ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
165,001 | CVE-2021-35062 | 8.1 | 9.3 | HIGH | A Shell Metacharacter Injection vulnerability in result.php in DRK Odenwaldkreis Testerfassung March-2021 allow an attacker with a valid token of a COVID-19 test result to execute shell commands with the permissions of the web server. | CWE-88 |
165,002 | CVE-2021-35063 | 7.5 | 5 | HIGH | Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion." | NVD-CWE-noinfo |
165,003 | CVE-2021-35064 | 9.8 | 7.5 | CRITICAL | KramerAV VIAWare, all tested versions, allow privilege escalation through misconfiguration of sudo. Sudoers permits running of multiple dangerous commands, including unzip, systemctl and dpkg. | CWE-269 |
165,004 | CVE-2021-35066 | 9.8 | 7.5 | CRITICAL | An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132. | CWE-611 |
165,005 | CVE-2021-35067 | 8.1 | 5.5 | HIGH | Meross MSG100 devices before 3.2.3 allow an attacker to replay the same data or similar data (e.g., an attacker who sniffs a Close message can transmit an acceptable Open message). | CWE-294 |
165,006 | CVE-2021-3507 | 6.1 | 3.6 | MEDIUM | A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory. | CWE-119 |
165,007 | CVE-2021-3508 | 5.5 | 4.3 | MEDIUM | A flaw was found in PDFResurrect in version 0.22b. There is an infinite loop in get_xref_linear_skipped() in pdf.c via a crafted PDF file. | CWE-835 |
165,008 | CVE-2021-3509 | 6.1 | 4.3 | MEDIUM | A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability. | CWE-79 |
165,009 | CVE-2021-3510 | 7.5 | 5 | HIGH | Zephyr JSON decoder incorrectly decodes array of array. Zephyr versions >= >1.14.0, >= >2.5.0 contain Attempt to Access Child of a Non-structure Pointer (CWE-588). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4 | NVD-CWE-Other |
165,010 | CVE-2021-3511 | 4.3 | 3.3 | MEDIUM | Disclosure of sensitive information to an unauthorized user vulnerability in Buffalo broadband routers (BHR-4GRV firmware Ver.1.99 and prior, DWR-HP-G300NH firmware Ver.1.83 and prior, HW-450HP-ZWE firmware Ver.1.99 and prior, WHR-300HP firmware Ver.1.99 and prior, WHR-300 firmware Ver.1.99 and prior, WHR-G301N firmware Ver.1.86 and prior, WHR-HP-G300N firmware Ver.1.99 and prior, WHR-HP-GN firmware Ver.1.86 and prior, WPL-05G300 firmware Ver.1.87 and prior, WZR-450HP-CWT firmware Ver.1.99 and prior, WZR-450HP-UB firmware Ver.1.99 and prior, WZR-HP-AG300H firmware Ver.1.75 and prior, WZR-HP-G300NH firmware Ver.1.83 and prior, WZR-HP-G301NH firmware Ver.1.83 and prior, WZR-HP-G302H firmware Ver.1.85 and prior, WZR-HP-G450H firmware Ver.1.89 and prior, WZR-300HP firmware Ver.1.99 and prior, WZR-450HP firmware Ver.1.99 and prior, WZR-600DHP firmware Ver.1.99 and prior, WZR-D1100H firmware Ver.1.99 and prior, FS-HP-G300N firmware Ver.3.32 and prior, FS-600DHP firmware Ver.3.38 and prior, FS-R600DHP firmware Ver.3.39 and prior, and FS-G300N firmware Ver.3.13 and prior) allows remote unauthenticated attackers to obtain information such as configuration via unspecified vectors. | CWE-863 |
165,011 | CVE-2021-3512 | 8.8 | 8.3 | HIGH | Improper access control vulnerability in Buffalo broadband routers (BHR-4GRV firmware Ver.1.99 and prior, DWR-HP-G300NH firmware Ver.1.83 and prior, HW-450HP-ZWE firmware Ver.1.99 and prior, WHR-300HP firmware Ver.1.99 and prior, WHR-300 firmware Ver.1.99 and prior, WHR-G301N firmware Ver.1.86 and prior, WHR-HP-G300N firmware Ver.1.99 and prior, WHR-HP-GN firmware Ver.1.86 and prior, WPL-05G300 firmware Ver.1.87 and prior, WZR-450HP-CWT firmware Ver.1.99 and prior, WZR-450HP-UB firmware Ver.1.99 and prior, WZR-HP-AG300H firmware Ver.1.75 and prior, WZR-HP-G300NH firmware Ver.1.83 and prior, WZR-HP-G301NH firmware Ver.1.83 and prior, WZR-HP-G302H firmware Ver.1.85 and prior, WZR-HP-G450H firmware Ver.1.89 and prior, WZR-300HP firmware Ver.1.99 and prior, WZR-450HP firmware Ver.1.99 and prior, WZR-600DHP firmware Ver.1.99 and prior, WZR-D1100H firmware Ver.1.99 and prior, FS-HP-G300N firmware Ver.3.32 and prior, FS-600DHP firmware Ver.3.38 and prior, FS-R600DHP firmware Ver.3.39 and prior, and FS-G300N firmware Ver.3.13 and prior) allows remote unauthenticated attackers to bypass access restriction and to start telnet service and execute arbitrary OS commands with root privileges via unspecified vectors. | CWE-863 |
