CVE-2021-23009
Summary: On BIG-IP version 16.0.x before 16.0.1.1 and 15.1.x before 15.1.3, malformed HTTP/2 requests may cause an infinite loop which...
Summary: On BIG-IP version 16.0.x before 16.0.1.1 and 15.1.x before 15.1.3, malformed HTTP/2 requests may cause an infinite loop which...
Summary: An unauthenticated remote attacker could create a permanent denial-of-service condition by sending specially crafted OSPF packets. Successful exploitation requires...
Summary: SmartVNC has a heap allocation leak vulnerability in the server Tight encoder, which could result in a denial-of-service condition...
Summary: A remote attacker could send specially crafted packets to a SmartVNC device layout handler on the client side, which...
Summary: The kube-rbac-proxy container before version 0.4.1 as used in Red Hat OpenShift Container Platform does not honor TLS configurations,...
Summary: In JetBrains UpSource before 2020.1.1883, application passwords were not revoked correctly Reference Links(if available): https://blog.jetbrains.com/blog/2021/05/07/jetbrains-security-bulletin-q1-2021/ https://blog.jetbrains.com CVSS Score (if...
Summary: A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an...
Summary: By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux...
Summary: Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges...
Summary: Privilege Escalation vulnerability in the File Lock component of McAfee Total Protection (MTP) prior to 16.0.32 allows a local...
Summary: A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can...
Summary: OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers...
Summary: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is...
Summary: A privilege escalation vulnerability in FortiNAC version below 8.8.2 may allow an admin user to escalate the privileges to...
Summary: Cross Site Request Forgery (CSRF) Vulnerability in ForestBlog latest version via the website Management background, which could let a...
Summary: In JetBrains Code With Me bundled to the compatible IDEs before version 2021.1, the client could execute code in...
Summary: An issue exists on NightOwl WDB-20-V2 WDB-20-V2_20190314 devices that allows an unauthenticated user to gain access to snapshots and...
Summary: Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2),...
Summary: strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable. Reference Links(if available):...
Summary: TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseAdd` results in allowing attackers to...
Summary: A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to perform a command...
Summary: A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications...
Summary: A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications...
Summary: A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications...