CVE-2021-3552
Summary: A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService component of Bitdefender Endpoint Security Tools allows an attacker to...
Summary: A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService component of Bitdefender Endpoint Security Tools allows an attacker to...
Summary: A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService component of Bitdefender Endpoint Security Tools allows an attacker to...
Summary: A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService component of Bitdefender Endpoint Security Tools allows an attacker to...
Summary: A Server-Side Request Forgery (SSRF) vulnerability in the EPPUpdateService component of Bitdefender Endpoint Security Tools allows an attacker to...
Summary: A vulnerability in specific versions of Zyxel NBG6818, NBG7815, WSQ20, WSQ50, WSQ60, and WSR30 firmware with pre-configured password management...
Summary: ** DISPUTED ** An issue was discovered in zeek version 4.1.0. There is a HTTP request splitting vulnerability that...
Summary: issues with partially successful P2M updates on x86 T x86 HVM and PVH guests may be started in populate-on-demand...
Summary: issues with partially successful P2M updates on x86 T x86 HVM and PVH guests may be started in populate-on-demand...
Summary: issues with partially successful P2M updates on x86 T x86 HVM and PVH guests may be started in populate-on-demand...
Summary: A Cross-Origin Resource Sharing (CORS) vulnerability found in UniFi Protect application Version 1.19.2 and earlier allows a malicious actor...
Summary: Redash is a package for data visualization and sharing. In versions 10.0 and priorm the implementation of URL-loading data...
Summary: Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to download arbitrary files, such as reports containing sensitive information, because...
Summary: There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit...
Summary: There is a Out-of-bounds Read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Reference Links(if...
Summary: There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause kernel crash. Reference...
Summary: Insecure Direct Object Reference in edit function of Advanced Forms (Free & Pro) before 1.6.9 allows authenticated remote attacker...
Summary: Improper authorization in handler for custom URL scheme vulnerability in Android App 'Mercari (Merpay) - Marketplace and Mobile Payments...
Summary: The bark_noise_hybridmp function in psy.c in Xiph.Org libvorbis 1.3.5 allows remote attackers to cause a denial of service (out-of-bounds...
Summary: mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels, which allows remote attackers to...
Summary: bark_noise_hybridmp in psy.c in Xiph.Org libvorbis 1.3.6 has a stack-based buffer over-read. Reference Links(if available): https://gitlab.xiph.org/xiph/vorbis/issues/2334 https://access.redhat.com/errata/RHSA-2019:3703 https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html https://security.gentoo.org/glsa/202003-36...
Summary: In vp8_decode_frame of decodeframe.c, there is a possible out of bounds read due to improper input validation. This could...
Summary: Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion." Reference Links(if available): https://github.com/OISF/suricata/releases https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990835 https://security-tracker.debian.org/tracker/CVE-2021-35063 https://forum.suricata.io/t/suricata-6-0-3-and-5-0-7-released/1489 https://bugzilla.redhat.com/show_bug.cgi?id=1980453...
Summary: Dell EMC Networker versions prior to 19.5 contain an Improper Authorization vulnerability. Any local malicious user with networker user...
Summary: Dell EMC CloudLink 7.1 and all prior versions contain an Improper Input Validation Vulnerability. A remote low privileged attacker,...