ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
163,201 | CVE-2021-31894 | 8.8 | 7.2 | HIGH | A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.X (All versions), SIMATIC PDM (All versions), SIMATIC STEP 7 V5.X (All versions < V5.7), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 SP2 HF1). A directory containing metafiles relevant to devices' configurations has write permissions. An attacker could leverage this vulnerability by changing the content of certain metafiles and subsequently manipulate parameters or behavior of devices that would be later configured by the affected software. | CWE-732 |
163,202 | CVE-2021-31895 | 9.8 | 7.5 | CRITICAL | A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V4.3.7), RUGGEDCOM ROS M2200 (All versions < V4.3.7), RUGGEDCOM ROS M969 (All versions < V4.3.7), RUGGEDCOM ROS RMC (All versions < V4.3.7), RUGGEDCOM ROS RMC20 (All versions < V4.3.7), RUGGEDCOM ROS RMC30 (All versions < V4.3.7), RUGGEDCOM ROS RMC40 (All versions < V4.3.7), RUGGEDCOM ROS RMC41 (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RP110 (All versions < V4.3.7), RUGGEDCOM ROS RS400 (All versions < V4.3.7), RUGGEDCOM ROS RS401 (All versions < V4.3.7), RUGGEDCOM ROS RS416 (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM ROS RS8000 (All versions < V4.3.7), RUGGEDCOM ROS RS8000A (All versions < V4.3.7), RUGGEDCOM ROS RS8000H (All versions < V4.3.7), RUGGEDCOM ROS RS8000T (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900G (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900GP (All versions < V4.3.7), RUGGEDCOM ROS RS900L (All versions < V4.3.7), RUGGEDCOM ROS RS900W (All versions < V4.3.7), RUGGEDCOM ROS RS910 (All versions < V4.3.7), RUGGEDCOM ROS RS910L (All versions < V4.3.7), RUGGEDCOM ROS RS910W (All versions < V4.3.7), RUGGEDCOM ROS RS920L (All versions < V4.3.7), RUGGEDCOM ROS RS920W (All versions < V4.3.7), RUGGEDCOM ROS RS930L (All versions < V4.3.7), RUGGEDCOM ROS RS930W (All versions < V4.3.7), RUGGEDCOM ROS RS940G (All versions < V4.3.7), RUGGEDCOM ROS RS969 (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2100 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2200 (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900C (All versions < V5.5.4), RUGGEDCOM ROS RSG900G V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900G V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900R (All versions < V5.5.4), RUGGEDCOM ROS RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSL910 (All versions < V5.5.4), RUGGEDCOM ROS RST2228 (All versions < V5.5.4), RUGGEDCOM ROS RST916C (All versions < V5.5.4), RUGGEDCOM ROS RST916P (All versions < V5.5.4), RUGGEDCOM ROS i800 (All versions < V4.3.7), RUGGEDCOM ROS i801 (All versions < V4.3.7), RUGGEDCOM ROS i802 (All versions < V4.3.7), RUGGEDCOM ROS i803 (All versions < V4.3.7). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution. | CWE-787 |
163,203 | CVE-2021-31895 | 9.8 | 7.5 | CRITICAL | A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V4.3.7), RUGGEDCOM ROS M2200 (All versions < V4.3.7), RUGGEDCOM ROS M969 (All versions < V4.3.7), RUGGEDCOM ROS RMC (All versions < V4.3.7), RUGGEDCOM ROS RMC20 (All versions < V4.3.7), RUGGEDCOM ROS RMC30 (All versions < V4.3.7), RUGGEDCOM ROS RMC40 (All versions < V4.3.7), RUGGEDCOM ROS RMC41 (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RP110 (All versions < V4.3.7), RUGGEDCOM ROS RS400 (All versions < V4.3.7), RUGGEDCOM ROS RS401 (All versions < V4.3.7), RUGGEDCOM ROS RS416 (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM ROS RS8000 (All versions < V4.3.7), RUGGEDCOM ROS RS8000A (All versions < V4.3.7), RUGGEDCOM ROS RS8000H (All versions < V4.3.7), RUGGEDCOM ROS RS8000T (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900G (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900GP (All versions < V4.3.7), RUGGEDCOM ROS RS900L (All versions < V4.3.7), RUGGEDCOM ROS RS900W (All versions < V4.3.7), RUGGEDCOM ROS RS910 (All versions < V4.3.7), RUGGEDCOM ROS RS910L (All versions < V4.3.7), RUGGEDCOM ROS RS910W (All versions < V4.3.7), RUGGEDCOM ROS RS920L (All versions < V4.3.7), RUGGEDCOM ROS RS920W (All versions < V4.3.7), RUGGEDCOM ROS RS930L (All versions < V4.3.7), RUGGEDCOM ROS RS930W (All versions < V4.3.7), RUGGEDCOM ROS RS940G (All versions < V4.3.7), RUGGEDCOM ROS RS969 (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2100 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2200 (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900C (All versions < V5.5.4), RUGGEDCOM ROS RSG900G V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900G V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900R (All versions < V5.5.4), RUGGEDCOM ROS RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSL910 (All versions < V5.5.4), RUGGEDCOM ROS RST2228 (All versions < V5.5.4), RUGGEDCOM ROS RST916C (All versions < V5.5.4), RUGGEDCOM ROS RST916P (All versions < V5.5.4), RUGGEDCOM ROS i800 (All versions < V4.3.7), RUGGEDCOM ROS i801 (All versions < V4.3.7), RUGGEDCOM ROS i802 (All versions < V4.3.7), RUGGEDCOM ROS i803 (All versions < V4.3.7). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution. | CWE-120 |
163,204 | CVE-2021-31897 | 9.8 | 7.5 | CRITICAL | In JetBrains WebStorm before 2021.1, code execution without user confirmation was possible for untrusted projects. | NVD-CWE-noinfo |
163,205 | CVE-2021-31898 | 7.5 | 5 | HIGH | In JetBrains WebStorm before 2021.1, HTTP requests were used instead of HTTPS. | CWE-326 |
163,206 | CVE-2021-31899 | 8.8 | 6.5 | HIGH | In JetBrains Code With Me bundled to the compatible IDEs before version 2021.1, the client could execute code in read-only mode. | NVD-CWE-noinfo |
163,207 | CVE-2021-3190 | 9.8 | 7.5 | CRITICAL | The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. | CWE-78 |
163,208 | CVE-2021-31900 | 5.3 | 5 | MEDIUM | In JetBrains Code With Me bundled to the compatible IDE versions before 2021.1, a client could open a browser on a host. | NVD-CWE-noinfo |
163,209 | CVE-2021-31901 | 7.5 | 5 | HIGH | In JetBrains Hub before 2021.1.13079, two-factor authentication wasn't enabled properly for the All Users group. | NVD-CWE-Other |
163,210 | CVE-2021-31902 | 7.5 | 5 | HIGH | In JetBrains YouTrack before 2020.6.6600, access control during the exporting of issues was implemented improperly. | CWE-732 |
163,211 | CVE-2021-31903 | 6.1 | 4.3 | MEDIUM | In JetBrains YouTrack before 2021.1.9819, a pull request's title was sanitized insufficiently, leading to XSS. | CWE-79 |
163,212 | CVE-2021-31904 | 6.1 | 4.3 | MEDIUM | In JetBrains TeamCity before 2020.2.2, XSS was potentially possible on the test history page. | CWE-79 |
163,213 | CVE-2021-31905 | 7.5 | 5 | HIGH | In JetBrains YouTrack before 2020.6.8801, information disclosure in an issue preview was possible. | CWE-200 |
163,214 | CVE-2021-31906 | 2.7 | 4 | LOW | In JetBrains TeamCity before 2020.2.2, audit logs were not sufficient when an administrator uploaded a file. | NVD-CWE-noinfo |
163,215 | CVE-2021-31907 | 5.3 | 5 | MEDIUM | In JetBrains TeamCity before 2020.2.2, permission checks for changing TeamCity plugins were implemented improperly. | CWE-732 |
163,216 | CVE-2021-31908 | 5.4 | 3.5 | MEDIUM | In JetBrains TeamCity before 2020.2.3, stored XSS was possible on several pages. | CWE-79 |
163,217 | CVE-2021-31909 | 9.8 | 7.5 | CRITICAL | In JetBrains TeamCity before 2020.2.3, argument injection leading to remote code execution was possible. | CWE-88 |
