ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
165,701 | CVE-2021-3664 | 5.3 | 5 | MEDIUM | url-parse is vulnerable to URL Redirection to Untrusted Site | CWE-601 |
165,702 | CVE-2021-36654 | 5.4 | 3.5 | MEDIUM | CMSuno 1.7 is vulnerable to an authenticated stored cross site scripting in modifying the filename parameter (tgo) while updating the theme. | CWE-79 |
165,703 | CVE-2021-3666 | 9.8 | 7.5 | CRITICAL | body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | CWE-915 |
165,704 | CVE-2021-36690 | 7.5 | 5 | HIGH | ** DISPUTED ** A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library. | CWE-125 |
165,705 | CVE-2021-36691 | 7.5 | 5 | HIGH | libjxl v0.5.0 is affected by a Assertion failed issue in lib/jxl/image.cc jxl::PlaneBase::PlaneBase(). When encoding a malicous GIF file using cjxl, an attacker can trigger a denial of service. | CWE-617 |
165,706 | CVE-2021-36692 | 6.5 | 4.3 | MEDIUM | libjxl v0.3.7 is affected by a Divide By Zero in issue in lib/extras/codec_apng.cc jxl::DecodeImageAPNG(). When encoding a malicous APNG file using cjxl, an attacker can trigger a denial of service. | CWE-369 |
165,707 | CVE-2021-36695 | 5.4 | 3.5 | MEDIUM | Deskpro cloud and on-premise Deskpro 2021.1.6 and fixed in Deskpro 2021.1.7 contains a cross-site scripting (XSS) vulnerability in the download file feature on a manager profile due to lack of input validation. | CWE-79 |
165,708 | CVE-2021-36696 | 5.4 | 3.5 | MEDIUM | Deskpro cloud and on-premise Deskpro 2021.1.6 and fixed in Deskpro 2021.1.7 contains a cross-site scripting (XSS) vulnerability in social media links on a user profile due to lack of input validation. | CWE-79 |
165,709 | CVE-2021-36697 | 6.7 | 4.6 | MEDIUM | With an admin account, the .htaccess file in Artica Pandora FMS <=755 can be overwritten with the File Manager component. The new .htaccess file contains a Rewrite Rule with a type definition. A normal PHP file can be uploaded with this new "file type" and the code can be executed with an HTTP request. | CWE-74 |
165,710 | CVE-2021-36698 | 5.4 | 3.5 | MEDIUM | Pandora FMS through 755 allows XSS via a new Event Filter with a crafted name. | CWE-79 |
165,711 | CVE-2021-36701 | 9.1 | 6.4 | CRITICAL | In htmly version 2.8.1, is vulnerable to an Arbitrary File Deletion on the local host when delete backup files. The vulnerability may allow a remote attacker to delete arbitrary know files on the host. | NVD-CWE-noinfo |
165,712 | CVE-2021-36702 | 6.1 | 4.3 | MEDIUM | The "content" field in the "regular post" page of the "add content" menu under "dashboard" in htmly 2.8.1 has a storage cross site scripting (XSS) vulnerability. It allows remote attackers to send authenticated post-http requests to add / content and inject arbitrary web scripts or HTML through special content. | CWE-79 |
165,713 | CVE-2021-36703 | 6.1 | 4.3 | MEDIUM | The "blog title" field in the "Settings" menu "config" page of "dashboard" in htmly 2.8.1 has a storage cross site scripting (XSS) vulnerability. It allows remote attackers to send an authenticated post HTTP request to admin/config and inject arbitrary web script or HTML through a special website name. | CWE-79 |
165,714 | CVE-2021-36705 | 9.8 | 7.5 | CRITICAL | In ProLink PRC2402M V1.0.18 and older, the set_TR069 function in the adm.cgi binary, accessible with a page parameter value of TR069 contains a trivial command injection where the value of the TR069_local_port parameter is passed directly to system. | CWE-77 |
165,715 | CVE-2021-36706 | 9.8 | 7.5 | CRITICAL | In ProLink PRC2402M V1.0.18 and older, the set_sys_cmd function in the adm.cgi binary, accessible with a page parameter value of sysCMD contains a trivial command injection where the value of the command parameter is passed directly to system. | CWE-77 |
