ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
165,501 | CVE-2021-3613 | 7.8 | 4.4 | HIGH | OpenVPN Connect 3.2.0 through 3.3.0 allows local users to load arbitrary dynamic loadable libraries via an OpenSSL configuration file if present, which allows the user to run arbitrary code with the same privilege level as the main OpenVPN process (OpenVPNConnect.exe). | CWE-427 |
165,502 | CVE-2021-36130 | 4.8 | 3.5 | MEDIUM | An XSS issue was discovered in the SocialProfile extension in MediaWiki through 1.36. Within several gift-related special pages, a privileged user with the awardmanage right could inject arbitrary HTML and JavaScript within various gift-related data fields. The attack could easily propagate across many pages for many users. | CWE-79 |
165,503 | CVE-2021-36131 | 4.8 | 3.5 | MEDIUM | An XSS issue was discovered in the SportsTeams extension in MediaWiki through 1.36. Within several special pages, a privileged user could inject arbitrary HTML and JavaScript within various data fields. The attack could easily propagate across many pages for many users. | CWE-79 |
165,504 | CVE-2021-36132 | 8.8 | 6 | HIGH | An issue was discovered in the FileImporter extension in MediaWiki through 1.36. For certain relaxed configurations of the $wgFileImporterRequiredRight variable, it might not validate all appropriate user rights, thus allowing a user with insufficient rights to perform operations (specifically file uploads) that they should not be allowed to perform. | CWE-863 |
165,505 | CVE-2021-36133 | 7.1 | 3.6 | HIGH | The OPTEE-OS CSU driver for NXP i.MX SoC devices lacks security access configuration for several models, resulting in TrustZone bypass because the NonSecure World can perform arbitrary memory read/write operations on Secure World memory. This involves a DMA capable peripheral. | CWE-732 |
165,506 | CVE-2021-36134 | 6.5 | 3.3 | MEDIUM | Out of bounds write vulnerability in the JPEG parsing code of Netop Vision Pro up to and including 9.7.2 allows an adjacent unauthenticated attacker to write to arbitrary memory potentially leading to a Denial of Service (DoS). | CWE-787 |
165,507 | CVE-2021-3614 | 6.8 | 4.4 | MEDIUM | A vulnerability was reported on some Lenovo Notebook systems that could allow an attacker with physical access to elevate privileges under certain conditions during a BIOS update performed by Lenovo Vantage. | NVD-CWE-noinfo |
165,508 | CVE-2021-36143 | 7.5 | 5 | HIGH | ACRN before 2.5 has a hw/pci/virtio/virtio.c vq_endchains NULL Pointer Dereference. | CWE-476 |
165,509 | CVE-2021-36144 | 7.5 | 5 | HIGH | The polling timer handler in ACRN before 2.5 has a use-after-free for a freed virtio device, related to devicemodel/hw/pci/virtio/*.c. | CWE-416 |
165,510 | CVE-2021-36145 | 7.5 | 5 | HIGH | The Device Model in ACRN through 2.5 has a devicemodel/core/mem.c use-after-free for a freed rb_entry. | CWE-416 |
165,511 | CVE-2021-36146 | 7.5 | 5 | HIGH | ACRN before 2.5 has a devicemodel/hw/pci/xhci.c NULL Pointer Dereference for a trb pointer. | CWE-476 |
165,512 | CVE-2021-36147 | 7.5 | 5 | HIGH | An issue was discovered in ACRN before 2.5. It allows a devicemodel/hw/pci/virtio/virtio_net.c virtio_net_ping_rxq NULL pointer dereference for vq->used. | CWE-476 |
165,513 | CVE-2021-36148 | 7.8 | 6.8 | HIGH | An issue was discovered in ACRN before 2.5. dmar_free_irte in hypervisor/arch/x86/vtd.c allows an irte_alloc_bitmap buffer overflow. | CWE-120 |
165,514 | CVE-2021-3615 | 6.8 | 4.6 | MEDIUM | A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow code execution if a specific file exists on the attached SD card. This vulnerability is the same as CNVD-2021-45262. | CWE-94 |
165,515 | CVE-2021-36150 | 6.1 | 4.3 | MEDIUM | SilverStripe Framework through 4.8.1 allows XSS. | CWE-79 |
165,516 | CVE-2021-36153 | 7.5 | 5 | HIGH | Mismanaged state in GRPCWebToHTTP2ServerCodec.swift in gRPC Swift 1.1.0 and 1.1.1 allows remote attackers to deny service by sending malformed requests. | NVD-CWE-Other |
165,517 | CVE-2021-36154 | 7.5 | 5 | HIGH | HTTP2ToRawGRPCServerCodec in gRPC Swift 1.1.1 and earlier allows remote attackers to deny service via the delivery of many small messages within a single HTTP/2 frame, leading to Uncontrolled Recursion and stack consumption. | CWE-674 |
