ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
159,901 |
CVE-2021-26564
| 8.7 | 5.8 |
HIGH
|
Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session.
|
CWE-319
|
159,902 |
CVE-2021-26565
| 5.9 | 4.3 |
MEDIUM
|
Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to obtain sensitive information via an HTTP session.
|
CWE-319
|
159,903 |
CVE-2021-26566
| 9 | 6.8 |
CRITICAL
|
Insertion of sensitive information into sent data vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary commands via inbound QuickConnect traffic.
|
CWE-200
|
159,904 |
CVE-2021-26567
| 8.8 | 6.5 |
HIGH
|
Stack-based buffer overflow vulnerability in frontend/main.c in faad2 before 2.2.7.1 allow local attackers to execute arbitrary code via filename and pathname options.
|
NVD-CWE-Other
|
159,905 |
CVE-2021-26569
| 8.1 | 6.8 |
HIGH
|
Race Condition within a Thread vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests.
|
CWE-362
|
159,906 |
CVE-2021-26570
| 7.8 | 7.2 |
HIGH
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webifc_setadconfig function.
|
CWE-120
|
159,907 |
CVE-2021-26571
| 7.8 | 7.2 |
HIGH
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webgetactivexcfg function.
|
CWE-120
|
159,908 |
CVE-2021-26572
| 7.8 | 7.2 |
HIGH
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webgetactivexcfg function.
|
CWE-120
|
159,909 |
CVE-2021-26573
| 7.8 | 7.2 |
HIGH
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webgeneratesslcfg function.
|
CWE-120
|
159,910 |
CVE-2021-26574
| 7.8 | 7.2 |
HIGH
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a path traversal vulnerability in libifc.so webdeletevideofile function.
|
CWE-22
|
159,911 |
CVE-2021-26575
| 7.8 | 7.2 |
HIGH
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a path traversal vulnerability in libifc.so webdeletesolvideofile function.
|
CWE-22
|
159,912 |
CVE-2021-26576
| 7.8 | 7.2 |
HIGH
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a command injection vulnerability in libifc.so uploadsshkey function.
|
CWE-77
|
159,913 |
CVE-2021-26577
| 7.8 | 7.2 |
HIGH
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so uploadsshkey function.
|
CWE-120
|
159,914 |
CVE-2021-26578
| 7.5 | 5 |
HIGH
|
A potential security vulnerability has been identified in HPE Network Orchestrator (NetO) version(s): Prior to 2.5. The vulnerability could be remotely exploited with SQL injection.
|
CWE-89
|
159,915 |
CVE-2021-26579
| 5.5 | 2.1 |
MEDIUM
|
A security vulnerability in HPE Unified Data Management (UDM) could allow the local disclosure of privileged information (CWE-321: Use of Hard-coded Cryptographic Key in a product). HPE has provided updates to versions 1.2009.0 and 1.2101.0 of HPE Unified Data Management (UDM). Version 1.2103.0 of HPE Unified Data Management (UDM) removes all hard-coded cryptographic keys.
|
CWE-312
|
159,916 |
CVE-2021-26580
| 6.1 | 4.3 |
MEDIUM
|
A potential security vulnerability has been identified in HPE iLO Amplifier Pack. The vulnerability could be remotely exploited to allow Cross-Site Scripting (XSS). HPE has provided the following software update to resolve the vulnerability in HPE iLO Amplifier Pack: HPE iLO Amplifier Pack 1.95 or later.
|
CWE-79
|
159,917 |
CVE-2021-26581
| 6.5 | 4 |
MEDIUM
|
A potential security vulnerability has been identified in HPE Superdome Flex server. A denial of service attack can be remotely exploited leaving hung connections to the BMC web interface. The monarch BMC must be rebooted to recover from this situation. Other BMC management is not impacted. HPE has made the following software update to resolve the vulnerability in HPE Superdome Flex Server: Superdome Flex Server Firmware 3.30.142 or later.
|
NVD-CWE-noinfo
|
159,918 |
CVE-2021-26582
| 6.1 | 4.3 |
MEDIUM
|
A security vulnerability in HPE IceWall SSO Domain Gateway Option (Dgfw) module version 10.0 on RHEL 5/6/7, version 10.0 on HP-UX 11i v3, version 10.0 on Windows and 11.0 on Windows could be exploited remotely to allow cross-site scripting (XSS).
|
CWE-79
|
159,919 |
CVE-2021-26583
| 9.8 | 7.5 |
CRITICAL
|
A potential security vulnerability was identified in HPE iLO Amplifier Pack. The vulnerabilities could be remotely exploited to allow remote code execution.
|
NVD-CWE-noinfo
|
159,920 |
CVE-2021-26584
| 6.1 | 4.3 |
MEDIUM
|
A security vulnerability in HPE OneView for VMware vCenter (OV4VC) could be exploited remotely to allow Cross-Site Scripting. HPE has released the following software update to resolve the vulnerability in HPE OneView for VMware vCenter (OV4VC).
|
CWE-79
|
159,921 |
CVE-2021-26585
| 5.5 | 2.1 |
MEDIUM
|
A potential vulnerability has been identified in HPE OneView Global Dashboard release 2.31 which could lead to a local disclosure of privileged information. HPE has provided an update to OneView Global Dashboard. The issue is resolved in 2.32.
|
CWE-668
|
159,922 |
CVE-2021-26586
| 7.5 | 5 |
HIGH
|
A potential security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to disclose sensitive information. HPE has made software updates available to resolve the vulnerability in the HPE Edgeline Infrastructure Manager (EIM).
|
NVD-CWE-noinfo
|
159,923 |
CVE-2021-26587
| 6.5 | 6 |
MEDIUM
|
A potential DOM-based Cross Site Scripting security vulnerability has been identified in HPE StoreOnce. The vulnerability could be remotely exploited to cause an elevation of privilege leading to partial impact to confidentiality, availability, and integrity. HPE has made the following software update - HPE StoreOnce 4.3.0, to resolve the vulnerability in HPE StoreOnce.
|
CWE-79
|
159,924 |
CVE-2021-26588
| 9.8 | 10 |
CRITICAL
|
A potential security vulnerability has been identified in HPE 3PAR StoreServ, HPE Primera Storage and HPE Alletra 9000 Storage array firmware. An unauthenticated user could remotely exploit the low complexity issue to execute code as administrator. This vulnerability impacts completely the confidentiality, integrity, availability of the array. HPE has made the following software updates and mitigation information to resolve the vulnerability in 3PAR, Primera and Alletra 9000 firmware.
|
NVD-CWE-noinfo
|
159,925 |
CVE-2021-26589
| 6.1 | 4.3 |
MEDIUM
|
A potential security vulnerability has been identified in HPE Superdome Flex Servers. The vulnerability could be remotely exploited to allow Cross Site Scripting (XSS) because the Session Cookie is missing an HttpOnly Attribute. HPE has provided a firmware update to resolve the vulnerability in HPE Superdome Flex Servers.
|
CWE-79
|
159,926 |
CVE-2021-26593
| 7.5 | 5 |
HIGH
|
** UNSUPPORTED WHEN ASSIGNED ** In Directus 8.x through 8.8.1, an attacker can see all users in the CMS using the API /users/{id}. For each call, they get in response a lot of information about the user (such as email address, first name, and last name) but also the secret for 2FA if one exists. This secret can be regenerated. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
CWE-200
|
159,927 |
CVE-2021-26594
| 8.8 | 6.5 |
HIGH
|
** UNSUPPORTED WHEN ASSIGNED ** In Directus 8.x through 8.8.1, an attacker can switch to the administrator role (via the PATCH method) without any control by the back end. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
CWE-269
|
159,928 |
CVE-2021-26595
| 5.3 | 5 |
MEDIUM
|
** UNSUPPORTED WHEN ASSIGNED ** In Directus 8.x through 8.8.1, an attacker can learn sensitive information such as the version of the CMS, the PHP version used by the site, and the name of the DBMS, simply by view the result of the api-aa, called automatically upon a connection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
CWE-312
|
159,929 |
CVE-2021-26596
| 5.4 | 3.5 |
MEDIUM
|
An issue was discovered in Nokia NetAct 18A. A malicious user can change a filename of an uploaded file to include JavaScript code, which is then stored and executed by a victim's web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. Here, the /netact/sct filename parameter is used.
|
CWE-79
|
159,930 |
CVE-2021-26597
| 6.5 | 4 |
MEDIUM
|
An issue was discovered in Nokia NetAct 18A. A remote user, authenticated to the NOKIA NetAct Web Page, can visit the Site Configuration Tool web site section and arbitrarily upload potentially dangerous files without restrictions via the /netact/sct dir parameter in conjunction with the operation=upload value.
|
CWE-434
|
159,931 |
CVE-2021-26603
| 7.8 | 6.8 |
HIGH
|
A heap overflow issue was found in ARK library of bandisoft Co., Ltd when the Ark_DigPathA function parsed a file path. This vulnerability is due to missing support for string length check.
|
CWE-787
|
159,932 |
CVE-2021-26605
| 9.8 | 7.5 |
CRITICAL
|
An improper input validation vulnerability in the service of ezPDFReader allows attacker to execute arbitrary command. This issue occurred when the ezPDF launcher received and executed crafted input values through JSON-RPC communication.
|
CWE-20
|
159,933 |
CVE-2021-26606
| 9.8 | 10 |
CRITICAL
|
A vulnerability in PKI Security Solution of Dream Security could allow arbitrary command execution. This vulnerability is due to insufficient validation of the authorization certificate. An attacker could exploit this vulnerability by sending a crafted HTTP request an affected program. A successful exploit could allow the attacker to remotely execute arbitrary code on a target system.
|
CWE-20
|
159,934 |
CVE-2021-26606
| 9.8 | 10 |
CRITICAL
|
A vulnerability in PKI Security Solution of Dream Security could allow arbitrary command execution. This vulnerability is due to insufficient validation of the authorization certificate. An attacker could exploit this vulnerability by sending a crafted HTTP request an affected program. A successful exploit could allow the attacker to remotely execute arbitrary code on a target system.
|
CWE-120
|
159,935 |
CVE-2021-26607
| 9.8 | 10 |
CRITICAL
|
An Improper input validation in execDefaultBrowser method of NEXACRO17 allows a remote attacker to execute arbitrary command on affected systems.
|
CWE-20
|
159,936 |
CVE-2021-26608
| 9.8 | 7.5 |
CRITICAL
|
An arbitrary file download and execution vulnerability was found in the HShell.dll of handysoft Co., Ltd groupware ActiveX module. This issue is due to missing support for integrity check of download URL or downloaded file hash.
|
CWE-345
|
159,937 |
CVE-2021-26609
| 7.5 | 5 |
HIGH
|
A vulnerability was found in Mangboard(WordPress plugin). A SQL-Injection vulnerability was found in order_type parameter. The order_type parameter makes a SQL query using unfiltered data. This vulnerability allows a remote attacker to steal user information.
|
CWE-89
|
159,938 |
CVE-2021-26610
| 8.8 | 6.5 |
HIGH
|
The move_uploaded_file function in godomall5 does not perform an integrity check of extension or authority when user upload file. This vulnerability allows an attacker to execute an remote arbitrary code.
|
CWE-345
|
159,939 |
CVE-2021-26611
| 9.8 | 7.5 |
CRITICAL
|
HejHome GKW-IC052 IP Camera contained a hard-coded credentials vulnerability. This issue allows remote attackers to operate the IP Camera.(reboot, factory reset, snapshot etc..)
|
CWE-798
|
159,940 |
CVE-2021-26612
| 9.8 | 7.5 |
CRITICAL
|
An improper input validation leading to arbitrary file creation was discovered in copy method of Nexacro platform. Remote attackers use copy method to execute arbitrary command after the file creation included malicious code.
|
CWE-20
|
159,941 |
CVE-2021-26614
| 9.8 | 10 |
CRITICAL
|
ius_get.cgi in IpTime C200 camera allows remote code execution. A remote attacker may send a crafted parameters to the exposed vulnerable web service interface which invokes the arbitrary shell command.
|
NVD-CWE-noinfo
|
159,942 |
CVE-2021-26615
| 8.8 | 6.8 |
HIGH
|
ARK library allows attackers to execute remote code via the parameter(path value) of Ark_NormalizeAndDupPAthNameW function because of an integer overflow.
|
CWE-190
|
159,943 |
CVE-2021-26675
| 8.8 | 5.8 |
HIGH
|
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
|
CWE-787
|
159,944 |
CVE-2021-26676
| 6.5 | 3.3 |
MEDIUM
|
gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
|
NVD-CWE-noinfo
|
159,945 |
CVE-2021-26677
| 7.8 | 7.2 |
HIGH
|
A local authenticated escalation of privilege vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in ClearPass OnGuard could allow local authenticated users on a Windows platform to elevate their privileges. A successful exploit could allow an attacker to execute arbitrary code with SYSTEM level privileges.
|
CWE-269
|
159,946 |
CVE-2021-26678
| 6.1 | 4.3 |
MEDIUM
|
A remote unauthenticated stored cross-site scripting (XSS) vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the web-based management interface of ClearPass could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim’s browser in the context of the affected interface.
