Vulnerabilities (CVE)

Filtered by CWE-200
Total 9125 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-22272 2 Abb, Busch-jaeger 2 Mybuildings, Mybusch-jaeger 2024-11-21 9.0 HIGH 6.5 MEDIUM
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch
CVE-2021-22172 1 Gitlab 1 Gitlab 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
Improper authorization in GitLab 12.8+ allows a guest user in a private project to view tag data that should be inaccessible on the releases page
CVE-2021-22143 1 Elastic 1 Apm .net Agent 2024-11-21 N/A 2.1 LOW
The Elastic APM .NET Agent can leak sensitive HTTP header information when logging the details during an application error. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an application error it is possible the headers will not be sanitized before being sent.
CVE-2021-22137 1 Elastic 1 Elasticsearch 2024-11-21 4.3 MEDIUM 5.3 MEDIUM
In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.
CVE-2021-22135 1 Elastic 1 Elasticsearch 2024-11-21 4.3 MEDIUM 5.3 MEDIUM
Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view.
CVE-2021-22134 2 Elastic, Oracle 2 Elasticsearch, Communications Cloud Native Core Automated Test Suite 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view.
CVE-2021-22047 1 Vmware 1 Spring Data Rest 2024-11-21 4.3 MEDIUM 5.3 MEDIUM
In Spring Data REST versions 3.4.0 - 3.4.13, 3.5.0 - 3.5.5, and older unsupported versions, HTTP resources implemented by custom controllers using a configured base API path and a controller type-level request mapping are additionally exposed under URIs that can potentially be exposed for unauthorized access depending on the Spring Security configuration.
CVE-2021-22044 1 Vmware 1 Spring Cloud Openfeign 2024-11-21 5.0 MEDIUM 7.5 HIGH
In Spring Cloud OpenFeign 3.0.0 to 3.0.4, 2.2.0.RELEASE to 2.2.9.RELEASE, and older unsupported versions, applications using type-level `@RequestMapping`annotations over Feign client interfaces, can be involuntarily exposing endpoints corresponding to `@RequestMapping`-annotated interface methods.
CVE-2021-22036 1 Vmware 2 Vrealize Automation, Vrealize Orchestrator 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
VMware vRealize Orchestrator ((8.x prior to 8.6) contains an open redirect vulnerability due to improper path handling. A malicious actor may be able to redirect victim to an attacker controlled domain due to improper path handling in vRealize Orchestrator leading to sensitive information disclosure.
CVE-2021-22001 1 Cloudfoundry 2 Cf-deployment, User Account And Authentication 2024-11-21 5.0 MEDIUM 7.5 HIGH
In UAA versions prior to 75.3.0, sensitive information like relaying secret of the provider was revealed in response when deletion request of an identity provider( IdP) of type “oauth 1.0” was sent to UAA server.
CVE-2021-21823 1 Komoot 1 Komoot 2024-11-21 5.0 MEDIUM 7.5 HIGH
An information disclosure vulnerability exists in the Friend finder functionality of GmbH Komoot version 10.26.9 up to 11.1.11. A specially crafted series of network requests can lead to the disclosure of sensitive information.
CVE-2021-21817 1 Dlink 2 Dir-3040, Dir-3040 Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
An information disclosure vulnerability exists in the Zebra IP Routing Manager functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to the disclosure of sensitive information. An attacker can send a sequence of requests to trigger this vulnerability.
CVE-2021-21816 1 Dlink 2 Dir-3040, Dir-3040 Firmware 2024-11-21 4.3 MEDIUM 4.3 MEDIUM
An information disclosure vulnerability exists in the Syslog functionality of D-LINK DIR-3040 1.13B03. A specially crafted network request can lead to the disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability.
CVE-2021-21733 1 Zte 1 Zxcdn 2024-11-21 4.0 MEDIUM 4.9 MEDIUM
The management system of ZXCDN is impacted by the information leak vulnerability. Attackers can make further analysis according to the information returned by the program, and then obtain some sensitive information. This affects ZXCDN V7.01 all versions up to IAMV7.01.01.02.
CVE-2021-21621 1 Jenkins 1 Support Core 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Jenkins Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the "About user (basic authentication details only)" information, which can include the session ID of the user creating the support bundle in some configurations.
CVE-2021-21596 1 Dell 2 Openmanage Enterprise, Openmanage Enterprise-modular 2024-11-21 5.8 MEDIUM 9.6 CRITICAL
Dell OpenManage Enterprise versions 3.4 through 3.6.1 and Dell OpenManage Enterprise Modular versions 1.20.00 through 1.30.00, contain a remote code execution vulnerability. A malicious attacker with access to the immediate subnet may potentially exploit this vulnerability leading to information disclosure and a possible elevation of privileges.
CVE-2021-21591 1 Dell 3 Emc Unity Operating Environment, Emc Unity Xt Operating Environment, Emc Unityvsa Operating Environment 2024-11-21 4.6 MEDIUM 6.4 MEDIUM
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.1.0.0.5.394 contain a plain-text password storage vulnerability. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user.
CVE-2021-21590 1 Dell 3 Emc Unity Operating Environment, Emc Unity Xt Operating Environment, Emc Unityvsa Operating Environment 2024-11-21 4.6 MEDIUM 6.4 MEDIUM
Dell EMC Unity, Unity XT, and UnityVSA versions prior to 5.1.0.0.5.394 contain a plain-text password storage vulnerability. A local malicious user with high privileges may use the exposed password to gain access with the privileges of the compromised user.
CVE-2021-21587 1 Dell 1 Wyse Management Suite 2024-11-21 2.1 LOW 5.3 MEDIUM
Dell Wyse Management Suite versions 3.2 and earlier contain a full path disclosure vulnerability. A local unauthenticated attacker could exploit this vulnerability in order to obtain the path of files and folders.
CVE-2021-21584 1 Dell 2 Openmanage Enterprise, Openmanage Enterprise-modular 2024-11-21 4.0 MEDIUM 7.7 HIGH
Dell OpenManage Enterprise version 3.5 and OpenManage Enterprise-Modular version 1.30.00 contain an information disclosure vulnerability. An authenticated low privileged attacker may potentially exploit this vulnerability leading to disclosure of the OIDC server credentials.