ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
166,101
CVE-2021-37333
9.8
7.5
CRITICAL
Laravel Booking System Booking Core 2.0 is vulnerable to Session Management. A password change at sandbox.bookingcore.org/user/profile/change-password does not invalidate a session that is opened in a different browser.
CWE-613
166,102
CVE-2021-37334
9.8
9.3
CRITICAL
Umbraco Forms version 4.0.0 up to and including 8.7.5 and below are vulnerable to a security flaw that could lead to a remote code execution attack and/or arbitrary file deletion. A vulnerability occurs because validation of the file extension is performed after the file has been stored in a temporary directory. By default, files are stored within the application directory structure at %BASEDIR%/APP_DATA/TEMP/FileUploads/. Whilst access to this directory is restricted by the root web.config file, it is possible to override this restriction by uploading another specially crafted web.config file to the temporary directory. It is possible to exploit this flaw to upload a malicious script file to execute arbitrary code and system commands on the server.
NVD-CWE-noinfo
166,103
CVE-2021-3734
8.8
6.8
HIGH
yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames
CWE-352
166,104
CVE-2021-3734
8.8
6.8
HIGH
yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames
CWE-1021
166,105
CVE-2021-37343
8.8
6.5
HIGH
A path traversal vulnerability exists in Nagios XI below version 5.8.5 AutoDiscovery component and could lead to post authenticated RCE under security context of the user running Nagios.
CWE-22
166,106
CVE-2021-37344
9.8
7.5
CRITICAL
Nagios XI Switch Wizard before version 2.5.7 is vulnerable to remote code execution through improper neutralisation of special elements used in an OS Command (OS Command injection).
CWE-78
166,107
CVE-2021-37345
7.8
4.6
HIGH
Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because xi-sys.cfg is being imported from the var directory for some scripts with elevated permissions.
CWE-269
166,108
CVE-2021-37346
9.8
7.5
CRITICAL
Nagios XI WatchGuard Wizard before version 1.4.8 is vulnerable to remote code execution through Improper neutralisation of special elements used in an OS Command (OS Command injection).
CWE-78
166,109
CVE-2021-37347
7.8
4.6
HIGH
Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because getprofile.sh does not validate the directory name it receives as an argument.
CWE-269
166,110
CVE-2021-37348
7.5
5
HIGH
Nagios XI before version 5.8.5 is vulnerable to local file inclusion through improper limitation of a pathname in index.php.
CWE-552
166,111
CVE-2021-37349
7.8
4.6
HIGH
Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because cleaner.php does not sanitise input read from the database.
CWE-269
166,112
CVE-2021-37350
9.8
7.5
CRITICAL
Nagios XI before version 5.8.5 is vulnerable to SQL injection vulnerability in Bulk Modifications Tool due to improper input sanitisation.
CWE-89
166,113
CVE-2021-37351
5.3
5
MEDIUM
Nagios XI before version 5.8.5 is vulnerable to insecure permissions and allows unauthenticated users to access guarded pages through a crafted HTTP request to the server.
CWE-276
166,114
CVE-2021-37352
6.1
5.8
MEDIUM
An open redirect vulnerability exists in Nagios XI before version 5.8.5 that could lead to spoofing. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link.
CWE-601
166,115
CVE-2021-37353
9.8
7.5
CRITICAL
Nagios XI Docker Wizard before version 1.1.3 is vulnerable to SSRF due to improper sanitation in table_population.php.
CWE-918
166,116
CVE-2021-37358
9.8
7.5
CRITICAL
SQL Injection in SEACMS v210530 (2021-05-30) allows remote attackers to execute arbitrary code via the component "admin_ajax.php?action=checkrepeat&v_name=".
CWE-89
166,117
CVE-2021-37363
7.8
9.3
HIGH
An Insecure Permissions issue exists in Gestionale Open 11.00.00. A low privilege account is able to rename the mysqld.exe file located in bin folder and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.
