ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
165,601 | CVE-2021-36308 | 9.8 | 9.3 | CRITICAL | Networking OS10, versions prior to October 2021 with Smart Fabric Services enabled, contains an authentication bypass vulnerability. A remote unauthenticated attacker could exploit this vulnerability to gain access and perform actions on the affected system. | CWE-288 |
165,602 | CVE-2021-36309 | 6.5 | 4 | MEDIUM | Dell Enterprise SONiC OS, versions 3.3.0 and earlier, contains a sensitive information disclosure vulnerability. An authenticated malicious user with access to the system may use the TACACS\Radius credentials stored to read sensitive information and use it in further attacks. | CWE-200 |
165,603 | CVE-2021-36310 | 4.9 | 6.8 | MEDIUM | Dell Networking OS10, versions 10.4.3.x, 10.5.0.x, 10.5.1.x & 10.5.2.x, contain an uncontrolled resource consumption flaw in its API service. A high-privileged API user may potentially exploit this vulnerability, leading to a denial of service. | CWE-400 |
165,604 | CVE-2021-36311 | 7.8 | 4.6 | HIGH | Dell EMC Networker versions prior to 19.5 contain an Improper Authorization vulnerability. Any local malicious user with networker user privileges may exploit this vulnerability to upload malicious file to unauthorized locations and execute it. | CWE-863 |
165,605 | CVE-2021-36312 | 9.1 | 8.5 | CRITICAL | Dell EMC CloudLink 7.1 and all prior versions contain a Hard-coded Password Vulnerability. A remote high privileged attacker, with the knowledge of the hard-coded credentials, may potentially exploit this vulnerability to gain unauthorized access to the system. | CWE-259 |
165,606 | CVE-2021-36313 | 7.2 | 9 | HIGH | Dell EMC CloudLink 7.1 and all prior versions contain an OS command injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it may be leveraged to completely compromise the vulnerable application as well as the underlying operating system. Dell recommends customers to upgrade at the earliest opportunity. | CWE-78 |
165,607 | CVE-2021-36314 | 9.8 | 7.5 | CRITICAL | Dell EMC CloudLink 7.1 and all prior versions contain an Arbitrary File Creation Vulnerability. A remote unauthenticated attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary files on the end user system. | NVD-CWE-noinfo |
165,608 | CVE-2021-36315 | 6.8 | 7.2 | MEDIUM | Dell EMC PowerScale Nodes contain a hardware design flaw. This may allow a local unauthenticated user to escalate privileges. This also affects Compliance mode and for Compliance mode clusters, is a critical vulnerability. Dell EMC recommends applying the workaround at your earliest opportunity. | CWE-269 |
165,609 | CVE-2021-36317 | null | null | null | Dell EMC Avamar Server version 19.4 contains a plain-text password storage vulnerability in AvInstaller. A local attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account. | CWE-256 |
165,610 | CVE-2021-36318 | null | null | null | Dell EMC Avamar versions 18.2,19.1,19.2,19.3,19.4 contain a plain-text password storage vulnerability. A high privileged user could potentially exploit this vulnerability, leading to a complete outage. | CWE-532 |
165,611 | CVE-2021-36319 | 3.3 | 2.1 | LOW | Dell Networking OS10 versions 10.4.3.x, 10.5.0.x and 10.5.1.x contain an information exposure vulnerability. A low privileged authenticated malicious user can gain access to SNMP authentication failure messages. | CWE-668 |
165,612 | CVE-2021-36320 | 9.8 | 7.5 | CRITICAL | Dell Networking X-Series firmware versions prior to 3.0.1.8 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially hijack a session and access the webserver by forging the session ID. | CWE-331 |
165,613 | CVE-2021-36321 | 7.5 | 5 | HIGH | Dell Networking X-Series firmware versions prior to 3.0.1.8 contain an improper input validation vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by sending specially crafted data to trigger a denial of service. | CWE-20 |
165,614 | CVE-2021-36322 | 6.1 | 5.8 | MEDIUM | Dell Networking X-Series firmware versions prior to 3.0.1.8 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary host header values to poison the web-cache or trigger redirections. | CWE-74 |
165,615 | CVE-2021-36323 | 6.7 | 7.2 | MEDIUM | Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | CWE-20 |
165,616 | CVE-2021-36324 | 6.7 | 7.2 | MEDIUM | Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | CWE-20 |
165,617 | CVE-2021-36325 | 6.7 | 7.2 | MEDIUM | Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | CWE-20 |
165,618 | CVE-2021-36326 | 6.5 | 4.3 | MEDIUM | Dell EMC Streaming Data Platform, versions prior to 1.3 contain an SSL Strip Vulnerability in the User Interface (UI). A remote unauthenticated attacker could potentially exploit this vulnerability, leading to a downgrade in the communications between the client and server into an unencrypted format. | CWE-757 |
165,619 | CVE-2021-36327 | 5.3 | 5 | MEDIUM | Dell EMC Streaming Data Platform versions before 1.3 contain a Server Side Request Forgery Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to perform port scanning of internal networks and make HTTP requests to an arbitrary domain of the attacker's choice. | CWE-918 |
165,620 | CVE-2021-36328 | 8.8 | 6.5 | HIGH | Dell EMC Streaming Data Platform versions before 1.3 contain a SQL Injection Vulnerability. A remote malicious user may potentially exploit this vulnerability to execute SQL commands to perform unauthorized actions and retrieve sensitive information from the database. | CWE-89 |
165,621 | CVE-2021-36329 | 6.5 | 4 | MEDIUM | Dell EMC Streaming Data Platform versions before 1.3 contain an Indirect Object Reference Vulnerability. A remote malicious user may potentially exploit this vulnerability to gain sensitive information. | CWE-639 |
165,622 | CVE-2021-3633 | 7.8 | 6.9 | HIGH | A DLL preloading vulnerability was reported in Lenovo Driver Management prior to version 2.9.0719.1104 that could allow privilege escalation. | CWE-426 |
165,623 | CVE-2021-36330 | 9.8 | 7.5 | CRITICAL | Dell EMC Streaming Data Platform versions before 1.3 contain an Insufficient Session Expiration Vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability to reuse old session artifacts to impersonate a legitimate user. | CWE-613 |
165,624 | CVE-2021-36332 | 5.4 | 4.9 | MEDIUM | Dell EMC CloudLink 7.1 and all prior versions contain a HTML and Javascript Injection Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, directing end user to arbitrary and potentially malicious websites. | CWE-601 |
165,625 | CVE-2021-36333 | 5.5 | 2.1 | MEDIUM | Dell EMC CloudLink 7.1 and all prior versions contain a Buffer Overflow Vulnerability. A local low privileged attacker, may potentially exploit this vulnerability, leading to an application crash. | CWE-120 |
165,626 | CVE-2021-36334 | 6.8 | 6 | MEDIUM | Dell EMC CloudLink 7.1 and all prior versions contain a CSV formula Injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to arbitrary code execution on end user machine | CWE-1236 |
165,627 | CVE-2021-36335 | 8.8 | 6.5 | HIGH | Dell EMC CloudLink 7.1 and all prior versions contain an Improper Input Validation Vulnerability. A remote low privileged attacker, may potentially exploit this vulnerability, leading to execution of arbitrary files on the server | CWE-20 |
165,628 | CVE-2021-36336 | 9.8 | 7.5 | CRITICAL | Wyse Management Suite 3.3.1 and below versions contain a deserialization vulnerability that could allow an unauthenticated attacker to execute code on the affected system. | CWE-502 |
165,629 | CVE-2021-36337 | 7.4 | 5.8 | HIGH | Dell Wyse Management Suite version 3.3.1 and prior support insecure Transport Security Protocols TLS 1.0 and TLS 1.1 which are susceptible to Man-In-The-Middle attacks thereby compromising Confidentiality and Integrity of data. | CWE-326 |
165,630 | CVE-2021-3634 | 6.5 | 4 | MEDIUM | A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange. | CWE-119 |
165,631 | CVE-2021-36340 | 5.5 | 2.1 | MEDIUM | Dell EMC SCG 5.00.00.10 and earlier, contain a sensitive information disclosure vulnerability. A local malicious user may exploit this vulnerability to read sensitive information and use it. | CWE-532 |
165,632 | CVE-2021-36341 | 5.5 | 2.1 | MEDIUM | Dell Wyse Device Agent version 14.5.4.1 and below contain a sensitive data exposure vulnerability. A local authenticated user with low privileges could potentially exploit this vulnerability in order to access sensitive information. | CWE-200 |
165,633 | CVE-2021-3635 | 4.4 | 4.9 | MEDIUM | A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands. | CWE-119 |
165,634 | CVE-2021-36351 | 9.8 | 7.5 | CRITICAL | SQL Injection Vulnerability in Care2x Open Source Hospital Information Management 2.7 Alpha via the (1) pday, (2) pmonth, and (3) pyear parameters in GET requests sent to /modules/nursing/nursing-station.php. | CWE-89 |
165,635 | CVE-2021-36352 | 5.4 | 3.5 | MEDIUM | Stored cross-site scripting (XSS) vulnerability in Care2x Hospital Information Management 2.7 Alpha. The vulnerability has found POST requests in /modules/registration_admission/patient_register.php page with "name_middle", "addr_str", "station", "name_maiden", "name_2", "name_3" parameters. | CWE-79 |
165,636 | CVE-2021-36356 | 9.8 | 10 | CRITICAL | KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124. | CWE-434 |
165,637 | CVE-2021-36357 | 9.8 | 7.5 | CRITICAL | An issue was discovered in OpenPOWER 2.6 firmware. unpack_timestamp() calls le32_to_cpu() for endian conversion of a uint16_t "year" value, resulting in a type mismatch that can truncate a higher integer value to a smaller one, and bypass a timestamp check. The fix is to use the right endian conversion function. | CWE-681 |
165,638 | CVE-2021-36359 | 8.8 | 6.5 | HIGH | OrbiTeam BSCW Classic before 7.4.3 allows exportpdf authenticated remote code execution (RCE) via XML tag injection because reportlab\platypus\paraparser.py (reached via bscw.cgi op=_editfolder.EditFolder) calls eval on attacker-supplied Python code. This is fixed in 5.0.12, 5.1.10, 5.2.4, 7.3.3, and 7.4.3. | CWE-91 |
165,639 | CVE-2021-3636 | 4.6 | 4.1 | MEDIUM | It was found in OpenShift, before version 4.8, that the generated certificate for the in-cluster Service CA, incorrectly included additional certificates. The Service CA is automatically mounted into all pods, allowing them to safely connect to trusted in-cluster services that present certificates signed by the trusted Service CA. The incorrect inclusion of additional CAs in this certificate would allow an attacker that compromises any of the additional CAs to masquerade as a trusted in-cluster service. | CWE-287 |
165,640 | CVE-2021-3636 | 4.6 | 4.1 | MEDIUM | It was found in OpenShift, before version 4.8, that the generated certificate for the in-cluster Service CA, incorrectly included additional certificates. The Service CA is automatically mounted into all pods, allowing them to safely connect to trusted in-cluster services that present certificates signed by the trusted Service CA. The incorrect inclusion of additional CAs in this certificate would allow an attacker that compromises any of the additional CAs to masquerade as a trusted in-cluster service. | CWE-295 |
165,641 | CVE-2021-36363 | 9.8 | 7.5 | CRITICAL | Nagios XI before 5.8.5 has Incorrect Permission Assignment for migrate.php. | CWE-276 |
165,642 | CVE-2021-36364 | 9.8 | 7.5 | CRITICAL | Nagios XI before 5.8.5 incorrectly allows backup_xi.sh wildcards. | NVD-CWE-noinfo |
165,643 | CVE-2021-36365 | 9.8 | 7.5 | CRITICAL | Nagios XI before 5.8.5 has Incorrect Permission Assignment for repairmysql.sh. | CWE-276 |
165,644 | CVE-2021-36366 | 9.8 | 7.5 | CRITICAL | Nagios XI before 5.8.5 incorrectly allows manage_services.sh wildcards. | NVD-CWE-noinfo |
165,645 | CVE-2021-36367 | 8.1 | 5.8 | HIGH | PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response. This makes it easier for an attacker-controlled SSH server to present a later spoofed authentication prompt (that the attacker can use to capture credential data, and use that data for purposes that are undesired by the client user). | CWE-345 |
165,646 | CVE-2021-3637 | 7.5 | 5 | HIGH | A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack. | CWE-770 |
165,647 | CVE-2021-36370 | 7.5 | 5 | HIGH | An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity. | CWE-287 |
165,648 | CVE-2021-36371 | 3.7 | 4.3 | LOW | Emissary-Ingress (formerly Ambassador API Gateway) through 1.13.9 allows attackers to bypass client certificate requirements (i.e., mTLS cert_required) on backend upstreams when more than one TLSContext is defined and at least one configuration exists that does not require client certificate authentication. The attacker must send an SNI specifying an unprotected backend and an HTTP Host header specifying a protected backend. (2.x versions are unaffected. 1.x versions are unaffected with certain configuration settings involving prune_unreachable_routes and a wildcard Host resource.) | CWE-295 |
165,649 | CVE-2021-36372 | 9.8 | 7.5 | CRITICAL | In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked. | CWE-273 |
165,650 | CVE-2021-36373 | 5.5 | 4.3 | MEDIUM | When reading a specially crafted TAR archive an Apache Ant build can be made to allocate large amounts of memory that finally leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Apache Ant prior to 1.9.16 and 1.10.11 were affected. | NVD-CWE-Other |
165,651 | CVE-2021-36374 | 5.5 | 4.3 | MEDIUM | When reading a specially crafted ZIP archive, or a derived formats, an Apache Ant build can be made to allocate large amounts of memory that leads to an out of memory error, even for small inputs. This can be used to disrupt builds using Apache Ant. Commonly used derived formats from ZIP archives are for instance JAR files and many office files. Apache Ant prior to 1.9.16 and 1.10.11 were affected. | NVD-CWE-Other |
165,652 | CVE-2021-36376 | 7.8 | 4.4 | HIGH | dandavison delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory. | CWE-427 |
165,653 | CVE-2021-36377 | 7.5 | 5 | HIGH | Fossil before 2.14.2 and 2.15.x before 2.15.2 often skips the hostname check during TLS certificate validation. | CWE-295 |
165,654 | CVE-2021-36380 | 9.8 | 10 | CRITICAL | Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi. | CWE-78 |
165,655 | CVE-2021-36381 | 5.3 | 5 | MEDIUM | In Edifecs Transaction Management through 2021-07-12, an unauthenticated user can inject arbitrary text into a user's browser via logon.jsp?logon_error= on the login screen of the Web application. | CWE-74 |
165,656 | CVE-2021-36382 | 3.7 | 4.3 | LOW | Devolutions Server before 2021.1.18, and LTS before 2020.3.20, allows attackers to intercept private keys via a man-in-the-middle attack against the connections/partial endpoint (which accepts cleartext). | CWE-295 |
165,657 | CVE-2021-36383 | 4.3 | 4 | MEDIUM | Xen Orchestra (with xo-web through 5.80.0 and xo-server through 5.84.0) mishandles authorization, as demonstrated by modified WebSocket resourceSet.getAll data is which the attacker changes the permission field from none to admin. The attacker gains access to data sets such as VMs, Backups, Audit, Users, and Groups. | CWE-863 |
165,658 | CVE-2021-36385 | 9.8 | 10 | CRITICAL | A SQL Injection vulnerability in Cerner Mobile Care 5.0.0 allows remote unauthenticated attackers to execute arbitrary SQL commands via a Fullwidth Apostrophe (aka U+FF07) in the default.aspx User ID field. Arbitrary system commands can be executed through the use of xp_cmdshell. | CWE-89 |
165,659 | CVE-2021-36386 | 7.5 | 5 | HIGH | report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user. | CWE-400 |
165,660 | CVE-2021-36387 | 5.4 | 3.5 | MEDIUM | In Yellowfin before 9.6.1 there is a Stored Cross-Site Scripting vulnerability in the video embed functionality exploitable through a specially crafted HTTP POST request to the page "ActivityStreamAjax.i4". | CWE-79 |
165,661 | CVE-2021-36388 | 7.5 | 5 | HIGH | In Yellowfin before 9.6.1 it is possible to enumerate and download users profile pictures through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIIAvatarImage.i4". | CWE-639 |
165,662 | CVE-2021-36389 | 7.5 | 5 | HIGH | In Yellowfin before 9.6.1 it is possible to enumerate and download uploaded images through an Insecure Direct Object Reference vulnerability exploitable by sending a specially crafted HTTP GET request to the page "MIImage.i4". | CWE-639 |
165,663 | CVE-2021-3641 | 5.5 | 2.1 | MEDIUM | Improper Link Resolution Before File Access ('Link Following') vulnerability in the EPAG component of Bitdefender Endpoint Security Tools for Windows allows a local attacker to cause a denial of service. This issue affects: Bitdefender GravityZone version 7.1.2.33 and prior versions. | CWE-59 |
165,664 | CVE-2021-3642 | 5.3 | 3.5 | MEDIUM | A flaw was found in Wildfly Elytron in versions prior to 1.10.14.Final, prior to 1.15.5.Final and prior to 1.16.1.Final where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality. | CWE-203 |
165,665 | CVE-2021-36440 | 9.8 | 7.5 | CRITICAL | Unrestricted File Upload in ShowDoc v2.9.5 allows remote attackers to execute arbitrary code via the 'file_url' parameter in the component AdminUpdateController.class.php'. | CWE-434 |
165,666 | CVE-2021-3645 | 9.8 | 7.5 | CRITICAL | merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | CWE-915 |
165,667 | CVE-2021-36450 | 6.1 | 4.3 | MEDIUM | Verint Workforce Optimization (WFO) 15.2.8.10048 allows XSS via the control/my_notifications NEWUINAV parameter. | CWE-79 |
165,668 | CVE-2021-36454 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) vulnerability in Naviwebs Navigate Cms 2.9 via the navigate-quickse parameter to 1) backups\backups.php, 2) blocks\blocks.php, 3) brands\brands.php, 4) comments\comments.php, 5) coupons\coupons.php, 6) feeds\feeds.php, 7) functions\functions.php, 8) items\items.php, 9) menus\menus.php, 10) orders\orders.php, 11) payment_methods\payment_methods.php, 12) products\products.php, 13) profiles\profiles.php, 14) shipping_methods\shipping_methods.php, 15) templates\templates.php, 16) users\users.php, 17) webdictionary\webdictionary.php, 18) websites\websites.php, and 19) webusers\webusers.php because the initial_url function is built in these files. | CWE-79 |
165,669 | CVE-2021-36455 | 8.8 | 6.5 | HIGH | SQL Injection vulnerability in Naviwebs Navigate CMS 2.9 via the quicksearch parameter in \lib\packages\comments\comments.php. | CWE-89 |
165,670 | CVE-2021-3646 | 6.1 | 4.3 | MEDIUM | btcpayserver is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-79 |
165,671 | CVE-2021-3647 | 6.1 | 5.8 | MEDIUM | URI.js is vulnerable to URL Redirection to Untrusted Site | CWE-601 |
165,672 | CVE-2021-36483 | 9.8 | 7.5 | CRITICAL | DevExpress.XtraReports.UI through v21.1 allows attackers to execute arbitrary code via insecure deserialization. | CWE-502 |
165,673 | CVE-2021-3649 | 7.5 | 5 | HIGH | chatwoot is vulnerable to Inefficient Regular Expression Complexity | CWE-697 |
165,674 | CVE-2021-36512 | 7.5 | 5 | HIGH | An issue was discovered in function scanallsubs in src/sbbs3/scansubs.cpp in Synchronet BBS, which may allow attackers to view sensitive information due to an uninitialized value. | CWE-908 |
165,675 | CVE-2021-36513 | 7.5 | 5 | HIGH | An issue was discovered in function sofia_handle_sip_i_notify in sofia.c in SignalWire freeswitch before 1.10.6, may allow attackers to view sensitive information due to an uninitialized value. | CWE-909 |
165,676 | CVE-2021-3653 | 8.8 | 6.1 | HIGH | A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7. | CWE-862 |
165,677 | CVE-2021-36530 | 8.8 | 6.8 | HIGH | ngiflib 0.4 has a heap overflow in GetByteStr() at ngiflib.c:108 in NGIFLIB_NO_FILE mode, GetByteStr() copy memory buffer without checking the boundary. | CWE-787 |
165,678 | CVE-2021-36531 | 8.8 | 6.8 | HIGH | ngiflib 0.4 has a heap overflow in GetByte() at ngiflib.c:70 in NGIFLIB_NO_FILE mode, GetByte() reads memory buffer without checking the boundary. | CWE-787 |
165,679 | CVE-2021-36542 | 4.3 | 4.3 | MEDIUM | Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.LockDocument.php in SeedDMS v5.1.x<5.1.23 and v6.0.x <6.0.16 allows a remote attacker to lock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. | CWE-352 |
165,680 | CVE-2021-36543 | 4.3 | 4.3 | MEDIUM | Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.UnlockDocument.php in SeedDMS v5.1.x <5.1.23 and v6.0.x <6.0.16 allows a remote attacker to unlock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. | CWE-352 |
165,681 | CVE-2021-36547 | 9.8 | 7.5 | CRITICAL | A remote code execution (RCE) vulnerability in the component /codebase/dir.php?type=filenew of Mara v7.5 allows attackers to execute arbitrary commands via a crafted PHP file. | CWE-434 |
165,682 | CVE-2021-36548 | 9.8 | 7.5 | CRITICAL | A remote code execution (RCE) vulnerability in the component /admin/index.php?id=themes&action=edit_template&filename=blog of Monstra v3.0.4 allows attackers to execute arbitrary commands via a crafted PHP file. | CWE-434 |
165,683 | CVE-2021-3655 | 3.3 | 2.1 | LOW | A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory. | CWE-909 |
165,684 | CVE-2021-36550 | 5.4 | 3.5 | MEDIUM | TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-browse_categories.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Create category module. | CWE-79 |
165,685 | CVE-2021-36551 | 5.4 | 3.5 | MEDIUM | TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-calendar.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Add Event module. | CWE-79 |
165,686 | CVE-2021-36560 | 9.8 | 7.5 | CRITICAL | Phone Shop Sales Managements System using PHP with Source Code 1.0 is vulnerable to authentication bypass which leads to account takeover of the admin. | CWE-287 |
165,687 | CVE-2021-36563 | 5.4 | 3.5 | MEDIUM | The CheckMK management web console (versions 1.5.0 to 2.0.0) does not sanitise user input in various parameters of the WATO module. This allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts), the XSS payload will be triggered when the user accesses some specific sections of the application. In the same sense a very dangerous potential way would be when an attacker who has the monitor role (not administrator) manages to get a stored XSS to steal the secretAutomation (for the use of the API in administrator mode) and thus be able to create another administrator user who has high privileges on the CheckMK monitoring web console. Another way is that persistent XSS allows an attacker to modify the displayed content or change the victim's information. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session. | CWE-79 |
165,688 | CVE-2021-36564 | 9.8 | 7.5 | CRITICAL | ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php. | CWE-502 |
165,689 | CVE-2021-36567 | 9.8 | 10 | CRITICAL | ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache. | CWE-502 |
165,690 | CVE-2021-36581 | 9.8 | 7.5 | CRITICAL | Kooboo CMS 2.1.1.0 is vulnerable to Insecure file upload. It is possible to upload any file extension to the server. The server does not verify the extension of the file and the tester was able to upload an aspx to the server. | CWE-434 |
165,691 | CVE-2021-36582 | 9.8 | 10 | CRITICAL | In Kooboo CMS 2.1.1.0, it is possible to upload a remote shell (e.g., aspx) to the server and then call upon it to receive a reverse shell from the victim server. The files are uploaded to /Content/Template/root/reverse-shell.aspx and can be simply triggered by browsing that URL. | CWE-434 |
165,692 | CVE-2021-36584 | 5.5 | 4.3 | MEDIUM | An issue was discovered in GPAC 1.0.1. There is a heap-based buffer overflow in the function gp_rtp_builder_do_tx3g function in ietf/rtp_pck_3gpp.c, as demonstrated by MP4Box. This can cause a denial of service (DOS). | CWE-787 |
165,693 | CVE-2021-36601 | 6.1 | 4.3 | MEDIUM | GetSimpleCMS 3.3.16 contains a cross-site Scripting (XSS) vulnerability, where Function TSL does not filter check settings.php Website URL: "siteURL" parameter. | CWE-79 |
165,694 | CVE-2021-36605 | 5.4 | 3.5 | MEDIUM | engineercms 1.03 is vulnerable to Cross Site Scripting (XSS). There is no escaping in the nickname field on the user list page. When viewing this page, the JavaScript code will be executed in the user's browser. | CWE-79 |
165,695 | CVE-2021-3662 | 5.4 | 3.5 | MEDIUM | Certain HP Enterprise LaserJet and PageWide MFPs may be vulnerable to stored cross site scripting (XSS). | CWE-79 |
165,696 | CVE-2021-36621 | 8.1 | 6.8 | HIGH | Sourcecodester Online Covid Vaccination Scheduler System 1.0 is vulnerable to SQL Injection. The username parameter is vulnerable to time-based SQL injection. Upon successful dumping the admin password hash, an attacker can decrypt and obtain the plain-text password. Hence, the attacker could authenticate as Administrator. | CWE-89 |
165,697 | CVE-2021-36622 | 9.8 | 7.5 | CRITICAL | Sourcecodester Online Covid Vaccination Scheduler System 1.0 is affected vulnerable to Arbitrary File Upload. The admin panel has an upload function of profile photo accessible at http://localhost/scheduler/admin/?page=user. An attacker could upload a malicious file such as shell.php with the Content-Type: image/png. Then, the attacker have to visit the uploaded profile photo to access the shell. | CWE-434 |
165,698 | CVE-2021-36623 | 9.8 | 7.5 | CRITICAL | Arbitrary File Upload in Sourcecodester Phone Shop Sales Management System 1.0 enables RCE. | CWE-434 |
165,699 | CVE-2021-36624 | 9.8 | 7.5 | CRITICAL | Sourcecodester Phone Shop Sales Managements System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. | CWE-89 |
165,700 | CVE-2021-3663 | 7.5 | 5 | HIGH | firefly-iii is vulnerable to Improper Restriction of Excessive Authentication Attempts | CWE-307 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.