163,218 | CVE-2021-3191 | 8.8 | 9 | HIGH | Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows Remote Unauthorized Access for T0320L01^ABY and T0320L01^ACD, T0952L01^AAR through T0952L01^AAX, and T0986L01^AAD through T0986L01^AAJ (L) and T0320H01^ABW through T0320H01^ACC, T0952H01^AAQ through T0952H01^AAW, and T0986H01^AAC through T0986H01^AAI (J and H). | NVD-CWE-noinfo |
163,219 | CVE-2021-31910 | 7.5 | 5 | HIGH | In JetBrains TeamCity before 2020.2.3, information disclosure via SSRF was possible. | CWE-918 |
163,220 | CVE-2021-31911 | 6.1 | 4.3 | MEDIUM | In JetBrains TeamCity before 2020.2.3, reflected XSS was possible on several pages. | CWE-79 |
163,221 | CVE-2021-31912 | 8.8 | 6.8 | HIGH | In JetBrains TeamCity before 2020.2.3, account takeover was potentially possible during a password reset. | CWE-640 |
163,222 | CVE-2021-31913 | 7.5 | 5 | HIGH | In JetBrains TeamCity before 2020.2.3, insufficient checks of the redirect_uri were made during GitHub SSO token exchange. | CWE-354 |
163,223 | CVE-2021-31914 | 9.8 | 7.5 | CRITICAL | In JetBrains TeamCity before 2020.2.4 on Windows, arbitrary code execution on TeamCity Server was possible. | NVD-CWE-noinfo |
163,224 | CVE-2021-31915 | 9.8 | 7.5 | CRITICAL | In JetBrains TeamCity before 2020.2.4, OS command injection leading to remote code execution was possible. | CWE-78 |
163,225 | CVE-2021-31916 | 6.7 | 6.1 | MEDIUM | An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability. | CWE-787 |
163,226 | CVE-2021-31917 | 9.8 | 7.5 | CRITICAL | A flaw was found in Red Hat DataGrid 8.x (8.0.0, 8.0.1, 8.1.0 and 8.1.1) and Infinispan (10.0.0 through 12.0.0). An attacker could bypass authentication on all REST endpoints when DIGEST is used as the authentication method. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-287 |
163,227 | CVE-2021-31918 | 7.5 | 5 | HIGH | A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality. | CWE-200 |
163,228 | CVE-2021-31919 | 7.5 | 5 | HIGH | An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization, the archive content may contain uninitialized values of certain parts of a struct. | CWE-772 |
163,229 | CVE-2021-31920 | 6.5 | 4 | MEDIUM | Istio before 1.8.6 and 1.9.x before 1.9.5 has a remotely exploitable vulnerability where an HTTP request path with multiple slashes or escaped slash characters (%2F or %5C) could potentially bypass an Istio authorization policy when path based authorization rules are used. | CWE-863 |
163,230 | CVE-2021-31921 | 9.8 | 7.5 | CRITICAL | Istio before 1.8.6 and 1.9.x before 1.9.5 contains a remotely exploitable vulnerability where an external client can access unexpected services in the cluster, bypassing authorization checks, when a gateway is configured with AUTO_PASSTHROUGH routing configuration. | CWE-862 |
163,231 | CVE-2021-31922 | 7.5 | 5 | HIGH | An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3. | CWE-335 |
163,232 | CVE-2021-31923 | 5.3 | 5 | MEDIUM | Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation. | CWE-444 |
163,233 | CVE-2021-31924 | 6.8 | 4.6 | MEDIUM | Yubico pam-u2f before 1.1.1 has a logic issue that, depending on the pam-u2f configuration and the application used, could lead to a local PIN bypass. This issue does not allow user presence (touch) or cryptographic signature verification to be bypassed, so an attacker would still need to physically possess and interact with the YubiKey or another enrolled authenticator. If pam-u2f is configured to require PIN authentication, and the application using pam-u2f allows the user to submit NULL as the PIN, pam-u2f will attempt to perform a FIDO2 authentication without PIN. If this authentication is successful, the PIN requirement is bypassed. | NVD-CWE-noinfo |
163,234 | CVE-2021-31925 | 7.5 | 5 | HIGH | Pexip Infinity 25.x before 25.4 has Improper Input Validation, and thus an unauthenticated remote attacker can cause a denial of service via the administrative web interface. | CWE-20 |
163,235 | CVE-2021-31926 | 6.5 | 4 | MEDIUM | AMP Application Deployment Service in CubeCoders AMP 2.1.x before 2.1.1.2 allows a remote, authenticated user to open ports in the local system firewall by crafting an HTTP(S) request directly to the applicable API endpoint (despite not having permission to make changes to the system's network configuration). | CWE-863 |
163,236 | CVE-2021-31927 | 4.3 | 4 | MEDIUM | An Insecure Direct Object Reference (IDOR) vulnerability in Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify any existing user, including users assigned to different environments and clients. It was fixed in v2021.1.0.2. | CWE-829 |
163,237 | CVE-2021-31928 | 8.8 | 9 | HIGH | Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to escalate privileges to superadministrator. It was fixed in v2021.1.0.2. | CWE-269 |
163,238 | CVE-2021-31929 | 4.3 | 4 | MEDIUM | Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify loyalty campaigns and settings, such as fraud prevention, coupon groups, email templates, or referrals. | CWE-732 |
163,239 | CVE-2021-3193 | 9.8 | 7.5 | CRITICAL | Improper access and command validation in the Nagios Docker Config Wizard before 1.1.2, as used in Nagios XI through 5.7, allows an unauthenticated attacker to execute remote code as the apache user. | NVD-CWE-noinfo |
163,240 | CVE-2021-31930 | 6.1 | 4.3 | MEDIUM | Persistent cross-site scripting (XSS) in the web interface of Concerto through 2.3.6 allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into the First Name or Last Name parameter upon registration. When a privileged user attempts to delete the account, the XSS payload will be executed. | CWE-79 |
163,241 | CVE-2021-31933 | 7.2 | 6.5 | HIGH | A remote code execution vulnerability exists in Chamilo through 1.11.14 due to improper input sanitization of a parameter used for file uploads, and improper file-extension filtering for certain filenames (e.g., .phar or .pht). A remote authenticated administrator is able to upload a file containing arbitrary PHP code into specific directories via main/inc/lib/fileUpload.lib.php directory traversal to achieve PHP code execution. | CWE-20 |
163,242 | CVE-2021-31934 | 6.1 | 4.3 | MEDIUM | OX App Suite 7.10.4 and earlier allows XSS via a crafted contact object (payload in the position or company field) that is mishandled in the App Suite UI on a smartphone. | CWE-79 |
163,243 | CVE-2021-31935 | 6.1 | 4.3 | MEDIUM | OX App Suite 7.10.4 and earlier allows XSS via a crafted distribution list (payload in the common name) that is mishandled in the scheduling view. | CWE-79 |
163,244 | CVE-2021-31936 | 6.5 | 4.3 | MEDIUM | Microsoft Accessibility Insights for Web Information Disclosure Vulnerability | NVD-CWE-noinfo |
163,245 | CVE-2021-31938 | 7.8 | 6.8 | HIGH | Microsoft VsCode Kubernetes Tools Extension Elevation of Privilege Vulnerability | CWE-269 |
163,246 | CVE-2021-31939 | 7.8 | 6.8 | HIGH | Microsoft Excel Remote Code Execution Vulnerability | NVD-CWE-noinfo |
163,247 | CVE-2021-31940 | 7.8 | 6.8 | HIGH | Microsoft Office Graphics Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31941. | NVD-CWE-noinfo |
163,248 | CVE-2021-31941 | 7.8 | 6.8 | HIGH | Microsoft Office Graphics Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31940. | NVD-CWE-noinfo |
163,249 | CVE-2021-31942 | 7.8 | 6.8 | HIGH | 3D Viewer Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31943. | NVD-CWE-noinfo |
