ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
162,101 | CVE-2021-30184 | 7.8 | 6.8 | HIGH | GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc. | CWE-120 |
162,102 | CVE-2021-30185 | 7.5 | 5 | HIGH | CERN Indico before 2.3.4 can use an attacker-supplied Host header in a password reset link. | NVD-CWE-noinfo |
162,103 | CVE-2021-30186 | 7.5 | 5 | HIGH | CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow. | CWE-787 |
162,104 | CVE-2021-30187 | 5.3 | 4.6 | MEDIUM | CODESYS V2 runtime system SP before 2.4.7.55 has Improper Neutralization of Special Elements used in an OS Command. | CWE-78 |
162,105 | CVE-2021-30188 | 9.8 | 7.5 | CRITICAL | CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow. | CWE-787 |
162,106 | CVE-2021-30189 | 9.8 | 7.5 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has a Stack-based Buffer Overflow. | CWE-787 |
162,107 | CVE-2021-3019 | 7.5 | 5 | HIGH | ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet. | CWE-22 |
162,108 | CVE-2021-30190 | 9.8 | 7.5 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control. | CWE-668 |
162,109 | CVE-2021-30191 | 7.5 | 5 | HIGH | CODESYS V2 Web-Server before 1.1.9.20 has a a Buffer Copy without Checking the Size of the Input. | CWE-120 |
162,110 | CVE-2021-30192 | 9.8 | 7.5 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has an Improperly Implemented Security Check. | CWE-863 |
162,111 | CVE-2021-30193 | 9.8 | 7.5 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Write. | CWE-787 |
162,112 | CVE-2021-30194 | 9.1 | 6.4 | CRITICAL | CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Read. | CWE-125 |
162,113 | CVE-2021-30195 | 7.5 | 5 | HIGH | CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation. | CWE-125 |
162,114 | CVE-2021-30199 | 5.5 | 4.3 | MEDIUM | In filters/reframe_latm.c in GPAC 1.0.1 there is a Null Pointer Dereference, when gf_filter_pck_get_data is called. The first arg pck may be null with a crafted mp4 file,which results in a crash. | CWE-476 |
162,115 | CVE-2021-30201 | 8.8 | 6.5 | HIGH | An XML External Entity (XXE) issue exists in Kaseya VSA before 9.5.6. | CWE-611 |
162,116 | CVE-2021-30209 | 6.5 | 4 | MEDIUM | Textpattern V4.8.4 contains an arbitrary file upload vulnerability where a plug-in can be loaded in the background without any security verification, which may lead to obtaining system permissions. | CWE-434 |
162,117 | CVE-2021-3021 | 9.8 | 7.5 | CRITICAL | ISPConfig before 3.2.2 allows SQL injection. | CWE-89 |
162,118 | CVE-2021-30211 | 5.4 | 3.5 | MEDIUM | Knowage Suite 7.3 is vulnerable to Stored Cross-Site Scripting (XSS). An attacker can inject arbitrary web script in '/knowage/restful-services/signup/update' via the 'surname' parameter. | CWE-79 |
162,119 | CVE-2021-30212 | 5.4 | 3.5 | MEDIUM | Knowage Suite 7.3 is vulnerable to Stored Cross-Site Scripting (XSS). An attacker can inject arbitrary web script in '/knowage/restful-services/documentnotes/saveNote' via the 'nota' parameter. | CWE-79 |
162,120 | CVE-2021-30213 | 6.1 | 4.3 | MEDIUM | Knowage Suite 7.3 is vulnerable to unauthenticated reflected cross-site scripting (XSS). An attacker can inject arbitrary web script in '/servlet/AdapterHTTP' via the 'targetService' parameter. | CWE-79 |
162,121 | CVE-2021-30214 | 5.4 | 3.5 | MEDIUM | Knowage Suite 7.3 is vulnerable to Stored Client-Side Template Injection in '/knowage/restful-services/signup/update' via the 'name' parameter. | CWE-74 |
162,122 | CVE-2021-30218 | 5.5 | 4.3 | MEDIUM | samurai 1.2 has a NULL pointer dereference in writefile() in util.c via a crafted build file. | CWE-476 |
162,123 | CVE-2021-30219 | 5.5 | 4.3 | MEDIUM | samurai 1.2 has a NULL pointer dereference in printstatus() function in build.c via a crafted build file. | CWE-476 |
162,124 | CVE-2021-3022 | 5.5 | 2.1 | MEDIUM | An issue was discovered on LG mobile devices with Android OS 10 software. There was no write protection for the MTK protect2 partition. The LG ID is LVE-SMP-200028 (January 2021). | NVD-CWE-noinfo |
162,125 | CVE-2021-30224 | 8.8 | 6.8 | HIGH | Cross Site Request Forgery (CSRF) in Rukovoditel v2.8.3 allows attackers to create an admin user with an arbitrary credentials. | CWE-352 |
162,126 | CVE-2021-30227 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS) vulnerability in the article comments feature in emlog 6.0. | CWE-79 |
162,127 | CVE-2021-30228 | 9.8 | 7.5 | CRITICAL | The api/ZRAndlink/set_ZRAndlink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iandlink_proc_enable parameter. | CWE-77 |
162,128 | CVE-2021-30229 | 8.8 | 6.5 | HIGH | The api/zrDm/set_zrDm interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the dm_enable, AppKey, or Pwd parameter. | CWE-77 |
