Meet a recent Microsoft Learn Student Ambassador graduate: Tarun Nanduri

Meet a recent Microsoft Learn Student Ambassador graduate: Tarun Nanduri

This article is contributed. See the original author and article here.

Welcome to our series highlighting Microsoft Learn Student Ambassadors who achieved the Gold milestone and have recently graduated from their university. Each blog features a different student and highlight their accomplishments, their experience with the Student Ambassadors program, and what they’re up to now. 


 


Today we’d like to introduce Tarun Nanduri, who graduated a few months ago from Pragati Engineering College in Surampalem, India. 


 


Student_Developer_Team_0-1618239895515.png


 


Responses have been edited for clarity and length. 


 


Q: When you joined the program, did you have specific goals you wanted to reach, and did you achieve them? How has the program helped to prepare you for the next chapter in your life? 


 


One thing is confidence. The amount of positivity or confidence that this program brings into the academic culture is very high–it’s unimaginable, I would say. I was always a confident guy, but then Microsoft Learn Student Ambassadors gave me a platform to talk with more and more people and build that foundation higher. 


 


When I joined the program back in August 2017, the thing which excited me to join was to travel around India and also around the globe. To my fortune, I’ve traveled in my first year itself and also in my last year before graduating to Student Ambassador gatherings like the Gold Summit and the India Summit where I got to meet great program managers, and it was a whole lot of networking and a whole lot of idea sharing. 


 


The other thing which excited me is Microsoft Azure. In 2017 I was not even aware of what the cloud is, how cloud development works,, but Microsoft Azure gave us a brilliant start. Giving students a USD100 credit allowed us to explore more and more on the cloud, deploy apps, and scale them out. It helped me know how cloud works and everything. Microsoft Azure is one of my favorite cloud platforms–it is the best thing I have learned from this community. Because of this program, I would say did I learn more about cloud computing and Azure. 


 


Yes, it was a beautiful experience from 2017 to 2020. 


 


Q: In the program, what was the one accomplishment that you’re the proudest of and why?  


 


My very first event that I worked on as a Student Ambassador that I weill forever cherish was an interactive event, an hour of code in our college. 11 Student Ambassadors connected and made hour of code possible for more than 700 plus students at one time. 


 


I’ve done multiple events, but one of my favorite events which I’m proud of is an Application Development workshop series. It’s a week or more with 80+ students each and every day coming in and out. Everything from A to Z, from organization to giving the certificates, it’s on me, including the talks. That was my greatest experience–sharing my knowledge and empowering juniors to learn more about Microsoft technologies and also technology as a whole. And letting them build their own on their own, letting their ideas materialize.  


 


Q: So what have you been doing or what are you working on? What have you been up to since graduation? 


 


I’m working as a software engineer at NCR Corporation.  It’s been a good journey so far, and I hope I reach more and more heights. I believe in learning wherever we go. Go wherever, but never stop learning, that’s it. I’m enjoying my job at this moment, but my dream job would be to be like a CEO, like Sundar Pichai or Satya Nadella. 


 


Q: If you could redo things, is there anything you would have done differently while in the program?  


 


Not the whole term, but 2018 to 2019. I was quite passive then, so I didn’t do many events or didn’t participate or be active in the community. So I would like to redo that because the contributions I’ve made before and after gave me an opportunity to become a Gold Ambassador, so if I were the same way in 2018 and 2019, I would have reached many more heights. 


 


Q: If you were to describe the Student Ambassadors program to a student who is considering joining, what would you say to them? 


 


I would like to showcase myself as a real example of how the program transformed me from a college student who just passed +2 (editor’s note: the 2 year bridge between 10 years of primary/secondary schooling and undergraduate college) and became a graduate or a technology graduate. The amount of positivity that this brings into one’s academic career is unimaginable, so if you would like to make an impact, this is the right place for you. 


 


Q: What advice would you give to new Student Ambassadors? 


 


Talk with folks. Don’t be a single person doing all the things. Get some regional Student Ambassadors around you. Talk with them and do some community events together.  Even though you’re knowledgeable, doing community events gives you fun and also gives you great experiences. That network matters a lot. You will enjoy the benefits once you graduate from the university. 


 


Q: Do you have a motto, a guiding principle that drives you in life? 


 


There are multiple things I believe in: 



  • Never stop learning. 

  • Sharing is learning, so learn as you share and share as you learn. 

  • The more you know, the more you realize you don’t know. That played a good role in my development as a software engineer.


Good luck to you, Tarun, in your journey! 


 


 


 

Service Fabric Community Q&A call 53

This article is contributed. See the original author and article here.

Starting in August 2020, we introduced a new framework for our monthly community sessions. In addition to our normal Q&A in each community call we will focus on topics related to various components of the Service Fabric platform, provide updates to roadmap, upcoming releases, and showcase solutions developed by our customers that benefit the community.


 


Agenda:



Join us to learn more about one of the highly desired feature   last week, how it works, and ask us any questions related to Service Fabric etc. This month’s Q&A features one session on:



As usual, there is no need to RSVP – just navigate to the link to the call and you are in. 


We have posted recordings of all our past Service Fabric Community call  here.

Introducing Multivariate Anomaly Detection

Introducing Multivariate Anomaly Detection

This article is contributed. See the original author and article here.

Microsoft partners and customers have been building metrics monitoring solutions for AIOps and predictive maintenance, by leveraging the easy-to-use time-series anomaly detection Cognitive Service: Anomaly Detector. Because of its ability to analyze time-series individually, Anomaly Detector is benefiting the industry with its simplicity and scalability.


 


What’s new


We are pleased to announce the new multi-variate capability of Anomaly Detector. The new multivariate anomaly detection APIs in Anomaly Detector further enable developers to easily integrate advanced AI of detecting anomalies from groups of metrics into their applications without the need for machine learning knowledge or labeled data. Dependencies and inter-correlations between different signals are now counted as key factors. The new feature protects your mission-critical systems and physical assets, such as software applications, servers, factory machines, spacecraft, or even your business, from failures with a holistic view.


Imagine 20 sensors from an auto engine generating 20 different signals, e.g., vibration, temperature, etc. The readings of those signals individually may not tell you much on system-level issues, but together, could represent the health of the engine. When the synergy of those signals turns odd, the multivariate anomaly detection feature can sense the anomaly like a seasoned floor expert. Moreover, the AI models are trained and customized for your data such that it understands your business. With the new APIs in Anomaly Detector, developers can now easily integrate the multivariate time-series anomaly detection capabilities as well as the interpretability of the anomalies into predictive maintenance solutions, or AIOps monitoring solutions for complex enterprise software, or business intelligence tools.


 


Customer love


Siemens.png


“Medical device production demands unprecedented precision. For this reason, the Siemens Healthineers team uses Multivariate Anomaly Detector (MVAD) in medical device stress tests during the final inspection in the production. We found MVAD easy to use and work almost out of the box with promising performance. With the ready-to-use model, we don’t need to develop a custom AD model, which ensures a short time to market. We plan to expand this technology also to other use cases. It is made easy due to good integration into our ML platform and processes.” – Dr. Jens Fürst, Head Digitalization and Automation at Siemens Healthineers


Airbus.jpg


To better understand the health and condition of the aircraft and foresee and fix potential problems before they occur, Airbus deployed Anomaly Detector, part of Cognitive Services, to gather and analyze the telemetry data. It began as a proof of concept of the aircraft-monitoring application by loading telemetry data from multiple flights for analysis and model training. “Early tests have shown that for many cases, the out-of-the-box solution works beautifully, which helps us deploy our solutions faster. I would say that we save up to three months on development for our smaller use cases with Anomaly Detector.”
Marcel Rummens: Product Owner of Internal AI Platform, Airbus


 


AI horsepower


Time-series anomaly detection is an important research topic in data mining and has a wide range of applications in the industry. Efficient and accurate anomaly detection helps companies to monitor their key metrics continuously and alert for potential incidents on time. In many real-world applications like predictive maintenance and SpaceOps, multiple time-series metrics are collected to reflect the health status of a system. Univariate time-series anomaly detection algorithms can find anomalies for a single metric. However, it could be problematic in deciding whether the whole system is running normally. For example, sudden changes of a certain metric do not necessarily mean failures of the system. As shown in Figure 1, there are obvious boosts in the volume of TIMESERIES RECEIVED and DATA RECEIVED ON FLINK in the green segment, but the system is still in a healthy state as these two features share a consistent tendency. However, in the red segment, GC shows an inconsistent pattern with other metrics, indicating a problem in garbage collection. Consequently, it is essential to take the correlations between different time series into consideration in a multivariate time-series anomaly detection system.Fig.1Fig.1


 


 


 


In this newly introduced feature, we productized a novel framework — MTAD-GAT (Multivariate Time-series Anomaly Detection via Graph Attention Network), to tackle the limitations of previous solutions. Our method considers each univariate time-series as an individual feature and tries to model the correlations between different features explicitly, while the temporal dependencies within each time-series are modeled at the same time. The key ingredients in our model are two graph attention layers, namely the feature-oriented graph attention layer and the time-oriented graph attention layer. The feature-oriented graph attention layer captures the causal relationships between multiple features, and the time-oriented graph attention layer underlines the dependencies along the temporal dimension. In addition, we jointly train a forecasting-based model and a reconstruction-based model for better representations of time-series data. The two models can be optimized simultaneously by a joint objective function.


 


maga.png


The magic behind the scenes can be summarized as follows:



  • A novel framework to solve the multivariate time-series anomaly detection problem in a self-supervised manner. Our model shows superior performances on two public datasets and establishes state-of-the-art scores in the literature. 

  • For the first time, we leverage two parallel graph attention (GAT) layers to learn the relationships between different time-series and timestamps dynamically. Especially, our model captures the correlations between different time-series successfully without any prior knowledge.

  • We integrate the advantages of both forecasting-based and reconstruction-based models by introducing a joint optimization target. The forecasting-based model focuses on single-timestamp prediction, while the reconstruction-based model learns a latent representation of the entire time-series.

  • Our network has good interpretability. We analyze the attention scores of multiple time-series learned by the graph attention layers, and the results correspond reasonably well to human intuition. We also show its capability of anomaly diagnosis.


 


Multivariate anomaly detection API overview


This new feature has a different workflow compared with the existing univariate feature. There are two phases to obtain the detection results, the training phase, and the inference phase. In the training phase, you need to provide some historical data to let the model learn past patterns. Then in the inference phase, you can call the inference API to acquire detection results of multivariate time-series in a given range.






































APIs



Functionality



/multivariate/models



Create and train model using training data



/multivariate/models/{modelid}



Get model info including training status and parameters used in the model



multivariate/models[?$skip][&$top]



List models of a subscription



/multivariate/models/{modelid}/detect



Submit inference task with user’s data, this is async



/multivariate/results/{resultid}



Get anomalies + root causes (the contribution scores of each variate for each incident)



multivariate/models/{modelId}



Delete an existing multivariate model according to the modelId



multivariate/models/{modelId}/export



Export Multivariate Anomaly Detection Model as Zip file



 


Get started!



 

Why you should celebrate your Microsoft skills and certifications

Why you should celebrate your Microsoft skills and certifications

This article is contributed. See the original author and article here.

Earning new Microsoft Certifications and skills takes dedication; from completing courses and studying for the big day to finally passing the certification exam or putting new skills to work on the job, you deserve to celebrate your achievements.


 


Giving yourself a pat on the back and making sure others know you’ve put in all that effort not only feels good, it also empowers you to transform those additional tools into real benefits for your career. It ensures your professional network understands that you’re committed, hard-working, and talented enough to attain your career goals.


