ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
164,001 | CVE-2021-33357 | 9.8 | 7.5 | CRITICAL | A vulnerability exists in RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands. | CWE-78 |
164,002 | CVE-2021-33358 | 8.8 | 9 | HIGH | Multiple vulnerabilities exist in RaspAP 2.3 to 2.6.5 in the "interface", "ssid" and "wpa_passphrase" POST parameters in /hostapd, when the parameter values contain special characters such as ";" or "$()" which enables an authenticated attacker to execute arbitrary OS commands. | CWE-78 |
164,003 | CVE-2021-33359 | 7.5 | 5 | HIGH | A vulnerability exists in gowitness < 2.3.6 that allows an unauthenticated attacker to perform an arbitrary file read using the file:// scheme in the url parameter to get an image of any file. | CWE-552 |
164,004 | CVE-2021-3336 | 8.1 | 6.8 | HIGH | DoTls13CertificateVerify in tls13.c in wolfSSL before 4.7.0 does not cease processing for certain anomalous peer behavior (sending an ED22519, ED448, ECC, or RSA signature without the corresponding certificate). The client side is affected because man-in-the-middle attackers can impersonate TLS 1.3 servers. | CWE-295 |
164,005 | CVE-2021-33361 | 5.5 | 4.3 | MEDIUM | Memory leak in the afra_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | CWE-119 |
164,006 | CVE-2021-33362 | 7.8 | 6.8 | HIGH | Stack buffer overflow in the hevc_parse_vps_extension function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file. | CWE-787 |
164,007 | CVE-2021-33363 | 5.5 | 4.3 | MEDIUM | Memory leak in the infe_box_read function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | CWE-119 |
164,008 | CVE-2021-33364 | 5.5 | 4.3 | MEDIUM | Memory leak in the def_parent_box_new function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | CWE-401 |
164,009 | CVE-2021-33365 | 5.5 | 4.3 | MEDIUM | Memory leak in the gf_isom_get_root_od function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | CWE-119 |
164,010 | CVE-2021-33366 | 5.5 | 4.3 | MEDIUM | Memory leak in the gf_isom_oinf_read_entry function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | CWE-401 |
164,011 | CVE-2021-3337 | 7.5 | 5 | HIGH | The Hide-Thread-Content plugin through 2021-01-27 for MyBB allows remote attackers to bypass intended content-reading restrictions by clicking on reply or quote in the postbit. | CWE-863 |
164,012 | CVE-2021-3339 | 4.3 | 4 | MEDIUM | ModernFlow before 1.3.00.208 does not constrain web-page access to members of a security group, as demonstrated by the Search Screen and the Profile Screen. | CWE-287 |
164,013 | CVE-2021-33393 | 8.8 | 9 | HIGH | lfs/backup in IPFire 2.25-core155 does not ensure that /var/ipfire/backup/bin/backup.pl is owned by the root account. It might be owned by an unprivileged account, which could potentially be used to install a Trojan horse backup.pl script that is later executed by root. Similar problems with the ownership/permissions of other files may be present as well. | NVD-CWE-noinfo |
164,014 | CVE-2021-33394 | 5.4 | 5.5 | MEDIUM | Cubecart 6.4.2 allows Session Fixation. The application does not generate a new session cookie after the user is logged in. A malicious user is able to create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the attacker access to the user's account through the active session. | CWE-384 |
164,015 | CVE-2021-3340 | 6.1 | 4.3 | MEDIUM | A cross-site scripting (XSS) vulnerability in many forms of Wikindx before 5.7.0 and 6.x through 6.4.0 allows remote attackers to inject arbitrary web script or HTML via the message parameter to index.php?action=initLogon or modules/admin/DELETEIMAGES.php. | CWE-79 |
164,016 | CVE-2021-33403 | 7.5 | 5 | HIGH | An integer overflow in the transfer function of a smart contract implementation for Lancer Token, an Ethereum ERC20 token, allows the owner to cause unexpected financial losses between two large accounts during a transaction. | CWE-190 |
