ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
164,301 | CVE-2021-33838 | 7.5 | 5 | HIGH | Luca through 1.7.4 on Android allows remote attackers to obtain sensitive information about COVID-19 tracking because requests related to Check-In State occur shortly after requests for Phone Number Registration. | CWE-200 |
164,302 | CVE-2021-33839 | 7.5 | 5 | HIGH | Luca through 1.7.4 on Android allows remote attackers to obtain sensitive information about COVID-19 tracking because the QR code of a Public Location can be intentionally confused with the QR code of a Private Meeting. | CWE-200 |
164,303 | CVE-2021-3384 | 5.3 | 5 | MEDIUM | A vulnerability in Stormshield Network Security could allow an attacker to trigger a protection related to ARP/NDP tables management, which would temporarily prevent the system to contact new hosts via IPv4 or IPv6. This affects versions 2.0.0 to 2.7.7, 2.8.0 to 2.16.0, 3.0.0 to 3.7.16, 3.8.0 to 3.11.4, and 4.0.0 to 4.1.5. Fixed in versions 2.7.8, 3.7.17, 3.11.5, and 4.2.0. | NVD-CWE-noinfo |
164,304 | CVE-2021-33840 | 7.5 | 5 | HIGH | The server in Luca through 1.1.14 allows remote attackers to cause a denial of service (insertion of many fake records related to COVID-19) because Phone Number data lacks a digital signature. | CWE-400 |
164,305 | CVE-2021-33841 | 9.8 | 10 | CRITICAL | SGE-PLC1000 device, in its 0.9.2b firmware version, does not handle some requests correctly, allowing a remote attacker to inject code into the operating system with maximum privileges. | CWE-78 |
164,306 | CVE-2021-33842 | 8.8 | 7.7 | HIGH | Improper Authentication vulnerability in the cookie parameter of Circutor SGE-PLC1000 firmware version 0.9.2b allows an attacker to perform operations as an authenticated user. In order to exploit this vulnerability, the attacker must be within the network where the device affected is located. | CWE-287 |
164,307 | CVE-2021-33849 | 5.4 | 3.5 | MEDIUM | A Cross-Site Scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user’s browser while the browser is connected to a trusted website. The attack targets your application's users and not the application itself while using your application as the attack's vehicle. The XSS payload executes whenever the user changes the form values or deletes a created form in Zoho CRM Lead Magnet Version 1.7.2.4. | CWE-79 |
164,308 | CVE-2021-33850 | 5.4 | 3.5 | MEDIUM | There is a Cross-Site Scripting vulnerability in Microsoft Clarity version 0.3. The XSS payload executes whenever the user changes the clarity configuration in Microsoft Clarity version 0.3. The payload is stored on the configuring project Id page. | CWE-79 |
164,309 | CVE-2021-33879 | 8.1 | 6.8 | HIGH | Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP connection. A malicious attacker in an MITM position could spoof the contents of an XML document describing an update package, replacing a download URL with one pointing to an arbitrary Windows executable. Because the only integrity check would be a comparison of the downloaded file's MD5 checksum to the one contained within the XML document, the downloaded executable would then be executed on the victim's machine. | CWE-494 |
164,310 | CVE-2021-33880 | 5.9 | 2.6 | MEDIUM | The aaugustin websockets library before 9.1 for Python has an Observable Timing Discrepancy on servers when HTTP Basic Authentication is enabled with basic_auth_protocol_factory(credentials=...). An attacker may be able to guess a password via a timing attack. | NVD-CWE-Other |
164,311 | CVE-2021-33881 | 4.2 | 1.9 | MEDIUM | On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a "tear off" attack) over RFID to bypass a Monotonic Counter protection mechanism. The impact depends on how the anti tear-off feature is used in specific applications such as public transportation, physical access control, etc. | CWE-863 |
164,312 | CVE-2021-33882 | 8.6 | 5 | HIGH | A Missing Authentication for Critical Function vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to reconfigure the device from an unknown source because of lack of authentication on proprietary networking commands. | CWE-306 |
164,313 | CVE-2021-33883 | 7.5 | 5 | HIGH | A Cleartext Transmission of Sensitive Information vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to obtain sensitive information by snooping on the network traffic. The exposed data includes critical values for a pump's internal configuration. | CWE-319 |
164,314 | CVE-2021-33884 | 9.1 | 5 | CRITICAL | An Unrestricted Upload of File with Dangerous Type vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows remote attackers to upload any files to the /tmp directory of the device through the webpage API. This can result in critical files being overwritten. | CWE-434 |
164,315 | CVE-2021-33885 | 9.8 | 10 | CRITICAL | An Insufficient Verification of Data Authenticity vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to send the device malicious data that will be used in place of the correct data. This results in full system command access and execution because of the lack of cryptographic signatures on critical data sets. | CWE-345 |
164,316 | CVE-2021-33886 | 8.8 | 5.8 | HIGH | An improper sanitization of input vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote unauthenticated attacker to gain user-level command-line access by passing a raw external string straight through to printf statements. The attacker is required to be on the same network as the device. | CWE-20 |
164,317 | CVE-2021-33887 | 6.8 | 7.2 | MEDIUM | Insufficient verification of data authenticity in Peloton TTR01 up to and including PTV55G allows an attacker with physical access to boot into a modified kernel/ramdisk without unlocking the bootloader. | CWE-345 |
164,318 | CVE-2021-33889 | 6.8 | 4.6 | MEDIUM | OpenThread wpantund through 2021-07-02 has a stack-based Buffer Overflow because of an inconsistency in the integer data type for metric_len. | CWE-787 |
164,319 | CVE-2021-33894 | 8.8 | 6.5 | HIGH | In Progress MOVEit Transfer before 2019.0.6 (11.0.6), 2019.1.x before 2019.1.5 (11.1.5), 2019.2.x before 2019.2.2 (11.2.2), 2020.x before 2020.0.5 (12.0.5), 2020.1.x before 2020.1.4 (12.1.4), and 2021.x before 2021.0.1 (13.0.1), a SQL injection vulnerability exists in SILUtility.vb in MOVEit.DMZ.WebApp in the MOVEit Transfer web app. This could allow an authenticated attacker to gain unauthorized access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database and/or execute SQL statements that alter or delete database elements. | CWE-89 |
164,320 | CVE-2021-33895 | 8.1 | 6.8 | HIGH | ETINET BACKBOX E4.09 and H4.09 mismanages password access control. When a user uses the User ID of the process running BBSV to login to the Backbox UI application, the system procedure (USER_AUTHENTICATE_) used for verifying the Password returns 0 (no error). The reason is that the user is not running the XYGate application. Hence, BBSV assumes the Password is correct. For H4.09, the affected version isT0954V04^AAO. For E4.09, the affected version is 22SEP2020. | CWE-863 |
164,321 | CVE-2021-33896 | 5.3 | 5 | MEDIUM | Dino before 0.1.2 and 0.2.x before 0.2.1 allows Directory Traversal (only for creation of new files) via URI-encoded path separators. | CWE-22 |
164,322 | CVE-2021-33898 | 8.1 | 6.8 | HIGH | In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it. | CWE-502 |
164,323 | CVE-2021-33900 | 7.5 | 5 | HIGH | While investigating DIRSTUDIO-1219 it was noticed that configured StartTLS encryption was not applied when any SASL authentication mechanism (DIGEST-MD5, GSSAPI) was used. While investigating DIRSTUDIO-1220 it was noticed that any configured SASL confidentiality layer was not applied. This issue affects Apache Directory Studio version 2.0.0.v20210213-M16 and prior versions. | CWE-311 |
164,324 | CVE-2021-33903 | 8.8 | 8.5 | HIGH | In LCOS 10.40 to 10.42.0473-RU3 with SNMPv3 enabled on LANCOM devices, changing the password of the root user via the CLI does not change the password of the root user for SNMPv3 access. (However, changing the password of the root user via LANconfig does change the password of the root user for SNMPv3 access.) | NVD-CWE-noinfo |
164,325 | CVE-2021-33904 | 6.1 | 4.3 | MEDIUM | ** DISPUTED ** In Accela Civic Platform through 21.1, the security/hostSignon.do parameter servProvCode is vulnerable to XSS. NOTE: The vendor states "there are configurable security flags and we are unable to reproduce them with the available information." | CWE-79 |
164,326 | CVE-2021-33907 | 9.8 | 10 | CRITICAL | The Zoom Client for Meetings for Windows in all versions before 5.3.0 fails to properly validate the certificate information used to sign .msi files when performing an update of the client. This could lead to remote code execution in an elevated privileged context. | CWE-295 |
164,327 | CVE-2021-33909 | 7.8 | 7.2 | HIGH | fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. | CWE-120 |
164,328 | CVE-2021-3391 | 5.3 | 5 | MEDIUM | MobileIron Mobile@Work through 2021-03-22 allows attackers to distinguish among valid, disabled, and nonexistent user accounts by observing the number of failed login attempts needed to produce a Lockout error message | NVD-CWE-noinfo |
164,329 | CVE-2021-33910 | 5.5 | 4.9 | MEDIUM | basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash. | CWE-770 |
164,330 | CVE-2021-33911 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine ADManager Plus before 7110 allows remote code execution. | CWE-94 |
164,331 | CVE-2021-3392 | 3.2 | 2.1 | LOW | A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected. | CWE-416 |
164,332 | CVE-2021-33923 | 5.5 | 2.1 | MEDIUM | Insecure permissions in Confluent Ansible (cp-ansible) 5.5.0, 5.5.1, 5.5.2 and 6.0.0 allows local attackers to access some sensitive information (private keys, state database). | CWE-276 |
164,333 | CVE-2021-33924 | 9.8 | 7.5 | CRITICAL | Confluent Ansible (cp-ansible) version 5.5.0, 5.5.1, 5.5.2 and 6.0.0 is vulnerable to Incorrect Access Control via its auxiliary component that allows remote attackers to access sensitive information. | CWE-862 |
164,334 | CVE-2021-33928 | 7.5 | 5 | HIGH | Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service. | CWE-787 |
164,335 | CVE-2021-33929 | 7.5 | 5 | HIGH | Buffer overflow vulnerability in function pool_disabled_solvable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service. | CWE-787 |
164,336 | CVE-2021-3393 | 4.3 | 3.5 | MEDIUM | An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read. | CWE-209 |
164,337 | CVE-2021-33930 | 7.5 | 5 | HIGH | Buffer overflow vulnerability in function pool_installable_whatprovides in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service. | CWE-787 |
164,338 | CVE-2021-33938 | 7.5 | 5 | HIGH | Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17 allows attackers to cause a Denial of Service. | CWE-787 |
164,339 | CVE-2021-3394 | 8.8 | 6.5 | HIGH | Millennium Millewin (also known as "Cartella clinica") 13.39.028, 13.39.28.3342, and 13.39.146.1 has insecure folder permissions allowing a malicious user for a local privilege escalation. | CWE-276 |
164,340 | CVE-2021-3395 | 5.4 | 3.5 | MEDIUM | A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote authenticated users to upload an arbitrary file. The JavaScript code will execute when someone visits the attachment. | CWE-79 |
164,341 | CVE-2021-3396 | 8.8 | 6.5 | HIGH | OpenNMS Meridian 2016, 2017, 2018 before 2018.1.25, 2019 before 2019.1.16, and 2020 before 2020.1.5, Horizon 1.2 through 27.0.4, and Newts <1.5.3 has Incorrect Access Control, which allows local and remote code execution using JEXL expressions. | CWE-863 |
164,342 | CVE-2021-33981 | 4.3 | 4 | MEDIUM | An insecure, direct object vulnerability in hunting/fishing license retrieval function of the "Fish | Hunt FL" iOS app versions 3.8.0 and earlier allows a remote authenticated attacker to retrieve other people's personal information and images of their hunting/fishing licenses. | CWE-863 |
164,343 | CVE-2021-33982 | 7.5 | 5 | HIGH | An insufficient session expiration vulnerability exists in the "Fish | Hunt FL" iOS app version 3.8.0 and earlier, which allows a remote attacker to reuse, spoof, or steal other user and admin sessions. | CWE-613 |
164,344 | CVE-2021-33988 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form. | CWE-79 |
164,345 | CVE-2021-3401 | 9.8 | 7.5 | CRITICAL | Bitcoin Core before 0.19.0 might allow remote attackers to execute arbitrary code when another application unsafely passes the -platformpluginpath argument to the bitcoin-qt program, as demonstrated by an x-scheme-handler/bitcoin handler for a .desktop file or a web browser. NOTE: the discoverer states "I believe that this vulnerability cannot actually be exploited." | CWE-77 |
164,346 | CVE-2021-3402 | 9.1 | 6.4 | CRITICAL | An integer overflow and several buffer overflow reads in libyara/modules/macho/macho.c in YARA v4.0.3 and earlier could allow an attacker to either cause denial of service or information disclosure via a malicious Mach-O file. Affects all versions before libyara 4.0.4 | CWE-190 |
164,347 | CVE-2021-3403 | 7.8 | 6.8 | HIGH | In ytnef 1.9.3, the TNEFSubjectHandler function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a double free which can be triggered via a crafted file. | CWE-416 |
164,348 | CVE-2021-3404 | 7.8 | 6.8 | HIGH | In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file. | CWE-119 |
164,349 | CVE-2021-3405 | 6.5 | 4.3 | MEDIUM | A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml. | CWE-787 |
164,350 | CVE-2021-3406 | 9.8 | 7.5 | CRITICAL | A flaw was found in keylime 5.8.1 and older. The issue in the Keylime agent and registrar code invalidates the cryptographic chain of trust from the Endorsement Key certificate to agent attestations. | CWE-347 |
164,351 | CVE-2021-34066 | 9.8 | 10 | CRITICAL | An issue was discovered in EdgeGallery/developer before v1.0. There is a "Deserialization of yaml file" vulnerability that can allow attackers to execute system command through uploading the malicious constructed YAML file. | CWE-502 |
164,352 | CVE-2021-34067 | 5.5 | 4.3 | MEDIUM | Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file. | CWE-787 |
164,353 | CVE-2021-34068 | 5.5 | 4.3 | MEDIUM | Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file. | CWE-787 |
164,354 | CVE-2021-34069 | 5.5 | 4.3 | MEDIUM | Divide-by-zero bug in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file. | CWE-369 |
164,355 | CVE-2021-3407 | 5.5 | 4.3 | MEDIUM | A flaw was found in mupdf 1.18.0. Double free of object during linearization may lead to memory corruption and other potential consequences. | CWE-415 |
164,356 | CVE-2021-34070 | 5.5 | 4.3 | MEDIUM | Out-of-bounds Read in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file. | CWE-125 |
164,357 | CVE-2021-34071 | 5.5 | 4.3 | MEDIUM | Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file. | CWE-787 |
164,358 | CVE-2021-34074 | 9.8 | 7.5 | CRITICAL | PandoraFMS <=7.54 allows arbitrary file upload, it leading to remote command execution via the File Manager. To bypass the built-in protection, a relative path is used in the requests. | CWE-434 |
164,359 | CVE-2021-34075 | 5.9 | 4.3 | MEDIUM | In Artica Pandora FMS <=754 in the File Manager component, there is sensitive information exposed on the client side which attackers can access. | CWE-668 |
164,360 | CVE-2021-3409 | 5.7 | 4.6 | MEDIUM | The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this. | CWE-119 |
164,361 | CVE-2021-3410 | 7.8 | 4.6 | HIGH | A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context. | CWE-119 |
164,362 | CVE-2021-3411 | 6.7 | 4.6 | MEDIUM | A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-94 |
164,363 | CVE-2021-34110 | 7.8 | 4.6 | HIGH | WinWaste.NET version 1.0.6183.16475 has incorrect permissions, allowing a local unprivileged user to replace the executable with a malicious file that will be executed with "LocalSystem" privileges. | CWE-863 |
164,364 | CVE-2021-3412 | 7.3 | 5 | HIGH | It was found that all versions of 3Scale developer portal lacked brute force protections. An attacker could use this gap to bypass login controls, and access privileged information, or possibly conduct further attacks. | CWE-307 |
164,365 | CVE-2021-34128 | 8.8 | 6.5 | HIGH | LaikeTui 3.5.0 allows remote authenticated users to execute arbitrary PHP code by using index.php?module=system&action=pay to upload a ZIP archive containing a .php file, as demonstrated by the ../../../../phpinfo.php pathname. | CWE-434 |
164,366 | CVE-2021-34129 | 8.1 | 5.5 | HIGH | LaikeTui 3.5.0 allows remote authenticated users to delete arbitrary files, as demonstrated by deleting install.lock in order to reinstall the product in an attacker-controlled manner. This deletion is possible via directory traversal in the uploadImg, oldpic, or imgurl parameter. | CWE-22 |
164,367 | CVE-2021-3413 | 6.3 | 6.5 | MEDIUM | A flaw was found in Red Hat Satellite in tfm-rubygem-foreman_azure_rm in versions before 2.2.0. A credential leak was identified which will expose Azure Resource Manager's secret key through JSON of the API output. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-200 |
164,368 | CVE-2021-34141 | 9.8 | 7.5 | CRITICAL | Incomplete string comparison in the numpy.core component in NumPy1.9.x, which allows attackers to fail the APIs via constructing specific string objects. | CWE-697 |
164,369 | CVE-2021-34143 | 6.5 | 6.1 | MEDIUM | The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C_DEMO_V1.0 does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after paging procedure. User intervention is required to restart the device. | NVD-CWE-noinfo |
164,370 | CVE-2021-34144 | 6.5 | 3.3 | MEDIUM | The Bluetooth Classic implementation in the Zhuhai Jieli AC6366C BT SDK through 0.9.1 does not properly handle the reception of truncated LMP_SCO_Link_Request packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity. | NVD-CWE-noinfo |
164,371 | CVE-2021-34145 | 5.3 | 2.9 | MEDIUM | The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with an invalid Baseband packet type (and LT_ADDRESS and LT_ADDR) after completion of the LMP setup procedure, allowing attackers in radio range to trigger a denial of service (firmware crash) via a crafted LMP packet. | NVD-CWE-noinfo |
164,372 | CVE-2021-34146 | 6.5 | 6.1 | MEDIUM | The Bluetooth Classic implementation in the Cypress CYW920735Q60EVB does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service and restart (crash) of the device by flooding it with LMP_AU_Rand packets after the paging procedure. | NVD-CWE-noinfo |
164,373 | CVE-2021-34147 | 6.5 | 6.1 | MEDIUM | The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 does not properly handle the reception of a malformed LMP timing accuracy response followed by multiple reconnections to the link slave, allowing attackers to exhaust device BT resources and eventually trigger a crash via multiple attempts of sending a crafted LMP timing accuracy response followed by a sudden reconnection with a random BDAddress. | NVD-CWE-noinfo |
164,374 | CVE-2021-34148 | 6.5 | 6.1 | MEDIUM | The Bluetooth Classic implementation in the Cypress WICED BT stack through 2.9.0 for CYW20735B1 devices does not properly handle the reception of LMP_max_slot with a greater ACL Length after completion of the LMP setup procedure, allowing attackers in radio range to trigger a denial of service (firmware crash) via a crafted LMP packet. | NVD-CWE-noinfo |
164,375 | CVE-2021-34149 | 6.5 | 3.3 | MEDIUM | The Bluetooth Classic implementation on the Texas Instruments CC256XCQFN-EM does not properly handle the reception of continuous LMP_AU_Rand packets, allowing attackers in radio range to trigger a denial of service (deadlock) of the device by flooding it with LMP_AU_Rand packets after the paging procedure. | NVD-CWE-noinfo |
164,376 | CVE-2021-34150 | 6.5 | 3.3 | MEDIUM | The Bluetooth Classic implementation on Bluetrum AB5301A devices with unknown firmware versions does not properly handle the reception of oversized DM1 LMP packets while no other BT connections are active, allowing attackers in radio range to prevent new BT connections (disabling the AB5301A inquiry and page scan procedures) via a crafted LMP packet. The user needs to manually perform a power cycle (restart) of the device to restore BT connectivity. | NVD-CWE-noinfo |
164,377 | CVE-2021-3416 | 6 | 2.1 | MEDIUM | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario. | CWE-835 |
164,378 | CVE-2021-34165 | 9.8 | 7.5 | CRITICAL | A SQL Injection vulnerability in Sourcecodester Basic Shopping Cart 1.0 allows a remote attacker to Bypass Authentication and become Admin. | CWE-89 |
164,379 | CVE-2021-34166 | 9.8 | 7.5 | CRITICAL | A SQL INJECTION vulnerability in Sourcecodester Simple Food Website 1.0 allows a remote attacker to Bypass Authentication and become Admin. | CWE-287 |
164,380 | CVE-2021-3417 | 4.9 | 4 | MEDIUM | An internal product security audit of LXCO, prior to version 1.2.2, discovered that credentials for Lenovo XClarity Administrator (LXCA), if added as a Resource Manager, are encoded then written to an internal LXCO log file each time a session is established with LXCA. Affected logs are captured in the First Failure Data Capture (FFDC) service log. The FFDC service log is only generated when requested by a privileged LXCO user and it is only accessible to the privileged LXCO user that requested the file. | CWE-319 |
