Versions 1.5.88 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32946

on Sept. 21, 2021, 4:39 p.m.

An improper check for unusual or exceptional conditions issue exists within the parsing DGN files from Drawings SDK (Version 2022.4 and prior) resulting from the lack of proper validation of the user-supplied data. This may result in several of out-of-bounds problems and allow attackers to cause a denial-of-service condition or execute code in the context …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32936

on Sept. 21, 2021, 4:39 p.m.

An out-of-bounds write issue exists in the DXF file-recovering procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a write past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or execute code in the …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32938

on Sept. 21, 2021, 4:38 p.m.

Drawings SDK (All versions prior to 2022.4) are vulnerable to an out-of-bounds read due to parsing of DWG files resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allows attackers to cause a denial-of service condition or read sensitive information …

Learn more

Tags:  PatchThird Party AdvisoryUS Government Resource

CVE-2021-32940

on Sept. 21, 2021, 4:38 p.m.

An out-of-bounds read issue exists in the DWG file-recovering procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or read sensitive information from …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32944

on Sept. 21, 2021, 4:38 p.m.

A use-after-free issue exists in the DGN file-reading procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a memory corruption or arbitrary code execution, allowing attackers to cause a denial-of-service condition or execute code in the context of the current …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32950

on Sept. 21, 2021, 4:38 p.m.

An out-of-bounds read issue exists within the parsing of DXF files in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allows attackers to cause a denial-of-service condition or read sensitive information …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32948

on Sept. 21, 2021, 4:34 p.m.

An out-of-bounds write issue exists in the DWG file-reading procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a write past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or execute code in the …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32952

on Sept. 21, 2021, 4:34 p.m.

An out-of-bounds write issue exists in the DGN file-reading procedure in the Drawings SDK (Version 2022.4 and prior) resulting from the lack of proper validation of user-supplied data. This can result in a write past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or execute code in the context …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-27659

on Sept. 20, 2021, 6:48 p.m.

exacqVision Web Service 21.03 does not sufficiently validate, filter, escape, and/or encode user-controllable input before it is placed in output that is used as a web page that is served to other users.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-27658

on Sept. 20, 2021, 6:48 p.m.

exacqVision Enterprise Manager 20.12 does not sufficiently validate, filter, escape, and/or encode user-controllable input before it is placed in output that is used as a web page that is served to other users.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38408

on Sept. 20, 2021, 12:44 p.m.

A stack-based buffer overflow vulnerability in Advantech WebAccess Versions 9.02 and prior caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-30664

on Sept. 17, 2021, 11:28 a.m.

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing a maliciously crafted file may lead to arbitrary code execution.

Learn more

Tags:  Vendor AdvisoryPatchUS Government ResourceThird Party Advisory

CVE-2021-33019

on Sept. 16, 2021, 12:37 p.m.

A stack-based buffer overflow vulnerability in Delta Electronics DOPSoft Version 4.00.11 and prior may be exploited by processing a specially crafted project file, which may allow an attacker to execute arbitrary code.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-10618

on Sept. 14, 2021, 2:09 p.m.

LCDS LAquis SCADA Versions 4.3.1 and prior. The affected product is vulnerable to sensitive information exposure by unauthorized users.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-10598

on Sept. 14, 2021, 1:35 p.m.

In BD Pyxis MedStation ES System v1.6.1 and Pyxis Anesthesia (PAS) ES System v1.6.1, a restricted desktop environment escape vulnerability exists in the kiosk mode functionality of affected devices. Specially crafted inputs could allow the user to escape the restricted environment, resulting in access to sensitive data.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-10597

on Sept. 14, 2021, 1:29 p.m.

Delta Industrial Automation DOPSoft, Version 4.00.08.15 and prior. Multiple out-of-bounds read vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to read information and/or crash the application.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2019-1573

on Sept. 14, 2021, 12:14 p.m.

GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.

