ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
163,401 | CVE-2021-32278 | 7.8 | 6.8 | HIGH | An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function lt_prediction located in lt_predict.c. It allows an attacker to cause code Execution. | CWE-787 |
163,402 | CVE-2021-32280 | 5.5 | 4.3 | MEDIUM | An issue was discovered in fig2dev before 3.2.8.. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause Denial of Service. The fixed version of fig2dev is 3.2.8. | CWE-476 |
163,403 | CVE-2021-32281 | 7.8 | 6.8 | HIGH | An issue was discovered in gravity through 0.8.1. A heap-buffer-overflow exists in the function gnode_function_add_upvalue located in gravity_ast.c. It allows an attacker to cause code Execution. | CWE-787 |
163,404 | CVE-2021-32282 | 5.5 | 4.3 | MEDIUM | An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function ircode_add_check() located in gravity_ircode.c. It allows an attacker to cause Denial of Service. | CWE-787 |
163,405 | CVE-2021-32283 | 5.5 | 4.3 | MEDIUM | An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function gravity_string_to_value() located in gravity_value.c. It allows an attacker to cause Denial of Service. | CWE-476 |
163,406 | CVE-2021-32284 | 7.8 | 6.8 | HIGH | An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function ircode_register_pop_context_protect() located in gravity_ircode.c. It allows an attacker to cause Denial of Service. | CWE-476 |
163,407 | CVE-2021-32285 | 5.5 | 4.3 | MEDIUM | An issue was discovered in gravity through 0.8.1. A NULL pointer dereference exists in the function list_iterator_next() located in gravity_core.c. It allows an attacker to cause Denial of Service. | CWE-476 |
163,408 | CVE-2021-32286 | 7.8 | 6.8 | HIGH | An issue was discovered in hcxtools through 6.1.6. A global-buffer-overflow exists in the function pcapngoptionwalk located in hcxpcapngtool.c. It allows an attacker to cause code Execution. | CWE-787 |
163,409 | CVE-2021-32287 | 7.8 | 6.8 | HIGH | An issue was discovered in heif through v3.6.2. A global-buffer-overflow exists in the function HevcDecoderConfigurationRecord::getPicWidth() located in hevcdecoderconfigrecord.cpp. It allows an attacker to cause code Execution. | CWE-787 |
163,410 | CVE-2021-32288 | 7.8 | 6.8 | HIGH | An issue was discovered in heif through v3.6.2. A global-buffer-overflow exists in the function HevcDecoderConfigurationRecord::getPicHeight() located in hevcdecoderconfigrecord.cpp. It allows an attacker to cause code Execution. | CWE-787 |
163,411 | CVE-2021-32289 | 5.5 | 4.3 | MEDIUM | An issue was discovered in heif through through v3.6.2. A NULL pointer dereference exists in the function convertByteStreamToRBSP() located in nalutil.cpp. It allows an attacker to cause Denial of Service. | CWE-476 |
163,412 | CVE-2021-3229 | 7.5 | 7.8 | HIGH | Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177 and earlier versions allows an attacker to disrupt the use of device setup services via continuous login error. | NVD-CWE-noinfo |
163,413 | CVE-2021-32294 | 8.8 | 6.8 | HIGH | An issue was discovered in libgig through 20200507. A heap-buffer-overflow exists in the function RIFF::List::GetSubList located in RIFF.cpp. It allows an attacker to cause code Execution. | CWE-787 |
163,414 | CVE-2021-32297 | 8.8 | 6.8 | HIGH | An issue was discovered in LIEF through 0.11.4. A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution. | CWE-787 |
163,415 | CVE-2021-32298 | 8.8 | 6.8 | HIGH | An issue was discovered in libiff through 20190123. A global-buffer-overflow exists in the function IFF_errorId located in error.c. It allows an attacker to cause code Execution. | CWE-787 |
163,416 | CVE-2021-32299 | 7.8 | 6.8 | HIGH | An issue was discovered in pbrt through 20200627. A stack-buffer-overflow exists in the function pbrt::ParamSet::ParamSet() located in paramset.h. It allows an attacker to cause code Execution. | CWE-787 |
163,417 | CVE-2021-32305 | 9.8 | 10 | CRITICAL | WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter. | CWE-78 |
163,418 | CVE-2021-3239 | 9.8 | 7.5 | CRITICAL | E-Learning System 1.0 suffers from an unauthenticated SQL injection vulnerability, which allows remote attackers to execute arbitrary code on the hosting web server and gain a reverse shell. | CWE-89 |
163,419 | CVE-2021-32399 | 7 | 4.4 | HIGH | net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller. | CWE-362 |
163,420 | CVE-2021-32402 | 8.8 | 6.8 | HIGH | Intelbras Router RF 301K Firmware 1.1.2 is vulnerable to Cross Site Request Forgery (CSRF) due to lack of validation and insecure configurations in inputs and modules. | CWE-352 |
163,421 | CVE-2021-32403 | 8.8 | 6.8 | HIGH | Intelbras Router RF 301K Firmware 1.1.2 is vulnerable to Cross Site Request Forgery (CSRF) due to lack of security mechanisms for token protection and unsafe inputs and modules. | CWE-352 |
163,422 | CVE-2021-32424 | 8.8 | 6.8 | HIGH | In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session controls, a threat actor could make unauthorized changes to an affected router via a specially crafted web page. If an authenticated user were to interact with a malicious web page it could allow for a complete takeover of the router. | CWE-352 |
163,423 | CVE-2021-32426 | 6.1 | 4.3 | MEDIUM | In TrendNet TW100-S4W1CA 2.3.32, it is possible to inject arbitrary JavaScript into the router's web interface via the "echo" command. | CWE-79 |
163,424 | CVE-2021-3243 | 6.1 | 4.3 | MEDIUM | Wfilter ICF 5.0.117 contains a cross-site scripting (XSS) vulnerability. An attacker in the same LAN can craft a packet with a malicious User-Agent header to inject a payload in its logs, where an attacker can take over the system by through its plugin-running function. | CWE-79 |
163,425 | CVE-2021-32437 | 5.5 | 4.3 | MEDIUM | The gf_hinter_finalize function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
163,426 | CVE-2021-32438 | 5.5 | 4.3 | MEDIUM | The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
163,427 | CVE-2021-32439 | 7.8 | 6.8 | HIGH | Buffer overflow in the stbl_AppendSize function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file. | CWE-120 |
163,428 | CVE-2021-32440 | 5.5 | 4.3 | MEDIUM | The Media_RewriteODFrame function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | CWE-476 |
163,429 | CVE-2021-32453 | 3.3 | 2.1 | LOW | SITEL CAP/PRX firmware version 5.2.01 allows an attacker with access to the local network, to access via HTTP to the internal configuration database of the device without any authentication. An attacker could exploit this vulnerability in order to obtain information about the device´s configuration. | CWE-200 |
163,430 | CVE-2021-32454 | 8.8 | 5.8 | HIGH | SITEL CAP/PRX firmware version 5.2.01 makes use of a hardcoded password. An attacker with access to the device could modify these credentials, leaving the administrators of the device without access. | CWE-798 |
163,431 | CVE-2021-32455 | 6.5 | 6.1 | MEDIUM | SITEL CAP/PRX firmware version 5.2.01, allows an attacker with access to the device´s network to cause a denial of service condition on the device. An attacker could exploit this vulnerability by sending HTTP requests massively. | CWE-400 |
163,432 | CVE-2021-32456 | 6.5 | 3.3 | MEDIUM | SITEL CAP/PRX firmware version 5.2.01 allows an attacker with access to the local network of the device to obtain the authentication passwords by analysing the network traffic. | CWE-319 |
163,433 | CVE-2021-32457 | 7.8 | 4.6 | HIGH | Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability. | CWE-269 |
163,434 | CVE-2021-32458 | 7.8 | 7.2 | HIGH | Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl which could lead to code execution on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability. | CWE-787 |
163,435 | CVE-2021-32459 | 6.5 | 5.5 | MEDIUM | Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attacker must first obtain the ability to execute high-privileged code on the target device in order to exploit this vulnerability. | CWE-798 |
163,436 | CVE-2021-3246 | 8.8 | 6.8 | HIGH | A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted WAV file. | CWE-787 |
163,437 | CVE-2021-32460 | 7.8 | 7.2 | HIGH | The Trend Micro Maximum Security 2021 (v17) consumer product is vulnerable to an improper access control vulnerability in the installer which could allow a local attacker to escalate privileges on a target machine. Please note than an attacker must already have local user privileges and access on the machine to exploit this vulnerability. | CWE-863 |
163,438 | CVE-2021-32461 | 7.8 | 7.2 | HIGH | Trend Micro Password Manager (Consumer) version 5.0.0.1217 and below is vulnerable to an Integer Truncation Privilege Escalation vulnerability which could allow a local attacker to trigger a buffer overflow and escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | CWE-681 |
163,439 | CVE-2021-32462 | 8.8 | 9 | HIGH | Trend Micro Password Manager (Consumer) version 5.0.0.1217 and below is vulnerable to an Exposed Hazardous Function Remote Code Execution vulnerability which could allow an unprivileged client to manipulate the registry and escalate privileges to SYSTEM on affected installations. Authentication is required to exploit this vulnerability. | NVD-CWE-Other |
163,440 | CVE-2021-32463 | 7.8 | 7.2 | HIGH | An incorrect permission assignment denial-of-service vulnerability in Trend Micro Apex One, Apex One as a Service (SaaS), Worry-Free Business Security 10.0 SP1 and Worry-Free Servgices could allow a local attacker to escalate privileges and delete files with system privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | CWE-732 |
163,441 | CVE-2021-32464 | 7.8 | 7.2 | HIGH | An incorrect permission assignment privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security Services could allow an attacker to modify a specific script before it is executed. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | CWE-276 |
163,442 | CVE-2021-32465 | 8.8 | 6.5 | HIGH | An incorrect permission preservation vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a remote user to perform an attack and bypass authentication on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | CWE-281 |
163,443 | CVE-2021-32466 | 7 | 6.9 | HIGH | An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | CWE-427 |
163,444 | CVE-2021-32470 | 6.1 | 4.3 | MEDIUM | Craft CMS before 3.6.13 has an XSS vulnerability. | CWE-79 |
163,445 | CVE-2021-32471 | 7.8 | 7.2 | HIGH | Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input composed of As and Bs (instead of 0s and 1s). NOTE: the discoverer states "this vulnerability has no real-world implications." | CWE-20 |
163,446 | CVE-2021-32481 | 6.1 | 4.3 | MEDIUM | Cloudera Hue 4.6.0 allows XSS via the type parameter. | CWE-79 |
163,447 | CVE-2021-32482 | 6.1 | 4.3 | MEDIUM | Cloudera Manager 5.x, 6.x, 7.1.x, 7.2.x, and 7.3.x allows XSS via the path parameter. | CWE-79 |
163,448 | CVE-2021-32483 | 5.3 | 5 | MEDIUM | Cloudera Manager 7.2.4 has Incorrect Access Control, allowing Escalation of Privileges to view the restricted Dashboard. | CWE-269 |
163,449 | CVE-2021-32484 | 7.5 | 7.8 | HIGH | In modem 2G RRM, there is a possible system crash due to a heap buffer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00500621; Issue ID: ALPS04964917. | CWE-787 |
163,450 | CVE-2021-32485 | 7.5 | 7.8 | HIGH | In modem 2G RRM, there is a possible system crash due to a heap buffer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00500621; Issue ID: ALPS04964926. | CWE-787 |
163,451 | CVE-2021-32486 | 7.5 | 7.8 | HIGH | In modem 2G RRM, there is a possible system crash due to a heap buffer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00500621; Issue ID: ALPS04964928. | CWE-787 |
163,452 | CVE-2021-32487 | 7.5 | 7.8 | HIGH | In modem 2G RRM, there is a possible system crash due to a heap buffer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00500736; Issue ID: ALPS04938456. | CWE-787 |
163,453 | CVE-2021-32489 | 4.4 | 3.5 | MEDIUM | An issue was discovered in the _send_secure_msg() function of Yubico yubihsm-shell through 2.0.3. The function does not correctly validate the embedded length field of an authenticated message received from the device because response_msg.st.len=8 can be accepted but triggers an integer overflow, which causes CRYPTO_cbc128_decrypt (in OpenSSL) to encounter an undersized buffer and experience a segmentation fault. The yubihsm-shell project is included in the YubiHSM 2 SDK product. | CWE-190 |
