ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
164,601 | CVE-2021-34488 | 7.8 | 4.6 | HIGH | Windows Console Driver Elevation of Privilege Vulnerability | CWE-269 |
164,602 | CVE-2021-34489 | 7.8 | 6.8 | HIGH | DirectWrite Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,603 | CVE-2021-3449 | 5.9 | 4.3 | MEDIUM | An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j). | CWE-476 |
164,604 | CVE-2021-34490 | 7.5 | 5 | HIGH | Windows TCP/IP Driver Denial of Service Vulnerability This CVE ID is unique from CVE-2021-31183, CVE-2021-33772. | NVD-CWE-noinfo |
164,605 | CVE-2021-34491 | 5.5 | 4.9 | MEDIUM | Win32k Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,606 | CVE-2021-34492 | 8.1 | 5.8 | HIGH | Windows Certificate Spoofing Vulnerability | NVD-CWE-noinfo |
164,607 | CVE-2021-34493 | 6.7 | 4.6 | MEDIUM | Windows Partition Management Driver Elevation of Privilege Vulnerability | CWE-269 |
164,608 | CVE-2021-34494 | 8.8 | 6.5 | HIGH | Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33754, CVE-2021-33780, CVE-2021-34525. | NVD-CWE-noinfo |
164,609 | CVE-2021-34496 | 5.5 | 2.1 | MEDIUM | Windows GDI Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,610 | CVE-2021-34497 | 8.8 | 6.8 | HIGH | Windows MSHTML Platform Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34447. | NVD-CWE-noinfo |
164,611 | CVE-2021-34498 | 7.8 | 7.2 | HIGH | Windows GDI Elevation of Privilege Vulnerability | CWE-269 |
164,612 | CVE-2021-34499 | 6.5 | 4 | MEDIUM | Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33745, CVE-2021-34442, CVE-2021-34444. | NVD-CWE-noinfo |
164,613 | CVE-2021-3450 | 7.4 | 5.8 | HIGH | The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j). | CWE-295 |
164,614 | CVE-2021-34500 | 7.7 | 4 | HIGH | Windows Kernel Memory Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,615 | CVE-2021-34501 | 8.8 | 6.8 | HIGH | Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34518. | NVD-CWE-noinfo |
164,616 | CVE-2021-34503 | 7.8 | 6.8 | HIGH | Microsoft Windows Media Foundation Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34439, CVE-2021-34441. | NVD-CWE-noinfo |
164,617 | CVE-2021-34504 | 7.8 | 6.8 | HIGH | Windows Address Book Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,618 | CVE-2021-34507 | 6.5 | 4.3 | MEDIUM | Windows Remote Assistance Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,619 | CVE-2021-34508 | 8.8 | 6.5 | HIGH | Windows Kernel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34458. | NVD-CWE-noinfo |
164,620 | CVE-2021-34509 | 5.5 | 2.1 | MEDIUM | Storage Spaces Controller Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,621 | CVE-2021-3451 | 5.5 | 2.1 | MEDIUM | A denial of service vulnerability was reported in Lenovo PCManager, prior to version 3.0.400.3252, that could allow configuration files to be written to non-standard locations. | CWE-276 |
164,622 | CVE-2021-34510 | 7.8 | 4.6 | HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33751, CVE-2021-34460, CVE-2021-34512, CVE-2021-34513. | CWE-269 |
164,623 | CVE-2021-34511 | 7.8 | 4.6 | HIGH | Windows Installer Elevation of Privilege Vulnerability | CWE-269 |
164,624 | CVE-2021-34512 | 7.8 | 7.2 | HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33751, CVE-2021-34460, CVE-2021-34510, CVE-2021-34513. | CWE-190 |
164,625 | CVE-2021-34513 | 7.8 | 7.2 | HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33751, CVE-2021-34460, CVE-2021-34510, CVE-2021-34512. | CWE-269 |
164,626 | CVE-2021-34514 | 7.8 | 7.2 | HIGH | Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31979, CVE-2021-33771. | CWE-269 |
164,627 | CVE-2021-34516 | 7.8 | 4.6 | HIGH | Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34449. | CWE-269 |