165,012 | CVE-2021-3514 | 6.5 | 4 | MEDIUM | When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash. | CWE-476 |
165,013 | CVE-2021-3515 | 6.7 | 7.2 | MEDIUM | A shell injection flaw was found in pglogical in versions before 2.3.4 and before 3.6.26. An attacker with CREATEDB privileges on a PostgreSQL server can craft a database name that allows execution of shell commands as the postgresql user when calling pglogical.create_subscription(). | CWE-77 |
165,014 | CVE-2021-3516 | 7.8 | 6.8 | HIGH | There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability. | CWE-416 |
165,015 | CVE-2021-3517 | 8.6 | 7.5 | HIGH | There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application. | CWE-787 |
165,016 | CVE-2021-3518 | 8.8 | 6.8 | HIGH | There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability. | CWE-416 |
165,017 | CVE-2021-3519 | 6.8 | 6.9 | MEDIUM | A vulnerability was reported in some Lenovo Desktop models that could allow unauthorized access to the boot menu, when the "BIOS Password At Boot Device List" BIOS setting is Yes. | CWE-287 |
165,018 | CVE-2021-35193 | 7.5 | 5 | HIGH | Patterson Application Service in Patterson Eaglesoft 18 through 21 accepts the same certificate authentication across different customers' installations (that have the same software version). This provides remote access to SQL database credentials. (In the normal use of the product, retrieving those credentials only occurs after a username/password authentication step; however, this authentication step is on the client side, and an attacker can develop their own client that skips this step.) | CWE-295 |
165,019 | CVE-2021-35196 | 7.8 | 6.8 | HIGH | ** DISPUTED ** Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file. | CWE-502 |
165,020 | CVE-2021-35197 | 7.5 | 5 | HIGH | In MediaWiki before 1.31.15, 1.32.x through 1.35.x before 1.35.3, and 1.36.x before 1.36.1, bots have certain unintended API access. When a bot account has a "sitewide block" applied, it is able to still "purge" pages through the MediaWiki Action API (which a "sitewide block" should have prevented). | CWE-668 |
165,021 | CVE-2021-35198 | 5.4 | 3.5 | MEDIUM | NETSCOUT nGeniusONE 6.3.0 build 1004 and earlier allows Stored Cross-Site Scripting (XSS) in the Packet Analysis module. | CWE-79 |
165,022 | CVE-2021-35199 | 5.4 | 3.5 | MEDIUM | NETSCOUT nGeniusONE 6.3.0 build 1196 and earlier allows Stored Cross-Site Scripting (XSS) in UploadFile. | CWE-79 |
165,023 | CVE-2021-3520 | 9.8 | 7.5 | CRITICAL | There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well. | CWE-787 |
165,024 | CVE-2021-3520 | 9.8 | 7.5 | CRITICAL | There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well. | CWE-190 |
165,025 | CVE-2021-35200 | 4.8 | 3.5 | MEDIUM | NETSCOUT nGeniusONE 6.3.0 build 1196 allows high-privileged users to achieve Stored Cross-Site Scripting (XSS) in FDSQueryService. | CWE-79 |
165,026 | CVE-2021-35201 | 6.5 | 4.3 | MEDIUM | NEI in NETSCOUT nGeniusONE 6.3.0 build 1196 allows XML External Entity (XXE) attacks. | CWE-611 |
165,027 | CVE-2021-35202 | 4.3 | 4.3 | MEDIUM | NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Authorization Bypass (to access an endpoint) in FDSQueryService. | CWE-863 |
165,028 | CVE-2021-35203 | 5.7 | 3.5 | MEDIUM | NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Arbitrary File Read operations via the FDSQueryService endpoint. | CWE-552 |
165,029 | CVE-2021-35204 | 5.4 | 3.5 | MEDIUM | NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Reflected Cross-Site Scripting (XSS) in the support endpoint. | CWE-79 |
165,030 | CVE-2021-35205 | 5.4 | 4.9 | MEDIUM | NETSCOUT Systems nGeniusONE version 6.3.0 build 1196 allows URL redirection in redirector. | CWE-601 |
165,031 | CVE-2021-35206 | 6.1 | 5.8 | MEDIUM | Gitpod before 0.6.0 allows unvalidated redirects. | CWE-601 |
