ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
164,601
CVE-2021-34488
7.8
4.6
HIGH
Windows Console Driver Elevation of Privilege Vulnerability
CWE-269
164,602
CVE-2021-34489
7.8
6.8
HIGH
DirectWrite Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,603
CVE-2021-3449
5.9
4.3
MEDIUM
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
CWE-476
164,604
CVE-2021-34490
7.5
5
HIGH
Windows TCP/IP Driver Denial of Service Vulnerability This CVE ID is unique from CVE-2021-31183, CVE-2021-33772.
NVD-CWE-noinfo
164,605
CVE-2021-34491
5.5
4.9
MEDIUM
Win32k Information Disclosure Vulnerability
NVD-CWE-noinfo
164,606
CVE-2021-34492
8.1
5.8
HIGH
Windows Certificate Spoofing Vulnerability
NVD-CWE-noinfo
164,607
CVE-2021-34493
6.7
4.6
MEDIUM
Windows Partition Management Driver Elevation of Privilege Vulnerability
CWE-269
164,608
CVE-2021-34494
8.8
6.5
HIGH
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33754, CVE-2021-33780, CVE-2021-34525.
NVD-CWE-noinfo
164,609
CVE-2021-34496
5.5
2.1
MEDIUM
Windows GDI Information Disclosure Vulnerability
NVD-CWE-noinfo
164,610
CVE-2021-34497
8.8
6.8
HIGH
Windows MSHTML Platform Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34447.
NVD-CWE-noinfo
164,611
CVE-2021-34498
7.8
7.2
HIGH
Windows GDI Elevation of Privilege Vulnerability
CWE-269
164,612
CVE-2021-34499
6.5
4
MEDIUM
Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33745, CVE-2021-34442, CVE-2021-34444.
NVD-CWE-noinfo
164,613
CVE-2021-3450
7.4
5.8
HIGH
The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).
CWE-295
164,614
CVE-2021-34500
7.7
4
HIGH
Windows Kernel Memory Information Disclosure Vulnerability
NVD-CWE-noinfo
164,615
CVE-2021-34501
8.8
6.8
HIGH
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34518.
NVD-CWE-noinfo
164,616
CVE-2021-34503
7.8
6.8
HIGH
Microsoft Windows Media Foundation Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34439, CVE-2021-34441.
NVD-CWE-noinfo
164,617
CVE-2021-34504
7.8
6.8
HIGH
Windows Address Book Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,618
CVE-2021-34507
6.5
4.3
MEDIUM
Windows Remote Assistance Information Disclosure Vulnerability
NVD-CWE-noinfo
164,619
CVE-2021-34508
8.8
6.5
HIGH
Windows Kernel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34458.
NVD-CWE-noinfo
164,620
CVE-2021-34509
5.5
2.1
MEDIUM
Storage Spaces Controller Information Disclosure Vulnerability
NVD-CWE-noinfo
164,621
CVE-2021-3451
5.5
2.1
MEDIUM
A denial of service vulnerability was reported in Lenovo PCManager, prior to version 3.0.400.3252, that could allow configuration files to be written to non-standard locations.
CWE-276
164,622
CVE-2021-34510
7.8
4.6
HIGH
Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33751, CVE-2021-34460, CVE-2021-34512, CVE-2021-34513.
CWE-269
164,623
CVE-2021-34511
7.8
4.6
HIGH
Windows Installer Elevation of Privilege Vulnerability
CWE-269
164,624
CVE-2021-34512
7.8
7.2
HIGH
Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33751, CVE-2021-34460, CVE-2021-34510, CVE-2021-34513.
CWE-190
164,625
CVE-2021-34513
7.8
7.2
HIGH
Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33751, CVE-2021-34460, CVE-2021-34510, CVE-2021-34512.
CWE-269
164,626
CVE-2021-34514
7.8
7.2
HIGH
Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31979, CVE-2021-33771.
CWE-269
164,627
CVE-2021-34516
7.8
4.6
HIGH
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34449.
CWE-269
164,628
CVE-2021-34517
5.3
5
MEDIUM
Microsoft SharePoint Server Spoofing Vulnerability
NVD-CWE-noinfo
164,629
CVE-2021-34518
7.8
6.8
HIGH
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34501.
NVD-CWE-noinfo
164,630
CVE-2021-34519
3.5
2.3
LOW
Microsoft SharePoint Server Information Disclosure Vulnerability
NVD-CWE-noinfo
164,631
CVE-2021-3452
6.7
4.6
MEDIUM
A potential vulnerability in the system shutdown SMI callback function in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code.
NVD-CWE-noinfo
164,632
CVE-2021-34520
8.8
6.5
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34467, CVE-2021-34468.
CWE-502
164,633
CVE-2021-34521
7.8
6.8
HIGH
Raw Image Extension Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,634
CVE-2021-34522
7.8
9.3
HIGH
Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34464.
