CVE-2021-39267

CVE-2021-39267

Persistent cross-site scripting (XSS) in the web interface of SuiteCRM before 7.11.19 allows a remote attacker to introduce arbitrary JavaScript via a Content-Type Filter bypass to upload malicious files. This occurs because text/html is blocked, but other types that allow JavaScript execution (such as text/xml) are not blocked.

Source: CVE-2021-39267

CVE-2021-39250

CVE-2021-39250

Invision Community (aka IPS Community Suite or IP-Board) before 4.6.5.1 allows stored XSS, with resultant code execution, because an uploaded file can be placed in an IFRAME element within user-generated content. For code execution, the attacker can rely on the ability of an admin to install widgets, disclosure of the admin session ID in a Referer header, and the ability of an admin to use the templating engine (e.g., Edit HTML).

Source: CVE-2021-39250

CVE-2021-39131

CVE-2021-39131

ced detects character encoding using Google’s compact_enc_det library. In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash. The problem has been patched in ced v1.0.0. As a workaround, before passing an argument to ced, verify it’s a `Buffer` using `Buffer.isBuffer(obj)`.

Source: CVE-2021-39131

CVE-2021-0284

CVE-2021-0284

A buffer overflow vulnerability in the TCP/IP stack of Juniper Networks Junos OS allows an attacker to send specific sequences of packets to the device thereby causing a Denial of Service (DoS).

By repeatedly sending these sequences of packets to the device, an attacker can sustain the Denial of Service (DoS) condition.

The device will abnormally shut down as a result of these sent packets. A potential indicator of compromise will be the following message in the log files:
"eventd[13955]: SYSTEM_ABNORMAL_SHUTDOWN: System abnormally shut down"

This issue is only triggered by traffic destined to the device. Transit traffic will not trigger this issue.
This issue affects:
Juniper Networks Junos OS
12.3 versions prior to 12.3R12-S19;
15.1 versions prior to 15.1R7-S10;
17.3 versions prior to 17.3R3-S12;
18.4 versions prior to 18.4R3-S9;
19.1 versions prior to 19.1R3-S7;
19.2 versions prior to 19.2R1-S7, 19.2R3-S3;
19.3 versions prior to 19.3R3-S3;
19.4 versions prior to 19.4R3-S5;
20.1 versions prior to 20.1R3-S1;
20.2 versions prior to 20.2R3-S2;
20.3 versions prior to 20.3R3-S1;
20.4 versions prior to 20.4R2-S2, 20.4R3;
21.1 versions prior to 21.1R2;
21.2 versions prior to 21.2R2.

Source: CVE-2021-0284

CVE-2021-28372

CVE-2021-28372

ThroughTek’s Kalay Platform 2.0 network allows an attacker to impersonate an arbitrary ThroughTek (TUTK) device given a valid 20-byte uniquely assigned identifier (UID). This could result in an attacker hijacking a victim’s connection and forcing them into supplying credentials needed to access the victim TUTK device.

Source: CVE-2021-28372