165,032 | CVE-2021-35207 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Zimbra Collaboration Suite 8.8 before 8.8.15 Patch 23 and 9.0 before 9.0.0 Patch 16. An XSS vulnerability exists in the login component of Zimbra Web Client, in which an attacker can execute arbitrary JavaScript by adding executable JavaScript to the loginErrorCode parameter of the login url. | CWE-79 |
165,033 | CVE-2021-35208 | 5.4 | 3.5 | MEDIUM | An issue was discovered in ZmMailMsgView.js in the Calendar Invite component in Zimbra Collaboration Suite 8.8.x before 8.8.15 Patch 23. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document. | CWE-79 |
165,034 | CVE-2021-35209 | 9.8 | 7.5 | CRITICAL | An issue was discovered in ProxyServlet.java in the /proxy servlet in Zimbra Collaboration Suite 8.8 before 8.8.15 Patch 23 and 9.x before 9.0.0 Patch 16. The value of the X-Host header overwrites the value of the Host header in proxied requests. The value of X-Host header is not checked against the whitelist of hosts Zimbra is allowed to proxy to (the zimbraProxyAllowedDomains setting). | CWE-918 |
165,035 | CVE-2021-35210 | 6.1 | 4.3 | MEDIUM | Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end. | CWE-79 |
165,036 | CVE-2021-35211 | 10 | 10 | CRITICAL | Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability. | CWE-668 |
165,037 | CVE-2021-35212 | 8.8 | 9 | HIGH | An SQL injection Privilege Escalation Vulnerability was discovered in the Orion Platform reported by the ZDI Team. A blind Boolean SQL injection which could lead to full read/write over the Orion database content including the Orion certificate for any authenticated user. | CWE-89 |
165,038 | CVE-2021-35213 | 8.8 | 9 | HIGH | An Improper Access Control Privilege Escalation Vulnerability was discovered in the User Setting of Orion Platform version 2020.2.5. It allows a guest user to elevate privileges to the Administrator using this vulnerability. Authentication is required to exploit the vulnerability. | CWE-269 |
165,039 | CVE-2021-35214 | 4.7 | 1.9 | MEDIUM | The vulnerability in SolarWinds Pingdom can be described as a failure to invalidate user session upon password or email address change. When running multiple active sessions in separate browser windows, it was observed a password or email address change could be changed without terminating the user session. This issue has been resolved on September 13, 2021. | CWE-613 |
165,040 | CVE-2021-35215 | 8.8 | 6.5 | HIGH | Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability. | CWE-502 |
165,041 | CVE-2021-35216 | 8.8 | 9 | HIGH | Insecure Deserialization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module. An Authenticated Attacker with network access via HTTP can compromise this vulnerability can result in Remote Code Execution. | CWE-502 |
165,042 | CVE-2021-35217 | 8.8 | 6.5 | HIGH | Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data. | CWE-502 |
165,043 | CVE-2021-35218 | 8.8 | 6.5 | HIGH | Deserialization of Untrusted Data in the Web Console Chart Endpoint can lead to remote code execution. An unauthorized attacker who has network access to the Orion Patch Manager Web Console could potentially exploit this and compromise the server | CWE-502 |
165,044 | CVE-2021-35219 | 4.9 | 4 | MEDIUM | ExportToPdfCmd Arbitrary File Read Information Disclosure Vulnerability using ImportAlert function within the Alerts Settings page. | CWE-668 |
165,045 | CVE-2021-3522 | 5.5 | 4.3 | MEDIUM | GStreamer before 1.18.4 may perform an out-of-bounds read when handling certain ID3v2 tags. | CWE-125 |
165,046 | CVE-2021-35220 | 7.2 | 6.5 | HIGH | Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page. | CWE-77 |
165,047 | CVE-2021-35221 | 8.1 | 5.5 | HIGH | Improper Access Control Tampering Vulnerability using ImportAlert function which can lead to a Remote Code Execution (RCE) from the Alerts Settings page. | CWE-732 |
165,048 | CVE-2021-35222 | 9.6 | 4.3 | CRITICAL | This vulnerability allows attackers to impersonate users and perform arbitrary actions leading to a Remote Code Execution (RCE) from the Alerts Settings page. | CWE-79 |
165,049 | CVE-2021-35223 | 8.8 | 6.5 | HIGH | The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of user string variables, allowing remote code execution. | NVD-CWE-noinfo |