 


Letting peers know about your new skills and certifications can also increase your chances of getting ahead. Take LinkedIn for instance: Members listing at least five skills on their profiles are messaged up to 27 times more than those who don’t.1


 


As Daniel Christian, a Microsoft MVP and certified trainer says, “When you earn certifications, in addition to the positive feeling you get, you can also put your badges on LinkedIn and your resume. It’s a simple action that can give you the edge you need to set yourself apart from other candidates – to prove that you’ve got something extra.”


 


Not only can you prove it, but you can also turn new knowledge and ability into added income. About 35% of technical professionals say getting certified led to salary or wage increases, and 26% report job promotions.2 Gaining skills can also move your career forward; 87% of recruiters consider skills to be a critical factor when it comes to vetting candidates.3 These advantages come when your managers and others realize you have the capabilities and dedication to continuously learn.


 


Professional development also creates a measurable boost in confidence. IDC found that IT professionals who were certified were consistently more likely to believe they could learn difficult skills, with 91% of certified IT professionals believing that the effort employees put into acquiring new skills strongly contributes to their success.4


 


Wear your badge proudly


The first step to letting peers know about your achievement, as soon as you pass an exam or earn a certification, is through claiming a digital badge. Microsoft partners with Credly to award badges for certification achievements.


 


Digital badges give you authenticated digital representations of your achievements including an easily-recognized badge image and metadata uniquely linked to you and your achievement. Anyone looking at your information instantly sees your skills aligned to the certification and can verify the badge’s authenticity. You can share your digital badge on popular online sites, such as LinkedIn, Facebook, and Twitter, and embed it into your resume, personal website, or email signature. It’s an easy and objective way to prove you have what it takes to advance in your career.


 


CelebrateCerts_DanielChristian.png


 


One more tip to honor your achievements: keep them up to date. Don’t forget to periodically renew your certifications and update your skills. You can find a wealth of resources to refresh them on Microsoft Learn.


 


Related posts:



 


1LinkedIn, “What You Need to Know To Get Hired This Month: September 2020” 


2Microsoft, “10 reasons to earn a Microsoft certification,” 2020


3LinkedIn, “To Find Your Next Job More Quickly, Tell Your Community You’re Open to Work,” October 2020


4IDC white paper, sponsored by Microsoft, “Business Value of Digital Transformation and the Contribution of a Growth Mindset in IT,” May 2020.

Introduction to tokens

Introduction to tokens

This article is contributed. See the original author and article here.

Introduction


 



This article is written to explain OAuth 2.0 and OpenID Connect bearer tokens (JWT) and concepts relating to Microsoft Azure AD and related technologies, but can most likely be applied elsewhere too.



Tokens are everywhere on the Internet. Even if you don’t realise it, you may have just used one on the way to read this article! You may ask “What is a token and what do I need it for?” and my answer would be “Which token?”. You see, there are different types of tokens all with their use cases.


This article is here to break down the different types, how and when they are used and what a token is comprised of. Hopefully this article will help you better understand tokens and apply this to getting started with other technologies such as Microsoft Graph.


 


What is a token?


A token is a list claims of something. A real world analogy could be a receipt from a purchase of goods you made. Let’s say you needed to prove that you bought to goods to return something. The receipt would most likely contain the date of purchase, the price you paid and most importantly, the goods purchased. Essentially, you are making a claim of ownership using the receipt. A token works in a similar way – it is a way to claim “I am me” or “I am allowed to do this”.


 


Token types


As explained in the introduction, there are many different types of tokens. This article will concentrate on the 3 most commonly used tokens in Azure AD:


 


ID tokens


ID tokens are used by a client to provide a user’s identity. This is referred to as authentication. One example is a user entering their credentials in to a client and being given an ID token on sign-in success. By then having an ID token, the client then can access resources as the signed-in user without prompting the user.


 



Important Note: ID tokens should only be used for identity purposes and NOT be used to grant access to additional resources. This will be covered next



Access tokens


Access tokens are used by a client to obtain access to additional resources e.g. a protected API such as Microsoft Graph. This is referred to as authorization. With an access token, you can have a list of permissions (scopes) granted to you against a resource. You can then use these permissions in the access token to access protected resources that you would not be able to access with an ID token.


If you are still confused of the difference between authentication and authorization, @LuiseFreese sums it up perfectly:


 


01ed60e47ba84e66b302a6ef0e9035d2.png


 




The term “auth token” is widely used can become misleading as it could be interpreted as an authentication (ID) or authorization (access) token. It is important to distinguish the difference between the two and try to avoid using the term “auth token”.



Refresh tokens


Refresh tokens can be issued with ID and access tokens. Tokens have a fixed lifetime and expire, but with a refresh token a client can obtain a token without prompting the user for input. A basic example could be you are signed in to a client and it is using an access token with Microsoft Graph. On expiry of the access token, instead of interrupting the user, a new access token is silently obtained before the old access token expires using the refresh token from the original access token.


 


What makes up a token?


Let’s look at a sample token:


 


 


 

eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6IjFMVE16YWtpaGlSbGFfOHoyQkVKVlhlV01xbyJ9.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.1AFWW-Ck5nROwSlltm7GzZvDwUkqvhSQpm55TQsmVo9Y59cLhRXpvB8n-55HCr9Z6G_31_UbeUkoz612I2j_Sm9FFShSDDjoaLQr54CreGIJvjtmS3EkK9a7SJBbcpL1MpUtlfygow39tFjY7EVNW9plWUvRrTgVk7lYLprvfzw-CIqw3gHC-T7IK_m_xkr08INERBtaecwhTeN4chPC4W3jdmw_lIxzC48YoQ0dB1L9-ImX98Egypfrlbm0IBL5spFzL6JDZIRRJOu8vecJvj1mq-IUhGt0MacxX8jdxYLP-KUu2d9MbNKpCKJuZ7p8gwTL5B7NlUdh_dmSviPWrw

 


 


 


Makes sense, right? Of course not. All Azure AD tokens are also referred to as “JWTs” or JSON Web Tokens. This means that the token is formatted as a JSON object and then “base64Url” encoded and signed and with a bit of extra security (we’ll cover this soon), the end result is what we have above.


 



For an introduction in to JSON, I highly recommend Bob German’s article here.



Decoding a token


Taking the sample above and putting in in to jwt.ms, it is possible to decode from “base64url” back to human-readable JSON.


 


e738e6ef6d6f41ab9e811c7d4e8d5371.png


 



You will now see a JWT is made up of 3 parts:



  • Header (red text)

  • Payload (blue text)

  • Signature (green text)


In the next two sections, we’ll cover off each part.


 


Payload


A payload or body is the content of the token where the claims are stored. Most tokens contain standard claims such as:



  • “iss” – Identity of the service that issued the token e.g. https://login.microsoftonline.com/9122040d-6c67-4c5b-b112-36a304b66dad/v2.0

  • “sub” – The subject of the token e.g. the user

  • “aud” – The audience of the token, who the token is intended for. This is usually the client and not the user

  • “exp” – Expiry date of token in seconds since the Unix epoch

  • “iat” – Time token was issued (Unix epoch seconds)

  • “nbf” – Time token is valid from (Unix epoch seconds)


In addition to standard claims, there are custom claims in Azure AD tokens such as:



  • “name” – Name of the subject

  • “oid” – Azure AD object ID of the subject

  • “tid” – Azure AD tenant ID of the subject



One great feature of jwt.ms is that you can view detailed descriptions of standard and Azure AD claims.



Validating a token


You may be thinking: I just decoded a token on a webpage – how is that secure? JWTs are typically “signed” (not encrypted) with an algorithm and private key by the issuer of the token. This doesn’t stop any of the payload or header from being decoded as the aim of a token isn’t to hide information, but provide validity to it.


 



Never store secret information in a payload of a token as it can be easily decoded.



It is up to the recipient e.g. your client to validate the token to ensure it can be trusted.


There is a bit more nuance to the process than outlined here, but here is the summary on how to validate a token. Within the header part of the JWT, it contains the information on how the JWT was “signed” (what algorithm and private/public key pair was used). With this information it is possible for the client (if it has access to the public key) to validate the signature part of the JWT.


In addition to the signature, validation should also be taken place on the payload such as expiry time, audience and issuer.


 


Token usage


Now we are familiar with tokens. Let’s cover how they could be used in a couple of scenarios:


 


OpenID Connect


OpenID Connect is a way to sign a user in to an application. It is used for authentication only and not authorization. In this example, the end-user (user-agent) requests access to an application. The application requires authentication, so the end-user is redirected to authenticate at the authorization sever (I know, confusing). If successful, an ID token is returned and then validated by the application. If it passes validation, access is granted to the application.


 


openidconnect.png


OAuth 2.0 auth code grant


Auth code grant flow is where a user is asked to sign-in at the authorization server (Azure AD). This time, however, instead of an ID token being returned, an authorization code is returned. A second request is then made to the authorization server with the authorization code, but this time an access token is returned. With the access token, a protected API can then be accessed.


 


authcodegrantflow.png


Wrap up


I hope you found this useful and understand more around what tokens are, the different types of tokens and how they are used.

Transforming manufacturing operations with Dynamics 365 Remote Assist

Transforming manufacturing operations with Dynamics 365 Remote Assist

This article is contributed. See the original author and article here.

