Show filters
4,242 Total Results
Displaying 181-190 of 4,242
Sort by:
Attacker Value
Unknown
CVE-2021-44420
Disclosure Date: December 08, 2021 (last updated February 23, 2025)
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
0
Attacker Value
Unknown
CVE-2021-43471
Disclosure Date: December 06, 2021 (last updated February 23, 2025)
In Canon LBP223 printers, the System Manager Mode login does not require an account password or PIN. An attacker can remotely shut down the device after entering the background, creating a denial of service vulnerability.
0
Attacker Value
Unknown
CVE-2021-3939
Disclosure Date: November 16, 2021 (last updated February 23, 2025)
Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1.
0
Attacker Value
Unknown
CVE-2021-3747
Disclosure Date: September 28, 2021 (last updated February 23, 2025)
The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner.
0
Attacker Value
Unknown
CVE-2021-3710
Disclosure Date: September 14, 2021 (last updated February 23, 2025)
An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
0
Attacker Value
Unknown
CVE-2021-3709
Disclosure Date: September 14, 2021 (last updated February 23, 2025)
Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
0
Attacker Value
Unknown
CVE-2021-38154
Disclosure Date: August 29, 2021 (last updated February 23, 2025)
Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.
0
Attacker Value
Unknown
CVE-2021-39367
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
Canon Oce Print Exec Workgroup 1.3.2 allows Host header injection.
0
Attacker Value
Unknown
CVE-2021-39368
Disclosure Date: August 23, 2021 (last updated February 23, 2025)
Canon Oce Print Exec Workgroup 1.3.2 allows XSS via the lang parameter.
0
Attacker Value
Unknown
CVE-2021-38085
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
The Canon TR150 print driver through 3.71.2.10 is vulnerable to a privilege escalation issue. During the add printer process, a local attacker can overwrite CNMurGE.dll and, if timed properly, the overwritten DLL will be loaded into a SYSTEM process resulting in escalation of privileges. This occurs because the driver drops a world-writable DLL into a CanonBJ %PROGRAMDATA% location that gets loaded by printisolationhost (a system process).
0