CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In October 2021

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1401 CVE-2021-20120 352 CSRF 2021-10-21 2021-10-27
6.8
None Remote Medium Not required Partial Partial Partial
The administration web interface for the Arris Surfboard SB8200 lacks any protections against cross-site request forgery attacks. This means that an attacker could make configuration changes (such as changing the administrative password) without the consent of the user.
1402 CVE-2021-20031 601 2021-10-12 2021-10-19
5.8
None Remote Medium Not required Partial Partial None
A Host Header Redirection vulnerability in SonicOS potentially allows a remote attacker to redirect firewall management users to arbitrary web domains.
1403 CVE-2021-3906 434 2021-10-27 2021-11-03
4.0
None Remote Low ??? Partial None None
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
1404 CVE-2021-3904 79 XSS 2021-10-27 2021-10-29
3.5
None Remote Medium ??? None Partial None
grav is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
1405 CVE-2021-3903 122 Overflow 2021-10-27 2022-01-15
4.6
None Local Low Not required Partial Partial Partial
vim is vulnerable to Heap-based Buffer Overflow
1406 CVE-2021-3901 352 CSRF 2021-10-27 2021-11-01
6.8
None Remote Medium Not required Partial Partial Partial
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
1407 CVE-2021-3900 352 CSRF 2021-10-27 2021-10-28
4.3
None Remote Medium Not required None Partial None
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
1408 CVE-2021-3889 119 Overflow 2021-10-19 2021-10-25
5.8
None Remote Medium Not required Partial None Partial
libmobi is vulnerable to Use of Out-of-range Pointer Offset
1409 CVE-2021-3888 119 Overflow 2021-10-19 2021-10-25
5.8
None Remote Medium Not required Partial None Partial
libmobi is vulnerable to Use of Out-of-range Pointer Offset
1410 CVE-2021-3882 311 +Info 2021-10-14 2021-10-20
4.0
None Remote High Not required Partial Partial None
LedgerSMB does not set the 'Secure' attribute on the session authorization cookie when the client uses HTTPS and the LedgerSMB server is behind a reverse proxy. By tricking a user to use an unencrypted connection (HTTP), an attacker may be able to obtain the authentication data by capturing network traffic. LedgerSMB 1.8 and newer switched from Basic authentication to using cookie authentication with encrypted cookies. Although an attacker can't access the information inside the cookie, nor the password of the user, possession of the cookie is enough to access the application as the user from which the cookie has been obtained. In order for the attacker to obtain the cookie, first of all the server must be configured to respond to unencrypted requests, the attacker must be suitably positioned to eavesdrop on the network traffic between the client and the server *and* the user must be tricked into using unencrypted HTTP traffic. Proper audit control and separation of duties limit Integrity impact of the attack vector. Users of LedgerSMB 1.8 are urged to upgrade to known-fixed versions. Users of LedgerSMB 1.7 or 1.9 are unaffected by this vulnerability and don't need to take action. As a workaround, users may configure their Apache or Nginx reverse proxy to add the Secure attribute at the network boundary instead of relying on LedgerSMB. For Apache, please refer to the 'Header always edit' configuration command in the mod_headers module. For Nginx, please refer to the 'proxy_cookie_flags' configuration command.
