ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
162,001 | CVE-2021-30015 | 5.5 | 4.3 | MEDIUM | There is a Null Pointer Dereference in function filter_core/filter_pck.c:gf_filter_pck_new_alloc_internal in GPAC 1.0.1. The pid comes from function av1dmx_parse_flush_sample, the ctx.opid maybe NULL. The result is a crash in gf_filter_pck_new_alloc_internal. | CWE-476 |
162,002 | CVE-2021-30019 | 5.5 | 4.3 | MEDIUM | In the adts_dmx_process function in filters/reframe_adts.c in GPAC 1.0.1, a crafted file may cause ctx->hdr.frame_size to be smaller than ctx->hdr.hdr_size, resulting in size to be a negative number and a heap overflow in the memcpy. | CWE-787 |
162,003 | CVE-2021-3002 | 6.1 | 4.3 | MEDIUM | Seo Panel 4.8.0 allows reflected XSS via the seo/seopanel/login.php?sec=forgot email parameter. | CWE-79 |
162,004 | CVE-2021-30020 | 5.5 | 4.3 | MEDIUM | In the function gf_hevc_read_pps_bs_internal function in media_tools/av_parsers.c in GPAC 1.0.1 there is a loop, which with crafted file, pps->num_tile_columns may be larger than sizeof(pps->column_width), which results in a heap overflow in the loop. | CWE-787 |
162,005 | CVE-2021-30022 | 5.5 | 4.3 | MEDIUM | There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash. | CWE-190 |
162,006 | CVE-2021-30027 | 5.5 | 4.3 | MEDIUM | md_analyze_line in md4c.c in md4c 0.4.7 allows attackers to trigger use of uninitialized memory, and cause a denial of service via a malformed Markdown document. | CWE-908 |
162,007 | CVE-2021-3003 | 5.3 | 4.3 | MEDIUM | Agenzia delle Entrate Desktop Telematico 1.0.0 contacts the jws.agenziaentrate.it server over cleartext HTTP, which allows man-in-the-middle attackers to spoof product updates. | CWE-319 |
162,008 | CVE-2021-30030 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) in Remote Clinic v2.0 via the Full Name field on register-patient.php. | CWE-79 |
162,009 | CVE-2021-30034 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) in Remote Clinic v2.0 via the Symptons field on patients/register-report.php. | CWE-79 |
162,010 | CVE-2021-30039 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Fever" or "Blood Pressure" field on the patients/register-report.php. | CWE-79 |
162,011 | CVE-2021-3004 | 7.5 | 5 | HIGH | The _deposit function in the smart contract implementation for Stable Yield Credit (yCREDIT), an Ethereum token, has certain incorrect calculations. An attacker can obtain more yCREDIT tokens than they should. | CWE-682 |
162,012 | CVE-2021-30042 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Clinic Name", "Clinic Address", "Clinic City", or "Clinic Contact" field on clinics/register.php | CWE-79 |
162,013 | CVE-2021-30044 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) in Remote Clinic v2.0 via the First Name or Last Name field on staff/register.php. | CWE-79 |
162,014 | CVE-2021-30045 | 9.1 | 6.4 | CRITICAL | SerenityOS 2021-03-27 contains a buffer overflow vulnerability in the EndOfCentralDirectory::read() function. | CWE-120 |
162,015 | CVE-2021-30046 | 6.5 | 4.3 | MEDIUM | VIGRA Computer Vision Library Version-1-11-1 contains a segmentation fault vulnerability in the impex.hxx read_image_band() function, in which a crafted file can cause a denial of service. | CWE-755 |
162,016 | CVE-2021-30048 | 5.3 | 5 | MEDIUM | Directory Traversal in the fileDownload function in com/java2nb/common/controller/FileController.java in Novel-plus (?????-plus) 3.5.1 allows attackers to read arbitrary files via the filePath parameter. | CWE-22 |
162,017 | CVE-2021-30049 | 6.1 | 4.3 | MEDIUM | SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI. | CWE-79 |
162,018 | CVE-2021-3005 | 4.3 | 4 | MEDIUM | MK-AUTH through 19.01 K4.9 allows remote attackers to obtain sensitive information (e.g., a CPF number) via a modified titulo (aka invoice number) value to the central/recibo.php URI. | NVD-CWE-noinfo |
162,019 | CVE-2021-30055 | 8.8 | 6.5 | HIGH | A SQL injection vulnerability in Knowage Suite version 7.1 exists in the documentexecution/url analytics driver component via the 'par_year' parameter when running a report. | CWE-89 |
162,020 | CVE-2021-30056 | 5.4 | 3.5 | MEDIUM | Knowage Suite before 7.4 is vulnerable to reflected cross-site scripting (XSS). An attacker can inject arbitrary web script in /restful-services/publish via the 'EXEC_FROM' parameter that can lead to data leakage. | CWE-79 |
162,021 | CVE-2021-30057 | 4.8 | 3.5 | MEDIUM | A stored HTML injection vulnerability exists in Knowage Suite version 7.1. An attacker can inject arbitrary HTML in "/restful-services/2.0/analyticalDrivers" via the 'LABEL' and 'NAME' parameters. | CWE-74 |
162,022 | CVE-2021-30058 | 6.1 | 4.3 | MEDIUM | Knowage Suite before 7.4 is vulnerable to cross-site scripting (XSS). An attacker can inject arbitrary external script in '/knowagecockpitengine/api/1.0/pages/execute' via the 'SBI_HOST' parameter. | CWE-79 |
162,023 | CVE-2021-3006 | 7.5 | 5 | HIGH | The breed function in the smart contract implementation for Farm in Seal Finance (Seal), an Ethereum token, lacks access control and thus allows price manipulation, as exploited in the wild in December 2020 and January 2021. | CWE-863 |
162,024 | CVE-2021-3007 | 9.8 | 7.5 | CRITICAL | ** DISPUTED ** Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized. | CWE-502 |
162,025 | CVE-2021-30072 | 9.8 | 7.5 | CRITICAL | An issue was discovered in prog.cgi on D-Link DIR-878 1.30B08 devices. Because strcat is misused, there is a stack-based buffer overflow that does not require authentication. | CWE-787 |
162,026 | CVE-2021-30074 | 6.1 | 4.3 | MEDIUM | docsify 4.12.1 is affected by Cross Site Scripting (XSS) because the search component does not appropriately encode Code Blocks and mishandles the " character. | CWE-79 |
162,027 | CVE-2021-30081 | 8.8 | 6.5 | HIGH | An issue was discovered in emlog 6.0.0stable. There is a SQL Injection vulnerability that can execute any SQL statement and query server sensitive data via admin/navbar.php?action=add_page. | CWE-89 |
162,028 | CVE-2021-30082 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Gris CMS v0.1. There is a Persistent XSS vulnerability which allows remote attackers to inject arbitrary web script or HTML via admin/dashboard. | CWE-79 |
162,029 | CVE-2021-30083 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Mediat 1.4.1. There is a Reflected XSS vulnerability which allows remote attackers to inject arbitrary web script or HTML without authentication via the 'return' parameter in login.php. | CWE-79 |
162,030 | CVE-2021-30086 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS) vulnerability exists in KindEditor (Chinese versions) 4.1.12, which can be exploited by an attacker to obtain user cookie information. | CWE-79 |
162,031 | CVE-2021-3010 | 5.4 | 3.5 | MEDIUM | There are multiple persistent cross-site scripting (XSS) vulnerabilities in the web interface of OpenText Content Server Version 20.3. The application allows a remote attacker to introduce arbitrary JavaScript by crafting malicious form values that are later not sanitized. | CWE-79 |
162,032 | CVE-2021-30108 | 9.1 | 6.4 | CRITICAL | Feehi CMS 2.1.1 is affected by a Server-side request forgery (SSRF) vulnerability. When the user modifies the HTTP Referer header to any url, the server can make a request to it. | CWE-918 |
162,033 | CVE-2021-30109 | 6.1 | 4.3 | MEDIUM | Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module. | CWE-79 |
162,034 | CVE-2021-3011 | 4.2 | 1.9 | MEDIUM | An electromagnetic-wave side-channel issue was discovered on NXP SmartMX / P5x security microcontrollers and A7x secure authentication microcontrollers, with CryptoLib through v2.9. It allows attackers to extract the ECDSA private key after extensive physical access (and consequently produce a clone). This was demonstrated on the Google Titan Security Key, based on an NXP A7005a chip. Other FIDO U2F security keys are also impacted (Yubico YubiKey Neo and Feitian K9, K13, K21, and K40) as well as several NXP JavaCard smartcards (J3A081, J2A081, J3A041, J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60, J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61, J3D081_M59_DF, J3D081_M61_DF, J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64, J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, J2E082_M65, J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF, and J3E016_M64_DF). | CWE-203 |
162,035 | CVE-2021-30110 | 7.5 | 5.1 | HIGH | dttray.exe in Greyware Automation Products Inc Domain Time II before 5.2.b.20210331 allows remote attackers to execute arbitrary code via a URL to a malicious update in a spoofed response to the UDP query used to check for updates. | NVD-CWE-noinfo |
162,036 | CVE-2021-30111 | 5.4 | 3.5 | MEDIUM | A stored XSS vulnerability exists in Web-School ERP V 5.0 via (Add Events) in the event name and description fields. An attack can inject a JavaScript code that will be stored in the page. If any visitor sees the events, then the payload will be executed. | CWE-79 |
162,037 | CVE-2021-30112 | 6.5 | 4.3 | MEDIUM | Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a student_leave_application request through module/core/studentleaveapplication/create. The application fails to validate the CSRF token for a POST request using Guardian privilege. | CWE-352 |
162,038 | CVE-2021-30113 | 6.1 | 4.3 | MEDIUM | A blind XSS vulnerability exists in Web-School ERP V 5.0 via (Add Events) in event name and description fields. An attacker can inject a JavaScript code that will be stored in the page. If any visitor sees the event, then the payload will be executed and sends the victim's information to the attacker website. | CWE-79 |
162,039 | CVE-2021-30114 | 6.5 | 4.3 | MEDIUM | Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a voucher payment request through module/accounting/voucher/create. The application fails to validate the CSRF token for a POST request using admin privilege. | CWE-352 |
162,040 | CVE-2021-30116 | 9.8 | 7.5 | CRITICAL | Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021. | CWE-522 |
162,041 | CVE-2021-30117 | 8.8 | 6.5 | HIGH | SQL injection exists in Kaseya VSA before 9.5.6. | CWE-89 |
162,042 | CVE-2021-30118 | 9.8 | 7.5 | CRITICAL | Kaseya VSA before 9.5.5 allows remote code execution. | NVD-CWE-noinfo |
162,043 | CVE-2021-30119 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in Kaseya VSA before 9.5.7. | CWE-79 |
162,044 | CVE-2021-3012 | 5.4 | 3.5 | MEDIUM | A cross-site scripting (XSS) vulnerability in the Document Link of documents in ESRI Enterprise before 10.9 allows remote authenticated users to inject arbitrary JavaScript code via a malicious HTML attribute such as onerror (in the URL field of the Parameters tab). | CWE-79 |
162,045 | CVE-2021-30120 | 7.5 | 5 | HIGH | Kaseya VSA through 9.5.7 allows attackers to bypass the 2FA requirement. | CWE-863 |
162,046 | CVE-2021-30121 | 8.8 | 6.5 | HIGH | Local file inclusion exists in Kaseya VSA before 9.5.6. | CWE-829 |
162,047 | CVE-2021-30123 | 8.8 | 6.8 | HIGH | FFmpeg <=4.3 contains a buffer overflow vulnerability in libavcodec through a crafted file that may lead to remote code execution. | CWE-120 |
162,048 | CVE-2021-30124 | 9.8 | 7.5 | CRITICAL | The unofficial vscode-phpmd (aka PHP Mess Detector) extension before 1.3.0 for Visual Studio Code allows remote attackers to execute arbitrary code via a crafted phpmd.command value in a workspace folder. | CWE-77 |
162,049 | CVE-2021-30125 | 6.1 | 4.3 | MEDIUM | Jamf Pro before 10.28.0 allows XSS related to inventory history, aka PI-009376. | CWE-79 |
162,050 | CVE-2021-30126 | 6.5 | 6.4 | MEDIUM | Lightmeter ControlCenter 1.1.0 through 1.5.x before 1.5.1 allows anyone who knows the URL of a publicly available Lightmeter instance to access application settings, possibly including an SMTP password and a Slack access token, via a settings HTTP query. | NVD-CWE-noinfo |
162,051 | CVE-2021-30127 | 7.3 | 7.5 | HIGH | TerraMaster F2-210 devices through 2021-04-03 use UPnP to make the admin web server accessible over the Internet on TCP port 8181, which is arguably inconsistent with the "It is only available on the local network" documentation. NOTE: manually editing /etc/upnp.json provides a partial but undocumented workaround. | CWE-863 |
162,052 | CVE-2021-30128 | 9.8 | 10 | CRITICAL | Apache OFBiz has unsafe deserialization prior to 17.12.07 version | CWE-502 |
162,053 | CVE-2021-30129 | 6.5 | 4 | MEDIUM | A vulnerability in sshd-core of Apache Mina SSHD allows an attacker to overflow the server causing an OutOfMemory error. This issue affects the SFTP and port forwarding features of Apache Mina SSHD version 2.0.0 and later versions. It was addressed in Apache Mina SSHD 2.7.0 | CWE-772 |
162,054 | CVE-2021-3013 | 9.8 | 7.5 | CRITICAL | ripgrep before 13 on Windows allows attackers to trigger execution of arbitrary programs from the current working directory via the -z/--search-zip or --pre flag. | NVD-CWE-noinfo |
162,055 | CVE-2021-30130 | 7.5 | 5 | HIGH | phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification. | CWE-347 |
162,056 | CVE-2021-30132 | 9.8 | 7.5 | CRITICAL | Cloudera Manager 7.2.4 has Incorrect Access Control, allowing Escalation of Privileges. | CWE-269 |
162,057 | CVE-2021-30133 | 6.1 | 4.3 | MEDIUM | A cross-site scripting (XSS) vulnerability in CloverDX Server 5.9.0, CloverDX 5.8.1, CloverDX 5.7.0, and earlier allows remote attackers to inject arbitrary web script or HTML via the sessionToken parameter of multiple methods in Simple HTTP API. This is resolved in 5.9.1 and 5.10. | CWE-79 |
162,058 | CVE-2021-30137 | 8.2 | 6.4 | HIGH | Assyst 10 SP7.5 has authenticated XXE leading to SSRF via XML unmarshalling. The application allows users to send JSON or XML data to the server. It was possible to inject malicious XML data through several access points. | CWE-611 |
162,059 | CVE-2021-30139 | 7.5 | 5 | HIGH | In Alpine Linux apk-tools before 2.12.5, the tarball parser allows a buffer overflow and crash. | CWE-125 |
162,060 | CVE-2021-3014 | 6.1 | 4.3 | MEDIUM | In MikroTik RouterOS through 2021-01-04, the hotspot login page is vulnerable to reflected XSS via the target parameter. | CWE-79 |
162,061 | CVE-2021-30140 | 5.4 | 3.5 | MEDIUM | LiquidFiles 3.4.15 has stored XSS through the "send email" functionality when sending a file via email to an administrator. When a file has no extension and contains malicious HTML / JavaScript content (such as SVG with HTML content), the payload is executed upon a click. This is fixed in 3.5. | CWE-79 |
162,062 | CVE-2021-30141 | 7.5 | 5 | HIGH | ** DISPUTED ** Module/Settings/UserExport.php in Friendica through 2021.01 allows settings/userexport to be used by anonymous users, as demonstrated by an attempted access to an array offset on a value of type null, and excessive memory consumption. NOTE: the vendor states "the feature still requires a valid authentication cookie even if the route is accessible to non-logged users." | CWE-401 |
162,063 | CVE-2021-30144 | 4.3 | 4 | MEDIUM | The Dashboard plugin through 1.0.2 for GLPI allows remote low-privileged users to bypass access control on viewing information about the last ten events, the connected users, and the users in the tech category. For example, plugins/dashboard/front/main2.php can be used. | CWE-863 |
162,064 | CVE-2021-30145 | 7.8 | 6.8 | HIGH | A format string vulnerability in mpv through 0.33.0 allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file. | CWE-134 |
162,065 | CVE-2021-30146 | 5.4 | 3.5 | MEDIUM | Seafile 7.0.5 (2019) allows Persistent XSS via the "share of library functionality." | CWE-79 |
162,066 | CVE-2021-30147 | 8.8 | 6.8 | HIGH | DMA Softlab Radius Manager 4.4.0 allows CSRF with impacts such as adding new manager accounts via admin.php. | CWE-352 |
162,067 | CVE-2021-30149 | 9.8 | 7.5 | CRITICAL | Composr 10.0.36 allows upload and execution of PHP files. | CWE-434 |
162,068 | CVE-2021-30150 | 6.1 | 4.3 | MEDIUM | Composr 10.0.36 allows XSS in an XML script. | CWE-79 |
162,069 | CVE-2021-30151 | 6.1 | 4.3 | MEDIUM | Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used. | CWE-79 |
162,070 | CVE-2021-30152 | 4.3 | 4 | MEDIUM | An issue was discovered in MediaWiki before 1.31.13 and 1.32.x through 1.35.x before 1.35.2. When using the MediaWiki API to "protect" a page, a user is currently able to protect to a higher level than they currently have permissions for. | CWE-732 |
162,071 | CVE-2021-30154 | 6.1 | 4.3 | MEDIUM | An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On Special:NewFiles, all the mediastatistics-header-* messages are output in HTML unescaped, leading to XSS. | CWE-79 |
162,072 | CVE-2021-30155 | 4.3 | 4 | MEDIUM | An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. ContentModelChange does not check if a user has correct permissions to create and set the content model of a nonexistent page. | CWE-862 |
162,073 | CVE-2021-30156 | 4.3 | 4 | MEDIUM | An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Special:Contributions can leak that a "hidden" user exists. | CWE-732 |
162,074 | CVE-2021-30157 | 6.1 | 4.3 | MEDIUM | An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On ChangesList special pages such as Special:RecentChanges and Special:Watchlist, some of the rcfilters-filter-* label messages are output in HTML unescaped, leading to XSS. | CWE-79 |
162,075 | CVE-2021-30158 | 5.3 | 5 | MEDIUM | An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party. | CWE-287 |
162,076 | CVE-2021-30159 | 4.3 | 4 | MEDIUM | An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain "fast double move" situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it's only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master. | NVD-CWE-noinfo |
162,077 | CVE-2021-30161 | 5.5 | 2.1 | MEDIUM | An issue was discovered on LG mobile devices with Android OS 11 software. Attackers can bypass the lockscreen protection mechanism after an incoming call has been terminated. The LG ID is LVE-SMP-210002 (April 2021). | NVD-CWE-noinfo |
162,078 | CVE-2021-30162 | 7.1 | 3.6 | HIGH | An issue was discovered on LG mobile devices with Android OS 4.4 through 11 software. Attackers can leverage ISMS services to bypass access control on specific content providers. The LG ID is LVE-SMP-210003 (April 2021). | NVD-CWE-Other |
162,079 | CVE-2021-30163 | 7.5 | 5 | HIGH | Redmine before 4.0.8 and 4.1.x before 4.1.2 allows attackers to discover the names of private projects if issue-journal details exist that have changes to project_id values. | CWE-200 |
162,080 | CVE-2021-30164 | 9.8 | 7.5 | CRITICAL | Redmine before 4.0.8 and 4.1.x before 4.1.2 allows attackers to bypass the add_issue_notes permission requirement by leveraging the Issues API. | NVD-CWE-noinfo |
162,081 | CVE-2021-30165 | 8.1 | 5 | HIGH | The default administrator account & password of the EDIMAX wireless network camera is hard-coded. Remote attackers can disassemble firmware to obtain the privileged permission and further control the devices. | CWE-798 |
162,082 | CVE-2021-30166 | 7.2 | 9 | HIGH | The NTP Server configuration function of the IP camera device is not verified with special parameters. Remote attackers can perform a command Injection attack and execute arbitrary commands after logging in with the privileged permission. | CWE-78 |
162,083 | CVE-2021-30167 | 9.8 | 9 | CRITICAL | The manage users profile services of the network camera device allows an authenticated. Remote attackers can modify URL parameters and further amend user’s information and escalate privileges to control the devices. | CWE-522 |
162,084 | CVE-2021-30168 | 9.8 | 7.5 | CRITICAL | The sensitive information of webcam device is not properly protected. Remote attackers can unauthentically grant administrator’s credential and further control the devices. | CWE-200 |
162,085 | CVE-2021-30169 | 7.5 | 5 | HIGH | The sensitive information of webcam device is not properly protected. Remote attackers can unauthentically grant user’s credential. | CWE-200 |
162,086 | CVE-2021-3017 | 7.5 | 5 | HIGH | The web interface on Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code. | NVD-CWE-noinfo |
162,087 | CVE-2021-30170 | 5.4 | 3.5 | MEDIUM | Special characters of ERP POS customer profile page are not filtered in users’ input, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks, additionally access and manipulate customer’s information. | CWE-79 |
162,088 | CVE-2021-30171 | 5.4 | 3.5 | MEDIUM | Special characters of ERP POS news page are not filtered in users’ input, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks, additionally access and manipulate customer’s information. | CWE-79 |
162,089 | CVE-2021-30172 | 5.4 | 3.5 | MEDIUM | Special characters of picture preview page in the Quan-Fang-Wei-Tong-Xun system are not filtered in users’ input, which allow remote authenticated attackers can inject malicious JavaScript and carry out Reflected XSS (Cross-site scripting) attacks, additionally access and manipulate customer’s information. | CWE-79 |
162,090 | CVE-2021-30173 | 6.5 | 4 | MEDIUM | Local File Inclusion vulnerability of the omni-directional communication system allows remote authenticated attacker inject absolute path into Url parameter and access arbitrary file. | CWE-36 |
162,091 | CVE-2021-30174 | 5.4 | 3.5 | MEDIUM | RiyaLab CloudISO event item is added, special characters in specific field of time management page are not properly filtered, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks. | CWE-79 |
162,092 | CVE-2021-30175 | 9.8 | 7.5 | CRITICAL | ZEROF Web Server 1.0 (April 2021) allows SQL Injection via the /HandleEvent endpoint for the login page. | CWE-89 |
162,093 | CVE-2021-30176 | 9.8 | 7.5 | CRITICAL | The ZEROF Expert pro/2.0 application for mobile devices allows SQL Injection via the Authorization header to the /v2/devices/add endpoint. | CWE-89 |
162,094 | CVE-2021-30177 | 9.8 | 7.5 | CRITICAL | There is a SQL Injection vulnerability in PHP-Nuke 8.3.3 in the User Registration section, leading to remote code execution. This occurs because the U.S. state is not validated to be two letters, and the OrderBy field is not validated to be one of LASTNAME, CITY, or STATE. | CWE-89 |
162,095 | CVE-2021-30178 | 5.5 | 2.1 | MEDIUM | An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987. | CWE-476 |
162,096 | CVE-2021-30179 | 9.8 | 7.5 | CRITICAL | Apache Dubbo prior to 2.6.9 and 2.7.9 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final call. The signature for the $invoke or $invokeAsync methods is Ljava/lang/String;[Ljava/lang/String;[Ljava/lang/Object; where the first argument is the name of the method to invoke, the second one is an array with the parameter types for the method being invoked and the third one is an array with the actual call arguments. In addition, the caller also needs to set an RPC attachment specifying that the call is a generic call and how to decode the arguments. The possible values are: - true - raw.return - nativejava - bean - protobuf-json An attacker can control this RPC attachment and set it to nativejava to force the java deserialization of the byte array located in the third argument. | CWE-502 |
162,097 | CVE-2021-3018 | 9.8 | 7.5 | CRITICAL | ipeak Infosystems ibexwebCMS (aka IPeakCMS) 3.5 is vulnerable to an unauthenticated Boolean-based SQL injection via the id parameter on the /cms/print.php page. | CWE-89 |
162,098 | CVE-2021-30180 | 9.8 | 6.8 | CRITICAL | Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors. | CWE-444 |
162,099 | CVE-2021-30181 | 9.8 | 7.5 | CRITICAL | Apache Dubbo prior to 2.6.9 and 2.7.9 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by the script which by default may enable executing arbitrary code. | NVD-CWE-noinfo |
162,100 | CVE-2021-30183 | 7.5 | 5 | HIGH | Cleartext storage of sensitive information in multiple versions of Octopus Server where in certain situations when running import or export processes, the password used to encrypt and decrypt sensitive values would be written to the logs in plaintext. | CWE-312 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.