CVE-2021-39929
Summary: Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of...
Summary: Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of...
Summary: Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of...
Summary: An issue was discovered in Allegro Windows (formerly Popsy Windows) before 3.3.4156.1. A standard user can escalate privileges to...
Summary: A heap-based buffer overflow in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below...
Summary: Multiple stack-based buffer overflows in the API controllers of FortiWeb 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may allow an...
Summary: SonicWall Global VPN client version 4.10.6 (32-bit and 64-bit) and earlier have a DLL Search Order Hijacking vulnerability. Successful...
Summary: Multiple heap-based buffer overflow vulnerabilities in some web API controllers of FortiWeb 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may...
Summary: The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 exposes an API router that accepts a...
Summary: An improper access control vulnerability in FortiOS autod daemon 7.0.0, 6.4.6 and below, 6.2.9 and below, 6.0.12 and below...
Summary: There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service...
Summary: FlexiHub For Windows is affected by Integer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below...
Summary: Donglify is affected by Integer Overflow. IOCTL Handler 0x22001B in the Donglify above 1.0.12309 below 1.7.14110 allow local attackers...
Summary: vim is vulnerable to Use After Free Reference Links(if available): https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 CVSS Score (if available) v2: / MEDIUM...
Summary: vim is vulnerable to Use After Free Reference Links(if available): https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 CVSS Score (if available) v2: / MEDIUM...
Summary: Successful exploitation of this vulnerability could allow an unauthorized user to access sensitive data. Reference Links(if available): https://us-cert.gov/ics/advisories/ICSA-21-336-02 https://www.johnsoncontrols.com/cyber-solutions/security-advisories...
Summary: PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions...
Summary: PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions...
Summary: The WPS Hide Login WordPress plugin before 1.9.1 has a bug which allows to get the secret login page...
Summary: Weak Password Requirements vulnerability in Hitachi Energy FOX61x, XCM20 allows an attacker to gain unauthorized access to the Data...
Summary: issues with partially successful P2M updates on x86 T x86 HVM and PVH guests may be started in populate-on-demand...
Summary: issues with partially successful P2M updates on x86 T x86 HVM and PVH guests may be started in populate-on-demand...
Summary: issues with partially successful P2M updates on x86 T x86 HVM and PVH guests may be started in populate-on-demand...
Summary: guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory,...
Summary: PoD operations on misaligned GFNs T x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to...