ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
159,501 |
CVE-2021-25643
| 4.9 | 4 |
MEDIUM
|
An issue was discovered in Couchbase Server 5.x and 6.x before 6.5.2 and 6.6.x before 6.6.2. Internal users with administrator privileges, @cbq-engine-cbauth and @index-cbauth, leak credentials in cleartext in the indexer.log file when they make a /listCreateTokens, /listRebalanceTokens, or /listMetadataTokens call.
|
CWE-319
|
159,502 |
CVE-2021-25644
| 7.5 | 5 |
HIGH
|
An issue was discovered in Couchbase Server 5.x and 6.x through 6.6.1 and 7.0.0 Beta. Incorrect commands to the REST API can result in leaked authentication information being stored in cleartext in the debug.log and info.log files, and is also shown in the UI visible to administrators.
|
CWE-312
|
159,503 |
CVE-2021-25645
| 4.4 | 2.1 |
MEDIUM
|
An issue was discovered in Couchbase Server before 6.0.5, 6.1.x through 6.5.x before 6.5.2, and 6.6.x before 6.6.1. An internal user with administrator privileges, @ns_server, leaks credentials in cleartext in the cbcollect_info.log, debug.log, ns_couchdb.log, indexer.log, and stats.log files. NOTE: updating the product does not automatically address leaks that occurred in the past.
|
CWE-312
|
159,504 |
CVE-2021-25646
| 8.8 | 9 |
HIGH
|
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
|
CWE-732
|
159,505 |
CVE-2021-25647
| 5.4 | 3.5 |
MEDIUM
|
Mobile application "Testes de Codigo" v11.3 and prior allows stored XSS by injecting a payload in the "feedback" message field causing it to be stored in the remote database and leading to its execution on client devices when loading the "feedback list", either by accessing the website directly or using the mobile application.
|
CWE-79
|
159,506 |
CVE-2021-25648
| 9.8 | 7.5 |
CRITICAL
|
Mobile application "Testes de Codigo" 11.4 and prior allows an attacker to gain access to the administrative interface and premium features by tampering the boolean value of parameters "isAdmin" and "isPremium" located on device storage.
|
CWE-863
|
159,507 |
CVE-2021-25649
| 5.5 | 2.1 |
MEDIUM
|
** UNSUPPORTED WHEN ASSIGNED ** An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Utility Services. This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects all 7.x versions of Avaya Aura Utility Services.
|
NVD-CWE-Other
|
159,508 |
CVE-2021-25650
| 8.8 | 4.6 |
HIGH
|
** UNSUPPORTED WHEN ASSIGNED ** A privilege escalation vulnerability was discovered in Avaya Aura Utility Services that may potentially allow a local user to execute specially crafted scripts as a privileged user. Affects all 7.x versions of Avaya Aura Utility Services.
|
CWE-269
|
159,509 |
CVE-2021-25651
| 7.8 | 4.6 |
HIGH
|
** UNSUPPORTED WHEN ASSIGNED ** A privilege escalation vulnerability was discovered in Avaya Aura Utility Services that may potentially allow a local user to escalate privileges. Affects all 7.x versions of Avaya Aura Utility Services.
|
CWE-269
|
159,510 |
CVE-2021-25652
| 5.5 | 2.1 |
MEDIUM
|
An information disclosure vulnerability was discovered in the directory and file management of Avaya Aura Appliance Virtualization Platform Utilities (AVPU). This vulnerability may potentially allow any local user to access system functionality and configuration information that should only be available to a privileged user. Affects versions 8.0.0.0 through 8.1.3.1 of AVPU.
|
CWE-863
|
159,511 |
CVE-2021-25653
| 7.8 | 4.6 |
HIGH
|
A privilege escalation vulnerability was discovered in Avaya Aura Appliance Virtualization Platform Utilities (AVPU) that may potentially allow a local user to escalate privileges. Affects 8.0.0.0 through 8.1.3.1 versions of AVPU.
|
CWE-269
|
159,512 |
CVE-2021-25654
| 7.8 | 4.6 |
HIGH
|
An arbitrary code execution vulnerability was discovered in Avaya Aura Device Services that may potentially allow a local user to execute specially crafted scripts. Affects 7.0 through 8.1.4.0 versions of Avaya Aura Device Services.
|
CWE-94
|
159,513 |
CVE-2021-25655
| 6.1 | 5.8 |
MEDIUM
|
A vulnerability in the system Service Menu component of Avaya Aura Experience Portal may allow URL Redirection to any untrusted site through a crafted attack. Affected versions include 7.0 through 7.2.3 (without hotfix) and 8.0.0 (without hotfix).
|
CWE-601
|
159,514 |
CVE-2021-25656
| 5.4 | 3.5 |
MEDIUM
|
Stored XSS injection vulnerabilities were discovered in the Avaya Aura Experience Portal Web management which could allow an authenticated user to potentially disclose sensitive information. Affected versions include 7.0 through 7.2.3 (without hotfix) and 8.0.0 (without hotfix).
|
CWE-79
|
159,515 |
CVE-2021-25659
| 7.5 | 5 |
HIGH
|
A vulnerability has been identified in Automation License Manager 5 (All versions), Automation License Manager 6 (All versions < V6.0 SP9 Update 2). Sending specially crafted packets to port 4410/tcp of an affected system could lead to extensive memory being consumed and as such could cause a denial-of-service preventing legitimate users from using the system.
|
CWE-400
|
159,516 |
CVE-2021-25660
| 7.5 | 5 |
HIGH
|
A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4). SmartVNC has an out-of-bounds memory access vulnerability that could be triggered on the server side when sending data from the client, which could result in a Denial-of-Service condition.
|
CWE-788
|
159,517 |
CVE-2021-25661
| 7.5 | 5 |
HIGH
|
A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4). SmartVNC has an out-of-bounds memory access vulnerability that could be triggered on the client side when sending data from the server, which could result in a Denial-of-Service condition.
|
CWE-788
|
159,518 |
CVE-2021-25662
| 7.5 | 5 |
HIGH
|
A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\" & 15\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\" - 22\" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4). SmartVNC client fails to handle an exception properly if the program execution process is modified after sending a packet from the server, which could result in a Denial-of-Service condition.
|
CWE-755
|
159,519 |
CVE-2021-25663
| 7.5 | 5 |
HIGH
|
A vulnerability has been identified in Capital VSTAR (Versions including affected IPv6 stack), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected IPv6 stack). The function that processes IPv6 headers does not check the lengths of extension header options, allowing attackers to put this function into an infinite loop with crafted length values.
|
CWE-835
|
159,520 |
CVE-2021-25663
| 7.5 | 5 |
HIGH
|
A vulnerability has been identified in Capital VSTAR (Versions including affected IPv6 stack), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected IPv6 stack). The function that processes IPv6 headers does not check the lengths of extension header options, allowing attackers to put this function into an infinite loop with crafted length values.
|
CWE-835
|
159,521 |
CVE-2021-25664
| 7.5 | 5 |
HIGH
|
A vulnerability has been identified in Capital VSTAR (Versions including affected IPv6 stack), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected IPv6 stack). The function that processes the Hop-by-Hop extension header in IPv6 packets and its options lacks any checks against the length field of the header, allowing attackers to put the function into an infinite loop by supplying arbitrary length values.
|
CWE-835
|
159,522 |
CVE-2021-25665
| 7.8 | 6.8 |
HIGH
|
A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions < V2021.2.1). The starview+.exe application lacks proper validation of user-supplied data when parsing scene files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13700)
|
CWE-787
|
159,523 |
CVE-2021-25666
| 4.3 | 3.3 |
MEDIUM
|
A vulnerability has been identified in SCALANCE W780 and W740 (IEEE 802.11n) family (All versions < V6.3). Sending specially crafted packets through the ARP protocol to an affected device could cause a partial denial-of-service, preventing the device to operate normally for a short period of time.
|
CWE-770
|
159,524 |
CVE-2021-25667
| 8.8 | 5.8 |
HIGH
|
A vulnerability has been identified in RUGGEDCOM RM1224 (All versions >= V4.3 and < V6.4), SCALANCE M-800 (All versions >= V4.3 and < V6.4), SCALANCE S615 (All versions >= V4.3 and < V6.4), SCALANCE SC-600 Family (All versions >= V2.0 and < V2.1.3), SCALANCE XB-200 (All versions < V4.1), SCALANCE XC-200 (All versions < V4.1), SCALANCE XF-200BA (All versions < V4.1), SCALANCE XM400 (All versions < V6.2), SCALANCE XP-200 (All versions < V4.1), SCALANCE XR-300WG (All versions < V4.1), SCALANCE XR500 (All versions < V6.2). Affected devices contain a stack-based buffer overflow vulnerability in the handling of STP BPDU frames that could allow a remote attacker to trigger a denial-of-service condition or potentially remote code execution. Successful exploitation requires the passive listening feature of the device to be active.
|
CWE-121
|
159,525 |
CVE-2021-25668
| 9.8 | 7.5 |
CRITICAL
|
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT PRO (All versions < 5.5.1), SCALANCE X202-2 IRT (All versions < 5.5.1), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All versions < 5.5.1), SCALANCE X202-2P IRT PRO (All versions < 5.5.1), SCALANCE X204 IRT (All versions < 5.5.1), SCALANCE X204 IRT PRO (All versions < 5.5.1), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2FM (All versions < V5.2.5), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2LD TS (All versions < V5.2.5), SCALANCE X204-2TS (All versions < V5.2.5), SCALANCE X206-1 (All versions < V5.2.5), SCALANCE X206-1LD (All versions < V5.2.5), SCALANCE X208 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X208PRO (All versions < V5.2.5), SCALANCE X212-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X212-2LD (All versions < V5.2.5), SCALANCE X216 (All versions < V5.2.5), SCALANCE X224 (All versions < V5.2.5), SCALANCE XF201-3P IRT (All versions < 5.5.1), SCALANCE XF202-2P IRT (All versions < 5.5.1), SCALANCE XF204 (All versions < V5.2.5), SCALANCE XF204 IRT (All versions < 5.5.1), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE XF204-2BA IRT (All versions < 5.5.1), SCALANCE XF206-1 (All versions < V5.2.5), SCALANCE XF208 (All versions < V5.2.5). Incorrect processing of POST requests in the webserver may result in write out of bounds in heap. An attacker might leverage this to cause denial-of-service on the device and potentially remotely execute code.
|
CWE-122
|
159,526 |
CVE-2021-25669
| 9.8 | 7.5 |
CRITICAL
|
A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT (All versions < 5.5.1), SCALANCE X201-3P IRT PRO (All versions < 5.5.1), SCALANCE X202-2 IRT (All versions < 5.5.1), SCALANCE X202-2P IRT (incl. SIPLUS NET variant) (All versions < 5.5.1), SCALANCE X202-2P IRT PRO (All versions < 5.5.1), SCALANCE X204 IRT (All versions < 5.5.1), SCALANCE X204 IRT PRO (All versions < 5.5.1), SCALANCE X204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2FM (All versions < V5.2.5), SCALANCE X204-2LD (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X204-2LD TS (All versions < V5.2.5), SCALANCE X204-2TS (All versions < V5.2.5), SCALANCE X206-1 (All versions < V5.2.5), SCALANCE X206-1LD (All versions < V5.2.5), SCALANCE X208 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X208PRO (All versions < V5.2.5), SCALANCE X212-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE X212-2LD (All versions < V5.2.5), SCALANCE X216 (All versions < V5.2.5), SCALANCE X224 (All versions < V5.2.5), SCALANCE XF201-3P IRT (All versions < 5.5.1), SCALANCE XF202-2P IRT (All versions < 5.5.1), SCALANCE XF204 (All versions < V5.2.5), SCALANCE XF204 IRT (All versions < 5.5.1), SCALANCE XF204-2 (incl. SIPLUS NET variant) (All versions < V5.2.5), SCALANCE XF204-2BA IRT (All versions < 5.5.1), SCALANCE XF206-1 (All versions < V5.2.5), SCALANCE XF208 (All versions < V5.2.5). Incorrect processing of POST requests in the web server may write out of bounds in stack. An attacker might leverage this to denial-of-service of the device or remote code execution.
|
CWE-121
|
159,527 |
CVE-2021-25670
| 7.8 | 6.8 |
HIGH
|
A vulnerability has been identified in Tecnomatix RobotExpert (All versions < V16.1). Affected applications lack proper validation of user-supplied data when parsing CELL files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12608)
|
CWE-787
|
159,528 |
CVE-2021-25671
| 4.3 | 3.3 |
MEDIUM
|
A vulnerability has been identified in RWG1.M12 (All versions < V1.16.16), RWG1.M12D (All versions < V1.16.16), RWG1.M8 (All versions < V1.16.16). Sending specially crafted ARP packets to an affected device could cause a partial denial-of-service, preventing the device to operate normally. A restart is needed to restore normal operations.
|
CWE-770
|
159,529 |
CVE-2021-25672
| 8.8 | 6.5 |
HIGH
|
A vulnerability has been identified in Mendix Forgot Password Appstore module (All Versions < V3.2.1). The Forgot Password Marketplace module does not properly control access. An attacker could take over accounts.
|
CWE-269
|
159,530 |
CVE-2021-25672
| 8.8 | 6.5 |
HIGH
|
A vulnerability has been identified in Mendix Forgot Password Appstore module (All Versions < V3.2.1). The Forgot Password Marketplace module does not properly control access. An attacker could take over accounts.
|
CWE-284
|
159,531 |
CVE-2021-25673
| 5.5 | 4.9 |
MEDIUM
|
A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, the application could enter an infinite loop, become unresponsive and must be restarted to restore the service.
|
CWE-835
|
159,532 |
CVE-2021-25674
| 5.5 | 2.1 |
MEDIUM
|
A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, a NULL pointer deference condition could cause the application to terminate unexpectedly and must be restarted to restore the service.
|
CWE-476
|
159,533 |
CVE-2021-25675
| 5.5 | 2.1 |
MEDIUM
|
A vulnerability has been identified in SIMATIC S7-PLCSIM V5.4 (All versions). An attacker with local access to the system could cause a Denial-of-Service condition in the application when it is used to open a specially crafted file. As a consequence, a divide by zero operation could occur and cause the application to terminate unexpectedly and must be restarted to restore the service.
|
CWE-369
|
159,534 |
CVE-2021-25676
| 7.5 | 5 |
HIGH
|
A vulnerability has been identified in RUGGEDCOM RM1224 (V6.3), SCALANCE M-800 (V6.3), SCALANCE S615 (V6.3), SCALANCE SC-600 (All Versions >= V2.1 and < V2.1.3). Multiple failed SSH authentication attempts could trigger a temporary Denial-of-Service under certain conditions. When triggered, the device will reboot automatically.
|
CWE-307
|
159,535 |
CVE-2021-25677
| 5.3 | 5 |
MEDIUM
|
A vulnerability has been identified in Capital VSTAR (Versions including affected DNS modules), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.3), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus ReadyStart V4 (All versions < V4.1.0), Nucleus Source Code (Versions including affected DNS modules), SIMOTICS CONNECT 400 (All versions < V0.5.0.0). The DNS client does not properly randomize DNS transaction IDs. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
|
CWE-330
|
159,536 |
CVE-2021-25678
| 7.8 | 6.8 |
HIGH
|
A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2020 (All versions < SE2020MP14), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12529)
|
CWE-787
|
159,537 |
CVE-2021-25679
| 5.4 | 3.5 |
MEDIUM
|
** UNSUPPORTED WHEN ASSIGNED ** The AdTran Personal Phone Manager software is vulnerable to an authenticated stored cross-site scripting (XSS) issues. These issues impact at minimum versions 10.8.1 and below but potentially impact later versions as well since they have not previously been disclosed. Only version 10.8.1 was able to be confirmed during primary research. NOTE: The affected appliances NetVanta 7060 and NetVanta 7100 are considered End of Life and as such this issue will not be patched.
|
CWE-79
|
159,538 |
CVE-2021-25680
| 6.1 | 4.3 |
MEDIUM
|
** UNSUPPORTED WHEN ASSIGNED ** The AdTran Personal Phone Manager software is vulnerable to multiple reflected cross-site scripting (XSS) issues. These issues impact at minimum versions 10.8.1 and below but potentially impact later versions as well since they have not previously been disclosed. Only version 10.8.1 was able to be confirmed during primary research. NOTE: The affected appliances NetVanta 7060 and NetVanta 7100 are considered End of Life and as such this issue will not be patched.
|
CWE-79
|
159,539 |
CVE-2021-25681
| 7.5 | 5 |
HIGH
|
** UNSUPPORTED WHEN ASSIGNED ** AdTran Personal Phone Manager 10.8.1 software is vulnerable to an issue that allows for exfiltration of data over DNS. This could allow for exposed AdTran Personal Phone Manager web servers to be used as DNS redirectors to tunnel arbitrary data over DNS. NOTE: The affected appliances NetVanta 7060 and NetVanta 7100 are considered End of Life and as such this issue will not be patched.
|
NVD-CWE-noinfo
|
159,540 |
CVE-2021-25682
| 7.8 | 7.2 |
HIGH
|
It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.
|
CWE-20
|
159,541 |
CVE-2021-25683
| 7.8 | 7.2 |
HIGH
|
It was discovered that the get_starttime() function in data/apport did not properly parse the /proc/pid/stat file from the kernel.
|
CWE-20
|
159,542 |
CVE-2021-25684
| 7.8 | 4.6 |
HIGH
|
It was discovered that apport in data/apport did not properly open a report file to prevent hanging reads on a FIFO.
|
CWE-20
|
159,543 |
CVE-2021-25688
| 5.5 | 2.1 |
MEDIUM
|
Under certain conditions, Teradici PCoIP Agents for Windows prior to version 20.10.0 and Teradici PCoIP Agents for Linux prior to version 21.01.0 may log parts of a user's password in the application logs.
|
CWE-532
|
159,544 |
CVE-2021-25689
| 9.8 | 7.5 |
CRITICAL
|
An out of bounds write in Teradici PCoIP soft client versions prior to version 20.10.1 could allow an attacker to remotely execute code.
|
CWE-787
|
159,545 |
CVE-2021-25690
| 7.5 | 5 |
HIGH
|
A null pointer dereference in Teradici PCoIP Soft Client versions prior to 20.07.3 could allow an attacker to crash the software.
|
CWE-476
|
159,546 |
CVE-2021-25692
| 4.6 | 2.1 |
MEDIUM
|
Sensitive smart card data is logged in default INFO logs by Teradici's PCoIP Connection Manager and Security Gateway prior to version 21.01.3.
|
CWE-312
|
159,547 |
CVE-2021-25693
| 7.5 | 5 |
HIGH
|
An attacker may cause a Denial of Service (DoS) in multiple versions of Teradici PCoIP Agent via a null pointer dereference.
|
CWE-476
|
159,548 |
CVE-2021-25694
| 7.8 | 4.4 |
HIGH
|
Teradici PCoIP Graphics Agent for Windows prior to 21.03 does not validate NVENC.dll. An attacker could replace the .dll and redirect pixels elsewhere.
|
CWE-427
|
159,549 |
CVE-2021-25695
| 7.8 | 4.6 |
HIGH
|
The USB vHub in the Teradici PCOIP Software Agent prior to version 21.07.0 would accept commands from any program, which may allow an attacker to elevate privileges by changing the flow of program execution within the vHub driver.
|
NVD-CWE-Other
|
159,550 |
CVE-2021-25698
| 7.8 | 4.4 |
HIGH
|
The OpenSSL component of the Teradici PCoIP Standard Agent prior to version 21.07.0 was compiled without the no-autoload-config option, which allowed an attacker to elevate to the privileges of the running process via placing a specially crafted dll in a build configuration directory.
|
CWE-426
|
159,551 |
CVE-2021-25699
| 7.8 | 4.4 |
HIGH
|
The OpenSSL component of the Teradici PCoIP Software Client prior to version 21.07.0 was compiled without the no-autoload-config option, which allowed an attacker to elevate to the privileges of the running process via placing a specially crafted dll in a build configuration directory.
|
CWE-426
|
159,552 |
CVE-2021-25701
| 5.5 | 2.1 |
MEDIUM
|
The fUSBHub driver in the PCoIP Software Client prior to version 21.07.0 had an error in object management during the handling of a variety of IOCTLs, which allowed an attacker to cause a denial of service.
|
CWE-401
|
159,553 |
CVE-2021-25735
| 6.5 | 5.5 |
MEDIUM
|
A security issue was discovered in kube-apiserver that could allow node updates to bypass a Validating Admission Webhook. Clusters are only affected by this vulnerability if they run a Validating Admission Webhook for Nodes that denies admission based at least partially on the old state of the Node object. Validating Admission Webhook does not observe some previous fields.
|
CWE-863
|
159,554 |
CVE-2021-25737
| 4.8 | 4.9 |
MEDIUM
|
A security issue was discovered in Kubernetes where a user may be able to redirect pod traffic to private networks on a Node. Kubernetes already prevents creation of Endpoint IPs in the localhost or link-local range, but the same validation was not performed on EndpointSlice IPs.
|
CWE-601
|
159,555 |
CVE-2021-25738
| 6.7 | 4.6 |
MEDIUM
|
Loading specially-crafted yaml with the Kubernetes Java Client library can lead to code execution.
|
CWE-20
|
159,556 |
CVE-2021-25740
| 3.1 | 3.5 |
LOW
|
A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.
|
CWE-610
|
159,557 |
CVE-2021-25741
| 8.1 | 5.5 |
HIGH
|
A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.
|
CWE-552
|
159,558 |
CVE-2021-25742
| 7.1 | 5.5 |
HIGH
|
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the custom snippets feature to obtain all secrets in the cluster.
|
NVD-CWE-noinfo
|
159,559 |
CVE-2021-25755
| 2.5 | 1.9 |
LOW
|
In JetBrains Code With Me before 2020.3, an attacker on the local network, knowing a session ID, could get access to the encrypted traffic.
|
CWE-862
|
159,560 |
CVE-2021-25756
| 5.3 | 5 |
MEDIUM
|
In JetBrains IntelliJ IDEA before 2020.2, HTTP links were used for several remote repositories instead of HTTPS.
|
NVD-CWE-noinfo
|
159,561 |
CVE-2021-25757
| 6.1 | 5.8 |
MEDIUM
|
In JetBrains Hub before 2020.1.12629, an open redirect was possible.
|
CWE-601
|
159,562 |
CVE-2021-25758
| 7.8 | 4.6 |
HIGH
|
In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to local code execution.
|
CWE-502
|
159,563 |
CVE-2021-25759
| 6.5 | 4 |
MEDIUM
|
In JetBrains Hub before 2020.1.12629, an authenticated user can delete 2FA settings of any other user.
|
CWE-732
|
159,564 |
CVE-2021-25760
| 5.3 | 5 |
MEDIUM
|
In JetBrains Hub before 2020.1.12669, information disclosure via the public API was possible.
|
CWE-200
|
159,565 |
CVE-2021-25761
| 5.3 | 5 |
MEDIUM
|
In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible.
|
CWE-327
|
159,566 |
CVE-2021-25762
| 5.3 | 5 |
MEDIUM
|
In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible.
|
CWE-444
|
159,567 |
CVE-2021-25763
| 5.3 | 5 |
MEDIUM
|
In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default.
|
CWE-327
|
159,568 |
CVE-2021-25764
| 5.3 | 5 |
MEDIUM
|
In JetBrains PhpStorm before 2020.3, source code could be added to debug logs.
|
NVD-CWE-noinfo
|
159,569 |
CVE-2021-25765
| 8.8 | 6.8 |
HIGH
|
In JetBrains YouTrack before 2020.4.4701, CSRF via attachment upload was possible.
|
CWE-352
|
159,570 |
CVE-2021-25766
| 5.3 | 5 |
MEDIUM
|
In JetBrains YouTrack before 2020.4.4701, improper resource access checks were made.
|
NVD-CWE-noinfo
|
159,571 |
CVE-2021-25767
| 5.3 | 5 |
MEDIUM
|
In JetBrains YouTrack before 2020.6.1767, an issue's existence could be disclosed via YouTrack command execution.
|
CWE-200
|
159,572 |
CVE-2021-25768
| 5.3 | 5 |
MEDIUM
|
In JetBrains YouTrack before 2020.4.4701, permissions for attachments actions were checked improperly.
|
CWE-732
|
159,573 |
CVE-2021-25769
| 7.5 | 5 |
HIGH
|
In JetBrains YouTrack before 2020.4.6808, the YouTrack administrator wasn't able to access attachments.
|
NVD-CWE-noinfo
|
159,574 |
CVE-2021-25770
| 9.8 | 7.5 |
CRITICAL
|
In JetBrains YouTrack before 2020.5.3123, server-side template injection (SSTI) was possible, which could lead to code execution.
|
CWE-94
|
159,575 |
CVE-2021-25771
| 4.3 | 5 |
MEDIUM
|
In JetBrains YouTrack before 2020.6.1099, project information could be potentially disclosed.
|
CWE-200
|
159,576 |
CVE-2021-25772
| 5.3 | 5 |
MEDIUM
|
In JetBrains TeamCity before 2020.2.2, TeamCity server DoS was possible via server integration.
|
NVD-CWE-noinfo
|
159,577 |
CVE-2021-25773
| 6.1 | 4.3 |
MEDIUM
|
JetBrains TeamCity before 2020.2 was vulnerable to reflected XSS on several pages.
|
CWE-79
|
159,578 |
CVE-2021-25774
| 4.3 | 4 |
MEDIUM
|
In JetBrains TeamCity before 2020.2.1, a user could get access to the GitHub access token of another user.
|
CWE-863
|
159,579 |
CVE-2021-25775
| 3.8 | 5.5 |
LOW
|
In JetBrains TeamCity before 2020.2.1, the server admin could create and see access tokens for any other users.
|
CWE-732
|
159,580 |
CVE-2021-25776
| 7.5 | 5 |
HIGH
|
In JetBrains TeamCity before 2020.2, an ECR token could be exposed in a build's parameters.
|
CWE-922
|
159,581 |
CVE-2021-25777
| 5.3 | 5 |
MEDIUM
|
In JetBrains TeamCity before 2020.2.1, permissions during token removal were checked improperly.
|
CWE-863
|
159,582 |
CVE-2021-25778
| 5.3 | 5 |
MEDIUM
|
In JetBrains TeamCity before 2020.2.1, permissions during user deletion were checked improperly.
|
CWE-732
|
159,583 |
CVE-2021-25779
| 9.8 | 7.5 |
CRITICAL
|
Baby Care System v1.0 is vulnerable to SQL injection via the 'id' parameter on the contentsectionpage.php page.
|
CWE-89
|
159,584 |
CVE-2021-25780
| 7.2 | 6.5 |
HIGH
|
An arbitrary file upload vulnerability has been identified in posts.php in Baby Care System 1.0. The vulnerability could be exploited by an remote attacker to upload content to the server, including PHP files, which could result in command execution and obtaining a shell.
|
CWE-434
|
159,585 |
CVE-2021-25783
| 7.2 | 6.5 |
HIGH
|
Taocms v2.5Beta5 was discovered to contain a blind SQL injection vulnerability via the function Article Search.
|
CWE-89
|
159,586 |
CVE-2021-25784
| 7.2 | 6.5 |
HIGH
|
Taocms v2.5Beta5 was discovered to contain a blind SQL injection vulnerability via the function Edit Article.
|
CWE-89
|
159,587 |
CVE-2021-25785
| 4.8 | 3.5 |
MEDIUM
|
Taocms v2.5Beta5 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Management column.
|
CWE-79
|
159,588 |
CVE-2021-25790
| 5.4 | 3.5 |
MEDIUM
|
Multiple stored cross site scripting (XSS) vulnerabilities in the "Register" module of House Rental and Property Listing 1.0 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payloads in all text fields except for Phone Number and Alternate Phone Number.
|
CWE-79
|
159,589 |
CVE-2021-25791
| 5.4 | 3.5 |
MEDIUM
|
Multiple stored cross site scripting (XSS) vulnerabilities in the "Update Profile" module of Online Doctor Appointment System 1.0 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payloads in the First Name, Last Name, and Address text fields.
|
CWE-79
|
159,590 |
CVE-2021-25801
| 7.1 | 5.8 |
HIGH
|
A buffer overflow vulnerability in the __Parse_indx component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file.
|
CWE-120
|
159,591 |
CVE-2021-25802
| 7.1 | 5.8 |
HIGH
|
A buffer overflow vulnerability in the AVI_ExtractSubtitle component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file.
|
CWE-120
|
159,592 |
CVE-2021-25803
| 7.1 | 5.8 |
HIGH
|
A buffer overflow vulnerability in the vlc_input_attachment_New component of VideoLAN VLC Media Player 3.0.11 allows attackers to cause an out-of-bounds read via a crafted .avi file.
|
CWE-120
|
159,593 |
CVE-2021-25804
| 7.5 | 5 |
HIGH
|
A NULL-pointer dereference in "Open" in avi.c of VideoLAN VLC Media Player 3.0.11 can a denial of service (DOS) in the application.
|
CWE-476
|
159,594 |
CVE-2021-25808
| 7.8 | 6.8 |
HIGH
|
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.
|
CWE-94
|
159,595 |
CVE-2021-25809
| 5.3 | 5 |
MEDIUM
|
UCMS 1.5.0 was discovered to contain a physical path leakage via an error message returned by the adminchannelscache() function in top.php.
|
CWE-200
|
159,596 |
CVE-2021-25810
| 6.1 | 4.3 |
MEDIUM
|
Cross site Scripting (XSS) vulnerability in MERCUSYS Mercury X18G 1.0.5 devices, via crafted values to the 'src_dport_start', 'src_dport_end', and 'dest_port' parameters.
|
CWE-79
|
159,597 |
CVE-2021-25811
| 7.5 | 7.8 |
HIGH
|
MERCUSYS Mercury X18G 1.0.5 devices allow Denial of service via a crafted value to the POST listen_http_lan parameter. Upon subsequent device restarts after this vulnerability is exploted the device will not be able to access the webserver unless the listen_http_lan parameter to uhttpd.json is manually fixed.
|
NVD-CWE-noinfo
|
159,598 |
CVE-2021-25812
| 9.8 | 7.5 |
CRITICAL
|
Command injection vulnerability in China Mobile An Lianbao WF-1 1.01 via the 'ip' parameter with a POST request to /api/ZRQos/set_online_client.
|
CWE-77
|
159,599 |
CVE-2021-25829
| 7.5 | 7.8 |
HIGH
|
An improper binary stream data handling issue was found in the [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. Using this bug, an attacker is able to produce a denial of service attack that can eventually shut down the target server.
|
NVD-CWE-noinfo
|
159,600 |
CVE-2021-25830
| 9.8 | 7.5 |
CRITICAL
|
A file extension handling issue was found in [core] module of ONLYOFFICE DocumentServer v4.2.0.236-v5.6.4.13. An attacker must request the conversion of the crafted file from DOCT into DOCX format. Using the chain of two other bugs related to improper string handling, an attacker can achieve remote code execution on DocumentServer.
|
NVD-CWE-noinfo
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.