Show filters
332 Total Results
Displaying 21-30 of 332
Sort by:
Attacker Value
Unknown

CVE-2021-32619

Disclosure Date: May 28, 2021 (last updated February 22, 2025)
Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.
Attacker Value
Unknown

CVE-2021-32620

Disclosure Date: May 28, 2021 (last updated February 22, 2025)
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions prior to 11.10.13, 12.6.7, and 12.10.2, a user disabled on a wiki using email verification for registration canouldre-activate themself by using the activation link provided for his registration. The problem has been patched in the following versions of XWiki: 11.10.13, 12.6.7, 12.10.2, 13.0. It is possible to workaround the issue by resetting the `validkey` property of the disabled XWiki users. This can be done by editing the user profile with object editor.
Attacker Value
Unknown

CVE-2021-29628

Disclosure Date: May 28, 2021 (last updated February 22, 2025)
In FreeBSD 13.0-STABLE before n245764-876ffe28796c, 12.2-STABLE before r369857, 13.0-RELEASE before p1, and 12.2-RELEASE before p7, a system call triggering a fault could cause SMAP protections to be disabled for the duration of the system call. This weakness could be combined with other kernel bugs to craft an exploit.
Attacker Value
Unknown

CVE-2020-1729

Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2
Attacker Value
Unknown

CVE-2020-26559

Disclosure Date: May 24, 2021 (last updated February 22, 2025)
Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (participating in the provisioning protocol) to identify the AuthValue used given the Provisioner’s public key, and the confirmation number and nonce provided by the provisioning device. This could permit a device without the AuthValue to complete provisioning without brute-forcing the AuthValue.
Attacker Value
Unknown

CVE-2020-26560

Disclosure Date: May 24, 2021 (last updated February 22, 2025)
Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, reflecting the authentication evidence from a Provisioner, to complete authentication without possessing the AuthValue, and potentially acquire a NetKey and AppKey.
Attacker Value
Unknown

CVE-2020-26555

Disclosure Date: May 24, 2021 (last updated February 22, 2025)
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
Attacker Value
Unknown

CVE-2021-31158

Disclosure Date: May 19, 2021 (last updated February 22, 2025)
In the Query Engine in Couchbase Server 6.5.x and 6.6.x through 6.6.1, Common Table Expression queries were not correctly checking the user's permissions, allowing read-access to resources beyond what those users were explicitly allowed to access.
Attacker Value
Unknown

CVE-2021-24282

Disclosure Date: May 14, 2021 (last updated February 22, 2025)
In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the various AJAX actions in the plugin to do a variety of things. For example, an attacker could use wpcf7r_reset_settings to reset the plugin’s settings, wpcf7r_add_action to add actions to a form, and more.
Attacker Value
Unknown

CVE-2021-24281

Disclosure Date: May 14, 2021 (last updated February 22, 2025)
In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the delete_action_post AJAX action to delete any post on a target site.