|
CWE-79
|
159,947 |
CVE-2021-26679
| 7.2 | 9 |
HIGH
|
A remote authenticated command injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the ClearPass web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
CWE-77
|
159,948 |
CVE-2021-26680
| 7.2 | 9 |
HIGH
|
A remote authenticated command injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the ClearPass web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
CWE-77
|
159,949 |
CVE-2021-26681
| 7.2 | 9 |
HIGH
|
A remote authenticated command Injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the ClearPass CLI could allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
CWE-77
|
159,950 |
CVE-2021-26682
| 6.1 | 4.3 |
MEDIUM
|
A remote reflected cross-site scripting (XSS) vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the guest portal interface of ClearPass could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the portal. A successful exploit could allow an attacker to execute arbitrary script code in a victim’s browser in the context of the guest portal interface.
|
CWE-79
|
159,951 |
CVE-2021-26683
| 7.2 | 9 |
HIGH
|
A remote authenticated command injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the ClearPass web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
CWE-77
|
159,952 |
CVE-2021-26684
| 7.2 | 9 |
HIGH
|
A remote authenticated command injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the ClearPass web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
|
CWE-77
|
159,953 |
CVE-2021-26685
| 6.5 | 5.5 |
MEDIUM
|
A remote authenticated SQL Injection vulnerabilitiy was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the web-based management interface API of ClearPass could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database.
|
CWE-78
|
159,954 |
CVE-2021-26686
| 6.5 | 5.5 |
MEDIUM
|
A remote authenticated SQL Injection vulnerabilitiy was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1. A vulnerability in the web-based management interface API of ClearPass could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database.
|
CWE-89
|
159,955 |
CVE-2021-26687
| 9.8 | 7.5 |
CRITICAL
|
An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. In preloaded applications, the HostnameVerified default is mishandled. The LG ID is LVE-SMP-200029 (February 2021).
|
NVD-CWE-noinfo
|
159,956 |
CVE-2021-26688
| 9.8 | 7.5 |
CRITICAL
|
An issue was discovered on LG Wing mobile devices with Android OS 10 software. The biometric sensor has weak security properties. The LG ID is LVE-SMP-200030 (February 2021).
|
NVD-CWE-noinfo
|
159,957 |
CVE-2021-26689
| 9.8 | 7.5 |
CRITICAL
|
An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. The USB laf gadget has a use-after-free. The LG ID is LVE-SMP-200031 (February 2021).
|
CWE-416
|
159,958 |
CVE-2021-26690
| 7.5 | 5 |
HIGH
|
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
|
CWE-476
|
159,959 |
CVE-2021-26691
| 9.8 | 7.5 |
CRITICAL
|
In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
|
CWE-787
|
159,960 |
CVE-2021-26697
| 5.3 | 5 |
MEDIUM
|
The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue affects Apache Airflow 2.0.0.
|
CWE-287
|
159,961 |
CVE-2021-26698
| 6.1 | 4.3 |
MEDIUM
|
OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via a code snippet (user-generated content) when a sharing link is created and the dl parameter is used.
|
CWE-79
|
159,962 |
CVE-2021-26699
| 5.4 | 5.8 |
MEDIUM
|
OX App Suite before 7.10.3-rev4 and 7.10.4 before 7.10.4-rev4 allows SSRF via a shared SVG document that is mishandled by the imageconverter component when the .png extension is used.
|
CWE-918
|
159,963 |
CVE-2021-26700
| 7.8 | 6.8 |
HIGH
|
Visual Studio Code npm-script Extension Remote Code Execution Vulnerability
|
NVD-CWE-noinfo
|
159,964 |
CVE-2021-26701
| 9.8 | 7.5 |
CRITICAL
|
.NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112.
|
NVD-CWE-noinfo
|
159,965 |
CVE-2021-26702
| 6.1 | 4.3 |
MEDIUM
|
EPrints 3.4.2 exposes a reflected XSS opportunity in the dataset parameter to the cgi/dataset_dictionary URI.
|
CWE-79
|
159,966 |
CVE-2021-26703
| 9.8 | 7.5 |
CRITICAL
|
EPrints 3.4.2 allows remote attackers to read arbitrary files and possibly execute commands via crafted JSON/XML input to a cgi/ajax/phrase URI.
|
CWE-611
|
159,967 |
CVE-2021-26704
| 8.8 | 6.5 |
HIGH
|
EPrints 3.4.2 allows remote attackers to execute arbitrary commands via crafted input to the verb parameter in a cgi/toolbox/toolbox URI.
