ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
163,201
CVE-2021-31894
8.8
7.2
HIGH
A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.X (All versions), SIMATIC PDM (All versions), SIMATIC STEP 7 V5.X (All versions < V5.7), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 SP2 HF1). A directory containing metafiles relevant to devices' configurations has write permissions. An attacker could leverage this vulnerability by changing the content of certain metafiles and subsequently manipulate parameters or behavior of devices that would be later configured by the affected software.
CWE-732
163,202
CVE-2021-31895
9.8
7.5
CRITICAL
A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V4.3.7), RUGGEDCOM ROS M2200 (All versions < V4.3.7), RUGGEDCOM ROS M969 (All versions < V4.3.7), RUGGEDCOM ROS RMC (All versions < V4.3.7), RUGGEDCOM ROS RMC20 (All versions < V4.3.7), RUGGEDCOM ROS RMC30 (All versions < V4.3.7), RUGGEDCOM ROS RMC40 (All versions < V4.3.7), RUGGEDCOM ROS RMC41 (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RP110 (All versions < V4.3.7), RUGGEDCOM ROS RS400 (All versions < V4.3.7), RUGGEDCOM ROS RS401 (All versions < V4.3.7), RUGGEDCOM ROS RS416 (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM ROS RS8000 (All versions < V4.3.7), RUGGEDCOM ROS RS8000A (All versions < V4.3.7), RUGGEDCOM ROS RS8000H (All versions < V4.3.7), RUGGEDCOM ROS RS8000T (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900G (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900GP (All versions < V4.3.7), RUGGEDCOM ROS RS900L (All versions < V4.3.7), RUGGEDCOM ROS RS900W (All versions < V4.3.7), RUGGEDCOM ROS RS910 (All versions < V4.3.7), RUGGEDCOM ROS RS910L (All versions < V4.3.7), RUGGEDCOM ROS RS910W (All versions < V4.3.7), RUGGEDCOM ROS RS920L (All versions < V4.3.7), RUGGEDCOM ROS RS920W (All versions < V4.3.7), RUGGEDCOM ROS RS930L (All versions < V4.3.7), RUGGEDCOM ROS RS930W (All versions < V4.3.7), RUGGEDCOM ROS RS940G (All versions < V4.3.7), RUGGEDCOM ROS RS969 (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2100 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2200 (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900C (All versions < V5.5.4), RUGGEDCOM ROS RSG900G V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900G V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900R (All versions < V5.5.4), RUGGEDCOM ROS RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSL910 (All versions < V5.5.4), RUGGEDCOM ROS RST2228 (All versions < V5.5.4), RUGGEDCOM ROS RST916C (All versions < V5.5.4), RUGGEDCOM ROS RST916P (All versions < V5.5.4), RUGGEDCOM ROS i800 (All versions < V4.3.7), RUGGEDCOM ROS i801 (All versions < V4.3.7), RUGGEDCOM ROS i802 (All versions < V4.3.7), RUGGEDCOM ROS i803 (All versions < V4.3.7). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution.
CWE-787
163,203
CVE-2021-31895
9.8
7.5
CRITICAL
A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V4.3.7), RUGGEDCOM ROS M2200 (All versions < V4.3.7), RUGGEDCOM ROS M969 (All versions < V4.3.7), RUGGEDCOM ROS RMC (All versions < V4.3.7), RUGGEDCOM ROS RMC20 (All versions < V4.3.7), RUGGEDCOM ROS RMC30 (All versions < V4.3.7), RUGGEDCOM ROS RMC40 (All versions < V4.3.7), RUGGEDCOM ROS RMC41 (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RMC8388 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RP110 (All versions < V4.3.7), RUGGEDCOM ROS RS400 (All versions < V4.3.7), RUGGEDCOM ROS RS401 (All versions < V4.3.7), RUGGEDCOM ROS RS416 (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS416v2 V5.X (All versions < 5.5.4), RUGGEDCOM ROS RS8000 (All versions < V4.3.7), RUGGEDCOM ROS RS8000A (All versions < V4.3.7), RUGGEDCOM ROS RS8000H (All versions < V4.3.7), RUGGEDCOM ROS RS8000T (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900G (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RS900G (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RS900GP (All versions < V4.3.7), RUGGEDCOM ROS RS900L (All versions < V4.3.7), RUGGEDCOM ROS RS900W (All versions < V4.3.7), RUGGEDCOM ROS RS910 (All versions < V4.3.7), RUGGEDCOM ROS RS910L (All versions < V4.3.7), RUGGEDCOM ROS RS910W (All versions < V4.3.7), RUGGEDCOM ROS RS920L (All versions < V4.3.7), RUGGEDCOM ROS RS920W (All versions < V4.3.7), RUGGEDCOM ROS RS930L (All versions < V4.3.7), RUGGEDCOM ROS RS930W (All versions < V4.3.7), RUGGEDCOM ROS RS940G (All versions < V4.3.7), RUGGEDCOM ROS RS969 (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100 (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2100 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2100P (32M) V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2200 (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2288 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2300P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2300P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG2488 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG2488 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900 V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900 V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900C (All versions < V5.5.4), RUGGEDCOM ROS RSG900G V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG900G V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSG900R (All versions < V5.5.4), RUGGEDCOM ROS RSG920P V4.X (All versions < V4.3.7), RUGGEDCOM ROS RSG920P V5.X (All versions < V5.5.4), RUGGEDCOM ROS RSL910 (All versions < V5.5.4), RUGGEDCOM ROS RST2228 (All versions < V5.5.4), RUGGEDCOM ROS RST916C (All versions < V5.5.4), RUGGEDCOM ROS RST916P (All versions < V5.5.4), RUGGEDCOM ROS i800 (All versions < V4.3.7), RUGGEDCOM ROS i801 (All versions < V4.3.7), RUGGEDCOM ROS i802 (All versions < V4.3.7), RUGGEDCOM ROS i803 (All versions < V4.3.7). The DHCP client in affected devices fails to properly sanitize incoming DHCP packets. This could allow an unauthenticated remote attacker to cause memory to be overwritten, potentially allowing remote code execution.
CWE-120
163,204
CVE-2021-31897
9.8
7.5
CRITICAL
In JetBrains WebStorm before 2021.1, code execution without user confirmation was possible for untrusted projects.
NVD-CWE-noinfo
163,205
CVE-2021-31898
7.5
5
HIGH
In JetBrains WebStorm before 2021.1, HTTP requests were used instead of HTTPS.
CWE-326
163,206
CVE-2021-31899
8.8
6.5
HIGH
In JetBrains Code With Me bundled to the compatible IDEs before version 2021.1, the client could execute code in read-only mode.
NVD-CWE-noinfo
163,207
CVE-2021-3190
9.8
7.5
CRITICAL
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag.
CWE-78
163,208
CVE-2021-31900
5.3
5
MEDIUM
In JetBrains Code With Me bundled to the compatible IDE versions before 2021.1, a client could open a browser on a host.
NVD-CWE-noinfo
163,209
CVE-2021-31901
7.5
5
HIGH
In JetBrains Hub before 2021.1.13079, two-factor authentication wasn't enabled properly for the All Users group.
NVD-CWE-Other
163,210
CVE-2021-31902
7.5
5
HIGH
In JetBrains YouTrack before 2020.6.6600, access control during the exporting of issues was implemented improperly.
CWE-732
163,211
CVE-2021-31903
6.1
4.3
MEDIUM
In JetBrains YouTrack before 2021.1.9819, a pull request's title was sanitized insufficiently, leading to XSS.
CWE-79
163,212
CVE-2021-31904
6.1
4.3
MEDIUM
In JetBrains TeamCity before 2020.2.2, XSS was potentially possible on the test history page.
CWE-79
163,213
CVE-2021-31905
7.5
5
HIGH
In JetBrains YouTrack before 2020.6.8801, information disclosure in an issue preview was possible.
CWE-200
163,214
CVE-2021-31906
2.7
4
LOW
In JetBrains TeamCity before 2020.2.2, audit logs were not sufficient when an administrator uploaded a file.
NVD-CWE-noinfo
163,215
CVE-2021-31907
5.3
5
MEDIUM
In JetBrains TeamCity before 2020.2.2, permission checks for changing TeamCity plugins were implemented improperly.
CWE-732
163,216
CVE-2021-31908
5.4
3.5
MEDIUM
In JetBrains TeamCity before 2020.2.3, stored XSS was possible on several pages.
CWE-79
163,217
CVE-2021-31909
9.8
7.5
CRITICAL
In JetBrains TeamCity before 2020.2.3, argument injection leading to remote code execution was possible.
CWE-88
163,218
CVE-2021-3191
8.8
9
HIGH
Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows Remote Unauthorized Access for T0320L01^ABY and T0320L01^ACD, T0952L01^AAR through T0952L01^AAX, and T0986L01^AAD through T0986L01^AAJ (L) and T0320H01^ABW through T0320H01^ACC, T0952H01^AAQ through T0952H01^AAW, and T0986H01^AAC through T0986H01^AAI (J and H).
NVD-CWE-noinfo
163,219
CVE-2021-31910
7.5
5
HIGH
In JetBrains TeamCity before 2020.2.3, information disclosure via SSRF was possible.
CWE-918
163,220
CVE-2021-31911
6.1
4.3
MEDIUM
In JetBrains TeamCity before 2020.2.3, reflected XSS was possible on several pages.
CWE-79
163,221
CVE-2021-31912
8.8
6.8
HIGH
In JetBrains TeamCity before 2020.2.3, account takeover was potentially possible during a password reset.
CWE-640
163,222
CVE-2021-31913
7.5
5
HIGH
In JetBrains TeamCity before 2020.2.3, insufficient checks of the redirect_uri were made during GitHub SSO token exchange.
CWE-354
163,223
CVE-2021-31914
9.8
7.5
CRITICAL
In JetBrains TeamCity before 2020.2.4 on Windows, arbitrary code execution on TeamCity Server was possible.
NVD-CWE-noinfo
163,224
CVE-2021-31915
9.8
7.5
CRITICAL
In JetBrains TeamCity before 2020.2.4, OS command injection leading to remote code execution was possible.
CWE-78
163,225
CVE-2021-31916
6.7
6.1
MEDIUM
An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
CWE-787
163,226
CVE-2021-31917
9.8
7.5
CRITICAL
A flaw was found in Red Hat DataGrid 8.x (8.0.0, 8.0.1, 8.1.0 and 8.1.1) and Infinispan (10.0.0 through 12.0.0). An attacker could bypass authentication on all REST endpoints when DIGEST is used as the authentication method. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CWE-287
163,227
CVE-2021-31918
7.5
5
HIGH
A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality.
CWE-200
163,228
CVE-2021-31919
7.5
5
HIGH
An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization, the archive content may contain uninitialized values of certain parts of a struct.
CWE-772
163,229
CVE-2021-31920
6.5
4
MEDIUM
Istio before 1.8.6 and 1.9.x before 1.9.5 has a remotely exploitable vulnerability where an HTTP request path with multiple slashes or escaped slash characters (%2F or %5C) could potentially bypass an Istio authorization policy when path based authorization rules are used.
CWE-863
163,230
CVE-2021-31921
9.8
7.5
CRITICAL
Istio before 1.8.6 and 1.9.x before 1.9.5 contains a remotely exploitable vulnerability where an external client can access unexpected services in the cluster, bypassing authorization checks, when a gateway is configured with AUTO_PASSTHROUGH routing configuration.
CWE-862
163,231
CVE-2021-31922
7.5
5
HIGH
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3.
CWE-335
163,232
CVE-2021-31923
5.3
5
MEDIUM
Ping Identity PingAccess before 5.3.3 allows HTTP request smuggling via header manipulation.
