|
Security Vulnerabilities Published
In November 2021
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1501 |
CVE-2019-8921 |
345 |
|
|
2021-11-29 |
2021-12-15 |
3.3 |
None |
Local Network |
Low |
Not required |
Partial |
None |
None |
An issue was discovered in bluetoothd in BlueZ through 5.48. The vulnerability lies in the handling of a SVC_ATTR_REQ by the SDP implementation. By crafting a malicious CSTATE, it is possible to trick the server into returning more bytes than the buffer actually holds, resulting in leaking arbitrary heap data. The root cause can be found in the function service_attr_req of sdpd-request.c. The server does not check whether the CSTATE data is the same in consecutive requests, and instead simply trusts that it is the same. |
1502 |
CVE-2019-5640 |
200 |
|
+Info |
2021-11-22 |
2021-11-23 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Rapid7 Nexpose versions prior to 6.6.114 suffer from an information exposure issue whereby, when the user's session has ended due to inactivity, an attacker can use the inspect element browser feature to remove the login panel and view the details available in the last webpage visited by previous user |
1503 |
CVE-2018-25019 |
434 |
|
|
2021-11-01 |
2021-11-03 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
The LearnDash LMS WordPress plugin before 2.5.4 does not have any authorisation and validation of the file to be uploaded in the learndash_assignment_process_init() function, which could allow unauthenticated users to upload arbitrary files to the web server |
1504 |
CVE-2018-6125 |
|
|
+Info |
2021-11-02 |
2021-11-04 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
Insufficient policy enforcement in USB in Google Chrome on Windows prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. |
1505 |
CVE-2018-6122 |
843 |
|
|
2021-11-02 |
2021-11-04 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
Type confusion in WebAssembly in Google Chrome prior to 66.0.3359.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
1506 |
CVE-2017-20008 |
79 |
|
XSS |
2021-11-29 |
2021-11-29 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
The myCred WordPress plugin before 1.7.8 does not sanitise and escape the user parameter before outputting it back in the Points Log admin dashboard, leading to a Reflected Cross-Site Scripting |
1507 |
CVE-2017-5123 |
20 |
|
|
2021-11-02 |
2022-04-18 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux. |
1508 |
CVE-2015-20067 |
862 |
|
|
2021-11-01 |
2021-11-03 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The WP Attachment Export WordPress plugin before 0.2.4 does not have proper access controls, allowing unauthenticated users to download the XML data that holds all the details of attachments/posts on a Wordpress |
1509 |
CVE-2015-20019 |
79 |
|
XSS |
2021-11-01 |
2021-11-02 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
The Content text slider on post WordPress plugin before 6.9 does not sanitise and escape the Title and Message/Content settings, which could lead to Cross-Site Scripting issues |
1510 |
CVE-2015-10001 |
352 |
|
XSS CSRF |
2021-11-01 |
2021-11-03 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
The WP-Stats WordPress plugin before 2.52 does not have CSRF check when saving its settings, and did not escape some of them when outputting them, allowing attacker to make logged in high privilege users change them and set Cross-Site Scripting payloads |
1511 |
CVE-2002-20001 |
400 |
|
|
2021-11-11 |
2021-11-16 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE. |
|
|
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is
MITRE's CVE web site.
CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is
MITRE's CWE web site.
OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is
MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition.
There are NO warranties, implied or otherwise, with regard to this information or its use.
Any use of this information is at the user's risk.
It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.
EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site.
ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT,
INDIRECT or any other kind of loss.