162,129 | CVE-2021-30230 | 9.8 | 7.5 | CRITICAL | The api/ZRFirmware/set_time_zone interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the zonename parameter. | CWE-77 |
162,130 | CVE-2021-30231 | 9.8 | 7.5 | CRITICAL | The api/zrDm/set_ZRElink interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the bssaddr, abiaddr, devtoken, devid, elinksync, or elink_proc_enable parameter. | CWE-77 |
162,131 | CVE-2021-30232 | 9.8 | 7.5 | CRITICAL | The api/ZRIGMP/set_IGMP_PROXY interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the IGMP_PROXY_WAN_CONNECT parameter. | CWE-77 |
162,132 | CVE-2021-30233 | 9.8 | 7.5 | CRITICAL | The api/ZRIptv/setIptvInfo interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the iptv_vlan parameter. | CWE-77 |
162,133 | CVE-2021-30234 | 9.8 | 7.5 | CRITICAL | The api/ZRIGMP/set_MLD_PROXY interface in China Mobile An Lianbao WF-1 router 1.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the MLD_PROXY_WAN_CONNECT parameter. | CWE-77 |
162,134 | CVE-2021-3024 | 5.3 | 5 | MEDIUM | HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7. | NVD-CWE-noinfo |
162,135 | CVE-2021-30245 | 8.8 | 6.8 | HIGH | The project received a report that all versions of Apache OpenOffice through 4.1.8 can open non-http(s) hyperlinks. The problem has existed since about 2006 and the issue is also in 4.1.9. If the link is specifically crafted this could lead to untrusted code execution. It is always best practice to be careful opening documents from unknown and unverified sources. The mitigation in Apache OpenOffice 4.1.10 (unreleased) assures that a security warning is displayed giving the user the option of continuing to open the hyperlink. | CWE-610 |
162,136 | CVE-2021-30246 | 9.1 | 6.4 | CRITICAL | In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack. | CWE-347 |
162,137 | CVE-2021-3025 | 8.8 | 6.5 | HIGH | Invision Community IPS Community Suite before 4.5.4.2 allows SQL Injection via the Downloads REST API (the sortDir parameter in a sortBy=popular action to the GETindex() method in applications/downloads/api/files.php). | CWE-89 |
162,138 | CVE-2021-30254 | 7.8 | 7.2 | HIGH | Possible buffer overflow due to improper input validation in factory calibration and test DIAG command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | CWE-20 |
162,139 | CVE-2021-30255 | 7.8 | 7.2 | HIGH | Possible buffer overflow due to improper input validation in PDM DIAG command in FTM in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | CWE-129 |
162,140 | CVE-2021-30256 | 7.8 | 7.2 | HIGH | Possible stack overflow due to improper validation of camera name length before copying the name in VR Service in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT | CWE-787 |
162,141 | CVE-2021-30257 | 7.8 | 7.2 | HIGH | Possible out of bound read or write in VR service due to lack of validation of DSP selection values in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT | CWE-125 |
162,142 | CVE-2021-30257 | 7.8 | 7.2 | HIGH | Possible out of bound read or write in VR service due to lack of validation of DSP selection values in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT | CWE-787 |
162,143 | CVE-2021-30258 | 7.8 | 7.2 | HIGH | Possible buffer overflow due to improper size calculation of payload received in VR service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables | CWE-787 |
162,144 | CVE-2021-30259 | 7.8 | 7.2 | HIGH | Possible out of bound access due to improper validation of function table entries in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | CWE-20 |
162,145 | CVE-2021-3026 | 6.1 | 4.3 | MEDIUM | Invision Community IPS Community Suite before 4.5.4.2 allows XSS during the quoting of a post or comment. | CWE-79 |
162,146 | CVE-2021-30260 | 7.8 | 4.6 | HIGH | Possible Integer overflow to buffer overflow issue can occur due to improper validation of input parameters when extscan hostlist configuration command is received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking | CWE-20 |
162,147 | CVE-2021-30260 | 7.8 | 4.6 | HIGH | Possible Integer overflow to buffer overflow issue can occur due to improper validation of input parameters when extscan hostlist configuration command is received in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking | CWE-190 |
162,148 | CVE-2021-30261 | 7.8 | 7.2 | HIGH | Possible integer and heap overflow due to lack of input command size validation while handling beacon template update command from HLOS in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | CWE-20 |
162,149 | CVE-2021-30263 | 7.8 | 4.4 | HIGH | Possible race condition can occur due to lack of synchronization mechanism when On-Device Logging node open twice concurrently in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music | CWE-416 |