164,017 | CVE-2021-33408 | 6.5 | 4 | MEDIUM | Local File Inclusion vulnerability in Ab Initio Control>Center before 4.0.2.6 allows remote attackers to retrieve arbitrary files. Fixed in v4.0.2.6 and v4.0.3.1. | CWE-319 |
164,018 | CVE-2021-3341 | 7.5 | 5 | HIGH | A path traversal vulnerability in the DxWebEngine component of DH2i DxEnterprise and DxOdyssey for Windows, version 19.5 through 20.x before 20.0.219.0, allows an attacker to read any file on the host file system via an HTTP request. | CWE-22 |
164,019 | CVE-2021-3342 | 9.8 | 6.8 | CRITICAL | EPrints 3.4.2 allows remote attackers to read arbitrary files and possibly execute commands via crafted LaTeX input to a cgi/latex2png?latex= URI. | CWE-78 |
164,020 | CVE-2021-33425 | 5.4 | 3.5 | MEDIUM | A stored cross-site scripting (XSS) vulnerability was discovered in the Web Interface for OpenWRT LuCI version 19.07 which allows attackers to inject arbitrary Javascript in the OpenWRT Hostname via the Hostname Change operation. | CWE-79 |
164,021 | CVE-2021-33430 | 7.5 | 5 | HIGH | A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. | CWE-120 |
164,022 | CVE-2021-3344 | 8.8 | 6.5 | HIGH | A privilege escalation flaw was found in OpenShift builder. During build time, credentials outside the build context are automatically mounted into the container image under construction. An OpenShift user, able to execute code during build time inside this container can re-use the credentials to overwrite arbitrary container images in internal registries and/or escalate their privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This affects github.com/openshift/builder v0.0.0-20210125201112-7901cb396121 and before. | CWE-522 |
164,023 | CVE-2021-3345 | 7.8 | 7.2 | HIGH | _gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later. | CWE-787 |
164,024 | CVE-2021-3346 | 9.8 | 7.5 | CRITICAL | Foris before 101.1.1, as used in Turris OS, lacks certain HTML escaping in the login template. | NVD-CWE-noinfo |
164,025 | CVE-2021-33469 | 4.8 | 3.5 | MEDIUM | COVID19 Testing Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via the "Admin name" parameter. | CWE-79 |
164,026 | CVE-2021-3347 | 7.8 | 7.2 | HIGH | An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458. | CWE-416 |
164,027 | CVE-2021-33470 | 9.8 | 7.5 | CRITICAL | COVID19 Testing Management System 1.0 is vulnerable to SQL Injection via the admin panel. | CWE-89 |
164,028 | CVE-2021-33477 | 8.8 | 6.5 | HIGH | rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of certain escape sequences (ESC G Q). A response is terminated by a newline. | CWE-755 |
164,029 | CVE-2021-33478 | 6.8 | 4.6 | MEDIUM | The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins. | CWE-119 |
164,030 | CVE-2021-33479 | 7.8 | 6.8 | HIGH | A stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in measure_pitch() in pgm2asc.c. | CWE-787 |
164,031 | CVE-2021-3348 | 7 | 4.4 | HIGH | nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71. | CWE-362 |
164,032 | CVE-2021-3348 | 7 | 4.4 | HIGH | nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71. | CWE-416 |
164,033 | CVE-2021-33480 | 5.5 | 4.3 | MEDIUM | An use-after-free vulnerability was discovered in gocr through 0.53-20200802 in context_correction() in pgm2asc.c. | CWE-416 |
164,034 | CVE-2021-33481 | 7.8 | 6.8 | HIGH | A stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in try_to_divide_boxes() in pgm2asc.c. | CWE-787 |
164,035 | CVE-2021-33483 | 5.4 | 3.5 | MEDIUM | An issue was discovered in CommentsService.ashx in OnyakTech Comments Pro 3.8. The comment posting functionality allows an attacker to add an XSS payload to the JSON request that will execute when users visit the page with the comment. | CWE-79 |
164,036 | CVE-2021-33484 | 7.5 | 5 | HIGH | An issue was discovered in CommentsService.ashx in OnyakTech Comments Pro 3.8. An attacker can download a copy of the installer, decompile it, and discover a hardcoded IV used to encrypt the username and userid in the comment POST request. Additionally, the attacker can decrypt the encrypted encryption key (sent as a parameter in the comment form request) by setting this encrypted value as the username, which will appear on the comment page in its decrypted form. Using these two values (combined with the encryption functionality discovered in the decompiled installer), the attacker can encrypt another user's ID and username. These values can be used as part of the comment posting request in order to spoof the user. | CWE-798 |
164,037 | CVE-2021-33485 | 9.8 | 7.5 | CRITICAL | CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow. | CWE-787 |
164,038 | CVE-2021-33486 | 7.5 | 5 | HIGH | All versions of the CODESYS V3 Runtime Toolkit for VxWorks from version V3.5.8.0 and before version V3.5.17.10 have Improper Handling of Exceptional Conditions. | CWE-755 |
164,039 | CVE-2021-33488 | 6.1 | 5.8 | MEDIUM | chat in OX App Suite 7.10.5 has Improper Input Validation. A user can be redirected to a rogue OX Chat server via a development-related hook. | CWE-20 |
164,040 | CVE-2021-33489 | 6.1 | 4.3 | MEDIUM | OX App Suite through 7.10.5 allows XSS via JavaScript code in a shared XCF file. | CWE-79 |
164,041 | CVE-2021-3349 | 3.3 | 2.1 | LOW | ** DISPUTED ** GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior. | CWE-345 |
164,042 | CVE-2021-33490 | 6.1 | 4.3 | MEDIUM | OX App Suite through 7.10.5 allows XSS via a crafted snippet in a shared mail signature. | CWE-79 |
164,043 | CVE-2021-33491 | 6.5 | 4 | MEDIUM | OX App Suite through 7.10.5 allows Directory Traversal via ../ in an OOXML or ODF ZIP archive, because of the mishandling of relative paths in mail addresses in conjunction with auto-configuration DNS records. | CWE-22 |
164,044 | CVE-2021-33492 | 6.1 | 4.3 | MEDIUM | OX App Suite 7.10.5 allows XSS via an OX Chat room name. | CWE-79 |
164,045 | CVE-2021-33493 | 6 | 3.6 | MEDIUM | The middleware component in OX App Suite through 7.10.5 allows Code Injection via Java classes in a YAML format. | CWE-94 |
164,046 | CVE-2021-33494 | 6.1 | 4.3 | MEDIUM | OX App Suite 7.10.5 allows XSS via an OX Chat room title during typing rendering. | CWE-79 |
164,047 | CVE-2021-33495 | 6.1 | 4.3 | MEDIUM | OX App Suite 7.10.5 allows XSS via an OX Chat system message. | CWE-79 |
164,048 | CVE-2021-33496 | 6.1 | 4.3 | MEDIUM | Dutchcoders transfer.sh before 1.2.4 allows XSS via an inline view. | CWE-79 |
164,049 | CVE-2021-33497 | 9.1 | 6.4 | CRITICAL | Dutchcoders transfer.sh before 1.2.4 allows Directory Traversal for deleting files. | CWE-22 |
164,050 | CVE-2021-3350 | 6.1 | 4.3 | MEDIUM | deleteaccount.php in the Delete Account plugin 1.4 for MyBB allows XSS via the deletereason parameter. | CWE-79 |
164,051 | CVE-2021-33500 | 7.5 | 5 | HIGH | PuTTY before 0.75 on Windows allows remote servers to cause a denial of service (Windows GUI hang) by telling the PuTTY window to change its title repeatedly at high speed, which results in many SetWindowTextA or SetWindowTextW calls. NOTE: the same attack methodology may affect some OS-level GUIs on Linux or other platforms for similar reasons. | NVD-CWE-noinfo |
164,052 | CVE-2021-33501 | 9.6 | 9.3 | CRITICAL | Overwolf Client 0.169.0.22 allows XSS, with resultant Remote Code Execution, via an overwolfstore:// URL. | CWE-79 |
164,053 | CVE-2021-33502 | 7.5 | 5 | HIGH | The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs. | NVD-CWE-Other |
164,054 | CVE-2021-33503 | 7.5 | 5 | HIGH | An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the authority component, the authority regular expression exhibits catastrophic backtracking, causing a denial of service if a URL were passed as a parameter or redirected to via an HTTP redirect. | CWE-400 |
164,055 | CVE-2021-33505 | 7.8 | 4.6 | HIGH | A local malicious user can circumvent the Falco detection engine through 0.28.1 by running a program that alters arguments of system calls being executed. Issue is fixed in Falco versions >= 0.29.1. | CWE-269 |
164,056 | CVE-2021-33506 | 7.5 | 5 | HIGH | jitsi-meet-prosody in Jitsi Meet before 2.0.5963-1 does not ensure that restrict_room_creation is set by default. This can allow an attacker to circumvent conference moderation. | CWE-276 |
164,057 | CVE-2021-33507 | 6.1 | 4.3 | MEDIUM | Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as used in Plone through 5.2.4 and other products, allow Reflected XSS. | CWE-79 |
164,058 | CVE-2021-33508 | 5.4 | 3.5 | MEDIUM | Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item. | CWE-79 |
164,059 | CVE-2021-33509 | 9.9 | 8.5 | CRITICAL | Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script. | CWE-732 |
164,060 | CVE-2021-3351 | 5.4 | 3.5 | MEDIUM | OpenPLC runtime V3 through 2016-03-14 allows stored XSS via the Device Name to the web server's Add New Device page. | CWE-79 |
164,061 | CVE-2021-33510 | 4.3 | 4 | MEDIUM | Plone through 5.2.4 allows remote authenticated managers to conduct SSRF attacks via an event ical URL, to read one line of a file. | CWE-918 |
164,062 | CVE-2021-33511 | 7.5 | 5 | HIGH | Plone though 5.2.4 allows SSRF via the lxml parser. This affects Diazo themes, Dexterity TTW schemas, and modeleditors in plone.app.theming, plone.app.dexterity, and plone.supermodel. | CWE-918 |
164,063 | CVE-2021-33512 | 5.4 | 3.5 | MEDIUM | Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document. | CWE-79 |
164,064 | CVE-2021-33513 | 5.4 | 3.5 | MEDIUM | Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool. | CWE-79 |
164,065 | CVE-2021-33514 | 9.8 | 10 | CRITICAL | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3. | CWE-78 |
164,066 | CVE-2021-33515 | 4.8 | 5.8 | MEDIUM | The submission service in Dovecot before 2.3.15 allows STARTTLS command injection in lib-smtp. Sensitive information can be redirected to an attacker-controlled address. | CWE-77 |
164,067 | CVE-2021-33516 | 8.1 | 5.8 | HIGH | An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc. | NVD-CWE-Other |
164,068 | CVE-2021-3352 | 9.1 | 6.4 | CRITICAL | The Software Development Kit in Mitel MiContact Center Business from 8.0.0.0 through 8.1.4.1 and 9.0.0.0 through 9.3.1.0 could allow an unauthenticated attacker to access (view and modify) user data without authorization due to improper handling of tokens. | NVD-CWE-Other |
164,069 | CVE-2021-33525 | 8.8 | 9 | HIGH | EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell. | CWE-78 |
164,070 | CVE-2021-33526 | 7.8 | 7.2 | HIGH | In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM instructing it to execute a malicous OpenVPN configuration resulting in arbitrary code execution with the privileges of the service. | CWE-269 |
164,071 | CVE-2021-33527 | 7.8 | 7.2 | HIGH | In MB connect line mbDIALUP versions <= 3.9R0.0 a low privileged local attacker can send a command to the service running with NT AUTHORITY\SYSTEM that won't be validated correctly and allows for an arbitrary code execution with the privileges of the service. | CWE-20 |
164,072 | CVE-2021-33528 | 8.8 | 9 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. | CWE-710 |
164,073 | CVE-2021-33529 | 7.5 | 5 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device. | CWE-798 |
164,074 | CVE-2021-33530 | 8.8 | 9 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability. | CWE-78 |
164,075 | CVE-2021-33531 | 8.8 | 9 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability. | CWE-798 |
164,076 | CVE-2021-33532 | 8.8 | 9 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. | CWE-78 |
164,077 | CVE-2021-33533 | 8.8 | 9 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. | CWE-78 |
164,078 | CVE-2021-33534 | 7.2 | 9 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability. | CWE-78 |
