Show filters
90 Total Results
Displaying 21-30 of 90
Sort by:
Attacker Value
Unknown
CVE-2021-23998
Disclosure Date: June 24, 2021 (last updated February 22, 2025)
Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
0
Attacker Value
Unknown
CVE-2021-33887
Disclosure Date: June 15, 2021 (last updated February 22, 2025)
Insufficient verification of data authenticity in Peloton TTR01 up to and including PTV55G allows an attacker with physical access to boot into a modified kernel/ramdisk without unlocking the bootloader.
0
Attacker Value
Unknown
CVE-2021-33712
Disclosure Date: June 08, 2021 (last updated February 22, 2025)
A vulnerability has been identified in Mendix SAML Module (All versions < V2.1.2). The configuration of the SAML module does not properly check various restrictions and validations imposed by an identity provider. This could allow a remote authenticated attacker to escalate privileges.
0
Attacker Value
Unknown
CVE-2021-33840
Disclosure Date: June 04, 2021 (last updated February 22, 2025)
The server in Luca through 1.1.14 allows remote attackers to cause a denial of service (insertion of many fake records related to COVID-19) because Phone Number data lacks a digital signature.
0
Attacker Value
Unknown
CVE-2021-32665
Disclosure Date: June 03, 2021 (last updated February 22, 2025)
wire-ios is the iOS version of Wire, an open-source secure messaging app. wire-ios versions 3.8.0 and earlier have a bug in which a conversation could be incorrectly set to "unverified. This occurs when: - Self user is added to a new conversation - Self user is added to an existing conversation - All the participants in the conversation were previously marked as verified. The vulnerability is patched in wire-ios version 3.8.1. As a workaround, one can unverify & verify a device in the conversation.
0
Attacker Value
Unknown
CVE-2021-28678
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data.
0
Attacker Value
Unknown
CVE-2021-20267
Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.
0
Attacker Value
Unknown
CVE-2020-28900
Disclosure Date: May 24, 2021 (last updated February 22, 2025)
Insufficient Verification of Data Authenticity in Nagios Fusion 4.1.8 and earlier and Nagios XI 5.7.5 and earlier allows for Escalation of Privileges or Code Execution as root via vectors related to an untrusted update package to upgrade_to_latest.sh.
0
Attacker Value
Unknown
CVE-2021-22339
Disclosure Date: May 20, 2021 (last updated February 22, 2025)
There is a denial of service vulnerability in some versions of ManageOne. In specific scenarios, due to the insufficient verification of the parameter, an attacker may craft some specific parameter. Successful exploit may cause some services abnormal.
0
Attacker Value
Unknown
CVE-2020-24395
Disclosure Date: May 20, 2021 (last updated February 22, 2025)
The USB firmware update script of homee Brain Cube v2 (2.28.2 and 2.28.4) devices allows an attacker with physical access to install compromised firmware. This occurs because of insufficient validation of the firmware image file and can lead to code execution on the device.
0