164,628 | CVE-2021-34517 | 5.3 | 5 | MEDIUM | Microsoft SharePoint Server Spoofing Vulnerability | NVD-CWE-noinfo |
164,629 | CVE-2021-34518 | 7.8 | 6.8 | HIGH | Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34501. | NVD-CWE-noinfo |
164,630 | CVE-2021-34519 | 3.5 | 2.3 | LOW | Microsoft SharePoint Server Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,631 | CVE-2021-3452 | 6.7 | 4.6 | MEDIUM | A potential vulnerability in the system shutdown SMI callback function in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code. | NVD-CWE-noinfo |
164,632 | CVE-2021-34520 | 8.8 | 6.5 | HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34467, CVE-2021-34468. | CWE-502 |
164,633 | CVE-2021-34521 | 7.8 | 6.8 | HIGH | Raw Image Extension Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,634 | CVE-2021-34522 | 7.8 | 9.3 | HIGH | Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34464. | NVD-CWE-noinfo |
164,635 | CVE-2021-34523 | 9.8 | 7.5 | CRITICAL | Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33768, CVE-2021-34470. | CWE-269 |
164,636 | CVE-2021-34524 | 8.8 | 6.5 | HIGH | Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,637 | CVE-2021-34525 | 8.8 | 6.5 | HIGH | Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33754, CVE-2021-33780, CVE-2021-34494. | NVD-CWE-noinfo |
164,638 | CVE-2021-34527 | 8.8 | 9 | HIGH | Windows Print Spooler Remote Code Execution Vulnerability | CWE-269 |
164,639 | CVE-2021-34528 | 7.8 | 6.8 | HIGH | Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34529. | NVD-CWE-noinfo |
164,640 | CVE-2021-34529 | 7.8 | 6.8 | HIGH | Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34528. | NVD-CWE-noinfo |
164,641 | CVE-2021-3453 | 4.6 | 2.1 | MEDIUM | Some Lenovo Notebook, ThinkPad, and Lenovo Desktop systems have BIOS modules unprotected by Intel Boot Guard that could allow an attacker with physical access the ability to write to the SPI flash storage. | NVD-CWE-noinfo |
164,642 | CVE-2021-34530 | 7.8 | 6.8 | HIGH | Windows Graphics Component Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,643 | CVE-2021-34532 | 5.5 | 2.1 | MEDIUM | ASP.NET Core and Visual Studio Information Disclosure Vulnerability | NVD-CWE-noinfo |
164,644 | CVE-2021-34533 | 7.8 | 6.8 | HIGH | Windows Graphics Component Font Parsing Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,645 | CVE-2021-34534 | 7.5 | 5.1 | HIGH | Windows MSHTML Platform Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,646 | CVE-2021-34535 | 8.8 | 6.8 | HIGH | Remote Desktop Client Remote Code Execution Vulnerability | NVD-CWE-noinfo |
164,647 | CVE-2021-34536 | 7.8 | 4.6 | HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability | CWE-269 |
164,648 | CVE-2021-34537 | 8 | 5.2 | HIGH | Windows Bluetooth Driver Elevation of Privilege Vulnerability | CWE-269 |
164,649 | CVE-2021-34539 | 7.2 | 6.5 | HIGH | An issue was discovered in CubeCoders AMP before 2.1.1.8. A lack of validation of the Java Version setting means that an unintended executable path can be set. The result is that high-privileged users can trigger code execution. | CWE-20 |
164,650 | CVE-2021-3454 | 7.5 | 5 | HIGH | Truncated L2CAP K-frame causes assertion failure. Zephyr versions >= 2.4.0, >= v.2.50 contain Improper Handling of Length Parameter Inconsistency (CWE-130), Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3 | NVD-CWE-Other |
164,651 | CVE-2021-34540 | 6.1 | 4.3 | MEDIUM | Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard. | CWE-79 |
164,652 | CVE-2021-34543 | 7.5 | 5 | HIGH | The web administration server in Solar-Log 500 before 2.8.2 Build 52 does not require authentication, which allows remote attackers to gain administrative privileges by connecting to the server. As a result, the attacker can modify configuration files and change the system status. | CWE-862 |
