ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
159,701 |
CVE-2021-25978
| 5.4 | 3.5 |
MEDIUM
|
Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.
|
CWE-79
|
159,702 |
CVE-2021-25979
| 9.8 | 7.5 |
CRITICAL
|
Apostrophe CMS versions between 2.63.0 to 3.3.1 affected by an insufficient session expiration vulnerability, which allows unauthenticated remote attackers to hijack recently logged-in users' sessions.
|
CWE-613
|
159,703 |
CVE-2021-25980
| 8.8 | 6.8 |
HIGH
|
In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
|
CWE-74
|
159,704 |
CVE-2021-25982
| 6.1 | 4.3 |
MEDIUM
|
In Factor (App Framework & Headless CMS) forum plugin, versions 1.3.5 to 1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “search” parameter in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.
|
CWE-79
|
159,705 |
CVE-2021-25983
| 6.1 | 4.3 |
MEDIUM
|
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.8 to v1.8.30, are vulnerable to reflected Cross-Site Scripting (XSS) at the “tags” and “category” parameters in the URL. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.
|
CWE-79
|
159,706 |
CVE-2021-25984
| 6.1 | 4.3 |
MEDIUM
|
In Factor (App Framework & Headless CMS) forum plugin, versions v1.3.3 to v1.8.30, are vulnerable to stored Cross-Site Scripting (XSS) at the “post reply” section. An unauthenticated attacker can execute malicious JavaScript code and steal the session cookies.
|
CWE-79
|
159,707 |
CVE-2021-25985
| 9.8 | 7.5 |
CRITICAL
|
In Factor (App Framework & Headless CMS) v1.0.4 to v1.8.30, improperly invalidate a user’s session even after the user logs out of the application. In addition, user sessions are stored in the browser’s local storage, which by default does not have an expiration time. This makes it possible for an attacker to steal and reuse the cookies using techniques such as XSS attacks, followed by a local account takeover.
|
CWE-613
|
159,708 |
CVE-2021-25986
| 5.4 | 3.5 |
MEDIUM
|
In Django-wiki, versions 0.0.20 to 0.7.8 are vulnerable to Stored Cross-Site Scripting (XSS) in Notifications Section. An attacker who has access to edit pages can inject JavaScript payload in the title field. When a victim gets a notification regarding the changes made in the application, the payload in the notification panel renders and loads external JavaScript.
|
CWE-79
|
159,709 |
CVE-2021-25987
| 4.6 | 1.9 |
MEDIUM
|
Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.
|
CWE-79
|
159,710 |
CVE-2021-26023
| 6.1 | 4.3 |
MEDIUM
|
The Favorites component before 1.0.2 for Nagios XI 5.8.0 is vulnerable to XSS.
|
CWE-79
|
159,711 |
CVE-2021-26024
| 5.3 | 5 |
MEDIUM
|
The Favorites component before 1.0.2 for Nagios XI 5.8.0 is vulnerable to Insecure Direct Object Reference: it is possible to create favorites for any other user account.
|
NVD-CWE-noinfo
|
159,712 |
CVE-2021-26025
| 7.8 | 6.8 |
HIGH
|
PlugIns\IDE_ACDStd.apl in ACDSee Professional 2021 14.0 1721 has a User Mode Write Access Violation starting at IDE_ACDStd!zlibVersion+0x0000000000004e5e via a crafted BMP image.
|
CWE-863
|
159,713 |
CVE-2021-26026
| 7.8 | 6.8 |
HIGH
|
PlugIns\IDE_ACDStd.apl in ACDSee Professional 2021 14.0 1721 has a User Mode Write Access Violation starting at IDE_ACDStd!JPEGTransW+0x000000000000c7f4 via a crafted BMP image.
|
CWE-863
|
159,714 |
CVE-2021-26027
| 5.3 | 5 |
MEDIUM
|
An issue was discovered in Joomla! 3.0.0 through 3.9.24. Incorrect ACL checks could allow unauthorized change of the category for an article.
|
CWE-668
|
159,715 |
CVE-2021-26028
| 5.5 | 4.3 |
MEDIUM
|
An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path.
|
CWE-22
|
159,716 |
CVE-2021-26029
| 5.3 | 5 |
MEDIUM
|
An issue was discovered in Joomla! 1.6.0 through 3.9.24. Inadequate filtering of form contents could allow to overwrite the author field.
|
CWE-20
|
159,717 |
CVE-2021-26030
| 6.1 | 4.3 |
MEDIUM
|
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error page
|
CWE-79
|
159,718 |
CVE-2021-26031
| 5.3 | 5 |
MEDIUM
|
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate filters on module layout settings could lead to an LFI.
|
NVD-CWE-noinfo
|
159,719 |
CVE-2021-26032
| 6.1 | 4.3 |
MEDIUM
|
An issue was discovered in Joomla! 3.0.0 through 3.9.26. HTML was missing in the executable block list of MediaHelper::canUpload, leading to XSS attack vectors.
|
CWE-79
|
159,720 |
CVE-2021-26033
| 6.5 | 4.3 |
MEDIUM
|
An issue was discovered in Joomla! 3.0.0 through 3.9.26. A missing token check causes a CSRF vulnerability in the AJAX reordering endpoint.
|
CWE-352
|
159,721 |
CVE-2021-26034
| 6.5 | 4.3 |
MEDIUM
|
An issue was discovered in Joomla! 3.0.0 through 3.9.26. A missing token check causes a CSRF vulnerability in data download endpoints in com_banners and com_sysinfo.
|
CWE-352
|
159,722 |
CVE-2021-26035
| 6.1 | 4.3 |
MEDIUM
|
An issue was discovered in Joomla! 3.0.0 through 3.9.27. Inadequate escaping in the rules field of the JForm API leads to a XSS vulnerability.
|
CWE-79
|
159,723 |
CVE-2021-26036
| 7.5 | 5 |
HIGH
|
An issue was discovered in Joomla! 2.5.0 through 3.9.27. Missing validation of input could lead to a broken usergroups table.
|
CWE-20
|
159,724 |
CVE-2021-26037
| 5.3 | 5 |
MEDIUM
|
An issue was discovered in Joomla! 2.5.0 through 3.9.27. CMS functions did not properly termine existing user sessions when a user's password was changed or the user was blocked.
|
CWE-613
|
159,725 |
CVE-2021-26038
| 7.5 | 4.3 |
HIGH
|
An issue was discovered in Joomla! 2.5.0 through 3.9.27. Install action in com_installer lack the required hardcoded ACL checks for superusers. A default system is not affected cause the default ACL for com_installer is limited to super users already.
|
CWE-754
|
159,726 |
CVE-2021-26039
| 6.1 | 4.3 |
MEDIUM
|
An issue was discovered in Joomla! 3.0.0 through 3.9.27. Inadequate escaping in the imagelist view of com_media leads to a XSS vulnerability.
|
CWE-79
|
159,727 |
CVE-2021-26040
| 9.1 | 6.4 |
CRITICAL
|
An issue was discovered in Joomla! 4.0.0. The media manager does not correctly check the user's permissions before executing a file deletion command.
|
CWE-863
|
159,728 |
CVE-2021-26067
| 5.3 | 5 |
MEDIUM
|
Affected versions of Atlassian Bamboo allow an unauthenticated remote attacker to view a stack trace that may reveal the path for the home directory in disk and if certain files exists on the tmp directory, via a Sensitive Data Exposure vulnerability in the /chart endpoint. The affected versions are before version 7.2.2.
|
CWE-200
|
159,729 |
CVE-2021-26068
| 8.8 | 9 |
HIGH
|
An endpoint in Atlassian Jira Server for Slack plugin from version 0.0.3 before version 2.0.15 allows remote attackers to execute arbitrary code via a template injection vulnerability.
|
CWE-74
|
159,730 |
CVE-2021-26069
| 5.3 | 5 |
MEDIUM
|
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to download temporary files and enumerate project keys via an Information Disclosure vulnerability in the /rest/api/1.0/issues/{id}/ActionsAndOperations API endpoint. The affected versions are before version 8.5.11, from version 8.6.0 before 8.13.3, and from version 8.14.0 before 8.15.0.
|
CWE-74
|
159,731 |
CVE-2021-26070
| 7.2 | 6.4 |
HIGH
|
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `makeRequest` gadget resource. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1.
|
CWE-287
|
159,732 |
CVE-2021-26071
| 3.5 | 3.5 |
LOW
|
The SetFeatureEnabled.jspa resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to enable and disable Jira Software configuration via a cross-site request forgery (CSRF) vulnerability.
|
CWE-352
|
159,733 |
CVE-2021-26072
| 4.3 | 4 |
MEDIUM
|
The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.
|
CWE-918
|
159,734 |
CVE-2021-26073
| 7.7 | 4 |
HIGH
|
Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Express versions between 3.0.2 - 6.5.0 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
|
CWE-863
|
159,735 |
CVE-2021-26074
| 6.5 | 4 |
MEDIUM
|
Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions between 1.1.0 - 2.1.2 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
|
CWE-863
|
159,736 |
CVE-2021-26075
| 4.3 | 4 |
MEDIUM
|
The Jira importers plugin AttachTemporaryFile rest resource in Jira Server and Data Center before version 8.5.12, from version 8.6.0 before 8.13.4, and from version 8.14.0 before 8.15.1 allowed remote authenticated attackers to obtain the full path of the Jira application data directory via an information disclosure vulnerability in the error message when presented with an invalid filename.
|
NVD-CWE-noinfo
|
159,737 |
CVE-2021-26076
| 3.7 | 4.3 |
LOW
|
The jira.editor.user.mode cookie set by the Jira Editor Plugin in Jira Server and Data Center before version 8.5.12, from version 8.6.0 before version 8.13.4, and from version 8.14.0 before version 8.15.0 allows remote anonymous attackers who can perform an attacker in the middle attack to learn which mode a user is editing in due to the cookie not being set with a secure attribute if Jira was configured to use https.
|
NVD-CWE-noinfo
|
159,738 |
CVE-2021-26077
| 8.8 | 6.5 |
HIGH
|
Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
|
CWE-287
|
159,739 |
CVE-2021-26078
| 6.1 | 4.3 |
MEDIUM
|
The number range searcher component in Jira Server and Jira Data Center before version 8.5.14, from version 8.6.0 before version 8.13.6, and from version 8.14.0 before version 8.16.1 allows remote attackers inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability.
|
CWE-79
|
159,740 |
CVE-2021-26079
| 6.1 | 4.3 |
MEDIUM
|
The CardLayoutConfigTable component in Jira Server and Jira Data Center before version 8.5.15, and from version 8.6.0 before version 8.13.7, and from version 8.14.0 before 8.17.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability.
|
CWE-79
|
159,741 |
CVE-2021-26080
| 6.1 | 4.3 |
MEDIUM
|
EditworkflowScheme.jspa in Jira Server and Jira Data Center before version 8.5.14, and from version 8.6.0 before version 8.13.6, and from 8.14.0 before 8.16.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability.
|
CWE-79
|
159,742 |
CVE-2021-26081
| 5.3 | 5 |
MEDIUM
|
REST API in Atlassian Jira Server and Jira Data Center before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1 allows remote attackers to enumerate usernames via a Sensitive Data Exposure vulnerability in the `/rest/api/latest/user/avatar/temporary` endpoint.
|
NVD-CWE-noinfo
|
159,743 |
CVE-2021-26082
| 5.4 | 3.5 |
MEDIUM
|
The XML Export in Atlassian Jira Server and Jira Data Center before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.17.0 allows remote attackers to inject arbitrary HTML or JavaScript via a stored cross site scripting vulnerability.
|
CWE-79
|
159,744 |
CVE-2021-26083
| 5.4 | 3.5 |
MEDIUM
|
Export HTML Report in Atlassian Jira Server and Jira Data Center before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability.
|
CWE-79
|
159,745 |
CVE-2021-26084
| 9.8 | 7.5 |
CRITICAL
|
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
|
CWE-74
|
159,746 |
CVE-2021-26085
| 5.3 | 5 |
MEDIUM
|
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.
|
CWE-862
|
159,747 |
CVE-2021-26086
| 5.3 | 5 |
MEDIUM
|
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
|
CWE-22
|
159,748 |
CVE-2021-26088
| 9.6 | 5.8 |
CRITICAL
|
An improper authentication vulnerability in FSSO Collector version 5.0.295 and below may allow an unauthenticated user to bypass a FSSO firewall policy and access the protected network via sending specifically crafted UDP login notification packets.
|
CWE-287
|
159,749 |
CVE-2021-26089
| 7.8 | 7.2 |
HIGH
|
An improper symlink following in FortiClient for Mac 6.4.3 and below may allow an non-privileged user to execute arbitrary privileged shell commands during installation phase.
|
CWE-59
|
159,750 |
CVE-2021-26090
| 7.5 | 5 |
HIGH
|
A missing release of memory after its effective lifetime vulnerability in the Webmail of FortiMail 6.4.0 through 6.4.4 and 6.2.0 through 6.2.6 may allow an unauthenticated remote attacker to exhaust available memory via specifically crafted login requests.
|
CWE-401
|
159,751 |
CVE-2021-26095
| 8.8 | 6.5 |
HIGH
|
The combination of various cryptographic issues in the session management of FortiMail 6.4.0 through 6.4.4 and 6.2.0 through 6.2.6, including the encryption construction of the session cookie, may allow a remote attacker already in possession of a cookie to possibly reveal and alter or forge its content, thereby escalating privileges.
|
CWE-327
|
159,752 |
CVE-2021-26096
| 8.8 | 6.5 |
HIGH
|
Multiple instances of heap-based buffer overflow in the command shell of FortiSandbox before 4.0.0 may allow an authenticated attacker to manipulate memory and alter its content by means of specifically crafted command line arguments.
|
CWE-787
|
159,753 |
CVE-2021-26097
| 8.8 | 6.5 |
HIGH
|
An improper neutralization of special elements used in an OS Command vulnerability in FortiSandbox 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6 may allow an authenticated attacker with access to the web GUI to execute unauthorized code or commands via specifically crafted HTTP requests.
|
CWE-78
|
159,754 |
CVE-2021-26098
| 7.5 | 5 |
HIGH
|
An instance of small space of random values in the RPC API of FortiSandbox before 4.0.0 may allow an attacker in possession of a few information pieces about the state of the device to possibly predict valid session IDs.
|
CWE-330
|
159,755 |
CVE-2021-26099
| 4.9 | 4 |
MEDIUM
|
Missing cryptographic steps in the Identity-Based Encryption service of FortiMail before 7.0.0 may allow an attacker who comes in possession of the encrypted master keys to compromise their confidentiality by observing a few invariant properties of the ciphertext.
|
CWE-327
|
159,756 |
CVE-2021-26100
| 7.5 | 5 |
HIGH
|
A missing cryptographic step in the Identity-Based Encryption service of FortiMail before 7.0.0 may allow an unauthenticated attacker who intercepts the encrypted messages to manipulate them in such a way that makes the tampering and the recovery of the plaintexts possible.
|
CWE-311
|
159,757 |
CVE-2021-26103
| 8.8 | 5.1 |
HIGH
|
An insufficient verification of data authenticity vulnerability (CWE-345) in the user interface of FortiProxy verison 2.0.3 and below, 1.2.11 and below and FortiGate verison 7.0.0, 6.4.6 and below, 6.2.9 and below of SSL VPN portal may allow a remote, unauthenticated attacker to conduct a cross-site request forgery (CSRF) attack . Only SSL VPN in web mode or full mode are impacted by this vulnerability.
|
CWE-345
|
159,758 |
CVE-2021-26106
| 7.8 | 4.6 |
HIGH
|
An improper neutralization of special elements used in an OS Command vulnerability in FortiAP's console 6.4.1 through 6.4.5 and 6.2.4 through 6.2.5 may allow an authenticated attacker to execute unauthorized commands by running the kdbg CLI command with specifically crafted arguments.
|
CWE-78
|
159,759 |
CVE-2021-26107
| 4.3 | 4 |
MEDIUM
|
An improper access control vulnerability [CWE-284] in FortiManager versions 6.4.4 and 6.4.5 may allow an authenticated attacker with a restricted user profile to modify the VPN tunnel status of other VDOMs using VPN Manager.
|
CWE-863
|
159,760 |
CVE-2021-26108
| 7.5 | 5 |
HIGH
|
A use of hard-coded cryptographic key vulnerability in the SSLVPN of FortiOS before 7.0.1 may allow an attacker to retrieve the key by reverse engineering.
|
CWE-798
|
159,761 |
CVE-2021-26109
| 9.8 | 7.5 |
CRITICAL
|
An integer overflow or wraparound vulnerability in the memory allocator of SSLVPN in FortiOS before 7.0.1 may allow an unauthenticated attacker to corrupt control data on the heap via specifically crafted requests to SSLVPN, resulting in potentially arbitrary code execution.
|
CWE-190
|
159,762 |
CVE-2021-26110
| 7.8 | 4.6 |
HIGH
|
An improper access control vulnerability [CWE-284] in FortiOS autod daemon 7.0.0, 6.4.6 and below, 6.2.9 and below, 6.0.12 and below and FortiProxy 2.0.1 and below, 1.2.9 and below may allow an authenticated low-privileged attacker to escalate their privileges to super_admin via a specific crafted configuration of fabric automation CLI script and auto-script features.
|
CWE-269
|
159,763 |
CVE-2021-26111
| 6.5 | 3.3 |
MEDIUM
|
A missing release of memory after effective lifetime vulnerability in FortiSwitch 6.4.0 to 6.4.6, 6.2.0 to 6.2.6, 6.0.0 to 6.0.6, 3.6.11 and below may allow an attacker on an adjacent network to exhaust available memory by sending specifically crafted LLDP/CDP/EDP packets to the device.
|
CWE-401
|
159,764 |
CVE-2021-26117
| 7.5 | 5 |
HIGH
|
The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.
|
CWE-287
|
159,765 |
CVE-2021-26118
| 7.5 | 5 |
HIGH
|
While investigating ARTEMIS-2964 it was found that the creation of advisory messages in the OpenWire protocol head of Apache ActiveMQ Artemis 2.15.0 bypassed policy based access control for the entire session. Production of advisory messages was not subject to access control in error.
|
CWE-287
|
159,766 |
CVE-2021-26119
| 7.5 | 5 |
HIGH
|
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
|
NVD-CWE-noinfo
|
159,767 |
CVE-2021-26120
| 9.8 | 7.5 |
CRITICAL
|
Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.
|
CWE-94
|
159,768 |
CVE-2021-26122
| 6.1 | 4.3 |
MEDIUM
|
LivingLogic XIST4C before 0.107.8 allows XSS via feedback.htm or feedback.wihtm.
|
CWE-79
|
159,769 |
CVE-2021-26123
| 6.1 | 4.3 |
MEDIUM
|
LivingLogic XIST4C before 0.107.8 allows XSS via login.htm, login.wihtm, or login-form.htm.
|
CWE-79
|
159,770 |
CVE-2021-26194
| 6.5 | 4.3 |
MEDIUM
|
An issue was discovered in JerryScript 2.4.0. There is a heap-use-after-free in ecma_is_lexical_environment in the ecma-helpers.c file.
|
CWE-416
|
159,771 |
CVE-2021-26195
| 8.8 | 6.8 |
HIGH
|
An issue was discovered in JerryScript 2.4.0. There is a heap-buffer-overflow in lexer_parse_number in js-lexer.c file.
|
CWE-787
|
159,772 |
CVE-2021-26197
| 6.5 | 4.3 |
MEDIUM
|
An issue was discovered in JerryScript 2.4.0. There is a SEGV in main_print_unhandled_exception in main-utils.c file.
|
CWE-754
|
159,773 |
CVE-2021-26198
| 6.5 | 4.3 |
MEDIUM
|
An issue was discovered in JerryScript 2.4.0. There is a SEVG in ecma_deref_bigint in ecma-helpers.c file.
|
NVD-CWE-noinfo
|
159,774 |
CVE-2021-26199
| 6.5 | 4.3 |
MEDIUM
|
An issue was discovered in JerryScript 2.4.0. There is a heap-use-after-free in ecma_bytecode_ref in ecma-helpers.c file.
|
CWE-416
|
159,775 |
CVE-2021-26200
| 9.8 | 7.5 |
CRITICAL
|
The user area for Library System 1.0 is vulnerable to SQL injection where a user can bypass the authentication and login as the admin user.
|
CWE-89
|
159,776 |
CVE-2021-26201
| 9.8 | 7.5 |
CRITICAL
|
The Login Panel of CASAP Automated Enrollment System 1.0 is vulnerable to SQL injection authentication bypass. An attacker can obtain access to the admin panel by injecting a SQL query in the username field of the login page.
|
CWE-89
|
159,777 |
CVE-2021-26215
| 4.3 | 4.3 |
MEDIUM
|
SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditDocument.php.
|
CWE-352
|
159,778 |
CVE-2021-26216
| 4.3 | 4.3 |
MEDIUM
|
SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditFolder.php.
|
CWE-352
|
159,779 |
CVE-2021-26220
| 8.1 | 5.8 |
HIGH
|
The ezxml_toxml function in ezxml 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.
|
CWE-787
|
159,780 |
CVE-2021-26221
| 8.1 | 5.8 |
HIGH
|
The ezxml_new function in ezXML 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.
|
CWE-787
|
159,781 |
CVE-2021-26222
| 8.1 | 5.8 |
HIGH
|
The ezxml_new function in ezXML 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.
|
CWE-787
|
159,782 |
CVE-2021-26223
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to view_pay.php.
|
CWE-89
|
159,783 |
CVE-2021-26224
| 6.1 | 4.3 |
MEDIUM
|
Cross-site scripting (XSS) vulnerability in SourceCodester Fantastic-Blog-CMS V 1.0 allows remote attackers to inject arbitrary web script or HTML via the search field to search.php.
|
CWE-79
|
159,784 |
CVE-2021-26226
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to edit_user.php.
|
CWE-89
|
159,785 |
CVE-2021-26227
| 6.1 | 4.3 |
MEDIUM
|
Cross-site scripting (XSS) vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to inject arbitrary web script or HTML via the student information parameters to edit_stud.php.
|
CWE-79
|
159,786 |
CVE-2021-26228
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to edit_class1.php.
|
CWE-89
|
159,787 |
CVE-2021-26229
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to edit_stud.php.
|
CWE-89
|
159,788 |
CVE-2021-26230
| 6.1 | 4.3 |
MEDIUM
|
Cross-site scripting (XSS) vulnerability in SourceCodester CASAP Automated Enrollment System v 1.0 allows remote attackers to inject arbitrary web script or HTML via the user information to save_user.php.
|
CWE-79
|
159,789 |
CVE-2021-26231
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in SourceCodester Fantastic Blog CMS v 1.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to category.php.
|
CWE-89
|
159,790 |
CVE-2021-26232
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in SourceCodester Simple College Website v 1.0 allows remote attackers to execute arbitrary SQL statements via the id parameter to news.php.
|
CWE-89
|
159,791 |
CVE-2021-26233
| 7.8 | 6.8 |
HIGH
|
FastStone Image Viewer <= 7.5 is affected by a user mode write access violation near NULL at 0x005bdfcb, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
|
CWE-787
|
159,792 |
CVE-2021-26234
| 7.8 | 6.8 |
HIGH
|
FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d8a, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
|
CWE-787
|
159,793 |
CVE-2021-26235
| 7.8 | 6.8 |
HIGH
|
FastStone Image Viewer <= 7.5 is affected by a user mode write access violation near NULL at 0x005bdfc9, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
|
CWE-476
|
159,794 |
CVE-2021-26236
| 7.8 | 6.8 |
HIGH
|
FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file.
|
CWE-787
|
159,795 |
CVE-2021-26237
| 7.8 | 6.8 |
HIGH
|
FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d7d, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
|
CWE-787
|
159,796 |
CVE-2021-26248
| 5.5 | 2.1 |
MEDIUM
|
Philips MRI 1.5T and MRI 3T Version 5.x.x assigns an owner who is outside the intended control sphere to a resource.
|
CWE-708
|
159,797 |
CVE-2021-26260
| 5.5 | 4.3 |
MEDIUM
|
An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR. This is a different flaw from CVE-2021-23215.
|
CWE-400
|
159,798 |
CVE-2021-26262
| 5.5 | 5 |
MEDIUM
|
Philips MRI 1.5T and MRI 3T Version 5.x.x does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
|
CWE-284
|
159,799 |
CVE-2021-26266
| 7.5 | 5 |
HIGH
|
cPanel before 92.0.9 allows a Reseller to bypass the suspension lock (SEC-578).
|
NVD-CWE-Other
|
159,800 |
CVE-2021-26267
| 7.5 | 5 |
HIGH
|
cPanel before 92.0.9 allows a MySQL user (who has an old-style password hash) to bypass suspension (SEC-579).
|
NVD-CWE-Other
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.