CWE-276
166,118
CVE-2021-37364
7.8
9.3
HIGH
OpenClinic GA 5.194.18 is affected by Insecure Permissions. By default the Authenticated Users group has the modify permission to openclinic folders/files. A low privilege account is able to rename mysqld.exe or tomcat8.exe files located in bin folders and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.
CWE-732
166,119
CVE-2021-37365
6.1
4.3
MEDIUM
CTparental before 4.45.03 is vulnerable to cross-site scripting (XSS) in the CTparental admin panel. In bl_categires_help.php, the 'categories' variable is assigned with the content of the query string param 'cat' without sanitization or encoding, enabling an attacker to inject malicious code into the output webpage.
CWE-79
166,120
CVE-2021-37366
8.8
6.8
HIGH
CTparental before 4.45.03 is vulnerable to cross-site request forgery (CSRF) in the CTparental admin panel. By combining CSRF with XSS, an attacker can trick the administrator into clicking a link that cancels the filtering for all standard users.
CWE-352
166,121
CVE-2021-37367
7.8
4.6
HIGH
CTparental before 4.45.07 is affected by a code execution vulnerability in the CTparental admin panel. Because The file "bl_categories_help.php" is vulnerable to directory traversal, an attacker can create a file that contains scripts and run arbitrary commands.
CWE-22
166,122
CVE-2021-37371
9.8
7.5
CRITICAL
Online Student Admission System 1.0 is affected by an unauthenticated SQL injection bypass vulnerability in /admin/login.php.
CWE-89
166,123
CVE-2021-37372
8.8
6.5
HIGH
Online Student Admission System 1.0 is affected by an insecure file upload vulnerability. A low privileged user can upload malicious PHP files by updating their profile image to gain remote code execution.
CWE-434
166,124
CVE-2021-37381
8.8
6.8
HIGH
Southsoft GMIS 5.0 is vulnerable to CSRF attacks. Attackers can access other users' private information such as photos through CSRF. For example: any student's photo information can be accessed through /gmis/(S([1]))/student/grgl/PotoImageShow/?bh=[2]. Among them, the code in [1] is a random string generated according to the user's login related information. It can protect the user's identity, but it can not effectively prevent unauthorized access. The code in [2] is the student number of any student. The attacker can carry out CSRF attack on the system by modifying [2] without modifying [1].
CWE-352
166,125
CVE-2021-37388
9.8
7.5
CRITICAL
A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution.
CWE-120
166,126
CVE-2021-37389
6.1
4.3
MEDIUM
Chamilo 1.11.14 allows stored XSS via main/install/index.php and main/install/ajax.php through the port parameter.
CWE-79
166,127
CVE-2021-37390
6.1
4.3
MEDIUM
A Chamilo LMS 1.11.14 reflected XSS vulnerability exists in main/social/search.php=q URI (social network search feature).
CWE-79
166,128
CVE-2021-37391
5.4
3.5
MEDIUM
A user without privileges in Chamilo LMS 1.11.14 can send an invitation message to another user, e.g., the administrator, through main/social/search.php, main/inc/lib/social.lib.php and steal cookies or execute arbitrary code on the administration side via a stored XSS vulnerability via social network the send invitation feature.
CWE-79
166,129
CVE-2021-37392
5.4
3.5
MEDIUM
In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.
CWE-79
166,130
CVE-2021-37393
5.4
3.5
MEDIUM
In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. Attacker can use "update password" function to inject XSS payloads into nickname variable, and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.
CWE-79
166,131
CVE-2021-37394
8.8
6
HIGH
In RPCMS v1.8 and below, attackers can interact with API and change variable "role" to "admin" to achieve admin user registration.
CWE-269
166,132
CVE-2021-37402
6.1
4.3
MEDIUM
OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via binary data that is mishandled when the legacy dataretrieval endpoint has been enabled.
CWE-79
166,133
CVE-2021-37403
6.1
4.3
MEDIUM
OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via a code snippet (user-generated content) when a sharing link is created and an App Loader relative URL is used.
CWE-79
166,134
CVE-2021-37412
6.1
4.3
MEDIUM
The TechRadar app 1.1 for Confluence Server allows XSS via the Title field of a Radar.
CWE-79
166,135
CVE-2021-37414
7.5
5
HIGH
Zoho ManageEngine DesktopCentral before 10.0.709 allows anyone to get a valid user's APIKEY without authentication.
CWE-287
166,136
CVE-2021-37415
9.8
7.5
CRITICAL
Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.
CWE-287
166,137
CVE-2021-37416
6.1
4.3
MEDIUM
Zoho ManageEngine ADSelfService Plus version 6103 and prior is vulnerable to reflected XSS on the loadframe page.
CWE-79
166,138
CVE-2021-37417
9.8
5
CRITICAL
Zoho ManageEngine ADSelfService Plus version 6103 and prior allows CAPTCHA bypass due to improper parameter validation.
CWE-20
166,139
CVE-2021-37419
9.8
7.5
CRITICAL
ManageEngine ADSelfService Plus before 6112 is vulnerable to SSRF.
CWE-918
166,140
CVE-2021-37420
7.5
5
HIGH
ManageEngine ADSelfService Plus before 6112 is vulnerable to mail spoofing.
CWE-287
166,141
CVE-2021-37421
9.8
7.5
CRITICAL
Zoho ManageEngine ADSelfService Plus 6103 and prior is vulnerable to admin portal access-restriction bypass.
CWE-863
166,142
CVE-2021-37422
9.8
7.5
CRITICAL
Zoho ManageEngine ADSelfService Plus 6111 and prior is vulnerable to SQL Injection while linking the databases.
CWE-89
166,143
CVE-2021-37423
9.8
7.5
CRITICAL
Zoho ManageEngine ADSelfService Plus 6111 and prior is vulnerable to linked applications takeover.
NVD-CWE-noinfo
166,144
CVE-2021-37424
9.8
7.5
CRITICAL
ManageEngine ADSelfService Plus before 6112 is vulnerable to domain user account takeover.
CWE-269
166,145
CVE-2021-37425
9.1
6.4
CRITICAL
Altova MobileTogether Server before 7.3 SP1 allows XXE attacks, such as an InfoSetChanges/Changes attack against /workflowmanagement, or reading mobiletogetherserver.cfg and then reading the certificate and private key.
CWE-611
166,146
CVE-2021-37436
4.2
1.9
MEDIUM
Amazon Echo Dot devices through 2021-07-02 sometimes allow attackers, who have physical access to a device after a factory reset, to obtain sensitive information via a series of complex hardware and software attacks. NOTE: reportedly, there were vendor marketing statements about safely removing personal content via a factory reset. Also, the vendor has reportedly indicated that they are working on mitigations.
NVD-CWE-noinfo
166,147
CVE-2021-37439
6.5
4
MEDIUM
NCH FlexiServer v6.00 suffers from a syslog?file=/.. path traversal vulnerability.
CWE-22
166,148
CVE-2021-37440
6.5
4
MEDIUM
NCH Axon PBX v2.22 and earlier allows path traversal for file disclosure via the logprop?file=/.. substring.
CWE-22
166,149
CVE-2021-37441
8.8
6.5
HIGH
NCH Axon PBX v2.22 and earlier allows path traversal for file deletion via the logdelete?file=/.. substring.
CWE-22
166,150
CVE-2021-37442
6.5
4
MEDIUM
NCH IVM Attendant v5.12 and earlier allows path traversal via viewfile?file=/.. to read files.
CWE-22
166,151
CVE-2021-37443
8.1
5.5
HIGH
NCH IVM Attendant v5.12 and earlier allows path traversal via the logdeleteselected check0 parameter for file deletion.
CWE-22
166,152
CVE-2021-37444
8.8
6.5
HIGH
NCH IVM Attendant v5.12 and earlier suffers from a directory traversal weakness upon uploading plugins in a ZIP archive. This can lead to code execution if a ZIP element's pathname is set to a Windows startup folder, a file for the inbuilt Out-Going Message function, or a file for the the inbuilt Autodial function.
