Show filters
4,242 Total Results
Displaying 181-190 of 4,242
Sort by:
Attacker Value
Unknown

CVE-2021-44420

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
Attacker Value
Unknown

CVE-2021-43471

Disclosure Date: December 06, 2021 (last updated February 23, 2025)
In Canon LBP223 printers, the System Manager Mode login does not require an account password or PIN. An attacker can remotely shut down the device after entering the background, creating a denial of service vulnerability.
Attacker Value
Unknown

CVE-2021-3939

Disclosure Date: November 16, 2021 (last updated February 23, 2025)
Ubuntu-specific modifications to accountsservice (in patch file debian/patches/0010-set-language.patch) caused the fallback_locale variable, pointing to static storage, to be freed, in the user_change_language_authorized_cb function. This is reachable via the SetLanguage dbus function. This is fixed in versions 0.6.55-0ubuntu12~20.04.5, 0.6.55-0ubuntu13.3, 0.6.55-0ubuntu14.1.
Attacker Value
Unknown

CVE-2021-3747

Disclosure Date: September 28, 2021 (last updated February 23, 2025)
The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner.
Attacker Value
Unknown

CVE-2021-3710

Disclosure Date: September 14, 2021 (last updated February 23, 2025)
An information disclosure via path traversal was discovered in apport/hookutils.py function read_file(). This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
Attacker Value
Unknown

CVE-2021-3709

Disclosure Date: September 14, 2021 (last updated February 23, 2025)
Function check_attachment_for_errors() in file data/general-hooks/ubuntu.py could be tricked into exposing private data via a constructed crash file. This issue affects: apport 2.14.1 versions prior to 2.14.1-0ubuntu3.29+esm8; 2.20.1 versions prior to 2.20.1-0ubuntu2.30+esm2; 2.20.9 versions prior to 2.20.9-0ubuntu7.26; 2.20.11 versions prior to 2.20.11-0ubuntu27.20; 2.20.11 versions prior to 2.20.11-0ubuntu65.3;
Attacker Value
Unknown

CVE-2021-38154

Disclosure Date: August 29, 2021 (last updated February 23, 2025)
Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.
Attacker Value
Unknown

CVE-2021-39367

Disclosure Date: August 23, 2021 (last updated February 23, 2025)
Canon Oce Print Exec Workgroup 1.3.2 allows Host header injection.
Attacker Value
Unknown

CVE-2021-39368

Disclosure Date: August 23, 2021 (last updated February 23, 2025)
Canon Oce Print Exec Workgroup 1.3.2 allows XSS via the lang parameter.
Attacker Value
Unknown

CVE-2021-38085

Disclosure Date: August 11, 2021 (last updated February 23, 2025)
The Canon TR150 print driver through 3.71.2.10 is vulnerable to a privilege escalation issue. During the add printer process, a local attacker can overwrite CNMurGE.dll and, if timed properly, the overwritten DLL will be loaded into a SYSTEM process resulting in escalation of privileges. This occurs because the driver drops a world-writable DLL into a CanonBJ %PROGRAMDATA% location that gets loaded by printisolationhost (a system process).