Learn more

Tags:  Third Party AdvisoryUS Government ResourceIssue TrackingMailing ListVendor Advisory

CVE-2017-6356

on Sept. 13, 2021, 12:05 p.m.

Palo Alto Networks Terminal Services (aka TS) Agent 6.0, 7.0, and 8.0 before 8.0.1 uses weak permissions for unspecified resources, which allows attackers to obtain sensitive session information via unknown vectors.

Learn more

Tags:  Third Party AdvisoryVDB EntryVendor AdvisoryPatchUS Government Resource

CVE-2018-17555

on Sept. 13, 2021, 11:35 a.m.

The web component on ARRIS TG2492LG-NA 061213 devices allows remote attackers to obtain sensitive information via the /snmpGet oids parameter.

Learn more

Tags:  ExploitThird Party AdvisoryMitigationUS Government ResourcePatchVendor AdvisoryVDB EntryTechnical Description

CVE-2016-4503

on Sept. 13, 2021, 11:21 a.m.

Moxa Device Server Web Console 5232-N allows remote attackers to bypass authentication, and consequently modify settings and data, via vectors related to reading a cookie parameter containing a UserId value.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2018-18070

on Sept. 13, 2021, 11:15 a.m.

An issue was discovered in Daimler Mercedes-Benz COMAND 17/13.0 50.12 on Mercedes-Benz C-Class 2018 vehicles. Defining or receiving a specific navigation route might cause the system to freeze and reboot after a few transmissions. When the system next starts, it tries to re-calculate the route, which will cause a boot loop. (Under certain circumstances, it …

Learn more

Tags:  Third Party AdvisoryPatchVendor AdvisoryMitigationUS Government Resource

CVE-2015-4056

on Sept. 9, 2021, 5:49 p.m.

The System Library in VCE Vision Intelligent Operations before 2.6.5 does not properly implement cryptography, which makes it easier for local users to discover credentials by leveraging administrative access.

Learn more

Tags:  Mailing ListThird Party AdvisoryVDB EntryVendor AdvisoryUS Government ResourceExploitTechnical Description

CVE-2017-9036

on Sept. 9, 2021, 5:47 p.m.

Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.

Learn more

Tags:  ExploitThird Party AdvisoryMitigationUS Government ResourcePatchVendor AdvisoryIssue TrackingMailing ListVDB EntryTechnical Description

CVE-2021-24273

on Sept. 9, 2021, 5:42 p.m.

The “Clever Addons for Elementor” WordPress Plugin before 2.1.0 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method.

Learn more

Tags:  Third Party AdvisoryVendor AdvisoryUS Government Resource

CVE-2021-29003

on Sept. 9, 2021, 5:37 p.m.

Genexis PLATINUM 4410 2.1 P4410-V2-1.28 devices allow remote attackers to execute arbitrary code via shell metacharacters to sys_config_valid.xgi, as demonstrated by the sys_config_valid.xgi?exeshell=%60telnetd%20%26%60 URI.

Learn more

Tags:  ExploitThird Party AdvisoryUS Government Resource

CVE-2020-19048

on Sept. 9, 2021, 5:34 p.m.

Cross Site Scripting (XSS) in MyBB v1.8.20 allows remote attackers to inject arbitrary web script or HTML via the "Title" field found in the "Add New Forum" page by doing an authenticated POST HTTP request to '/Upload/admin/index.php?module=forum-management&action=add'.

Learn more

Tags:  ExploitThird Party AdvisoryUS Government ResourceTechnical DescriptionMitigationPatchVendor Advisory

CVE-2016-0767

on Sept. 9, 2021, 5:29 p.m.

PostgreSQL PL/Java before 1.5.0 allows remote authenticated users with USAGE permission on the public schema to alter the public schema classpath.

Learn more

Tags:  Release NotesThird Party AdvisoryUS Government Resource

CVE-2021-38084

on Sept. 9, 2021, 5:18 p.m.

An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2014-5086

on Sept. 9, 2021, 1:38 p.m.