|
CWE-78
|
159,968 |
CVE-2021-26705
| 9.1 | 6.4 |
CRITICAL
|
An issue was discovered in SquareBox CatDV Server through 9.2. An attacker can invoke sensitive RMI methods such as getConnections without authentication, the results of which can be used to generate valid authentication tokens. These tokens can then be used to invoke administrative tasks within the application, such as disclosing password hashes.
|
CWE-306
|
159,969 |
CVE-2021-26707
| 9.8 | 7.5 |
CRITICAL
|
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
|
NVD-CWE-Other
|
159,970 |
CVE-2021-26707
| 9.8 | 7.5 |
CRITICAL
|
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
|
CWE-915
|
159,971 |
CVE-2021-26708
| 7 | 6.9 |
HIGH
|
A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.
|
CWE-269
|
159,972 |
CVE-2021-26709
| 9.8 | 10 |
CRITICAL
|
** UNSUPPORTED WHEN ASSIGNED ** D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote attackers to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
CWE-787
|
159,973 |
CVE-2021-26710
| 6.1 | 4.3 |
MEDIUM
|
A cross-site scripting (XSS) issue in the login panel in Redwood Report2Web 4.3.4.5 and 4.5.3 allows remote attackers to inject JavaScript via the signIn.do urll parameter.
|
CWE-79
|
159,974 |
CVE-2021-26711
| 5.3 | 5 |
MEDIUM
|
A frame-injection issue in the online help in Redwood Report2Web 4.3.4.5 allows remote attackers to render an external resource inside a frame via the help/Online_Help/NetHelp/default.htm turl parameter.
|
CWE-610
|
159,975 |
CVE-2021-26712
| 7.5 | 5 |
HIGH
|
Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.
|
NVD-CWE-Other
|
159,976 |
CVE-2021-26713
| 6.5 | 4 |
MEDIUM
|
A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending multiple hold/unhold requests in quick succession. This is caused by a signedness comparison mismatch.
|
CWE-787
|
159,977 |
CVE-2021-26714
| 9.8 | 7.5 |
CRITICAL
|
The Enterprise License Manager portal in Mitel MiContact Center Enterprise before 9.4 could allow a user to access restricted files and folders due to insufficient access control. A successful exploit could allow an attacker to view and modify application data via Directory Traversal.
|
CWE-22
|
159,978 |
CVE-2021-26715
| 9.1 | 6.4 |
CRITICAL
|
The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network.
|
CWE-918
|
159,979 |
CVE-2021-26716
| 6.1 | 4.3 |
MEDIUM
|
Modules/input/Views/schedule.php in Emoncms through 10.2.7 allows XSS via the node parameter.
|
CWE-79
|
159,980 |
CVE-2021-26717
| 7.5 | 5 |
HIGH
|
An issue was discovered in Sangoma Asterisk 16.x before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6. When re-negotiating for T.38, if the initial remote response was delayed just enough, Asterisk would send both audio and T.38 in the SDP. If this happened, and the remote responded with a declined T.38 stream, then Asterisk would crash.
|
NVD-CWE-noinfo
|
159,981 |
CVE-2021-26718
| 5.5 | 2.1 |
MEDIUM
|
KIS for macOS in some use cases was vulnerable to AV bypass that potentially allowed an attacker to disable anti-virus protection.
|
CWE-863
|
159,982 |
CVE-2021-26719
| 6.5 | 5.5 |
MEDIUM
|
A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations.
|
CWE-22
|
159,983 |
CVE-2021-26720
| 7.8 | 4.6 |
HIGH
|
avahi-daemon-check-dns.sh in the Debian avahi package through 0.8-4 is executed as root via /etc/network/if-up.d/avahi-daemon, and allows a local attacker to cause a denial of service or create arbitrary empty files via a symlink attack on files under /run/avahi-daemon. NOTE: this only affects the packaging for Debian GNU/Linux (used indirectly by SUSE), not the upstream Avahi product.
|
CWE-59
|
159,984 |
CVE-2021-26722
| 6.1 | 4.3 |
MEDIUM
|
LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar.
|
CWE-79
|
159,985 |
CVE-2021-26723
| 6.1 | 4.3 |
MEDIUM
|
Jenzabar 9.2.x through 9.2.2 allows /ics?tool=search&query= XSS.
