CVE-2021-41451
Summary: A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated...
Summary: A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated...
Summary: Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before...
Summary: Mermaid is a Javascript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create...
Summary: A Improper Access Control vulnerability in longhorn of SUSE Longhorn allows attackers to connect to a longhorn-engine replica instance...
Summary: An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The...
Summary: An out-of-bounds array read in the apr_time_exp*() functions was fixed in the Apache Portable Runtime 1.6.3 release (CVE-2017-12613). The...
Summary: A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS...
Summary: This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.1, Security Update 2021-008 Catalina,...
Summary: An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.2, tvOS...
Summary: A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this...
Summary: A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this...
Summary: A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this...
Summary: A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this...
Summary: A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this...
Summary: stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow)...
Summary: Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows...
Summary: Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows...
Summary: Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows...
Summary: Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows...
Summary: Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows...
Summary: The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the...
Summary: NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and...
Summary: The Directorist WordPress plugin before 7.0.6.2 was vulnerable to Cross-Site Request Forgery to Remote File Upload leading to arbitrary...
Summary: Cross-Site Request Forgery (CSRF) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions