ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
160,601 | CVE-2021-27644 | 8.8 | 6 | HIGH | In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password) | CWE-89 |
160,602 | CVE-2021-27645 | 2.5 | 1.9 | LOW | The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c. | CWE-415 |
160,603 | CVE-2021-27646 | 9.8 | 7.5 | CRITICAL | Use After Free vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests. | CWE-416 |
160,604 | CVE-2021-27647 | 9.8 | 7.5 | CRITICAL | Out-of-bounds Read vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests. | CWE-125 |
160,605 | CVE-2021-27648 | 8.8 | 6.5 | HIGH | Externally controlled reference to a resource in another sphere in quarantine functionality in Synology Antivirus Essential before 1.4.8-2801 allows remote authenticated users to obtain privilege via unspecified vectors. | CWE-610 |
160,606 | CVE-2021-27649 | 9.8 | 7.5 | CRITICAL | Use after free vulnerability in file transfer protocol component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via unspecified vectors. | CWE-416 |
160,607 | CVE-2021-27651 | 9.8 | 7.5 | CRITICAL | In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks. | CWE-287 |
160,608 | CVE-2021-27651 | 9.8 | 7.5 | CRITICAL | In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks. | CWE-640 |
160,609 | CVE-2021-27653 | 4.9 | 4 | MEDIUM | Misconfiguration of the Pega Chat Access Group portal in Pega platform 7.4.0 - 8.5.x could lead to unintended data exposure. | NVD-CWE-noinfo |
160,610 | CVE-2021-27656 | 7.5 | 5 | HIGH | A vulnerability in exacqVision Web Service 20.12.2.0 and prior could allow an unauthenticated attacker to view system-level information about the exacqVision Web Service and the operating system. | CWE-862 |
160,611 | CVE-2021-27657 | 8.8 | 6.5 | HIGH | Successful exploitation of this vulnerability could give an authenticated Metasys user an unintended level of access to the server file system, allowing them to access or modify system files by sending specifically crafted web messages to the Metasys system. This issue affects: Johnson Controls Metasys version 11.0 and prior versions. | CWE-269 |
160,612 | CVE-2021-27658 | 5.4 | 3.5 | MEDIUM | exacqVision Enterprise Manager 20.12 does not sufficiently validate, filter, escape, and/or encode user-controllable input before it is placed in output that is used as a web page that is served to other users. | CWE-79 |
160,613 | CVE-2021-27659 | 6.1 | 4.3 | MEDIUM | exacqVision Web Service 21.03 does not sufficiently validate, filter, escape, and/or encode user-controllable input before it is placed in output that is used as a web page that is served to other users. | CWE-79 |
160,614 | CVE-2021-27660 | 8.8 | 6.5 | HIGH | An insecure client auto update feature in C-CURE 9000 can allow remote execution of lower privileged Windows programs. | CWE-20 |
160,615 | CVE-2021-27661 | 8.8 | 6.5 | HIGH | Successful exploitation of this vulnerability could give an authenticated Facility Explorer SNC Series Supervisory Controller (F4-SNC) user an unintended level of access to the controller’s file system, allowing them to access or modify system files by sending specifically crafted web messages to the F4-SNC. | CWE-863 |
160,616 | CVE-2021-27662 | 8.1 | 6.8 | HIGH | The KT-1 door controller is susceptible to replay or man-in-the-middle attacks where an attacker can record and replay TCP packets. This issue affects Johnson Controls KT-1 all versions up to and including 3.01 | CWE-294 |
160,617 | CVE-2021-27663 | 9.8 | 9.3 | CRITICAL | A vulnerability in versions 10.1 through 10.5 of Johnson Controls CEM Systems AC2000 allows a remote attacker to access to the system without adequate authorization. This issue affects: Johnson Controls CEM Systems AC2000 10.1; 10.2; 10.3; 10.4; 10.5. | CWE-863 |
160,618 | CVE-2021-27664 | 9.8 | 6.8 | CRITICAL | Under certain configurations an unauthenticated remote user could be given access to credentials stored in the exacqVision Server. | CWE-269 |
160,619 | CVE-2021-27665 | 7.5 | 5 | HIGH | An unauthenticated remote user could exploit a potential integer overflow condition in the exacqVision Server with a specially crafted script and cause denial-of-service condition. | CWE-190 |
160,620 | CVE-2021-27668 | 5.3 | 5 | MEDIUM | HashiCorp Vault Enterprise 0.9.2 through 1.6.2 allowed the read of license metadata from DR secondaries without authentication. Fixed in 1.6.3. | CWE-287 |
160,621 | CVE-2021-27670 | 9.8 | 7.5 | CRITICAL | Appspace 6.2.4 allows SSRF via the api/v1/core/proxy/jsonprequest url parameter. | CWE-918 |
160,622 | CVE-2021-27671 | 6.1 | 4.3 | MEDIUM | An issue was discovered in the comrak crate before 0.9.1 for Rust. XSS can occur because the protection mechanism for data: and javascript: URIs is case-sensitive, allowing (for example) Data: to be used in an attack. | CWE-79 |
160,623 | CVE-2021-27672 | 4.9 | 4 | MEDIUM | SQL Injection in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to obtain sesnitive database information by injecting SQL commands into the "cID" parameter when creating a new HTML component. | CWE-89 |
160,624 | CVE-2021-27673 | 4.8 | 3.5 | MEDIUM | Cross Site Scripting (XSS) in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to execute arbitrary code by injecting arbitrary HTML into the "cID" parameter when creating a new HTML component. | CWE-79 |
160,625 | CVE-2021-27676 | 5.4 | 3.5 | MEDIUM | Centreon version 20.10.2 is affected by a cross-site scripting (XSS) vulnerability. The dep_description (Dependency Description) and dep_name (Dependency Name) parameters are vulnerable to stored XSS. A user has to log in and go to the Configuration > Notifications > Hosts page. | CWE-79 |
160,626 | CVE-2021-27677 | 5.4 | 3.5 | MEDIUM | Cross-site scripting (XSS) vulnerability in Galleries in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name. | CWE-79 |
160,627 | CVE-2021-27678 | 5.4 | 3.5 | MEDIUM | Cross-site scripting (XSS) vulnerability in Snippets in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name. | CWE-79 |
160,628 | CVE-2021-27679 | 5.4 | 3.5 | MEDIUM | Cross-site scripting (XSS) vulnerability in Navigation in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name. | CWE-79 |
160,629 | CVE-2021-27691 | 9.8 | 10 | CRITICAL | Command Injection in Tenda G0 routers with firmware versions v15.11.0.6(9039)_CN and v15.11.0.5(5876)_CN , and Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted action/setDebugCfg request. This occurs because the "formSetDebugCfg" function executes glibc's system function with untrusted input. | CWE-78 |
160,630 | CVE-2021-27692 | 9.8 | 10 | CRITICAL | Command Injection in Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted "action/umountUSBPartition" request. This occurs because the "formSetUSBPartitionUmount" function executes the "doSystemCmd" function with untrusted input. | CWE-78 |
160,631 | CVE-2021-27695 | 6.1 | 4.3 | MEDIUM | Multiple stored cross-site scripting (XSS) vulnerabilities in openMAINT 2.1-3.3-b allow remote attackers to inject arbitrary web script or HTML via any "Add" sections, such as Add Card Building & Floor, or others in the Name and Code Parameters. | CWE-79 |
160,632 | CVE-2021-27697 | 9.8 | 7.5 | CRITICAL | RIOT-OS 2021.01 contains a buffer overflow vulnerability in sys/net/gnrc/routing/rpl/gnrc_rpl_validation.c through the gnrc_rpl_validation_options() function. | CWE-120 |
160,633 | CVE-2021-27698 | 9.8 | 7.5 | CRITICAL | RIOT-OS 2021.01 contains a buffer overflow vulnerability in /sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c through the _parse_options() function. | CWE-120 |
160,634 | CVE-2021-27705 | 9.8 | 7.5 | CRITICAL | Buffer Overflow in Tenda G1 and G3 routers with firmware v15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/"qosIndex "request. This occurs because the "formQOSRuleDel" function directly passes the parameter "qosIndex" to strcpy without limit. | CWE-120 |
160,635 | CVE-2021-27706 | 9.8 | 7.5 | CRITICAL | Buffer Overflow in Tenda G1 and G3 routers with firmware version V15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/"IPMacBindIndex "request. This occurs because the "formIPMacBindDel" function directly passes the parameter "IPMacBindIndex" to strcpy without limit. | CWE-120 |
160,636 | CVE-2021-27707 | 9.8 | 7.5 | CRITICAL | Buffer Overflow in Tenda G1 and G3 routers with firmware v15.11.0.17(9502)_CN allows remote attackers to execute arbitrary code via a crafted action/"portMappingIndex "request. This occurs because the "formDelPortMapping" function directly passes the parameter "portMappingIndex" to strcpy without limit. | CWE-120 |
160,637 | CVE-2021-27708 | 9.8 | 10 | CRITICAL | Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "command" parameter is directly passed to the attacker, allowing them to control the "command" field to attack the OS. | CWE-78 |
160,638 | CVE-2021-27710 | 9.8 | 10 | CRITICAL | Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "ip" parameter is directly passed to the attacker, allowing them to control the "ip" field to attack the OS. | CWE-78 |
160,639 | CVE-2021-27722 | 7.5 | 5 | HIGH | An issue was discovered in Nsasoft US LLC SpotAuditor 5.3.5. The program can be crashed by entering 300 bytes char data into the "Key" or "Name" field while registering. | CWE-120 |
160,640 | CVE-2021-27730 | 9.8 | 7.5 | CRITICAL | Accellion FTA 9_12_432 and earlier is affected by argument injection via a crafted POST request to an admin endpoint. The fixed version is FTA_9_12_444 and later. | CWE-74 |
160,641 | CVE-2021-27731 | 6.1 | 4.3 | MEDIUM | Accellion FTA 9_12_432 and earlier is affected by stored XSS via a crafted POST request to a user endpoint. The fixed version is FTA_9_12_444 and later. | CWE-79 |
160,642 | CVE-2021-27733 | 5.4 | 3.5 | MEDIUM | In JetBrains YouTrack before 2020.6.6441, stored XSS was possible via an issue attachment. | CWE-79 |
160,643 | CVE-2021-27734 | 9.8 | 7.5 | CRITICAL | Hirschmann HiOS 07.1.01, 07.1.02, and 08.1.00 through 08.5.xx and HiSecOS 03.3.00 through 03.5.01 allow remote attackers to change the credentials of existing users. | CWE-522 |
160,644 | CVE-2021-27736 | 6.5 | 4 | MEDIUM | FusionAuth fusionauth-samlv2 before 0.5.4 allows XXE attacks via a forged AuthnRequest or LogoutRequest because parseFromBytes uses javax.xml.parsers.DocumentBuilderFactory unsafely. | CWE-611 |
160,645 | CVE-2021-27737 | 7.5 | 5 | HIGH | Apache Traffic Server 9.0.0 is vulnerable to a remote DOS attack on the experimental Slicer plugin. | NVD-CWE-noinfo |
160,646 | CVE-2021-27741 | 9.1 | 6.4 | CRITICAL | " Security vulnerability in HCL Commerce Management Center allowing XML external entity (XXE) injection" | CWE-611 |
160,647 | CVE-2021-27746 | 5.4 | 3.5 | MEDIUM | "HCL Connections Security Update for Reflected Cross-Site Scripting (XSS) Vulnerability" | CWE-79 |
160,648 | CVE-2021-27790 | 7.8 | 7.2 | HIGH | The command ipfilter in Brocade Fabric OS before Brocade Fabric OS v.9.0.1a, v8.2.3, and v8.2.0_CBN4, and v7.4.2h uses unsafe string function to process user input. Authenticated attackers can abuse this vulnerability to exploit stack-based buffer overflows, allowing execution of arbitrary code as the root user account. | CWE-20 |
160,649 | CVE-2021-27791 | 5.4 | 5.5 | MEDIUM | The function that is used to parse the Authentication header in Brocade Fabric OS Web application service before Brocade Fabric OS v9.0.1a and v8.2.3a fails to properly process a malformed authentication header from the client, resulting in reading memory addresses outside the intended range. An unauthenticated attacker could discover a request, which could bypass the authentication process. | CWE-287 |
160,650 | CVE-2021-27792 | 7.8 | 7.2 | HIGH | The request handling functions in web management interface of Brocade Fabric OS versions before v9.0.1a, v8.2.3a, and v7.4.2h do not properly handle malformed user input, resulting in a service crash. An authenticated attacker could use this weakness to cause the FOS HTTP application handler to crash, requiring a reboot. | CWE-20 |
160,651 | CVE-2021-27793 | 5.3 | 5 | MEDIUM | ntermittent authorization failure in aaa tacacs+ with Brocade Fabric OS versions before Brocade Fabric OS v9.0.1b and after 9.0.0, also in Brocade Fabric OS before Brocade Fabric OS v8.2.3a and after v8.2.0 could cause a user with a valid account to be unable to log into the switch. | CWE-863 |
160,652 | CVE-2021-27794 | 7.8 | 4.6 | HIGH | A vulnerability in the authentication mechanism of Brocade Fabric OS versions before Brocade Fabric OS v.9.0.1a, v8.2.3a and v7.4.2h could allow a user to Login with empty password, and invalid password through telnet, ssh and REST. | CWE-287 |
160,653 | CVE-2021-27799 | 7.5 | 5 | HIGH | ean_leading_zeroes in backend/upcean.c in Zint Barcode Generator 2.9.1 has a stack-based buffer overflow that is reachable from the C API through an application that includes the Zint Barcode Generator library code. | CWE-787 |
160,654 | CVE-2021-27803 | 7.5 | 5.4 | HIGH | A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. | NVD-CWE-noinfo |
160,655 | CVE-2021-27804 | 9.8 | 7.5 | CRITICAL | JPEG XL (aka jpeg-xl) through 0.3.2 allows writable memory corruption. | CWE-787 |
160,656 | CVE-2021-27807 | 5.5 | 4.3 | MEDIUM | A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | CWE-834 |
160,657 | CVE-2021-27811 | 7.2 | 6.5 | HIGH | A code injection vulnerability has been discovered in the Upgrade function of QibosoftX1 v1.0. An attacker is able execute arbitrary PHP code via exploitation of client_upgrade_edition.php and Upgrade.php. | CWE-94 |
160,658 | CVE-2021-27815 | 5.5 | 4.3 | MEDIUM | NULL Pointer Deference in the exif command line tool, when printing out XML formatted EXIF data, in exif v0.6.22 and earlier allows attackers to cause a Denial of Service (DoS) by uploading a malicious JPEG file, causing the application to crash. | CWE-476 |
160,659 | CVE-2021-27817 | 9.8 | 7.5 | CRITICAL | A remote command execution vulnerability in shopxo 1.9.3 allows an attacker to upload malicious code generated by phar where the suffix is JPG, which is uploaded after modifying the phar suffix. | CWE-434 |
160,660 | CVE-2021-27821 | 6.1 | 4.3 | MEDIUM | The Web Interface for OpenWRT LuCI version 19.07 and lower has been discovered to have a cross-site scripting vulnerability which can lead to attackers carrying out arbitrary code execution. | CWE-79 |
160,661 | CVE-2021-27822 | 4.8 | 3.5 | MEDIUM | A persistent cross site scripting (XSS) vulnerability in the Add Categories module of Vehicle Parking Management System 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Category field. | CWE-79 |
160,662 | CVE-2021-27823 | 7.5 | 5 | HIGH | An information disclosure vulnerability was discovered in /index.class.php (via port 8181) on NetWave System 1.0 which allows unauthenticated attackers to exfiltrate sensitive information from the system. | CWE-200 |
160,663 | CVE-2021-27828 | 9.1 | 6.4 | CRITICAL | SQL injection in In4Suite ERP 3.2.74.1370 allows attackers to modify or delete data, causing persistent changes to the application's content or behavior by using malicious SQL queries. | CWE-89 |
160,664 | CVE-2021-27836 | 6.5 | 4.3 | MEDIUM | An issue was discoverered in in function xls_getWorkSheet in xls.c in libxls 1.6.2, allows attackers to cause a denial of service, via a crafted XLS file. | CWE-476 |
160,665 | CVE-2021-27839 | 4.4 | 5.8 | MEDIUM | A CSV injection vulnerability found in Online Invoicing System (OIS) 4.3 and below can be exploited by users to perform malicious actions such as redirecting admins to unknown or harmful websites, or disclosing other clients' details that the user did not have access to. | CWE-1236 |
160,666 | CVE-2021-27845 | 5.5 | 4.3 | MEDIUM | A Divide-by-zero vulnerability exists in JasPer Image Coding Toolkit 2.0 in jasper/src/libjasper/jpc/jpc_enc.c | CWE-369 |
160,667 | CVE-2021-27847 | 6.5 | 4.3 | MEDIUM | Division-By-Zero vulnerability in Libvips 8.10.5 in the function vips_eye_point, eye.c#L83, and function vips_mask_point, mask.c#L85. | CWE-369 |
160,668 | CVE-2021-27850 | 9.8 | 10 | CRITICAL | A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.1, upgrade to 5.6.2 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later. | CWE-502 |
160,669 | CVE-2021-27851 | 5.5 | 2.1 | MEDIUM | A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable. | CWE-269 |
160,670 | CVE-2021-27852 | 9.8 | 7.5 | CRITICAL | Deserialization of Untrusted Data vulnerability in CheckboxWeb.dll of Checkbox Survey allows an unauthenticated remote attacker to execute arbitrary code. This issue affects: Checkbox Survey versions prior to 7. | CWE-502 |
160,671 | CVE-2021-27855 | 8.8 | 6.5 | HIGH | FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, authenticated attacker with read-only privileges to grant themselves administrative privileges. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA001. | CWE-862 |
160,672 | CVE-2021-27856 | 9.8 | 7.5 | CRITICAL | FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 includes an account named "cmuser" that has administrative privileges and no password. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA002. | CWE-862 |
160,673 | CVE-2021-27857 | 7.5 | 4.3 | HIGH | A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote, unauthenticated attacker to download a configuration archive. The attacker needs to know or correctly guess the hostname of the target system since the hostname is used as part of the configuration archive file name. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA003. | CWE-862 |
160,674 | CVE-2021-27858 | 5.3 | 5 | MEDIUM | A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote attacker to access at least the URL "/fpui/jsp/index.jsp" leading to unknown impact, presumably some violation of confidentiality. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA004. | CWE-862 |
160,675 | CVE-2021-27859 | 8.8 | 6.5 | HIGH | A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows an authenticated, remote attacker with read-only privileges to create an account with administrative privileges. Older versions of FatPipe software may also be vulnerable. This does not appear to be a CSRF vulnerability. The FatPipe advisory identifier for this vulnerability is FPSA005. | CWE-862 |
160,676 | CVE-2021-27860 | 8.8 | 9.3 | HIGH | A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006. | CWE-434 |
160,677 | CVE-2021-27876 | 8.1 | 7.5 | HIGH | An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges. | CWE-287 |
160,678 | CVE-2021-27877 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands. | CWE-287 |
160,679 | CVE-2021-27878 | 8.8 | 9 | HIGH | An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to execute an arbitrary command on the system using system privileges. | CWE-287 |
160,680 | CVE-2021-27884 | 5.1 | 3.6 | MEDIUM | Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used. | CWE-330 |
160,681 | CVE-2021-27885 | 8.8 | 6.8 | HIGH | usersettings.php in e107 through 2.3.0 lacks a certain e_TOKEN protection mechanism. | CWE-326 |
160,682 | CVE-2021-27886 | 9.8 | 7.5 | CRITICAL | rakibtg Docker Dashboard before 2021-02-28 allows command injection in backend/utilities/terminal.js via shell metacharacters in the command parameter of an API request. NOTE: this is NOT a Docker, Inc. product. | CWE-77 |
160,683 | CVE-2021-27887 | 5.4 | 3.5 | MEDIUM | Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids Ellipse APM 5.3 version 5.3.0.1 and prior versions; 5.2 version 5.2.0.3 and prior versions; 5.1 version 5.1.0.6 and prior versions. | CWE-79 |
160,684 | CVE-2021-27888 | 6.1 | 4.3 | MEDIUM | ZendTo before 6.06-4 Beta allows XSS during the display of a drop-off in which a filename has unexpected characters. | CWE-79 |