Planning on attending the upcoming Hannover Messe Digital Edition? If so, come discover how mixed reality business applications like Microsoft Dynamics 365 Remote Assist are helping transform organizations like Schaeffler. The Hannover Messe industry (HMI) conference covers all core themes of the industrial value-adding chainfrom individual components to the complete smart factory. Join us at the “Transform Your Workforce” panel session to hear from Schaeffler on how they are using Dynamics 365 Remote Assist to transform their manufacturing operations and boost productivity while saving cost. Also, learn how Microsoft Cloud for Manufacturing is helping create a more resilient and sustainable future through open standards and ecosystems. What manufacturers can do with Dynamics 365 Remote Assist The manufacturing industry has proven to be one of the earliest adopters of mixed reality technologies, successfully leveraging mixed reality business applications like Dynamics 365 Remote Assist across discrete manufacturing, process manufacturing, automotive, and more. With Dynamics 365 Remote Assist, global manufacturing companies such as Ecolab, Musashi, and Saint-Gobain have been able to get real-time remote assistance from experts around the world anytime, anywhere while still being able to access and anchor critical work order details, schematics, and diagrams within their physical work environment. Additionally, many manufacturers today are also now using Dynamics 365 Remote Assist to conduct remote audits and inspections with videos, screenshots, and 3D annotations, ultimately driving cost savings and efficiency, and avoiding travel costsall while minimizing their carbon footprint. According to the Microsoft-commissioned Forrester Total Economic Impact (TEI) report on Microsoft Dynamics 365 Remote Assist, studies conducted by Forrester showed that Dynamics 365 Remote Assist typically helped achieve the following impact in labor and travel costs savings for field technicians and experts, unlocked labor savings for manufacturing site technicians, and avoided lost income, labor, and direct costs stemming from common manufacturing issues: Customers resolve throughput-impacting issues five days earlier, saving approximately $20,052 per issue. Experts and technicians can now collaborate to solve costly issues days or weeks faster. With issues modeled to cause an estimated 5 percent drop in throughput for the composite organization, resolving issues five days faster helped prevent approximately four hours of lost production and costly downtime. Experts avoid 17 trips per year, saving $53,550 in travel costs and 384 hours valued at $39,744 per expert. Experts can now virtually see, annotate, and direct onsite users, avoiding trips for inspections and last-minute issue resolution. Each avoided trip saves $3,500 in travel costs and three to four days of labor. Field technicians avoid 55 trips per year, saving 188 hours valued at $4,230 plus $2,498 in travel costs per technician. Field technicians shift 50 percent of inspections to virtual, improve first-time fix (FTF) by 10 percent for tier 1 issues and by 40 percent for tier 2 issues, and can now self-resolve 75 percent of tier 3 issues with remote expert support. Manufacturing site technicians save 124 hours per year valued at $2,790 per technician. Using Dynamics 365 Remote Assist for collaboration with onsite technicians and office staff plus remote experts boosts inspection productivity by 25 percent, halves labor for tier 2 issues, and slashes tier 3 issue resolution labor by 75 percent. Additional benefits of Dynamics 365 Remote Assist include the ability to: Accelerate manufacturing with fewer throughput drops, improving customer experience Improve quality and accuracy of work with remote collaboration and guidance Speed up decision making as plant workers demonstrate proposed work in real-time, helping remote stakeholders quickly understand, align on, and approve the work Boost inspection frequency plus recording capture of work and inspections for auditing and compliance. Ensure critical business continuity, especially with evolving macroeconomic and geopolitical conditions Improve employee health and safety by avoiding travel and minimizing physical contact (especially with driving and pandemic-related risks), allowing onsite workers to complete tasks while still getting access to remote experts when needed Enhance employee experience by avoiding time-consuming, often last-minute work travel. These experts can also now avoid travel-related fatigue and jetlag. An improved work-life balance helps improve employee satisfaction, and enables the company to attract, hire, and retain talent. Improve knowledge acquisition, retention, and sharing with hands-on completion of task work with remote expert support enhanced with mixed reality 3D annotations, plus real-time or recorded observation for future training purposes. Achieve sustainability goals by reducing travel-related emissions and carbon footprint Learn more about Dynamics 365 Remote Assist in manufacturing Read the full Total Economic Impact Of Microsoft Dynamics 365 Remote Assist report Be sure to also check out the following customer evidence stories to discover how your organization can similarly leverage Dynamics 365 Remote Assist for accelerated deployment, thorough inspections, and efficient break/fix resolution. Ecolab Watch the video with Ecolab’s David Goforth, Vice President Sales North America, and Rick Stokes, Area Technical Support Manager, as they speak with Rodney Clark, Vice President IoT and Mixed Reality Sales at Microsoft, about how Ecolab Food and Beverage is transforming business processes to better serve customers and employees in the face of emerging challenges. Musashi Musashi Seimitsu Industry is an automotive parts manufacturer with production and sales facilities in 14 countries and 35 hubs worldwide. The global brand slogan, Power to Value, has represented its innovative manufacturing style since 1938. This can-do spirit has protected corporate infrastructure amidst COVID-19. By merging the real and digital worlds with Dynamics 365 Remote Assist on HoloLens 2, the company launched a new production line in Mexico without a single engineer leaving Japan. Musashi Seimitsu is embracing the post COVID-19 new normal with its swift digital transformation. Saint-Gobain Saint-Gobain is a global leader in the manufacture of sustainable, high-performance building materials. The craftsmanship and innovation underlying the company’s technologically advanced products, particularly its specialized glass offerings, hinge on stellar production machine maintenance and in-depth training. Since the Saint-Gobain process experts who provide that deep expertise can’t be everywhere at once, the company turned to Dynamics 365 Remote Assist to deliver remote expert assistance in real-time. Now, maintenance and training are faster, more impactful, and with dramatically less travel required, helping Saint-Gobain be aligned with their sustainability goals. Dynamics 365 Remote Assist resources Learn more about Dynamics 365 Remote Assist. Register to attend upcoming Dynamics 365 Remote Assist Microsoft Reactor sessions. Complete the Dynamics 365 Remote Assist Learning Path. Read Dynamics 365 Remote Assist customer stories. See how mixed reality solutions on HoloLens 2 can help your business be more productive. Find information on Microsoft Dynamics 365 partners for manufacturing. Listen to the Dynamics 365 Connected and Ready podcast episode on mixed reality, “Ford goes from vehicles to ventilators, with Dr. Graham Hoare OBE.” Sources: The Total Economic Impact Of Microsoft Dynamics 365 Remote Assist, a commissioned study conducted by Forrester Consulting on behalf of Microsoft, June 2020

The post Transforming manufacturing operations with Dynamics 365 Remote Assist appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Transforming manufacturing operations with Dynamics 365 Remote Assist

Navigating the skills gap with Dynamics 365 Guides

This article is contributed. See the original author and article here.

Digital transformation is rapidly expanding, the workforce is aging, and organizations are looking for technology to upskill their workforce faster. Manufacturers, in particular, rely on a highly skilled workforce that must keep up with the pace of technology change. Deloitte and the Manufacturing Institute estimate that up to 2.4 million United States manufacturing jobs could remain unfilled between 2018 and 2028 because of a lack of adequate skills.1 What’s needed to address the skills gap is a scalable solution to training and operations. With Microsoft Dynamics 365 Guides, no custom coding is required, and employees get guidance right where the work happens with step-by-step holographic instructions. Move away from traditional training methods, gain insights into what is working, and reduce downtime and associated costs with guides that enable employees to be hands-free while learning. Ensure compliance with hands-free learning According to a Deloitte and MAPI survey2 of manufacturers, the pandemic has accelerated digital transformation, further exacerbating the growing skills gap on the shop floor, and it’s also introducing new challenges for worker safety and production. With Dynamics 365 Guides, organizations get a scalable solution for on-the-job guidance with no coding required. Employees simply follow instructions they see right in front of them while they are hands-free for faster learning. Keeping employees safe is critical, and Dynamics 365 Guides gives employees confidence in taking care of their regular tasks and tackling unexpected challenges. Guide employees through procedures, whether it’s their first time or a recurring task, by using holographic step-by-step instructions where the work is done. Surface urgent information quickly using Dynamics 365 Guides to provide warnings and cautions to your users with needed details in view as they work. Maximize hands-free time by increasing efficiency and flexibility with improved voice commands that allow more hands-free time. Improve operations with employee insights According to the latest “Future of Jobs” report from the World Economic Forum, “94 percent of business leaders report that they expect employees to pick up new skills on the job” but only 16 percent of those surveyed have made significant progress in improving knowledge gaps.3 Closing knowledge gaps isn’t just about training; it’s about optimizing operations across the workforce. But manufacturers need visibility into where the gaps are and what training is working. Dynamics 365 Guides empowers organizations to aggregate employee task performance data into real-time Microsoft Power BI dashboards, making it easier to identify where process improvements are needed. Gain data-driven insights over time with Dynamics 365 Guides to improve employee effectiveness. Quickly deploy skill-building initiatives that target specific gaps identified in Dynamics 365 Guides’ usage reports and create consistency across teams. Pull employee performance data into real-time Power BI dashboards, making it easier to improve processes and share analytics within your organization. Integrate with other Microsoft Dynamics 365 solutions to do more We are continually integrating the rest of the Dynamics 365 suite of solutions with Dynamics 365 Guides to unlock new scenarios. Greater integration means more seamless workflows and more opportunities for use cases across industries. Incorporate Dynamics 365 Guides with existing workflows using powerful services like Microsoft Power Apps and Microsoft Power Automate to view and save data. Extend the capabilities of Dynamics 365 Guides when work orders are assigned to technicians with Microsoft Dynamics 365 Field Service. The dedicated Dynamics 365 Field Service tab in the Microsoft HoloLens application launches any assigned guide. Integrate Microsoft Dynamics 365 Supply Chain Management with Dynamics 365 Guides to create mixed-reality, step-by-step instructions for production processes such as assembly, service, operations, certification, regulations, and safety procedures. Kruger brings factory handbook to life with Dynamics 365 Guides Kruger, a North American paper products and energy specialist, is an established company that leads its industry in terms of innovation. With experienced operators retiring every year, Kruger knows how important it is to capture their expertise to share with the next generation. With Microsoft Hololens 2 and Dynamics 365 Guides, Kruger brings its factory handbook to life. Now Kruger employees have an intuitive yet powerful tool to exchange knowledge and practical experiences. Dynamics 365 Guides empowers Kruger operators to be agile in their training by providing an entirely new way of learning on the job. “In today’s manufacturing world things are moving so fast. People need to be agile and find ways to learn faster and it is our responsibility, as a company, to provide them the best tool that exists and make them more comfortable to perform their task.”Gino Levesque, Senior Vice President Containerboard Kruger Packaging Using the branching feature, operators can easily select different pathways within the same procedure, depending on their experience. The spatial trigger feature intuitively leads workers to perform the next step, making it seamless for employees to learn on the job and build muscle memory. This quick access to information, regardless of experience, boosts productivity and empowers employees to take on new challenges. Using Dynamics 365 Guides and HoloLens 2, Kruger meets its growing workforce demands while capturing the expertise of their experienced operators. Get started with Dynamics 365 Guides Want to learn more? Learn how MSR and Sheba Medical Center meet urgent staffing demands with HoloLens 2 and Dynamics 365 Guides. Ready to empower your frontline employees? Read more about Dynamics 365 Guides capabilities and get your questions answered using our Dynamics 365 Guides documentation. Take the next step by trying a 30-day free trial of Dynamics 365 Guides. Learn more about Microsoft Cloud for Manufacturing for a more resilient and sustainable future through open standards and ecosystems. See how mixed reality solutions on HoloLens 2 can help your business be more productive. Find information on Microsoft Dynamics 365 partners for manufacturing. 1Deloitte Insights and the Manufacturing Institute, 2018 Deloitte and the Manufacturing Institute Skills Gap and Future of Work Study. 2A 2020 Deloitte and MAPI Study finds ecosystems can create a competitive edge for manufacturers facing ongoing disruption, Smart Manufacturing Ecosystems: A Catalyst for Digital Transformation? 3World Economic Forum, 2020 Future of Jobs Report

The post Navigating the skills gap with Dynamics 365 Guides appeared first on Microsoft Dynamics 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

How Microsoft Teams is powering hybrid work and the frontline in manufacturing

How Microsoft Teams is powering hybrid work and the frontline in manufacturing

This article is contributed. See the original author and article here.

We have learned over the past year that no business is impervious to everything. We also learned—or were reminded—how critical manufacturing ecosystems are to our daily lives.

The post How Microsoft Teams is powering hybrid work and the frontline in manufacturing appeared first on Microsoft 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

MidDay Cafe pausing until re-launch with new format on May 10th

MidDay Cafe pausing until re-launch with new format on May 10th

This article is contributed. See the original author and article here.

We are temporarily pausing MidDay Cafe until our re-launch on May 10th. 


Due to scheduling conflicts with increased interest in new offerings, as well re-structuring MidDay Cafe for a shorter format with different content and a new emphasis on podcast readiness, we are temporarily pausing MidDay Cafe. Look for an upcoming announcement with meeting invite and more. 


Michael Gannotti


Michael GannottiMichael Gannotti

Vulnerability Summary for the Week of April 5, 2021

This article is contributed. See the original author and article here.

admin.php — online_book_store
  SQL injection in admin.php in Online Book Store 1.0 allows remote attackers to execute arbitrary SQL commands and bypass authentication. 2021-04-09 not yet calculated CVE-2020-23763
MISC
MISC apple — macos
  The Proofpoint Insider Threat Management Agents (formerly ObserveIT Agent) for MacOS and Linux perform improper validation of the ITM Server’s certificate, which enables a remote attacker to intercept and alter these communications using a man-in-the-middle attack. All versions before 7.11.1 are affected. Agents for Windows and Cloud are not affected. 2021-04-06 not yet calculated CVE-2021-27899
CONFIRM apple — multiple_products A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. 2021-04-02 not yet calculated CVE-2021-1870
FEDORA
FEDORA
MISC
MISC apple — multiple_products
  This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Maliciously crafted web content may violate iframe sandboxing policy. 2021-04-02 not yet calculated CVE-2021-1801
FEDORA
FEDORA
MISC
MISC
MISC
MISC apple — multiple_products
  A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on arbitrary servers. 2021-04-02 not yet calculated CVE-2021-1799
FEDORA
FEDORA
MISC
MISC
MISC
MISC
MISC aprelium — abyss_web_server
  An issue was discovered in Aprelium Abyss Web Server X1 2.12.1 and 2.14. A crafted HTTP request can lead to an out-of-bounds read that crashes the application. 2021-04-08 not yet calculated CVE-2021-3328
MISC archive — archive
  Directory traversal vulnerability in Archive collectively operation utility Ver.2.10.1.0 and earlier allows an attacker to create or overwrite files by leading a user to expand a malicious ZIP archives. 2021-04-07 not yet calculated CVE-2021-20692
MISC
MISC asus — bmc_firmware The SMTP configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28189
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The specific function in ASUS BMC’s firmware Web management page (Get Help file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files. 2021-04-06 not yet calculated CVE-2021-28207
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The specific function in ASUS BMC’s firmware Web management page (Generate new SSL certificate) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28187
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The specific function in ASUS BMC’s firmware Web management page (ActiveX configuration-1 acquisition) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28185
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The specific function in ASUS BMC’s firmware Web management page (Modify user’s information function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary. 2021-04-06 not yet calculated CVE-2021-28204
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The specific function in ASUS BMC’s firmware Web management page (Web License configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28183
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The Firmware protocol configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28198
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The specific function in ASUS BMC’s firmware Web management page (Remote video configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28181
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The specific function in ASUS BMC’s firmware Web management page (Media support configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28179
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The UEFI configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28178
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The LDAP configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28177
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The specific function in ASUS BMC’s firmware Web management page (Record video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files. 2021-04-06 not yet calculated CVE-2021-28206
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware The CD media configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28200
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The Service configuration-1 function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28201
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Get video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files. 2021-04-06 not yet calculated CVE-2021-28208
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Delete video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files. 2021-04-06 not yet calculated CVE-2021-28209
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The Service configuration-2 function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28202
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The Web Set Media Image function in ASUS BMC’s firmware Web management page does not filter the specific parameter. As obtaining the administrator permission, remote attackers can launch command injection to execute command arbitrary. 2021-04-06 not yet calculated CVE-2021-28203
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Delete SOL video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files. 2021-04-06 not yet calculated CVE-2021-28205
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Modify user’s information function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28199
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The Active Directory configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28197
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (ActiveX configuration-2 acquisition) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28186
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The DNS configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28176
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The Web Service configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28182
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The Active Directory configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28184
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Generate SSL certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28196
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Modify user’s information function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28188
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Generate new certificate function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28190
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The Firmware update function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28191
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Remote video storage function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28192
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The SMTP configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28193
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Remote image configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28194
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The Radius configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28195
CONFIRM
CONFIRM
CONFIRM asus — bmc_firmware
  The specific function in ASUS BMC’s firmware Web management page (Audit log configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service. 2021-04-06 not yet calculated CVE-2021-28180
CONFIRM
CONFIRM
CONFIRM asus — gputweak_ii
  AsIO2_64.sys and AsIO2_32.sys in ASUS GPUTweak II before 2.3.0.3 allow low-privileged users to interact directly with physical memory (by calling one of several driver routines that map physical memory into the virtual address space of the calling process) and to interact with MSR registers. This could enable low-privileged users to achieve NT AUTHORITYSYSTEM privileges via a DeviceIoControl. 2021-04-08 not yet calculated CVE-2021-28685
MISC
MISC asus — gputweak_ii
  AsIO2_64.sys and AsIO2_32.sys in ASUS GPUTweak II before 2.3.0.3 allow low-privileged users to trigger a stack-based buffer overflow. This could enable low-privileged users to achieve Denial of Service via a DeviceIoControl. 2021-04-08 not yet calculated CVE-2021-28686
MISC
MISC atlassian — jira_server_and_jira_data_center
  The dashboard gadgets preference resource of the Atlassian gadgets plugin used in Jira Server and Jira Data Center before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to obtain gadget related settings via a missing permissions check. 2021-04-09 not yet calculated CVE-2020-36287
MISC bixby — bixby
  Improper handling of exceptional conditions in Bixby prior to version 3.0.53.02 allows attacker to execute the actions registered by the user. 2021-04-09 not yet calculated CVE-2021-25380
CONFIRM
CONFIRM cern — indico
  CERN Indico before 2.3.4 can use an attacker-supplied Host header in a password reset link. 2021-04-07 not yet calculated CVE-2021-30185
MISC
MISC cisco — advanced_malware_protection
  A vulnerability in the dynamic link library (DLL) loading mechanism in Cisco Advanced Malware Protection (AMP) for Endpoints Windows Connector, ClamAV for Windows, and Immunet could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected Windows system. To exploit this vulnerability, the attacker would need valid credentials on the system. The vulnerability is due to insufficient validation of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on an affected system. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges. 2021-04-08 not yet calculated CVE-2021-1386
CISCO cisco — clam_antivirus A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition. 2021-04-08 not yet calculated CVE-2021-1405
CISCO cisco — clam_antivirus
  A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition. 2021-04-08 not yet calculated CVE-2021-1252
CISCO cisco — clam_antivirus
  A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.0 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition. 2021-04-08 not yet calculated CVE-2021-1404
CISCO cisco — ios_xr_software
  A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges on the underlying Linux operating system (OS) of an affected device. This vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to an affected command. A successful exploit could allow the attacker to execute commands on the underlying Linux OS with root privileges. 2021-04-08 not yet calculated CVE-2021-1485
CISCO cisco — multiple_routers
  Multiple vulnerabilities in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code with elevated privileges equivalent to the web service process on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-04-08 not yet calculated CVE-2021-1415
CISCO cisco — multiple_routers
  A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system of the affected device. Cisco has not released software updates that address this vulnerability. 2021-04-08 not yet calculated CVE-2021-1459
CISCO cisco — multiple_routers
  Multiple vulnerabilities in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code with elevated privileges equivalent to the web service process on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-04-08 not yet calculated CVE-2021-1414
CISCO cisco — multiple_routers
  Multiple vulnerabilities in the web-based management interface of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code with elevated privileges equivalent to the web service process on an affected device. These vulnerabilities exist because HTTP requests are not properly validated. An attacker could exploit these vulnerabilities by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to remotely execute arbitrary code on the device. 2021-04-08 not yet calculated CVE-2021-1413
CISCO cisco — sd-wan
  Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. 2021-04-08 not yet calculated CVE-2021-1137
CISCO cisco — sd-wan_vmanage_software
  Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. 2021-04-08 not yet calculated CVE-2021-1479
CISCO cisco — sd-wan_vmanage_software
  Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. 2021-04-08 not yet calculated CVE-2021-1480
CISCO cisco — small_business_rv_series_routers Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). 2021-04-08 not yet calculated CVE-2021-1308
CISCO cisco — small_business_rv_series_routers
  Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). 2021-04-08 not yet calculated CVE-2021-1251
CISCO cisco — small_business_rv_series_routers
  Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business RV Series Routers. An unauthenticated, adjacent attacker could execute arbitrary code or cause an affected router to leak system memory or reload. A memory leak or device reload would cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). 2021-04-08 not yet calculated CVE-2021-1309
CISCO cisco — small_business_rv_series_routers
  Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. 2021-04-08 not yet calculated CVE-2021-1473
CISCO cisco — small_business_rv_series_routers
  Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. 2021-04-08 not yet calculated CVE-2021-1472
CISCO cisco — umbrella Multiple vulnerabilities in the Admin audit log export feature and Scheduled Reports feature of Cisco Umbrella could allow an authenticated, remote attacker to perform formula and link injection attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. 2021-04-08 not yet calculated CVE-2021-1475