162,150 | CVE-2021-30264 | 6.7 | 4.6 | MEDIUM | Possible use after free due improper validation of reference from call back to internal store table in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | CWE-416 |
162,151 | CVE-2021-30265 | 6.7 | 4.6 | MEDIUM | Possible memory corruption due to improper validation of memory address while processing user-space IOCTL for clearing Filter and Route statistics in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | CWE-787 |
162,152 | CVE-2021-30266 | 6.7 | 4.6 | MEDIUM | Possible use after free due to improper memory validation when initializing new interface via Interface add command in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking | CWE-416 |
162,153 | CVE-2021-3027 | 6.5 | 4 | MEDIUM | app/views_mod/user/user.py in LibrIT PaSSHport through 2.5 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided search filter because user input gets no sanitization. | CWE-20 |
162,154 | CVE-2021-3028 | 9.8 | 7.5 | CRITICAL | git-big-picture before 1.0.0 mishandles ' characters in a branch name, leading to code execution. | CWE-20 |
162,155 | CVE-2021-30284 | 9.1 | 6.4 | CRITICAL | Possible information exposure and denial of service due to NAS not dropping messages when integrity check fails in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | CWE-668 |
162,156 | CVE-2021-30288 | 7.8 | 7.2 | HIGH | Possible stack overflow due to improper length check of TLV while copying the TLV to a local stack variable in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking | CWE-787 |
162,157 | CVE-2021-3029 | 9.8 | 10 | CRITICAL | ** UNSUPPORTED WHEN ASSIGNED ** EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has an OS Command Injection vulnerability via shell metacharacters and an IFS manipulation. The parameter "file" on the webpage /showfile.php can be exploited to gain root access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | CWE-78 |
162,158 | CVE-2021-30290 | 7 | 4.4 | HIGH | Possible null pointer dereference due to race condition between timeline fence signal and time line fence destroy in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile | CWE-476 |
162,159 | CVE-2021-30290 | 7 | 4.4 | HIGH | Possible null pointer dereference due to race condition between timeline fence signal and time line fence destroy in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile | CWE-367 |
162,160 | CVE-2021-30291 | 7.8 | 7.2 | HIGH | Possible memory corruption due to lack of validation of client data used for memory allocation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables | CWE-787 |
162,161 | CVE-2021-30292 | 7.8 | 7.2 | HIGH | Possible memory corruption due to lack of validation of client data used for memory allocation in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables | CWE-787 |
162,162 | CVE-2021-30294 | 5.5 | 4.9 | MEDIUM | Potential null pointer dereference in KGSL GPU auxiliary command due to improper validation of user input in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile | CWE-476 |
162,163 | CVE-2021-30295 | 7.8 | 7.2 | HIGH | Possible heap overflow due to improper validation of local variable while storing current task information locally in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables | CWE-120 |
162,164 | CVE-2021-30297 | 7.1 | 3.6 | HIGH | Possible out of bound read due to improper validation of packet length while handling data transfer in VR service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Wearables | CWE-120 |
162,165 | CVE-2021-30302 | 7.5 | 5 | HIGH | Improper authentication of EAP WAPI EAPOL frames from unauthenticated user can lead to information disclosure in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking | CWE-287 |
162,166 | CVE-2021-30304 | 9.1 | 6.4 | CRITICAL | Possible buffer out of bound read can occur due to improper validation of TBTT count and length while parsing the beacon response in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity | CWE-125 |
162,167 | CVE-2021-30305 | 7.8 | 4.6 | HIGH | Possible out of bound access due to lack of validation of page offset before page is inserted in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile | CWE-20 |
162,168 | CVE-2021-30306 | 7.1 | 3.6 | HIGH | Possible buffer over read due to improper buffer allocation for file length passed from user space in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile | CWE-125 |