165,716 | CVE-2021-36707 | 9.8 | 7.5 | CRITICAL | In ProLink PRC2402M V1.0.18 and older, the set_ledonoff function in the adm.cgi binary, accessible with a page parameter value of ledonoff contains a trivial command injection where the value of the led_cmd parameter is passed directly to do_system. | CWE-77 |
165,717 | CVE-2021-36708 | 7.5 | 5 | HIGH | In ProLink PRC2402M V1.0.18 and older, the set_sys_init function in the login.cgi binary allows an attacker to reset the password to the administrative interface of the router. | CWE-640 |
165,718 | CVE-2021-3671 | 6.5 | 4 | MEDIUM | A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server. | CWE-476 |
165,719 | CVE-2021-36716 | 7.5 | 5 | HIGH | A ReDoS (regular expression denial of service) flaw was found in the Segment is-email package before 1.0.1 for Node.js. An attacker that is able to provide crafted input to the isEmail(input) function may cause an application to consume an excessive amount of CPU. | CWE-20 |
165,720 | CVE-2021-36717 | 7.5 | 5 | HIGH | Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system. | CWE-22 |
165,721 | CVE-2021-36718 | 6.5 | 6.8 | MEDIUM | SYNEL - eharmonynew / Synel Reports - The attacker can log in to the system with default credentials and export a report of eharmony system with sensetive data (Employee name, Employee ID number, Working hours etc') The vulnerabilety has been addressed and fixed on version 11. Default credentials , Security miscommunication , Sensetive data exposure vulnerability in Synel Reports of SYNEL eharmonynew, Synel Reports allows an attacker to log into the system with default credentials. This issue affects: SYNEL eharmonynew, Synel Reports 8.0.2 version 11 and prior versions. | CWE-532 |
165,722 | CVE-2021-36719 | 8.8 | 9 | HIGH | PineApp - Mail Secure - The attacker must be logged in as a user to the Pineapp system. The attacker exploits the vulnerable nicUpload.php file to upload a malicious file,Thus taking over the server and running remote code. | CWE-434 |
165,723 | CVE-2021-3672 | 5.6 | 6.8 | MEDIUM | A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | CWE-79 |
165,724 | CVE-2021-36720 | 6.1 | 4.3 | MEDIUM | PineApp - Mail Secure - Attacker sending a request to :/blocking.php?url=<script>alert(1)</script> and stealing cookies . | CWE-79 |
165,725 | CVE-2021-36721 | 5.3 | 5 | MEDIUM | Sysaid API User Enumeration - Attacker sending requests to specific api path without any authorization before 21.3.60 version could get users names from the LDAP server. | CWE-287 |
165,726 | CVE-2021-3673 | 7.5 | 5 | HIGH | A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS. | CWE-20 |
165,727 | CVE-2021-36740 | 6.5 | 6.4 | MEDIUM | Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8. | CWE-444 |
165,728 | CVE-2021-36741 | 8.8 | 6.5 | HIGH | An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product?s management console in order to exploit this vulnerability. | CWE-20 |
165,729 | CVE-2021-36742 | 7.8 | 4.6 | HIGH | A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | CWE-20 |
165,730 | CVE-2021-36744 | 7.8 | 4.6 | HIGH | Trend Micro Security (Consumer) 2021 and 2020 are vulnerable to a directory junction vulnerability which could allow an attacker to exploit the system to escalate privileges and create a denial of service. | CWE-269 |
165,731 | CVE-2021-36745 | 9.8 | 10 | CRITICAL | A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations. | CWE-287 |
165,732 | CVE-2021-36746 | 5.4 | 3.5 | MEDIUM | Blackboard Learn through 9.1 allows XSS by an authenticated user via the Assignment Instructions HTML editor. | CWE-79 |
165,733 | CVE-2021-36747 | 5.4 | 3.5 | MEDIUM | Blackboard Learn through 9.1 allows XSS by an authenticated user via the Feedback to Learner form. | CWE-79 |
165,734 | CVE-2021-36748 | 7.5 | 5 | HIGH | A SQL Injection issue in the list controller of the Prestahome Blog (aka ph_simpleblog) module before 1.7.8 for Prestashop allows a remote attacker to extract data from the database via the sb_category parameter. | CWE-89 |
165,735 | CVE-2021-36749 | 6.5 | 4 | MEDIUM | In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1. | CWE-668 |
165,736 | CVE-2021-36753 | 7.8 | 4.6 | HIGH | sharkdp BAT before 0.18.2 executes less.exe from the current working directory. | CWE-427 |
165,737 | CVE-2021-36754 | 7.5 | 5 | HIGH | PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception. | CWE-119 |
165,738 | CVE-2021-36755 | 6.1 | 4.3 | MEDIUM | Nightscout Web Monitor (aka cgm-remote-monitor) 14.2.2 allows XSS via a crafted X-Forwarded-For header. | CWE-79 |
165,739 | CVE-2021-36756 | 6.5 | 6.4 | MEDIUM | CFEngine Enterprise 3.15.0 through 3.15.4 has Missing SSL Certificate Validation. | CWE-295 |
165,740 | CVE-2021-36758 | 5.4 | 5.5 | MEDIUM | 1Password Connect server before 1.2 is missing validation checks, permitting users to create Secrets Automation access tokens that can be used to perform privilege escalation. Malicious users authorized to create Secrets Automation access tokens can create tokens that have access beyond what the user is authorized to access, but limited to the existing authorizations of the Secret Automation the token is created in. | CWE-20 |
165,741 | CVE-2021-36758 | 5.4 | 5.5 | MEDIUM | 1Password Connect server before 1.2 is missing validation checks, permitting users to create Secrets Automation access tokens that can be used to perform privilege escalation. Malicious users authorized to create Secrets Automation access tokens can create tokens that have access beyond what the user is authorized to access, but limited to the existing authorizations of the Secret Automation the token is created in. | CWE-863 |
165,742 | CVE-2021-36760 | 6.1 | 4.3 | MEDIUM | In accountrecoveryendpoint/recoverpassword.do in WSO2 Identity Server 5.7.0, it is possible to perform a DOM-Based XSS attack affecting the callback parameter modifying the URL that precedes the callback parameter. Once the username or password reset procedure is completed, the JavaScript code will be executed. (recoverpassword.do also has an open redirect issue for a similar reason.) | CWE-79 |
165,743 | CVE-2021-36762 | 7.5 | 7.8 | HIGH | An issue was discovered in HCC Embedded InterNiche NicheStack through 4.3. The tfshnd():tftpsrv.c TFTP packet processing function doesn't ensure that a filename is adequately '\0' terminated; therefore, a subsequent call to strlen for the filename might read out of bounds of the protocol packet buffer (if no '\0' byte exists within a reasonable range). | CWE-273 |
165,744 | CVE-2021-36763 | 7.5 | 5 | HIGH | In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties. | CWE-552 |
165,745 | CVE-2021-36764 | 7.5 | 5 | HIGH | In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference. Crafted communication requests may cause a Null pointer dereference in the affected CODESYS products and may result in a denial-of-service condition. | CWE-476 |
165,746 | CVE-2021-36765 | 7.5 | 5 | HIGH | In CODESYS EtherNetIP before 4.1.0.0, specific EtherNet/IP requests may cause a null pointer dereference in the downloaded vulnerable EtherNet/IP stack that is executed by the CODESYS Control runtime system. | CWE-476 |
165,747 | CVE-2021-36766 | 7.2 | 6.5 | HIGH | Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code. | CWE-502 |
165,748 | CVE-2021-36767 | 9.8 | 7.5 | CRITICAL | In Digi RealPort through 4.8.488.0, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server. | CWE-916 |
165,749 | CVE-2021-36769 | 5.3 | 5 | MEDIUM | A reordering issue exists in Telegram before 7.8.1 for Android, Telegram before 7.8.3 for iOS, and Telegram Desktop before 2.8.8. An attacker can cause the server to receive messages in a different order than they were sent a client. | CWE-326 |
165,750 | CVE-2021-36770 | 7.8 | 6.8 | HIGH | Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value. | CWE-426 |
165,751 | CVE-2021-36771 | 6.1 | 4.3 | MEDIUM | Zoho ManageEngine ADManager Plus before 7110 allows reflected XSS. | CWE-79 |
165,752 | CVE-2021-36772 | 6.1 | 4.3 | MEDIUM | Zoho ManageEngine ADManager Plus before 7110 allows stored XSS. | CWE-79 |
165,753 | CVE-2021-36773 | 7.5 | 5 | HIGH | uBlock Origin before 1.36.2 and nMatrix before 4.4.9 support an arbitrary depth of parameter nesting for strict blocking, which allows crafted web sites to cause a denial of service (unbounded recursion that can trigger memory consumption and a loss of all blocking functionality). | CWE-674 |
165,754 | CVE-2021-36779 | null | null | null | A Improper Access Control vulnerability inf SUSE Longhorn allows any workload in the cluster to execute any binary present in the image on the host without authentication. This issue affects: SUSE Longhorn longhorn versions prior to 1.1.3; longhorn versions prior to 1.2.3. | CWE-284 |
165,755 | CVE-2021-3678 | 5.9 | 4.3 | MEDIUM | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | CWE-338 |
165,756 | CVE-2021-36780 | null | null | null | A Improper Access Control vulnerability in longhorn of SUSE Longhorn allows attackers to connect to a longhorn-engine replica instance granting it the ability to read and write data to and from a replica that they should not have access to. This issue affects: SUSE Longhorn longhorn versions prior to 1.1.3; longhorn versions prior to 1.2.3v. | CWE-284 |
165,757 | CVE-2021-36785 | 5.4 | 3.5 | MEDIUM | The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS. | CWE-79 |
165,758 | CVE-2021-36786 | 7.5 | 5 | HIGH | The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows Sensitive Data Exposure of API credentials and private keys. | CWE-922 |
165,759 | CVE-2021-36787 | 5.4 | 3.5 | MEDIUM | The femanager extension before 5.5.1 and 6.x before 6.3.1 for TYPO3 allows XSS via a crafted SVG document. | CWE-79 |
165,760 | CVE-2021-36788 | 5.4 | 3.5 | MEDIUM | The yoast_seo (aka Yoast SEO) extension before 7.2.3 for TYPO3 allows XSS. | CWE-79 |
165,761 | CVE-2021-36789 | 9.8 | 7.5 | CRITICAL | The dated_news (aka Dated News) extension through 5.1.1 for TYPO3 allows SQL Injection. | CWE-89 |
165,762 | CVE-2021-3679 | 5.5 | 2.1 | MEDIUM | A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service. | CWE-400 |
165,763 | CVE-2021-36790 | 6.1 | 4.3 | MEDIUM | The dated_news (aka Dated News) extension through 5.1.1 for TYPO3 allows XSS. | CWE-79 |
165,764 | CVE-2021-36791 | 5.3 | 5 | MEDIUM | The dated_news (aka Dated News) extension through 5.1.1 for TYPO3 allows Information Disclosure of application registration data. | CWE-668 |
165,765 | CVE-2021-36792 | 7.2 | 6.4 | HIGH | The dated_news (aka Dated News) extension through 5.1.1 for TYPO3 has incorrect Access Control for confirming various applications. | NVD-CWE-noinfo |
165,766 | CVE-2021-36793 | 7.5 | 5 | HIGH | The routes (aka Extbase Yaml Routes) extension before 2.1.1 for TYPO3, when CsrfTokenViewHelper is used, allows Sensitive Information Disclosure because a session identifier is unsafely present in HTML output. | CWE-668 |
165,767 | CVE-2021-36794 | 9.8 | 6.8 | CRITICAL | In Siren Investigate before 11.1.4, when enabling the cluster feature of the Siren Alert application, TLS verifications are disabled globally in the Siren Investigate main process. | NVD-CWE-noinfo |
165,768 | CVE-2021-36795 | 7.8 | 4.4 | HIGH | A permission issue in the Cohesity Linux agent may allow privilege escalation in version 6.5.1b to 6.5.1d-hotfix10, 6.6.0a to 6.6.0b-hotfix1. An underprivileged linux user, if certain environment criteria are met, can gain additional privileges. | CWE-276 |
165,769 | CVE-2021-36797 | 6.8 | 7.2 | MEDIUM | ** DISPUTED ** In Victron Energy Venus OS through 2.72, root access is granted by default to anyone with physical access to the device. NOTE: the vendor disagrees with the reporter's opinion about an alleged "security best practices" violation. | NVD-CWE-noinfo |
165,770 | CVE-2021-36798 | 7.5 | 5 | HIGH | A Denial-of-Service (DoS) vulnerability was discovered in Team Server in HelpSystems Cobalt Strike 4.2 and 4.3. It allows remote attackers to crash the C2 server thread and block beacons' communication with it. | CWE-770 |
165,771 | CVE-2021-36799 | 8.8 | 2.1 | HIGH | ** UNSUPPORTED WHEN ASSIGNED ** KNX ETS5 through 5.7.6 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | CWE-798 |
165,772 | CVE-2021-3680 | 4.9 | 4 | MEDIUM | showdoc is vulnerable to Missing Cryptographic Step | CWE-326 |
165,773 | CVE-2021-36800 | 9.1 | 9 | CRITICAL | Akaunting version 2.1.12 and earlier suffers from a code injection issue in the Money.php component of the application. A POST sent to /{company_id}/sales/invoices/{invoice_id} with an items[0][price] that includes a PHP callable function is executed directly. This issue was fixed in version 2.1.13 of the product. | CWE-94 |
165,774 | CVE-2021-36801 | 8.1 | 5.5 | HIGH | Akaunting version 2.1.12 and earlier suffers from an authentication bypass issue in the user-controllable field, companies[0]. This issue was fixed in version 2.1.13 of the product. | CWE-639 |
165,775 | CVE-2021-36802 | 6.5 | 4 | MEDIUM | Akaunting version 2.1.12 and earlier suffers from a denial-of-service issue that is triggered by setting a malformed 'locale' variable and sending it in an otherwise normal HTTP POST request. This issue was fixed in version 2.1.13 of the product. | NVD-CWE-Other |
165,776 | CVE-2021-36803 | 5.4 | 3.5 | MEDIUM | Akaunting version 2.1.12 and earlier suffers from a persistent (type II) cross-site scripting (XSS) vulnerability in processing user-supplied avatar images. This issue was fixed in version 2.1.13 of the product. | CWE-79 |
165,777 | CVE-2021-36804 | 8.1 | 5.8 | HIGH | Akaunting version 2.1.12 and earlier suffers from a password reset spoofing vulnerability, wherein an attacker can proxy password reset requests through a running Akaunting instance, if that attacker knows the target's e-mail address. This issue was fixed in version 2.1.13 of the product. Please note that this issue is ultimately caused by the defaults provided by the Laravel framework, specifically how proxy headers are handled with respect to multi-tenant implementations. In other words, while this is not technically a vulnerability in Laravel, this default configuration is very likely to lead to practically identical identical vulnerabilities in Laravel projects that implement multi-tenant applications. | CWE-640 |
165,778 | CVE-2021-36805 | 4.8 | 3.5 | MEDIUM | Akaunting version 2.1.12 and earlier suffers from a persistent (type II) cross-site scripting (XSS) vulnerability in the sales invoice processing component of the application. This issue was fixed in version 2.1.13 of the product. | CWE-79 |
165,779 | CVE-2021-36807 | 8.8 | 6.5 | HIGH | An authenticated user could potentially execute code via an SQLi vulnerability in the user portal of SG UTM before version 9.708 MR8. | CWE-89 |
165,780 | CVE-2021-36808 | 7 | 4.4 | HIGH | A local attacker could bypass the app password using a race condition in Sophos Secure Workspace for Android before version 9.7.3115. | CWE-362 |
165,781 | CVE-2021-3682 | 8.5 | 6 | HIGH | A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host. | CWE-763 |
165,782 | CVE-2021-36823 | 8.2 | 3.5 | HIGH | Authenticated Stored Cross-Site Scripting (XSS) vulnerability in WordPress Absolutely Glamorous Custom Admin plugin (versions <= 6.8). Stored XSS possible via unsanitized input fields of the plugin settings, some of the payloads could make the frontend and the backend inaccessible. | CWE-79 |
165,783 | CVE-2021-3683 | 6.5 | 4.3 | MEDIUM | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | CWE-352 |
165,784 | CVE-2021-36832 | 5.4 | 3.5 | MEDIUM | WordPress Popups, Welcome Bar, Optins and Lead Generation Plugin – Icegram (versions <= 2.0.2) vulnerable at "Headline" (&message_data[16][headline]) input. | CWE-79 |
165,785 | CVE-2021-36841 | 5.4 | 3.5 | MEDIUM | Authenticated Stored Cross-Site Scripting (XSS) vulnerability in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.7, vulnerable parameter &yith_maintenance_newsletter_submit_label. Possible even when unfiltered HTML is disallowed by WordPress configuration. | CWE-79 |
165,786 | CVE-2021-36843 | 4.8 | 3.5 | MEDIUM | Authenticated Stored Cross-Site Scripting (XSS) vulnerability discovered in WordPress Floating Social Media Icon plugin (versions <= 4.3.5) Social Media Configuration form. Requires high role user like admin. | CWE-79 |
165,787 | CVE-2021-36845 | 4.8 | 3.5 | MEDIUM | Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. Vulnerable parameters: 1 - "Newsletter" tab, &yith_maintenance_newsletter_submit_label parameter: payload should start with a single quote (') symbol to break the context, i.e.: NOTIFY ME' autofocus onfocus=alert(/Visse/);// v=' - this payload will be auto triggered while admin visits this page/tab. 2 - "General" tab issues, vulnerable parameters: &yith_maintenance_message, &yith_maintenance_custom_style, &yith_maintenance_mascotte, &yith_maintenance_title_font[size], &yith_maintenance_title_font[family], &yith_maintenance_title_font[color], &yith_maintenance_paragraph_font[size], &yith_maintenance_paragraph_font[family], &yith_maintenance_paragraph_font[color], &yith_maintenance_border_top. 3 - "Background" tab issues, vulnerable parameters: &yith_maintenance_background_image, &yith_maintenance_background_color. 4 - "Logo" tab issues, vulnerable parameters: &yith_maintenance_logo_image, &yith_maintenance_logo_tagline, &yith_maintenance_logo_tagline_font[size], &yith_maintenance_logo_tagline_font[family], &yith_maintenance_logo_tagline_font[color]. 5 - "Newsletter" tab issues, vulnerable parameters: &yith_maintenance_newsletter_email_font[size], &yith_maintenance_newsletter_email_font[family], &yith_maintenance_newsletter_email_font[color], &yith_maintenance_newsletter_submit_font[size], &yith_maintenance_newsletter_submit_font[family], &yith_maintenance_newsletter_submit_font[color], &yith_maintenance_newsletter_submit_background, &yith_maintenance_newsletter_submit_background_hover, &yith_maintenance_newsletter_title, &yith_maintenance_newsletter_action, &yith_maintenance_newsletter_email_label, &yith_maintenance_newsletter_email_name, &yith_maintenance_newsletter_submit_label, &yith_maintenance_newsletter_hidden_fields. 6 - "Socials" tab issues, vulnerable parameters: &yith_maintenance_socials_facebook, &yith_maintenance_socials_twitter, &yith_maintenance_socials_gplus, &yith_maintenance_socials_youtube, &yith_maintenance_socials_rss, &yith_maintenance_socials_skype, &yith_maintenance_socials_email, &yith_maintenance_socials_behance, &yith_maintenance_socials_dribble, &yith_maintenance_socials_flickr, &yith_maintenance_socials_instagram, &yith_maintenance_socials_pinterest, &yith_maintenance_socials_tumblr, &yith_maintenance_socials_linkedin. | CWE-79 |
165,788 | CVE-2021-36850 | 4.3 | 4.3 | MEDIUM | Cross-Site Request Forgery (CSRF) vulnerability in WordPress Media File Renamer – Auto & Manual Rename plugin (versions <= 5.1.9). Affected parameters "post_title", "filename", "lock". This allows changing the uploaded media title, media file name, and media locking state. | CWE-352 |
165,789 | CVE-2021-36869 | 6.1 | 4.3 | MEDIUM | Reflected Cross-Site Scripting (XSS) vulnerability in WordPress Ivory Search plugin (versions <= 4.6.6). Vulnerable parameter: &post. | CWE-79 |
165,790 | CVE-2021-36870 | 5.4 | 3.5 | MEDIUM | Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in WordPress WP Google Maps plugin (versions <= 8.1.12). Vulnerable parameters: &dataset_name, &wpgmza_gdpr_retention_purpose, &wpgmza_gdpr_company_name, &name #2, &name, &polyname #2, &polyname, &address. | CWE-79 |
165,791 | CVE-2021-36871 | 5.4 | 3.5 | MEDIUM | Multiple Authenticated Persistent Cross-Site Scripting (XSS) vulnerabilities in WordPress WP Google Maps Pro premium plugin (versions <= 8.1.11). Vulnerable parameters: &wpgmaps_marker_category_name, Value > &attributes[], Name > &attributes[], &icons[], &names[], &description, &link, &title. | CWE-79 |
165,792 | CVE-2021-36872 | 5.4 | 3.5 | MEDIUM | Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress Popular Posts plugin (versions <= 5.3.3). Vulnerable at &widget-wpp[2][post_type]. | CWE-79 |
165,793 | CVE-2021-36873 | 5.4 | 3.5 | MEDIUM | Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress iQ Block Country plugin (versions <= 1.2.11). Vulnerable parameter: &blockcountry_blockmessage. | CWE-79 |
165,794 | CVE-2021-36874 | 8.8 | 6.5 | HIGH | Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5). | CWE-639 |
165,795 | CVE-2021-36875 | 4.8 | 3.5 | MEDIUM | Authenticated Reflected Cross-Site Scripting (XSS) vulnerability in WordPress uListing plugin (versions <= 2.0.5). Vulnerable parameters: &filter[id], &filter[user], &filter[expired_date], &filter[created_date], &filter[updated_date]. | CWE-79 |
165,796 | CVE-2021-36876 | 8.8 | 6.8 | HIGH | Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in WordPress uListing plugin (versions <= 2.0.5) as it lacks CSRF checks on plugin administration pages. | CWE-352 |
165,797 | CVE-2021-36877 | 6.5 | 4.3 | MEDIUM | Cross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to modify user roles. | CWE-352 |
165,798 | CVE-2021-36878 | 4.3 | 4.3 | MEDIUM | Cross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to update settings. | CWE-352 |
165,799 | CVE-2021-36879 | 9.8 | 7.5 | CRITICAL | Unauthenticated Privilege Escalation vulnerability in WordPress uListing plugin (versions <= 2.0.5). Possible if WordPress configuration allows user registration. | CWE-269 |
165,800 | CVE-2021-36880 | 9.8 | 7.5 | CRITICAL | Unauthenticated SQL Injection (SQLi) vulnerability in WordPress uListing plugin (versions <= 2.0.3), vulnerable parameter: custom. | CWE-89 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.