ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
159,201 |
CVE-2021-25207
| 9.8 | 7.5 |
CRITICAL
|
Arbitrary file upload vulnerability in SourceCodester E-Commerce Website v 1.0 allows attackers to execute arbitrary code via the file upload to prodViewUpdate.php.
|
CWE-434
|
159,202 |
CVE-2021-25208
| 9.8 | 7.5 |
CRITICAL
|
Arbitrary file upload vulnerability in SourceCodester Travel Management System v 1.0 allows attackers to execute arbitrary code via the file upload to updatepackage.php.
|
CWE-434
|
159,203 |
CVE-2021-25209
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in SourceCodester Theme Park Ticketing System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to view_user.php .
|
CWE-89
|
159,204 |
CVE-2021-25210
| 9.8 | 7.5 |
CRITICAL
|
Arbitrary file upload vulnerability in SourceCodester Alumni Management System v 1.0 allows attackers to execute arbitrary code, via the file upload to manage_event.php.
|
CWE-434
|
159,205 |
CVE-2021-25211
| 9.8 | 7.5 |
CRITICAL
|
Arbitrary file upload vulnerability in SourceCodester Ordering System v 1.0 allows attackers to execute arbitrary code, via the file upload to ordering\admin\products\edit.php.
|
CWE-434
|
159,206 |
CVE-2021-25212
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in SourceCodester Alumni Management System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to manage_event.php.
|
CWE-89
|
159,207 |
CVE-2021-25213
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in SourceCodester Travel Management System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the catid parameter to subcat.php.
|
CWE-89
|
159,208 |
CVE-2021-25214
| 6.5 | 4 |
MEDIUM
|
In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a malformed IXFR triggering the flaw described above, the named process will terminate due to a failed assertion the next time the transferred secondary zone is refreshed.
|
CWE-617
|
159,209 |
CVE-2021-25215
| 7.5 | 5 |
HIGH
|
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
|
CWE-617
|
159,210 |
CVE-2021-25216
| 9.8 | 6.8 |
CRITICAL
|
In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.
|
CWE-617
|
159,211 |
CVE-2021-25217
| 7.4 | 3.3 |
HIGH
|
In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.
|
CWE-119
|
159,212 |
CVE-2021-25218
| 7.5 | 5 |
HIGH
|
In BIND 9.16.19, 9.17.16. Also, version 9.16.19-S1 of BIND Supported Preview Edition When a vulnerable version of named receives a query under the circumstances described above, the named process will terminate due to a failed assertion check. The vulnerability affects only BIND 9 releases 9.16.19, 9.17.16, and release 9.16.19-S1 of the BIND Supported Preview Edition.
|
CWE-617
|
159,213 |
CVE-2021-25219
| 5.3 | 5 |
MEDIUM
|
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.
|
NVD-CWE-noinfo
|
159,214 |
CVE-2021-25224
| 5.5 | 2.1 |
MEDIUM
|
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
CWE-400
|
159,215 |
CVE-2021-25225
| 5.5 | 2.1 |
MEDIUM
|
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
CWE-400
|
159,216 |
CVE-2021-25226
| 5.5 | 2.1 |
MEDIUM
|
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
CWE-400
|
159,217 |
CVE-2021-25227
| 3.3 | 1.9 |
LOW
|
Trend Micro Antivirus for Mac 2021 (Consumer) is vulnerable to a memory exhaustion vulnerability that could lead to disabling all the scanning functionality within the application. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability - i.e. the attacker must already have access to the target system (either legitimately or via another exploit).
|
CWE-400
|
159,218 |
CVE-2021-25228
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about hotfix history.
|
CWE-863
|
159,219 |
CVE-2021-25229
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the database server.
|
CWE-863
|
159,220 |
CVE-2021-25230
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the contents of a scan connection exception file.
|
CWE-200
|
159,221 |
CVE-2021-25231
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific hotfix history file.
|
CWE-200
|
159,222 |
CVE-2021-25232
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about the SQL database.