NVD-CWE-noinfo
164,635
CVE-2021-34523
9.8
7.5
CRITICAL
Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33768, CVE-2021-34470.
CWE-269
164,636
CVE-2021-34524
8.8
6.5
HIGH
Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,637
CVE-2021-34525
8.8
6.5
HIGH
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33746, CVE-2021-33754, CVE-2021-33780, CVE-2021-34494.
NVD-CWE-noinfo
164,638
CVE-2021-34527
8.8
9
HIGH
Windows Print Spooler Remote Code Execution Vulnerability
CWE-269
164,639
CVE-2021-34528
7.8
6.8
HIGH
Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34529.
NVD-CWE-noinfo
164,640
CVE-2021-34529
7.8
6.8
HIGH
Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34528.
NVD-CWE-noinfo
164,641
CVE-2021-3453
4.6
2.1
MEDIUM
Some Lenovo Notebook, ThinkPad, and Lenovo Desktop systems have BIOS modules unprotected by Intel Boot Guard that could allow an attacker with physical access the ability to write to the SPI flash storage.
NVD-CWE-noinfo
164,642
CVE-2021-34530
7.8
6.8
HIGH
Windows Graphics Component Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,643
CVE-2021-34532
5.5
2.1
MEDIUM
ASP.NET Core and Visual Studio Information Disclosure Vulnerability
NVD-CWE-noinfo
164,644
CVE-2021-34533
7.8
6.8
HIGH
Windows Graphics Component Font Parsing Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,645
CVE-2021-34534
7.5
5.1
HIGH
Windows MSHTML Platform Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,646
CVE-2021-34535
8.8
6.8
HIGH
Remote Desktop Client Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,647
CVE-2021-34536
7.8
4.6
HIGH
Storage Spaces Controller Elevation of Privilege Vulnerability
CWE-269
164,648
CVE-2021-34537
8
5.2
HIGH
Windows Bluetooth Driver Elevation of Privilege Vulnerability
CWE-269
164,649
CVE-2021-34539
7.2
6.5
HIGH
An issue was discovered in CubeCoders AMP before 2.1.1.8. A lack of validation of the Java Version setting means that an unintended executable path can be set. The result is that high-privileged users can trigger code execution.
CWE-20
164,650
CVE-2021-3454
7.5
5
HIGH
Truncated L2CAP K-frame causes assertion failure. Zephyr versions >= 2.4.0, >= v.2.50 contain Improper Handling of Length Parameter Inconsistency (CWE-130), Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3
NVD-CWE-Other
164,651
CVE-2021-34540
6.1
4.3
MEDIUM
Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard.
CWE-79
164,652
CVE-2021-34543
7.5
5
HIGH
The web administration server in Solar-Log 500 before 2.8.2 Build 52 does not require authentication, which allows remote attackers to gain administrative privileges by connecting to the server. As a result, the attacker can modify configuration files and change the system status.
CWE-862
164,653
CVE-2021-34544
6.5
4
MEDIUM
An issue was discovered in Solar-Log 500 before 2.8.2 Build 52 23.04.2013. In /export.html, email.html, and sms.html, cleartext passwords are stored. This may allow sensitive information to be read by someone with access to the device.
CWE-312
164,654
CVE-2021-34546
6.8
7.2
MEDIUM
An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the "save log to file" feature. To accomplish this, the attacker can navigate to cmd.exe.
CWE-287
164,655
CVE-2021-34547
4.3
4.3
MEDIUM
PRTG Network Monitor 20.1.55.1775 allows /editsettings CSRF for user account creation.
CWE-352
164,656
CVE-2021-34548
7.5
5
HIGH
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.
CWE-863
164,657
CVE-2021-34549
7.5
5
HIGH
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
CWE-755
164,658
CVE-2021-3455
7.5
5
HIGH
Disconnecting L2CAP channel right after invalid ATT request leads freeze. Zephyr versions >= 2.4.0, >= 2.5.0 contain Use After Free (CWE-416). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp
CWE-416
164,659
CVE-2021-34550
7.5
5
HIGH
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor
CWE-119
164,660
CVE-2021-34551
8.1
5.1
HIGH
PHPMailer before 6.5.0 on Windows allows remote code execution if lang_path is untrusted data and has a UNC pathname.
CWE-434
164,661
CVE-2021-34552
9.8
7.5
CRITICAL
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
CWE-120
164,662
CVE-2021-34553
4.3
4
MEDIUM
Sonatype Nexus Repository Manager 3.x before 3.31.0 allows a remote authenticated attacker to get a list of blob files and read the content of a blob file (via a GET request) without having been granted access.
CWE-22
164,663
CVE-2021-34555
7.5
5
HIGH
OpenDMARC 1.4.1 and 1.4.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a multi-value From header field.
CWE-476
164,664
CVE-2021-34556
5.5
2.1
MEDIUM
In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.
CWE-203
164,665
CVE-2021-34557
4.6
2.1
MEDIUM
XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs.
