CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In October 2021

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
151 CVE-2021-41646 434 Exec Code Bypass 2021-10-29 2021-12-16
7.5
None Remote Low Not required Partial Partial Partial
Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters..
152 CVE-2021-41645 434 Exec Code 2021-10-29 2021-11-02
6.5
None Remote Low ??? Partial Partial Partial
Remote Code Execution (RCE) vulnerability exists in Sourcecodester Budget and Expense Tracker System 1.0 that allows a remote malicious user to inject arbitrary code via the image upload field. .
153 CVE-2021-41644 434 Bypass 2021-10-29 2021-11-02
7.5
None Remote Low Not required Partial Partial Partial
Remote Code Exection (RCE) vulnerability exists in Sourcecodester Online Food Ordering System 2.0 via a maliciously crafted PHP file that bypasses the image upload filters.
154 CVE-2021-41643 434 Exec Code 2021-10-29 2021-11-02
7.5
None Remote Low Not required Partial Partial Partial
Remote Code Execution (RCE) vulnerability exists in Sourcecodester Church Management System 1.0 via the image upload field.
155 CVE-2021-41619 94 Exec Code 2021-10-27 2021-11-03
9.0
None Remote Low ??? Complete Complete Complete
An issue was discovered in Gradle Enterprise before 2021.1.2. There is potential remote code execution via the application startup configuration. The installation configuration user interface (available to administrators) allows specifying arbitrary Java Virtual Machine startup options. Some of these options, such as -XX:OnOutOfMemoryError, allow specifying a command to be run on the host. This can be abused to run arbitrary commands on the host, should an attacker gain administrative access to the application.
156 CVE-2021-41611 295 2021-10-18 2021-12-23
5.0
None Remote Low Not required Partial None None
An issue was discovered in Squid 5.0.6 through 5.1.x before 5.2. When validating an origin server or peer certificate, Squid may incorrectly classify certain certificates as trusted. This problem allows a remote server to obtain security trust well improperly. This indication of trust may be passed along to clients, allowing access to unsafe or hijacked services.
157 CVE-2021-41596 22 Dir. Trav. 2021-10-04 2021-10-12
5.0
None Remote Low Not required Partial None None
SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the importFile parameter of the RefreshMapping import functionality.
158 CVE-2021-41595 22 Dir. Trav. 2021-10-04 2021-10-12
5.0
None Remote Low Not required Partial None None
SuiteCRM before 7.10.33 and 7.11.22 allows information disclosure via Directory Traversal. An attacker can partially include arbitrary files via the file_name parameter of the Step3 import functionality.
159 CVE-2021-41593 863 2021-10-04 2021-10-14
7.5
None Remote Low Not required Partial Partial Partial
Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure.
160 CVE-2021-41592 863 2021-10-04 2021-10-20
7.5
None Remote Low Not required Partial Partial Partial
Blockstream c-lightning through 0.10.1 allows loss of funds because of dust HTLC exposure.
161 CVE-2021-41591 863 2021-10-04 2021-10-20
7.5
None Remote Low Not required Partial Partial Partial
ACINQ Eclair before 0.6.3 allows loss of funds because of dust HTLC exposure.
162 CVE-2021-41590 668 2021-10-27 2021-11-03
5.0
None Remote Low Not required Partial None None
In Gradle Enterprise through 2021.3, probing of the server-side network environment can occur via an SMTP configuration test. The installation configuration user interface available to administrators allows testing the configured SMTP server settings. This test function can be used to identify the listening TCP ports available to the server, revealing information about the internal network environment.
163 CVE-2021-41589 732 Exec Code 2021-10-27 2021-11-03
7.5
None Remote Low Not required Partial Partial Partial
In Gradle Enterprise before 2021.3 (and Enterprise Build Cache Node before 10.0), there is potential cache poisoning and remote code execution when running the build cache node with its default configuration. This configuration allows anonymous access to the configuration user interface and anonymous write access to the build cache. If access control to the build cache is not changed from the default open configuration, a malicious actor with network access can populate the cache with manipulated entries that may execute malicious code as part of a build process. This applies to the build cache provided with Gradle Enterprise and the separate build cache node service if used. If access control to the user interface is not changed from the default open configuration, a malicious actor can undo build cache access control in order to populate the cache with manipulated entries that may execute malicious code as part of a build process. This does not apply to the build cache provided with Gradle Enterprise, but does apply to the separate build cache node service if used.
164 CVE-2021-41579 22 Exec Code Dir. Trav. Bypass 2021-10-04 2021-10-12
6.8
None Remote Medium Not required Partial Partial Partial
LCDS LAquis SCADA through 4.3.1.1085 is vulnerable to a control bypass and path traversal. If an attacker can get a victim to load a malicious els project file and use the play feature, then the attacker can bypass a consent popup and write arbitrary files to OS locations where the user has permission, leading to code execution.
165 CVE-2021-41578 22 Exec Code Dir. Trav. 2021-10-04 2021-10-12
6.8
None Remote Medium Not required Partial Partial Partial
mySCADA myDESIGNER 8.20.0 and below allows Directory Traversal attacks when importing project files. If an attacker can trick a victim into importing a malicious mep file, then they gain the ability to write arbitrary files to OS locations where the user has permission. This would typically lead to code execution.
166 CVE-2021-41568 863 Bypass 2021-10-08 2021-10-15
6.4
None Remote Low Not required Partial Partial None
Tad Web is vulnerable to authorization bypass, thus remote attackers can exploit the vulnerability to use the original function of viewing bulletin boards and uploading files in the system.
167 CVE-2021-41567 79 XSS 2021-10-08 2021-10-15
4.3
None Remote Medium Not required None Partial None
The new add subject parameter of Tad Uploader view book list function fails to filter special characters. Unauthenticated attackers can remotely inject JavaScript syntax and execute stored XSS attacks.
168 CVE-2021-41566 434 Exec Code 2021-10-08 2021-10-15
7.5
None Remote Low Not required Partial Partial Partial
The file extension of the TadTools file upload function fails to filter, thus remote attackers can upload any types of files and execute arbitrary code without logging in.
169 CVE-2021-41565 79 XSS 2021-10-08 2021-10-15
4.3
None Remote Medium Not required None Partial None
TadTools special page parameter does not properly restrict the input of specific characters, thus remote attackers can inject JavaScript syntax without logging in, and further perform reflective XSS attacks.
170 CVE-2021-41564 863 Bypass 2021-10-08 2021-10-15
5.0
None Remote Low Not required None Partial None
Tad Honor viewing book list function is vulnerable to authorization bypass, thus remote attackers can use special parameters to delete articles arbitrarily without logging in.
171 CVE-2021-41563 79 XSS 2021-10-08 2021-10-15
4.3
None Remote Medium Not required None Partial None
Tad Book3 editing book function does not filter special characters. Unauthenticated attackers can remotely inject JavaScript syntax and execute stored XSS attacks.
172 CVE-2021-41555 79 Exec Code XSS 2021-10-05 2021-10-09
4.3
None Remote Medium Not required None Partial None
** UNSUPPORTED WHEN ASSIGNED ** In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within the HTTP response returned by the application without adequate validation. In this way, if HTML code or client-side executable code (e.g., Javascript) is entered as input, the expected execution flow could be altered. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020.
173 CVE-2021-41554 863 2021-10-05 2021-10-09
6.5
None Remote Low ??? Partial Partial Partial
** UNSUPPORTED WHEN ASSIGNED ** ARCHIBUS Web Central 21.3.3.815 (a version from 2014) does not properly validate requests for access to data and functionality in these affected endpoints: /archibus/schema/ab-edit-users.axvw, /archibus/schema/ab-data-dictionary-table.axvw, /archibus/schema/ab-schema-add-field.axvw, /archibus/schema/ab-core/views/process-navigator/ab-my-user-profile.axvw. By not verifying the permissions for access to resources, it allows a potential attacker to view pages that are not allowed. Specifically, it was found that any authenticated user can reach the administrative console for user management by directly requesting access to the page via URL. This allows a malicious user to modify all users' profiles, to elevate any privileges to administrative ones, or to create or delete any type of user. It is also possible to modify the emails of other users, through a misconfiguration of the username parameter, on the user profile page. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020.
174 CVE-2021-41553 384 2021-10-05 2021-10-09
7.5
None Remote Low Not required Partial Partial Partial
** UNSUPPORTED WHEN ASSIGNED ** In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), the Web Application in /archibus/login.axvw assign a session token that could be already in use by another user. It was therefore possible to access the application through a user whose credentials were not known, without any attempt by the testers to modify the application logic. It is also possible to set the value of the session token, client-side, simply by making an unauthenticated GET Request to the Home Page and adding an arbitrary value to the JSESSIONID field. The application, following the login, does not assign a new token, continuing to keep the inserted one, as the identifier of the entire session. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020.
175 CVE-2021-41546 400 2021-10-12 2021-10-19
7.8
None Remote Low Not required None None Complete
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.14.1), RUGGEDCOM ROX RX1400 (All versions < V2.14.1), RUGGEDCOM ROX RX1500 (All versions < V2.14.1), RUGGEDCOM ROX RX1501 (All versions < V2.14.1), RUGGEDCOM ROX RX1510 (All versions < V2.14.1), RUGGEDCOM ROX RX1511 (All versions < V2.14.1), RUGGEDCOM ROX RX1512 (All versions < V2.14.1), RUGGEDCOM ROX RX1524 (All versions < V2.14.1), RUGGEDCOM ROX RX1536 (All versions < V2.14.1), RUGGEDCOM ROX RX5000 (All versions < V2.14.1). Affected devices write crashdumps without checking if enough space is available on the filesystem. Once the crashdump fills the entire root filesystem, affected devices fail to boot successfully. An attacker can leverage this vulnerability to cause a permanent Denial-of-Service.
