Selection:
XSS CSRF Privilege Buffer Remote Stack
CVE ID Name Status References
CVE-2021-3604

Secure 8 (Evalos) does not validate user input data correctly, allowing a remote attacker to perform a Blind SQL Injection. An attacker could exploit this vulnerability in order to extract information of users and administrator accounts stored in the database.

Assigned (20210615)

CONFIRM:http://titaniumaics.blogspot.com/2021/06/vulnerabilidad-zero-day-en-primion.html | URL:http://titaniumaics.blogspot.com/2021/06/vulnerabilidad-zero-day-en-primion.html | CONFIRM:https://www.incibe-cert.es/en/early-warning/ics-advisories/primion-digitek-secure-8-sql-injection-vulnerability | URL:https://www.incibe-cert.es/en/early-warning/ics-advisories/primion-digitek-secure-8-sql-injection-vulnerability

CVE-2021-3603

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

Assigned (20210615)

CONFIRM:https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/ | URL:https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/ | MISC:https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3 | URL:https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3

CVE-2021-3595

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.

Assigned (20210610)

MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1970489 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1970489

CVE-2021-3594

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.

Assigned (20210610)

MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1970491 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1970491

CVE-2021-3593

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.

Assigned (20210610)

MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1970487 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1970487

CVE-2021-3592

An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.

Assigned (20210610)

MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1970484 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1970484

CVE-2021-3588

The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.

Assigned (20210608)

MISC:https://github.com/bluez/bluez/issues/70 | URL:https://github.com/bluez/bluez/issues/70

CVE-2021-3569

A stack corruption bug was found in libtpms in versions before 0.7.2 and before 0.8.0 while decrypting data using RSA. This flaw could result in a SIGBUS (bad memory access) and termination of swtpm. The highest threat from this vulnerability is to system availability.

Assigned (20210528)

MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1964358 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1964358

CVE-2021-3565

A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.

Assigned (20210525)

MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1964427 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1964427

CVE-2021-3564

A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3.13.

Assigned (20210524)

MISC:https://bugzilla.redhat.com/show_bug.cgi?id=1964139 | URL:https://bugzilla.redhat.com/show_bug.cgi?id=1964139 | MISC:https://www.openwall.com/lists/oss-security/2021/05/25/1 | URL:https://www.openwall.com/lists/oss-security/2021/05/25/1 | MLIST:[oss-security] 20210525 CVE-2021-3564 Linux Bluetooth device initialization implementation bug | URL:http://www.openwall.com/lists/oss-security/2021/05/25/1 | MLIST:[oss-security] 20210601 Re: CVE-2021-3564 Linux Bluetooth device initialization implementation bug | URL:http://www.openwall.com/lists/oss-security/2021/06/01/2


Page created:

CVE year by year statistics.

CVE year statistics by common vulnerability domain.

Latest data from: 2021-06-21