CISCO cisco — umbrella
  Multiple vulnerabilities in the Admin audit log export feature and Scheduled Reports feature of Cisco Umbrella could allow an authenticated, remote attacker to perform formula and link injection attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. 2021-04-08 not yet calculated CVE-2021-1474
CISCO cisco — unified_communications_manager A vulnerability in the Self Care Portal of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to modify data on an affected system without proper authorization. The vulnerability is due to insufficient validation of user-supplied data to the Self Care Portal. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to modify information without proper authorization. 2021-04-08 not yet calculated CVE-2021-1399
CISCO cisco — unified_communications_manager
  Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against an interface user. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading an interface user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. 2021-04-08 not yet calculated CVE-2021-1380
CISCO cisco — unified_communications_manager
  A vulnerability in the SOAP API endpoint of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, Cisco Unity Connection, and Cisco Prime License Manager could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper sanitization of user-supplied input. An attacker could exploit this vulnerability by sending a SOAP API request with crafted parameters to an affected device. A successful exploit could allow the attacker to execute arbitrary code with root privileges on the underlying Linux operating system of the affected device. 2021-04-08 not yet calculated CVE-2021-1362
CISCO cisco — unified_intelligence_center_software
  A vulnerability in the web-based management interface of Cisco Unified Intelligence Center Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. 2021-04-08 not yet calculated CVE-2021-1463
CISCO cisco — univied_communications_manager Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against an interface user. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading an interface user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. 2021-04-08 not yet calculated CVE-2021-1409
CISCO cisco — univied_communications_manager
  Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against an interface user. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading an interface user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. 2021-04-08 not yet calculated CVE-2021-1408
CISCO cisco — univied_communications_manager
  Multiple vulnerabilities in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against an interface user. These vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by persuading an interface user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. 2021-04-08 not yet calculated CVE-2021-1407
CISCO cisco — univied_communications_manager
  A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to improper inclusion of sensitive information in downloadable files. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to obtain hashed credentials of system users. To exploit this vulnerability an attacker would need to have valid user credentials with elevated privileges. 2021-04-08 not yet calculated CVE-2021-1406
CISCO cisco — webex A vulnerability in certain web pages of Cisco Webex Meetings could allow an unauthenticated, remote attacker to modify a web page in the context of a user’s browser. The vulnerability is due to improper checks on parameter values in affected pages. An attacker could exploit this vulnerability by persuading a user to follow a crafted link that is designed to pass HTML code into an affected parameter. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks. 2021-04-08 not yet calculated CVE-2021-1420
CISCO cisco — webex
  A vulnerability in Cisco Webex Meetings for Android could allow an authenticated, remote attacker to modify the avatar of another user. This vulnerability is due to improper authorization checks. An attacker could exploit this vulnerability by sending a crafted request to the Cisco Webex Meetings client of a targeted user of a meeting in which they are both participants. A successful exploit could allow the attacker to modify the avatar of the targeted user. 2021-04-08 not yet calculated CVE-2021-1467
CISCO citsmart– citsmart
  CITSmart before 9.1.2.28 mishandles the “filtro de autocomplete.” 2021-04-06 not yet calculated CVE-2021-28142
MISC cloud_controller — cloud_controller
  Cloud Controller API versions prior to 1.106.0 logs service broker credentials if the default value of db logging config field is changed. CAPI database logs service broker password in plain text whenever a job to clean up orphaned items is run by Cloud Controller. 2021-04-08 not yet calculated CVE-2021-22115
MISC d-link — dsl-320b-d1_devices
  ** UNSUPPORTED WHEN ASSIGNED ** D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote attackers to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2021-04-07 not yet calculated CVE-2021-26709
MISC
FULLDISC
MISC
MISC directus — directus
  Directus 8 before 8.8.2 allows remote authenticated users to execute arbitrary code because file-upload permissions include the ability to upload a .php file to the main upload directory and/or upload a .php file and a .htaccess file to a subdirectory. Exploitation succeeds only for certain installations with the Apache HTTP Server and the local-storage driver (e.g., when the product was obtained from hub.docker.com). 2021-04-07 not yet calculated CVE-2021-29641
MISC
FULLDISC
MISC
MISC
MISC discord — recon_server
  Discord Recon Server is a bot that allows you to do your reconnaissance process from your Discord. Remote code execution in version 0.0.1 would allow remote users to execute commands on the server resulting in serious issues. This flaw is patched in 0.0.2. 2021-04-09 not yet calculated CVE-2021-21433
MISC
MISC
CONFIRM django — django
  In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability. 2021-04-06 not yet calculated CVE-2021-28658
MISC
MISC
MLIST
CONFIRM dma — softlab_radius_manager
  DMA Softlab Radius Manager 4.4.0 allows CSRF with impacts such as adding new manager accounts via admin.php. 2021-04-07 not yet calculated CVE-2021-30147
MISC
MISC
MISC dnsmasque — dnsmasque
  A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity. 2021-04-08 not yet calculated CVE-2021-3448
MISC dolby — audio_x2
  The Dolby Audio X2 (DAX2) API service before 0.8.8.90 on Windows allows local users to gain privileges. 2021-04-08 not yet calculated CVE-2021-3146
MISC dream_report — r20-1 A privilege escalation vulnerability exists in Dream Report 5 R20-2. COM Class Identifiers (CLSID), installed by Dream Report 5 20-2, reference LocalServer32 and InprocServer32 with weak privileges which can lead to privilege escalation when used. An attacker can provide a malicious file to trigger this vulnerability. 2021-04-09 not yet calculated CVE-2020-13534
MISC dream_report — r20-1
  A privilege escalation vulnerability exists in Dream Report 5 R20-2. In the default configuration, the Syncfusion Dashboard Service service binary can be replaced by attackers to escalate privileges to NT SYSTEM. An attacker can provide a malicious file to trigger this vulnerability. 2021-04-09 not yet calculated CVE-2020-13532
MISC dream_report — r20-1
  A privilege escalation vulnerability exists in Dream Report 5 R20-2. IIn the default configuration, the following registry keys, which reference binaries with weak permissions, can be abused by attackers to effectively ‘backdoor’ the installation files and escalate privileges when a new user logs in and uses the application. 2021-04-09 not yet calculated CVE-2020-13533
MISC eclipse — mosquitto
  In Eclipse Mosquitto version 2.0.0 to 2.0.9, if an authenticated client that had connected with MQTT v5 sent a crafted CONNACK message to the broker, a NULL pointer dereference would occur. 2021-04-07 not yet calculated CVE-2021-28166
CONFIRM erlang — erlang
  A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation’s directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with “erlsrv.exe” to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions. 2021-04-09 not yet calculated CVE-2021-29221
MISC
MISC esri — acrgis_online A cross-site scripting (XSS) vulnerability in the Document Link of documents in ESRI ArcGIS Online before 10.9 and Enterprise before 10.9 allows remote authenticated users to inject arbitrary JavaScript code via a malicious HTML attribute such as onerror (in the URL field of the Parameters tab). 2021-04-08 not yet calculated CVE-2021-3012
MISC exiv2 — exiv2
  A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data. 2021-04-08 not yet calculated CVE-2021-3482
MISC ffmpeg — ffmpeg
  FFmpeg <=4.3 contains a buffer overflow vulnerability in libavcodec through a crafted file that may lead to remote code execution. 2021-04-07 not yet calculated CVE-2021-30123
MISC
MISC
MISC forcepoint — web_security_content_gateway
  Forcepoint Web Security Content Gateway versions prior to 8.5.4 improperly process XML input, leading to information disclosure. 2021-04-08 not yet calculated CVE-2020-6590
CONFIRM freebsd — multiple_products
  In FreeBSD 13.0-STABLE before n245118, 12.2-STABLE before r369552, 11.4-STABLE before r369560, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, a superuser inside a FreeBSD jail configured with the non-default allow.mount permission could cause a race condition between the lookup of “..” and remounting a filesystem, allowing access to filesystem hierarchy outside of the jail. 2021-04-07 not yet calculated CVE-2020-25584
MISC freebsd — multiple_products
  In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free. 2021-04-07 not yet calculated CVE-2021-29627
MISC freebsd — multiple_products
  In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11.4-STABLE before r369559, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, copy-on-write logic failed to invalidate shared memory page mappings between multiple processes allowing an unpriivleged process to maintain a mapping after it is freed, allowing the process to read private data belonging to other processes or the kernel. 2021-04-07 not yet calculated CVE-2021-29626
MISC friendica — friendica
  ** DISPUTED ** Module/Settings/UserExport.php in Friendica through 2021.01 allows settings/userexport to be used by anonymous users, as demonstrated by an attempted access to an array offset on a value of type null, and excessive memory consumption. NOTE: the vendor states “the feature still requires a valid authentication cookie even if the route is accessible to non-logged users.” 2021-04-05 not yet calculated CVE-2021-30141
MISC
MISC gnome — gnome
  fr-archive-libarchive.c in GNOME file-roller through 3.38.0, as used by GNOME Shell and other software, allows Directory Traversal during extraction because it lacks a check of whether a file’s parent is a symlink in certain complex situations. NOTE: this issue exists because of an incomplete fix for CVE-2020-11736. 2021-04-07 not yet calculated CVE-2020-36314
MISC
MISC gnu — chess
  GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc. 2021-04-07 not yet calculated CVE-2021-30184
MISC
MISC google — chrome Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2021-04-09 not yet calculated CVE-2021-21197
MISC
MISC google — chrome Out of bounds read in IPC in Google Chrome prior to 89.0.4389.114 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. 2021-04-09 not yet calculated CVE-2021-21198
MISC
MISC google — chrome Heap buffer overflow in TabStrip in Google Chrome on Windows prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2021-04-09 not yet calculated CVE-2021-21196
MISC
MISC google — chrome
  Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2021-04-09 not yet calculated CVE-2021-21195
MISC
MISC google — chrome
  Use after free in Aura in Google Chrome on Linux prior to 89.0.4389.114 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. 2021-04-09 not yet calculated CVE-2021-21199
MISC
MISC google — chrome
  Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. 2021-04-09 not yet calculated CVE-2021-21194
MISC
MISC grav_admin_plugin — grav_admin_plugin
  Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in arbitrary YAML file creation or content change of existing YAML files on the system. Successfully exploitation of that vulnerability results in configuration changes, such as general site information change, custom scheduler job definition, etc. Due to the nature of the vulnerability, an adversary can change some part of the webpage, or hijack an administrator account, or execute operating system command under the context of the web-server user. This vulnerability is fixed in version 1.10.8. Blocking access to the `/admin` path from untrusted sources can be applied as a workaround. 2021-04-07 not yet calculated CVE-2021-21425
CONFIRM
MISC huawei — multiple_products
  There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product include some versions of IPS Module, NGFW Module, Secospace USG6300, Secospace USG6500, Secospace USG6600 and USG9500. 2021-04-08 not yet calculated CVE-2021-22312
MISC ibm — webspehere_application_server
  IBM WebSphere Application Server 7.0, 8.0, and 8.5 is vulnerable to server-side request forgery (SSRF). By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to obtain sensitive data. IBM X-Force ID: 197502. 2021-04-08 not yet calculated CVE-2021-20480
XF
CONFIRM ikuaios — build