176 CVE-2021-41530 2021-10-04 2021-10-12
4.3
None Remote Medium Not required None None Partial
Forcepoint NGFW Engine versions 6.5.11 and earlier, 6.8.6 and earlier, and 6.10.0 are vulnerable to TCP reflected amplification vulnerability, if HTTP User Response has been configured.
177 CVE-2021-41524 476 2021-10-05 2021-11-28
5.0
None Remote Low Not required None None Partial
While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.
178 CVE-2021-41511 89 Sql Bypass 2021-10-04 2021-11-30
7.5
None Remote Low Not required Partial Partial Partial
The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.
179 CVE-2021-41467 79 XSS 2021-10-01 2021-10-04
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter.
180 CVE-2021-41465 79 XSS 2021-10-01 2021-10-04
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_theme.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the rel parameter.
181 CVE-2021-41464 79 XSS 2021-10-01 2021-10-04
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the rel parameter.
182 CVE-2021-41463 79 XSS 2021-10-01 2021-10-04
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in toos/permissions/dialogs/access/entity/types/group_combination.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the cID parameter.
183 CVE-2021-41462 79 XSS 2021-10-01 2021-10-04
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the ctID parameter.
184 CVE-2021-41461 79 XSS 2021-10-01 2021-10-04
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the mode parameter.
185 CVE-2021-41459 787 DoS Overflow 2021-10-01 2021-10-07
5.0
None Remote Low Not required None None Partial
There is a stack buffer overflow in MP4Box v1.0.1 at src/filters/dmx_nhml.c:1008 in the nhmldmx_send_sample() function szXmlFrom parameter which leads to a denial of service vulnerability.
186 CVE-2021-41457 787 DoS Overflow 2021-10-01 2021-10-07
5.0
None Remote Low Not required None None Partial
There is a stack buffer overflow in MP4Box 1.1.0 at src/filters/dmx_nhml.c in nhmldmx_init_parsing which leads to a denial of service vulnerability.
187 CVE-2021-41456 787 DoS Overflow 2021-10-01 2021-10-07
5.0
None Remote Low Not required None None Partial
There is a stack buffer overflow in MP4Box v1.0.1 at src/filters/dmx_nhml.c:1004 in the nhmldmx_send_sample() function szXmlTo parameter which leads to a denial of service vulnerability.
188 CVE-2021-41363 Bypass 2021-10-13 2021-10-19
4.4
None Local Medium Not required Partial Partial Partial
Intune Management Extension Security Feature Bypass Vulnerability
189 CVE-2021-41361 2021-10-13 2021-10-19
3.5
None Remote Medium ??? None Partial None
Active Directory Federation Server Spoofing Vulnerability
190 CVE-2021-41357 269 2021-10-13 2021-10-19
4.6
None Local Low Not required Partial Partial Partial
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40449, CVE-2021-40450.
191 CVE-2021-41355 2021-10-13 2021-10-19
2.9
None Local Network Medium Not required Partial None None
.NET Core and Visual Studio Information Disclosure Vulnerability
192 CVE-2021-41354 79 XSS 2021-10-13 2021-10-19
3.5
None Remote Medium ??? None Partial None
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
193 CVE-2021-41353 2021-10-13 2021-10-19
3.5
None Remote Medium ??? None Partial None
Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability
194 CVE-2021-41352 2021-10-13 2021-10-19
5.0
None Remote Low Not required Partial None None
SCOM Information Disclosure Vulnerability
195 CVE-2021-41350 2021-10-13 2021-10-19
4.3
None Remote Medium Not required None Partial None
Microsoft Exchange Server Spoofing Vulnerability
196 CVE-2021-41348 269 2021-10-13 2021-10-19
5.2
None Local Network Low ??? Partial Partial Partial
Microsoft Exchange Server Elevation of Privilege Vulnerability
197 CVE-2021-41347 269 2021-10-13 2021-10-19
4.6
None Local Low Not required Partial Partial Partial
Windows AppX Deployment Service Elevation of Privilege Vulnerability
198 CVE-2021-41346 Bypass 2021-10-13 2021-10-19
4.6
None Local Low Not required Partial Partial Partial
Console Window Host Security Feature Bypass Vulnerability
199 CVE-2021-41345 269 2021-10-13 2021-10-19
7.2
None Local Low Not required Complete Complete Complete
Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26441, CVE-2021-40478, CVE-2021-40488, CVE-2021-40489.
200 CVE-2021-41344 Exec Code 2021-10-13 2021-11-04
6.5
None Remote Low ??? Partial Partial Partial
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40487.
Total number of vulnerabilities : 1708   Page : 1 2 3 4 (This Page)5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.