A Command Execution vulnerability exists in Sphider Pro, and Sphider Plus 3.2 due to insufficient sanitization of fwrite to conf.php, which could let a remote malicious user execute arbitrary code. CVE-2014-5086 pertains to instances of fwrite in Sphider Pro and Sphider Plus only, but don’t exist in Sphider.

Learn more

Tags:  ExploitThird Party AdvisoryVDB EntryUS Government Resource

CVE-2021-20206

on Sept. 9, 2021, 1:32 p.m.

An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other …

Learn more

Tags:  Issue TrackingThird Party AdvisoryUS Government Resource

CVE-2021-22684

on Sept. 8, 2021, 7:25 p.m.

Tizen RT RTOS version 3.0.GBB is vulnerable to integer wrap-around in functions_calloc and mm_zalloc. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2015-5085

on Sept. 8, 2021, 5:19 p.m.

Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-4435, CVE-2015-4438, CVE-2015-4441, CVE-2015-4445, CVE-2015-4447, CVE-2015-4451, CVE-2015-4452, …

Learn more

Tags:  PatchVendor AdvisoryThird Party AdvisoryUS Government Resource

CVE-2021-27663

on Sept. 7, 2021, 4:39 p.m.

A vulnerability in versions 10.1 through 10.5 of Johnson Controls CEM Systems AC2000 allows a remote attacker to access to the system without adequate authorization. This issue affects: Johnson Controls CEM Systems AC2000 10.1; 10.2; 10.3; 10.4; 10.5.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38390

on Sept. 7, 2021, 1:43 p.m.

A Blind SQL injection vulnerability exists in the /DataHandler/HandlerEnergyType.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter egyid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38391

on Sept. 7, 2021, 1:42 p.m.

A Blind SQL injection vulnerability exists in the /DataHandler/AM/AM_Handler.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter type before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-38393

on Sept. 7, 2021, 1:42 p.m.

A Blind SQL injection vulnerability exists in the /DataHandler/HandlerAlarmGroup.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter agid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32983

on Sept. 7, 2021, 1:30 p.m.

A Blind SQL injection vulnerability exists in the /DataHandler/Handler_CFG.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter keyword before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-33007

on Sept. 3, 2021, 2:35 p.m.

A heap-based buffer overflow in Delta Electronics TPEditor: v1.98.06 and prior may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-33003

on Sept. 3, 2021, 2:13 p.m.

Delta Electronics DIAEnergie Version 1.7.5 and prior may allow an attacker to retrieve passwords in cleartext due to a weak hashing algorithm.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32991

on Sept. 3, 2021, 2:11 p.m.

Delta Electronics DIAEnergie Version 1.7.5 and prior is vulnerable to cross-site request forgery, which may allow an attacker to cause a user to carry out an action unintentionally.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32967

on July 2, 2022, 6:19 p.m.

Delta Electronics DIAEnergie Version 1.7.5 and prior may allow an attacker to add a new administrative user without being authenticated or authorized, which may allow the attacker to log in and use the device with administrative privileges.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32955

on Sept. 3, 2021, 2:01 p.m.

Delta Electronics DIAEnergie Version 1.7.5 and prior allows unrestricted file uploads, which may allow an attacker to remotely execute code.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-33015

on Sept. 1, 2021, 1:16 p.m.

Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write via an uninitialized pointer. An attacker could leverage this vulnerability to execute code in the context of the current process.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32995

on July 2, 2022, 6:18 p.m.

Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute code in the context of the current process.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-32781

on July 2, 2022, 6:31 p.m.

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions after Envoy sends a locally generated response it must stop further processing of request or response data. However when local response is generated due the internal buffer overflow while request or response is processed by …

Learn more

Tags:  Vendor AdvisoryThird Party AdvisoryVDB EntryPatchMitigationUS Government ResourceExploit

CVE-2021-32975

on Aug. 30, 2021, 3:16 p.m.

Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-35997

on Aug. 30, 2021, 2:34 p.m.