165,050 | CVE-2021-35225 | 6.4 | 5.5 | MEDIUM | Each authenticated Orion Platform user in a MSP (Managed Service Provider) environment can view and browse all NetPath Services from all that MSP's customers. This can lead to any user having a limited insight into other customer's infrastructure and potential data cross-contamination. | CWE-269 |
165,051 | CVE-2021-35227 | 7.8 | 4.6 | HIGH | The HTTP interface was enabled for RabbitMQ Plugin in ARM 2020.2.6 and the ability to configure HTTPS was not available. | CWE-502 |
165,052 | CVE-2021-35228 | 4.7 | 2.6 | MEDIUM | This vulnerability occurred due to missing input sanitization for one of the output fields that is extracted from headers on specific section of page causing a reflective cross site scripting attack. An attacker would need to perform a Man in the Middle attack in order to change header for a remote victim. | CWE-79 |
165,053 | CVE-2021-35230 | 6.7 | 7.2 | MEDIUM | As a result of an unquoted service path vulnerability present in the Kiwi CatTools Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. | CWE-22 |
165,054 | CVE-2021-35231 | 6.7 | 4.6 | MEDIUM | As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Kiwi Syslog Server\Parameters\Application". | CWE-428 |
165,055 | CVE-2021-35233 | 5.3 | 5 | MEDIUM | The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies. | NVD-CWE-noinfo |
165,056 | CVE-2021-35235 | 5.3 | 5 | MEDIUM | The ASP.NET debug feature is enabled by default in Kiwi Syslog Server 9.7.2 and previous versions. ASP.NET allows remote debugging of web applications, if configured to do so. Debug mode causes ASP.NET to compile applications with extra information. The information enables a debugger to closely monitor and control the execution of an application. If an attacker could successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure that may be valuable in targeting SWI with malicious intent. | NVD-CWE-noinfo |
165,057 | CVE-2021-35236 | 5.3 | 5 | MEDIUM | The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7.2 and previous versions. The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP, there is a potential for the cookie can be sent in clear text. | CWE-311 |
165,058 | CVE-2021-35237 | 4.3 | 4.3 | MEDIUM | A missing HTTP header (X-Frame-Options) in Kiwi Syslog Server has left customers vulnerable to click jacking. Clickjacking is an attack that occurs when an attacker uses a transparent iframe in a window to trick a user into clicking on an actionable item, such as a button or link, to another server in which they have an identical webpage. The attacker essentially hijacks the user activity intended for the original server and sends them to the other server. This is an attack on both the user and the server. | NVD-CWE-Other |
165,059 | CVE-2021-35238 | 4.8 | 3.5 | MEDIUM | User with Orion Platform Admin Rights could store XSS through URL POST parameter in CreateExternalWebsite website. | CWE-79 |
165,060 | CVE-2021-35239 | 5.4 | 3.5 | MEDIUM | A security researcher found a user with Orion map manage rights could store XSS through via text box hyperlink. | CWE-79 |
165,061 | CVE-2021-3524 | 6.5 | 4.3 | MEDIUM | A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created. | CWE-20 |
165,062 | CVE-2021-35240 | 4.8 | 3.5 | MEDIUM | A security researcher stored XSS via a Help Server setting. This affects customers using Internet Explorer, because they do not support 'rel=noopener'. | CWE-79 |
165,063 | CVE-2021-35242 | 8.8 | 6.8 | HIGH | Serv-U server responds with valid CSRFToken when the request contains only Session. | CWE-352 |
165,064 | CVE-2021-35245 | 6.8 | 6.8 | MEDIUM | When a user has admin rights in Serv-U Console, the user can move, create and delete any files are able to be accessed on the Serv-U host machine. | CWE-269 |
165,065 | CVE-2021-35265 | 6.1 | 4.3 | MEDIUM | A reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page. | CWE-79 |
165,066 | CVE-2021-35266 | 7.8 | 6.9 | HIGH | In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure, denial of service and even code execution. | CWE-787 |
165,067 | CVE-2021-35267 | 7.8 | 6.9 | HIGH | NTFS-3G versions < 2021.8.22, a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root. | CWE-787 |
165,068 | CVE-2021-35268 | 7.8 | 6.9 | HIGH | In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur allowing for code execution and escalation of privileges. | CWE-787 |
165,069 | CVE-2021-35269 | 7.8 | 6.9 | HIGH | NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges. | CWE-269 |
165,070 | CVE-2021-3527 | 5.5 | 2.1 | MEDIUM | A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service. | CWE-770 |
165,071 | CVE-2021-3528 | 8.8 | 6.5 | HIGH | A flaw was found in noobaa-operator in versions before 5.7.0, where internal RPC AuthTokens between the noobaa operator and the noobaa core are leaked into log files. An attacker with access to the log files could use this AuthToken to gain additional access into noobaa deployment and can read/modify system configuration. | CWE-532 |
165,072 | CVE-2021-3528 | 8.8 | 6.5 | HIGH | A flaw was found in noobaa-operator in versions before 5.7.0, where internal RPC AuthTokens between the noobaa operator and the noobaa core are leaked into log files. An attacker with access to the log files could use this AuthToken to gain additional access into noobaa deployment and can read/modify system configuration. | CWE-522 |
165,073 | CVE-2021-3529 | 7.1 | 6.8 | HIGH | A flaw was found in noobaa-core in versions before 5.7.0. This flaw results in the name of an arbitrarily URL being copied into an HTML document as plain text between tags, including potentially a payload script. The input was echoed unmodified in the application response, resulting in arbitrary JavaScript being injected into an application's response. The highest threat to the system is for confidentiality, availability, and integrity. | CWE-79 |
165,074 | CVE-2021-35296 | 9.8 | 7.5 | CRITICAL | An issue in the administrator authentication panel of PTCL HG150-Ub v3.0 allows attackers to bypass authentication via modification of the cookie value and Response Path. | CWE-287 |
165,075 | CVE-2021-35297 | 7.8 | 6.8 | HIGH | Scalabium dBase Viewer version 2.6 (Build 5.751) is vulnerable to remote code execution via a crafted DBF file that triggers a buffer overflow. An attacker can use the Structured Exception Handler (SEH) records and redirect execution to attacker-controlled code. | CWE-120 |
165,076 | CVE-2021-35298 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS) in Zammad 1.0.x up to 4.0.0 allows remote attackers to execute arbitrary web script or HTML via multiple models that contain a 'note' field to store additional information. | CWE-79 |
165,077 | CVE-2021-35299 | 7.5 | 5 | HIGH | Incorrect Access Control in Zammad 1.0.x up to 4.0.0 allows attackers to obtain sensitive information via email connection configuration probing. | CWE-668 |
165,078 | CVE-2021-3530 | 7.5 | 5 | HIGH | A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash. | CWE-674 |
165,079 | CVE-2021-35300 | 4.3 | 4.3 | MEDIUM | Text injection/Content Spoofing in 404 page in Zammad 1.0.x up to 4.0.0 could allow remote attackers to manipulate users into visiting the attackers' page. | CWE-1021 |
165,080 | CVE-2021-35301 | 5.3 | 5 | MEDIUM | Incorrect Access Control in Zammad 1.0.x up to 4.0.0 allows remote attackers to obtain sensitive information via the Ticket Article detail view. | CWE-668 |
165,081 | CVE-2021-35302 | 5.3 | 5 | MEDIUM | Incorrect Access Control for linked Tickets in Zammad 1.0.x up to 4.0.0 allows remote attackers to obtain sensitive information. | CWE-668 |
165,082 | CVE-2021-35303 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS) in Zammad 1.0.x up to 4.0.0 allows remote attackers to execute arbitrary web script or HTML via the User Avatar attribute. | CWE-79 |
165,083 | CVE-2021-35306 | 6.5 | 4.3 | MEDIUM | An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the function AP4_StszAtom::WriteFields located in Ap4StszAtom.cpp. It allows an attacker to cause a denial of service (DOS). | CWE-476 |
