ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
160,201
CVE-2021-27063
7.5
5
HIGH
Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-26896.
NVD-CWE-noinfo
160,202
CVE-2021-27064
7.8
4.6
HIGH
Visual Studio Installer Elevation of Privilege Vulnerability
CWE-269
160,203
CVE-2021-27065
7.8
6.8
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078.
NVD-CWE-noinfo
160,204
CVE-2021-27066
4.3
4
MEDIUM
Windows Admin Center Security Feature Bypass Vulnerability
NVD-CWE-noinfo
160,205
CVE-2021-27067
6.5
4
MEDIUM
Azure DevOps Server and Team Foundation Server Information Disclosure Vulnerability
CWE-200
160,206
CVE-2021-27068
8.8
6.5
HIGH
Visual Studio Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,207
CVE-2021-27070
7.8
9.3
HIGH
Windows 10 Update Assistant Elevation of Privilege Vulnerability
CWE-269
160,208
CVE-2021-27072
7.8
4.6
HIGH
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-28310.
CWE-269
160,209
CVE-2021-27074
7.8
7.2
HIGH
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2021-27080.
NVD-CWE-noinfo
160,210
CVE-2021-27075
6.8
2.7
MEDIUM
Azure Virtual Machine Information Disclosure Vulnerability
NVD-CWE-noinfo
160,211
CVE-2021-27076
8.8
6.5
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,212
CVE-2021-27077
7.8
4.6
HIGH
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-26900.
CWE-269
160,213
CVE-2021-27078
7.2
6.5
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065.
NVD-CWE-noinfo
160,214
CVE-2021-27079
5.7
6.3
MEDIUM
Windows Media Photo Codec Information Disclosure Vulnerability
CWE-200
160,215
CVE-2021-27080
7.8
7.2
HIGH
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2021-27074.
NVD-CWE-noinfo
160,216
CVE-2021-27081
7.8
9.3
HIGH
Visual Studio Code ESLint Extension Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,217
CVE-2021-27082
7.8
9.3
HIGH
Quantum Development Kit for Visual Studio Code Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,218
CVE-2021-27083
7.8
9.3
HIGH
Remote Development Extension for Visual Studio Code Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,219
CVE-2021-27084
7.8
9.3
HIGH
Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,220
CVE-2021-27085
7.5
7.6
HIGH
Internet Explorer Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,221
CVE-2021-27086
7.8
4.6
HIGH
Windows Services and Controller App Elevation of Privilege Vulnerability
CWE-269
160,222
CVE-2021-27088
7.8
4.6
HIGH
Windows Event Tracing Elevation of Privilege Vulnerability
CWE-269
160,223
CVE-2021-27089
7.8
6.8
HIGH
Microsoft Internet Messaging API Remote Code Execution Vulnerability
NVD-CWE-noinfo
160,224
CVE-2021-27090
7.8
4.6
HIGH
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CWE-269
160,225
CVE-2021-27091
7.8
4.6
HIGH
RPC Endpoint Mapper Service Elevation of Privilege Vulnerability
CWE-269
160,226
CVE-2021-27092
9.8
7.5
CRITICAL
Azure AD Web Sign-in Security Feature Bypass Vulnerability
NVD-CWE-noinfo
160,227
CVE-2021-27093
5.5
2.1
MEDIUM
Windows Kernel Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-28309.
CWE-200
160,228
CVE-2021-27094
4.4
2.1
MEDIUM
Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability This CVE ID is unique from CVE-2021-28447.
NVD-CWE-noinfo
160,229
CVE-2021-27095
7.8
6.8
HIGH
Windows Media Video Decoder Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28315.
NVD-CWE-noinfo
160,230
CVE-2021-27096
7.8
4.6
HIGH
NTFS Elevation of Privilege Vulnerability
CWE-269
160,231
CVE-2021-27097
7.8
6.8
HIGH
The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT.
NVD-CWE-noinfo
160,232
CVE-2021-27098
8.1
5.5
HIGH
In SPIRE 0.8.1 through 0.8.4 and before versions 0.9.4, 0.10.2, 0.11.3 and 0.12.1, specially crafted requests to the FetchX509SVID RPC of SPIRE Server’s Legacy Node API can result in the possible issuance of an X.509 certificate with a URI SAN for a SPIFFE ID that the agent is not authorized to distribute. Proper controls are in place to require that the caller presents a valid agent certificate that is already authorized to issue at least one SPIFFE ID, and the requested SPIFFE ID belongs to the same trust domain, prior to being able to trigger this vulnerability. This issue has been fixed in SPIRE versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1.
CWE-295
160,233
CVE-2021-27099
6.8
4.9
MEDIUM
In SPIRE before versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1, the "aws_iid" Node Attestor improperly normalizes the path provided through the agent ID templating feature, which may allow the issuance of an arbitrary SPIFFE ID within the same trust domain, if the attacker controls the value of an EC2 tag prior to attestation, and the attestor is configured for agent ID templating where the tag value is the last element in the path. This issue has been fixed in SPIRE versions 0.11.3 and 0.12.1
CWE-863
160,234
CVE-2021-27101
9.8
7.5
CRITICAL
Accellion FTA 9_12_370 and earlier is affected by SQL injection via a crafted Host header in a request to document_root.html. The fixed version is FTA_9_12_380 and later.
CWE-89
160,235
CVE-2021-27102
7.8
7.2
HIGH
Accellion FTA 9_12_411 and earlier is affected by OS command execution via a local web service call. The fixed version is FTA_9_12_416 and later.
CWE-78
160,236
CVE-2021-27103
9.8
7.5
CRITICAL
Accellion FTA 9_12_411 and earlier is affected by SSRF via a crafted POST request to wmProgressstat.html. The fixed version is FTA_9_12_416 and later.
CWE-918
160,237
CVE-2021-27104
9.8
10
CRITICAL
Accellion FTA 9_12_370 and earlier is affected by OS command execution via a crafted POST request to various admin endpoints. The fixed version is FTA_9_12_380 and later.
CWE-78
160,238
CVE-2021-27112
9.8
7.5
CRITICAL
LightCMS v1.3.5 contains a remote code execution vulnerability in /app/Http/Controllers/Admin/NEditorController.php during the downloading of external images.
NVD-CWE-noinfo
160,239
CVE-2021-27113
9.8
10
CRITICAL
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters.
CWE-78
160,240
CVE-2021-27114
9.8
7.5
CRITICAL
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/addassignment route, a very long text entry for the"'s_ip" and "s_mac" fields could lead to a Stack-Based Buffer Overflow and overwrite the return address.
CWE-787
160,241
CVE-2021-27124
6.5
4
MEDIUM
SQL injection in the expertise parameter in search_result.php in Doctor Appointment System v1.0 allows an authenticated patient user to dump the database credentials via a SQL injection attack.
CWE-89
160,242
CVE-2021-27129
5.4
3.5
MEDIUM
CASAP Automated Enrollment System version 1.0 contains a cross-site scripting (XSS) vulnerability through the Students > Edit > ROUTE parameter.
CWE-79
160,243
CVE-2021-27130
9.8
7.5
CRITICAL
Online Reviewer System 1.0 contains a SQL injection vulnerability through authentication bypass, which may lead to a reverse shell upload.
CWE-89
160,244
CVE-2021-27132
9.8
7.5
CRITICAL
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CWE-74
160,245
CVE-2021-27135
9.8
7.5
CRITICAL
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
NVD-CWE-noinfo
160,246
CVE-2021-27138
7.8
6.8
HIGH
The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT.
NVD-CWE-noinfo
160,247
CVE-2021-27139
7.5
5
HIGH
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to extract information from the device without authentication by disabling JavaScript and visiting /info.asp.
NVD-CWE-noinfo
160,248
CVE-2021-27140
7.5
5
HIGH
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to find passwords and authentication cookies stored in cleartext in the web.log HTTP logs.
CWE-312
160,249
CVE-2021-27141
9.8
5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. Credentials in /fhconf/umconfig.txt are obfuscated via XOR with the hardcoded *j7a(L#yZ98sSd5HfSgGjMj8;Ss;d)(*&^#@$a2s0i3g key. (The webs binary has details on how XOR is used.)
CWE-798
160,250
CVE-2021-27142
7.5
5
HIGH
An issue was discovered on FiberHome HG6245D devices through RP2613. The web management is done over HTTPS, using a hardcoded private key that has 0777 permissions.
CWE-798
160,251
CVE-2021-27143
9.8
5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / user1234 credentials for an ISP.
CWE-798
160,252
CVE-2021-27144
9.8
5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded f~i!b@e#r$h%o^m*esuperadmin / s(f)u_h+g|u credentials for an ISP.
CWE-798
160,253
CVE-2021-27145
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / lnadmin credentials for an ISP.
CWE-798
160,254
CVE-2021-27146
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / CUadmin credentials for an ISP.
CWE-798
160,255
CVE-2021-27147
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / admin credentials for an ISP.
CWE-798
160,256
CVE-2021-27148
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded telecomadmin / nE7jA%5m credentials for an ISP.
CWE-798
160,257
CVE-2021-27149
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded adminpldt / z6dUABtl270qRxt7a2uGTiw credentials for an ISP.
CWE-798
160,258
CVE-2021-27150
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded gestiontelebucaramanga / t3l3buc4r4m4ng42013 credentials for an ISP.
CWE-798
160,259
CVE-2021-27151
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded rootmet / m3tr0r00t credentials for an ISP.
CWE-798
160,260
CVE-2021-27152
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded awnfibre / fibre@dm!n credentials for an ISP.
CWE-798
160,261
CVE-2021-27153
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded trueadmin / admintrue credentials for an ISP.
CWE-798
160,262
CVE-2021-27154
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / G0R2U1P2ag credentials for an ISP.
CWE-798
160,263
CVE-2021-27155
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 3UJUh2VemEfUtesEchEC2d2e credentials for an ISP.
CWE-798
160,264
CVE-2021-27156
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains credentials for an ISP that equal the last part of the MAC address of the br0 interface.
CWE-798
160,265
CVE-2021-27157
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 888888 credentials for an ISP.
CWE-798
160,266
CVE-2021-27158
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded L1vt1m4eng / 888888 credentials for an ISP.
CWE-798
160,267
CVE-2021-27159
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded useradmin / 888888 credentials for an ISP.
CWE-798
160,268
CVE-2021-27160
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / 888888 credentials for an ISP.
CWE-798
160,269
CVE-2021-27161
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 1234 credentials for an ISP.
CWE-798
160,270
CVE-2021-27162
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / tattoo@home credentials for an ISP.
CWE-798
160,271
CVE-2021-27163
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / tele1234 credentials for an ISP.
CWE-798
160,272
CVE-2021-27164
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / aisadmin credentials for an ISP.
CWE-798
160,273
CVE-2021-27165
9.8
5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials.
CWE-798
160,274
CVE-2021-27166
9.8
5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon.
CWE-798
160,275
CVE-2021-27167
9.8
5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a password of four hexadecimal characters for the admin account. These characters are generated in init_3bb_password in libci_adaptation_layer.so.
CWE-798
160,276
CVE-2021-27168
9.8
5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a 6GFJdY4aAuUKJjdtSn7d password for the rdsadmin account.
CWE-798
160,277
CVE-2021-27169
9.8
5
CRITICAL
An issue was discovered on FiberHome AN5506-04-FA devices with firmware RP2631. There is a gepon password for the gepon account.
CWE-798
160,278
CVE-2021-27170
9.8
5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. By default, there are no firewall rules for IPv6 connectivity, exposing the internal management interfaces to the Internet.
CWE-922
160,279
CVE-2021-27171
9.8
10
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to start a Linux telnetd as root on port 26/tcp by using the CLI interface commands of ddd and shell (or tshell).
CWE-787
160,280
CVE-2021-27172
9.8
5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh.
CWE-798
160,281
CVE-2021-27173
7.5
5
HIGH
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach the telnet server (used for the CLI).
CWE-287
160,282
CVE-2021-27174
7.5
5
HIGH
An issue was discovered on FiberHome HG6245D devices through RP2613. wifi_custom.cfg has cleartext passwords and 0644 permissions.
CWE-312
160,283
CVE-2021-27175
7.5
5
HIGH
An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions.
CWE-312
160,284
CVE-2021-27176
7.5
5
HIGH
An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_5g.cfg has cleartext passwords and 0644 permissions.
CWE-312
160,285
CVE-2021-27177
9.8
7.5
CRITICAL
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server.
CWE-863
160,286
CVE-2021-27178
7.5
5
HIGH
An issue was discovered on FiberHome HG6245D devices through RP2613. Some passwords are stored in cleartext in nvram.
CWE-312
160,287
CVE-2021-27179
7.5
5
HIGH
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to crash the telnet daemon by sending a certain 0a 65 6e 61 62 6c 65 0a 02 0a 1a 0a string.
CWE-20
160,288
CVE-2021-27180
6.1
4.3
MEDIUM
An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user.
CWE-79
160,289
CVE-2021-27181
8.8
6.8
HIGH
An issue was discovered in MDaemon before 20.0.4. Remote Administration allows an attacker to perform a fixation of the anti-CSRF token. In order to exploit this issue, the user has to click on a malicious URL provided by the attacker and successfully authenticate into the application. Having the value of the anti-CSRF token, the attacker may trick the user into visiting his malicious page and performing any request with the privileges of attacked user.
CWE-352
160,290
CVE-2021-27182
8.8
6.5
HIGH
An issue was discovered in MDaemon before 20.0.4. There is an IFRAME injection vulnerability in Webmail (aka WorldClient). It can be exploited via an email message. It allows an attacker to perform any action with the privileges of the attacked user.
CWE-74
160,291
CVE-2021-27183
7.2
6.5
HIGH
An issue was discovered in MDaemon before 20.0.4. Administrators can use Remote Administration to exploit an Arbitrary File Write vulnerability. An attacker is able to create new files in any location of the filesystem, or he may be able to modify existing files. This vulnerability may directly lead to Remote Code Execution.
CWE-610
160,292
CVE-2021-27184
7.5
5
HIGH
Pelco Digital Sentry Server 7.18.72.11464 has an XML External Entity vulnerability (exploitable via the DTD parameter entities technique), resulting in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the ControlPointCacheShare.xml file (in a %APPDATA%\Pelco directory) when DSControlPoint.exe is executed.
CWE-611
160,293
CVE-2021-27185
9.8
7.5
CRITICAL
The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.
CWE-74
160,294
CVE-2021-27186
7.5
5
HIGH
Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by flb_avro.c or http_server/api/v1/metrics.c.
CWE-476
160,295
CVE-2021-27187
7.5
5
HIGH
The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 stores authentication credentials in cleartext in login.sav when the Save Password box is checked.
CWE-522
160,296
CVE-2021-27188
7.5
5
HIGH
The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended for five hours) by making five invalid login attempts to a victim's account.
CWE-307
160,297
CVE-2021-27189
5.9
4.3
MEDIUM
The CIRA Canadian Shield app before 4.0.13 for iOS lacks SSL Certificate Validation.
CWE-295
160,298
CVE-2021-27190
5.4
3.5
MEDIUM
A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
CWE-79
160,299
CVE-2021-27191
7.5
5
HIGH
The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion.
NVD-CWE-noinfo
160,300
CVE-2021-27192
7.8
4.6
HIGH
Local privilege escalation vulnerability in Windows clients of Netop Vision Pro up to and including 9.7.1 allows a local user to gain administrator privileges whilst using the clients.
CWE-269