CVE-2021-37712
Summary: The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary...
Summary: The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary...
Summary: The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary...
Summary: The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10, and 6.1.9 has an arbitrary file creation/overwrite and arbitrary...
Summary: In Ericsson Network Location before 2021-07-31, it is possible for an authenticated attacker to inject commands via file_name in...
Summary: A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All...
Summary: A vulnerability has been identified in SENTRON powermanager V3 (All versions). The affected application assigns improper access rights to...
Summary: A potential security vulnerability has been identified for certain HP printers and MFPs with Troy solutions. For affected printers...
Summary: A vulnerability has been identified in Nucleus NET (All versions < V5.2), Nucleus RTOS (versions including affected DNS modules),...
Summary: A vulnerability has been identified in Nucleus 4 (All versions < V4.1.0), Nucleus NET (All versions), Nucleus ReadyStart (All...
Summary: The Similar Posts WordPress plugin through 3.1.5 allow high privilege users to execute arbitrary PHP code in an hardened...
Summary: The School Management System – WPSchoolPress WordPress plugin before 2.1.10 does not properly sanitize or use prepared statements before...
Summary: The Header Footer Code Manager WordPress plugin before 1.1.14 does not validate and escape the "orderby" and "order" request...
Summary: Directory traversal vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 allows remote attackers to read arbitrary files via...
Summary: Directory traversal vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 allows remote attackers to read arbitrary files via...
Summary: Windows Desktop Bridge Elevation of Privilege Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36957 CVSS Score (if available) v2: / MEDIUM v3:...
Summary: CVE-2021-42292 is a security feature bypass vulnerability impacting multiple versions of Microsoft Excel. A proof of concept (PoC) was...
Summary: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseBinCount` is vulnerable to...
Summary: TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for `tf.ragged.cross` can...
Summary: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `SparseFillEmptyRows` can be made...
Summary: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `FusedBatchNorm` kernels is vulnerable...
Summary: TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behavior, integer...
Summary: CVE-2015-3636 is a use after free vulnerability impacting Linux kernel before versions 4.0.3. An exploit was observed in open...
Summary: CVE-2015-1805 is an unspecified vulnerability impacting Linux kernel before versions 3.16. An exploit was observed in open source and...
Summary: CVE-2020-0041 is an out-of-bounds write vulnerability impacting Google Android. An exploit was observed in open source and subsequently shared...