Adobe Premiere Pro version 15.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Learn more

Tags:  PatchVendor AdvisoryUS Government Resource

CVE-2020-25767

on Aug. 26, 2021, 7:32 p.m.

An issue was discovered in HCC Embedded NicheStack IPv4 4.1. The dnc_copy_in routine for parsing DNS domain names does not check whether a domain name compression pointer is pointing within the bounds of the packet (e.g., forward compression pointer jumps are allowed), which leads to an Out-of-bounds Read, and a Denial-of-Service as a consequence.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-25928

on Aug. 26, 2021, 6:26 p.m.

The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Buffer Overflow. The impact is: execute arbitrary code (remote). The component is: DNS response processing functions: dns_upcall(), getoffset(), dnc_set_answer(). The attack vector is: a specific DNS response packet. The code does not check the "response data length" field of individual DNS answers, which may …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-25927

on Aug. 26, 2021, 6:23 p.m.

The DNS feature in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Out-of-bounds Read. The impact is: a denial of service (remote). The component is: DNS response processing in function: dns_upcall(). The attack vector is: a specific DNS response packet. The code does not check whether the number of queries/responses specified in the DNS packet header …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-36762

on Aug. 26, 2021, 6:14 p.m.

An issue was discovered in HCC Embedded InterNiche NicheStack through 4.3. The tfshnd():tftpsrv.c TFTP packet processing function doesn't ensure that a filename is adequately '\0' terminated; therefore, a subsequent call to strlen for the filename might read out of bounds of the protocol packet buffer (if no '\0' byte exists within a reasonable range).

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-31400

on Aug. 26, 2021, 5:17 p.m.

An issue was discovered in tcp_pulloutofband() in tcp_in.c in HCC embedded InterNiche 4.0.1. The TCP out-of-band urgent-data processing function invokes a panic function if the pointer to the end of the out-of-band data points outside of the TCP segment's data. If the panic function hadn't a trap invocation removed, it will enter an infinite loop …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-31228

on Aug. 26, 2021, 5:09 p.m.

An issue was discovered in HCC embedded InterNiche 4.0.1. This vulnerability allows the attacker to predict a DNS query's source port in order to send forged DNS response packets that will be accepted as valid answers to the DNS client's requests (without sniffing the specific request). Data is predictable because it is based on the …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2021-31227

on Aug. 26, 2021, 4:44 p.m.

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to an incorrect signed integer comparison. This vulnerability requires the attacker to send a malformed HTTP packet with a negative Content-Length, which bypasses the size checks and results in a …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2020-25926

on Aug. 26, 2021, 4:32 p.m.

The DNS client in InterNiche NicheStack TCP/IP 4.0.1 is affected by: Insufficient entropy in the DNS transaction id. The impact is: DNS cache poisoning (remote). The component is: dns_query_type(). The attack vector is: a specific DNS response packet.

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2019-6820

on Feb. 3, 2022, 2:29 p.m.

A CWE-306: Missing Authentication for Critical Function vulnerability exists which could cause a modification of device IP configuration (IP address, network mask and gateway IP address) when a specific Ethernet frame is received in all versions of: Modicon M100, Modicon M200, Modicon M221, ATV IMC drive controller, Modicon M241, Modicon M251, Modicon M258, Modicon LMC058, …

Learn more

Tags:  Vendor AdvisoryThird Party AdvisoryUS Government Resource

CVE-2021-31226

on Aug. 26, 2021, 2:26 a.m.

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to lack of size validation. This vulnerability requires the attacker to send a crafted HTTP POST request with a URI longer than 50 bytes. This leads to a heap overflow …

Learn more

Tags:  Third Party AdvisoryUS Government Resource

CVE-2019-6826

on Aug. 23, 2021, 5:30 p.m.

A CWE-426: Untrusted Search Path vulnerability exists in SoMachine HVAC v2.4.1 and earlier versions, which could cause arbitrary code execution on the system running SoMachine HVAC when a malicious DLL library is loaded by the product.

Learn more

Tags:  Vendor AdvisoryUS Government Resource