CWE-444
163,233
CVE-2021-31924
6.8
4.6
MEDIUM
Yubico pam-u2f before 1.1.1 has a logic issue that, depending on the pam-u2f configuration and the application used, could lead to a local PIN bypass. This issue does not allow user presence (touch) or cryptographic signature verification to be bypassed, so an attacker would still need to physically possess and interact with the YubiKey or another enrolled authenticator. If pam-u2f is configured to require PIN authentication, and the application using pam-u2f allows the user to submit NULL as the PIN, pam-u2f will attempt to perform a FIDO2 authentication without PIN. If this authentication is successful, the PIN requirement is bypassed.
NVD-CWE-noinfo
163,234
CVE-2021-31925
7.5
5
HIGH
Pexip Infinity 25.x before 25.4 has Improper Input Validation, and thus an unauthenticated remote attacker can cause a denial of service via the administrative web interface.
CWE-20
163,235
CVE-2021-31926
6.5
4
MEDIUM
AMP Application Deployment Service in CubeCoders AMP 2.1.x before 2.1.1.2 allows a remote, authenticated user to open ports in the local system firewall by crafting an HTTP(S) request directly to the applicable API endpoint (despite not having permission to make changes to the system's network configuration).
CWE-863
163,236
CVE-2021-31927
4.3
4
MEDIUM
An Insecure Direct Object Reference (IDOR) vulnerability in Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify any existing user, including users assigned to different environments and clients. It was fixed in v2021.1.0.2.
CWE-829
163,237
CVE-2021-31928
8.8
9
HIGH
Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to escalate privileges to superadministrator. It was fixed in v2021.1.0.2.
CWE-269
163,238
CVE-2021-31929
4.3
4
MEDIUM
Annex Cloud Loyalty Experience Platform <2021.1.0.1 allows any authenticated attacker to modify loyalty campaigns and settings, such as fraud prevention, coupon groups, email templates, or referrals.
CWE-732
163,239
CVE-2021-3193
9.8
7.5
CRITICAL
Improper access and command validation in the Nagios Docker Config Wizard before 1.1.2, as used in Nagios XI through 5.7, allows an unauthenticated attacker to execute remote code as the apache user.
NVD-CWE-noinfo
163,240
CVE-2021-31930
6.1
4.3
MEDIUM
Persistent cross-site scripting (XSS) in the web interface of Concerto through 2.3.6 allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into the First Name or Last Name parameter upon registration. When a privileged user attempts to delete the account, the XSS payload will be executed.
CWE-79
163,241
CVE-2021-31933
7.2
6.5
HIGH
A remote code execution vulnerability exists in Chamilo through 1.11.14 due to improper input sanitization of a parameter used for file uploads, and improper file-extension filtering for certain filenames (e.g., .phar or .pht). A remote authenticated administrator is able to upload a file containing arbitrary PHP code into specific directories via main/inc/lib/fileUpload.lib.php directory traversal to achieve PHP code execution.
CWE-20
163,242
CVE-2021-31934
6.1
4.3
MEDIUM
OX App Suite 7.10.4 and earlier allows XSS via a crafted contact object (payload in the position or company field) that is mishandled in the App Suite UI on a smartphone.
CWE-79
163,243
CVE-2021-31935
6.1
4.3
MEDIUM
OX App Suite 7.10.4 and earlier allows XSS via a crafted distribution list (payload in the common name) that is mishandled in the scheduling view.
CWE-79
163,244
CVE-2021-31936
6.5
4.3
MEDIUM
Microsoft Accessibility Insights for Web Information Disclosure Vulnerability
NVD-CWE-noinfo
163,245
CVE-2021-31938
7.8
6.8
HIGH
Microsoft VsCode Kubernetes Tools Extension Elevation of Privilege Vulnerability
CWE-269
163,246
CVE-2021-31939
7.8
6.8
HIGH
Microsoft Excel Remote Code Execution Vulnerability
NVD-CWE-noinfo
163,247
CVE-2021-31940
7.8
6.8
HIGH
Microsoft Office Graphics Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31941.
NVD-CWE-noinfo
163,248
CVE-2021-31941
7.8
6.8
HIGH
Microsoft Office Graphics Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31940.