  iKuaiOS 3.4.8 Build 202012291059 has an arbitrary file download vulnerability, which can be exploited by attackers to obtain sensitive information. 2021-04-06 not yet calculated CVE-2021-28075
MISC imb — spectrum_scale
  IBM Spectrum Scale 5.1.0.1 could allow a local attacker to bypass the filesystem audit logging mechanism when file audit logging is enabled. IBM X-Force ID: 199478. 2021-04-09 not yet calculated CVE-2021-29671
XF
CONFIRM jenkins — multiple_products
  A cross-site request forgery (CSRF) vulnerability in Jenkins promoted builds Plugin 3.9 and earlier allows attackers to to promote builds. 2021-04-07 not yet calculated CVE-2021-21641
MLIST
CONFIRM jenkins — multiple_products
  Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names. 2021-04-07 not yet calculated CVE-2021-21640
MLIST
CONFIRM jenkins — multiple_products
  Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type. 2021-04-07 not yet calculated CVE-2021-21639
MLIST
CONFIRM jsrsasign –jsrsasign
  In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack. 2021-04-07 not yet calculated CVE-2021-30246
MISC
MISC
MISC larsens — calender
  Cross Site Scripting (XSS) vulnerability in the Larsens Calender plugin Version <= 1.2 for WordPress allows remote attackers to execute arbitrary web script via the “titel” column on the “Eintrage hinzufugen” tab. 2021-04-09 not yet calculated CVE-2020-23762
MISC
MISC learnsite — learnsite
  Learnsite 1.2.5.0 contains a remote privilege escalation vulnerability in /Manager/index.aspx through the JudgIsAdmin() function. By modifying the initial letter of the key of a user cookie, the key of the administrator cookie can be obtained. 2021-04-08 not yet calculated CVE-2021-27522
MISC lg — mobile_devices An issue was discovered on LG mobile devices with Android OS 11 software. Attackers can bypass the lockscreen protection mechanism after an incoming call has been terminated. The LG ID is LVE-SMP-210002 (April 2021). 2021-04-06 not yet calculated CVE-2021-30161
MISC lg — mobile_devices
  An issue was discovered on LG mobile devices with Android OS 4.4 through 11 software. Attackers can leverage ISMS services to bypass access control on specific content providers. The LG ID is LVE-SMP-210003 (April 2021). 2021-04-06 not yet calculated CVE-2021-30162
MISC libertro — retroarch
  The text-to-speech engine in libretro RetroArch for Windows 0.11 passes unsanitized input to PowerShell through platform_win32.c via the accessibility_speak_windows function, which allows attackers who have write access on filesystems that are used by RetroArch to execute code via command injection using specially a crafted file and directory names. 2021-04-07 not yet calculated CVE-2021-28927
MISC
MISC
MISC linux — linux_kernel An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d. 2021-04-07 not yet calculated CVE-2020-36312
MISC
MISC linux — linux_kernel
  An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52. 2021-04-07 not yet calculated CVE-2020-36310
MISC
MISC linux — linux_kernel
  An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987. 2021-04-07 not yet calculated CVE-2021-30178
MISC linux — linux_kernel
  The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn’t use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11. 2021-04-06 not yet calculated CVE-2021-28688
MISC linux — linux_kernel
  BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c. 2021-04-08 not yet calculated CVE-2021-29154
MISC
MISC linux — linux_kernel
  An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184. 2021-04-07 not yet calculated CVE-2020-36311
MISC
MISC linux — linux_kernel
  An issue was discovered in the Linux kernel before 5.7. The KVM subsystem allows out-of-range access to memslots after a deletion, aka CID-0774a964ef56. This affects arch/s390/kvm/kvm-s390.c, include/linux/kvm_host.h, and virt/kvm/kvm_main.c. 2021-04-07 not yet calculated CVE-2020-36313
MISC
MISC liquidfiles — liquidfiles
  LiquidFiles 3.4.15 has stored XSS through the “send email” functionality when sending a file via email to an administrator. When a file has no extension and contains malicious HTML / JavaScript content (such as SVG with HTML content), the payload is executed upon a click. This is fixed in 3.5. 2021-04-06 not yet calculated CVE-2021-30140
MISC
MISC
MISC litespeed_technologies — openlitespeed_web_server
  Privilege Escalation in LiteSpeed Technologies OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system. 2021-04-07 not yet calculated CVE-2021-26758
MISC
CONFIRM
EXPLOIT-DB magazinerz — magazinerz
  Cross-site scripting vulnerability in MagazinegerZ v.1.01 allows remote attackers to inject an arbitrary script via unspecified vectors. 2021-04-07 not yet calculated CVE-2021-20684
MISC manageengine — servicedesk_plus
  Insufficient output sanitization in ManageEngine ServiceDesk Plus before version 11200 and ManageEngine AssetExplorer before version 6800 allows a remote, unauthenticated attacker to conduct persistent cross-site scripting (XSS) attacks by uploading a crafted XML asset file. 2021-04-09 not yet calculated CVE-2021-20080
MISC mark_text — mark_text
  Mark Text through 0.16.3 allows attackers arbitrary command execution. This could lead to Remote Code Execution (RCE) by opening .md files containing a mutation Cross Site Scripting (XSS) payload. 2021-04-05 not yet calculated CVE-2021-29996
MISC mediawiki — mediawiki An issue was discovered in MediaWiki before 1.31.13 and 1.32.x through 1.35.x before 1.35.2. When using the MediaWiki API to “protect” a page, a user is currently able to protect to a higher level than they currently have permissions for. 2021-04-09 not yet calculated CVE-2021-30152
MISC
DEBIAN mediawiki — mediawiki
  An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain “fast double move” situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it’s only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master. 2021-04-09 not yet calculated CVE-2021-30159
MISC
DEBIAN mediawiki — mediawiki
  An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Special:Contributions can leak that a “hidden” user exists. 2021-04-09 not yet calculated CVE-2021-30156
MISC mediawiki — mediawiki
  An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. ContentModelChange does not check if a user has correct permissions to create and set the content model of a nonexistent page. 2021-04-09 not yet calculated CVE-2021-30155
MISC
DEBIAN micro_focus — application_automation_tools_plugin Missing Authorization vulnerability in Micro Focus Application Automation Tools Plugin – Jenkins plugin. The vulnerability affects version 6.7 and earlier versions. The vulnerability could allow access without permission checks. 2021-04-08 not yet calculated CVE-2021-22513
MISC micro_focus — application_automation_tools_plugin
  Cross-Site Request Forgery (CSRF) vulnerability in Micro Focus Application Automation Tools Plugin – Jenkins plugin. The vulnerability affects version 6.7 and earlier versions. The vulnerability could allow form validation without permission checks. 2021-04-08 not yet calculated CVE-2021-22512
MISC micro_focus — application_automation_tools_plugin
  Improper Certificate Validation vulnerability in Micro Focus Application Automation Tools Plugin – Jenkins plugin. The vulnerability affects version 6.7 and earlier versions. The vulnerability could allow unconditionally disabling of SSL/TLS certificates. 2021-04-08 not yet calculated CVE-2021-22511
MISC micro_focus — application_automation_tools_plugin
  Reflected XSS vulnerability in Micro Focus Application Automation Tools Plugin – Jenkins plugin. The vulnerability affects all version 6.7 and earlier versions. 2021-04-08 not yet calculated CVE-2021-22510
MISC micro_focus — operations_bridge_manager
  Authentication bypass vulnerability in Micro Focus Operations Bridge Manager affects versions 2019.05, 2019.11, 2020.05 and 2020.10. The vulnerability could allow remote attackers to bypass user authentication and get unauthorized access. 2021-04-08 not yet calculated CVE-2021-22507
MISC mitake — mitake
  Mitake smart stock selection system contains a broken authentication vulnerability. By manipulating the parameters in the URL, remote attackers can gain the privileged permissions to access transaction record, and fraudulent trading without login. 2021-04-08 not yet calculated CVE-2021-28174
MISC mongodb– compass
  A malicious 3rd party with local access to the Windows machine where MongoDB Compass is installed can execute arbitrary software with the privileges of the user who is running MongoDB Compass. This issue affects: MongoDB Inc. MongoDB Compass 1.x version 1.3.0 on Windows and later versions; 1.x versions prior to 1.25.0 on Windows. 2021-04-06 not yet calculated CVE-2021-20334
MISC mozilla — firefox The unity-firefox-extension package could be tricked into dropping a C callback which was still in use, which Firefox would then free, causing Firefox to crash. This could be achieved by adding an action to the launcher and updating it with new callbacks until the libunity-webapps rate limit was hit. Fixed in 3.0.0+14.04.20140416-0ubuntu1.14.04.1 of unity-firefox-extension and in all versions of libunity-webapps by shipping an empty unity-firefox-extension package, thus disabling the extension entirely and invalidating the attack against the libunity-webapps package. 2021-04-07 not yet calculated CVE-2013-1055
UBUNTU
UBUNTU mozilla — firefox
  The unity-firefox-extension package could be tricked into destroying the Unity webapps context, causing Firefox to crash. This could be achieved by spinning the event loop inside the webapps initialization callback. Fixed in 3.0.0+14.04.20140416-0ubuntu1.14.04.1 by shipping an empty package, thus disabling the extension entirely. 2021-04-07 not yet calculated CVE-2013-1054
UBUNTU
UBUNTU nagios — network_analyzer SQL injection vulnerability in Nagios Network Analyzer before 2.4.3 via the o[col] parameter to api/checks/read/. 2021-04-08 not yet calculated CVE-2021-28925
MISC
MISC nagios — network_analyzer
  Self Authenticated XSS in Nagios Network Analyzer before 2.4.2 via the nagiosna/groups/queries page. 2021-04-08 not yet calculated CVE-2021-28924
MISC
MISC openresty — openresty
  ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or a request or response header. 2021-04-06 not yet calculated CVE-2020-36309
MISC
MISC
MISC perl — perl
  The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses. 2021-04-06 not yet calculated CVE-2021-29424
MISC
FEDORA
FEDORA
FEDORA
MISC php-nuke — php-nuke
  There is a SQL Injection vulnerability in PHP-Nuke 8.3.3 in the User Registration section, leading to remote code execution. This occurs because the U.S. state is not validated to be two letters, and the OrderBy field is not validated to be one of LASTNAME, CITY, or STATE. 2021-04-07 not yet calculated CVE-2021-30177
MISC phpseclib — phpseclib
  phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification. 2021-04-06 not yet calculated CVE-2021-30130
MISC
CONFIRM
CONFIRM projen — projen
  `projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen’s `NodeProject` project type (including any project type derived from it) include a `.github/workflows/rebuild-bot.yml` workflow that may allow any GitHub user to trigger execution of un-trusted code in the context of the “main” repository (as opposed to that of a fork). In some situations, such untrusted code may potentially be able to commit to the “main” repository. The rebuild-bot workflow is triggered by comments including `@projen rebuild` on pull-request to trigger a re-build of the projen project, and updating the pull request with the updated files. This workflow is triggered by an `issue_comment` event, and thus always executes with a `GITHUB_TOKEN` belonging to the repository into which the pull-request is made (this is in contrast with workflows triggered by `pull_request` events, which always execute with a `GITHUB_TOKEN` belonging to the repository from which the pull-request is made). Repositories that do not have branch protection configured on their default branch (typically `main` or `master`) could possibly allow an untrusted user to gain access to secrets configured on the repository (such as NPM tokens, etc). Branch protection prohibits this escalation, as the managed `GITHUB_TOKEN` would not be able to modify the contents of a protected branch and affected workflows must be defined on the default branch. 2021-04-06 not yet calculated CVE-2021-21423
MISC
CONFIRM
MISC proofpoint — insider_threat_management_server The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is vulnerable to XML external entity (XXE) injection in the Web Console. The vulnerability requires admin user privileges and knowledge of the XML file’s encryption key to successfully exploit. All versions before 7.11 are affected. 2021-04-06 not yet calculated CVE-2021-22158
CONFIRM proofpoint — insider_threat_management_server
  The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is missing an authorization check on several pages in the Web Console. This enables a view-only user to change any configuration setting and delete any registered agents. All versions before 7.11.1 are affected. 2021-04-06 not yet calculated CVE-2021-27900
CONFIRM proofpoint — insider_threat_management_server
  Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.11.1 allows stored XSS. 2021-04-06 not yet calculated CVE-2021-22157