163,454 | CVE-2021-32490 | 7.8 | 6.8 | HIGH | A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds write in function DJVU::filter_bv() via crafted djvu file may lead to application crash and other consequences. | CWE-787 |
163,455 | CVE-2021-32491 | 7.8 | 6.8 | HIGH | A flaw was found in djvulibre-3.5.28 and earlier. An integer overflow in function render() in tools/ddjvu via crafted djvu file may lead to application crash and other consequences. | CWE-190 |
163,456 | CVE-2021-32492 | 7.8 | 6.8 | HIGH | A flaw was found in djvulibre-3.5.28 and earlier. An out of bounds read in function DJVU::DataPool::has_data() via crafted djvu file may lead to application crash and other consequences. | CWE-125 |
163,457 | CVE-2021-32493 | 7.8 | 6.8 | HIGH | A flaw was found in djvulibre-3.5.28 and earlier. A heap buffer overflow in function DJVU::GBitmap::decode() via crafted djvu file may lead to application crash and other consequences. | CWE-787 |
163,458 | CVE-2021-32496 | 5.3 | 3.5 | MEDIUM | SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects information transmitted from the client to the SSH server, assuming the attacker has access to the network on which the device is connected. This can increase the risk that encryption will be compromised, leading to the exposure of sensitive user information and man-in-the-middle attacks. | CWE-326 |
163,459 | CVE-2021-32497 | 8.6 | 9.3 | HIGH | SICK SOPAS ET before version 4.8.0 allows attackers to wrap any executable file into an SDD and provide this to a SOPAS ET user. When a user starts the emulator the executable is run without further checks. | NVD-CWE-noinfo |
163,460 | CVE-2021-32498 | 8.6 | 9.3 | HIGH | SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the pathname of the emulator and use path traversal to run an arbitrary executable located on the host system. When the user starts the emulator from SOPAS ET the corresponding executable will be started instead of the emulator | CWE-22 |
163,461 | CVE-2021-32499 | 7.5 | 5 | HIGH | SICK SOPAS ET before version 4.8.0 allows attackers to manipulate the command line arguments to pass in any value to the Emulator executable. | CWE-77 |
163,462 | CVE-2021-32506 | 6.5 | 4 | MEDIUM | Absolute Path Traversal vulnerability in GetImage in QSAN Storage Manager allows remote authenticated attackers download arbitrary files via the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3 . | CWE-22 |
163,463 | CVE-2021-32506 | 6.5 | 4 | MEDIUM | Absolute Path Traversal vulnerability in GetImage in QSAN Storage Manager allows remote authenticated attackers download arbitrary files via the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3 . | CWE-36 |
163,464 | CVE-2021-32507 | 6.5 | 4 | MEDIUM | Absolute Path Traversal vulnerability in FileDownload in QSAN Storage Manager allows remote authenticated attackers download arbitrary files via the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-36 |
163,465 | CVE-2021-32508 | 6.5 | 4 | MEDIUM | Absolute Path Traversal vulnerability in FileStreaming in QSAN Storage Manager allows remote authenticated attackers access arbitrary files by injecting the Symbolic Link following the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-22 |
163,466 | CVE-2021-32509 | 6.5 | 4 | MEDIUM | Absolute Path Traversal vulnerability in FileviewDoc in QSAN Storage Manager allows remote authenticated attackers access arbitrary files by injecting the Symbolic Link following the Url path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-61 |
163,467 | CVE-2021-32510 | 4.3 | 4 | MEDIUM | QSAN Storage Manager through directory listing vulnerability in antivirus function allows remote authenticated attackers to list arbitrary directories by injecting file path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-548 |
163,468 | CVE-2021-32511 | 4.3 | 4 | MEDIUM | QSAN Storage Manager through directory listing vulnerability in ViewBroserList allows remote authenticated attackers to list arbitrary directories via the file path parameter. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-548 |
