โผ CVE-2021-0573 โผ
๐ Read
via "National Vulnerability Database".
In asf extractor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187231635๐ Read
via "National Vulnerability Database".
โผ CVE-2021-22156 โผ
๐ Read
via "National Vulnerability Database".
An integer overflow vulnerability in the calloc() function of the C runtime library of affected versions of BlackBerryรยฎ QNX Software Development Platform (SDP) version(s) 6.5.0SP1 and earlier, QNX OS for Medical 1.1 and earlier, and QNX OS for Safety 1.0.1 and earlier that could allow an attacker to potentially perform a denial of service or execute arbitrary code.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0574 โผ
๐ Read
via "National Vulnerability Database".
In asf extractor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187234876๐ Read
via "National Vulnerability Database".
โผ CVE-2021-29056 โผ
๐ Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability exists in Pixelimity 1.0 via the HTTP POST parameter to admin/setting.php.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0581 โผ
๐ Read
via "National Vulnerability Database".
In wifi driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187231638๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0639 โผ
๐ Read
via "National Vulnerability Database".
In multiple functions of libl3oemcrypto.cpp, there is a possible weakness in the existing obfuscation mechanism due to the way sensitive data is handled. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-190724551๐ Read
via "National Vulnerability Database".
โผ CVE-2021-39241 โผ
๐ Read
via "National Vulnerability Database".
An issue was discovered in HAProxy 2.0 before 2.0.24, 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. An HTTP method name may contain a space followed by the name of a protected resource. It is possible that a server would interpret this as a request for that protected resource, such as in the "GET /admin? HTTP/1.1 /static/images HTTP/1.1" example.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-29548 โผ
๐ Read
via "National Vulnerability Database".
An issue was discovered in SmarterTools SmarterMail through 100.0.7537. Meddler-in-the-middle attackers can pipeline commands after a POP3 STLS command, injecting plaintext commands into an encrypted user session.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0646 โผ
๐ Read
via "National Vulnerability Database".
In sqlite3_str_vappendf of sqlite3.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process's SQL with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-153352319๐ Read
via "National Vulnerability Database".
โผ CVE-2021-29313 โผ
๐ Read
via "National Vulnerability Database".
Cross Site Scripting (XSS) vulnerability exists in SeaCMS 12.6 via the (1) v_company and (2) v_tvs parameters in /admin_video.php,๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0578 โผ
๐ Read
via "National Vulnerability Database".
In wifi driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187161772๐ Read
via "National Vulnerability Database".
โผ CVE-2020-22937 โผ
๐ Read
via "National Vulnerability Database".
A remote code execution (RCE) in e/install/index.php of EmpireCMS 7.5 allows attackers to execute arbitrary PHP code via writing malicious code to the install file.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0576 โผ
๐ Read
via "National Vulnerability Database".
In flv extractor, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187236084๐ Read
via "National Vulnerability Database".
โผ CVE-2021-39240 โผ
๐ Read
via "National Vulnerability Database".
An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It does not ensure that the scheme and path portions of a URI have the expected characters. For example, the authority field (as observed on a target HTTP/2 server) might differ from what the routing rules were intended to achieve.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0641 โผ
๐ Read
via "National Vulnerability Database".
In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185235454๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0579 โผ
๐ Read
via "National Vulnerability Database".
In wifi driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-187231636๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0591 โผ
๐ Read
via "National Vulnerability Database".
In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179386960๐ Read
via "National Vulnerability Database".
โผ CVE-2021-28372 โผ
๐ Read
via "National Vulnerability Database".
ThroughTek's Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim's connection and forcing them into supplying credentials needed to access the victim TUTK device.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-39131 โผ
๐ Read
via "National Vulnerability Database".
ced detects character encoding using Googleรยขรขโยฌรขโยขs compact_enc_det library. In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash. The problem has been patched in ced v1.0.0. As a workaround, before passing an argument to ced, verify itรยขรขโยฌรขโยขs a `Buffer` using `Buffer.isBuffer(obj)`.๐ Read
via "National Vulnerability Database".
โผ CVE-2021-0284 โผ
๐ Read
via "National Vulnerability Database".
A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS). By repeatedly sending these sequences of packets to the device, an attacker can sustain the Denial of Service (DoS) condition. The device will abnormally shut down as a result of these sent packets. A potential indicator of compromise will be the following message in the log files: "eventd[13955]: SYSTEM_ABNORMAL_SHUTDOWN: System abnormally shut down" This issue is only triggered by traffic destined to the device. Transit traffic will not trigger this issue. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S19; 15.1 versions prior to 15.1R7-S10; 17.3 versions prior to 17.3R3-S12; 18.4 versions prior to 18.4R3-S9; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R1-S7, 19.2R3-S3; 19.3 versions prior to 19.3R3-S3; 19.4 versions prior to 19.4R3-S5; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R2.๐ Read
via "National Vulnerability Database".
โผ CVE-2020-23333 โผ
๐ Read
via "National Vulnerability Database".
A heap-based buffer overflow exists in the AP4_CttsAtom::AP4_CttsAtom component located in /Core/Ap4Utils.h of Bento4 version 06c39d9. This can lead to a denial of service (DOS).๐ Read
via "National Vulnerability Database".