162,169 | CVE-2021-3031 | 4.3 | 3.3 | MEDIUM | Padding bytes in Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls are not cleared before the data frame is created. This leaks a small amount of random information from the firewall memory into the Ethernet packets. An attacker on the same Ethernet subnet as the PAN-OS firewall is able to collect potentially sensitive information from these packets. This issue is also known as Etherleak and is detected by security scanners as CVE-2003-0001. This issue impacts: PAN-OS 8.1 version earlier than PAN-OS 8.1.18; PAN-OS 9.0 versions earlier than PAN-OS 9.0.12; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5. | CWE-200 |
162,170 | CVE-2021-30310 | 7.5 | 5 | HIGH | Possible buffer overflow due to Improper validation of received CF-ACK and CF-Poll data frames in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music | CWE-20 |
162,171 | CVE-2021-30312 | 7.5 | 5 | HIGH | Improper authentication of sub-frames of a multicast AMSDU frame can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking | CWE-287 |
162,172 | CVE-2021-30315 | 7.8 | 7.2 | HIGH | Improper handling of sensor HAL structure in absence of sensor can lead to use after free in Snapdragon Auto | CWE-416 |
162,173 | CVE-2021-30316 | 7.8 | 7.2 | HIGH | Possible out of bound memory access due to improper boundary check while creating HSYNC fence in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables | CWE-119 |
162,174 | CVE-2021-3032 | 4.4 | 2.1 | MEDIUM | An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where configuration secrets for the “http”, “email”, and “snmptrap” v3 log forwarding server profiles can be logged to the logrcvr.log system log. Logged information may include up to 1024 bytes of the configuration including the username and password in an encrypted form and private keys used in any certificate profiles set for log forwarding server profiles. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.18; PAN-OS 9.0 versions earlier than PAN-OS 9.0.12; PAN-OS 9.1 versions earlier than PAN-OS 9.1.4; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. | CWE-532 |
162,175 | CVE-2021-30321 | 9.8 | 10 | CRITICAL | Possible buffer overflow due to lack of parameter length check during MBSSID scan IE parse in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity | CWE-120 |
162,176 | CVE-2021-3033 | 9.8 | 7.5 | CRITICAL | An improper verification of cryptographic signature vulnerability exists in the Palo Alto Networks Prisma Cloud Compute console. This vulnerability enables an attacker to bypass signature validation during SAML authentication by logging in to the Prisma Cloud Compute console as any authorized user. This issue impacts: All versions of Prisma Cloud Compute 19.11, Prisma Cloud Compute 20.04, and Prisma Cloud Compute 20.09; Prisma Cloud Compute 20.12 before update 1. Prisma Cloud Compute SaaS version is not impacted by this vulnerability. | CWE-347 |
162,177 | CVE-2021-3034 | 5.1 | 3.6 | MEDIUM | An information exposure through log file vulnerability exists in Cortex XSOAR software where the secrets configured for the SAML single sign-on (SSO) integration can be logged to the '/var/log/demisto/' server logs when testing the integration during setup. This logged information includes the private key and identity provider certificate used to configure the SAML SSO integration. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 98622; Cortex XSOAR 6.0.1 builds earlier than 830029; Cortex XSOAR 6.0.2 builds earlier than 98623; Cortex XSOAR 6.1.0 builds earlier than 848144. | CWE-532 |
162,178 | CVE-2021-3035 | 7.2 | 6.5 | HIGH | An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.26. Checkov 1.0 versions are not impacted. | CWE-502 |
162,179 | CVE-2021-30354 | 8.6 | 9.3 | HIGH | Amazon Kindle e-reader prior to and including version 5.13.4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function CJBig2Image::expand() and results in a memory corruption that leads to code execution when parsing a crafted PDF book. | CWE-190 |
162,180 | CVE-2021-30355 | 8.6 | 9.3 | HIGH | Amazon Kindle e-reader prior to and including version 5.13.4 improperly manages privileges, allowing the framework user to elevate privileges to root. | CWE-269 |
162,181 | CVE-2021-30356 | 8.1 | 5.5 | HIGH | A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files. | NVD-CWE-noinfo |
162,182 | CVE-2021-30357 | 5.3 | 5 | MEDIUM | SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access. | CWE-209 |
162,183 | CVE-2021-30358 | 7.2 | 6 | HIGH | Mobile Access Portal Native Applications who's path is defined by the administrator with environment variables may run applications from other locations by the Mobile Access Portal Agent. | CWE-78 |