CONFIRM qualcomm — multiple_snapdragon_products Memory crash when accessing histogram type KPI input received due to lack of check of histogram definition before accessing it in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile 2021-04-07 not yet calculated CVE-2020-11237
CONFIRM qualcomm — multiple_snapdragon_products Denial of service while processing RTCP packets containing multiple SDES reports due to memory for last SDES packet is freed and rest of the memory is leaked in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables 2021-04-07 not yet calculated CVE-2020-11255
CONFIRM qualcomm — multiple_snapdragon_products Unintended reads and writes by NS EL2 in access control driver due to lack of check of input validation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking 2021-04-07 not yet calculated CVE-2020-11245
CONFIRM qualcomm — multiple_snapdragon_products Out of bound memory read while unpacking data due to lack of offset length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2021-04-07 not yet calculated CVE-2020-11247
CONFIRM qualcomm — multiple_snapdragon_products Two threads call one or both functions concurrently leading to corruption of pointers and reference counters which in turn can lead to heap corruption in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile 2021-04-07 not yet calculated CVE-2020-11231
CONFIRM qualcomm — multiple_snapdragon_products
  Memory corruption due to improper input validation while processing IO control which is nonstandard in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Wired Infrastructure and Networking 2021-04-07 not yet calculated CVE-2021-1892
CONFIRM qualcomm — multiple_snapdragon_products
  Possible memory corruption in RPM region due to improper XPU configuration in Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking 2021-04-07 not yet calculated CVE-2020-11210
CONFIRM qualcomm — multiple_snapdragon_products
  User could gain access to secure memory due to incorrect argument into address range validation api used in SDI to capture requested contents in Snapdragon Industrial IOT, Snapdragon Mobile 2021-04-07 not yet calculated CVE-2020-11242
CONFIRM qualcomm — multiple_snapdragon_products
  RRC sends a connection establishment success to NAS even though connection setup validation returns failure and leads to denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile 2021-04-07 not yet calculated CVE-2020-11243
CONFIRM qualcomm — multiple_snapdragon_products
  Memory corruption due to invalid value of total dimension in the non-histogram type KPI could lead to a denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile 2021-04-07 not yet calculated CVE-2020-11236
CONFIRM qualcomm — multiple_snapdragon_products
  Trustzone initialization code will disable xPU`s when memory dumps are enabled and lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking 2021-04-07 not yet calculated CVE-2020-11252
CONFIRM qualcomm — multiple_snapdragon_products
  Out-of-bounds read vulnerability while accessing DTMF payload due to lack of check of buffer length before copying in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2021-04-07 not yet calculated CVE-2020-11251
CONFIRM qualcomm — multiple_snapdragon_products
  When sending a socket event message to a user application, invalid information will be passed if socket is freed by other thread resulting in a Use After Free condition in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables 2021-04-07 not yet calculated CVE-2020-11234
CONFIRM qualcomm — multiple_snapdragon_products
  A double free condition can occur when the device moves to suspend mode during secure playback in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile 2021-04-07 not yet calculated CVE-2020-11246
CONFIRM qualcomm — multiple_snapdragon_products
  Out of bound read occurs while processing crafted SDP due to lack of check of null string in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking 2021-04-07 not yet calculated CVE-2020-11191
CONFIRM ranker — ranker
  Cross-site scripting vulnerability in Click Ranker Ver.3.5 allows remote attackers to inject an arbitrary script via unspecified vectors. 2021-04-07 not yet calculated CVE-2021-20688
MISC realtek — rtl8723de_ble_stack
  An issue was discovered in Realtek rtl8723de BLE Stack <= 4.1 that allows remote attackers to cause a Denial of Service via the interval field to the CONNECT_REQ message. 2021-04-08 not yet calculated CVE-2020-23539
MISC red_hat — red-Hat
  A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0. A credential leak was identified which will expose Azure Resource Manager’s secret key through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2021-04-08 not yet calculated CVE-2021-3413
MISC relic — relic
  In RELIC before 2020-08-01, RSA PKCS#1 v1.5 signature forgery can occur because certain checks of the padding (and of the first two bytes) are inadequate. NOTE: this requires that a low public exponent (such as 3) is being used. The product, by default, does not generate RSA keys with such a low number. 2021-04-07 not yet calculated CVE-2020-36315
MISC
MISC
MISC
MISC relic — relic
  In RELIC before 2021-04-03, there is a buffer overflow in PKCS#1 v1.5 signature verification because garbage bytes can be present. 2021-04-07 not yet calculated CVE-2020-36316
MISC
MISC
MISC
MISC rukovoditel — project_management_app An exploitable SQL injection vulnerability exists in “global_lists/choices” page of the Rukovoditel Project Management App 2.7.2. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery. 2021-04-09 not yet calculated CVE-2020-13592
MISC rukovoditel — project_management_app
  An exploitable SQL injection vulnerability exists in the “forms_fields_rules/rules” page of the Rukovoditel Project Management App 2.7.2. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery. 2021-04-09 not yet calculated CVE-2020-13587
MISC rukovoditel — project_management_app
  An exploitable SQL injection vulnerability exists in the “access_rules/rules_form” page of the Rukovoditel Project Management App 2.7.2. A specially crafted HTTP request can lead to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability, this can be done either with administrator credentials or through cross-site request forgery. 2021-04-09 not yet calculated CVE-2020-13591
MISC rust — id-map
  An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in remove_set upon a panic in a Drop impl. 2021-04-07 not yet calculated CVE-2021-30457
MISC rust — id-map
  An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in get_or_insert upon a panic of a user-provided f function. 2021-04-07 not yet calculated CVE-2021-30456
MISC rust — id-map
  An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in IdMap::clone_from upon a .clone panic. 2021-04-07 not yet calculated CVE-2021-30455
MISC rust — outer_cgi
  An issue was discovered in the outer_cgi crate before 0.2.1 for Rust. A user-provided Read instance receives an uninitialized memory buffer from KeyValueReader. 2021-04-07 not yet calculated CVE-2021-30454
MISC samsung — mobile An improper permission management in CertInstaller prior to SMR APR-2021 Release 1 allows untrusted applications to delete certain local files. 2021-04-09 not yet calculated CVE-2021-25362
CONFIRM
CONFIRM samsung — mobile An improper access control in ActivityManagerService prior to SMR APR-2021 Release 1 allows untrusted applications to access running processesdelete some local files. 2021-04-09 not yet calculated CVE-2021-25363
CONFIRM
CONFIRM samsung — mobile Using predictable index for attachments in Samsung Email prior to version 6.1.41.0 allows remote attackers to get attachments of another emails when users open the malicious attachment. 2021-04-09 not yet calculated CVE-2021-25375
CONFIRM
CONFIRM samsung — mobile An improper authorization vulnerability in Samsung Members “samsungrewards” scheme for deeplink in versions 2.4.83.9 in Android O(8.1) and below, and 3.9.00.9 in Android P(9.0) and above allows remote attackers to access a user data related with Samsung Account. 2021-04-09 not yet calculated CVE-2021-25374
CONFIRM
CONFIRM samsung — mobile Intent redirection vulnerability in Gallery prior to version 5.4.16.1 allows attacker to execute privileged action. 2021-04-09 not yet calculated CVE-2021-25379
CONFIRM
CONFIRM samsung — mobile An improper access control vulnerability in stickerCenter prior to SMR APR-2021 Release 1 allows local attackers to read or write arbitrary files of system process via untrusted applications. 2021-04-09 not yet calculated CVE-2021-25361
CONFIRM
CONFIRM samsung — mobile A pendingIntent hijacking vulnerability in Create Movie prior to SMR APR-2021 Release 1 in Android O(8.x) and P(9.0), 3.4.81.1 in Android Q(10,0), and 3.6.80.7 in Android R(11.0) allows unprivileged applications to access contact information. 2021-04-09 not yet calculated CVE-2021-25357
CONFIRM
CONFIRM samsung — mobile An improper caller check vulnerability in Managed Provisioning prior to SMR APR-2021 Release 1 allows unprivileged application to install arbitrary application, grant device admin permission and then delete several installed application. 2021-04-09 not yet calculated CVE-2021-25356
CONFIRM
CONFIRM samsung — mobile
  An improper synchronization logic in Samsung Email prior to version 6.1.41.0 can leak messages in certain mailbox in plain text when STARTTLS negotiation is failed. 2021-04-09 not yet calculated CVE-2021-25376
CONFIRM
CONFIRM samsung — mobile
  Using unsafe PendingIntent in Customization Service prior to version 2.2.02.1 in Android O(8.x), 2.4.03.0 in Android P(9.0), 2.7.02.1 in Android Q(10.0) and 2.9.01.1 in Android R(11.0) allows local attackers to perform unauthorized action without permission via hijacking the PendingIntent. 2021-04-09 not yet calculated CVE-2021-25373
CONFIRM
CONFIRM samsung — mobile
  Intent redirection in Samsung Experience Service versions 10.8.0.4 in Android P(9.0) below, and 12.2.0.5 in Android Q(10.0) above allows attacker to execute privileged action. 2021-04-09 not yet calculated CVE-2021-25377
CONFIRM
CONFIRM samsung — mobile
  Improper access control of certain port in SmartThings prior to version 1.7.63.6 allows remote temporary denial of service. 2021-04-09 not yet calculated CVE-2021-25378
CONFIRM
CONFIRM samsung — mobile
  A pendingIntent hijacking vulnerability in Secure Folder prior to SMR APR-2021 Release 1 allows unprivileged applications to access contact information. 2021-04-09 not yet calculated CVE-2021-25364
CONFIRM
CONFIRM samsung — mobile
  An improper exception control in softsimd prior to SMR APR-2021 Release 1 allows unprivileged applications to access the API in softsimd. 2021-04-09 not yet calculated CVE-2021-25365
CONFIRM
CONFIRM samsung — mobile
  Using unsafe PendingIntent in Samsung Account in versions 10.8.0.4 in Android P(9.0) and below, and 12.1.1.3 in Android Q(10.0) and above allows local attackers to perform unauthorized action without permission via hijacking the PendingIntent. 2021-04-09 not yet calculated CVE-2021-25381
CONFIRM
CONFIRM samsung — mobile
  An improper input validation vulnerability in libswmfextractor library prior to SMR APR-2021 Release 1 allows attackers to execute arbitrary code on mediaextractor process. 2021-04-09 not yet calculated CVE-2021-25360
CONFIRM
CONFIRM samsung — mobile
  An improper SELinux policy prior to SMR APR-2021 Release 1 allows local attackers to access AP information without proper permissions via untrusted applications. 2021-04-09 not yet calculated CVE-2021-25359
CONFIRM
CONFIRM samsung — mobile
  A vulnerability that stores IMSI values in an improper path prior to SMR APR-2021 Release 1 allows local attackers to access IMSI values without any permission via untrusted applications. 2021-04-09 not yet calculated CVE-2021-25358
CONFIRM
CONFIRM seafile — seafile
  Seafile 7.0.5 (2019) allows Persistent XSS via the “share of library functionality.” 2021-04-06 not yet calculated CVE-2021-30146
MISC serentiyos — serenityos
  SerenityOS 2021-03-27 contains a buffer overflow vulnerability in the EndOfCentralDirectory::read() function. 2021-04-06 not yet calculated CVE-2021-30045
MISC
MISC
MISC skyworth_digital_technology — rn510
  Skyworth Digital Technology RN510 V.3.1.0.4 is affected by an incorrect access control vulnerability in/cgi-bin/test_version.asp. If Wi-Fi is connected but an unauthenticated user visits a URL, the SSID password and web UI password may be disclosed. 2021-04-09 not yet calculated CVE-2021-25326
MISC skyworth_digital_technology — rn510
  Skyworth Digital Technology RN510 V.3.1.0.4 RN510 V.3.1.0.4 contains a buffer overflow vulnerability in /cgi-bin/app-staticIP.asp. An authenticated attacker can send a specially crafted request to endpoint which can lead to a denial of service (DoS) or possible code execution on the device. 2021-04-09 not yet calculated CVE-2021-25328
MISC skyworth_digital_technology — rn510
  Skyworth Digital Technology RN510 V.3.1.0.4 contains a cross-site request forgery (CSRF) vulnerability in /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp. Missing CSRF protection in devices can lead to XSRF, as the above pages are vulnerable to cross-site scripting (XSS). 2021-04-09 not yet calculated CVE-2021-25327
MISC sonicwall — email_security
  A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host. 2021-04-09 not yet calculated CVE-2021-20021
CONFIRM sonicwall — email_security
  SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host. 2021-04-09 not yet calculated CVE-2021-20022
CONFIRM sonicwall — gms
  A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root. 2021-04-10 not yet calculated CVE-2021-20020