164,653 | CVE-2021-34544 | 6.5 | 4 | MEDIUM | An issue was discovered in Solar-Log 500 before 2.8.2 Build 52 23.04.2013. In /export.html, email.html, and sms.html, cleartext passwords are stored. This may allow sensitive information to be read by someone with access to the device. | CWE-312 |
164,654 | CVE-2021-34546 | 6.8 | 7.2 | MEDIUM | An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the "save log to file" feature. To accomplish this, the attacker can navigate to cmd.exe. | CWE-287 |
164,655 | CVE-2021-34547 | 4.3 | 4.3 | MEDIUM | PRTG Network Monitor 20.1.55.1775 allows /editsettings CSRF for user account creation. | CWE-352 |
164,656 | CVE-2021-34548 | 7.5 | 5 | HIGH | An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream. | CWE-863 |
164,657 | CVE-2021-34549 | 7.5 | 5 | HIGH | An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency. | CWE-755 |
164,658 | CVE-2021-3455 | 7.5 | 5 | HIGH | Disconnecting L2CAP channel right after invalid ATT request leads freeze. Zephyr versions >= 2.4.0, >= 2.5.0 contain Use After Free (CWE-416). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp | CWE-416 |
164,659 | CVE-2021-34550 | 7.5 | 5 | HIGH | An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor | CWE-119 |
164,660 | CVE-2021-34551 | 8.1 | 5.1 | HIGH | PHPMailer before 6.5.0 on Windows allows remote code execution if lang_path is untrusted data and has a UNC pathname. | CWE-434 |
164,661 | CVE-2021-34552 | 9.8 | 7.5 | CRITICAL | Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c. | CWE-120 |
164,662 | CVE-2021-34553 | 4.3 | 4 | MEDIUM | Sonatype Nexus Repository Manager 3.x before 3.31.0 allows a remote authenticated attacker to get a list of blob files and read the content of a blob file (via a GET request) without having been granted access. | CWE-22 |
164,663 | CVE-2021-34555 | 7.5 | 5 | HIGH | OpenDMARC 1.4.1 and 1.4.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a multi-value From header field. | CWE-476 |
164,664 | CVE-2021-34556 | 5.5 | 2.1 | MEDIUM | In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack. | CWE-203 |
164,665 | CVE-2021-34557 | 4.6 | 2.1 | MEDIUM | XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs. | CWE-120 |
164,666 | CVE-2021-34558 | 6.5 | 2.6 | MEDIUM | The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic. | CWE-295 |
164,667 | CVE-2021-34559 | 5.3 | 5 | MEDIUM | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings. | CWE-444 |
164,668 | CVE-2021-34560 | 5.5 | 2.1 | MEDIUM | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once. | CWE-522 |
164,669 | CVE-2021-34561 | 8.8 | 6.8 | HIGH | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser. | CWE-350 |
164,670 | CVE-2021-34562 | 6.1 | 4.3 | MEDIUM | In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response. | CWE-79 |
164,671 | CVE-2021-34563 | 3.3 | 2.1 | LOW | In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript. | CWE-1004 |
164,672 | CVE-2021-34564 | 5.5 | 2.1 | MEDIUM | Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9. | CWE-315 |
164,673 | CVE-2021-34565 | 9.8 | 7.5 | CRITICAL | In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials. | CWE-798 |
164,674 | CVE-2021-3457 | 6.1 | 3.6 | MEDIUM | An improper authorization handling flaw was found in Foreman. The Shellhooks plugin for the smart-proxy allows Foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability. | CWE-863 |
164,675 | CVE-2021-34570 | 7.5 | 7.8 | HIGH | Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests. | CWE-20 |
164,676 | CVE-2021-34571 | 6.5 | 2.9 | MEDIUM | Multiple Wireless M-Bus devices by Enbra use Hard-coded Credentials in Security mode 5 without an option to change the encryption key. An adversary can learn all information that is available in Enbra EWM. | CWE-798 |