165,518 | CVE-2021-36155 | 7.5 | 5 | HIGH | LengthPrefixedMessageReader in gRPC Swift 1.1.0 and earlier allocates buffers of arbitrary length, which allows remote attackers to cause uncontrolled resource consumption and deny service. | CWE-120 |
165,519 | CVE-2021-36156 | 5.3 | 5 | MEDIUM | An issue was discovered in Grafana Loki through 2.2.1. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Loki will attempt to parse a rules file at that location and include some of the contents in the error message. | CWE-22 |
165,520 | CVE-2021-36157 | 5.3 | 5 | MEDIUM | An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.) | CWE-22 |
165,521 | CVE-2021-36158 | 5.9 | 4.3 | MEDIUM | In the xrdp package (in branches through 3.14) for Alpine Linux, RDP sessions are vulnerable to man-in-the-middle attacks because pre-generated RSA certificates and private keys are used. | CWE-312 |
165,522 | CVE-2021-36159 | 9.1 | 6.4 | CRITICAL | libfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the '\0' terminator one byte too late. | CWE-125 |
165,523 | CVE-2021-3616 | 9.8 | 7.5 | CRITICAL | A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow an unauthorized user to view device information, alter firmware content and device configuration. This vulnerability is the same as CNVD-2020-68651. | NVD-CWE-Other |
165,524 | CVE-2021-36160 | 7.5 | 5 | HIGH | A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive). | CWE-125 |
165,525 | CVE-2021-36161 | 9.8 | 7.5 | CRITICAL | Some component in Dubbo will try to print the formated string of the input arguments, which will possibly cause RCE for a maliciously customized bean with special toString method. In the latest version, we fix the toString call in timeout, cache and some other places. Fixed in Apache Dubbo 2.7.13 | CWE-134 |
165,526 | CVE-2021-36162 | 8.8 | 6.5 | HIGH | Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library to load the rules which by default will enable calling arbitrary constructors. An attacker with access to the configuration center he will be able to poison the rule so when retrieved by the consumers, it will get RCE on all of them. This was fixed in Dubbo 2.7.13, 3.0.2 | NVD-CWE-noinfo |
165,527 | CVE-2021-36163 | 9.8 | 7.5 | CRITICAL | In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1 | CWE-502 |
165,528 | CVE-2021-36165 | 5.3 | 5 | MEDIUM | RICON Industrial Cellular Router S9922L 16.10.3(3794) is affected by cleartext storage of sensitive information and sends username and password as base64. | CWE-312 |
165,529 | CVE-2021-36167 | 5.3 | 5 | MEDIUM | An improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control via modifying the session-id paramater. | CWE-863 |
165,530 | CVE-2021-36168 | 6.5 | 4 | MEDIUM | A Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Fortinet FortiPortal 6.x before 6.0.5, FortiPortal 5.3.x before 5.3.6 and any FortiPortal before 6.2.5 allows authenticated attacker to disclosure information via crafted GET request with malicious parameter values. | CWE-22 |
165,531 | CVE-2021-36169 | 6 | 6.6 | MEDIUM | A Hidden Functionality in Fortinet FortiOS 7.x before 7.0.1, FortiOS 6.4.x before 6.4.7 allows attacker to Execute unauthorized code or commands via specific hex read/write operations. | CWE-863 |
165,532 | CVE-2021-3617 | 7.2 | 6.5 | HIGH | A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow command injection by setting a specially crafted network configuration. This vulnerability is the same as CNVD-2020-68652. | CWE-77 |
165,533 | CVE-2021-36170 | 3.2 | 2.1 | LOW | An information disclosure vulnerability [CWE-200] in FortiAnalyzerVM and FortiManagerVM versions 7.0.0 and 6.4.6 and below may allow an authenticated attacker to read the FortiCloud credentials which were used to activate the trial license in cleartext. | CWE-522 |
165,534 | CVE-2021-36172 | 8.1 | 6.4 | HIGH | An improper restriction of XML external entity reference vulnerability in the parser of XML responses of FortiPortal before 6.0.6 may allow an attacker who controls the producer of XML reports consumed by FortiPortal to trigger a denial of service or read arbitrary files from the underlying file system by means of specifically crafted XML documents. | CWE-611 |
165,535 | CVE-2021-36173 | 8.8 | 6.8 | HIGH | A heap-based buffer overflow in the firmware signature verification function of FortiOS versions 7.0.1, 7.0.0, 6.4.0 through 6.4.6, 6.2.0 through 6.2.9, and 6.0.0 through 6.0.13 may allow an attacker to execute arbitrary code via specially crafted installation images. | CWE-787 |
165,536 | CVE-2021-36174 | 7.5 | 5 | HIGH | A memory allocation with excessive size value vulnerability in the license verification function of FortiPortal before 6.0.6 may allow an attacker to perform a denial of service attack via specially crafted license blobs. | CWE-770 |
165,537 | CVE-2021-36175 | 5.4 | 3.5 | MEDIUM | An improper neutralization of input vulnerability [CWE-79] in FortiWebManager versions 6.2.3 and below, 6.0.2 and below may allow a remote authenticated attacker to inject malicious script/tags via the name/description/comments parameter of various sections of the device. | CWE-79 |
165,538 | CVE-2021-36176 | 6.1 | 4.3 | MEDIUM | Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests. | CWE-79 |
165,539 | CVE-2021-36178 | 6.5 | 4 | MEDIUM | A insufficiently protected credentials in Fortinet FortiSDNConnector version 1.1.7 and below allows attacker to disclose third-party devices credential information via configuration page lookup. | CWE-522 |
165,540 | CVE-2021-36179 | 8.8 | 6.5 | HIGH | A stack-based buffer overflow in Fortinet FortiWeb version 6.3.14 and below, 6.2.4 and below allows attacker to execute unauthorized code or commands via crafted parameters in CLI command execution | CWE-787 |
165,541 | CVE-2021-36180 | 8.8 | 6.5 | HIGH | Multiple improper neutralization of special elements used in a command vulnerabilities [CWE-77] in FortiWeb management interface 6.4.1 and below, 6.3.15 and below, 6.2.5 and below may allow an authenticated attacker to execute unauthorized code or commands via crafted parameters of HTTP requests. | CWE-77 |
165,542 | CVE-2021-36181 | 3.1 | 3.5 | LOW | A concurrent execution using shared resource with improper Synchronization vulnerability ('Race Condition') in the customer database interface of FortiPortal before 6.0.6 may allow an authenticated, low-privilege user to bring the underlying database data into an inconsistent state via specific coordination of web requests. | CWE-362 |
165,543 | CVE-2021-36182 | 8.8 | 6.5 | HIGH | A Improper neutralization of special elements used in a command ('Command Injection') in Fortinet FortiWeb version 6.3.13 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests | CWE-78 |
165,544 | CVE-2021-36183 | 7.8 | 7.2 | HIGH | An improper authorization vulnerability [CWE-285] in FortiClient for Windows versions 7.0.1 and below and 6.4.2 and below may allow a local unprivileged attacker to escalate their privileges to SYSTEM via the named pipe responsible for Forticlient updates. | CWE-863 |
165,545 | CVE-2021-36184 | 6.5 | 4 | MEDIUM | A improper neutralization of Special Elements used in an SQL Command ('SQL Injection') in Fortinet FortiWLM version 8.6.1 and below allows attacker to disclosure device, users and database information via crafted HTTP requests. | CWE-89 |
165,546 | CVE-2021-36185 | 8.8 | 6.5 | HIGH | A improper neutralization of special elements used in an OS command ('OS Command Injection') in Fortinet FortiWLM version 8.6.1 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests. | CWE-78 |
165,547 | CVE-2021-36186 | 9.8 | 7.5 | CRITICAL | A stack-based buffer overflow in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests | CWE-787 |
165,548 | CVE-2021-36187 | 7.5 | 5 | HIGH | A uncontrolled resource consumption in Fortinet FortiWeb version 6.4.0, version 6.3.15 and below, 6.2.5 and below allows attacker to cause a denial of service for webserver daemon via crafted HTTP requests | CWE-400 |
165,549 | CVE-2021-36188 | 6.1 | 4.3 | MEDIUM | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to execute unauthorized code or commands via crafted GET parameters in requests to login and error handlers | CWE-79 |