CONFIRM sopel-channelmgnt — sopel-channelmgnt
  sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX > 1. 2021-04-09 not yet calculated CVE-2021-21431
MISC
CONFIRM
MISC squirro — insights_engine
  The Squirro Insights Engine was affected by a Reflected Cross-Site Scripting (XSS) vulnerability affecting versions 2.0.0 up to and including 3.2.4. An attacker can use the vulnerability to inject malicious JavaScript code into the application, which will execute within the browser of any user who views the relevant application content. The attacker-supplied code can perform a wide variety of actions, such as stealing victims’ session tokens or login credentials, performing arbitrary actions on their behalf, and logging their keystrokes. 2021-04-08 not yet calculated CVE-2021-27945
CONFIRM subrion — cms_version
  Cross Site Scripting (XSS) vulnerability in subrion CMS Version <= 4.2.1 allows remote attackers to execute arbitrary web script via the “payment gateway” column on transactions tab. 2021-04-09 not yet calculated CVE-2020-23761
MISC
MISC syncthing — syncthing
  Syncthing is a continuous file synchronization program. In Syncthing before version 1.15.0, the relay server `strelaysrv` can be caused to crash and exit by sending a relay message with a negative length field. Similarly, Syncthing itself can crash for the same reason if given a malformed message from a malicious relay server when attempting to join the relay. Relay joins are essentially random (from a subset of low latency relays) and Syncthing will by default restart when crashing, at which point it’s likely to pick another non-malicious relay. This flaw is fixed in version 1.15.0. 2021-04-06 not yet calculated CVE-2021-21404
MISC
MISC
CONFIRM
MISC teradici — pcoip_connection_manager_and_security_gateway
  Sensitive smart card data is logged in default INFO logs by Teradici’s PCoIP Connection Manager and Security Gateway prior to version 21.01.3. 2021-04-06 not yet calculated CVE-2021-25692
MISC timelybills — timelybills
  Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user’s files obtain JWT tokens for user’s account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted. 2021-04-06 not yet calculated CVE-2021-26833
MISC umoci — umoci
  Open Container Initiative umoci before 0.4.7 allows attackers to overwrite arbitrary host paths via a crafted image that causes symlink traversal when “umoci unpack” or “umoci raw unpack” is used. 2021-04-06 not yet calculated CVE-2021-29136
MISC
CONFIRM
CONFIRM unibox — u-50_and_enterprise_series
  Unibox SMB 2.4 and UniBox Enterprise Series 2.4 and UniBox Campus Series 2.4 contain a cross-site request forgery (CSRF) vulnerability in /tools/network-trace, /list_users, /list_byod?usertype=raduser, /dhcp_leases, /go?rid=202 in which a specially crafted HTTP request may reconfigure the device. 2021-04-09 not yet calculated CVE-2020-21884
MISC
MISC
MISC unibox — u-50_and_enterprise_series
  Unibox U-50 2.4 and UniBox Enterprise Series 2.4 and UniBox Campus Series 2.4 contain a OS command injection vulnerability in /tools/ping, which can leads to complete device takeover. 2021-04-09 not yet calculated CVE-2020-21883
MISC
MISC
MISC valve_stream — valve_stream
  Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click. 2021-04-10 not yet calculated CVE-2021-30481
MISC
MISC
MISC
MISC vela — vela
  Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. An authentication mechanism added in version 0.7.0 enables some malicious user to obtain secrets utilizing the injected credentials within the `~/.netrc` file. Refer to the referenced GitHub Security Advisory for complete details. This is fixed in version 0.7.5. 2021-04-09 not yet calculated CVE-2021-21432
MISC
MISC
MISC
CONFIRM
MISC vestacp — vestacp
  VestaCP through 0.9.8-24 allows attackers to gain privileges by creating symlinks to files for which they lack permissions. After reading the RKEY value from user.conf under the /usr/local/vesta/data/users/admin directory, the admin password can be changed via a /reset/?action=confirm&user=admin&code= URI. This occurs because chmod is used unsafely. 2021-04-08 not yet calculated CVE-2021-30463
MISC vestacp — vestacp
  VestaCP through 0.9.8-24 allows the admin user to escalate privileges to root because the Sudo configuration does not require a password to run /usr/local/vesta/bin scripts. 2021-04-08 not yet calculated CVE-2021-30462
MISC vigra — computer_vision_library
  VIGRA Computer Vision Library Version-1-11-1 contains a segmentation fault vulnerability in the impex.hxx read_image_band() function, in which a crafted file can cause a denial of service. 2021-04-06 not yet calculated CVE-2021-30046
MISC wcms — wcms Cross Site Scripting (XSS) vulnerability in wcms 0.3.2 allows remote attackers to inject arbitrary web script and HTML via the pagename parameter to wex/html.php. 2021-04-07 not yet calculated CVE-2020-24138
MISC wcms — wcms Server-side request forgery in Wcms 0.3.2 lets an attacker send crafted requests from the back-end server of a vulnerable web application via the path parameter to wex/cssjs.php. It can help identify open ports, local network hosts and execute command on local services. 2021-04-07 not yet calculated CVE-2020-24139
MISC wcms — wcms Directory traversal vulnerability in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the path parameter to wex/cssjs.php. 2021-04-07 not yet calculated CVE-2020-24137
MISC wcms — wcms
  Directory traversal in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the pagename parameter to wex/html.php. 2021-04-07 not yet calculated CVE-2020-24136
MISC wcms — wcms
  Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identify open ports, local network hosts and execute command on local services. 2021-04-07 not yet calculated CVE-2020-24140
MISC wcms — wcms
  A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Wcms 0.3.2, which allows remote attackers to inject arbitrary web script and HTML via the type parameter to wex/cssjs.php. 2021-04-07 not yet calculated CVE-2020-24135
MISC web-school_erp — web_school_erp A blind XSS vulnerability exists in Web-School ERP V 5.0 via (Add Events) in event name and description fields. An attacker can inject a JavaScript code that will be stored in the page. If any visitor sees the event, then the payload will be executed and sends the victim’s information to the attacker website. 2021-04-08 not yet calculated CVE-2021-30113
MISC
MISC
MISC web-school_erp — web_school_erp
  Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a student_leave_application request through module/core/studentleaveapplication/create. The application fails to validate the CSRF token for a POST request using Guardian privilege. 2021-04-08 not yet calculated CVE-2021-30112
MISC
MISC
MISC web-school_erp — web_school_erp
  A stored XSS vulnerability exists in Web-School ERP V 5.0 via (Add Events) in the event name and description fields. An attack can inject a JavaScript code that will be stored in the page. If any visitor sees the events, then the payload will be executed. 2021-04-08 not yet calculated CVE-2021-30111
MISC
MISC
MISC web-school_erp — web_school_erp
  Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a voucher payment request through module/accounting/voucher/create. The application fails to validate the CSRF token for a POST request using admin privilege. 2021-04-08 not yet calculated CVE-2021-30114
MISC
MISC
MISC whatsapp — whatsapp
  A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device’s external storage to read cached TLS material. 2021-04-06 not yet calculated CVE-2021-24027
CONFIRM whatsapp — whatsapp
  A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write. 2021-04-06 not yet calculated CVE-2021-24026
CONFIRM wikimedia — parsoid
  An issue was discovered in Wikimedia Parsoid before 0.11.1 and 0.12.x before 0.12.2. An attacker can send crafted wikitext that Utils/WTUtils.php will transform by using a <meta> tag, bypassing sanitization steps, and potentially allowing for XSS. 2021-04-09 not yet calculated CVE-2021-30458
MISC
MISC wordpress — wordpress The editor of the WP Page Builder WordPress plugin before 1.2.4 allows lower-privileged users to insert unfiltered HTML, including JavaScript, into pages via the “Raw HTML” widget and the “Custom HTML” widgets (though the custom HTML widget requires sending a crafted request – it appears that this widget uses some form of client side validation but not server side validation), all of which are added via the “page_builder_data” parameter when performing the “wppb_page_save” AJAX action. It is also possible to insert malicious JavaScript via the “wppb_page_css” parameter (this can be done by closing out the style tag and opening a script tag) when performing the “wppb_page_save” AJAX action. 2021-04-05 not yet calculated CVE-2021-24208
CONFIRM
MISC wordpress — wordpress By default, the WP Page Builder WordPress plugin before 1.2.4 allows subscriber-level users to edit and make changes to any and all posts pages – user roles must be specifically blocked from editing posts and pages. 2021-04-05 not yet calculated CVE-2021-24207
CONFIRM
MISC wordpress — wordpress The WordPress Related Posts plugin through 3.6.4 contains an authenticated (admin+) stored XSS vulnerability in the title field on the settings page. By exploiting that an attacker will be able to execute JavaScript code in the user’s browser. 2021-04-05 not yet calculated CVE-2021-24211
CONFIRM wordpress — wordpress The WooCommerce Help Scout WordPress plugin before 2.9.1 (https://woocommerce.com/products/woocommerce-help-scout/) allows unauthenticated users to upload any files to the site which by default will end up in wp-content/uploads/hstmp. 2021-04-05 not yet calculated CVE-2021-24212
MISC
CONFIRM wordpress — wordpress The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd 2021-04-05 not yet calculated CVE-2021-24154
CONFIRM wordpress — wordpress
  There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it’s possible to redirect the victim to any domain. 2021-04-05 not yet calculated CVE-2021-24210
MISC
CONFIRM wordpress — wordpress
  The WooCommerce Upload Files WordPress plugin before 59.4 ran a single sanitization pass to remove blocked extensions such as .php. It was possible to bypass this and upload a file with a PHP extension by embedding a “blocked” extension within another “blocked” extension in the “wcuf_file_name” parameter. It was also possible to perform a double extension attack and upload files to a different location via path traversal using the “wcuf_current_upload_session_id” parameter. 2021-04-05 not yet calculated CVE-2021-24171
CONFIRM
MISC wordpress — wordpress
  Due to the lack of sanitization and lack of nonce protection on the custom CSS feature, an attacker could craft a request to inject malicious JavaScript on a site using the Contact Form 7 Style WordPress plugin through 3.1.9. If an attacker successfully tricked a site’s administrator into clicking a link or attachment, then the request could be sent and the CSS settings would be successfully updated to include malicious JavaScript. 2021-04-05 not yet calculated CVE-2021-24159
CONFIRM
MISC wordpress — wordpress
  The WP Super Cache WordPress plugin before 1.7.2 was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection. 2021-04-05 not yet calculated CVE-2021-24209
MISC
MISC
CONFIRM wordpress — wordpress
  The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE. 2021-04-05 not yet calculated CVE-2021-24155
CONFIRM wordpress — wordpress
  The LikeBtn WordPress Like Button Rating ♥ LikeBtn WordPress plugin before 2.6.32 was vulnerable to Unauthenticated Full-Read Server-Side Request Forgery (SSRF). 2021-04-05 not yet calculated CVE-2021-24150
CONFIRM xiaomi — ax1800_routers
  On Xiaomi router AX1800 rom version < 1.0.336 and RM1800 root version < 1.0.26, the encryption scheme for a user’s backup files uses hard-coded keys, which can expose sensitive information such as a user’s password. 2021-04-08 not yet calculated CVE-2020-14099
MISC xiaomi — ax3600_routers
  A RACE CONDITION on XQBACKUP causes a decompression path error on Xiaomi router AX3600 with ROM version =1.0.50. 2021-04-08 not yet calculated CVE-2020-14104
MISC xiaomi — mobile_phones
  The application in the mobile phone can unauthorized access to the list of running processes in the mobile phone, Xiaomi Mobile Phone MIUI < 2021.01.26. 2021-04-08 not yet calculated CVE-2020-14106
MISC xiaomi — mobile_phones
  The application in the mobile phone can read the SNO information of the device, Xiaomi 10 MIUI < 2020.01.15. 2021-04-08 not yet calculated CVE-2020-14103
MISC zoom — zoom
  Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat software, which is different from the chat feature of the Zoom Meetings and Zoom Video Webinars software. 2021-04-09 not yet calculated CVE-2021-30480
MISC
MISC
MISC
MISC
MISC
MISC zte — zxa10_c300m A ZTE product has a configuration error vulnerability. Because a certain port is open by default, an attacker can consume system processing resources by flushing a large number of packets to the port, and successfully exploiting this vulnerability could reduce system processing capabilities. This affects: ZXA10 C300M all versions up to V4.3P8. 2021-04-09 not yet calculated CVE-2021-21728
MISC zzcms — zzcms
  zzcms 201910 contains an access control vulnerability through escalation of privileges in /user/adv.php, which allows an attacker to modify data for further attacks such as CSRF. 2021-04-08 not yet calculated CVE-2020-23426
MISC