163,469 | CVE-2021-32512 | 9.8 | 7.5 | CRITICAL | QuickInstall in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-78 |
163,470 | CVE-2021-32513 | 9.8 | 7.5 | CRITICAL | QsanTorture in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-78 |
163,471 | CVE-2021-32514 | 7.5 | 5 | HIGH | Improper access control vulnerability in FirmwareUpgrade in QSAN Storage Manager allows remote attackers to reboot and discontinue the device. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-284 |
163,472 | CVE-2021-32515 | 5.3 | 5 | MEDIUM | Directory listing vulnerability in share_link in QSAN Storage Manager allows attackers to list arbitrary directories and further access credential information. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-548 |
163,473 | CVE-2021-32516 | 7.5 | 5 | HIGH | Path traversal vulnerability in share_link in QSAN Storage Manager allows remote attackers to download arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-22 |
163,474 | CVE-2021-32517 | 7.5 | 5 | HIGH | Improper access control vulnerability in share_link in QSAN Storage Manager allows remote attackers to download arbitrary files using particular parameter in download function. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-284 |
163,475 | CVE-2021-32518 | 7.5 | 5 | HIGH | A vulnerability in share_link in QSAN Storage Manager allows remote attackers to create a symbolic link then access arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-61 |
163,476 | CVE-2021-32519 | 7.5 | 5 | HIGH | Use of password hash with insufficient computational effort vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to recover the plain-text password by brute-forcing the MD5 hash. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.2, QSAN XEVO v2.1.0, and QSAN SANOS v2.1.0. | CWE-916 |
163,477 | CVE-2021-3252 | 7.5 | 5 | HIGH | KACO New Energy XP100U Up to XP-JAVA 2.0 is affected by incorrect access control. Credentials will always be returned in plain-text from the local server during the KACO XP100U authentication process, regardless of whatever passwords have been provided, which leads to an information disclosure vulnerability. | CWE-522 |
163,478 | CVE-2021-32520 | 9.8 | 7.5 | CRITICAL | Use of hard-coded cryptographic key vulnerability in QSAN Storage Manager allows attackers to obtain users’ credentials and related permissions. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | CWE-321 |
163,479 | CVE-2021-32521 | 9.8 | 7.5 | CRITICAL | Use of MAC address as an authenticated password in QSAN Storage Manager, XEVO, SANOS allows local attackers to escalate privileges. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | CWE-798 |
163,480 | CVE-2021-32522 | 9.8 | 5 | CRITICAL | Improper restriction of excessive authentication attempts vulnerability in QSAN Storage Manager, XEVO, SANOS allows remote attackers to discover users’ credentials and obtain access via a brute force attack. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | CWE-307 |
163,481 | CVE-2021-32523 | 7.2 | 6.5 | HIGH | Improper authorization vulnerability in QSAN Storage Manager allows remote privileged users to bypass the access control and execute arbitrary commands. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | CWE-285 |
163,482 | CVE-2021-32524 | 7.2 | 6.5 | HIGH | Command injection vulnerability in QSAN Storage Manager allows remote privileged users to execute arbitrary commands. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | CWE-78 |
163,483 | CVE-2021-32525 | 7.2 | 9 | HIGH | The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | CWE-259 |
163,484 | CVE-2021-32526 | 6.5 | 4 | MEDIUM | Incorrect permission assignment for critical resource vulnerability in QSAN Storage Manager allows authenticated remote attackers to access arbitrary password files. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | CWE-732 |
163,485 | CVE-2021-32526 | 6.5 | 4 | MEDIUM | Incorrect permission assignment for critical resource vulnerability in QSAN Storage Manager allows authenticated remote attackers to access arbitrary password files. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | CWE-732 |