CWE-22
166,153
CVE-2021-37444
8.8
6.5
HIGH
NCH IVM Attendant v5.12 and earlier suffers from a directory traversal weakness upon uploading plugins in a ZIP archive. This can lead to code execution if a ZIP element's pathname is set to a Windows startup folder, a file for the inbuilt Out-Going Message function, or a file for the the inbuilt Autodial function.
CWE-434
166,154
CVE-2021-37445
6.5
4
MEDIUM
In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via logprop?file=/.. for file reading.
CWE-22
166,155
CVE-2021-37446
4.3
4
MEDIUM
In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via documentprop?file=/.. for file reading.
CWE-22
166,156
CVE-2021-37447
8.1
5.5
HIGH
In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via documentdelete?file=/.. for file deletion.
CWE-22
166,157
CVE-2021-37448
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via the Mailbox name (stored).
CWE-79
166,158
CVE-2021-37449
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via /ogmlist?folder= (reflected).
CWE-79
166,159
CVE-2021-3745
6.6
6
MEDIUM
flatcore-cms is vulnerable to Unrestricted Upload of File with Dangerous Type
CWE-434
166,160
CVE-2021-37450
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via /ogmprop?id= (reflected).
CWE-79
166,161
CVE-2021-37451
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via /msglist?mbx= (reflected).
CWE-79
166,162
CVE-2021-37452
5.5
2.1
MEDIUM
NCH Quorum v2.03 and earlier allows local users to discover cleartext login information relating to users by reading the local .dat configuration files.
CWE-522
166,163
CVE-2021-37453
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the extension name (stored).
CWE-79
166,164
CVE-2021-37454
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the line name (stored).
CWE-79
166,165
CVE-2021-37455
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the outbound dialing plan (stored).
CWE-79
166,166
CVE-2021-37456
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the blacklist IP address (stored).
CWE-79
166,167
CVE-2021-37457
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the SipRule field (stored).
CWE-79
166,168
CVE-2021-37458
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the primary phone field (stored).
CWE-79
166,169
CVE-2021-37459
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the customer name field (stored).
CWE-79
166,170
CVE-2021-3746
6.5
7.1
MEDIUM
A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.
CWE-119
166,171
CVE-2021-37460
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /planprop?id= (reflected).
CWE-79
166,172
CVE-2021-37461
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /extensionsinstruction?id= (reflected).
CWE-79
166,173
CVE-2021-37462
5.4
3.5
MEDIUM
Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /ipblacklist?errorip= (reflected).
CWE-79
166,174
CVE-2021-37463
5.4
3.5
MEDIUM
In NCH Quorum v2.03 and earlier, XSS exists via User Display Name (stored).
CWE-79
166,175
CVE-2021-37464
5.4
3.5
MEDIUM
In NCH Quorum v2.03 and earlier, XSS exists via Conference Description (stored).
CWE-79
166,176
CVE-2021-37465
5.4
3.5
MEDIUM
In NCH Quorum v2.03 and earlier, XSS exists via /uploaddoc?id= (reflected).
CWE-79
166,177
CVE-2021-37466
5.4
3.5
MEDIUM
In NCH Quorum v2.03 and earlier, XSS exists via /conference?id= (reflected).
CWE-79
166,178
CVE-2021-37467
5.4
3.5
MEDIUM
In NCH Quorum v2.03 and earlier, XSS exists via /conferencebrowseuploadfile?confid= (reflected).
CWE-79
166,179
CVE-2021-37468
3.3
2.1
LOW
NCH Reflect CRM 3.01 allows local users to discover cleartext user account information by reading the configuration files.
CWE-200
166,180
CVE-2021-37469
6.5
4
MEDIUM
In NCH WebDictate v2.13 and earlier, authenticated users can abuse logprop?file=/.. path traversal to read files on the filesystem.
CWE-22
166,181
CVE-2021-3747
7.8
4.6
HIGH
The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner.
