ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
163,301 | CVE-2021-31997 | 7.8 | 7.2 | HIGH | a UNIX Symbolic Link (Symlink) Following vulnerability in python-postorius of openSUSE Leap 15.2, Factory allows local attackers to escalate from users postorius or postorius-admin to root. This issue affects: openSUSE Leap 15.2 python-postorius version 1.3.2-lp152.1.2 and prior versions. openSUSE Factory python-postorius version 1.3.4-2.1 and prior versions. | CWE-61 |
163,302 | CVE-2021-31998 | 7.8 | 7.2 | HIGH | A Incorrect Default Permissions vulnerability in the packaging of inn of SUSE Linux Enterprise Server 11-SP3; openSUSE Backports SLE-15-SP2, openSUSE Leap 15.2 allows local attackers to escalate their privileges from the news user to root. This issue affects: SUSE Linux Enterprise Server 11-SP3 inn version inn-2.4.2-170.21.3.1 and prior versions. openSUSE Backports SLE-15-SP2 inn versions prior to 2.6.2. openSUSE Leap 15.2 inn versions prior to 2.6.2. | CWE-276 |
163,303 | CVE-2021-31999 | 8.8 | 6.5 | HIGH | A Reliance on Untrusted Inputs in a Security Decision vulnerability in Rancher allows users in the cluster to act as others users in the cluster by forging the "Impersonate-User" or "Impersonate-Group" headers. This issue affects: Rancher versions prior to 2.5.9. Rancher versions prior to 2.4.16. | CWE-807 |
163,304 | CVE-2021-3200 | 3.3 | 4.3 | LOW | Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service | CWE-120 |
163,305 | CVE-2021-32000 | 7.1 | 6.6 | HIGH | A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allows local attackers to delete arbitrary files. This issue affects: SUSE Linux Enterprise Server 12 SP3 clone-master-clean-up version 1.6-4.6.1 and prior versions. SUSE Linux Enterprise Server 15 SP1 clone-master-clean-up version 1.6-3.9.1 and prior versions. openSUSE Factory clone-master-clean-up version 1.6-1.4 and prior versions. | CWE-61 |
163,306 | CVE-2021-32001 | 6.5 | 4 | MEDIUM | A Missing Encryption of Sensitive Data vulnerability in k3s, kde2 of SUSE Rancher allows any user with direct access to the datastore, or a copy of a datastore backup to extract the cluster's confidential keying material (cluster certificate authority private keys, secrets encryption configuration passphrase, etc) and decrypt it, without having to know the token value. This issue affects: SUSE Rancher K3s version v1.19.12+k3s1, v1.20.8+k3s1, v1.21.2+k3s1 and prior versions; RKE2 version v1.19.12+rke2r1, v1.20.8+rke2r1, v1.21.2+rke2r1 and prior versions. | CWE-311 |
163,307 | CVE-2021-32002 | 3.3 | 2.1 | LOW | Improper Access Control vulnerability in web service of Secomea SiteManager allows local attacker without credentials to gather network information and configuration of the SiteManager. This issue affects: Secomea SiteManager All versions prior to 9.5 on Hardware. | CWE-863 |
163,308 | CVE-2021-32003 | 5.5 | 2.1 | MEDIUM | Unprotected Transport of Credentials vulnerability in SiteManager provisioning service allows local attacker to capture credentials if the service is used after provisioning. This issue affects: Secomea SiteManager All versions prior to 9.5 on Hardware. | CWE-522 |
163,309 | CVE-2021-32004 | 5.3 | 5 | MEDIUM | This issue affects: Secomea GateManager All versions prior to 9.6. Improper Check of host header in web server of Secomea GateManager allows attacker to cause browser cache poisoning. | NVD-CWE-Other |
163,310 | CVE-2021-32012 | 5.5 | 4.3 | MEDIUM | SheetJS and SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2). | CWE-400 |
163,311 | CVE-2021-32013 | 5.5 | 4.3 | MEDIUM | SheetJS and SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 2 of 2). | CWE-400 |
163,312 | CVE-2021-32014 | 5.5 | 4.3 | MEDIUM | SheetJS and SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js. | CWE-400 |
163,313 | CVE-2021-32015 | 6 | 3.6 | MEDIUM | In Nuvoton NPCT75x TPM 1.2 firmware 7.4.0.0, a local authenticated malicious user with high privileges could potentially gain unauthorized access to TPM non-volatile memory. NOTE: Upgrading to firmware version 7.4.0.1 will mitigate against the vulnerability, but version 7.4.0.1 is not TCG or Common Criteria (CC) certified. Nuvoton recommends that users apply the NPCT75x TPM 1.2 firmware update. | CWE-862 |
163,314 | CVE-2021-32016 | 8.8 | 6.5 | HIGH | An issue was discovered in JUMP AMS 3.6.0.04.009-2487. A JUMP SOAP endpoint permitted the writing of arbitrary files to a user-controlled location on the remote filesystem (with user-controlled content) via directory traversal, potentially leading to remote code and command execution. | CWE-22 |
163,315 | CVE-2021-32017 | 7.7 | 4 | HIGH | An issue was discovered in JUMP AMS 3.6.0.04.009-2487. A JUMP SOAP endpoint permitted the listing of the content of the remote file system. This can be used to identify the complete server filesystem structure, i.e., identifying all the directories and files. | NVD-CWE-noinfo |
163,316 | CVE-2021-32018 | 6.5 | 4 | MEDIUM | An issue was discovered in JUMP AMS 3.6.0.04.009-2487. The JUMP SOAP API was vulnerable to arbitrary file reading due to an improper limitation of file loading on the server filesystem, aka directory traversal. | CWE-22 |
163,317 | CVE-2021-32019 | 6.1 | 4.3 | MEDIUM | There is missing input validation of host names displayed in OpenWrt before 19.07.8. The Connection Status page of the luci web-interface allows XSS, which can be used to gain full control over the affected system via ICMP. | CWE-79 |
163,318 | CVE-2021-32020 | 9.8 | 7.5 | CRITICAL | The kernel in Amazon Web Services FreeRTOS before 10.4.3 has insufficient bounds checking during management of heap memory. | CWE-119 |
163,319 | CVE-2021-32021 | 7.8 | 7.2 | HIGH | A denial of service vulnerability in the message broker of BlackBerry Protect for Windows version(s) versions 1574 and earlier could allow an attacker to potentially execute code in the context of a BlackBerry Cylance service that has admin rights on the system. | NVD-CWE-noinfo |
163,320 | CVE-2021-32022 | 5.5 | 2.1 | MEDIUM | A low privileged delete vulnerability using CEF RPC server of BlackBerry Protect for Windows version(s) versions 1574 and earlier could allow an attacker to potentially execute code in the context of a BlackBerry Cylance service that has admin rights on the system and gaining the ability to delete data from the local system. | NVD-CWE-noinfo |
163,321 | CVE-2021-32023 | 7.8 | 7.2 | HIGH | An elevation of privilege vulnerability in the message broker of BlackBerry Protect for Windows version(s) versions 1574 and earlier could allow an attacker to potentially execute code in the context of a BlackBerry Cylance service that has admin rights on the system. | CWE-269 |
163,322 | CVE-2021-32024 | 9.8 | 7.5 | CRITICAL | A remote code execution vulnerability in the BMP image codec of BlackBerry QNX SDP version(s) 6.4 to 7.1 could allow an attacker to potentially execute code in the context of the affected process. | NVD-CWE-noinfo |
163,323 | CVE-2021-32027 | 8.8 | 6.5 | HIGH | A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-119 |
163,324 | CVE-2021-32027 | 8.8 | 6.5 | HIGH | A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-190 |
163,325 | CVE-2021-32028 | 6.5 | 4 | MEDIUM | A flaw was found in postgresql. Using an INSERT ... ON CONFLICT ... DO UPDATE command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality. | NVD-CWE-noinfo |
163,326 | CVE-2021-32029 | 6.5 | 4 | MEDIUM | A flaw was found in postgresql. Using an UPDATE ... RETURNING command on a purpose-crafted table, an authenticated database user could read arbitrary bytes of server memory. The highest threat from this vulnerability is to data confidentiality. | CWE-200 |
163,327 | CVE-2021-32030 | 9.8 | 7.5 | CRITICAL | The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. | CWE-287 |
163,328 | CVE-2021-32032 | 7.5 | 5 | HIGH | In Trusted Firmware-M through 1.3.0, cleaning up the memory allocated for a multi-part cryptographic operation (in the event of a failure) can prevent the abort() operation in the associated cryptographic library from freeing internal resources, causing a memory leak. | CWE-401 |
163,329 | CVE-2021-32033 | 4.6 | 1.9 | MEDIUM | Protectimus SLIM NFC 70 10.01 devices allow a Time Traveler attack in which attackers can predict TOTP passwords in certain situations. The time value used by the device can be set independently from the used seed value for generating time-based one-time passwords, without authentication. Thus, an attacker with short-time physical access to a device can set the internal real-time clock (RTC) to the future, generate one-time passwords, and reset the clock to the current time. This allows the generation of valid future time-based one-time passwords without having further access to the hardware token. | CWE-287 |
163,330 | CVE-2021-32037 | 6.5 | 4 | MEDIUM | An authorized user may trigger an invariant which may result in denial of service or server exit if a relevant aggregation request is sent to a shard. Usually, the requests are sent via mongos and special privileges are required in order to know the address of the shards and to log in to the shards of an auth enabled environment. | CWE-617 |
163,331 | CVE-2021-3204 | 6.5 | 4 | MEDIUM | SSRF in the document conversion component of Webware Webdesktop 5.1.15 allows an attacker to read all files from the server. | CWE-918 |
163,332 | CVE-2021-32051 | 7.5 | 5 | HIGH | Hexagon G!nius Auskunftsportal before 5.0.0.0 allows SQL injection via the GiPWorkflow/Service/DownloadPublicFile id parameter. | CWE-89 |
163,333 | CVE-2021-32052 | 6.1 | 4.3 | MEDIUM | In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers. | CWE-79 |
163,334 | CVE-2021-32053 | 5.3 | 5 | MEDIUM | JPA Server in HAPI FHIR before 5.4.0 allows a user to deny service (e.g., disable access to the database after the attack stops) via history requests. This occurs because of a SELECT COUNT statement that requires a full index scan, with an accompanying large amount of server resources if there are many simultaneous history requests. | CWE-400 |
163,335 | CVE-2021-32054 | 6.1 | 4.3 | MEDIUM | Firely/Incendi Spark before 1.5.5-r4 lacks Content-Disposition headers in certain situations, which may cause crafted files to be delivered to clients such that they are rendered directly in a victim's web browser. | CWE-706 |
163,336 | CVE-2021-32055 | 9.1 | 5.8 | CRITICAL | Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default. | CWE-125 |
163,337 | CVE-2021-32056 | 4.3 | 4 | MEDIUM | Cyrus IMAP before 3.2.7, and 3.3.x and 3.4.x before 3.4.1, allows remote authenticated users to bypass intended access restrictions on server annotations and consequently cause replication to stall. | CWE-732 |
163,338 | CVE-2021-32061 | 5.3 | 5 | MEDIUM | S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a <Key>../ substring in a ListBucketResult element. | CWE-22 |
163,339 | CVE-2021-32062 | 5.3 | 5 | MEDIUM | MapServer before 7.0.8, 7.1.x and 7.2.x before 7.2.3, 7.3.x and 7.4.x before 7.4.5, and 7.5.x and 7.6.x before 7.6.3 does not properly enforce the MS_MAP_NO_PATH and MS_MAP_PATTERN restrictions that are intended to control the locations from which a mapfile may be loaded (with MapServer CGI). | CWE-863 |
163,340 | CVE-2021-32066 | 7.4 | 5.8 | HIGH | An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack." | CWE-326 |
163,341 | CVE-2021-32067 | 6.5 | 6.4 | MEDIUM | The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to view sensitive system information through an HTTP response due to insufficient output sanitization. | CWE-116 |
163,342 | CVE-2021-32068 | 3.7 | 4.3 | LOW | The AWV and MiCollab Client Service components in Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack by sending multiple session renegotiation requests, due to insufficient TLS session controls. A successful exploit could allow an attacker to modify application data and state. | CWE-770 |
163,343 | CVE-2021-32069 | 4.8 | 5.8 | MEDIUM | The AWV component of Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack due to improper TLS negotiation. A successful exploit could allow an attacker to view and modify data. | CWE-295 |
163,344 | CVE-2021-32070 | 5.4 | 5.8 | MEDIUM | The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to perform a clickjacking attack due to an insecure header response. A successful exploit could allow an attacker to modify the browser header and redirect users. | CWE-1021 |
163,345 | CVE-2021-32071 | 9.8 | 7.5 | CRITICAL | The MiCollab Client service in Mitel MiCollab before 9.3 could allow an unauthenticated user to gain system access due to improper access control. A successful exploit could allow an attacker to view and modify application data, and cause a denial of service for users. | CWE-287 |
163,346 | CVE-2021-32072 | 6.5 | 4 | MEDIUM | The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to get source code information (disclosing sensitive application data) due to insufficient output sanitization. A successful exploit could allow an attacker to view source code methods. | CWE-116 |
163,347 | CVE-2021-32073 | 8.8 | 6.8 | HIGH | DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution. | CWE-352 |
163,348 | CVE-2021-32074 | 7.5 | 5 | HIGH | HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking. | CWE-532 |
163,349 | CVE-2021-32075 | 9.8 | 7.5 | CRITICAL | Re-Logic Terraria before 1.4.2.3 performs Insecure Deserialization. | CWE-502 |
163,350 | CVE-2021-32076 | 5.3 | 5 | MEDIUM | Access Restriction Bypass via referrer spoof was discovered in SolarWinds Web Help Desk 12.7.2. An attacker can access the 'Web Help Desk Getting Started Wizard', especially the admin account creation page, from a non-privileged IP address network range or loopback address by intercepting the HTTP request and changing the referrer from the public IP address to the loopback. | CWE-290 |
163,351 | CVE-2021-32077 | 7.5 | 5 | HIGH | Primary Source Verification in VerityStream MSOW Solutions before 3.1.1 allows an anonymous internet user to discover Social Security Number (SSN) values via a brute-force attack on a (sometimes hidden) search field, because the last four SSN digits are part of the supported combination of search selectors. This discloses doctors' and nurses' social security numbers and PII. | CWE-200 |
163,352 | CVE-2021-32078 | 7.1 | 6.6 | HIGH | An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4. | CWE-125 |
163,353 | CVE-2021-32089 | 9.8 | 7.5 | CRITICAL | ** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on Zebra (formerly Motorola Solutions) Fixed RFID Reader FX9500 devices. An unauthenticated attacker can upload arbitrary files to the filesystem that can then be accessed through the web interface. This can lead to information disclosure and code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | CWE-434 |
163,354 | CVE-2021-32090 | 9.8 | 10 | CRITICAL | The dashboard component of StackLift LocalStack 0.12.6 allows attackers to inject arbitrary shell commands via the functionName parameter. | CWE-77 |
163,355 | CVE-2021-32091 | 6.1 | 4.3 | MEDIUM | A Cross-site scripting (XSS) vulnerability exists in StackLift LocalStack 0.12.6. | CWE-79 |
163,356 | CVE-2021-32092 | 6.1 | 4.3 | MEDIUM | A Cross-site scripting (XSS) vulnerability in the DocumentAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows remote attackers to inject arbitrary web script or HTML via the uuid parameter. | CWE-79 |
163,357 | CVE-2021-32093 | 6.5 | 4 | MEDIUM | The ConfigFileAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to read arbitrary files via the ConfigName parameter. | CWE-862 |
163,358 | CVE-2021-32094 | 8.8 | 6.5 | HIGH | U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to upload arbitrary files. | CWE-434 |
163,359 | CVE-2021-32095 | 8.1 | 5.5 | HIGH | U.S. National Security Agency (NSA) Emissary 5.9.0 allows an authenticated user to delete arbitrary files. | CWE-862 |
163,360 | CVE-2021-32096 | 8.8 | 6.8 | HIGH | The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter. | CWE-352 |
