Search Results (9710 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-3882 1 Ledgersmb 1 Ledgersmb 2024-11-21 6.8 Medium
LedgerSMB does not set the 'Secure' attribute on the session authorization cookie when the client uses HTTPS and the LedgerSMB server is behind a reverse proxy. By tricking a user to use an unencrypted connection (HTTP), an attacker may be able to obtain the authentication data by capturing network traffic. LedgerSMB 1.8 and newer switched from Basic authentication to using cookie authentication with encrypted cookies. Although an attacker can't access the information inside the cookie, nor the password of the user, possession of the cookie is enough to access the application as the user from which the cookie has been obtained. In order for the attacker to obtain the cookie, first of all the server must be configured to respond to unencrypted requests, the attacker must be suitably positioned to eavesdrop on the network traffic between the client and the server *and* the user must be tricked into using unencrypted HTTP traffic. Proper audit control and separation of duties limit Integrity impact of the attack vector. Users of LedgerSMB 1.8 are urged to upgrade to known-fixed versions. Users of LedgerSMB 1.7 or 1.9 are unaffected by this vulnerability and don't need to take action. As a workaround, users may configure their Apache or Nginx reverse proxy to add the Secure attribute at the network boundary instead of relying on LedgerSMB. For Apache, please refer to the 'Header always edit' configuration command in the mod_headers module. For Nginx, please refer to the 'proxy_cookie_flags' configuration command.
CVE-2021-3869 1 Stanford 1 Corenlp 2024-11-21 7.5 High
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
CVE-2021-3859 2 Netapp, Redhat 11 Cloud Secure Agent, Oncommand Insight, Oncommand Workflow Automation and 8 more 2024-11-21 7.5 High
A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.
CVE-2021-3852 1 Weseek 1 Growi 2024-11-21 7.5 High
growi is vulnerable to Authorization Bypass Through User-Controlled Key
CVE-2021-3851 1 Firefly-iii 1 Firefly Iii 2024-11-21 5.4 Medium
firefly-iii is vulnerable to URL Redirection to Untrusted Site
CVE-2021-3845 1 Ws Scrcpy Project 1 Ws Scrcpy 2024-11-21 7.5 High
ws-scrcpy is vulnerable to External Control of File Name or Path
CVE-2021-3836 1 Dbeaver 1 Dbeaver 2024-11-21 5.5 Medium
dbeaver is vulnerable to Improper Restriction of XML External Entity Reference
CVE-2021-3833 1 Artica 1 Integria Ims 2024-11-21 9.8 Critical
Integria IMS login check uses a loose comparator ("==") to compare the MD5 hash of the password provided by the user and the MD5 hash stored in the database. An attacker with a specific formatted password could exploit this vulnerability in order to login in the system with different passwords.
CVE-2021-3829 1 Openwhyd 1 Openwhyd 2024-11-21 6.1 Medium
openwhyd is vulnerable to URL Redirection to Untrusted Site
CVE-2021-3828 1 Nltk 1 Nltk 2024-11-21 7.5 High
nltk is vulnerable to Inefficient Regular Expression Complexity
CVE-2021-3813 1 Chatwoot 1 Chatwoot 2024-11-21 6.5 Medium
Improper Privilege Management in GitHub repository chatwoot/chatwoot prior to v2.2.
CVE-2021-3779 1 Ruby-mysql Project 1 Ruby-mysql 2024-11-21 6.5 Medium
A malicious MySQL server can request local file content from a client using ruby-mysql prior to version 2.10.0 without explicit authorization from the user. This issue was resolved in version 2.10.0 and later.
CVE-2021-3664 1 Url-parse Project 1 Url-parse 2024-11-21 5.3 Medium
url-parse is vulnerable to URL Redirection to Untrusted Site
CVE-2021-3654 2 Openstack, Redhat 3 Nova, Openstack, Openstack Platform 2024-11-21 6.1 Medium
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
CVE-2021-3647 1 Uri.js Project 1 Uri.js 2024-11-21 6.1 Medium
URI.js is vulnerable to URL Redirection to Untrusted Site
CVE-2021-3639 2 Redhat, Uninett 2 Enterprise Linux, Mod Auth Mellon 2024-11-21 6.1 Medium
A flaw was found in mod_auth_mellon where it does not sanitize logout URLs properly. This issue could be used by an attacker to facilitate phishing attacks by tricking users into visiting a trusted web application URL that redirects to an external and potentially malicious server. The highest threat from this liability is to confidentiality and integrity.
CVE-2021-3614 1 Lenovo 42 100e 2nd Gen, 100e 2nd Gen Firmware, 300e 2nd Gen and 39 more 2024-11-21 6.4 Medium
A vulnerability was reported on some Lenovo Notebook systems that could allow an attacker with physical access to elevate privileges under certain conditions during a BIOS update performed by Lenovo Vantage.
CVE-2021-3565 3 Fedoraproject, Redhat, Tpm2-tools Project 3 Fedora, Enterprise Linux, Tpm2-tools 2024-11-21 5.9 Medium
A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.
CVE-2021-3531 2 Fedoraproject, Redhat 3 Fedora, Ceph, Ceph Storage 2024-11-21 5.3 Medium
A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes it can cause the rgw to crash, resulting in a denial of service. The greatest threat to the system is of availability.
CVE-2021-3530 2 Gnu, Netapp 2 Binutils, Ontap Select Deploy Administration Utility 2024-11-21 7.5 High
A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.