|
CWE-200
|
159,223 |
CVE-2021-25233
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific configuration download file.
|
CWE-200
|
159,224 |
CVE-2021-25234
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about a specific notification configuration file.
|
CWE-200
|
159,225 |
CVE-2021-25235
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS) and OfficeScan XG SP1 could allow an unauthenticated user to obtain information about a content inspection configuration file.
|
CWE-200
|
159,226 |
CVE-2021-25236
| 5.3 | 5 |
MEDIUM
|
A server-side request forgery (SSRF) information disclosure vulnerability in Trend Micro OfficeScan XG SP1 and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to locate online agents via a specific sweep.
|
CWE-918
|
159,227 |
CVE-2021-25237
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem) could allow an unauthenticated user to obtain information about the managing port used by agents.
|
CWE-200
|
159,228 |
CVE-2021-25238
| 5.3 | 5 |
MEDIUM
|
An improper access control information disclosure vulnerability in Trend Micro OfficeScan XG SP1 and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about an agent's managing port.
|
CWE-200
|
159,229 |
CVE-2021-25239
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain information about x86 agent hotfixes.
|
CWE-200
|
159,230 |
CVE-2021-25240
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain x64 agent hofitx information.
|
CWE-200
|
159,231 |
CVE-2021-25241
| 5.3 | 5 |
MEDIUM
|
A server-side request forgery (SSRF) information disclosure vulnerability in Trend Micro Apex One and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to locate online agents via a sweep.
|
CWE-918
|
159,232 |
CVE-2021-25242
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain version and build information.
|
CWE-200
|
159,233 |
CVE-2021-25243
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain patch level information.
|
CWE-200
|
159,234 |
CVE-2021-25244
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain various pieces of configuration informaiton.
|
CWE-863
|
159,235 |
CVE-2021-25245
| 5.3 | 5 |
MEDIUM
|
An improper access control vulnerability in Worry-Free Business Security 10.0 SP1 could allow an unauthenticated user to obtain various pieces of settings informaiton.
|
CWE-863
|
159,236 |
CVE-2021-25246
| 6.5 | 6.4 |
MEDIUM
|
An improper access control information disclosure vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG SP1, and Worry-Free Business Security could allow an unauthenticated user to create a bogus agent on an affected server that could be used then make valid configuration queries.
|
CWE-863
|
159,237 |
CVE-2021-25247
| 7.8 | 4.4 |
HIGH
|
A DLL hijacking vulnerability Trend Micro HouseCall for Home Networks version 5.3.1063 and below could allow an attacker to use a malicious DLL to escalate privileges and perform arbitrary code execution. An attacker must already have user privileges on the machine to exploit this vulnerability.
|
CWE-427
|
159,238 |
CVE-2021-25248
| 5.5 | 2.1 |
MEDIUM
|
An out-of-bounds read information disclosure vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security (10.0 SP1 and Services) could allow an attacker to disclose sensitive information about a named pipe. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
CWE-125
|
159,239 |
CVE-2021-25249
| 7.8 | 7.2 |
HIGH
|
An out-of-bounds write information disclosure vulnerability in Trend Micro Apex One (on-prem and SaaS), OfficeScan XG SP1, and Worry-Free Business Security (10.0 SP1 and Services) could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
CWE-787
|
159,240 |
CVE-2021-25250
| 7.8 | 7.2 |
HIGH
|
An improper access control vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service and OfficeScan XG SP1 on a sensitive file could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
CWE-269
|
159,241 |
CVE-2021-25251
| 7.2 | 6.5 |
HIGH
|
The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability.
|
CWE-94
|
159,242 |
CVE-2021-25252
| 5.5 | 4.9 |
MEDIUM
|
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
|
CWE-400
|
159,243 |
CVE-2021-25253
| 7.8 | 7.2 |
HIGH
|
An improper access control vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service and OfficeScan XG SP1 on a resource used by the service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
|
CWE-269
|
159,244 |
CVE-2021-25263
| 6.5 | 4 |
MEDIUM
|
Clickhouse prior to versions v20.8.18.32-lts, v21.1.9.41-stable, v21.2.9.41-stable, v21.3.6.55-lts, v21.4.3.21-stable allows user to read any file on the host system, that clickhouse user has access to.