165,550 | CVE-2021-36189 | 4.9 | 4 | MEDIUM | A missing encryption of sensitive data in Fortinet FortiClientEMS version 7.0.1 and below, version 6.4.4 and below allows attacker to information disclosure via inspecting browser decrypted data | CWE-311 |
165,551 | CVE-2021-3619 | 4.8 | 3.5 | MEDIUM | Rapid7 Velociraptor 0.5.9 and prior is vulnerable to a post-authentication persistent cross-site scripting (XSS) issue, where an authenticated user could abuse MIME filetype sniffing to embed executable code on a malicious upload. This issue was fixed in version 0.6.0. Note that login rights to Velociraptor is nearly always reserved for trusted and verified users with IT security backgrounds. | CWE-79 |
165,552 | CVE-2021-36190 | 6.3 | 6.5 | MEDIUM | A unintended proxy or intermediary ('confused deputy') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows an unauthenticated attacker to access protected hosts via crafted HTTP requests. | CWE-610 |
165,553 | CVE-2021-36191 | 5.4 | 4.9 | MEDIUM | A url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to use the device as proxy via crafted GET parameters in requests to error handlers | CWE-601 |
165,554 | CVE-2021-36192 | 3.8 | 2.1 | LOW | An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiManager 7.0.1 and below, 6.4.6 and below, 6.2.x, 6.0.x, 5.6.0 may allow a FortiGate user to see scripts from other ADOMS. | CWE-668 |
165,555 | CVE-2021-36194 | 8.8 | 6.5 | HIGH | Multiple stack-based buffer overflows in the API controllers of FortiWeb 6.4.1, 6.4.0, and 6.3.0 through 6.3.15 may allow an authenticated attacker to achieve arbitrary code execution via specially crafted requests. | CWE-787 |
165,556 | CVE-2021-36195 | 8.8 | 9 | HIGH | Multiple command injection vulnerabilities in the command line interpreter of FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 may allow an authenticated attacker to execute arbitrary commands on the underlying system shell via specially crafted command arguments. | CWE-78 |
165,557 | CVE-2021-36198 | 7.5 | 5 | HIGH | Successful exploitation of this vulnerability could allow an unauthorized user to access sensitive data. | CWE-668 |
165,558 | CVE-2021-36209 | 9.8 | 7.5 | CRITICAL | In JetBrains Hub before 2021.1.13389, account takeover was possible during password reset. | CWE-640 |
165,559 | CVE-2021-3621 | null | null | null | A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | CWE-77 |
165,560 | CVE-2021-36212 | 6.1 | 4.3 | MEDIUM | app/View/SharingGroups/view.ctp in MISP before 2.4.146 allows stored XSS in the sharing groups view. | CWE-79 |
165,561 | CVE-2021-36213 | 7.5 | 5 | HIGH | HashiCorp Consul and Consul Enterprise 1.9.0 through 1.10.0 default deny policy with a single L7 application-aware intention deny action cancels out, causing the intention to incorrectly fail open, allowing L4 traffic. Fixed in 1.9.8 and 1.10.1. | NVD-CWE-noinfo |
165,562 | CVE-2021-36214 | 6.1 | 4.3 | MEDIUM | LINE client for iOS before 10.16.3 allows cross site script with specific header in WebView. | CWE-79 |
165,563 | CVE-2021-36215 | 5.3 | 5 | MEDIUM | LINE client for iOS 10.21.3 and before allows address bar spoofing due to inappropriate address handling. | NVD-CWE-noinfo |
165,564 | CVE-2021-36216 | 7.8 | 4.6 | HIGH | LINE for Windows 6.2.1.2289 and before allows arbitrary code execution via malicious DLL injection. | CWE-427 |
165,565 | CVE-2021-36218 | 7.5 | 5 | HIGH | An issue was discovered in SKALE sgxwallet 1.58.3. sgx_disp_ippsAES_GCMEncrypt allows an out-of-bounds write, resulting in a segfault and compromised enclave. This issue describes a buffer overflow, which was resolved prior to v1.77.0 and not reproducible in latest sgxwallet v1.77.0 | CWE-787 |
165,566 | CVE-2021-36219 | 9.8 | 7.5 | CRITICAL | An issue was discovered in SKALE sgxwallet 1.58.3. The provided input for ECALL 14 triggers a branch in trustedEcdsaSign that frees a non-initialized pointer from the stack. An attacker can chain multiple enclave calls to prepare a stack that contains a valid address. This address is then freed, resulting in compromised integrity of the enclave. This was resolved after v1.58.3 and not reproducible in sgxwallet v1.77.0. | CWE-824 |
165,567 | CVE-2021-3622 | null | null | null | A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability. | CWE-400 |
165,568 | CVE-2021-36221 | 5.9 | 4.3 | MEDIUM | Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort. | CWE-362 |
165,569 | CVE-2021-36222 | 7.5 | 5 | HIGH | ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation. | CWE-476 |
165,570 | CVE-2021-36230 | 8.8 | 6.5 | HIGH | HashiCorp Terraform Enterprise releases up to v202106-1 did not properly perform authorization checks on a subset of API requests executed using the run token, allowing privilege escalation to organization owner. Fixed in v202107-1. | CWE-863 |
165,571 | CVE-2021-36231 | 8.8 | 9 | HIGH | Deserialization of untrusted data in multiple functions in MIK.starlight 7.9.5.24363 allows authenticated remote attackers to execute operating system commands by crafting serialized objects. | CWE-502 |
165,572 | CVE-2021-36232 | 8.8 | 6.5 | HIGH | Improper Authorization in multiple functions in MIK.starlight 7.9.5.24363 allows an authenticated attacker to escalate privileges. | CWE-863 |
165,573 | CVE-2021-36233 | 6.5 | 4 | MEDIUM | The function AdminGetFirstFileContentByFilePath in MIK.starlight 7.9.5.24363 allows (by design) an authenticated attacker to read arbitrary files from the filesystem by specifying the file path. | CWE-552 |
165,574 | CVE-2021-36234 | 5.5 | 2.1 | MEDIUM | Use of a hard-coded cryptographic key in MIK.starlight 7.9.5.24363 allows local users to decrypt credentials via unspecified vectors. | CWE-798 |
165,575 | CVE-2021-36235 | 7.8 | 4.6 | HIGH | An issue was discovered in Ivanti Workspace Control before 10.6.30.0. A locally authenticated user with low privileges can bypass File and Folder Security by leveraging an unspecified attack vector. As a result, the attacker can start applications with elevated privileges. | NVD-CWE-noinfo |
165,576 | CVE-2021-3625 | 9.8 | 7.5 | CRITICAL | Buffer overflow in Zephyr USB DFU DNLOAD. Zephyr versions >= v2.5.0 contain Heap-based Buffer Overflow (CWE-122). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363 | CWE-787 |
165,577 | CVE-2021-3626 | 8.8 | 4.6 | HIGH | The Windows version of Multipass before 1.7.0 allowed any local process to connect to the localhost TCP control socket to perform mounts from the operating system to a guest, allowing for privilege escalation. | CWE-269 |
165,578 | CVE-2021-36260 | 9.8 | 9.3 | CRITICAL | A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. | CWE-20 |
165,579 | CVE-2021-36260 | 9.8 | 9.3 | CRITICAL | A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. | CWE-77 |
165,580 | CVE-2021-36276 | 7.8 | 4.6 | HIGH | Dell DBUtilDrv2.sys driver (versions 2.5 and 2.6) contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required. | CWE-552 |
165,581 | CVE-2021-36277 | 7.8 | 7.2 | HIGH | Dell Command Update, Dell Update, and Alienware Update versions prior to 4.3 contains a Improper Certificate Verification vulnerability. A local authenticated malicious user could exploit this vulnerability by modifying local configuration files in order to execute arbitrary code on the system. | CWE-347 |
165,582 | CVE-2021-36278 | 5.5 | 2.1 | MEDIUM | Dell EMC PowerScale OneFS versions 8.2.x and 9.1.0.x contain an insertion of sensitive information into log files vulnerability. This means a malicious actor with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE privileges can access privileged information. | CWE-532 |
165,583 | CVE-2021-36279 | 7.8 | 7.2 | HIGH | Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an incorrect permission assignment for critical resource vulnerability. This could allow a user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE to access privileged information about the cluster. | CWE-732 |
165,584 | CVE-2021-3628 | 5.4 | 3.5 | MEDIUM | OpenKM Community Edition in its 6.3.10 version is vulnerable to authenticated Cross-site scripting (XSS). A remote attacker could exploit this vulnerability by injecting arbitrary code via de uuid parameter. | CWE-79 |
165,585 | CVE-2021-36280 | 5.5 | 2.1 | MEDIUM | Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an incorrect permission assignment for critical resource vulnerability. This could allow a user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE to access privileged information about the cluster. | CWE-732 |
165,586 | CVE-2021-36281 | 8.8 | 6.5 | HIGH | Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an incorrect permission assignment vulnerability. A low privileged authenticated user can potentially exploit this vulnerability to escalate privileges. | CWE-732 |
165,587 | CVE-2021-36282 | 3.3 | 2.1 | LOW | Dell EMC PowerScale OneFS versions 8.2.x - 9.1.0.x contain a use of uninitialized resource vulnerability. This can potentially allow an authenticated user with ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH privileges to gain access up to 24 bytes of data within the /ifs kernel stack under certain conditions. | CWE-755 |
165,588 | CVE-2021-36283 | 6.7 | 7.2 | MEDIUM | Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | CWE-20 |
165,589 | CVE-2021-36284 | 4.4 | 2.1 | MEDIUM | Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive admin password attempt mitigations in order to carry out a brute force attack. | CWE-307 |
165,590 | CVE-2021-36285 | 4.4 | 2.1 | MEDIUM | Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive NVMe password attempt mitigations in order to carry out a brute force attack. | CWE-307 |
165,591 | CVE-2021-36286 | 7.1 | 3.6 | HIGH | Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin. | CWE-22 |
165,592 | CVE-2021-36297 | 7.8 | 4.4 | HIGH | SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's, | CWE-426 |
165,593 | CVE-2021-36298 | 9.8 | 7.5 | CRITICAL | Dell EMC InsightIQ, versions prior to 4.1.4, contain risky cryptographic algorithms in the SSH component. A remote unauthenticated attacker could potentially exploit this vulnerability leading to authentication bypass and remote takeover of the InsightIQ. This allows an attacker to take complete control of InsightIQ to affect services provided by SSH; so Dell recommends customers to upgrade at the earliest opportunity. | CWE-327 |
165,594 | CVE-2021-36299 | 8.1 | 5.5 | HIGH | Dell iDRAC9 versions 4.40.00.00 and later, but prior to 4.40.29.00 and 5.00.00.00 contain an SQL injection vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to cause information disclosure or denial of service by supplying specially crafted input data to the affected application. | CWE-89 |
165,595 | CVE-2021-3630 | 5.5 | 4.3 | MEDIUM | An out-of-bounds write vulnerability was found in DjVuLibre in DJVU::DjVuTXT::decode() in DjVuText.cpp via a crafted djvu file which may lead to crash and segmentation fault. This flaw affects DjVuLibre versions prior to 3.5.28. | CWE-787 |
165,596 | CVE-2021-36300 | 8.2 | 6.4 | HIGH | iDRAC9 versions prior to 5.00.00.00 contain an improper input validation vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability by sending a specially crafted malicious request to crash the webserver or cause information disclosure. | CWE-89 |
165,597 | CVE-2021-36301 | 7.2 | 6.5 | HIGH | Dell iDRAC 9 prior to version 4.40.40.00 and iDRAC 8 prior to version 2.80.80.80 contain a Stack Buffer Overflow in Racadm. An authenticated remote attacker may potentially exploit this vulnerability to control process execution and gain access to the underlying operating system. | CWE-787 |
165,598 | CVE-2021-36305 | 6.5 | 4 | MEDIUM | Dell PowerScale OneFS contains an Unsynchronized Access to Shared Data in a Multithreaded Context in SMB CA handling. An authenticated user of SMB on a cluster with CA could potentially exploit this vulnerability, leading to a denial of service over SMB. | CWE-863 |
165,599 | CVE-2021-36306 | 9.8 | 9.3 | CRITICAL | Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system. | CWE-287 |
165,600 | CVE-2021-36307 | 8.8 | 8.5 | HIGH | Networking OS10, versions prior to October 2021 with RESTCONF API enabled, contains a privilege escalation vulnerability. A malicious low privileged user with specific access to the API could potentially exploit this vulnerability to gain admin privileges on the affected system. | CWE-269 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.