164,677 | CVE-2021-34572 | 6.5 | 3.3 | MEDIUM | Enbra EWM 1.7.29 does not check for or detect replay attacks sent by wireless M-Bus Security mode 5 devices. Instead timestamps of the sensor are replaced by the time of the readout even if the data is a replay of earlier data. | CWE-345 |
164,678 | CVE-2021-34573 | 5.5 | 2.1 | MEDIUM | In Enbra EWM in Version 1.7.29 together with several tested wireless M-Bus Sensors the events backflow and "no flow" are not reconized or misinterpreted. This may lead to wrong values and missing events. | CWE-682 |
164,679 | CVE-2021-34574 | 4.3 | 4 | MEDIUM | In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server. | CWE-669 |
164,680 | CVE-2021-34575 | 7.5 | 5 | HIGH | In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends. | CWE-203 |
164,681 | CVE-2021-34576 | 4.3 | 3.3 | MEDIUM | In Kaden PICOFLUX Air in all known versions an information exposure through observable discrepancy exists. This may give sensitive information (water consumption without distinct values) to third parties. | CWE-203 |
164,682 | CVE-2021-34578 | 8.1 | 6.8 | HIGH | This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07. | CWE-287 |
164,683 | CVE-2021-3458 | 4.6 | 2.1 | MEDIUM | The Motorola MM1000 device configuration portal can be accessed without authentication, which could allow adapter settings to be modified. | CWE-287 |
164,684 | CVE-2021-34580 | 7.5 | 5 | HIGH | In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts. | CWE-203 |
164,685 | CVE-2021-34581 | 7.5 | 7.8 | HIGH | Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device. | CWE-772 |
164,686 | CVE-2021-34582 | 4.8 | 3.5 | MEDIUM | In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file. | CWE-79 |
164,687 | CVE-2021-34583 | 7.5 | 5 | HIGH | Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22. | CWE-787 |
164,688 | CVE-2021-34583 | 7.5 | 5 | HIGH | Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22. | CWE-122 |
164,689 | CVE-2021-34584 | 9.1 | 6.4 | CRITICAL | Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22. | CWE-126 |
164,690 | CVE-2021-34585 | 7.5 | 5 | HIGH | In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation. | CWE-252 |
164,691 | CVE-2021-34586 | 7.5 | 5 | HIGH | In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition. | CWE-476 |
164,692 | CVE-2021-34586 | 7.5 | 5 | HIGH | In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition. | CWE-476 |
164,693 | CVE-2021-3459 | 6.8 | 7.2 | MEDIUM | A privilege escalation vulnerability was reported in the MM1000 device configuration web server, which could allow privileged shell access and/or arbitrary privileged commands to be executed on the adapter. | CWE-78 |
164,694 | CVE-2021-34593 | 7.5 | 5 | HIGH | In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC. | CWE-755 |
164,695 | CVE-2021-34594 | 6.5 | 8.5 | MEDIUM | TwinCAT OPC UA Server in TF6100 and TS6100 in product versions before 4.3.48.0 or with TcOpcUaServer versions below 3.2.0.194 are prone to a relative path traversal that allow administrators to create or delete any files on the system. | CWE-22 |
164,696 | CVE-2021-34595 | 8.1 | 5.5 | HIGH | A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite. | CWE-823 |
164,697 | CVE-2021-34596 | 6.5 | 4 | MEDIUM | A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition. | CWE-824 |
164,698 | CVE-2021-34597 | 7.8 | 6.8 | HIGH | Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory. | CWE-20 |
164,699 | CVE-2021-34598 | 7.5 | 4.3 | HIGH | In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active | CWE-401 |
164,700 | CVE-2021-34599 | 7.4 | 5.8 | HIGH | Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack. | CWE-295 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.