|
CWE-79
|
159,986 |
CVE-2021-26724
| 7.2 | 9 |
HIGH
|
OS Command Injection vulnerability when changing date settings or hostname using web GUI of Nozomi Networks Guardian and CMC allows authenticated administrators to perform remote code execution. This issue affects: Nozomi Networks Guardian 20.0.7.3 version 20.0.7.3 and prior versions. Nozomi Networks CMC 20.0.7.3 version 20.0.7.3 and prior versions.
|
CWE-78
|
159,987 |
CVE-2021-26725
| 4.9 | 4 |
MEDIUM
|
Path Traversal vulnerability when changing timezone using web GUI of Nozomi Networks Guardian, CMC allows an authenticated administrator to read-protected system files. This issue affects: Nozomi Networks Guardian 20.0.7.3 version 20.0.7.3 and prior versions. Nozomi Networks CMC 20.0.7.3 version 20.0.7.3 and prior versions.
|
CWE-22
|
159,988 |
CVE-2021-26739
| 9.8 | 7.5 |
CRITICAL
|
SQL Injection vulnerability in pay.php in millken doyocms 2.3, allows attackers to execute arbitrary code, via the attribute parameter.
|
CWE-89
|
159,989 |
CVE-2021-26740
| 9.8 | 7.5 |
CRITICAL
|
Arbitrary file upload vulnerability sysupload.php in millken doyocms 2.3 allows attackers to execute arbitrary code.
|
CWE-434
|
159,990 |
CVE-2021-26746
| 6.1 | 4.3 |
MEDIUM
|
Chamilo 1.11.14 allows XSS via a main/calendar/agenda_list.php?type= URI.
|
CWE-79
|
159,991 |
CVE-2021-26747
| 9.8 | 10 |
CRITICAL
|
Netis WF2780 2.3.40404 and WF2411 1.1.29629 devices allow Shell Metacharacter Injection into the ping command, leading to remote code execution.
|
CWE-78
|
159,992 |
CVE-2021-26750
| 7.8 | 4.4 |
HIGH
|
DLL hijacking in Panda Agent <=1.16.11 in Panda Security, S.L.U. Panda Adaptive Defense 360 <= 8.0.17 allows attacker to escalate privileges via maliciously crafted DLL file.
|
CWE-427
|
159,993 |
CVE-2021-26751
| 8.8 | 4 |
HIGH
|
NeDi 1.9C allows an authenticated user to perform a SQL Injection in the Monitoring History function on the endpoint /Monitoring-History.php via the det HTTP GET parameter. This allows an attacker to access all the data in the database and obtain access to the NeDi application.
|
CWE-89
|
159,994 |
CVE-2021-26752
| 8.8 | 6.5 |
HIGH
|
NeDi 1.9C allows an authenticated user to execute operating system commands in the Nodes Traffic function on the endpoint /Nodes-Traffic.php via the md or ag HTTP GET parameter. This allows an attacker to obtain access to the operating system where NeDi is installed and to all application data.
|
CWE-78
|
159,995 |
CVE-2021-26753
| 9.9 | 6.5 |
CRITICAL
|
NeDi 1.9C allows an authenticated user to inject PHP code in the System Files function on the endpoint /System-Files.php via the txt HTTP POST parameter. This allows an attacker to obtain access to the operating system where NeDi is installed and to all application data.
|
CWE-94
|
159,996 |
CVE-2021-26754
| 9.8 | 10 |
CRITICAL
|
wpDataTables before 3.4.1 mishandles order direction for server-side tables, aka admin-ajax.php?action=get_wdtable order[0][dir] SQL injection.
|
CWE-89
|
159,997 |
CVE-2021-26758
| 8.8 | 9 |
HIGH
|
Privilege Escalation in LiteSpeed Technologies OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system.
|
CWE-269
|
159,998 |
CVE-2021-26762
| 8.8 | 6.5 |
HIGH
|
SQL injection vulnerability in PHPGurukul Student Record System 4.0 allows remote attackers to execute arbitrary SQL statements, via the cid parameter to edit-course.php.
|
CWE-89
|
159,999 |
CVE-2021-26764
| 8.8 | 6.5 |
HIGH
|
SQL injection vulnerability in PHPGurukul Student Record System v 4.0 allows remote attackers to execute arbitrary SQL statements, via the id parameter to edit-std.php.
|
CWE-89
|
160,000 |
CVE-2021-26765
| 9.8 | 7.5 |
CRITICAL
|
SQL injection vulnerability in PHPGurukul Student Record System 4.0 allows remote attackers to execute arbitrary SQL statements, via the sid parameter to edit-sub.php.
|
CWE-89
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.