1411 CVE-2021-3881 125 2021-10-15 2021-10-22
7.5
None Remote Low Not required Partial Partial Partial
libmobi is vulnerable to Out-of-bounds Read
1412 CVE-2021-3879 79 XSS 2021-10-19 2021-10-21
3.5
None Remote Medium ??? None Partial None
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
1413 CVE-2021-3878 611 2021-10-15 2021-10-20
7.5
None Remote Low Not required Partial Partial Partial
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
1414 CVE-2021-3875 122 Overflow 2021-10-15 2022-01-15
4.3
None Remote Medium Not required None None Partial
vim is vulnerable to Heap-based Buffer Overflow
1415 CVE-2021-3874 22 Dir. Trav. 2021-10-15 2021-10-20
4.0
None Remote Low ??? Partial None None
bookstack is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
1416 CVE-2021-3872 122 Overflow 2021-10-19 2021-11-28
6.8
None Remote Medium Not required Partial Partial Partial
vim is vulnerable to Heap-based Buffer Overflow
1417 CVE-2021-3869 611 2021-10-19 2021-10-21
5.0
None Remote Low Not required Partial None None
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
1418 CVE-2021-3863 79 XSS 2021-10-19 2021-10-21
4.3
None Remote Medium Not required None Partial None
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
1419 CVE-2021-3858 352 CSRF 2021-10-19 2021-10-20
6.8
None Remote Medium Not required Partial Partial Partial
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
1420 CVE-2021-3851 601 2021-10-19 2021-10-21
4.9
None Remote Medium ??? Partial Partial None
firefly-iii is vulnerable to URL Redirection to Untrusted Site
1421 CVE-2021-3848 269 Exec Code 2021-10-06 2021-10-14
2.1
None Local Low Not required None None Partial
An arbitrary file creation by privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1, and Worry-Free Business Security Services could allow a local attacker to create an arbitrary file with higher privileges that could lead to a denial-of-service (DoS) on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
1422 CVE-2021-3846 434 2021-10-19 2021-10-22
6.5
None Remote Low ??? Partial Partial Partial
firefly-iii is vulnerable to Unrestricted Upload of File with Dangerous Type
1423 CVE-2021-3834 79 XSS 2021-10-07 2021-10-14
4.3
None Remote Medium Not required None Partial None
Integria IMS in its 5.0.92 version does not filter correctly some fields related to the login.php file. An attacker could exploit this vulnerability in order to perform a cross-site scripting attack (XSS).
1424 CVE-2021-3833 863 2021-10-07 2021-10-15
7.5
None Remote Low Not required Partial Partial Partial
Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords.
1425 CVE-2021-3832 434 Exec Code 2021-10-07 2021-10-15
7.5
None Remote Low Not required Partial Partial Partial
Integria IMS in its 5.0.92 version is vulnerable to a Remote Code Execution attack through file uploading. An unauthenticated attacker could abuse the AsyncUpload() function in order to exploit the vulnerability.
1426 CVE-2021-3825 306 2021-10-01 2021-10-08
5.0
None Remote Low Not required Partial None None
On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials.
1427 CVE-2021-3823 22 Exec Code Dir. Trav. 2021-10-28 2021-11-03
7.5
None Remote Low Not required Partial Partial Partial
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the UpdateServer component of Bitdefender GravityZone allows an attacker to execute arbitrary code on vulnerable instances. This issue affects: Bitdefender GravityZone versions prior to 3.3.8.249.
1428 CVE-2021-3756 787 Overflow 2021-10-29 2021-12-22
7.5
None Remote Low Not required Partial Partial Partial
libmysofa is vulnerable to Heap-based Buffer Overflow
1429 CVE-2021-3747 732 2021-10-01 2021-10-04
4.6
None Local Low Not required Partial Partial Partial
The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner.
1430 CVE-2021-3746 119 Overflow 2021-10-19 2021-10-22
7.1
None Remote Medium Not required None None Complete
A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.
1431 CVE-2021-3745 434 2021-10-28 2021-11-01
6.0
None Remote Medium ??? Partial Partial Partial
flatcore-cms is vulnerable to Unrestricted Upload of File with Dangerous Type
1432 CVE-2021-3710 22 Dir. Trav. 2021-10-01 2021-10-08
4.7
None Local Medium Not required Complete None None
An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
1433 CVE-2021-3709 668 2021-10-01 2021-10-08
2.1
None Local Low Not required Partial None None
Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
1434 CVE-2021-3671 476 2021-10-12 2021-10-19
4.0
None Remote Low ??? None None Partial
A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.
1435 CVE-2021-3662 79 XSS 2021-10-29 2021-11-04
3.5
None Remote Medium ??? None Partial None
Certain HP Enterprise LaserJet and PageWide MFPs may be vulnerable to stored cross site scripting (XSS).
1436 CVE-2021-3626 269 2021-10-01 2021-10-05
4.6
None Local Low Not required Partial Partial Partial
The Windows version of Multipass before 1.7.0 allowed any local process to connect to the localhost TCP control socket to perform mounts from the operating system to a guest, allowing for privilege escalation.
