Show filters
480 Total Results
Displaying 41-50 of 480
Sort by:
Attacker Value
Unknown

CVE-2021-43553

Disclosure Date: November 09, 2021 (last updated February 23, 2025)
PI Vision could disclose information to a user with insufficient privileges for an AF attribute that is the child of another attribute and is configured as a Limits property.
Attacker Value
Unknown

CVE-2021-42026

Disclosure Date: November 09, 2021 (last updated February 23, 2025)
A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control read access for certain client actions. This could allow authenticated attackers to retrieve the changedDate attribute of arbitrary objects, even when they don't have read access to them.
Attacker Value
Unknown

CVE-2021-42025

Disclosure Date: November 09, 2021 (last updated February 23, 2025)
A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects in some cases, regardless whether they have write access to it.
Attacker Value
Unknown

CVE-2021-24788

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The Batch Cat WordPress plugin through 0.3 defines 3 custom AJAX actions, which both require authentication but are available for all roles. As a result, any authenticated user (including simple subscribers) can add/set/delete arbitrary categories to posts.
Attacker Value
Unknown

CVE-2021-24783

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The Post Expirator WordPress plugin before 2.6.0 does not have proper capability checks in place, which could allow users with a role as low as Contributor to schedule deletion of arbitrary posts.
Attacker Value
Unknown

CVE-2021-22051

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer.
Attacker Value
Unknown

CVE-2021-41230

Disclosure Date: November 05, 2021 (last updated February 23, 2025)
Pomerium is an open source identity-aware access proxy. In affected versions changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using `allowed_idp_claims` as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions. This issue has been resolved in v0.15.6. For users unable to upgrade clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated.
Attacker Value
Unknown

CVE-2021-25506

Disclosure Date: November 05, 2021 (last updated February 23, 2025)
Non-existent provider in Samsung Health prior to 6.19.1.0001 allows attacker to access it via malicious content provider or lead to denial of service.
Attacker Value
Unknown

CVE-2021-39904

Disclosure Date: November 05, 2021 (last updated February 23, 2025)
An Improper Access Control vulnerability in the GraphQL API in all versions of GitLab CE/EE starting from 13.1 before 14.2.6, all versions starting from 14.3 before 14.3.4, and all versions starting from 14.4 before 14.4.1 allows a Merge Request creator to resolve discussions and apply suggestions after a project owner has locked the Merge Request
Attacker Value
Unknown

CVE-2021-39902

Disclosure Date: November 04, 2021 (last updated February 23, 2025)
Incorrect Authorization in GitLab CE/EE 13.4 or above allows a user with guest membership in a project to modify the severity of an incident.