163,361 | CVE-2021-32098 | 9.8 | 7.5 | CRITICAL | Artica Pandora FMS 742 allows unauthenticated attackers to perform Phar deserialization. | CWE-502 |
163,362 | CVE-2021-32099 | 9.8 | 7.5 | CRITICAL | A SQL injection vulnerability in the pandora_console component of Artica Pandora FMS 742 allows an unauthenticated attacker to upgrade his unprivileged session via the /include/chart_generator.php session_id parameter, leading to a login bypass. | CWE-89 |
163,363 | CVE-2021-3210 | 9.6 | 9.3 | CRITICAL | components/Modals/HelpTexts/GenericAll/GenericAll.jsx in Bloodhound <= 4.0.1 allows remote attackers to execute arbitrary system commands when the victim imports a malicious data file containing JavaScript in the objectId parameter. | CWE-79 |
163,364 | CVE-2021-32100 | 6.5 | 4 | MEDIUM | A remote file inclusion vulnerability exists in Artica Pandora FMS 742, exploitable by the lowest privileged user. | NVD-CWE-Other |
163,365 | CVE-2021-32101 | 8.2 | 6.4 | HIGH | The Patient Portal of OpenEMR 5.0.2.1 is affected by a incorrect access control system in portal/patient/_machine_config.php. To exploit the vulnerability, an unauthenticated attacker can register an account, bypassing the permission check of this portal's API. Then, the attacker can then manipulate and read data of every registered patient. | CWE-732 |
163,366 | CVE-2021-32102 | 8.8 | 6.5 | HIGH | A SQL injection vulnerability exists (with user privileges) in library/custom_template/ajax_code.php in OpenEMR 5.0.2.1. | CWE-89 |
163,367 | CVE-2021-32103 | 4.8 | 3.5 | MEDIUM | A Stored XSS vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.1 allows a admin authenticated user to inject arbitrary web script or HTML via the lname parameter. | CWE-79 |
163,368 | CVE-2021-32104 | 8.8 | 6.5 | HIGH | A SQL injection vulnerability exists (with user privileges) in interface/forms/eye_mag/save.php in OpenEMR 5.0.2.1. | CWE-89 |
163,369 | CVE-2021-32106 | 5.4 | 3.5 | MEDIUM | In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed. | CWE-79 |
163,370 | CVE-2021-32122 | 8 | 5.4 | HIGH | Certain NETGEAR devices are affected by CSRF. This affects EX3700 before 1.0.0.90, EX3800 before 1.0.0.90, EX6120 before 1.0.0.64, and EX6130 before 1.0.0.44. | CWE-352 |
163,371 | CVE-2021-32132 | 5.5 | 4.3 | MEDIUM | The abst_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
163,372 | CVE-2021-32134 | 5.5 | 4.3 | MEDIUM | The gf_odf_desc_copy function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
163,373 | CVE-2021-32135 | 5.5 | 4.3 | MEDIUM | The trak_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
163,374 | CVE-2021-32136 | 7.8 | 6.8 | HIGH | Heap buffer overflow in the print_udta function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file. | CWE-787 |
163,375 | CVE-2021-32137 | 5.5 | 4.3 | MEDIUM | Heap buffer overflow in the URL_GetProtocolType function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file. | CWE-787 |
163,376 | CVE-2021-32138 | 5.5 | 4.3 | MEDIUM | The DumpTrackInfo function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
163,377 | CVE-2021-32139 | 5.5 | 4.3 | MEDIUM | The gf_isom_vp_config_get function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
163,378 | CVE-2021-32172 | 9.8 | 7.5 | CRITICAL | Maian Cart v3.8 contains a preauthorization remote code execution (RCE) exploit via a broken access control issue in the Elfinder plugin. | CWE-862 |
163,379 | CVE-2021-32198 | 9.8 | 7.5 | CRITICAL | EmTec ZOC through 8.02.4 allows remote servers to cause a denial of service (Windows GUI hang) by telling the ZOC window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. In other words, it does not implement a usleep or similar delay upon processing a title change. | NVD-CWE-noinfo |
163,380 | CVE-2021-32202 | 6.1 | 4.3 | MEDIUM | In CS-Cart version 4.11.1, it is possible to induce copy-paste XSS by manipulating the "post description" filed in the blog post creation page. | CWE-79 |
163,381 | CVE-2021-3223 | 7.5 | 5 | HIGH | Node-RED-Dashboard before 2.26.2 allows ui_base/js/..%2f directory traversal to read files. | CWE-22 |