NVD-CWE-noinfo
163,249
CVE-2021-31942
7.8
6.8
HIGH
3D Viewer Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31943.
NVD-CWE-noinfo
163,250
CVE-2021-31943
7.8
6.8
HIGH
3D Viewer Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31942.
NVD-CWE-noinfo
163,251
CVE-2021-31944
5.5
4.3
MEDIUM
3D Viewer Information Disclosure Vulnerability
CWE-200
163,252
CVE-2021-31945
6.6
6.8
MEDIUM
Paint 3D Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31946, CVE-2021-31983.
NVD-CWE-noinfo
163,253
CVE-2021-31946
6.6
6.8
MEDIUM
Paint 3D Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31945, CVE-2021-31983.
NVD-CWE-noinfo
163,254
CVE-2021-31947
7.8
6.8
HIGH
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33775, CVE-2021-33776, CVE-2021-33777, CVE-2021-33778.
NVD-CWE-noinfo
163,255
CVE-2021-31948
8.1
5.5
HIGH
Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-31950, CVE-2021-31964.
CWE-20
163,256
CVE-2021-31949
7.8
6.8
HIGH
Microsoft Outlook Remote Code Execution Vulnerability
NVD-CWE-noinfo
163,257
CVE-2021-3195
7.5
5
HIGH
** DISPUTED ** bitcoind in Bitcoin Core through 0.21.0 can create a new file in an arbitrary directory (e.g., outside the ~/.bitcoin directory) via a dumpwallet RPC call. NOTE: this reportedly does not violate the security model of Bitcoin Core, but can violate the security model of a fork that has implemented dumpwallet restrictions.
CWE-20
163,258
CVE-2021-31950
8.1
5.5
HIGH
Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-31948, CVE-2021-31964.
CWE-918
163,259
CVE-2021-31951
7.8
7.2
HIGH
Windows Kernel Elevation of Privilege Vulnerability
CWE-269
163,260
CVE-2021-31952
7.8
7.2
HIGH
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CWE-269
163,261
CVE-2021-31953
7.8
4.6
HIGH
Windows Filter Manager Elevation of Privilege Vulnerability
CWE-269
163,262
CVE-2021-31954
7.8
7.2
HIGH
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CWE-269
163,263
CVE-2021-31955
5.5
2.1
MEDIUM
Windows Kernel Information Disclosure Vulnerability
CWE-200
163,264
CVE-2021-31956
7.8
9.3
HIGH
Windows NTFS Elevation of Privilege Vulnerability
CWE-269
163,265
CVE-2021-31957
7.5
5
HIGH
ASP.NET Denial of Service Vulnerability
NVD-CWE-noinfo
163,266
CVE-2021-31958
8.8
6.8
HIGH
Windows NTLM Elevation of Privilege Vulnerability
CWE-269
163,267
CVE-2021-31959
7.8
6.8
HIGH
Scripting Engine Memory Corruption Vulnerability
NVD-CWE-noinfo
163,268
CVE-2021-3196
8.8
6.5
HIGH
An issue was discovered in Hitachi ID Bravura Security Fabric 11.0.0 through 11.1.3, 12.0.0 through 12.0.2, and 12.1.0. When using federated identity management (authenticating via SAML through a third-party identity provider), an attacker can inject additional data into a signed SAML response being transmitted to the service provider (ID Bravura Security Fabric). The application successfully validates the signed values but uses the unsigned malicious values. An attacker with lower-privilege access to the application can inject the username of a high-privilege user to impersonate that user.
CWE-347
163,269
CVE-2021-31960
5.5
2.1
MEDIUM
Windows Bind Filter Driver Information Disclosure Vulnerability
CWE-200
163,270
CVE-2021-31961
6.1
3.6
MEDIUM
Windows InstallService Elevation of Privilege Vulnerability
CWE-269
163,271
CVE-2021-31962
9.8
7.5
CRITICAL
Kerberos AppContainer Security Feature Bypass Vulnerability
NVD-CWE-noinfo
163,272
CVE-2021-31963
8.8
6.5
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26420, CVE-2021-31966.