164,381 | CVE-2021-34170 | 9.8 | 7.5 | CRITICAL | Bandai Namco FromSoftware Dark Souls III allows remote attackers to execute arbitrary code. | NVD-CWE-Other |
164,382 | CVE-2021-34173 | 7.5 | 7.8 | HIGH | An attacker can cause a Denial of Service and kernel panic in v4.2 and earlier versions of Espressif esp32 via a malformed beacon csa frame. The device requires a reboot to recover. | NVD-CWE-noinfo |
164,383 | CVE-2021-34174 | 4.6 | 4.9 | MEDIUM | A vulnerability exists in Broadcom BCM4352 and BCM43684 chips. Any wireless router using BCM4352 and BCM43684 will be affected, such as ASUS AX6100. An attacker may cause a Denial of Service (DoS) to any device connected to BCM4352 or BCM43684 routers via an association or reassociation frame. | NVD-CWE-noinfo |
164,384 | CVE-2021-3418 | 6.4 | 4.4 | MEDIUM | If certificates that signed grub are installed into db, grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown, yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grub2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism. | CWE-281 |
164,385 | CVE-2021-34184 | 9.8 | 7.5 | CRITICAL | Miniaudio 0.10.35 has a Double free vulnerability that could cause a buffer overflow in ma_default_vfs_close__stdio in miniaudio.h. | CWE-415 |
164,386 | CVE-2021-34185 | 7.8 | 6.8 | HIGH | Miniaudio 0.10.35 has an integer-based buffer overflow caused by an out-of-bounds left shift in drwav_bytes_to_u32 in miniaudio.h | CWE-120 |
164,387 | CVE-2021-34187 | 9.8 | 7.5 | CRITICAL | main/inc/ajax/model.ajax.php in Chamilo through 1.11.14 allows SQL Injection via the searchField, filters, or filters2 parameter. | CWE-89 |
164,388 | CVE-2021-34190 | 4.8 | 3.5 | MEDIUM | A stored cross site scripting (XSS) vulnerability in index.php?menu=billing_rates of Issabel PBX version 4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Name" or "Prefix" fields under the "Create New Rate" module. | CWE-79 |
164,389 | CVE-2021-3420 | 9.8 | 7.5 | CRITICAL | A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow. | CWE-190 |
164,390 | CVE-2021-3420 | 9.8 | 7.5 | CRITICAL | A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow. | CWE-120 |
164,391 | CVE-2021-34201 | 7.1 | 3.6 | HIGH | D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640). Local ordinary users can overwrite the global variables in the .bss section, causing the process crashes or changes. | CWE-787 |
164,392 | CVE-2021-34202 | 7.8 | 7.2 | HIGH | There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remote code execution. | CWE-787 |
164,393 | CVE-2021-34203 | 8.1 | 4.8 | HIGH | D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An attacker can easily use telnet to log in, modify routing information, monitor the traffic of all devices under the router, hijack DNS and phishing attacks. In addition, this interface is likely to be questioned by customers as a backdoor, because the interface should not be exposed. | CWE-863 |
164,394 | CVE-2021-34204 | 6.8 | 7.2 | MEDIUM | D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges. | CWE-522 |
164,395 | CVE-2021-34207 | 6.1 | 4.3 | MEDIUM | Cross-site scripting in ddns.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Domain Name" field, "Server Address" field, "User Name/Email", or "Password/Key" field. | CWE-79 |
164,396 | CVE-2021-3421 | 5.5 | 4.3 | MEDIUM | A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha. | CWE-347 |
164,397 | CVE-2021-34215 | 6.1 | 4.3 | MEDIUM | Cross-site scripting in tcpipwan.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Service Name" field. | CWE-79 |
164,398 | CVE-2021-34218 | 5.3 | 5 | MEDIUM | Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /add/ , /img/, /js/, and /mobile directories via GET Parameter. | NVD-CWE-Other |
164,399 | CVE-2021-34220 | 6.1 | 4.3 | MEDIUM | Cross-site scripting in tr069config.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "User Name" field or "Password" field. | CWE-79 |
164,400 | CVE-2021-34223 | 6.1 | 4.3 | MEDIUM | Cross-site scripting in urlfilter.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "URL Address" field. | CWE-79 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.