165,084 | CVE-2021-35307 | 6.5 | 4.3 | MEDIUM | An issue was discovered in Bento4 through v1.6.0-636. A NULL pointer dereference exists in the AP4_DescriptorFinder::Test component located in /Core/Ap4Descriptor.h. It allows an attacker to cause a denial of service (DOS). | CWE-476 |
165,085 | CVE-2021-3531 | 5.3 | 5 | MEDIUM | A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes it can cause the rgw to crash, resulting in a denial of service. The greatest threat to the system is of availability. | CWE-20 |
165,086 | CVE-2021-35312 | 7.8 | 7.2 | HIGH | A vulnerability was found in CIR 2000 / Gestionale Amica Prodigy v1.7. The Amica Prodigy's executable "RemoteBackup.Service.exe" has incorrect permissions, allowing a local unprivileged user to replace it with a malicious file that will be executed with "LocalSystem" privileges. | CWE-276 |
165,087 | CVE-2021-3532 | 5.5 | 4.3 | MEDIUM | A flaw was found in Ansible where the secret information present in async_files are getting disclosed when the user changes the jobdir to a world readable directory. Any secret information in an async status file will be readable by a malicious user on that system. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2. | CWE-200 |
165,088 | CVE-2021-35323 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS) vulnerability exists in bludit 3-13-1 via the username in admin/login. | CWE-79 |
165,089 | CVE-2021-35324 | 9.8 | 7.5 | CRITICAL | A vulnerability in the Form_Login function of TOTOLINK A720R A720R_Firmware V4.1.5cu.470_B20200911 allows attackers to bypass authentication. | CWE-287 |
165,090 | CVE-2021-35325 | 7.5 | 5 | HIGH | A stack overflow in the checkLoginUser function of TOTOLINK A720R A720R_Firmware v4.1.5cu.470_B20200911 allows attackers to cause a denial of service (DOS). | CWE-787 |
165,091 | CVE-2021-35326 | 7.5 | 5 | HIGH | A vulnerability in TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows attackers to download the configuration file via sending a crafted HTTP request. | NVD-CWE-noinfo |
165,092 | CVE-2021-35327 | 9.8 | 7.5 | CRITICAL | A vulnerability in TOTOLINK A720R A720R_Firmware v4.1.5cu.470_B20200911 allows attackers to start the Telnet service, then login with the default credentials via a crafted POST request. | CWE-862 |
165,093 | CVE-2021-3533 | 2.5 | 1.2 | LOW | A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2. | CWE-367 |
165,094 | CVE-2021-35331 | 7.8 | 6.8 | HIGH | ** DISPUTED ** In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crafted file. NOTE: multiple third parties dispute the significance of this finding. | CWE-134 |
165,095 | CVE-2021-35336 | 9.8 | 7.5 | CRITICAL | Tieline IP Audio Gateway 2.6.4.8 and below is affected by Incorrect Access Control. A vulnerability in the Tieline Web Administrative Interface could allow an unauthenticated user to access a sensitive part of the system with a high privileged account. | CWE-863 |
165,096 | CVE-2021-35337 | 4.3 | 4 | MEDIUM | Sourcecodester Phone Shop Sales Managements System 1.0 is vulnerable to Insecure Direct Object Reference (IDOR). Any attacker will be able to see the invoices of different users by changing the id parameter. | CWE-706 |
165,097 | CVE-2021-35342 | 7.5 | 4.3 | HIGH | The useradm service 1.14.0 (in Northern.tech Mender Enterprise 2.7.x before 2.7.1) and 1.13.0 (in Northern.tech Mender Enterprise 2.6.x before 2.6.1) allows users to access the system with their JWT token after logout, because of missing invalidation (if the JWT verification cache is enabled). | CWE-613 |
165,098 | CVE-2021-35343 | 4.3 | 4.3 | MEDIUM | Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.Ajax.php in SeedDMS v5.1.x<5.1.23 and v6.0.x<6.0.16 allows a remote attacker to edit document name without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. | CWE-352 |
165,099 | CVE-2021-35344 | 9.8 | 7.5 | CRITICAL | tsMuxer v2.6.16 was discovered to contain a heap-based buffer overflow via the function BitStreamReader::getCurVal in bitStream.h. | CWE-787 |
165,100 | CVE-2021-35346 | 9.8 | 7.5 | CRITICAL | tsMuxer v2.6.16 was discovered to contain a heap-based buffer overflow via the function HevcSpsUnit::short_term_ref_pic_set(int) in hevc.cpp. | CWE-787 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.