ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
164,201 | CVE-2021-33711 | 5.3 | 5 | MEDIUM | A vulnerability has been identified in Teamcenter Active Workspace V4 (All versions < V4.3.9), Teamcenter Active Workspace V5.0 (All versions < V5.0.7), Teamcenter Active Workspace V5.1 (All versions < V5.1.4). The affected application allows verbose error messages which allow leaking of sensitive information, such as full paths. | CWE-209 |
164,202 | CVE-2021-33712 | 8.8 | 6.5 | HIGH | A vulnerability has been identified in Mendix SAML Module (All versions < V2.1.2). The configuration of the SAML module does not properly check various restrictions and validations imposed by an identity provider. This could allow a remote authenticated attacker to escalate privileges. | CWE-345 |
164,203 | CVE-2021-33713 | 5.5 | 2.1 | MEDIUM | A vulnerability has been identified in JT Utilities (All versions < V13.0.2.0). When parsing specially crafted JT files, a hash function is called with an incorrect argument leading the application to crash. An attacker could leverage this vulnerability to cause a Denial-of-Service condition in the application. | CWE-688 |
164,204 | CVE-2021-33714 | 5.5 | 2.1 | MEDIUM | A vulnerability has been identified in JT Utilities (All versions < V13.0.2.0). When parsing specially crafted JT files, a missing check for the validity of an iterator leads to NULL pointer deference condition, causing the application to crash. An attacker could leverage this vulnerability to cause a Denial-of-Service condition in the application. | CWE-476 |
164,205 | CVE-2021-33715 | 5.5 | 2.1 | MEDIUM | A vulnerability has been identified in JT Utilities (All versions < V13.0.2.0). When parsing specially crafted JT files, a race condition could cause an object to be released before being operated on, leading to NULL pointer deference condition and causing the application to crash. An attacker could leverage this vulnerability to cause a Denial-of-Service condition in the application. | CWE-476 |
164,206 | CVE-2021-33716 | 6.5 | 3.3 | MEDIUM | A vulnerability has been identified in SIMATIC CP 1543-1 (incl. SIPLUS variants) (All versions < V3.0), SIMATIC CP 1545-1 (All versions). An attacker with access to the subnet of the affected device could retrieve sensitive information stored in cleartext. | CWE-312 |
164,207 | CVE-2021-33717 | 5.5 | 4.3 | MEDIUM | A vulnerability has been identified in JT2Go (All versions < V13.2.0.1), Teamcenter Visualization (All versions < V13.2.0.1). When parsing specially crafted CGM Files, a NULL pointer deference condition could cause the application to crash. The application must be restarted to restore the service. An attacker could leverage this vulnerability to cause a Denial-of-Service condition in the application. | CWE-476 |
164,208 | CVE-2021-33718 | 5.3 | 3.5 | MEDIUM | A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.22), Mendix Applications using Mendix 8 (All versions < V8.18.7), Mendix Applications using Mendix 9 (All versions < V9.3.0). Write access checks of attributes of an object could be bypassed, if user has a write permissions to the first attribute of this object. | CWE-863 |
164,209 | CVE-2021-33719 | 9.8 | 7.5 | CRITICAL | A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition or potential remote code execution. | CWE-120 |
164,210 | CVE-2021-33720 | 7.5 | 5 | HIGH | A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition. | CWE-120 |
164,211 | CVE-2021-33720 | 7.5 | 5 | HIGH | A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition. | CWE-120 |
164,212 | CVE-2021-33721 | 7.2 | 9 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2). The affected application incorrectly neutralizes special elements when creating batch operations which could lead to command injection. An authenticated remote attacker with administrative privileges could exploit this vulnerability to execute arbitrary code on the system with system privileges. | CWE-78 |
164,213 | CVE-2021-33722 | 4.9 | 4 | MEDIUM | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system has a Path Traversal vulnerability when exporting a firmware container. With this a privileged authenticated attacker could create arbitrary files on an affected system. | CWE-22 |
164,214 | CVE-2021-33723 | 6.5 | 4 | MEDIUM | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). An authenticated attacker could change the user profile of any user without proper authorization. With this, the attacker could change the password of any user in the affected system. | CWE-285 |
164,215 | CVE-2021-33724 | 9.1 | 5 | CRITICAL | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system contains an Arbitrary File Deletion vulnerability that possibly allows to delete an arbitrary file or directory under a user controlled path. | CWE-22 |
164,216 | CVE-2021-33725 | 9.1 | 5 | CRITICAL | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system allows to delete arbitrary files or directories under a user controlled path and does not correctly check if the relative path is still within the intended target directory. | CWE-22 |
164,217 | CVE-2021-33726 | 7.5 | 5 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system allows to download arbitrary files under a user controlled path and does not correctly check if the relative path is still within the intended target directory. | CWE-22 |
164,218 | CVE-2021-33727 | 6.5 | 4 | MEDIUM | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). An authenticated attacker could download the user profile of any user. With this, the attacker could leak confidential information of any user in the affected system. | CWE-200 |
164,219 | CVE-2021-33728 | 7.2 | 9 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). The affected system allows to upload JSON objects that are deserialized to JAVA objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary code on the device with root privileges. | CWE-502 |
164,220 | CVE-2021-33729 | 8.8 | 6.5 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). An authenticated attacker that is able to import firmware containers to an affected system could execute arbitrary commands in the local database. | CWE-89 |
164,221 | CVE-2021-33730 | 7.2 | 6.5 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application. | CWE-89 |
164,222 | CVE-2021-33731 | 7.2 | 6.5 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application. | CWE-89 |
164,223 | CVE-2021-33732 | 7.2 | 6.5 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application. | CWE-89 |
164,224 | CVE-2021-33733 | 7.2 | 6.5 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application. | CWE-89 |
164,225 | CVE-2021-33734 | 7.2 | 6.5 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application. | CWE-89 |
164,226 | CVE-2021-33735 | 7.2 | 6.5 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application. | CWE-89 |
164,227 | CVE-2021-33736 | 7.2 | 6.5 | HIGH | A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). A privileged authenticated attacker could execute arbitrary commands in the local database by sending crafted requests to the webserver of the affected application. | CWE-89 |
164,228 | CVE-2021-33737 | 7.5 | 7.8 | HIGH | A vulnerability has been identified in SIMATIC CP 343-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC CP 343-1 ERPC (All versions), SIMATIC CP 343-1 Lean (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 (incl. SIPLUS variants) (All versions), SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) (All versions). Sending a specially crafted packet to port 102/tcp of an affected device could cause a denial of service condition. A restart is needed to restore normal operations. | CWE-119 |
164,229 | CVE-2021-33738 | 3.3 | 4.3 | LOW | A vulnerability has been identified in JT2Go (All versions < V13.2.0.2), Teamcenter Visualization (All versions < V13.2.0.2). The plmxmlAdapterSE70.dll library in affected applications lacks proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13405) | CWE-125 |
164,230 | CVE-2021-33739 | 7.8 | 4.6 | HIGH | Microsoft DWM Core Library Elevation of Privilege Vulnerability | CWE-269 |
164,231 | CVE-2021-3374 | 5.3 | 5 | MEDIUM | Directory traversal in RStudio Shiny Server before 1.5.16 allows attackers to read the application source code, involving an encoded slash. | CWE-22 |
164,232 | CVE-2021-33740 | 7.8 | 9.3 | HIGH | Windows Media Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,233 | CVE-2021-33741 | 7.5 | 5.1 | HIGH | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | CWE-269 |
164,234 | CVE-2021-33742 | 8.8 | 6.8 | HIGH | Windows MSHTML Platform Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,235 | CVE-2021-33743 | 7.8 | 4.6 | HIGH | Windows Projected File System Elevation of Privilege Vulnerability | CWE-269 |
164,236 | CVE-2021-33744 | 6.7 | 7.2 | MEDIUM | Windows Secure Kernel Mode Security Feature Bypass Vulnerability | CWE-269 |
164,237 | CVE-2021-33745 | 6.5 | 4 | MEDIUM | Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-34442, CVE-2021-34444, CVE-2021-34499. | NVD-CWE-noinfo |
164,238 | CVE-2021-33746 | 8.8 | 6.5 | HIGH | Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33754, CVE-2021-33780, CVE-2021-34494, CVE-2021-34525. | NVD-CWE-noinfo |
164,239 | CVE-2021-33749 | 8.8 | 6.8 | HIGH | Windows DNS Snap-in Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33750, CVE-2021-33752, CVE-2021-33756. | NVD-CWE-noinfo |
164,240 | CVE-2021-3375 | 9.8 | 7.5 | CRITICAL | ActivePresenter 6.1.6 is affected by a memory corruption vulnerability that may result in a denial of service (DoS) or arbitrary code execution. | CWE-787 |
164,241 | CVE-2021-33750 | 8.8 | 6.8 | HIGH | Windows DNS Snap-in Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33749, CVE-2021-33752, CVE-2021-33756. | NVD-CWE-noinfo |
164,242 | CVE-2021-33751 | 7.8 | 4.6 | HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34460, CVE-2021-34510, CVE-2021-34512, CVE-2021-34513. | CWE-269 |
164,243 | CVE-2021-33752 | 8.8 | 6.8 | HIGH | Windows DNS Snap-in Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33749, CVE-2021-33750, CVE-2021-33756. | NVD-CWE-noinfo |
164,244 | CVE-2021-33753 | 6.5 | 4.3 | MEDIUM | Microsoft Bing Search Spoofing Vulnerability | NVD-CWE-noinfo |
164,245 | CVE-2021-33754 | 8 | 6 | HIGH | Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33780, CVE-2021-34494, CVE-2021-34525. | NVD-CWE-noinfo |
164,246 | CVE-2021-33755 | 8.6 | 5 | HIGH | Windows Hyper-V Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33758. | NVD-CWE-noinfo |
164,247 | CVE-2021-33756 | 8.8 | 6.8 | HIGH | Windows DNS Snap-in Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33749, CVE-2021-33750, CVE-2021-33752. | NVD-CWE-noinfo |
164,248 | CVE-2021-33757 | 9.8 | 7.5 | CRITICAL | Windows Security Account Manager Remote Protocol Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
164,249 | CVE-2021-33758 | 7.7 | 4 | HIGH | Windows Hyper-V Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33755. | NVD-CWE-noinfo |
164,250 | CVE-2021-33759 | 7.8 | 4.6 | HIGH | Windows Desktop Bridge Elevation of Privilege Vulnerability | CWE-269 |
164,251 | CVE-2021-3376 | 8.8 | 6.5 | HIGH | An issue was discovered in Cuppa CMS Versions Before 31 Jan 2021 allows authenticated attackers to gain escalated privileges via a crafted POST request using the user_group_id_field parameter. | CWE-269 |
164,252 | CVE-2021-33760 | 5.5 | 2.1 | MEDIUM | Media Foundation Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,253 | CVE-2021-33761 | 7.8 | 4.6 | HIGH | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33773, CVE-2021-34445, CVE-2021-34456. | CWE-269 |
164,254 | CVE-2021-33762 | 7.8 | 4.6 | HIGH | Azure CycleCloud Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36943. | CWE-269 |
164,255 | CVE-2021-33763 | 5.5 | 2.1 | MEDIUM | Windows Remote Access Connection Manager Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-34454, CVE-2021-34457. | NVD-CWE-noinfo |
164,256 | CVE-2021-33764 | 5.9 | 4.3 | MEDIUM | Windows Key Distribution Center Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,257 | CVE-2021-33765 | 5.5 | 2.1 | MEDIUM | Windows Installer Spoofing Vulnerability | NVD-CWE-noinfo |
164,258 | CVE-2021-33766 | 7.5 | 5 | HIGH | Microsoft Exchange Information Disclosure Vulnerability | CWE-287 |
164,259 | CVE-2021-33767 | 6.7 | 4.6 | MEDIUM | Open Enclave SDK Elevation of Privilege Vulnerability | CWE-269 |
164,260 | CVE-2021-33768 | 8 | 5.2 | HIGH | Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34470, CVE-2021-34523. | CWE-269 |
164,261 | CVE-2021-3377 | 6.1 | 4.3 | MEDIUM | The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0. | CWE-79 |
164,262 | CVE-2021-33771 | 7.8 | 7.2 | HIGH | Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31979, CVE-2021-34514. | CWE-269 |
164,263 | CVE-2021-33772 | 7.5 | 5 | HIGH | Windows TCP/IP Driver Denial of Service Vulnerability This CVE ID is unique from CVE-2021-31183, CVE-2021-34490. | NVD-CWE-noinfo |
164,264 | CVE-2021-33773 | 7.8 | 4.6 | HIGH | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-34445, CVE-2021-34456. | CWE-269 |
164,265 | CVE-2021-33774 | 7.8 | 4.6 | HIGH | Windows Event Tracing Elevation of Privilege Vulnerability | CWE-269 |
164,266 | CVE-2021-33775 | 7.8 | 6.8 | HIGH | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31947, CVE-2021-33776, CVE-2021-33777, CVE-2021-33778. | NVD-CWE-noinfo |
164,267 | CVE-2021-33776 | 7.8 | 6.8 | HIGH | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31947, CVE-2021-33775, CVE-2021-33777, CVE-2021-33778. | NVD-CWE-noinfo |
164,268 | CVE-2021-33777 | 7.8 | 6.8 | HIGH | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31947, CVE-2021-33775, CVE-2021-33776, CVE-2021-33778. | NVD-CWE-noinfo |
164,269 | CVE-2021-33778 | 7.8 | 6.8 | HIGH | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31947, CVE-2021-33775, CVE-2021-33776, CVE-2021-33777. | NVD-CWE-noinfo |
164,270 | CVE-2021-33779 | 6.5 | 5.5 | MEDIUM | Windows ADFS Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
164,271 | CVE-2021-3378 | 9.8 | 7.5 | CRITICAL | FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp. | CWE-434 |
164,272 | CVE-2021-33780 | 8.8 | 6.5 | HIGH | Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33754, CVE-2021-34494, CVE-2021-34525. | NVD-CWE-noinfo |
164,273 | CVE-2021-33781 | 8.1 | 5.5 | HIGH | Azure AD Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
164,274 | CVE-2021-33782 | 5.5 | 4.3 | MEDIUM | Windows Authenticode Spoofing Vulnerability | NVD-CWE-noinfo |
164,275 | CVE-2021-33783 | 6.5 | 4 | MEDIUM | Windows SMB Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,276 | CVE-2021-33784 | 7.8 | 4.6 | HIGH | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | CWE-269 |
164,277 | CVE-2021-33785 | 7.5 | 5 | HIGH | Windows AF_UNIX Socket Provider Denial of Service Vulnerability | NVD-CWE-noinfo |
164,278 | CVE-2021-33786 | 8.8 | 6.5 | HIGH | Windows LSA Security Feature Bypass Vulnerability | CWE-863 |
164,279 | CVE-2021-33788 | 7.5 | 5 | HIGH | Windows LSA Denial of Service Vulnerability | NVD-CWE-noinfo |
164,280 | CVE-2021-33790 | 9.8 | 7.5 | CRITICAL | The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed. | CWE-502 |
164,281 | CVE-2021-33792 | 7.8 | 6.8 | HIGH | Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 have an out-of-bounds write via a crafted /Size key in the Trailer dictionary. | CWE-787 |
164,282 | CVE-2021-33793 | 9.8 | 7.5 | CRITICAL | Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 have an out-of-bounds write because the Cross-Reference table is mishandled during Office document conversion. | CWE-787 |
164,283 | CVE-2021-33794 | 9.1 | 6.4 | CRITICAL | Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 allow information disclosure or an application crash after mishandling the Tab key during XFA form interaction. | NVD-CWE-noinfo |
164,284 | CVE-2021-33795 | 5.5 | 4.3 | MEDIUM | Foxit Reader before 10.1.4 and PhantomPDF before 10.1.4 produce incorrect PDF document signatures because the certificate name, document owner, and signature author are mishandled. | CWE-755 |
164,285 | CVE-2021-3380 | 6.5 | 4 | MEDIUM | Insecure direct object reference (IDOR) vulnerability in ICREM H8 SSRMS allows attackers to disclose sensitive information via the Print Invoice Functionality. | CWE-668 |
164,286 | CVE-2021-33800 | 7.5 | 5 | HIGH | In Druid 1.2.3, visiting the path with parameter in a certain function can lead to directory traversal. | CWE-22 |
164,287 | CVE-2021-33806 | 9.8 | 7.5 | CRITICAL | The BDew BdLib library before 1.16.1.7 for Minecraft allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of its use of Java serialization. | CWE-502 |
164,288 | CVE-2021-33807 | 7.5 | 5 | HIGH | Cartadis Gespage through 8.2.1 allows Directory Traversal in gespage/doDownloadData and gespage/webapp/doDownloadData. | CWE-22 |
164,289 | CVE-2021-33813 | 7.5 | 5 | HIGH | An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request. | CWE-611 |
164,290 | CVE-2021-33815 | 8.8 | 6.8 | HIGH | dwa_uncompress in libavcodec/exr.c in FFmpeg 4.4 allows an out-of-bounds array access because dc_count is not strictly checked. | CWE-129 |
164,291 | CVE-2021-33816 | 9.8 | 7.5 | CRITICAL | The website builder module in Dolibarr 13.0.2 allows remote PHP code execution because of an incomplete protection mechanism in which system, exec, and shell_exec are blocked but backticks are not blocked. | CWE-94 |
164,292 | CVE-2021-33818 | 7.5 | 5 | HIGH | An issue was discovered in UniFi Protect G3 FLEX Camera Version UVC.v4.30.0.67. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service. | CWE-400 |
164,293 | CVE-2021-3382 | 7.5 | 5 | HIGH | Stack buffer overflow vulnerability in gitea 1.9.0 through 1.13.1 allows remote attackers to cause a denial of service (crash) via vectors related to a file path. | CWE-787 |
164,294 | CVE-2021-33820 | 7.5 | 5 | HIGH | An issue was discovered in UniFi Protect G3 FLEX Camera Version UVC.v4.30.0.67.Attacker could send a huge amount of TCP SYN packet to make web service's resource exhausted. Then the web server is denial-of-service. | CWE-400 |
164,295 | CVE-2021-33822 | 7.5 | 5 | HIGH | An issue was discovered on 4GEE ROUTER HH70VB Version HH70_E1_02.00_22. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service. | CWE-400 |
164,296 | CVE-2021-33823 | 7.5 | 5 | HIGH | An issue was discovered on MOXA Mgate MB3180 Version 2.1 Build 18113012. Attacker could send a huge amount of TCP SYN packet to make web service's resource exhausted. Then the web server is denial-of-service. | CWE-400 |
164,297 | CVE-2021-33824 | 7.5 | 5 | HIGH | An issue was discovered on MOXA Mgate MB3180 Version 2.1 Build 18113012. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service. | CWE-400 |
164,298 | CVE-2021-33829 | 6.1 | 4.3 | MEDIUM | A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled. | CWE-79 |
164,299 | CVE-2021-33831 | 6.5 | 4 | MEDIUM | api/account/register in the TH Wildau COVID-19 Contact Tracing application through 2021-09-01 has Incorrect Access Control. An attacker can interfere with tracing of infection chains by creating 500 random users within 2500 seconds. | CWE-287 |
164,300 | CVE-2021-33833 | 9.8 | 7.5 | CRITICAL | ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA). | CWE-787 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.