Search Results (348174 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-41067 1 Listary 1 Listary 2024-11-21 7.5 High
An issue was discovered in Listary through 6. Improper implementation of the update process leads to the download of software updates with a /check-update HTTP-based connection. This can be exploited with MITM techniques. Together with the lack of package validation, it can lead to manipulation of update packages that can cause an installation of malicious content.
CVE-2021-41066 1 Bopsoft 1 Listary 2024-11-21 7.5 High
An issue was discovered in Listary through 6. When Listary is configured as admin, Listary will not ask for permissions again if a user tries to access files on the system from Listary itself (it will bypass UAC protection; there is no privilege validation of the current user that runs via Listary).
CVE-2021-41065 1 Bopsoft 1 Listary 2024-11-21 7.3 High
An issue was discovered in Listary through 6. An attacker can create a \\.\pipe\Listary.listaryService named pipe and wait for a privileged user to open a session on the Listary installed host. Listary will automatically access the named pipe and the attacker will be able to duplicate the victim's token to impersonate him. This exploit is valid in certain Windows versions (Microsoft has patched the issue in later Windows 10 builds).
CVE-2021-41063 1 Xylem 1 Aanderaa Geoview 2024-11-21 9.8 Critical
SQL injection vulnerability was discovered in Aanderaa GeoView Webservice prior to version 2.1.3 that could allow an unauthenticated attackers to execute arbitrary commands.
CVE-2021-41061 1 Riot-os 1 Riot 2024-11-21 5.5 Medium
In RIOT-OS 2021.01, nonce reuse in 802.15.4 encryption in the ieee820154_security component allows attackers to break encryption by triggering reboots.
CVE-2021-41057 3 Microsoft, Siemens, Wibu 11 Windows, Pss Cape, Pss E and 8 more 2024-11-21 7.1 High
In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.
CVE-2021-41055 1 Gajim 1 Gajim 2024-11-21 7.5 High
Gajim 1.2.x and 1.3.x before 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted XMPP Last Message Correction (XEP-0308) message in multi-user chat, where the message ID equals the correction ID.
CVE-2021-41054 2 Atftp Project, Debian 2 Atftp, Debian Linux 2024-11-21 7.5 High
tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options.
CVE-2021-41043 2 Redhat, Tcpdump 3 Enterprise Linux, Rhel Eus, Tcpslice 2024-11-21 5.5 Medium
Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.
CVE-2021-41042 1 Eclipse 1 Lyo 2024-11-21 5.3 Medium
In Eclipse Lyo versions 1.0.0 to 4.1.0, a TransformerFactory is initialized with the defaults that do not restrict DTD loading when working with RDF/XML. This allows an attacker to cause an external DTD to be retrieved.
CVE-2021-41041 3 Eclipse, Oracle, Redhat 4 Openj9, Java Se, Enterprise Linux and 1 more 2024-11-21 5.3 Medium
In Eclipse Openj9 before version 0.32.0, Java 8 & 11 fail to throw the exception captured during bytecode verification when verification is triggered by a MethodHandle invocation, allowing unverified methods to be invoked using MethodHandles.
CVE-2021-41040 1 Eclipse 1 Wakaama 2024-11-21 7.5 High
In Eclipse Wakaama, ever since its inception until 2021-01-14, the CoAP parsing code does not properly sanitize network-received data.
CVE-2021-41039 1 Eclipse 1 Mosquitto 2024-11-21 7.5 High
In versions 1.6 to 2.0.11 of Eclipse Mosquitto, an MQTT v5 client connecting with a large number of user-property properties could cause excessive CPU usage, leading to a loss of performance and possible denial of service.
CVE-2021-41038 1 Eclipse 1 Theia 2024-11-21 6.1 Medium
In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().
CVE-2021-41037 1 Eclipse 1 Equinox P2 2024-11-21 10 Critical
In Eclipse p2, installable units are able to alter the Eclipse Platform installation and the local machine via touchpoints during installation. Those touchpoints can, for example, alter the command-line used to start the application, injecting things like agent or other settings that usually require particular attention in term of security. Although p2 has built-in strategies to ensure artifacts are signed and then to help establish trust, there is no such strategy for the metadata part that does configure such touchpoints. As a result, it's possible to install a unit that will run malicious code during installation without user receiving any warning about this installation step being risky when coming from untrusted source.
CVE-2021-41036 1 Eclipse 1 Paho Mqtt C\/c\+\+ Client 2024-11-21 9.8 Critical
In versions prior to 1.1 of the Eclipse Paho MQTT C Client, the client does not check rem_len size in readpacket.
CVE-2021-41035 2 Eclipse, Redhat 3 Openj9, Enterprise Linux, Rhel Extras 2024-11-21 9.8 Critical
In Eclipse Openj9 before version 0.29.0, the JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods.
CVE-2021-41034 1 Eclipse 1 Che 2024-11-21 8.1 High
The build of some language stacks of Eclipse Che version 6 includes pulling some binaries from an unsecured HTTP endpoint. As a consequence the builds of such stacks are vulnerable to MITM attacks that allow the replacement of the original binaries with arbitrary ones. The stacks involved are Java 8 (alpine and centos), Android and PHP. The vulnerability is not exploitable at runtime but only when building Che.
CVE-2021-41033 1 Eclipse 1 Equinox 2024-11-21 8.1 High
In all released versions of Eclipse Equinox, at least until version 4.21 (September 2021), installation can be vulnerable to man-in-the-middle attack if using p2 repos that are HTTP; that can then be exploited to serve incorrect p2 metadata and entirely alter the local installation, particularly by installing plug-ins that may then run malicious code.
CVE-2021-41032 1 Fortinet 1 Fortios 2024-11-21 6.3 Medium
An improper access control vulnerability [CWE-284] in FortiOS versions 6.4.8 and prior and 7.0.3 and prior may allow an authenticated attacker with a restricted user profile to gather sensitive information and modify the SSL-VPN tunnel status of other VDOMs using specific CLI commands.