1437 CVE-2021-3625 787 Overflow 2021-10-05 2021-10-13
7.5
None Remote Low Not required Partial Partial Partial
Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363
1438 CVE-2021-3581 2021-10-05 2021-10-14
5.8
None Local Network Low Not required Partial Partial Partial
Buffer Access with Incorrect Length Value in zephyr. Zephyr versions >= >=2.5.0 contain Buffer Access with Incorrect Length Value (CWE-805). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5
1439 CVE-2021-3579 276 2021-10-28 2021-11-28
4.6
None Local Low Not required Partial Partial Partial
Incorrect Default Permissions vulnerability in the bdservicehost.exe and Vulnerability.Scan.exe components as used in Bitdefender Endpoint Security Tools for Windows, Total Security allows a local attacker to elevate privileges to NT AUTHORITY\SYSTEM This issue affects: Bitdefender Endpoint Security Tools for Windows versions prior to 7.2.1.65. Bitdefender Total Security versions prior to 7.2.1.65.
1440 CVE-2021-3576 269 2021-10-28 2021-12-15
7.2
None Local Low Not required Complete Complete Complete
Execution with Unnecessary Privileges vulnerability in Bitdefender Endpoint Security Tools, Total Security allows a local attacker to elevate to 'NT AUTHORITY\System. Impersonation enables the server thread to perform actions on behalf of the client but within the limits of the client's security context. This issue affects: Bitdefender Endpoint Security Tools versions prior to 7.2.1.65. Bitdefender Total Security versions prior to 25.0.26.
1441 CVE-2021-3510 2021-10-05 2021-10-14
5.0
None Remote Low Not required None None Partial
Zephyr JSON decoder incorrectly decodes array of array. Zephyr versions >= >1.14.0, >= >2.5.0 contain Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4
1442 CVE-2021-3455 416 2021-10-19 2021-10-26
5.0
None Remote Low Not required None None Partial
Disconnecting L2CAP channel right after invalid ATT request leads freeze. Zephyr versions >= 2.4.0, >= 2.5.0 contain Use After Free (CWE-416). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp
1443 CVE-2021-3454 2021-10-19 2021-10-26
5.0
None Remote Low Not required None None Partial
Truncated L2CAP K-frame causes assertion failure. Zephyr versions >= 2.4.0, >= v.2.50 contain Improper Handling of Length Parameter Inconsistency (CWE-130), Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3
1444 CVE-2021-3441 79 XSS 2021-10-29 2021-11-03
3.5
None Remote Medium ??? None Partial None
A potential security vulnerability has been identified for the HP OfficeJet 7110 Wide Format ePrinter that enables Cross-Site Scripting (XSS).
1445 CVE-2021-3436 2021-10-05 2021-10-13
6.4
None Remote Low Not required None Partial Partial
BT: Possible to overwrite an existing bond during keys distribution phase when the identity address of the bond is known. Zephyr versions >= 1.14.2, >= 2.4.0, >= 2.5.0 contain Use of Multiple Resources with Duplicate Identifier (CWE-694). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63
1446 CVE-2021-3330 787 2021-10-12 2021-10-18
5.8
None Local Network Low Not required Partial Partial Partial
RCE/DOS: Linked-list corruption leading to large out-of-bounds write while sorting for forged fragment list in Zephyr. Zephyr versions >= >=2.4.0 contain Out-of-bounds Write (CWE-787). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fj4r-373f-9456
1447 CVE-2021-3323 191 2021-10-12 2021-10-18
7.5
None Remote Low Not required Partial Partial Partial
Integer Underflow in 6LoWPAN IPHC Header Uncompression in Zephyr. Zephyr versions >= >=2.4.0 contain Integer Underflow (Wrap or Wraparound) (CWE-191). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-89j6-qpxf-pfpc
1448 CVE-2021-3322 476 2021-10-12 2021-10-18
3.3
None Local Network Low Not required None None Partial
Unexpected Pointer Aliasing in IEEE 802154 Fragment Reassembly in Zephyr. Zephyr versions >= >=2.4.0 contain NULL Pointer Dereference (CWE-476). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p86r-gc4r-4mq3
1449 CVE-2021-3321 191 Overflow 2021-10-12 2021-10-18
5.8
None Local Network Low Not required Partial Partial Partial
Integer Underflow in Zephyr in IEEE 802154 Fragment Reassembly Header Removal. Zephyr versions >= >=2.4.0 contain Integer Overflow to Buffer Overflow (CWE-680). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w44j-66g7-xw99
1450 CVE-2021-3319 476 2021-10-05 2021-10-14
7.5
None Remote Low Not required Partial Partial Partial
DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses. Zephyr versions >= > v2.4.0 contain NULL Pointer Dereference (CWE-476), Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364
Total number of vulnerabilities : 1708   Page : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 (This Page)30 31 32 33 34 35
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.