163,486 | CVE-2021-32527 | 7.5 | 5 | HIGH | Path traversal vulnerability in QSAN Storage Manager allows remote unauthenticated attackers to download arbitrary files thru injecting file path in download function. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | CWE-22 |
163,487 | CVE-2021-32528 | 5.3 | 5 | MEDIUM | Observable behavioral discrepancy vulnerability in QSAN Storage Manager allows remote attackers to obtain the system information without permissions. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | NVD-CWE-Other |
163,488 | CVE-2021-32529 | 9.8 | 7.5 | CRITICAL | Command injection vulnerability in QSAN XEVO, SANOS allows remote unauthenticated attackers to execute arbitrary commands. Suggest contacting with QSAN and refer to recommendations in QSAN Document. | CWE-77 |
163,489 | CVE-2021-32530 | 9.8 | 7.5 | CRITICAL | OS command injection vulnerability in Array function in QSAN XEVO allows remote unauthenticated attackers to execute arbitrary commands via status parameter. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0. | CWE-78 |
163,490 | CVE-2021-32531 | 9.8 | 7.5 | CRITICAL | OS command injection vulnerability in Init function in QSAN XEVO allows remote attackers to execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0. | CWE-78 |
163,491 | CVE-2021-32532 | 7.5 | 5 | HIGH | Path traversal vulnerability in back-end analysis function in QSAN XEVO allows remote attackers to download arbitrary files without permissions. The referred vulnerability has been solved with the updated version of QSAN XEVO v2.1.0. | CWE-22 |
163,492 | CVE-2021-32533 | 9.8 | 7.5 | CRITICAL | The QSAN SANOS setting page does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0. | CWE-78 |
163,493 | CVE-2021-32534 | 9.8 | 7.5 | CRITICAL | QSAN SANOS factory reset function does not filter special parameters. Remote attackers can use this vulnerability to inject and execute arbitrary commands without permissions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0. | CWE-78 |
163,494 | CVE-2021-32535 | 9.8 | 7.5 | CRITICAL | The vulnerability of hard-coded default credentials in QSAN SANOS allows unauthenticated remote attackers to obtain administrator’s permission and execute arbitrary functions. The referred vulnerability has been solved with the updated version of QSAN SANOS v2.1.0. | CWE-798 |
163,495 | CVE-2021-32536 | 6.1 | 4.3 | MEDIUM | The login page in the MCUsystem does not filter with special characters, which allows remote attackers can inject JavaScript without privilege and thus perform reflected XSS attacks. | CWE-79 |
163,496 | CVE-2021-32537 | 6.5 | 4.9 | MEDIUM | Realtek HAD contains a driver crashed vulnerability which allows local side attackers to send a special string to the kernel driver in a user’s mode. Due to unexpected commands, the kernel driver will cause the system crashed. | CWE-119 |
163,497 | CVE-2021-32538 | 9.8 | 7.5 | CRITICAL | ARTWARE CMS parameter of image upload function does not filter the type of upload files which allows remote attackers can upload arbitrary files without logging in, and further execute code unrestrictedly. | CWE-434 |
163,498 | CVE-2021-32539 | 5.4 | 3.5 | MEDIUM | Add event in calendar function in the 101EIP system does not filter special characters in specific fields, which allows remote authenticated users to inject JavaScript and perform a stored XSS attack. | CWE-79 |
163,499 | CVE-2021-32540 | 5.4 | 3.5 | MEDIUM | Add announcement function in the 101EIP system does not filter special characters, which allows authenticated users to inject JavaScript and perform a stored XSS attack. | CWE-79 |
163,500 | CVE-2021-32541 | 5.3 | 5 | MEDIUM | The CTS Web transaction system related to authentication and session management is implemented incorrectly, which allows remote unauthenticated attackers can send a large number of valid usernames, and force those logged-in account to log out, causing the user to be unable to access the services | CWE-287 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.