|
196361
|
4.9 |
MEDIUM
Network
|
intel
|
secl-dc
|
Missing release of resource after effective lifetime in an API for the Intel(R) Security Library before version 3.3 may allow a privileged user to potentially enable denial of service via network acc…
|
CWE-772
Missing Release of Resource after Effective Lifetime
|
CVE-2021-0132
|
2024-11-21 14:42 |
2021-06-10 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196362
|
6.5 |
MEDIUM
Network
|
intel
|
secl-dc
|
Use of cryptographically weak pseudo-random number generator (PRNG) in an API for the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable information di…
|
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
|
CVE-2021-0131
|
2024-11-21 14:42 |
2021-06-10 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196363
|
5.7 |
MEDIUM
Adjacent
|
bluez redhat debian
|
bluez enterprise_linux debian_linux
|
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
|
NVD-CWE-Other
|
CVE-2021-0129
|
2024-11-21 14:42 |
2021-06-10 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196364
|
9.8 |
CRITICAL
Network
|
juniper
|
junos
|
The use of multiple hard-coded cryptographic keys in cSRX Series software in Juniper Networks Junos OS allows an attacker to take control of any instance of a cSRX deployment through device managemen…
|
CWE-798
Use of Hard-coded Credentials
|
CVE-2021-0266
|
2024-11-21 14:42 |
2021-04-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196365
|
8.1 |
HIGH
Network
|
juniper
|
appformix
|
An unvalidated REST API in the AppFormix Agent of Juniper Networks AppFormix allows an unauthenticated remote attacker to execute commands as root on the host running the AppFormix Agent, when certai…
|
CWE-78
OS Command
|
CVE-2021-0265
|
2024-11-21 14:42 |
2021-04-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196366
|
10.0 |
CRITICAL
Network
|
juniper
|
junos
|
This issue is not applicable to NFX NextGen Software. On NFX Series devices the use of Hard-coded Credentials in Juniper Networks Junos OS allows an attacker to take over any instance of an NFX deplo…
|
CWE-798
Use of Hard-coded Credentials
|
CVE-2021-0248
|
2024-11-21 14:42 |
2021-04-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196367
|
7.5 |
HIGH
Network
|
juniper
|
junos
|
A vulnerability in Juniper Networks Junos OS ACX500 Series, ACX4000 Series, may allow an attacker to cause a Denial of Service (DoS) by sending a high rate of specific packets to the device, resultin…
|
NVD-CWE-noinfo
|
CVE-2021-0233
|
2024-11-21 14:42 |
2021-04-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196368
|
6.5 |
MEDIUM
Network
|
juniper
|
junos
|
A path traversal vulnerability in the Juniper Networks SRX and vSRX Series may allow an authenticated J-web user to read sensitive system files. This issue affects Juniper Networks Junos OS on SRX an…
|
CWE-22
Path Traversal
|
CVE-2021-0231
|
2024-11-21 14:42 |
2021-04-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196369
|
8.8 |
HIGH
Network
|
juniper
|
junos
|
A Cross-site Scripting (XSS) vulnerability in J-Web on Juniper Networks Junos OS allows an attacker to target another user's session thereby gaining access to the users session. The other user sessio…
|
CWE-79
Cross-site Scripting
|
CVE-2021-0275
|
2024-11-21 14:42 |
2021-04-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
196370
|
5.3 |
MEDIUM
Network
|
juniper
|
junos junos_os_evolved
|
An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices w…
|
CWE-670 CWE-835
Always-Incorrect Control Flow Implementation Loop with Unreachable Exit Condition ('Infinite Loop')
|
CVE-2021-0273
|
2024-11-21 14:42 |
2021-04-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|