|
NVD-CWE-noinfo
|
159,245 |
CVE-2021-25264
| 6.7 | 7.2 |
MEDIUM
|
In multiple versions of Sophos Endpoint products for MacOS, a local attacker could execute arbitrary code with administrator privileges.
|
CWE-94
|
159,246 |
CVE-2021-25265
| 8.8 | 6.8 |
HIGH
|
A malicious website could execute code remotely in Sophos Connect Client before version 2.1.
|
NVD-CWE-noinfo
|
159,247 |
CVE-2021-25269
| 4.4 | 2.1 |
MEDIUM
|
A local administrator could prevent the HMPA service from starting despite tamper protection using an unquoted service path vulnerability in the HMPA component of Sophos Intercept X Advanced and Sophos Intercept X Advanced for Server before version 2.0.23, as well as Sophos Exploit Prevention before version 3.8.3.
|
CWE-428
|
159,248 |
CVE-2021-25270
| 6.7 | 7.2 |
MEDIUM
|
A local attacker could execute arbitrary code with administrator privileges in HitmanPro.Alert before version Build 901.
|
CWE-269
|
159,249 |
CVE-2021-25271
| 6 | 3.6 |
MEDIUM
|
A local attacker could read or write arbitrary files with administrator privileges in HitmanPro before version Build 318.
|
CWE-269
|
159,250 |
CVE-2021-25273
| 4.8 | 3.5 |
MEDIUM
|
Stored XSS can execute as administrator in quarantined email detail view in Sophos UTM before version 9.706.
|
CWE-79
|
159,251 |
CVE-2021-25274
| 9.8 | 10 |
CRITICAL
|
The Collector Service in SolarWinds Orion Platform before 2020.2.4 uses MSMQ (Microsoft Message Queue) and doesn't set permissions on its private queues. As a result, remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process. Additionally, upon processing of such messages, the service deserializes them in insecure manner, allowing remote arbitrary code execution as LocalSystem.
|
CWE-502
|
159,252 |
CVE-2021-25275
| 7.8 | 2.1 |
HIGH
|
SolarWinds Orion Platform before 2020.2.4, as used by various SolarWinds products, installs and uses a SQL Server backend, and stores database credentials to access this backend in a file readable by unprivileged users. As a result, any user having access to the filesystem can read database login details from that file, including the login name and its associated password. Then, the credentials can be used to get database owner access to the SWNetPerfMon.DB database. This gives access to the data collected by SolarWinds applications, and leads to admin access to the applications by inserting or changing authentication data stored in the Accounts table of the database.
|
CWE-798
|
159,253 |
CVE-2021-25276
| 7.1 | 3.6 |
HIGH
|
In SolarWinds Serv-U before 15.2.2 Hotfix 1, there is a directory containing user profile files (that include users' password hashes) that is world readable and writable. An unprivileged Windows user (having access to the server's filesystem) can add an FTP user by copying a valid profile file to this directory. For example, if this profile sets up a user with a C:\ home directory, then the attacker obtains access to read or replace arbitrary files with LocalSystem privileges.
|
CWE-922
|
159,254 |
CVE-2021-25277
| 6.1 | 4.3 |
MEDIUM
|
FTAPI 4.0 - 4.10 allows XSS via a crafted filename to the alternative text hover box in the file submission component.
|
CWE-79
|
159,255 |
CVE-2021-25278
| 4.8 | 3.5 |
MEDIUM
|
FTAPI 4.0 through 4.10 allows XSS via an SVG document to the Background Image upload feature in the Submit Box Template Editor.
|
CWE-79
|
159,256 |
CVE-2021-25281
| 9.8 | 7.5 |
CRITICAL
|
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
|
CWE-287
|
159,257 |
CVE-2021-25282
| 9.1 | 6.4 |
CRITICAL
|
An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
|
CWE-22
|
159,258 |
CVE-2021-25283
| 9.8 | 7.5 |
CRITICAL
|
An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.
|
CWE-94
|
159,259 |
CVE-2021-25284
| 4.4 | 1.9 |
MEDIUM
|
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
|
CWE-312
|
159,260 |
CVE-2021-25287
| 9.1 | 6.4 |
CRITICAL
|
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.
|
CWE-125
|
159,261 |
CVE-2021-25288
| 9.1 | 6.4 |
CRITICAL
|
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i.
|
CWE-125
|
159,262 |
CVE-2021-25289
| 9.8 | 7.5 |
CRITICAL
|
An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.
|
CWE-787
|
159,263 |
CVE-2021-25290
| 7.5 | 5 |
HIGH
|
An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.
|
CWE-787
|
159,264 |
CVE-2021-25291
| 7.5 | 5 |
HIGH
|
An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries.
|
CWE-125
|
159,265 |
CVE-2021-25292
| 6.5 | 4.3 |
MEDIUM
|
An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.
|
NVD-CWE-Other
|
159,266 |
CVE-2021-25293
| 7.5 | 5 |
HIGH
|
An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.
|
CWE-125
|
159,267 |
CVE-2021-25294
| 9.8 | 10 |
CRITICAL
|
OpenCATS through 0.9.5-3 unsafely deserializes index.php?m=activity requests, leading to remote code execution. This occurs because lib/DataGrid.php calls unserialize for the parametersactivity:ActivityDataGrid parameter. The PHP object injection exploit chain can leverage an __destruct magic method in guzzlehttp.
|
CWE-502
|
159,268 |
CVE-2021-25295
| 6.1 | 4.3 |
MEDIUM
|
OpenCATS through 0.9.5-3 has multiple Cross-site Scripting (XSS) issues.
|
CWE-79
|
159,269 |
CVE-2021-25296
| 8.8 | 9 |
HIGH
|
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
|
CWE-78
|
159,270 |
CVE-2021-25297
| 8.8 | 9 |
HIGH
|
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
|
CWE-78
|
159,271 |
CVE-2021-25298
| 8.8 | 9 |
HIGH
|
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/cloud-vm/cloud-vm.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
|
CWE-78
|
159,272 |
CVE-2021-25299
| 6.1 | 4.3 |
MEDIUM
|
Nagios XI version xi-5.7.5 is affected by cross-site scripting (XSS). The vulnerability exists in the file /usr/local/nagiosxi/html/admin/sshterm.php due to improper sanitization of user-controlled input. A maliciously crafted URL, when clicked by an admin user, can be used to steal his/her session cookies or it can be chained with the previous bugs to get one-click remote command execution (RCE) on the Nagios XI server.
|
CWE-79
|
159,273 |
CVE-2021-25306
| 7.5 | 7.8 |
HIGH
|
A buffer overflow vulnerability in the AT command interface of Gigaset DX600A v41.00-175 devices allows remote attackers to force a device reboot by sending relatively long AT commands.
|
CWE-120
|
159,274 |
CVE-2021-25309
| 9.8 | 5 |
CRITICAL
|
The telnet administrator service running on port 650 on Gigaset DX600A v41.00-175 devices does not implement any lockout or throttling functionality. This situation (together with the weak password policy that forces a 4-digit password) allows remote attackers to easily obtain administrative access via brute-force attacks.
|
CWE-269
|
159,275 |
CVE-2021-25310
| 8.8 | 9 |
HIGH
|
** UNSUPPORTED WHEN ASSIGNED ** The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 devices allows remote authenticated attackers to execute system commands with root privileges via shell metacharacters in the ui_language POST parameter to the apply.cgi form endpoint. This occurs in do_upgrade_post in mini_httpd. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
|
CWE-78
|
159,276 |
CVE-2021-25311
| 9.9 | 9 |
CRITICAL
|
condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.
|
CWE-22
|
159,277 |
CVE-2021-25312
| 8.8 | 6.5 |
HIGH
|
HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.
|
CWE-306
|
159,278 |
CVE-2021-25313
| 6.1 | 4.3 |
MEDIUM
|
A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6.
|
CWE-79
|
159,279 |
CVE-2021-25314
| 7.8 | 7.2 |
HIGH
|
A Creation of Temporary File With Insecure Permissions vulnerability in hawk2 of SUSE Linux Enterprise High Availability 12-SP3, SUSE Linux Enterprise High Availability 12-SP5, SUSE Linux Enterprise High Availability 15-SP2 allows local attackers to escalate to root. This issue affects: SUSE Linux Enterprise High Availability 12-SP3 hawk2 versions prior to 2.6.3+git.1614685906.812c31e9. SUSE Linux Enterprise High Availability 12-SP5 hawk2 versions prior to 2.6.3+git.1614685906.812c31e9. SUSE Linux Enterprise High Availability 15-SP2 hawk2 versions prior to 2.6.3+git.1614684118.af555ad9.
|
CWE-378
|
159,280 |
CVE-2021-25315
| 7.8 | 4.6 |
HIGH
|
A Incorrect Implementation of Authentication Algorithm vulnerability in of SUSE SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions.
|
CWE-303
|
159,281 |
CVE-2021-25316
| 3.3 | 2.1 |
LOW
|
A Insecure Temporary File vulnerability in s390-tools of SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-SP2 allows local attackers to prevent VM live migrations This issue affects: SUSE Linux Enterprise Server 12-SP5 s390-tools versions prior to 2.1.0-18.29.1. SUSE Linux Enterprise Server 15-SP2 s390-tools versions prior to 2.11.0-9.20.1.
|
CWE-377
|
159,282 |
CVE-2021-25317
| 3.3 | 2.1 |
LOW
|
A Incorrect Default Permissions vulnerability in the packaging of cups of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Leap 15.2, Factory allows local attackers with control of the lp users to create files as root with 0644 permissions without the ability to set the content. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS cups versions prior to 1.3.9. SUSE Manager Server 4.0 cups versions prior to 2.2.7. SUSE OpenStack Cloud Crowbar 9 cups versions prior to 1.7.5. openSUSE Leap 15.2 cups versions prior to 2.2.7. openSUSE Factory cups version 2.3.3op2-2.1 and prior versions.
|
CWE-276
|
159,283 |
CVE-2021-25318
| 8.8 | 6.5 |
HIGH
|
A Incorrect Permission Assignment for Critical Resource vulnerability in Rancher allows users in the cluster to modify resources they should not have access to. This issue affects: Rancher versions prior to 2.5.9 ; Rancher versions prior to 2.4.16.
|
CWE-732
|
159,284 |
CVE-2021-25319
| 7.8 | 7.2 |
HIGH
|
A Incorrect Default Permissions vulnerability in the packaging of virtualbox of openSUSE Factory allows local attackers in the vboxusers groupu to escalate to root. This issue affects: openSUSE Factory virtualbox version 6.1.20-1.1 and prior versions.
|
CWE-276
|
159,285 |
CVE-2021-25320
| 9.9 | 4 |
CRITICAL
|
A Improper Access Control vulnerability in Rancher, allows users in the cluster to make request to cloud providers by creating requests with the cloud-credential ID. Rancher in this case would attach the requested credentials without further checks This issue affects: Rancher versions prior to 2.5.9; Rancher versions prior to 2.4.16.
|
CWE-284
|
159,286 |
CVE-2021-25321
| 7.8 | 7.2 |
HIGH
|
A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions.
|
CWE-61
|
159,287 |
CVE-2021-25322
| 7.8 | 7.2 |
HIGH
|
A UNIX Symbolic Link (Symlink) Following vulnerability in python-HyperKitty of openSUSE Leap 15.2, Factory allows local attackers to escalate privileges from the user hyperkitty or hyperkitty-admin to root. This issue affects: openSUSE Leap 15.2 python-HyperKitty version 1.3.2-lp152.2.3.1 and prior versions. openSUSE Factory python-HyperKitty versions prior to 1.3.4-5.1.
|
CWE-61
|
159,288 |
CVE-2021-25323
| 9.1 | 6.4 |
CRITICAL
|
The default setting of MISP 2.4.136 did not enable the requirements (aka require_password_confirmation) to provide the previous password when changing a password.
|
CWE-640
|
159,289 |
CVE-2021-25324
| 6.1 | 4.3 |
MEDIUM
|
MISP 2.4.136 has Stored XSS in the galaxy cluster view via a cluster name to app/View/GalaxyClusters/view.ctp.
|
CWE-79
|
159,290 |
CVE-2021-25325
| 6.1 | 4.3 |
MEDIUM
|
MISP 2.4.136 has XSS via galaxy cluster element values to app/View/GalaxyElements/ajax/index.ctp. Reference types could contain javascript: URLs.
|
CWE-79
|
159,291 |
CVE-2021-25326
| 5.4 | 3.5 |
MEDIUM
|
Skyworth Digital Technology RN510 V.3.1.0.4 is affected by an incorrect access control vulnerability in/cgi-bin/test_version.asp. If Wi-Fi is connected but an unauthenticated user visits a URL, the SSID password and web UI password may be disclosed.
|
CWE-79
|
159,292 |
CVE-2021-25327
| 6.5 | 4.3 |
MEDIUM
|
Skyworth Digital Technology RN510 V.3.1.0.4 contains a cross-site request forgery (CSRF) vulnerability in /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp. Missing CSRF protection in devices can lead to XSRF, as the above pages are vulnerable to cross-site scripting (XSS).
|
CWE-352
|
159,293 |
CVE-2021-25328
| 8.8 | 6.5 |
HIGH
|
Skyworth Digital Technology RN510 V.3.1.0.4 RN510 V.3.1.0.4 contains a buffer overflow vulnerability in /cgi-bin/app-staticIP.asp. An authenticated attacker can send a specially crafted request to endpoint which can lead to a denial of service (DoS) or possible code execution on the device.
|
CWE-120
|
159,294 |
CVE-2021-25329
| 7 | 4.4 |
HIGH
|
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.
|
NVD-CWE-noinfo
|
159,295 |
CVE-2021-25330
| 7.5 | 5 |
HIGH
|
Calling of non-existent provider in MobileWips application prior to SMR Feb-2021 Release 1 allows unauthorized actions including denial of service attack by hijacking the provider.
|
NVD-CWE-noinfo
|
159,296 |
CVE-2021-25331
| 2.4 | 1.9 |
LOW
|
Improper access control in Samsung Pay mini application prior to v4.0.14 allows unauthorized access to balance information over the lockscreen in specific condition.
|
CWE-200
|
159,297 |
CVE-2021-25332
| 2.4 | 1.9 |
LOW
|
Improper access control in Samsung Pay mini application prior to v4.0.14 allows unauthorized access to contacts information over the lockscreen in specific condition.
|
CWE-200
|
159,298 |
CVE-2021-25333
| 2.4 | 1.9 |
LOW
|
Improper access control in Samsung Pay mini application prior to v4.0.14 allows unauthorized access to balance information over the lockscreen via scanning specific QR code.
|
CWE-200
|
159,299 |
CVE-2021-25334
| 5.5 | 4.7 |
MEDIUM
|
Improper input check in wallpaper service in Samsung mobile devices prior to SMR Feb-2021 Release 1 allows untrusted application to cause permanent denial of service.
|
CWE-20
|
159,300 |
CVE-2021-25335
| 2.5 | 1.9 |
LOW
|
Improper lockscreen status check in cocktailbar service in Samsung mobile devices prior to SMR Mar-2021 Release 1 allows unauthenticated users to access hidden notification contents over the lockscreen in specific condition.
|
NVD-CWE-noinfo
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.