160,685 | CVE-2021-27889 | 6.1 | 4.3 | MEDIUM | Cross-site Scripting (XSS) vulnerability in MyBB before 1.8.26 via Nested Auto URL when parsing messages. | CWE-79 |
160,686 | CVE-2021-27890 | 8.8 | 6.8 | HIGH | SQL Injection vulnerablity in MyBB before 1.8.26 via theme properties included in theme XML files. | CWE-89 |
160,687 | CVE-2021-27891 | 8.8 | 6.5 | HIGH | SSH Tectia Client and Server before 6.4.19 on Windows have weak key generation. ConnectSecure on Windows is affected. | NVD-CWE-noinfo |
160,688 | CVE-2021-27892 | 7.8 | 4.6 | HIGH | SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation. ConnectSecure on Windows is affected. | CWE-269 |
160,689 | CVE-2021-27893 | 7 | 4.4 | HIGH | SSH Tectia Client and Server before 6.4.19 on Windows allow local privilege escalation in nonstandard conditions. ConnectSecure on Windows is affected. | CWE-269 |
160,690 | CVE-2021-27899 | 7.4 | 5.8 | HIGH | The Proofpoint Insider Threat Management Agents (formerly ObserveIT Agent) for MacOS and Linux perform improper validation of the ITM Server's certificate, which enables a remote attacker to intercept and alter these communications using a man-in-the-middle attack. All versions before 7.11.1 are affected. Agents for Windows and Cloud are not affected. | CWE-295 |
160,691 | CVE-2021-27900 | 8.1 | 5.5 | HIGH | The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is missing an authorization check on several pages in the Web Console. This enables a view-only user to change any configuration setting and delete any registered agents. All versions before 7.11.1 are affected. | CWE-862 |
160,692 | CVE-2021-27901 | 6.8 | 4.6 | MEDIUM | An issue was discovered on LG mobile devices with Android OS 11 software. They mishandle fingerprint recognition because local high beam mode (LHBM) does not function properly during bright illumination. The LG ID is LVE-SMP-210001 (March 2021). | NVD-CWE-noinfo |
160,693 | CVE-2021-27902 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads. | CWE-79 |
160,694 | CVE-2021-27903 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session). | CWE-94 |
160,695 | CVE-2021-27904 | 5.5 | 2.1 | MEDIUM | An issue was discovered in app/Model/SharingGroupServer.php in MISP 2.4.139. In the implementation of Sharing Groups, the "all org" flag sometimes provided view access to unintended actors. | NVD-CWE-noinfo |
160,696 | CVE-2021-27905 | 9.8 | 7.5 | CRITICAL | The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2. | CWE-918 |
160,697 | CVE-2021-27906 | 5.5 | 4.3 | MEDIUM | A carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | NVD-CWE-Other |
160,698 | CVE-2021-27907 | 5.4 | 3.5 | MEDIUM | Apache Superset up to and including 0.38.0 allowed the creation of a Markdown component on a Dashboard page for describing chart's related information. Abusing this functionality, a malicious user could inject javascript code executing unwanted action in the context of the user's browser. The javascript code will be automatically executed (Stored XSS) when a legitimate user surfs on the dashboard page. The vulnerability is exploitable creating a “div” section and embedding in it a “svg” element with javascript code. | CWE-79 |
160,699 | CVE-2021-27908 | 4.4 | 2.1 | MEDIUM | In all versions prior to Mautic 3.3.2, secret parameters such as database credentials could be exposed publicly by an authorized admin user through leveraging Symfony parameter syntax in any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application. | CWE-732 |
160,700 | CVE-2021-27909 | 6.1 | 4.3 | MEDIUM | For Mautic versions prior to 3.3.4/4.0.0, there is an XSS vulnerability on Mautic's password reset page where a vulnerable parameter, "bundle," in the URL could allow an attacker to execute Javascript code. The attacker would be required to convince or trick the target into clicking a password reset URL with the vulnerable parameter utilized. | CWE-79 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.