ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
160,001
CVE-2021-26776
5.4
3.5
MEDIUM
CSZ CMS 1.2.9 is affected by a cross-site scripting (XSS) vulnerability in multiple pages through the field name.
CWE-79
160,002
CVE-2021-26777
9.8
10
CRITICAL
Buffer overflow vulnerability in function SetFirewall in index.cgi in CIRCUTOR COMPACT DC-S BASIC smart metering concentrator Firwmare version CIR_CDC_v1.2.17, allows attackers to execute arbitrary code.
CWE-120
160,003
CVE-2021-26786
8.8
6.5
HIGH
An issue was discoverered in in customercentric-selling-poland PlayTube, allows authenticated attackers to execute arbitrary code via the purchace code to the config.php.
NVD-CWE-noinfo
160,004
CVE-2021-26787
6.1
4.3
MEDIUM
A cross site scripting (XSS) vulnerability in Genesys Workforce Management 8.5.214.20 can occur (during record deletion) via the Time-off parameter.
CWE-79
160,005
CVE-2021-26788
7.5
5
HIGH
Oryx Embedded CycloneTCP 1.7.6 to 2.0.0, fixed in 2.0.2, is affected by incorrect input validation, which may cause a denial of service (DoS). To exploit the vulnerability, an attacker needs to have TCP connectivity to the target system. Receiving a maliciously crafted TCP packet from an unauthenticated endpoint is sufficient to trigger the bug.
CWE-20
160,006
CVE-2021-26794
9.8
7.5
CRITICAL
Privilege escalation in 'upload.php' in FrogCMS SentCMS v0.9.5 allows attacker to execute arbitrary code via crafted php file.
CWE-434
160,007
CVE-2021-26795
8.8
6.5
HIGH
A SQL Injection vulnerability in /appliance/shiftmgn.php in TalariaX sendQuick Alert Plus Server Admin 4.3 before 8HF11 allows attackers to obtain sensitive information via a Roster Time to Roster Management.
CWE-89
160,008
CVE-2021-26797
9.8
7.5
CRITICAL
An access control vulnerability in Hame SD1 Wi-Fi firmware <=V.20140224154640 allows an attacker to get system administrator through an open Telnet service.
CWE-521
160,009
CVE-2021-26799
6.1
4.3
MEDIUM
Cross Site Scripting (XSS) vulnerability in admin/files/edit in Omeka Classic <=2.7 allows remote attackers to inject arbitrary web script or HTML.
CWE-79
160,010
CVE-2021-26800
6.5
4.3
MEDIUM
Cross Site Request Forgery (CSRF) vulnerability in Change-password.php in phpgurukul user management system in php using stored procedure V1.0, allows attackers to change the password to an arbitrary account.
CWE-352
160,011
CVE-2021-26804
6.5
4
MEDIUM
Insecure Permissions in Centreon Web versions 19.10.18, 20.04.8, and 20.10.2 allows remote attackers to bypass validation by changing any file extension to ".gif", then uploading it in the "Administration/ Parameters/ Images" section of the application.
CWE-276
160,012
CVE-2021-26805
5.5
4.3
MEDIUM
Buffer Overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a malicious WAV file.
CWE-120
160,013
CVE-2021-26807
7.8
4.4
HIGH
GalaxyClient version 2.0.28.9 loads unsigned DLLs such as zlib1.dll, libgcc_s_dw2-1.dll and libwinpthread-1.dll from PATH, which allows an attacker to potentially run code locally through unsigned DLL loading.
CWE-426
160,014
CVE-2021-26809
9.8
7.5
CRITICAL
PHPGurukul Car Rental Project version 2.0 suffers from a remote shell upload vulnerability in changeimage1.php.
CWE-434
160,015
CVE-2021-26810
9.8
10
CRITICAL
D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter.
CWE-94
160,016
CVE-2021-26812
6.1
4.3
MEDIUM
Cross Site Scripting (XSS) in the Jitsi Meet 2.7 through 2.8.3 plugin for Moodle via the "sessionpriv.php" module. This allows attackers to craft a malicious URL, which when clicked on by users, can inject javascript code to be run by the application.
CWE-79
160,017
CVE-2021-26813
7.5
5
HIGH
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time.
NVD-CWE-Other
160,018
CVE-2021-26814
8.8
6.5
HIGH
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
CWE-20
160,019
CVE-2021-26822
9.8
7.5
CRITICAL
Teachers Record Management System 1.0 is affected by a SQL injection vulnerability in 'searchteacher' POST parameter in search-teacher.php. This vulnerability can be exploited by a remote unauthenticated attacker to leak sensitive information and perform code execution attacks.
CWE-89
160,020
CVE-2021-26824
7.1
5.6
HIGH
DM FingerTool v1.19 in the DM PD065 Secure USB is susceptible to improper authentication by a replay attack, allowing local attackers to bypass user authentication and access all features and data on the USB.
CWE-294
160,021
CVE-2021-26825
7.8
6.8
HIGH
An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.
CWE-190
160,022
CVE-2021-26826
7.8
6.8
HIGH
A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.
CWE-787
160,023
CVE-2021-26827
7.5
7.8
HIGH
Buffer Overflow in TP-Link WR2041 v1 firmware for the TL-WR2041+ router allows remote attackers to cause a Denial-of-Service (DoS) by sending an HTTP request with a very long "ssid" parameter to the "/userRpm/popupSiteSurveyRpm.html" webpage, which crashes the router.
CWE-120
160,024
CVE-2021-26828
8.8
6.5
HIGH
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.
CWE-434
160,025
CVE-2021-26829
5.4
3.5
MEDIUM
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.
CWE-79
160,026
CVE-2021-26830
9.1
6.4
CRITICAL
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
CWE-89
160,027
CVE-2021-26832
6.1
4.3
MEDIUM
Cross Site Scripting (XSS) in the "Reset Password" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.
CWE-79
160,028
CVE-2021-26833
5.9
4.3
MEDIUM
Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted.
CWE-312
160,029
CVE-2021-26834
5.4
3.5
MEDIUM
A cross-site scripting (XSS) vulnerability exists in Znote 0.5.2. An attacker can insert payloads, and the code execution will happen immediately on markdown view mode.
CWE-79
160,030
CVE-2021-26835
6.1
4.3
MEDIUM
No filtering of cross-site scripting (XSS) payloads in the markdown-editor in Zettlr 1.8.7 allows attackers to perform remote code execution via a crafted file.
CWE-79
160,031
CVE-2021-26843
7.5
5
HIGH
An issue was discovered in sthttpd through 2.27.1. On systems where the strcpy function is implemented with memcpy, the de_dotdot function may cause a Denial-of-Service (daemon crash) due to overlapping memory ranges being passed to memcpy. This can triggered with an HTTP GET request for a crafted filename. NOTE: this is similar to CVE-2017-10671, but occurs in a different part of the de_dotdot function.
CWE-119
160,032
CVE-2021-26844
5.4
3.5
MEDIUM
A cross-site scripting (XSS) vulnerability in Power Admin PA Server Monitor 8.2.1.1 allows remote attackers to inject arbitrary web script or HTML via Console.exe.
CWE-79
160,033
CVE-2021-26845
7.5
5
HIGH
Information Exposure vulnerability in Hitachi ABB Power Grids eSOMS allows unauthorized user to gain access to report data if the URL used to access the report is discovered. This issue affects: Hitachi ABB Power Grids eSOMS 6.0 versions prior to 6.0.4.2.2; 6.1 versions prior to 6.1.4; 6.3 versions prior to 6.3.
CWE-863
160,034
CVE-2021-26854
7.2
6.5
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
NVD-CWE-noinfo
160,035
CVE-2021-26855
9.8
7.5
CRITICAL
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
NVD-CWE-noinfo
160,036
CVE-2021-26857
7.8
6.8
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
NVD-CWE-noinfo
160,037
CVE-2021-26858
7.8
6.8
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-27065, CVE-2021-27078.
NVD-CWE-noinfo
160,038
CVE-2021-26859
6.5
4
MEDIUM
Microsoft Power BI Information Disclosure Vulnerability
NVD-CWE-noinfo
160,039
CVE-2021-26860
7.8
4.6
HIGH
Windows App-V Overlay Filter Elevation of Privilege Vulnerability
CWE-269
160,040
CVE-2021-26861
7.8
6.8
HIGH
Windows Graphics Component Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,041
CVE-2021-26862
7.8
7.2
HIGH
Windows Installer Elevation of Privilege Vulnerability
CWE-269
160,042
CVE-2021-26863
7.8
7.2
HIGH
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26875, CVE-2021-26900, CVE-2021-27077.
CWE-269
160,043
CVE-2021-26864
7.8
4.6
HIGH
Windows Virtual Registry Provider Elevation of Privilege Vulnerability
CWE-269
160,044
CVE-2021-26865
7.8
4.6
HIGH
Windows Container Execution Agent Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26891.
CWE-269
160,045
CVE-2021-26866
6.1
3.6
MEDIUM
Windows Update Service Elevation of Privilege Vulnerability
CWE-269
160,046
CVE-2021-26867
8.8
7.2
HIGH
Windows Hyper-V Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,047
CVE-2021-26868
7.8
4.6
HIGH
Windows Graphics Component Elevation of Privilege Vulnerability
CWE-269
160,048
CVE-2021-26869
5.5
2.1
MEDIUM
Windows ActiveX Installer Service Information Disclosure Vulnerability
CWE-200
160,049
CVE-2021-26870
7.8
4.6
HIGH
Windows Projected File System Elevation of Privilege Vulnerability
CWE-269
160,050
CVE-2021-26871
7.8
4.6
HIGH
Windows WalletService Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26885.
CWE-269
160,051
CVE-2021-26872
7.8
4.6
HIGH
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26898, CVE-2021-26901.
CWE-269
160,052
CVE-2021-26873
7.8
4.6
HIGH
Windows User Profile Service Elevation of Privilege Vulnerability
CWE-269
160,053
CVE-2021-26874
7.8
4.6
HIGH
Windows Overlay Filter Elevation of Privilege Vulnerability
CWE-269
160,054
CVE-2021-26875
7.8
4.6
HIGH
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26900, CVE-2021-27077.
CWE-269
160,055
CVE-2021-26876
8.8
6.8
HIGH
OpenType Font Parsing Remote Code Execution Vulnerability
CWE-94
160,056
CVE-2021-26877
9.8
7.5
CRITICAL
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26893, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897.
CWE-94
160,057
CVE-2021-26878
7.8
4.6
HIGH
Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1640.
CWE-269
160,058
CVE-2021-26879
7.5
5
HIGH
Windows NAT Denial of Service Vulnerability
NVD-CWE-noinfo
160,059
CVE-2021-26880
7.8
4.6
HIGH
Storage Spaces Controller Elevation of Privilege Vulnerability
CWE-269
160,060
CVE-2021-26881
8.8
6.5
HIGH
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,061
CVE-2021-26882
7.8
4.6
HIGH
Remote Access API Elevation of Privilege Vulnerability
CWE-269
160,062
CVE-2021-26884
5.5
2.1
MEDIUM
Windows Media Photo Codec Information Disclosure Vulnerability
CWE-200
160,063
CVE-2021-26885
7.8
4.6
HIGH
Windows WalletService Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26871.
CWE-269
160,064
CVE-2021-26886
6.1
3.6
MEDIUM
User Profile Service Denial of Service Vulnerability
NVD-CWE-noinfo
160,065
CVE-2021-26887
7.8
4.6
HIGH
Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability
CWE-269
160,066
CVE-2021-26889
7.8
4.6
HIGH
Windows Update Stack Elevation of Privilege Vulnerability
CWE-269
160,067
CVE-2021-26890
7.8
4.6
HIGH
Application Virtualization Remote Code Execution Vulnerability
CWE-94
160,068
CVE-2021-26891
7.8
4.6
HIGH
Windows Container Execution Agent Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26865.
CWE-269
160,069
CVE-2021-26892
5.5
2.1
MEDIUM
Windows Extensible Firmware Interface Security Feature Bypass Vulnerability
NVD-CWE-noinfo
160,070
CVE-2021-26893
9.8
7.5
CRITICAL
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26894, CVE-2021-26895, CVE-2021-26897.
NVD-CWE-noinfo
160,071
CVE-2021-26894
9.8
10
CRITICAL
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26895, CVE-2021-26897.
NVD-CWE-noinfo
160,072
CVE-2021-26895
9.8
10
CRITICAL
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26894, CVE-2021-26897.
NVD-CWE-noinfo
160,073
CVE-2021-26896
7.5
5
HIGH
Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-27063.
NVD-CWE-noinfo
160,074
CVE-2021-26897
9.8
10
CRITICAL
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26894, CVE-2021-26895.
NVD-CWE-noinfo
160,075
CVE-2021-26898
7.8
7.2
HIGH
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26901.
CWE-269
160,076
CVE-2021-26899
7.8
7.2
HIGH
Windows UPnP Device Host Elevation of Privilege Vulnerability
CWE-269
160,077
CVE-2021-26900
7.8
7.2
HIGH
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-27077.
CWE-269
160,078
CVE-2021-26901
7.8
7.2
HIGH
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26898.
CWE-269
160,079
CVE-2021-26902
7.8
6.8
HIGH
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-24110, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.
NVD-CWE-noinfo
160,080
CVE-2021-26903
6.1
4.3
MEDIUM
LMA ISIDA Retriever 5.2 is vulnerable to XSS via query['text'].
CWE-79
160,081
CVE-2021-26904
9.8
7.5
CRITICAL
LMA ISIDA Retriever 5.2 allows SQL Injection.
CWE-89
160,082
CVE-2021-26905
6.5
4
MEDIUM
1Password SCIM Bridge before 1.6.2 mishandles validation of authenticated requests for log files, leading to disclosure of a TLS private key.
CWE-522
160,083
CVE-2021-26906
5.9
4.3
MEDIUM
An issue was discovered in res_pjsip_session.c in Digium Asterisk through 13.38.1; 14.x, 15.x, and 16.x through 16.16.0; 17.x through 17.9.1; and 18.x through 18.2.0, and Certified Asterisk through 16.8-cert5. An SDP negotiation vulnerability in PJSIP allows a remote server to potentially crash Asterisk by sending specific SIP responses that cause an SDP negotiation failure.
CWE-404
160,084
CVE-2021-26908
3.3
2.1
LOW
Automox Agent prior to version 31 logs potentially sensitive information in local log files, which could be used by a locally-authenticated attacker to subvert an organization's security program. The issue has since been fixed in version 31 of the Automox Agent.
CWE-532
160,085
CVE-2021-26909
5.3
5
MEDIUM
Automox Agent prior to version 31 uses an insufficiently protected S3 bucket endpoint for storing sensitive files, which could be brute-forced by an attacker to subvert an organization's security program. The issue has since been fixed in version 31 of the Automox Agent.
CWE-269
160,086
CVE-2021-26910
7
6.9
HIGH
Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.
CWE-367
160,087
CVE-2021-26911
7.4
5.8
HIGH
core/imap/MCIMAPSession.cpp in Canary Mail before 3.22 has Missing SSL Certificate Validation for IMAP in STARTTLS mode.
CWE-295
160,088
CVE-2021-26912
8.1
9.3
HIGH
NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in SupportRpcServlet.
CWE-502
160,089
CVE-2021-26913
8.1
9.3
HIGH
NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in RpcServlet.
CWE-502
160,090
CVE-2021-26914
8.1
9.3
HIGH
NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in MvcUtil valueStringToObject.
CWE-502
160,091
CVE-2021-26915
8.1
9.3
HIGH
NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in webrepdb StatusServlet.
CWE-502
160,092
CVE-2021-26916
6.1
4.3
MEDIUM
In nopCommerce 4.30, a Reflected XSS issue in the Discount Coupon component allows remote attackers to inject arbitrary web script or HTML through the Filters/CheckDiscountCouponAttribute.cs discountcode parameter.
CWE-79
160,093
CVE-2021-26917
5.5
2.1
MEDIUM
** DISPUTED ** PyBitmessage through 0.6.3.2 allows attackers to write screen captures to Potentially Unwanted Directories via a crafted apinotifypath value. NOTE: the discoverer states "security mitigation may not be necessary as there is no evidence yet that these screen intercepts are actually transported away from the local host." NOTE: it is unclear whether there are any common use cases in which apinotifypath is controlled by an attacker.
NVD-CWE-noinfo
160,094
CVE-2021-26918
9.8
7.5
CRITICAL
** DISPUTED ** The ProBot bot through 2021-02-08 for Discord might allow attackers to interfere with the intended purpose of the "Send an image when a user joins the server" feature (or possibly have unspecified other impact) because the uploader web service allows double extensions (such as .html.jpg) with the text/html content type. NOTE: there may not be cases in which an uploader web service is customer controlled; however, the nature of the issue has substantial interaction with customer controlled configuration. NOTE: the vendor states "This is just an uploader (like any other one) which uploads files to cloud storage and accepts various file types. There is no kind of vulnerability and it won't compromise either the client side or the server side."
CWE-434
160,095
CVE-2021-26919
8.8
6.5
HIGH
Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2
NVD-CWE-noinfo
160,096
CVE-2021-26920
6.5
4
MEDIUM
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource.
CWE-863
160,097
CVE-2021-26921
6.5
5
MEDIUM
In util/session/sessionmanager.go in Argo CD before 1.8.4, tokens continue to work even when the user account is disabled.
CWE-613
160,098
CVE-2021-26923
7.5
5
HIGH
An issue was discovered in Argo CD before 1.8.4. Accessing the endpoint /api/version leaks internal information for the system, and this endpoint is not protected with authentication.
CWE-287
160,099
CVE-2021-26924
6.1
4.3
MEDIUM
An issue was discovered in Argo CD before 1.8.4. Browser XSS protection is not activated due to the missing XSS protection header.
CWE-79
160,100
CVE-2021-26925
5.4
3.5
MEDIUM
Roundcube before 1.4.11 allows XSS via crafted Cascading Style Sheets (CSS) token sequences during HTML email rendering.
CWE-79