ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
163,901 | CVE-2021-3310 | 7.8 | 4.6 | HIGH | Western Digital My Cloud OS 5 devices before 5.10.122 mishandle Symbolic Link Following on SMB and AFP shares. This can lead to code execution and information disclosure (by reading local files). | CWE-59 |
163,902 | CVE-2021-33106 | 7.8 | 4.6 | HIGH | Integer overflow in the Safestring library maintained by Intel(R) may allow an authenticated user to potentially enable escalation of privilege via local access. | CWE-190 |
163,903 | CVE-2021-3311 | 9.8 | 6.8 | CRITICAL | An issue was discovered in October through build 471. It reactivates an old session ID (which had been invalid after a logout) once a new login occurs. NOTE: this violates the intended Auth/Manager.php authentication behavior but, admittedly, is only relevant if an old session ID is known to an attacker. | CWE-613 |
163,904 | CVE-2021-33118 | 7.8 | 4.6 | HIGH | Improper access control in the software installer for the Intel(R) Serial IO driver for Intel(R) NUC 11 Gen before version 30.100.2104.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | CWE-863 |
163,905 | CVE-2021-3312 | 6.5 | 4 | MEDIUM | An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document. | CWE-611 |
163,906 | CVE-2021-3313 | 5.4 | 3.5 | MEDIUM | Plone CMS until version 5.2.4 has a stored Cross-Site Scripting (XSS) vulnerability in the user fullname property and the file upload functionality. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript in the context of the victim's browser if the victim opens a vulnerable page containing an XSS payload. | CWE-79 |
163,907 | CVE-2021-3314 | 6.1 | 4.3 | MEDIUM | ** UNSUPPORTED WHEN ASSIGNED ** Oracle GlassFish Server 3.1.2.18 and below allows /common/logViewer/logViewer.jsf XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | CWE-79 |
163,908 | CVE-2021-3315 | 5.4 | 3.5 | MEDIUM | In JetBrains TeamCity before 2020.2.2, stored XSS on a tests page was possible. | CWE-79 |
163,909 | CVE-2021-3317 | 8.8 | 6.5 | HIGH | KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter. | CWE-77 |
163,910 | CVE-2021-33175 | 7.5 | 5 | HIGH | EMQ X Broker versions prior to 4.2.8 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system. | CWE-770 |
163,911 | CVE-2021-33176 | 7.5 | 5 | HIGH | VerneMQ MQTT Broker versions prior to 1.12.0 are vulnerable to a denial of service attack as a result of excessive memory consumption due to the handling of untrusted inputs. These inputs cause the message broker to consume large amounts of memory, resulting in the application being terminated by the operating system. | CWE-770 |
163,912 | CVE-2021-33177 | 8.8 | 6.5 | HIGH | The Bulk Modifications functionality in Nagios XI versions prior to 5.8.5 is vulnerable to SQL injection. Exploitation requires the malicious actor to be authenticated to the vulnerable system, but once authenticated they would be able to execute arbitrary sql queries. | CWE-89 |
163,913 | CVE-2021-33178 | 6.5 | 8.5 | MEDIUM | The Manage Backgrounds functionality within Nagvis versions prior to 2.0.9 is vulnerable to an authenticated path traversal vulnerability. Exploitation of this results in a malicious actor having the ability to arbitrarily delete files on the local system. | CWE-22 |
163,914 | CVE-2021-33179 | 6.1 | 4.3 | MEDIUM | The general user interface in Nagios XI versions prior to 5.8.4 is vulnerable to authenticated reflected cross-site scripting. An authenticated victim, who accesses a specially crafted malicious URL, would unknowingly execute the attached payload. | CWE-79 |
163,915 | CVE-2021-3318 | 6.1 | 4.3 | MEDIUM | attach/ajax.php in DzzOffice through 2.02.1 allows XSS via the editorid parameter. | CWE-79 |
163,916 | CVE-2021-33180 | 9.8 | 7.5 | CRITICAL | Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in cgi component in Synology Media Server before 1.8.1-2876 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | CWE-89 |
163,917 | CVE-2021-33181 | 9.1 | 6.5 | CRITICAL | Server-Side Request Forgery (SSRF) vulnerability in webapi component in Synology Video Station before 2.4.10-1632 allows remote authenticated users to send arbitrary request to intranet resources via unspecified vectors. | CWE-918 |
163,918 | CVE-2021-33182 | 4.3 | 4 | MEDIUM | Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in PDF Viewer component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to read limited files via unspecified vectors. | CWE-22 |
163,919 | CVE-2021-33183 | 7.9 | 3.6 | HIGH | Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability container volume management component in Synology Docker before 18.09.0-0515 allows local users to read or write arbitrary files via unspecified vectors. | CWE-22 |
163,920 | CVE-2021-33184 | 7.7 | 4 | HIGH | Server-Side request forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.15-3563 allows remote authenticated users to read arbitrary files via unspecified vectors. | CWE-918 |
163,921 | CVE-2021-33185 | 7.5 | 5 | HIGH | SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information. | CWE-120 |
163,922 | CVE-2021-33186 | 7.5 | 5 | HIGH | SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information. | CWE-787 |
163,923 | CVE-2021-3319 | 9.8 | 7.5 | CRITICAL | DOS: Incorrect 802154 Frame Validation for Omitted Source / Dest Addresses. Zephyr versions >= > v2.4.0 contain NULL Pointer Dereference (CWE-476), Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364 | CWE-476 |
163,924 | CVE-2021-33190 | 5.3 | 5 | MEDIUM | In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, the default account and password are fixed.Ultimately these factors lead to the issue of security risks. This issue is fixed in APISIX Dashboard 2.6.1 | CWE-307 |
163,925 | CVE-2021-33191 | 9.8 | 7.5 | CRITICAL | From Apache NiFi MiNiFi C++ version 0.5.0 the c2 protocol implements an "agent-update" command which was designed to patch the application binary. This "patching" command defaults to calling a trusted binary, but might be modified to an arbitrary value through a "c2-update" command. Said command is then executed using the same privileges as the application binary. This was addressed in version 0.10.0 | CWE-78 |
163,926 | CVE-2021-33192 | 6.1 | 4.3 | MEDIUM | A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive). | CWE-79 |
163,927 | CVE-2021-33193 | 7.5 | 5 | HIGH | A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48. | NVD-CWE-Other |
163,928 | CVE-2021-33194 | 7.5 | 5 | HIGH | golang.org/x/net before v0.0.0-20210520170846-37e1c6afe023 allows attackers to cause a denial of service (infinite loop) via crafted ParseFragment input. | CWE-835 |
163,929 | CVE-2021-33195 | 7.3 | 7.5 | HIGH | Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format. | CWE-74 |
163,930 | CVE-2021-33196 | 7.5 | 5 | HIGH | In archive/zip in Go before 1.15.13 and 1.16.x before 1.16.5, a crafted file count (in an archive's header) can cause a NewReader or OpenReader panic. | CWE-400 |
163,931 | CVE-2021-33197 | 5.3 | 4.3 | MEDIUM | In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers. | CWE-862 |
163,932 | CVE-2021-33198 | 7.5 | 5 | HIGH | In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method. | NVD-CWE-noinfo |
163,933 | CVE-2021-33199 | 9.8 | 7.5 | CRITICAL | In Expression Engine before 6.0.3, addonIcon in Addons/file/mod.file.php relies on the untrusted input value of input->get('file') instead of the fixed file names of icon.png and icon.svg. | CWE-20 |
163,934 | CVE-2021-3320 | 7.5 | 5 | HIGH | Type Confusion in 802154 ACK Frames Handling. Zephyr versions >= v2.4.0 contain NULL Pointer Dereference (CWE-476). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-27r3-rxch-2hm7 | CWE-476 |
163,935 | CVE-2021-3320 | 7.5 | 5 | HIGH | Type Confusion in 802154 ACK Frames Handling. Zephyr versions >= v2.4.0 contain NULL Pointer Dereference (CWE-476). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-27r3-rxch-2hm7 | CWE-843 |
163,936 | CVE-2021-33200 | 7.8 | 7.2 | HIGH | kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux->alu_limit. | CWE-787 |
163,937 | CVE-2021-33203 | 4.9 | 4 | MEDIUM | Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories. | CWE-22 |
163,938 | CVE-2021-33204 | 9.8 | 7.5 | CRITICAL | In the pg_partman (aka PG Partition Manager) extension before 4.5.1 for PostgreSQL, arbitrary code execution can be achieved via SECURITY DEFINER functions because an explicit search_path is not set. | CWE-77 |
163,939 | CVE-2021-33205 | 8.8 | 6.5 | HIGH | Western Digital EdgeRover before 0.25 has an escalation of privileges vulnerability where a low privileged user could load malicious content into directories with higher privileges, because of how Node.js is used. An attacker can gain admin privileges and carry out malicious activities such as creating a fake library and stealing user credentials. | CWE-269 |
163,940 | CVE-2021-33209 | 5.3 | 5 | MEDIUM | An issue was discovered in Fimer Aurora Vision before 2.97.10. The response to a failed login attempt discloses whether the username or password is wrong, helping an attacker to enumerate usernames. This can make a brute-force attack easier. | CWE-307 |
163,941 | CVE-2021-3321 | 8.8 | 5.8 | HIGH | Integer Underflow in Zephyr in IEEE 802154 Fragment Reassembly Header Removal. Zephyr versions >= >=2.4.0 contain Integer Overflow to Buffer Overflow (CWE-680). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w44j-66g7-xw99 | CWE-191 |
163,942 | CVE-2021-33210 | 4.3 | 4.3 | MEDIUM | An issue was discovered in Fimer Aurora Vision before 2.97.10. An attacker can (in the WebUI) obtain plant information without authentication by reading the response of APIs from a kiosk view of a plant. | CWE-287 |
163,943 | CVE-2021-33211 | 6.5 | 4 | MEDIUM | A Directory Traversal vulnerability in the Unzip feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to write files to arbitrary directories via relative paths in ZIP archives. | CWE-22 |
163,944 | CVE-2021-33212 | 5.4 | 3.5 | MEDIUM | A Cross-site scripting (XSS) vulnerability in the "View in Browser" feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to inject arbitrary web script or HTML via a crafted SVG image. | CWE-79 |
163,945 | CVE-2021-33213 | 6.5 | 4 | MEDIUM | An SSRF vulnerability in the "Upload from URL" feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to retrieve HTTP and FTP files from the internal server network by inserting an internal address. | CWE-918 |
163,946 | CVE-2021-33214 | 6.1 | 6 | MEDIUM | In HMS Ewon eCatcher through 6.6.4, weak filesystem permissions could allow malicious users to access files that could lead to sensitive information disclosure, modification of configuration files, or disruption of normal system operation. | CWE-276 |
163,947 | CVE-2021-33215 | 4.3 | 4 | MEDIUM | An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The API allows Directory Traversal. | CWE-22 |
163,948 | CVE-2021-33216 | 9.8 | 7.5 | CRITICAL | An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. An Undocumented Backdoor exists, allowing shell access via a developer account. | NVD-CWE-Other |
163,949 | CVE-2021-33217 | 8.8 | 9 | HIGH | An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. The Web Application allows Arbitrary Read/Write actions by authenticated users. The API allows an HTTP POST of arbitrary content into any file on the filesystem as root. | CWE-787 |
163,950 | CVE-2021-33218 | 9.8 | 10 | CRITICAL | An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded System Passwords that provide shell access. | CWE-798 |
163,951 | CVE-2021-33219 | 9.8 | 7.5 | CRITICAL | An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Hard-coded Web Application Administrator Passwords for the admin and nplus1user accounts. | CWE-798 |
163,952 | CVE-2021-3322 | 6.5 | 3.3 | MEDIUM | Unexpected Pointer Aliasing in IEEE 802154 Fragment Reassembly in Zephyr. Zephyr versions >= >=2.4.0 contain NULL Pointer Dereference (CWE-476). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p86r-gc4r-4mq3 | CWE-476 |
163,953 | CVE-2021-33220 | 7.8 | 4.6 | HIGH | An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. Hard-coded API Keys exist. | CWE-798 |
163,954 | CVE-2021-33221 | 9.8 | 7.5 | CRITICAL | An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and earlier. There are Unauthenticated API Endpoints. | CWE-306 |
163,955 | CVE-2021-3323 | 9.8 | 7.5 | CRITICAL | Integer Underflow in 6LoWPAN IPHC Header Uncompression in Zephyr. Zephyr versions >= >=2.4.0 contain Integer Underflow (Wrap or Wraparound) (CWE-191). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-89j6-qpxf-pfpc | CWE-191 |
163,956 | CVE-2021-3325 | 9.8 | 7.5 | CRITICAL | Monitorix 3.13.0 allows remote attackers to bypass Basic Authentication in a default installation (i.e., an installation without a hosts_deny option). This issue occurred because a new access-control feature was introduced without considering that some exiting installations became unsafe, upon an update to 3.13.0, unless the new feature was immediately configured. | CWE-287 |
163,957 | CVE-2021-33256 | 8.8 | 9.3 | HIGH | ** DISPUTED ** A CSV injection vulnerability on the login panel of ManageEngine ADSelfService Plus Version: 6.1 Build No: 6101 can be exploited by an unauthenticated user. The j_username parameter seems to be vulnerable and a reverse shell could be obtained if a privileged user exports "User Attempts Audit Report" as CSV file. Note: The vendor disputes this vulnerability, claiming "This is not a valid vulnerability in our ADSSP product. We don't see this as a security issue at our side." | CWE-1236 |
163,958 | CVE-2021-33259 | 5.3 | 5 | MEDIUM | Several web interfaces in D-Link DIR-868LW 1.12b have no authentication requirements for access, allowing for attackers to obtain users' DNS query history. | CWE-668 |
163,959 | CVE-2021-3326 | 7.5 | 5 | HIGH | The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. | CWE-617 |
163,960 | CVE-2021-33265 | 9.8 | 7.2 | CRITICAL | D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80046eb4 in /formSetPortTr. This vulnerability is triggered via a crafted POST request. | CWE-787 |
163,961 | CVE-2021-33266 | 9.8 | 10 | CRITICAL | D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_8004776c in /formVirtualApp. This vulnerability is triggered via a crafted POST request. | CWE-787 |
163,962 | CVE-2021-33267 | 9.8 | 10 | CRITICAL | D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80034d60 in /formStaticDHCP. This vulnerability is triggered via a crafted POST request. | CWE-787 |
163,963 | CVE-2021-33268 | 9.8 | 10 | CRITICAL | D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function sub_8003183C in /fromLogin. This vulnerability is triggered via a crafted POST request. | CWE-787 |
163,964 | CVE-2021-33269 | 9.8 | 10 | CRITICAL | D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_8004776c in /formVirtualServ. This vulnerability is triggered via a crafted POST request. | CWE-787 |
163,965 | CVE-2021-3327 | 5.4 | 3.5 | MEDIUM | Ovation Dynamic Content 1.10.1 for Elementor allows XSS via the post_title parameter. | CWE-79 |
163,966 | CVE-2021-33270 | 9.8 | 10 | CRITICAL | D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_800462c4 in /formAdvFirewall. This vulnerability is triggered via a crafted POST request. | CWE-787 |
163,967 | CVE-2021-33271 | 9.8 | 10 | CRITICAL | D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function sub_80046EB4 in /formSetPortTr. This vulnerability is triggered via a crafted POST request. | CWE-787 |
163,968 | CVE-2021-33274 | 9.8 | 10 | CRITICAL | D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to contain a stack buffer overflow vulnerability in the function FUN_80040af8 in /formWlanSetup. This vulnerability is triggered via a crafted POST request. | CWE-787 |
163,969 | CVE-2021-3328 | 7.5 | 5 | HIGH | An issue was discovered in Aprelium Abyss Web Server X1 2.12.1 and 2.14. A crafted HTTP request can lead to an out-of-bounds read that crashes the application. | CWE-125 |
163,970 | CVE-2021-33285 | 7.8 | 6.9 | HIGH | In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not, the parsing of the records proceeds into the wild. | CWE-125 |
163,971 | CVE-2021-33286 | 7.8 | 6.9 | HIGH | In NTFS-3G versions < 2021.8.22, when a specially crafted unicode string is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution. | CWE-787 |
163,972 | CVE-2021-33287 | 7.8 | 6.9 | HIGH | In NTFS-3G versions < 2021.8.22, when specially crafted NTFS attributes are read in the function ntfs_attr_pread_i, a heap buffer overflow can occur and allow for writing to arbitrary memory or denial of service of the application. | CWE-787 |
163,973 | CVE-2021-33289 | 7.8 | 6.9 | HIGH | In NTFS-3G versions < 2021.8.22, when a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution. | CWE-787 |
163,974 | CVE-2021-3330 | 8.8 | 5.8 | HIGH | RCE/DOS: Linked-list corruption leading to large out-of-bounds write while sorting for forged fragment list in Zephyr. Zephyr versions >= >=2.4.0 contain Out-of-bounds Write (CWE-787). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fj4r-373f-9456 | CWE-787 |