163,250 | CVE-2021-31943 | 7.8 | 6.8 | HIGH | 3D Viewer Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31942. | NVD-CWE-noinfo |
163,251 | CVE-2021-31944 | 5.5 | 4.3 | MEDIUM | 3D Viewer Information Disclosure Vulnerability | CWE-200 |
163,252 | CVE-2021-31945 | 6.6 | 6.8 | MEDIUM | Paint 3D Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31946, CVE-2021-31983. | NVD-CWE-noinfo |
163,253 | CVE-2021-31946 | 6.6 | 6.8 | MEDIUM | Paint 3D Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31945, CVE-2021-31983. | NVD-CWE-noinfo |
163,254 | CVE-2021-31947 | 7.8 | 6.8 | HIGH | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33775, CVE-2021-33776, CVE-2021-33777, CVE-2021-33778. | NVD-CWE-noinfo |
163,255 | CVE-2021-31948 | 8.1 | 5.5 | HIGH | Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-31950, CVE-2021-31964. | CWE-20 |
163,256 | CVE-2021-31949 | 7.8 | 6.8 | HIGH | Microsoft Outlook Remote Code Execution Vulnerability | NVD-CWE-noinfo |
163,257 | CVE-2021-3195 | 7.5 | 5 | HIGH | ** DISPUTED ** bitcoind in Bitcoin Core through 0.21.0 can create a new file in an arbitrary directory (e.g., outside the ~/.bitcoin directory) via a dumpwallet RPC call. NOTE: this reportedly does not violate the security model of Bitcoin Core, but can violate the security model of a fork that has implemented dumpwallet restrictions. | CWE-20 |
163,258 | CVE-2021-31950 | 8.1 | 5.5 | HIGH | Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-31948, CVE-2021-31964. | CWE-918 |
163,259 | CVE-2021-31951 | 7.8 | 7.2 | HIGH | Windows Kernel Elevation of Privilege Vulnerability | CWE-269 |
163,260 | CVE-2021-31952 | 7.8 | 7.2 | HIGH | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | CWE-269 |
163,261 | CVE-2021-31953 | 7.8 | 4.6 | HIGH | Windows Filter Manager Elevation of Privilege Vulnerability | CWE-269 |
163,262 | CVE-2021-31954 | 7.8 | 7.2 | HIGH | Windows Common Log File System Driver Elevation of Privilege Vulnerability | CWE-269 |
163,263 | CVE-2021-31955 | 5.5 | 2.1 | MEDIUM | Windows Kernel Information Disclosure Vulnerability | CWE-200 |
163,264 | CVE-2021-31956 | 7.8 | 9.3 | HIGH | Windows NTFS Elevation of Privilege Vulnerability | CWE-269 |
163,265 | CVE-2021-31957 | 7.5 | 5 | HIGH | ASP.NET Denial of Service Vulnerability | NVD-CWE-noinfo |
163,266 | CVE-2021-31958 | 8.8 | 6.8 | HIGH | Windows NTLM Elevation of Privilege Vulnerability | CWE-269 |
163,267 | CVE-2021-31959 | 7.8 | 6.8 | HIGH | Scripting Engine Memory Corruption Vulnerability | NVD-CWE-noinfo |
163,268 | CVE-2021-3196 | 8.8 | 6.5 | HIGH | An issue was discovered in Hitachi ID Bravura Security Fabric 11.0.0 through 11.1.3, 12.0.0 through 12.0.2, and 12.1.0. When using federated identity management (authenticating via SAML through a third-party identity provider), an attacker can inject additional data into a signed SAML response being transmitted to the service provider (ID Bravura Security Fabric). The application successfully validates the signed values but uses the unsigned malicious values. An attacker with lower-privilege access to the application can inject the username of a high-privilege user to impersonate that user. | CWE-347 |
163,269 | CVE-2021-31960 | 5.5 | 2.1 | MEDIUM | Windows Bind Filter Driver Information Disclosure Vulnerability | CWE-200 |
163,270 | CVE-2021-31961 | 6.1 | 3.6 | MEDIUM | Windows InstallService Elevation of Privilege Vulnerability | CWE-269 |
163,271 | CVE-2021-31962 | 9.8 | 7.5 | CRITICAL | Kerberos AppContainer Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
163,272 | CVE-2021-31963 | 8.8 | 6.5 | HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26420, CVE-2021-31966. | NVD-CWE-noinfo |
