CVE-2021-3246
Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...
Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...
Summary: ** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crafted...
Summary: An issue was discovered in Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n where authentication to download the Syslog...
Summary: An issue was discovered in Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n where the admin password and private...
Summary: Basix NEX-Forms through 7.8.7 allows authentication bypass for stored PDF reports. Reference Links(if available): https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34675 http://basixonline.net/nex-forms-wordpress-form-builder-demo/change-log/ CVSS Score (if...
Summary: Basix NEX-Forms through 7.8.7 allows authentication bypass for Excel report generation. Reference Links(if available): https://github.com/rauschecker/CVEs/tree/main/CVE-2021-34676 http://basixonline.net/nex-forms-wordpress-form-builder-demo/change-log/ CVSS Score (if...
Summary: A stack overflow in libyang
Summary: In function ext_get_plugin() in libyang
Summary: In function lys_node_free() in libyang module can't be NULL. But in some cases, node->module can be null, which triggers...
Summary: In function read_yin_leaf() in libyang
Summary: A stack overflow in libyang
Summary: In function ext_get_plugin() in libyang
Summary: In function lys_node_free() in libyang module can't be NULL. But in some cases, node->module can be null, which triggers...
Summary: In function read_yin_leaf() in libyang
Summary: curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS...
Summary: ** UNSUPPORTED WHEN ASSIGNED ** Polipo through 1.1.1 allows denial of service via a reachable assertion during parsing of...
Summary: A command injection vulnerability in the sandcat plugin of Caldera 2.3.1 and earlier allows authenticated attackers to execute any...
Summary: PHP object injection in the Ajax endpoint of the backend in ForkCMS below version 5.8.3 allows an authenticated remote...
Summary: The WP Fluent Forms plugin < 3.6.67 for WordPress is vulnerable to Cross-Site Request Forgery leading to stored Cross-Site...
Summary: An integer overflow vulnerability exists in the DICOM parse_dicom_meta_info functionality of Accusoft ImageGear 19.9. A specially crafted malformed file...
Summary: A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A...
Summary: ** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crated...
Summary: Monstra CMS 3.0.4 allows attackers to execute arbitrary code via a crafted payload entered into the "Snippet content" field...
Summary: Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary...