ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
159,601 |
CVE-2021-25831
| 9.8 | 7.5 |
CRITICAL
|
A file extension handling issue was found in [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v5.6.3. An attacker must request the conversion of the crafted file from PPTT into PPTX format. Using the chain of two other bugs related to improper string handling, a remote attacker can obtain remote code execution on DocumentServer.
|
NVD-CWE-noinfo
|
159,602 |
CVE-2021-25832
| 9.8 | 7.5 |
CRITICAL
|
A heap buffer overflow vulnerability inside of BMP image processing was found at [core] module of ONLYOFFICE DocumentServer v4.0.0-9-v6.0.0. Using this vulnerability, an attacker is able to gain remote code executions on DocumentServer.
|
CWE-787
|
159,603 |
CVE-2021-25833
| 9.8 | 7.5 |
CRITICAL
|
A file extension handling issue was found in [server] module of ONLYOFFICE DocumentServer v4.2.0.71-v5.6.0.21. The file extension is controlled by an attacker through the request data and leads to arbitrary file overwriting. Using this vulnerability, a remote attacker can obtain remote code execution on DocumentServer.
|
CWE-22
|
159,604 |
CVE-2021-25834
| 7.5 | 5 |
HIGH
|
Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application.
|
CWE-294
|
159,605 |
CVE-2021-25835
| 7.5 | 5 |
HIGH
|
Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, which enables "cross-chain transaction replay" attack.
|
CWE-294
|
159,606 |
CVE-2021-25836
| 7.5 | 5 |
HIGH
|
Cosmos Network Ethermint <= v0.4.0 is affected by cache lifecycle inconsistency in the EVM module. The bytecode set in a FAILED transaction wrongfully remains in memory(stateObject.code) and is further written to persistent store at the Endblock stage, which may be utilized to build honeypot contracts.
|
NVD-CWE-noinfo
|
159,607 |
CVE-2021-25837
| 7.5 | 5 |
HIGH
|
Cosmos Network Ethermint <= v0.4.0 is affected by cache lifecycle inconsistency in the EVM module. Due to the inconsistency between the Storage caching cycle and the Tx processing cycle, Storage changes caused by a failed transaction are improperly reserved in memory. Although the bad storage cache data will be discarded at EndBlock, it is still valid in the current block, which enables many possible attacks such as an "arbitrary mint token".
|
NVD-CWE-noinfo
|
159,608 |
CVE-2021-25838
| 6.1 | 4.3 |
MEDIUM
|
The Import function in MintHCM RELEASE 3.0.8 allows an attacker to execute a cross-site scripting (XSS) payload in file-upload.
|
CWE-79
|
159,609 |
CVE-2021-25839
| 9.8 | 5 |
CRITICAL
|
A weak password requirement vulnerability exists in the Create New User function of MintHCM RELEASE 3.0.8, which could lead an attacker to easier password brute-forcing.
|
CWE-521
|
159,610 |
CVE-2021-25845
| 7.5 | 5 |
HIGH
|
Improper validation of the ChassisID TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows attackers to cause a denial of service due to a NULL pointer dereference via a crafted lldp packet.
|
CWE-476
|
159,611 |
CVE-2021-25846
| 7.5 | 7.8 |
HIGH
|
Improper validation of the ChassisID TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows attackers to cause a denial of service due to a negative number passed to the memcpy function via a crafted lldp packet.
|
CWE-191
|
159,612 |
CVE-2021-25847
| 9.1 | 8.5 |
CRITICAL
|
Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows information disclosure to attackers due to controllable loop counter variable via a crafted lldp packet.
|
CWE-125
|
159,613 |
CVE-2021-25848
| 9.1 | 8.5 |
CRITICAL
|
Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows information disclosure to attackers due to using fixed loop counter variable without checking the actual available length via a crafted lldp packet.
|
CWE-125
|
159,614 |
CVE-2021-25849
| 7.5 | 7.8 |
HIGH
|
An integer underflow was discovered in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, improper validation of the PortID TLV leads to Denial of Service via a crafted lldp packet.
|
CWE-191
|
159,615 |
CVE-2021-25863
| 8.8 | 8.3 |
HIGH
|
Open5GS 2.1.3 listens on 0.0.0.0:3000 and has a default password of 1423 for the admin account.
|
CWE-798
|
159,616 |
CVE-2021-25864
| 7.5 | 5 |
HIGH
|
node-red-contrib-huemagic 3.0.0 is affected by hue/assets/..%2F Directory Traversal.in the res.sendFile API, used in file hue-magic.js, to fetch an arbitrary file.
|
CWE-22
|
159,617 |
CVE-2021-25874
| 7.5 | 5 |
HIGH
|
AVideo/YouPHPTube AVideo/YouPHPTube 10.0 and prior is affected by a SQL Injection SQL injection in the catName parameter which allows a remote unauthenticated attacker to retrieve databases information such as application passwords hashes.
|
CWE-89
|
159,618 |
CVE-2021-25875
| 6.1 | 4.3 |
MEDIUM
|
AVideo/YouPHPTube AVideo/YouPHPTube 10.0 and prior has multiple reflected Cross Script Scripting vulnerabilities via the searchPhrase parameter which allows a remote attacker to steal administrators' session cookies or perform actions as an administrator.
|
CWE-79
|
159,619 |
CVE-2021-25876
| 6.1 | 4.3 |
MEDIUM
|
AVideo/YouPHPTube 10.0 and prior has multiple reflected Cross Script Scripting vulnerabilities via the u parameter which allows a remote attacker to steal administrators' session cookies or perform actions as an administrator.
|
CWE-79
|
159,620 |
CVE-2021-25877
| 7.2 | 9 |
HIGH
|
AVideo/YouPHPTube 10.0 and prior is affected by Insecure file write. An administrator privileged user is able to write files on filesystem using flag and code variables in file save.php.
|
CWE-732
|
159,621 |
CVE-2021-25878
| 6.1 | 4.3 |
MEDIUM
|
AVideo/YouPHPTube 10.0 and prior is affected by multiple reflected Cross Script Scripting vulnerabilities via the videoName parameter which allows a remote attacker to steal administrators' session cookies or perform actions as an administrator.
|
CWE-79
|
159,622 |
CVE-2021-25893
| 5.4 | 3.5 |
MEDIUM
|
Magnolia CMS from 6.1.3 to 6.2.3 contains a stored cross-site scripting (XSS) vulnerability in the setText parameter of /magnoliaAuthor/.magnolia/.
|
CWE-79
|
159,623 |
CVE-2021-25894
| 6.1 | 4.3 |
MEDIUM
|
Magnolia CMS from 6.1.3 to 6.2.3 contains a stored cross-site scripting (XSS) vulnerability in the /magnoliaPublic/travel/members/login.html mgnlUserId parameter.
|
CWE-79
|
159,624 |
CVE-2021-25898
| 7.5 | 5 |
HIGH
|
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. Passwords are stored in unencrypted source-code text files. This was noted when accessing the svc-login.php file. The value is used to authenticate a high-privileged user upon authenticating with the server.
|
CWE-798
|
159,625 |
CVE-2021-25898
| 7.5 | 5 |
HIGH
|
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. Passwords are stored in unencrypted source-code text files. This was noted when accessing the svc-login.php file. The value is used to authenticate a high-privileged user upon authenticating with the server.
|
CWE-312
|
159,626 |
CVE-2021-25899
| 7.5 | 5 |
HIGH
|
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1.
|
CWE-89
|
159,627 |
CVE-2021-25900
| 9.8 | 7.5 |
CRITICAL
|
An issue was discovered in the smallvec crate before 0.6.14 and 1.x before 1.6.1 for Rust. There is a heap-based buffer overflow in SmallVec::insert_many.
|
CWE-787
|
159,628 |
CVE-2021-25901
| 5.3 | 5 |
MEDIUM
|
An issue was discovered in the lazy-init crate through 2021-01-17 for Rust. Lazy lacks a Send bound, leading to a data race.
|
NVD-CWE-noinfo
|
159,629 |
CVE-2021-25901
| 5.3 | 5 |
MEDIUM
|
An issue was discovered in the lazy-init crate through 2021-01-17 for Rust. Lazy lacks a Send bound, leading to a data race.
|
CWE-125
|
159,630 |
CVE-2021-25902
| 7.5 | 5 |
HIGH
|
An issue was discovered in the glsl-layout crate before 0.4.0 for Rust. When a panic occurs, map_array can perform a double drop.
|
NVD-CWE-noinfo
|
159,631 |
CVE-2021-25903
| 7.5 | 5 |
HIGH
|
An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced.
|
CWE-476
|
159,632 |
CVE-2021-25904
| 7.5 | 5 |
HIGH
|
An issue was discovered in the av-data crate before 0.3.0 for Rust. A raw pointer is dereferenced, leading to a read of an arbitrary memory address, sometimes causing a segfault.
|
CWE-476
|
159,633 |
CVE-2021-25905
| 9.1 | 6.4 |
CRITICAL
|
An issue was discovered in the bra crate before 0.1.1 for Rust. It lacks soundness because it can read uninitialized memory.
|
CWE-125
|
159,634 |
CVE-2021-25906
| 7.5 | 5 |
HIGH
|
An issue was discovered in the basic_dsp_matrix crate before 0.9.2 for Rust. When a TransformContent panic occurs, a double drop can be performed.
|
NVD-CWE-noinfo
|
159,635 |
CVE-2021-25907
| 9.8 | 7.5 |
CRITICAL
|
An issue was discovered in the containers crate before 0.9.11 for Rust. When a panic occurs, a util::{mutate,mutate2} double drop can be performed.
|
CWE-415
|
159,636 |
CVE-2021-25908
| 7.5 | 5 |
HIGH
|
An issue was discovered in the fil-ocl crate through 2021-01-04 for Rust. From<EventList> can lead to a double free.
|
CWE-415
|
159,637 |
CVE-2021-25909
| 7.5 | 5 |
HIGH
|
ZIV Automation 4CCT-EA6-334126BF firmware version 3.23.80.27.36371, allows an unauthenticated, remote attacker to cause a denial of service condition on the device. An attacker could exploit this vulnerability by sending specific packets to the port 7919.
|
CWE-400
|
159,638 |
CVE-2021-25910
| 6.5 | 3.3 |
MEDIUM
|
Improper Authentication vulnerability in the cookie parameter of ZIV AUTOMATION 4CCT-EA6-334126BF allows a local attacker to perform modifications in several parameters of the affected device as an authenticated user.
|
CWE-287
|
159,639 |
CVE-2021-25912
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'dotty' versions 0.0.1 through 0.1.0 allows attackers to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,640 |
CVE-2021-25913
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'set-or-get' version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,641 |
CVE-2021-25914
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'object-collider' versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,642 |
CVE-2021-25915
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'changeset' versions 0.0.1 through 0.2.5 allows an attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-noinfo
|
159,643 |
CVE-2021-25916
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,644 |
CVE-2021-25917
| 4.8 | 3.5 |
MEDIUM
|
In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the U2F USB Device authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.
|
CWE-79
|
159,645 |
CVE-2021-25918
| 4.8 | 3.5 |
MEDIUM
|
In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the TOTP Authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.
|
CWE-79
|
159,646 |
CVE-2021-25919
| 4.8 | 3.5 |
MEDIUM
|
In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.
|
CWE-79
|
159,647 |
CVE-2021-25920
| 6.5 | 5.5 |
MEDIUM
|
In OpenEMR, versions v2.7.2-rc1 to 6.0.0 are vulnerable to Improper Access Control when creating a new user, which leads to a malicious user able to read and send sensitive messages on behalf of the victim user.
|
CWE-863
|
159,648 |
CVE-2021-25921
| 5.4 | 3.5 |
MEDIUM
|
In OpenEMR, versions 2.7.3-rc1 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly in the `Allergies` section. An attacker could lure an admin to enter a malicious payload and by that initiate the exploit.
|
CWE-79
|
159,649 |
CVE-2021-25922
| 6.1 | 4.3 |
MEDIUM
|
In OpenEMR, versions 4.2.0 to 6.0.0 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly. An attacker could trick a user to click on a malicious url and execute malicious code.
|
CWE-79
|
159,650 |
CVE-2021-25923
| 8.1 | 6.8 |
HIGH
|
In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum password length limit. If a malicious user is aware of the first 72 characters of the victim user’s password, he can leverage it to an account takeover.
|
CWE-521
|
159,651 |
CVE-2021-25924
| 8.8 | 9.3 |
HIGH
|
In GoCD, versions 19.6.0 to 21.1.0 are vulnerable to Cross-Site Request Forgery due to missing CSRF protection at the `/go/api/config/backup` endpoint. An attacker can trick a victim to click on a malicious link which could change backup configurations or execute system commands in the post_backup_script field.
|
CWE-352
|
159,652 |
CVE-2021-25925
| 5.4 | 3.5 |
MEDIUM
|
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
|
CWE-79
|
159,653 |
CVE-2021-25926
| 6.1 | 4.3 |
MEDIUM
|
In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.
|
CWE-79
|
159,654 |
CVE-2021-25927
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,655 |
CVE-2021-25928
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'safe-obj' versions 1.0.0 through 1.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,656 |
CVE-2021-25929
| 4.8 | 3.5 |
MEDIUM
|
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on the input being sent to the `name` parameter in `noticeWizard` endpoint. Due to this flaw an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files.
|
CWE-79
|
159,657 |
CVE-2021-25930
| 4.3 | 4.3 |
MEDIUM
|
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection, and since there is no validation of an existing user name while renaming a user. As a result, privileges of the renamed user are being overwritten by the old user and the old user is being deleted from the user list.
|
CWE-352
|
159,658 |
CVE-2021-25931
| 8.8 | 6.8 |
HIGH
|
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupView/users/updateUser`. This flaw allows assigning `ROLE_ADMIN` security role to a normal user. Using this flaw, an attacker can trick the admin user to assign administrator privileges to a normal user by enticing him to click upon an attacker-controlled website.
|
CWE-352
|
159,659 |
CVE-2021-25932
| 5.4 | 3.5 |
MEDIUM
|
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `userID` parameter. Due to this flaw an attacker could inject an arbitrary script which will be stored in the database.
|
CWE-79
|
159,660 |
CVE-2021-25933
| 4.8 | 3.5 |
MEDIUM
|
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `groupName` and `groupComment` parameters. Due to this flaw, an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms.
|
CWE-79
|
159,661 |
CVE-2021-25934
| 5.4 | 3.5 |
MEDIUM
|
In OpenNMS Horizon, versions opennms-18.0.0-1 through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.7-1 are vulnerable to Stored Cross-Site Scripting, since the function `createRequisitionedNode()` does not perform any validation checks on the input sent to the `node-label` parameter. Due to this flaw an attacker could inject an arbitrary script which will be stored in the database.
|
CWE-79
|
159,662 |
CVE-2021-25935
| 5.4 | 3.5 |
MEDIUM
|
In OpenNMS Horizon, versions opennms-17.0.0-1 through opennms-27.1.0-1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.7-1 are vulnerable to Stored Cross-Site Scripting, since the function `add()` performs improper validation checks on the input sent to the `foreign-source` parameter. Due to this flaw an attacker could bypass the existing regex validation and inject an arbitrary script which will be stored in the database.
|
CWE-79
|
159,663 |
CVE-2021-25938
| 6.1 | 4.3 |
MEDIUM
|
In ArangoDB, versions v2.2.6.2 through v3.7.10 are vulnerable to Cross-Site Scripting (XSS), since there is no validation of the .zip file name and filtering of potential abusive characters which zip files can be named to. There is no X-Frame-Options Header set, which makes it more susceptible for leveraging self XSS by attackers.
|
CWE-79
|
159,664 |
CVE-2021-25940
| 8 | 6 |
HIGH
|
In ArangoDB, versions v3.7.6 through v3.8.3 are vulnerable to Insufficient Session Expiration. When a user’s password is changed by the administrator, the session isn’t invalidated, allowing a malicious user to still be logged in and perform arbitrary actions within the system.
|
CWE-613
|
159,665 |
CVE-2021-25941
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'deep-override' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,666 |
CVE-2021-25943
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in '101' versions 1.0.0 through 1.6.3 allows an attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,667 |
CVE-2021-25944
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'deep-defaults' versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,668 |
CVE-2021-25945
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'js-extend' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
|
CWE-915
|
159,669 |
CVE-2021-25946
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in `nconf-toml` versions 0.0.1 through 0.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,670 |
CVE-2021-25947
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,671 |
CVE-2021-25947
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
CWE-913
|
159,672 |
CVE-2021-25948
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'expand-hash' versions 0.1.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
CWE-915
|
159,673 |
CVE-2021-25949
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'set-getter' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
CWE-915
|
159,674 |
CVE-2021-25951
| 7.5 | 5 |
HIGH
|
XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service.
|
CWE-611
|
159,675 |
CVE-2021-25952
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in ‘just-safe-set’ versions 1.0.0 through 2.2.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
CWE-915
|
159,676 |
CVE-2021-25953
| 9.8 | 7.5 |
CRITICAL
|
Prototype pollution vulnerability in 'putil-merge' versions1.0.0 through 3.6.6 allows attacker to cause a denial of service and may lead to remote code execution.
|
NVD-CWE-Other
|
159,677 |
CVE-2021-25954
| 4.3 | 4 |
MEDIUM
|
In “Dolibarr” application, 2.8.1 to 13.0.4 don’t restrict or incorrectly restricts access to a resource from an unauthorized actor. A low privileged attacker can modify the Private Note which only an administrator has rights to do, the affected field is at “/adherents/note.php?id=1” endpoint.
|
CWE-863
|
159,678 |
CVE-2021-25955
| 9 | 6 |
CRITICAL
|
In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account takeover of the admin and due to other vulnerability (Improper Access Control on Private notes) a low privileged user can update the private notes which could lead to privilege escalation.
|
CWE-79
|
159,679 |
CVE-2021-25956
| 7.2 | 6.5 |
HIGH
|
In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name.
|
CWE-287
|
159,680 |
CVE-2021-25957
| 8.8 | 6.5 |
HIGH
|
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
|
CWE-640
|
159,681 |
CVE-2021-25958
| 7.5 | 5 |
HIGH
|
In Apache Ofbiz, versions v17.12.01 to v17.12.07 implement a try catch exception to handle errors at multiple locations but leaks out sensitive table info which may aid the attacker for further recon. A user can register with a very long password, but when he tries to login with it an exception occurs.
|
CWE-209
|
159,682 |
CVE-2021-25959
| 6.1 | 4.3 |
MEDIUM
|
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
|
CWE-79
|
159,683 |
CVE-2021-25960
| 8 | 6 |
HIGH
|
In “SuiteCRM” application, v7.11.18 through v7.11.19 and v7.10.29 through v7.10.31 are affected by “CSV Injection” vulnerability (Formula Injection). A low privileged attacker can use accounts module to inject payloads in the input fields. When an administrator access accounts module to export the data as a CSV file and opens it, the payload gets executed. This was not fixed properly as part of CVE-2020-15301, allowing the attacker to bypass the security measure.
|
CWE-1236
|
159,684 |
CVE-2021-25961
| 8 | 6 |
HIGH
|
In “SuiteCRM” application, v7.1.7 through v7.10.31 and v7.11-beta through v7.11.20 fail to properly invalidate password reset links that is associated with a deleted user id, which makes it possible for account takeover of any newly created user with the same user id.
|
CWE-640
|
159,685 |
CVE-2021-25962
| 8.8 | 6.8 |
HIGH
|
“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.
|
CWE-1236
|
159,686 |
CVE-2021-25963
| 6.1 | 4.3 |
MEDIUM
|
In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped.
|
CWE-79
|
159,687 |
CVE-2021-25964
| 5.4 | 3.5 |
MEDIUM
|
In “Calibre-web” application, v0.6.0 to v0.6.12, are vulnerable to Stored XSS in “Metadata”. An attacker that has access to edit the metadata information, can inject JavaScript payload in the description field. When a victim tries to open the file, XSS will be triggered.
|
CWE-79
|
159,688 |
CVE-2021-25965
| 8.8 | 6.8 |
HIGH
|
In Calibre-web, versions 0.6.0 to 0.6.13 are vulnerable to Cross-Site Request Forgery (CSRF). By luring an authenticated user to click on a link, an attacker can create a new user role with admin privileges and attacker-controlled credentials, allowing them to take over the application.
|
CWE-352
|
159,689 |
CVE-2021-25966
| 8.8 | 6.8 |
HIGH
|
In “Orchard core CMS” application, versions 1.0.0-beta1-3383 to 1.0.0 are vulnerable to an improper session termination after password change. When a password has been changed by the user or by an administrator, a user that was already logged in, will still have access to the application even after the password was changed.
|
CWE-613
|
159,690 |
CVE-2021-25967
| 5.4 | 3.5 |
MEDIUM
|
In CKAN, versions 2.9.0 to 2.9.3 are affected by a stored XSS vulnerability via SVG file upload of users’ profile picture. This allows low privileged application users to store malicious scripts in their profile picture. These scripts are executed in a victim’s browser when they open the malicious profile picture
|
CWE-79
|
159,691 |
CVE-2021-25968
| 5.4 | 3.5 |
MEDIUM
|
In “OpenCMS”, versions 10.5.0 to 11.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the Sitemap functionality. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field.
|
CWE-79
|
159,692 |
CVE-2021-25969
| 6.1 | 4.3 |
MEDIUM
|
In Camaleon CMS application, versions 0.0.1 to 2.6.0 are vulnerable to stored XSS, that allows an unauthenticated attacker to store malicious scripts in the comments section of the post. These scripts are executed in a victim’s browser when they open the page containing the malicious comment.
|
CWE-79
|
159,693 |
CVE-2021-25970
| 8.8 | 6.8 |
HIGH
|
Camaleon CMS 0.1.7 to 2.6.0 doesn’t terminate the active session of the users, even after the admin changes the user’s password. A user that was already logged in, will still have access to the application even after the password was changed.
|
CWE-613
|
159,694 |
CVE-2021-25971
| 4.3 | 4 |
MEDIUM
|
In Camaleon CMS, versions 2.0.1 to 2.6.0 are vulnerable to an Uncaught Exception. The app's media upload feature crashes permanently when an attacker with a low privileged access uploads a specially crafted .svg file
|
NVD-CWE-Other
|
159,695 |
CVE-2021-25972
| 4.9 | 4 |
MEDIUM
|
In Camaleon CMS, versions 2.1.2.0 to 2.6.0, are vulnerable to Server-Side Request Forgery (SSRF) in the media upload feature, which allows admin users to fetch media files from external URLs but fails to validate URLs referencing to localhost or other internal servers. This allows attackers to read files stored in the internal server.
|
CWE-918
|
159,696 |
CVE-2021-25973
| 6.5 | 6.4 |
MEDIUM
|
In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. “guest” role users can self-register even when the admin does not allow. This happens due to front-end restriction only.
|
CWE-863
|
159,697 |
CVE-2021-25974
| 5.4 | 3.5 |
MEDIUM
|
In Publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS. A user with a “publisher” role is able to inject and execute arbitrary JavaScript code while creating a page/article.
|
CWE-79
|
159,698 |
CVE-2021-25975
| 5.4 | 3.5 |
MEDIUM
|
In publify, versions v8.0 to v9.2.4 are vulnerable to stored XSS as a result of an unrestricted file upload. This issue allows a user with “publisher” role to inject malicious JavaScript via the uploaded html file.
|
CWE-79
|
159,699 |
CVE-2021-25976
| 8.1 | 4 |
HIGH
|
In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
|
CWE-352
|
159,700 |
CVE-2021-25977
| 5.4 | 3.5 |
MEDIUM
|
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.
|
CWE-79
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.