2b45 / vuln-list

0 stars 0 forks source link

【2022-01-07 09:13:57.450530】抓取 1 天内的NVD数据 #14

Open 0x210 opened 2 years ago

0x210 commented 2 years ago
CVE 描述 更新时间
[CVE-2021-25743](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-25743
) kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events. 2022-01-07 00:15:07+00:00
[CVE-2022-21662](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21662
) WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Low-privileged authenticated users (like author) in WordPress core are able to execute JavaScript/perform stored XSS attack, which can affect high-privileged users. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue. 2022-01-06 23:15:08+00:00
[CVE-2022-21663](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21663
) WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. On a multisite, users with Super Admin role can bypass explicit/additional hardening under certain conditions through object injection. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue. 2022-01-06 23:15:08+00:00
[CVE-2022-21664](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21664
) WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to lack of proper sanitization in one of the classes, there's potential for unintended SQL queries to be executed. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 4.1.34. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this issue. 2022-01-06 23:15:08+00:00
[CVE-2022-21661](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-21661
) WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability. 2022-01-06 23:15:07+00:00
[CVE-2021-42841](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-42841
) Insta HMS before 12.4.10 is vulnerable to XSS because of improper validation of user-supplied input by multiple scripts. A remote attacker could exploit this vulnerability via a crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. 2022-01-06 21:15:08+00:00
[CVE-2021-46043](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46043
) A Pointer Dereference Vulnerability exits in GPAC 1.0.1 in the gf_list_count function, which causes a Denial of Service. 2022-01-06 21:15:08+00:00
[CVE-2021-46044](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46044
) A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1via ShiftMetaOffset.isra, which causes a Denial of Service (context-dependent). 2022-01-06 21:15:08+00:00
[CVE-2021-46039](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46039
) A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1 via the shift_chunk_offsets.part function, which causes a Denial of Service (context-dependent). 2022-01-06 20:15:08+00:00
[CVE-2021-46040](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46040
) A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1 via the finplace_shift_moov_meta_offsets function, which causes a Denial of Servie (context-dependent). 2022-01-06 20:15:08+00:00
[CVE-2021-46041](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46041
) A Segmentation Fault Vulnerability exists in GPAC 1.0.1 via the co64_box_new function, which causes a Denial of Service. 2022-01-06 20:15:08+00:00
[CVE-2021-46042](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46042
) A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the _fseeko function, which causes a Denial of Service. 2022-01-06 20:15:08+00:00
[CVE-2021-28714](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28714
) Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714) 2022-01-06 18:15:07+00:00
[CVE-2021-28715](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-28715
) Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714) 2022-01-06 18:15:07+00:00
[CVE-2021-4194](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4194
) bookstack is vulnerable to Improper Access Control 2022-01-06 18:15:07+00:00
[CVE-2021-43045](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43045
) A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue. 2022-01-06 18:15:07+00:00
[CVE-2022-0128](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0128
) vim is vulnerable to Out-of-bounds Read 2022-01-06 17:15:07+00:00
[CVE-2021-46078](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46078
) An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to a Stored Cross-Site Scripting vulnerability. 2022-01-06 16:15:09+00:00
[CVE-2021-46079](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46079
) An Unrestricted File Upload vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. A remote attacker can upload malicious files leading to Html Injection. 2022-01-06 16:15:09+00:00
[CVE-2021-45744](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45744
) A Stored Cross Site Scripting (XSS) vulnerability exists in bludit 3.13.1 via the TAGS section in login panel. 2022-01-06 16:15:08+00:00
[CVE-2021-45745](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45745
) A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel. 2022-01-06 16:15:08+00:00
[CVE-2021-46067](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46067
) In Vehicle Service Management System 1.0 an attacker can steal the cookies leading to Full Account Takeover. 2022-01-06 16:15:08+00:00
[CVE-2021-46068](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46068
) A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel. 2022-01-06 16:15:08+00:00
[CVE-2021-46069](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46069
) A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel. 2022-01-06 16:15:08+00:00
[CVE-2021-46070](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46070
) A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service Requests Section in login panel. 2022-01-06 16:15:08+00:00
[CVE-2021-46071](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46071
) A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel. 2022-01-06 16:15:08+00:00
[CVE-2021-46072](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46072
) A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel. 2022-01-06 16:15:08+00:00
[CVE-2021-46073](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46073
) A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel. 2022-01-06 16:15:08+00:00
[CVE-2021-46074](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46074
) A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Settings Section in login panel. 2022-01-06 16:15:08+00:00
[CVE-2021-46075](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46075
) A Privilege Escalation vulnerability exists in Sourcecodester Vehicle Service Management System 1.0. Staff account users can access the admin resources and perform CRUD Operations. 2022-01-06 16:15:08+00:00
[CVE-2021-46076](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46076
) Sourcecodester Vehicle Service Management System 1.0 is vulnerable to File upload. An attacker can upload a malicious php file in multiple endpoints it leading to Code Execution. 2022-01-06 15:15:08+00:00
[CVE-2021-46080](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-46080
) A Cross Site Request Forgery (CSRF) vulnerability exists in Vehicle Service Management System 1.0. An successful CSRF attacks leads to Stored Cross Site Scripting Vulnerability. 2022-01-06 15:15:08+00:00
[CVE-2021-44590](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44590
) In libming 0.4.8, a memory exhaustion vulnerability exist in the function cws2fws in util/main.c. Remote attackers could launch denial of service attacks by submitting a crafted SWF file that exploits this vulnerability. 2022-01-06 14:15:07+00:00
[CVE-2021-44591](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44591
) In libming 0.4.8, the parseSWF_DEFINELOSSLESS2 function in util/parser.c lacks a boundary check that would lead to denial-of-service attacks via a crafted SWF file. 2022-01-06 14:15:07+00:00
[CVE-2021-31522](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31522
) Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions. 2022-01-06 13:15:08+00:00
[CVE-2021-36774](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36774
) Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions. 2022-01-06 13:15:08+00:00
[CVE-2021-44584](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44584
) Cross-site scripting (XSS) vulnerability in index.php in emlog version <= pro-1.0.7 allows remote attackers to inject arbitrary web script or HTML via the s parameter. 2022-01-06 13:15:08+00:00
[CVE-2021-44878](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44878
) Pac4j v5.1 and earlier allows (by default) clients to accept and successfully validate ID Tokens with "none" algorithm (i.e., tokens with no signature) which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require any signature verification when validating the ID tokens, which allows the attacker to bypass the token validation by injecting a malformed ID token using "none" as the value of "alg" key in the header with an empty signature value. 2022-01-06 13:15:08+00:00
[CVE-2021-45456](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45456
) Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0. 2022-01-06 13:15:08+00:00
[CVE-2021-45457](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45457
) In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions. 2022-01-06 13:15:08+00:00
[CVE-2021-45458](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45458
) Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions. 2022-01-06 13:15:08+00:00
[CVE-2021-27738](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-27738
) All request mappings in StreamingCoordinatorController.java handling /kylin/api/streaming_coordinator/* REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2. 2022-01-06 13:15:07+00:00
[CVE-2021-44351](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44351
) An arbitrary file read vulnerability exists in NavigateCMS 2.9 via /navigate/navigate_download.php id parameter. 2022-01-06 12:15:08+00:00
[CVE-2021-44564](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44564
) A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products). 2022-01-06 12:15:08+00:00
[CVE-2021-36737](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36737
) The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact 2022-01-06 09:15:07+00:00
[CVE-2021-36738](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36738
) The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact 2022-01-06 09:15:07+00:00
[CVE-2021-36739](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36739
) The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks. 2022-01-06 09:15:07+00:00