163,975 | CVE-2021-3331 | 9.8 | 10 | CRITICAL | WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.) | NVD-CWE-Other |
163,976 | CVE-2021-3332 | 5.3 | 5 | MEDIUM | WPS Hide Login 1.6.1 allows remote attackers to bypass a protection mechanism via post_password. | CWE-863 |
163,977 | CVE-2021-33320 | 4.3 | 4 | MEDIUM | The Flags module in Liferay Portal 7.3.1 and earlier, and Liferay DXP 7.0 before fix pack 96, 7.1 before fix pack 20, and 7.2 before fix pack 5, does not limit the rate at which content can be flagged as inappropriate, which allows remote authenticated users to spam the site administrator with emails | CWE-770 |
163,978 | CVE-2021-33321 | 7.5 | 5 | HIGH | Insecure default configuration in Liferay Portal 6.2.3 through 7.3.2, and Liferay DXP before 7.3, allows remote attackers to enumerate user email address via the forgot password functionality. The portal.property login.secure.forgot.password should be defaulted to true. | CWE-640 |
163,979 | CVE-2021-33322 | 7.5 | 5 | HIGH | In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.0 before fix pack 96, 7.1 before fix pack 18, and 7.2 before fix pack 5, password reset tokens are not invalidated after a user changes their password, which allows remote attackers to change the user’s password via the old password reset token. | CWE-613 |
163,980 | CVE-2021-33323 | 7.5 | 5 | HIGH | The Dynamic Data Mapping module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 7, autosaves form values for unauthenticated users, which allows remote attackers to view the autosaved values by viewing the form as an unauthenticated user. | CWE-312 |
163,981 | CVE-2021-33324 | 4.3 | 4 | MEDIUM | The Layout module in Liferay Portal 7.1.0 through 7.3.1, and Liferay DXP 7.1 before fix pack 20, and 7.2 before fix pack 5, does not properly check permission of pages, which allows remote authenticated users without view permission of a page to view the page via a site's page administration. | CWE-276 |
163,982 | CVE-2021-33325 | 4.9 | 4 | MEDIUM | The Portal Workflow module in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 93, 7.1 before fix pack 19, and 7.2 before fix pack 7, user's clear text passwords are stored in the database if workflow is enabled for user creation, which allows attackers with access to the database to obtain a user's password. | CWE-312 |
163,983 | CVE-2021-33326 | 6.1 | 4.3 | MEDIUM | Cross-site scripting (XSS) vulnerability in the Frontend JS module in Liferay Portal 7.3.4 and earlier, and Liferay DXP 7.0 before fix pack 96, 7.1 before fix pack 20 and 7.2 before fix pack 9, allows remote attackers to inject arbitrary web script or HTML via the title of a modal window. | CWE-79 |
163,984 | CVE-2021-33327 | 4.3 | 4 | MEDIUM | The Portlet Configuration module in Liferay Portal 7.2.0 through 7.3.3, and Liferay DXP 7.0 fix pack pack 93 and 94, 7.1 fix pack 18, and 7.2 before fix pack 8, does not properly check user permission, which allows remote authenticated users to view the Guest and User role even if "Role Visibility" is enabled. | CWE-276 |
163,985 | CVE-2021-33328 | 5.4 | 3.5 | MEDIUM | Cross-site scripting (XSS) vulnerability in the Asset module's edit vocabulary page in Liferay Portal 7.0.0 through 7.3.4, and Liferay DXP 7.0 before fix pack 96, 7.1 before fix pack 20, and 7.2 before fix pack 9, allows remote attackers to inject arbitrary web script or HTML via the (1) _com_liferay_journal_web_portlet_JournalPortlet_name or (2) _com_liferay_document_library_web_portlet_DLAdminPortlet_name parameter. | CWE-79 |
163,986 | CVE-2021-3333 | 6.1 | 4.3 | MEDIUM | Opmantek Open-AudIT 4.0.1 is affected by cross-site scripting (XSS). When outputting SQL statements for debugging, a maliciously crafted query can trigger an XSS attack. This attack only succeeds if the user is already logged in to Open-AudIT before they click the malicious link. | CWE-79 |
163,987 | CVE-2021-33330 | 4.3 | 4.3 | MEDIUM | Liferay Portal 7.2.0 through 7.3.2, and Liferay DXP 7.2 before fix pack 9, allows access to Cross-origin resource sharing (CORS) protected resources if the user is only authenticated using the portal session authentication, which allows remote attackers to obtain sensitive information including the targeted user’s email address and current CSRF token. | CWE-668 |