163,273 | CVE-2021-31964 | 8.1 | 5.5 | HIGH | Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-31948, CVE-2021-31950. | NVD-CWE-noinfo |
163,274 | CVE-2021-31965 | 6.5 | 4 | MEDIUM | Microsoft SharePoint Server Information Disclosure Vulnerability | NVD-CWE-noinfo |
163,275 | CVE-2021-31966 | 7.2 | 6.5 | HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26420, CVE-2021-31963. | NVD-CWE-noinfo |
163,276 | CVE-2021-31967 | 8.8 | 6.8 | HIGH | VP9 Video Extensions Remote Code Execution Vulnerability | NVD-CWE-noinfo |
163,277 | CVE-2021-31968 | 7.5 | 5 | HIGH | Windows Remote Desktop Services Denial of Service Vulnerability | NVD-CWE-noinfo |
163,278 | CVE-2021-31969 | 7.8 | 4.6 | HIGH | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | CWE-269 |
163,279 | CVE-2021-3197 | 9.8 | 7.5 | CRITICAL | An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request. | CWE-74 |
163,280 | CVE-2021-31970 | 5.5 | 2.1 | MEDIUM | Windows TCP/IP Driver Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
163,281 | CVE-2021-31971 | 8.8 | 6.8 | HIGH | Windows HTML Platform Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
163,282 | CVE-2021-31972 | 5.5 | 2.1 | MEDIUM | Event Tracing for Windows Information Disclosure Vulnerability | CWE-200 |
163,283 | CVE-2021-31973 | 7.8 | 4.6 | HIGH | Windows GPSVC Elevation of Privilege Vulnerability | CWE-269 |
163,284 | CVE-2021-31974 | 7.5 | 5 | HIGH | Server for NFS Denial of Service Vulnerability | NVD-CWE-noinfo |
163,285 | CVE-2021-31975 | 7.5 | 7.8 | HIGH | Server for NFS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-31976. | CWE-200 |
163,286 | CVE-2021-31976 | 7.5 | 7.8 | HIGH | Server for NFS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-31975. | CWE-200 |
163,287 | CVE-2021-31977 | 8.6 | 5 | HIGH | Windows Hyper-V Denial of Service Vulnerability | CWE-119 |
163,288 | CVE-2021-31978 | 5.5 | 2.1 | MEDIUM | Microsoft Defender Denial of Service Vulnerability | NVD-CWE-noinfo |
163,289 | CVE-2021-31979 | 7.8 | 7.2 | HIGH | Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33771, CVE-2021-34514. | CWE-269 |
163,290 | CVE-2021-3198 | 7.2 | 9 | HIGH | By abusing the 'install rpm url' command, an attacker can escape the restricted clish shell on affected versions of Ivanti MobileIron Core. This issue was fixed in version 11.1.0.0. | CWE-78 |
163,291 | CVE-2021-31980 | 9.8 | 7.5 | CRITICAL | Microsoft Intune Management Extension Remote Code Execution Vulnerability | NVD-CWE-noinfo |
163,292 | CVE-2021-31983 | 6.6 | 6.8 | MEDIUM | Paint 3D Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31945, CVE-2021-31946. | NVD-CWE-noinfo |
163,293 | CVE-2021-31984 | 8.8 | 6.8 | HIGH | Power BI Remote Code Execution Vulnerability | NVD-CWE-noinfo |
163,294 | CVE-2021-31985 | 8.8 | 6.8 | HIGH | Microsoft Defender Remote Code Execution Vulnerability | NVD-CWE-noinfo |
163,295 | CVE-2021-31986 | 6.8 | 4 | MEDIUM | User controlled parameters related to SMTP notifications are not correctly validated. This can lead to a buffer overflow resulting in crashes and data leakage. | CWE-787 |
163,296 | CVE-2021-31987 | 7.5 | 5.1 | HIGH | A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients. | CWE-20 |
163,297 | CVE-2021-31988 | 8.8 | 6.8 | HIGH | A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email. | CWE-20 |
163,298 | CVE-2021-31989 | 5.3 | 3.5 | MEDIUM | A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices. | CWE-312 |
163,299 | CVE-2021-3199 | 9.8 | 7.5 | CRITICAL | Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter. | CWE-22 |
163,300 | CVE-2021-31996 | 7.5 | 5 | HIGH | An issue was discovered in the algorithmica crate through 2021-03-07 for Rust. There is a double free in merge_sort::merge(). | CWE-415 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.