ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
166,101 | CVE-2021-37333 | 9.8 | 7.5 | CRITICAL | Laravel Booking System Booking Core 2.0 is vulnerable to Session Management. A password change at sandbox.bookingcore.org/user/profile/change-password does not invalidate a session that is opened in a different browser. | CWE-613 |
166,102 | CVE-2021-37334 | 9.8 | 9.3 | CRITICAL | Umbraco Forms version 4.0.0 up to and including 8.7.5 and below are vulnerable to a security flaw that could lead to a remote code execution attack and/or arbitrary file deletion. A vulnerability occurs because validation of the file extension is performed after the file has been stored in a temporary directory. By default, files are stored within the application directory structure at %BASEDIR%/APP_DATA/TEMP/FileUploads/. Whilst access to this directory is restricted by the root web.config file, it is possible to override this restriction by uploading another specially crafted web.config file to the temporary directory. It is possible to exploit this flaw to upload a malicious script file to execute arbitrary code and system commands on the server. | NVD-CWE-noinfo |
166,103 | CVE-2021-3734 | 8.8 | 6.8 | HIGH | yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames | CWE-352 |
166,104 | CVE-2021-3734 | 8.8 | 6.8 | HIGH | yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames | CWE-1021 |
166,105 | CVE-2021-37343 | 8.8 | 6.5 | HIGH | A path traversal vulnerability exists in Nagios XI below version 5.8.5 AutoDiscovery component and could lead to post authenticated RCE under security context of the user running Nagios. | CWE-22 |
166,106 | CVE-2021-37344 | 9.8 | 7.5 | CRITICAL | Nagios XI Switch Wizard before version 2.5.7 is vulnerable to remote code execution through improper neutralisation of special elements used in an OS Command (OS Command injection). | CWE-78 |
166,107 | CVE-2021-37345 | 7.8 | 4.6 | HIGH | Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because xi-sys.cfg is being imported from the var directory for some scripts with elevated permissions. | CWE-269 |
166,108 | CVE-2021-37346 | 9.8 | 7.5 | CRITICAL | Nagios XI WatchGuard Wizard before version 1.4.8 is vulnerable to remote code execution through Improper neutralisation of special elements used in an OS Command (OS Command injection). | CWE-78 |
166,109 | CVE-2021-37347 | 7.8 | 4.6 | HIGH | Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because getprofile.sh does not validate the directory name it receives as an argument. | CWE-269 |
166,110 | CVE-2021-37348 | 7.5 | 5 | HIGH | Nagios XI before version 5.8.5 is vulnerable to local file inclusion through improper limitation of a pathname in index.php. | CWE-552 |
166,111 | CVE-2021-37349 | 7.8 | 4.6 | HIGH | Nagios XI before version 5.8.5 is vulnerable to local privilege escalation because cleaner.php does not sanitise input read from the database. | CWE-269 |
166,112 | CVE-2021-37350 | 9.8 | 7.5 | CRITICAL | Nagios XI before version 5.8.5 is vulnerable to SQL injection vulnerability in Bulk Modifications Tool due to improper input sanitisation. | CWE-89 |
166,113 | CVE-2021-37351 | 5.3 | 5 | MEDIUM | Nagios XI before version 5.8.5 is vulnerable to insecure permissions and allows unauthenticated users to access guarded pages through a crafted HTTP request to the server. | CWE-276 |
166,114 | CVE-2021-37352 | 6.1 | 5.8 | MEDIUM | An open redirect vulnerability exists in Nagios XI before version 5.8.5 that could lead to spoofing. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link. | CWE-601 |
166,115 | CVE-2021-37353 | 9.8 | 7.5 | CRITICAL | Nagios XI Docker Wizard before version 1.1.3 is vulnerable to SSRF due to improper sanitation in table_population.php. | CWE-918 |
166,116 | CVE-2021-37358 | 9.8 | 7.5 | CRITICAL | SQL Injection in SEACMS v210530 (2021-05-30) allows remote attackers to execute arbitrary code via the component "admin_ajax.php?action=checkrepeat&v_name=". | CWE-89 |
166,117 | CVE-2021-37363 | 7.8 | 9.3 | HIGH | An Insecure Permissions issue exists in Gestionale Open 11.00.00. A low privilege account is able to rename the mysqld.exe file located in bin folder and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues. | CWE-276 |