163,988 | CVE-2021-33331 | 6.1 | 5.8 | MEDIUM | Open redirect vulnerability in the Notifications module in Liferay Portal 7.0.0 through 7.3.1, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19 and 7.2 before fix pack 8, allows remote attackers to redirect users to arbitrary external URLs via the 'redirect' parameter. | CWE-601 |
163,989 | CVE-2021-33332 | 6.1 | 4.3 | MEDIUM | Cross-site scripting (XSS) vulnerability in the Portlet Configuration module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 7, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portlet_configuration_css_web_portlet_PortletConfigurationCSSPortlet_portletResource parameter. | CWE-79 |
163,990 | CVE-2021-33333 | 6.3 | 6.5 | MEDIUM | The Portal Workflow module in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 93, 7.1 before fix pack 19 and 7.2 before fix pack 6, does not properly check user permission, which allows remote authenticated users to view and delete workflow submissions via crafted URLs. | CWE-276 |
163,991 | CVE-2021-33334 | 4.3 | 4 | MEDIUM | The Dynamic Data Mapping module in Liferay Portal 7.0.0 through 7.3.2, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 6, does not properly check user permissions, which allows remote attackers with the forms "Access in Site Administration" permission to view all forms and form entries in a site via the forms section in site administration. | CWE-276 |
163,992 | CVE-2021-33335 | 7.2 | 6.5 | HIGH | Privilege escalation vulnerability in Liferay Portal 7.0.3 through 7.3.4, and Liferay DXP 7.1 before fix pack 20, and 7.2 before fix pack 9 allows remote authenticated users with permission to update/edit users to take over a company administrator user account by editing the company administrator user. | CWE-269 |
163,993 | CVE-2021-33336 | 5.4 | 3.5 | MEDIUM | Cross-site scripting (XSS) vulnerability in the Journal module's add article menu in Liferay Portal 7.3.0 through 7.3.3, and Liferay DXP 7.1 fix pack 18, and 7.2 fix pack 5 through 7, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_journal_web_portlet_JournalPortlet_name parameter. | CWE-79 |
163,994 | CVE-2021-33337 | 6.1 | 4.3 | MEDIUM | Cross-site scripting (XSS) vulnerability in the Document Library module's add document menu in Liferay Portal 7.3.0 through 7.3.4, and Liferay DXP 7.1 before fix pack 20, and 7.2 before fix pack 9, allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_document_library_web_portlet_DLAdminPortlet_name parameter. | CWE-79 |
163,995 | CVE-2021-33338 | 7.5 | 5.1 | HIGH | The Layout module in Liferay Portal 7.1.0 through 7.3.2, and Liferay DXP 7.1 before fix pack 19, and 7.2 before fix pack 6, exposes the CSRF token in URLs, which allows man-in-the-middle attackers to obtain the token and conduct Cross-Site Request Forgery (CSRF) attacks via the p_auth parameter. | CWE-352 |
163,996 | CVE-2021-33339 | 4.8 | 3.5 | MEDIUM | Cross-site scripting (XSS) vulnerability in the Fragment module in Liferay Portal 7.2.1 through 7.3.4, and Liferay DXP 7.2 before fix pack 9 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_site_admin_web_portlet_SiteAdminPortlet_name parameter. | CWE-79 |
163,997 | CVE-2021-33346 | 9.8 | 5 | CRITICAL | There is an arbitrary password modification vulnerability in a D-LINK DSL-2888A router product. An attacker can use this vulnerability to modify the password of the admin user without authorization. | CWE-863 |
163,998 | CVE-2021-33347 | 5.4 | 3.5 | MEDIUM | An issue was discovered in JPress v3.3.0 and below. There are XSS vulnerabilities in the template module and tag management module. If you log in to the background by means of weak password, the storage XSS vulnerability can occur. | CWE-79 |
163,999 | CVE-2021-33348 | 6.1 | 4.3 | MEDIUM | An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases. | CWE-79 |
164,000 | CVE-2021-33356 | 8.8 | 9 | HIGH | Multiple privilege escalation vulnerabilities in RaspAP 1.5 to 2.6.5 could allow an authenticated remote attacker to inject arbitrary commands to /installers/common.sh component that can result in remote command execution with root privileges. | CWE-269 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.