164,079 | CVE-2021-33535 | 8.8 | 6.5 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. | CWE-134 |
164,080 | CVE-2021-33536 | 7.5 | 5 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable denial-of-service vulnerability exists in ServiceAgent functionality. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability. | CWE-191 |
164,081 | CVE-2021-33537 | 8.8 | 6.5 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. | CWE-120 |
164,082 | CVE-2021-33538 | 8.8 | 9 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability. | CWE-269 |
164,083 | CVE-2021-33539 | 7.2 | 6.5 | HIGH | In Weidmueller Industrial WLAN devices in multiple versions an exploitable authentication bypass vulnerability exists in the hostname processing. A specially configured device hostname can cause the device to interpret selected remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability. | CWE-287 |
164,084 | CVE-2021-33540 | 7.3 | 7.5 | HIGH | In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented password protected FTP access to the root directory exists. | CWE-798 |
164,085 | CVE-2021-33541 | 7.5 | 7.8 | HIGH | Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by a Denial-of-Service vulnerability. The communication protocols and device access do not feature authentication measures. Remote attackers can use specially crafted IP packets to cause a denial of service on the PLC's network communication module. A successful attack stops all network communication. To restore the network connectivity the device needs to be restarted. The automation task is not affected. | CWE-770 |
164,086 | CVE-2021-33542 | 7 | 5.1 | HIGH | Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed because of incompletely initialized data. The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities. Automated systems in operation which were programmed with one of the above-mentioned products are not affected. | CWE-824 |
164,087 | CVE-2021-33543 | 7.5 | 5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors allow unauthenticated remote access to sensitive files due to default user authentication settings. | CWE-306 |
164,088 | CVE-2021-33544 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. | CWE-77 |
164,089 | CVE-2021-33545 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the counter parameter which may allow an attacker to remotely execute arbitrary code. | CWE-787 |
164,090 | CVE-2021-33545 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the counter parameter which may allow an attacker to remotely execute arbitrary code. | CWE-121 |
164,091 | CVE-2021-33546 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the name parameter, which may allow an attacker to remotely execute arbitrary code. | CWE-121 |
164,092 | CVE-2021-33547 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the profile parameter which may allow an attacker to remotely execute arbitrary code. | CWE-121 |
164,093 | CVE-2021-33548 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. | CWE-77 |
164,094 | CVE-2021-33549 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to a stack-based buffer overflow condition in the action parameter, which may allow an attacker to remotely execute arbitrary code. | CWE-121 |
164,095 | CVE-2021-3355 | 5.4 | 3.5 | MEDIUM | A stored-self XSS exists in LightCMS v1.3.4, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/SensitiveWords. | CWE-79 |
164,096 | CVE-2021-33550 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. | CWE-77 |
164,097 | CVE-2021-33551 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. | CWE-77 |
164,098 | CVE-2021-33552 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. | CWE-77 |
164,099 | CVE-2021-33553 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. | CWE-77 |
164,100 | CVE-2021-33554 | 7.2 | 6.5 | HIGH | Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code. | CWE-77 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.