CWE-120
164,666
CVE-2021-34558
6.5
2.6
MEDIUM
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
CWE-295
164,667
CVE-2021-34559
5.3
5
MEDIUM
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.
CWE-444
164,668
CVE-2021-34560
5.5
2.1
MEDIUM
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.
CWE-522
164,669
CVE-2021-34561
8.8
6.8
HIGH
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.
CWE-350
164,670
CVE-2021-34562
6.1
4.3
MEDIUM
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.
CWE-79
164,671
CVE-2021-34563
3.3
2.1
LOW
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.
CWE-1004
164,672
CVE-2021-34564
5.5
2.1
MEDIUM
Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.
CWE-315
164,673
CVE-2021-34565
9.8
7.5
CRITICAL
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.
CWE-798
164,674
CVE-2021-3457
6.1
3.6
MEDIUM
An improper authorization handling flaw was found in Foreman. The Shellhooks plugin for the smart-proxy allows Foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.
CWE-863
164,675
CVE-2021-34570
7.5
7.8
HIGH
Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.
CWE-20
164,676
CVE-2021-34571
6.5
2.9
MEDIUM
Multiple Wireless M-Bus devices by Enbra use Hard-coded Credentials in Security mode 5 without an option to change the encryption key. An adversary can learn all information that is available in Enbra EWM.
CWE-798
164,677
CVE-2021-34572
6.5
3.3
MEDIUM
Enbra EWM 1.7.29 does not check for or detect replay attacks sent by wireless M-Bus Security mode 5 devices. Instead timestamps of the sensor are replaced by the time of the readout even if the data is a replay of earlier data.
CWE-345
164,678
CVE-2021-34573
5.5
2.1
MEDIUM
In Enbra EWM in Version 1.7.29 together with several tested wireless M-Bus Sensors the events backflow and "no flow" are not reconized or misinterpreted. This may lead to wrong values and missing events.
CWE-682
164,679
CVE-2021-34574
4.3
4
MEDIUM
In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an authenticated attacker can change the password of his account into a new password that violates the password policy by intercepting and modifying the request that is send to the server.
CWE-669
164,680
CVE-2021-34575
7.5
5
HIGH
In MB connect line mymbCONNECT24, mbCONNECT24 in versions <= 2.8.0 an unauthenticated user can enumerate valid users by checking what kind of response the server sends.
CWE-203
164,681
CVE-2021-34576
4.3
3.3
MEDIUM
In Kaden PICOFLUX Air in all known versions an information exposure through observable discrepancy exists. This may give sensitive information (water consumption without distinct values) to third parties.
CWE-203
164,682
CVE-2021-34578
8.1
6.8
HIGH
This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.
CWE-287
164,683
CVE-2021-3458
4.6
2.1
MEDIUM
The Motorola MM1000 device configuration portal can be accessed without authentication, which could allow adapter settings to be modified.
CWE-287
164,684
CVE-2021-34580
7.5
5
HIGH
In mymbCONNECT24, mbCONNECT24 <= 2.9.0 an unauthenticated user can enumerate valid backend users by checking what kind of response the server sends for crafted invalid login attempts.
CWE-203
164,685
CVE-2021-34581
7.5
7.8
HIGH
Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device.
CWE-772
164,686
CVE-2021-34582
4.8
3.5
MEDIUM
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.
CWE-79
164,687
CVE-2021-34583
7.5
5
HIGH
Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
CWE-787
164,688
CVE-2021-34583
7.5
5
HIGH
Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
CWE-122
164,689
CVE-2021-34584
9.1
6.4
CRITICAL
Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
CWE-126
164,690
CVE-2021-34585
7.5
5
HIGH
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.
CWE-252
164,691
CVE-2021-34586
7.5
5
HIGH
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.
CWE-476
164,692
CVE-2021-34586
7.5
5
HIGH
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.
CWE-476
164,693
CVE-2021-3459
6.8
7.2
MEDIUM
A privilege escalation vulnerability was reported in the MM1000 device configuration web server, which could allow privileged shell access and/or arbitrary privileged commands to be executed on the adapter.
CWE-78
164,694
CVE-2021-34593
7.5
5
HIGH
In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.
CWE-755
164,695
CVE-2021-34594
6.5
8.5
MEDIUM
TwinCAT OPC UA Server in TF6100 and TS6100 in product versions before 4.3.48.0 or with TcOpcUaServer versions below 3.2.0.194 are prone to a relative path traversal that allow administrators to create or delete any files on the system.
CWE-22
164,696
CVE-2021-34595
8.1
5.5
HIGH
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.
CWE-823
164,697
CVE-2021-34596
6.5
4
MEDIUM
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.
CWE-824
164,698
CVE-2021-34597
7.8
6.8
HIGH
Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.
CWE-20
164,699
CVE-2021-34598
7.5
4.3
HIGH
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active
CWE-401
164,700
CVE-2021-34599
7.4
5.8
HIGH
Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.
CWE-295