166,118 | CVE-2021-37364 | 7.8 | 9.3 | HIGH | OpenClinic GA 5.194.18 is affected by Insecure Permissions. By default the Authenticated Users group has the modify permission to openclinic folders/files. A low privilege account is able to rename mysqld.exe or tomcat8.exe files located in bin folders and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues. | CWE-732 |
166,119 | CVE-2021-37365 | 6.1 | 4.3 | MEDIUM | CTparental before 4.45.03 is vulnerable to cross-site scripting (XSS) in the CTparental admin panel. In bl_categires_help.php, the 'categories' variable is assigned with the content of the query string param 'cat' without sanitization or encoding, enabling an attacker to inject malicious code into the output webpage. | CWE-79 |
166,120 | CVE-2021-37366 | 8.8 | 6.8 | HIGH | CTparental before 4.45.03 is vulnerable to cross-site request forgery (CSRF) in the CTparental admin panel. By combining CSRF with XSS, an attacker can trick the administrator into clicking a link that cancels the filtering for all standard users. | CWE-352 |
166,121 | CVE-2021-37367 | 7.8 | 4.6 | HIGH | CTparental before 4.45.07 is affected by a code execution vulnerability in the CTparental admin panel. Because The file "bl_categories_help.php" is vulnerable to directory traversal, an attacker can create a file that contains scripts and run arbitrary commands. | CWE-22 |
166,122 | CVE-2021-37371 | 9.8 | 7.5 | CRITICAL | Online Student Admission System 1.0 is affected by an unauthenticated SQL injection bypass vulnerability in /admin/login.php. | CWE-89 |
166,123 | CVE-2021-37372 | 8.8 | 6.5 | HIGH | Online Student Admission System 1.0 is affected by an insecure file upload vulnerability. A low privileged user can upload malicious PHP files by updating their profile image to gain remote code execution. | CWE-434 |
166,124 | CVE-2021-37381 | 8.8 | 6.8 | HIGH | Southsoft GMIS 5.0 is vulnerable to CSRF attacks. Attackers can access other users' private information such as photos through CSRF. For example: any student's photo information can be accessed through /gmis/(S([1]))/student/grgl/PotoImageShow/?bh=[2]. Among them, the code in [1] is a random string generated according to the user's login related information. It can protect the user's identity, but it can not effectively prevent unauthorized access. The code in [2] is the student number of any student. The attacker can carry out CSRF attack on the system by modifying [2] without modifying [1]. | CWE-352 |
166,125 | CVE-2021-37388 | 9.8 | 7.5 | CRITICAL | A buffer overflow in D-Link DIR-615 C2 3.03WW. The ping_ipaddr parameter in ping_response.cgi POST request allows an attacker to crash the webserver and might even gain remote code execution. | CWE-120 |
166,126 | CVE-2021-37389 | 6.1 | 4.3 | MEDIUM | Chamilo 1.11.14 allows stored XSS via main/install/index.php and main/install/ajax.php through the port parameter. | CWE-79 |
166,127 | CVE-2021-37390 | 6.1 | 4.3 | MEDIUM | A Chamilo LMS 1.11.14 reflected XSS vulnerability exists in main/social/search.php=q URI (social network search feature). | CWE-79 |
166,128 | CVE-2021-37391 | 5.4 | 3.5 | MEDIUM | A user without privileges in Chamilo LMS 1.11.14 can send an invitation message to another user, e.g., the administrator, through main/social/search.php, main/inc/lib/social.lib.php and steal cookies or execute arbitrary code on the administration side via a stored XSS vulnerability via social network the send invitation feature. | CWE-79 |
166,129 | CVE-2021-37392 | 5.4 | 3.5 | MEDIUM | In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS. | CWE-79 |
166,130 | CVE-2021-37393 | 5.4 | 3.5 | MEDIUM | In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. Attacker can use "update password" function to inject XSS payloads into nickname variable, and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS. | CWE-79 |
166,131 | CVE-2021-37394 | 8.8 | 6 | HIGH | In RPCMS v1.8 and below, attackers can interact with API and change variable "role" to "admin" to achieve admin user registration. | CWE-269 |
166,132 | CVE-2021-37402 | 6.1 | 4.3 | MEDIUM | OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via binary data that is mishandled when the legacy dataretrieval endpoint has been enabled. | CWE-79 |
166,133 | CVE-2021-37403 | 6.1 | 4.3 | MEDIUM | OX App Suite before 7.10.3-rev32 and 7.10.4 before 7.10.4-rev18 allows XSS via a code snippet (user-generated content) when a sharing link is created and an App Loader relative URL is used. | CWE-79 |
166,134 | CVE-2021-37412 | 6.1 | 4.3 | MEDIUM | The TechRadar app 1.1 for Confluence Server allows XSS via the Title field of a Radar. | CWE-79 |
166,135 | CVE-2021-37414 | 7.5 | 5 | HIGH | Zoho ManageEngine DesktopCentral before 10.0.709 allows anyone to get a valid user's APIKEY without authentication. | CWE-287 |
166,136 | CVE-2021-37415 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication. | CWE-287 |
166,137 | CVE-2021-37416 | 6.1 | 4.3 | MEDIUM | Zoho ManageEngine ADSelfService Plus version 6103 and prior is vulnerable to reflected XSS on the loadframe page. | CWE-79 |
166,138 | CVE-2021-37417 | 9.8 | 5 | CRITICAL | Zoho ManageEngine ADSelfService Plus version 6103 and prior allows CAPTCHA bypass due to improper parameter validation. | CWE-20 |
166,139 | CVE-2021-37419 | 9.8 | 7.5 | CRITICAL | ManageEngine ADSelfService Plus before 6112 is vulnerable to SSRF. | CWE-918 |
166,140 | CVE-2021-37420 | 7.5 | 5 | HIGH | ManageEngine ADSelfService Plus before 6112 is vulnerable to mail spoofing. | CWE-287 |
166,141 | CVE-2021-37421 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine ADSelfService Plus 6103 and prior is vulnerable to admin portal access-restriction bypass. | CWE-863 |
166,142 | CVE-2021-37422 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine ADSelfService Plus 6111 and prior is vulnerable to SQL Injection while linking the databases. | CWE-89 |
166,143 | CVE-2021-37423 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine ADSelfService Plus 6111 and prior is vulnerable to linked applications takeover. | NVD-CWE-noinfo |
166,144 | CVE-2021-37424 | 9.8 | 7.5 | CRITICAL | ManageEngine ADSelfService Plus before 6112 is vulnerable to domain user account takeover. | CWE-269 |
166,145 | CVE-2021-37425 | 9.1 | 6.4 | CRITICAL | Altova MobileTogether Server before 7.3 SP1 allows XXE attacks, such as an InfoSetChanges/Changes attack against /workflowmanagement, or reading mobiletogetherserver.cfg and then reading the certificate and private key. | CWE-611 |
166,146 | CVE-2021-37436 | 4.2 | 1.9 | MEDIUM | Amazon Echo Dot devices through 2021-07-02 sometimes allow attackers, who have physical access to a device after a factory reset, to obtain sensitive information via a series of complex hardware and software attacks. NOTE: reportedly, there were vendor marketing statements about safely removing personal content via a factory reset. Also, the vendor has reportedly indicated that they are working on mitigations. | NVD-CWE-noinfo |
166,147 | CVE-2021-37439 | 6.5 | 4 | MEDIUM | NCH FlexiServer v6.00 suffers from a syslog?file=/.. path traversal vulnerability. | CWE-22 |
166,148 | CVE-2021-37440 | 6.5 | 4 | MEDIUM | NCH Axon PBX v2.22 and earlier allows path traversal for file disclosure via the logprop?file=/.. substring. | CWE-22 |
166,149 | CVE-2021-37441 | 8.8 | 6.5 | HIGH | NCH Axon PBX v2.22 and earlier allows path traversal for file deletion via the logdelete?file=/.. substring. | CWE-22 |
166,150 | CVE-2021-37442 | 6.5 | 4 | MEDIUM | NCH IVM Attendant v5.12 and earlier allows path traversal via viewfile?file=/.. to read files. | CWE-22 |
166,151 | CVE-2021-37443 | 8.1 | 5.5 | HIGH | NCH IVM Attendant v5.12 and earlier allows path traversal via the logdeleteselected check0 parameter for file deletion. | CWE-22 |
166,152 | CVE-2021-37444 | 8.8 | 6.5 | HIGH | NCH IVM Attendant v5.12 and earlier suffers from a directory traversal weakness upon uploading plugins in a ZIP archive. This can lead to code execution if a ZIP element's pathname is set to a Windows startup folder, a file for the inbuilt Out-Going Message function, or a file for the the inbuilt Autodial function. | CWE-22 |
166,153 | CVE-2021-37444 | 8.8 | 6.5 | HIGH | NCH IVM Attendant v5.12 and earlier suffers from a directory traversal weakness upon uploading plugins in a ZIP archive. This can lead to code execution if a ZIP element's pathname is set to a Windows startup folder, a file for the inbuilt Out-Going Message function, or a file for the the inbuilt Autodial function. | CWE-434 |
166,154 | CVE-2021-37445 | 6.5 | 4 | MEDIUM | In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via logprop?file=/.. for file reading. | CWE-22 |
166,155 | CVE-2021-37446 | 4.3 | 4 | MEDIUM | In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via documentprop?file=/.. for file reading. | CWE-22 |
166,156 | CVE-2021-37447 | 8.1 | 5.5 | HIGH | In NCH Quorum v2.03 and earlier, an authenticated user can use directory traversal via documentdelete?file=/.. for file deletion. | CWE-22 |
166,157 | CVE-2021-37448 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via the Mailbox name (stored). | CWE-79 |
166,158 | CVE-2021-37449 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via /ogmlist?folder= (reflected). | CWE-79 |
166,159 | CVE-2021-3745 | 6.6 | 6 | MEDIUM | flatcore-cms is vulnerable to Unrestricted Upload of File with Dangerous Type | CWE-434 |
166,160 | CVE-2021-37450 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via /ogmprop?id= (reflected). | CWE-79 |
166,161 | CVE-2021-37451 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH IVM Attendant v5.12 and earlier via /msglist?mbx= (reflected). | CWE-79 |
166,162 | CVE-2021-37452 | 5.5 | 2.1 | MEDIUM | NCH Quorum v2.03 and earlier allows local users to discover cleartext login information relating to users by reading the local .dat configuration files. | CWE-522 |
166,163 | CVE-2021-37453 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the extension name (stored). | CWE-79 |
166,164 | CVE-2021-37454 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the line name (stored). | CWE-79 |
166,165 | CVE-2021-37455 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the outbound dialing plan (stored). | CWE-79 |
166,166 | CVE-2021-37456 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the blacklist IP address (stored). | CWE-79 |
166,167 | CVE-2021-37457 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the SipRule field (stored). | CWE-79 |
166,168 | CVE-2021-37458 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the primary phone field (stored). | CWE-79 |
166,169 | CVE-2021-37459 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via the customer name field (stored). | CWE-79 |
166,170 | CVE-2021-3746 | 6.5 | 7.1 | MEDIUM | A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6. | CWE-119 |
166,171 | CVE-2021-37460 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /planprop?id= (reflected). | CWE-79 |
166,172 | CVE-2021-37461 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /extensionsinstruction?id= (reflected). | CWE-79 |
166,173 | CVE-2021-37462 | 5.4 | 3.5 | MEDIUM | Cross Site Scripting (XSS) exists in NCH Axon PBX v2.22 and earlier via /ipblacklist?errorip= (reflected). | CWE-79 |
166,174 | CVE-2021-37463 | 5.4 | 3.5 | MEDIUM | In NCH Quorum v2.03 and earlier, XSS exists via User Display Name (stored). | CWE-79 |
166,175 | CVE-2021-37464 | 5.4 | 3.5 | MEDIUM | In NCH Quorum v2.03 and earlier, XSS exists via Conference Description (stored). | CWE-79 |
166,176 | CVE-2021-37465 | 5.4 | 3.5 | MEDIUM | In NCH Quorum v2.03 and earlier, XSS exists via /uploaddoc?id= (reflected). | CWE-79 |
166,177 | CVE-2021-37466 | 5.4 | 3.5 | MEDIUM | In NCH Quorum v2.03 and earlier, XSS exists via /conference?id= (reflected). | CWE-79 |
166,178 | CVE-2021-37467 | 5.4 | 3.5 | MEDIUM | In NCH Quorum v2.03 and earlier, XSS exists via /conferencebrowseuploadfile?confid= (reflected). | CWE-79 |
166,179 | CVE-2021-37468 | 3.3 | 2.1 | LOW | NCH Reflect CRM 3.01 allows local users to discover cleartext user account information by reading the configuration files. | CWE-200 |
166,180 | CVE-2021-37469 | 6.5 | 4 | MEDIUM | In NCH WebDictate v2.13 and earlier, authenticated users can abuse logprop?file=/.. path traversal to read files on the filesystem. | CWE-22 |
166,181 | CVE-2021-3747 | 7.8 | 4.6 | HIGH | The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner. | CWE-732 |
166,182 | CVE-2021-37470 | 5.4 | 3.5 | MEDIUM | In NCH WebDictate v2.13, persistent Cross Site Scripting (XSS) exists in the Recipient Name field. An authenticated user can add or modify the affected field to inject arbitrary JavaScript. | CWE-79 |