162,184 | CVE-2021-30359 | 7.8 | 7.2 | HIGH | The Harmony Browse and the SandBlast Agent for Browsers installers must have admin privileges to execute some steps during the installation. Because the MS Installer allows regular users to repair their installation, an attacker running an installer before 90.08.7405 can start the installation repair and place a specially crafted binary in the repair folder, which runs with the admin privileges. | CWE-427 |
162,185 | CVE-2021-3036 | 4.4 | 2.1 | MEDIUM | An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator making the PAN-OS XML API request. | CWE-532 |
162,186 | CVE-2021-3037 | 2.3 | 2.1 | LOW | An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server. | CWE-532 |
162,187 | CVE-2021-3038 | 5.5 | 4.9 | MEDIUM | A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.8; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.4. | CWE-20 |
162,188 | CVE-2021-3039 | 3.8 | 5.5 | LOW | An information exposure through log file vulnerability exists in the Palo Alto Networks Prisma Cloud Compute Console where a secret used to authorize the role of the authenticated user is logged to a debug log file. Authenticated Operator role and Auditor role users with access to the debug log files can use this secret to gain Administrator role access for their active session in Prisma Cloud Compute. Prisma Cloud Compute SaaS versions were automatically upgraded to the fixed release. This issue impacts all Prisma Cloud Compute versions earlier than Prisma Cloud Compute 21.04.412. | CWE-532 |
162,189 | CVE-2021-3040 | 7.2 | 6.5 | HIGH | An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.139. Checkov 1.0 versions are not impacted. | CWE-502 |
162,190 | CVE-2021-3041 | 7.8 | 7.2 | HIGH | A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version. | CWE-427 |
162,191 | CVE-2021-3042 | 7.8 | 7.2 | HIGH | A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent. | CWE-427 |
162,192 | CVE-2021-3043 | 4.8 | 3.5 | MEDIUM | A reflected cross-site scripting (XSS) vulnerability exists in the Prisma Cloud Compute web console that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console while an authenticated administrator is using that web interface. Prisma Cloud Compute SaaS versions were automatically upgraded to the fixed release. No additional action is required for these instances. This issue impacts: Prisma Cloud Compute 20.12 versions earlier than Prisma Cloud Compute 20.12.552; Prisma Cloud Compute 21.04 versions earlier than Prisma Cloud Compute 21.04.439. | CWE-79 |
162,193 | CVE-2021-3044 | 9.8 | 7.5 | CRITICAL | An improper authorization vulnerability in Palo Alto Networks Cortex XSOAR enables a remote unauthenticated attacker with network access to the Cortex XSOAR server to perform unauthorized actions through the REST API. This issue impacts: Cortex XSOAR 6.1.0 builds later than 1016923 and earlier than 1271064; Cortex XSOAR 6.2.0 builds earlier than 1271065. This issue does not impact Cortex XSOAR 5.5.0, Cortex XSOAR 6.0.0, Cortex XSOAR 6.0.1, or Cortex XSOAR 6.0.2 versions. All Cortex XSOAR instances hosted by Palo Alto Networks are upgraded to resolve this vulnerability. No additional action is required for these instances. | CWE-863 |
162,194 | CVE-2021-3045 | 4.9 | 4 | MEDIUM | An OS command argument injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.10. PAN-OS 10.0 and later versions are not impacted. | CWE-88 |
162,195 | CVE-2021-30454 | 9.8 | 7.5 | CRITICAL | An issue was discovered in the outer_cgi crate before 0.2.1 for Rust. A user-provided Read instance receives an uninitialized memory buffer from KeyValueReader. | CWE-119 |
162,196 | CVE-2021-30455 | 9.8 | 7.5 | CRITICAL | An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in IdMap::clone_from upon a .clone panic. | CWE-415 |
162,197 | CVE-2021-30456 | 9.8 | 7.5 | CRITICAL | An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in get_or_insert upon a panic of a user-provided f function. | CWE-415 |
162,198 | CVE-2021-30457 | 9.8 | 7.5 | CRITICAL | An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in remove_set upon a panic in a Drop impl. | CWE-415 |
162,199 | CVE-2021-30458 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Wikimedia Parsoid before 0.11.1 and 0.12.x before 0.12.2. An attacker can send crafted wikitext that Utils/WTUtils.php will transform by using a <meta> tag, bypassing sanitization steps, and potentially allowing for XSS. | CWE-79 |
162,200 | CVE-2021-30459 | 9.8 | 7.5 | CRITICAL | A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.x before 2.2.1, and 3.x before 3.2.1 allows attackers to execute SQL statements by changing the raw_sql input field of the SQL explain, analyze, or select form. | CWE-89 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.