CWE-732
166,182
CVE-2021-37470
5.4
3.5
MEDIUM
In NCH WebDictate v2.13, persistent Cross Site Scripting (XSS) exists in the Recipient Name field. An authenticated user can add or modify the affected field to inject arbitrary JavaScript.
CWE-79
166,183
CVE-2021-37471
7.5
7.8
HIGH
Cradlepoint IBR900-600 devices running versions < 7.21.10 are vulnerable to a restricted shell escape sequence that provides an attacker the capability to simultaneously deny availability to the device's NetCloud Manager console, local console and SSH command-line.
CWE-400
166,184
CVE-2021-37473
9.8
7.5
CRITICAL
In NavigateCMS version 2.9.4 and below, function in `product.php` is vulnerable to sql injection on parameter `products-order` through a post request, which results in arbitrary sql query execution in the backend database.
CWE-89
166,185
CVE-2021-37475
9.8
7.5
CRITICAL
In NavigateCMS version 2.9.4 and below, function in `templates.php` is vulnerable to sql injection on parameter `template-properties-order`, which results in arbitrary sql query execution in the backend database.
CWE-89
166,186
CVE-2021-37476
9.8
7.5
CRITICAL
In NavigateCMS version 2.9.4 and below, function in `product.php` is vulnerable to sql injection on parameter `id` through a post request, which results in arbitrary sql query execution in the backend database.
CWE-89
166,187
CVE-2021-37477
9.8
7.5
CRITICAL
In NavigateCMS version 2.9.4 and below, function in `structure.php` is vulnerable to sql injection on parameter `children_order`, which results in arbitrary sql query execution in the backend database.
CWE-89
166,188
CVE-2021-37478
9.8
7.5
CRITICAL
In NavigateCMS version 2.9.4 and below, function `block` is vulnerable to sql injection on parameter `block-order`, which results in arbitrary sql query execution in the backend database.
CWE-89
166,189
CVE-2021-3749
7.5
7.8
HIGH
axios is vulnerable to Inefficient Regular Expression Complexity
CWE-697
166,190
CVE-2021-3751
9.8
7.5
CRITICAL
libmobi is vulnerable to Out-of-bounds Write
CWE-787
166,191
CVE-2021-37531
8.8
9
HIGH
SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system.
CWE-78
166,192
CVE-2021-37532
4.3
4
MEDIUM
SAP Business One version - 10, due to improper input validation, allows an authenticated User to gain access to directory and view the contents of index in the directory, which would otherwise be restricted to high privileged User.
CWE-22
166,193
CVE-2021-37534
5.4
3.5
MEDIUM
app/View/GalaxyClusters/add.ctp in MISP 2.4.146 allows Stored XSS when forking a galaxy cluster.
CWE-79
166,194
CVE-2021-37535
9.8
7.5
CRITICAL
SAP NetWeaver Application Server Java (JMS Connector Service) - versions 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform necessary authorization checks for user privileges.
CWE-862
166,195
CVE-2021-37538
9.8
7.5
CRITICAL
Multiple SQL injection vulnerabilities in SmartDataSoft SmartBlog for PrestaShop before 4.06 allow a remote unauthenticated attacker to execute arbitrary SQL commands via the day, month, or year parameter to the controllers/front/archive.php archive controller, or the id_category parameter to the controllers/front/category.php category controller.
CWE-89
166,196
CVE-2021-37539
9.8
7.5
CRITICAL
Zoho ManageEngine ADManager Plus before 7111 is vulnerable to unrestricted file which leads to Remote code execution.
CWE-434
166,197
CVE-2021-37540
6.5
6.4
MEDIUM
In JetBrains Hub before 2021.1.13262, a potentially insufficient CSP for the Widget deployment feature was used.
CWE-326
166,198
CVE-2021-37541
6.1
4.3
MEDIUM
In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible.
CWE-74
166,199
CVE-2021-37541
6.1
4.3
MEDIUM
In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible.
CWE-640
166,200
CVE-2021-37542
6.1
4.3
MEDIUM
In JetBrains TeamCity before 2020.2.3, XSS was possible.
CWE-79