163,382 | CVE-2021-32233 | 6.1 | 4.3 | MEDIUM | SmarterTools SmarterMail before Build 7776 allows XSS. | CWE-79 |
163,383 | CVE-2021-32234 | 9.8 | 7.5 | CRITICAL | SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows remote code execution. | NVD-CWE-noinfo |
163,384 | CVE-2021-32238 | 7.8 | 9.3 | HIGH | Epic Games / Psyonix Rocket League <=1.95 is affected by Buffer Overflow. Stack-based buffer overflow occurs when Rocket League handles UPK object files that can result in code execution and denial of service scenario. | CWE-787 |
163,385 | CVE-2021-3224 | 5.4 | 3.5 | MEDIUM | A stored cross-site scripting (XSS) vulnerability in cszcms 1.2.9 exists in /admin/pages/new via the content parameter. | CWE-79 |
163,386 | CVE-2021-32243 | 8.8 | 6.5 | HIGH | FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated). | CWE-434 |
163,387 | CVE-2021-32244 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) in Moodle 3.10.3 allows remote attackers to execute arbitrary web script or HTML via the "Description" field. | CWE-79 |
163,388 | CVE-2021-32245 | 5.4 | 3.5 | MEDIUM | In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack. | CWE-79 |
163,389 | CVE-2021-32263 | 7.8 | 6.8 | HIGH | ok-file-formats through 2021-04-29 has a heap-based buffer overflow in the ok_csv_circular_buffer_read function in ok_csv.c. | CWE-787 |
163,390 | CVE-2021-32265 | 8.8 | 6.8 | HIGH | An issue was discovered in Bento4 through v1.6.0-637. A global-buffer-overflow exists in the function AP4_MemoryByteStream::WritePartial() located in Ap4ByteStream.cpp. It allows an attacker to cause code execution or information disclosure. | CWE-120 |
163,391 | CVE-2021-32268 | 7.8 | 6.8 | HIGH | Buffer overflow vulnerability in function gf_fprintf in os_file.c in gpac before 1.0.1 allows attackers to execute arbitrary code. The fixed version is 1.0.1. | CWE-787 |
163,392 | CVE-2021-32269 | 5.5 | 4.3 | MEDIUM | An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function ilst_item_box_dump located in box_dump.c. It allows an attacker to cause Denial of Service. | CWE-476 |
163,393 | CVE-2021-32270 | 5.5 | 4.3 | MEDIUM | An issue was discovered in gpac through 20200801. A NULL pointer dereference exists in the function vwid_box_del located in box_code_base.c. It allows an attacker to cause Denial of Service. | CWE-476 |
163,394 | CVE-2021-32271 | 7.8 | 6.8 | HIGH | An issue was discovered in gpac through 20200801. A stack-buffer-overflow exists in the function DumpRawUIConfig located in odf_dump.c. It allows an attacker to cause code Execution. | CWE-787 |
163,395 | CVE-2021-32272 | 7.8 | 6.8 | HIGH | An issue was discovered in faad2 before 2.10.0. A heap-buffer-overflow exists in the function stszin located in mp4read.c. It allows an attacker to cause Code Execution. | CWE-787 |
163,396 | CVE-2021-32273 | 7.8 | 6.8 | HIGH | An issue was discovered in faad2 through 2.10.0. A stack-buffer-overflow exists in the function ftypin located in mp4read.c. It allows an attacker to cause Code Execution. | CWE-787 |
163,397 | CVE-2021-32274 | 7.8 | 6.8 | HIGH | An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function sbr_qmf_synthesis_64 located in sbr_qmf.c. It allows an attacker to cause code Execution. | CWE-787 |
163,398 | CVE-2021-32275 | 5.5 | 4.3 | MEDIUM | An issue was discovered in faust through v2.30.5. A NULL pointer dereference exists in the function CosPrim::computeSigOutput() located in cosprim.hh. It allows an attacker to cause Denial of Service. | CWE-476 |
163,399 | CVE-2021-32276 | 5.5 | 4.3 | MEDIUM | An issue was discovered in faad2 through 2.10.0. A NULL pointer dereference exists in the function get_sample() located in output.c. It allows an attacker to cause Denial of Service. | CWE-476 |
163,400 | CVE-2021-32277 | 7.8 | 6.8 | HIGH | An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function sbr_qmf_analysis_32 located in sbr_qmf.c. It allows an attacker to cause code Execution. | CWE-787 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.