166,183 | CVE-2021-37471 | 7.5 | 7.8 | HIGH | Cradlepoint IBR900-600 devices running versions < 7.21.10 are vulnerable to a restricted shell escape sequence that provides an attacker the capability to simultaneously deny availability to the device's NetCloud Manager console, local console and SSH command-line. | CWE-400 |
166,184 | CVE-2021-37473 | 9.8 | 7.5 | CRITICAL | In NavigateCMS version 2.9.4 and below, function in `product.php` is vulnerable to sql injection on parameter `products-order` through a post request, which results in arbitrary sql query execution in the backend database. | CWE-89 |
166,185 | CVE-2021-37475 | 9.8 | 7.5 | CRITICAL | In NavigateCMS version 2.9.4 and below, function in `templates.php` is vulnerable to sql injection on parameter `template-properties-order`, which results in arbitrary sql query execution in the backend database. | CWE-89 |
166,186 | CVE-2021-37476 | 9.8 | 7.5 | CRITICAL | In NavigateCMS version 2.9.4 and below, function in `product.php` is vulnerable to sql injection on parameter `id` through a post request, which results in arbitrary sql query execution in the backend database. | CWE-89 |
166,187 | CVE-2021-37477 | 9.8 | 7.5 | CRITICAL | In NavigateCMS version 2.9.4 and below, function in `structure.php` is vulnerable to sql injection on parameter `children_order`, which results in arbitrary sql query execution in the backend database. | CWE-89 |
166,188 | CVE-2021-37478 | 9.8 | 7.5 | CRITICAL | In NavigateCMS version 2.9.4 and below, function `block` is vulnerable to sql injection on parameter `block-order`, which results in arbitrary sql query execution in the backend database. | CWE-89 |
166,189 | CVE-2021-3749 | 7.5 | 7.8 | HIGH | axios is vulnerable to Inefficient Regular Expression Complexity | CWE-697 |
166,190 | CVE-2021-3751 | 9.8 | 7.5 | CRITICAL | libmobi is vulnerable to Out-of-bounds Write | CWE-787 |
166,191 | CVE-2021-37531 | 8.8 | 9 | HIGH | SAP NetWeaver Knowledge Management XML Forms versions - 7.10, 7.11, 7.30, 7.31, 7.40, 7.50, contains an XSLT vulnerability which allows a non-administrative authenticated attacker to craft a malicious XSL stylesheet file containing a script with OS-level commands, copy it into a location to be accessed by the system and then create a file which will trigger the XSLT engine to execute the script contained within the malicious XSL file. This can result in a full compromise of the confidentiality, integrity, and availability of the system. | CWE-78 |
166,192 | CVE-2021-37532 | 4.3 | 4 | MEDIUM | SAP Business One version - 10, due to improper input validation, allows an authenticated User to gain access to directory and view the contents of index in the directory, which would otherwise be restricted to high privileged User. | CWE-22 |
166,193 | CVE-2021-37534 | 5.4 | 3.5 | MEDIUM | app/View/GalaxyClusters/add.ctp in MISP 2.4.146 allows Stored XSS when forking a galaxy cluster. | CWE-79 |
166,194 | CVE-2021-37535 | 9.8 | 7.5 | CRITICAL | SAP NetWeaver Application Server Java (JMS Connector Service) - versions 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform necessary authorization checks for user privileges. | CWE-862 |
166,195 | CVE-2021-37538 | 9.8 | 7.5 | CRITICAL | Multiple SQL injection vulnerabilities in SmartDataSoft SmartBlog for PrestaShop before 4.06 allow a remote unauthenticated attacker to execute arbitrary SQL commands via the day, month, or year parameter to the controllers/front/archive.php archive controller, or the id_category parameter to the controllers/front/category.php category controller. | CWE-89 |
166,196 | CVE-2021-37539 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine ADManager Plus before 7111 is vulnerable to unrestricted file which leads to Remote code execution. | CWE-434 |
166,197 | CVE-2021-37540 | 6.5 | 6.4 | MEDIUM | In JetBrains Hub before 2021.1.13262, a potentially insufficient CSP for the Widget deployment feature was used. | CWE-326 |
166,198 | CVE-2021-37541 | 6.1 | 4.3 | MEDIUM | In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible. | CWE-74 |
166,199 | CVE-2021-37541 | 6.1 | 4.3 | MEDIUM | In JetBrains Hub before 2021.1.13402, HTML injection in the password reset email was possible. | CWE-640 |
166,200 | CVE-2021-37542 | 6.1 | 4.3 | MEDIUM | In JetBrains TeamCity before 2020.2.3, XSS was possible. | CWE-79 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.