NVD-CWE-noinfo
163,273
CVE-2021-31964
8.1
5.5
HIGH
Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-31948, CVE-2021-31950.
NVD-CWE-noinfo
163,274
CVE-2021-31965
6.5
4
MEDIUM
Microsoft SharePoint Server Information Disclosure Vulnerability
NVD-CWE-noinfo
163,275
CVE-2021-31966
7.2
6.5
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26420, CVE-2021-31963.
NVD-CWE-noinfo
163,276
CVE-2021-31967
8.8
6.8
HIGH
VP9 Video Extensions Remote Code Execution Vulnerability
NVD-CWE-noinfo
163,277
CVE-2021-31968
7.5
5
HIGH
Windows Remote Desktop Services Denial of Service Vulnerability
NVD-CWE-noinfo
163,278
CVE-2021-31969
7.8
4.6
HIGH
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CWE-269
163,279
CVE-2021-3197
9.8
7.5
CRITICAL
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
CWE-74
163,280
CVE-2021-31970
5.5
2.1
MEDIUM
Windows TCP/IP Driver Security Feature Bypass Vulnerability
NVD-CWE-noinfo
163,281
CVE-2021-31971
8.8
6.8
HIGH
Windows HTML Platform Security Feature Bypass Vulnerability
NVD-CWE-noinfo
163,282
CVE-2021-31972
5.5
2.1
MEDIUM
Event Tracing for Windows Information Disclosure Vulnerability
CWE-200
163,283
CVE-2021-31973
7.8
4.6
HIGH
Windows GPSVC Elevation of Privilege Vulnerability
CWE-269
163,284
CVE-2021-31974
7.5
5
HIGH
Server for NFS Denial of Service Vulnerability
NVD-CWE-noinfo
163,285
CVE-2021-31975
7.5
7.8
HIGH
Server for NFS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-31976.
CWE-200
163,286
CVE-2021-31976
7.5
7.8
HIGH
Server for NFS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-31975.
CWE-200
163,287
CVE-2021-31977
8.6
5
HIGH
Windows Hyper-V Denial of Service Vulnerability
CWE-119
163,288
CVE-2021-31978
5.5
2.1
MEDIUM
Microsoft Defender Denial of Service Vulnerability
NVD-CWE-noinfo
163,289
CVE-2021-31979
7.8
7.2
HIGH
Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33771, CVE-2021-34514.
CWE-269
163,290
CVE-2021-3198
7.2
9
HIGH
By abusing the 'install rpm url' command, an attacker can escape the restricted clish shell on affected versions of Ivanti MobileIron Core. This issue was fixed in version 11.1.0.0.
CWE-78
163,291
CVE-2021-31980
9.8
7.5
CRITICAL
Microsoft Intune Management Extension Remote Code Execution Vulnerability
NVD-CWE-noinfo
163,292
CVE-2021-31983
6.6
6.8
MEDIUM
Paint 3D Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31945, CVE-2021-31946.
NVD-CWE-noinfo
163,293
CVE-2021-31984
8.8
6.8
HIGH
Power BI Remote Code Execution Vulnerability
NVD-CWE-noinfo
163,294
CVE-2021-31985
8.8
6.8
HIGH
Microsoft Defender Remote Code Execution Vulnerability
NVD-CWE-noinfo
163,295
CVE-2021-31986
6.8
4
MEDIUM
User controlled parameters related to SMTP notifications are not correctly validated. This can lead to a buffer overflow resulting in crashes and data leakage.
CWE-787
163,296
CVE-2021-31987
7.5
5.1
HIGH
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients.
CWE-20
163,297
CVE-2021-31988
8.8
6.8
HIGH
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email.
CWE-20
163,298
CVE-2021-31989
5.3
3.5
MEDIUM
A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices.
CWE-312
163,299
CVE-2021-3199
9.8
7.5
CRITICAL
Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter.
CWE-22
163,300
CVE-2021-31996
7.5
5
HIGH
An issue was discovered in the algorithmica crate through 2021-03-07 for Rust. There is a double free in merge_sort::merge().
CWE-415