ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
166,501 | CVE-2021-37995 | 6.5 | 4.3 | MEDIUM | Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | NVD-CWE-noinfo |
166,502 | CVE-2021-37996 | 5.5 | 4.3 | MEDIUM | Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file. | CWE-20 |
166,503 | CVE-2021-37997 | 8.8 | 6.8 | HIGH | Use after free in Sign-In in Google Chrome prior to 95.0.4638.69 allowed a remote attacker who convinced a user to sign into Chrome to potentially exploit heap corruption via a crafted HTML page. | CWE-416 |
166,504 | CVE-2021-37998 | 8.8 | 6.8 | HIGH | Use after free in Garbage Collection in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-416 |
166,505 | CVE-2021-37999 | 6.1 | 4.3 | MEDIUM | Insufficient data validation in New Tab Page in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to inject arbitrary scripts or HTML in a new browser tab via a crafted HTML page. | CWE-79 |
166,506 | CVE-2021-38000 | 6.1 | 5.8 | MEDIUM | Insufficient validation of untrusted input in Intents in Google Chrome on Android prior to 95.0.4638.69 allowed a remote attacker to arbitrarily browser to a malicious URL via a crafted HTML page. | CWE-20 |
166,507 | CVE-2021-38001 | 8.8 | 6.8 | HIGH | Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-843 |
166,508 | CVE-2021-38002 | 9.6 | 6.8 | CRITICAL | Use after free in Web Transport in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. | CWE-416 |
166,509 | CVE-2021-38003 | 8.8 | 6.8 | HIGH | Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-787 |
166,510 | CVE-2021-38004 | 4.3 | 4.3 | MEDIUM | Insufficient policy enforcement in Autofill in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | CWE-668 |
166,511 | CVE-2021-38005 | 8.8 | 6.8 | HIGH | Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-416 |
166,512 | CVE-2021-38006 | 8.8 | 6.8 | HIGH | Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-416 |
166,513 | CVE-2021-38007 | 8.8 | 6.8 | HIGH | Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-843 |
166,514 | CVE-2021-38008 | 8.8 | 6.8 | HIGH | Use after free in media in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-416 |
166,515 | CVE-2021-38009 | 6.5 | 4.3 | MEDIUM | Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | CWE-668 |
166,516 | CVE-2021-3801 | 6.5 | 4.3 | MEDIUM | prism is vulnerable to Inefficient Regular Expression Complexity | CWE-697 |
166,517 | CVE-2021-38010 | 6.5 | 4.3 | MEDIUM | Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. | NVD-CWE-noinfo |
166,518 | CVE-2021-38011 | 8.8 | 6.8 | HIGH | Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-416 |
166,519 | CVE-2021-38012 | 8.8 | 6.8 | HIGH | Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-843 |
166,520 | CVE-2021-38013 | 8.8 | 6.8 | HIGH | Heap buffer overflow in fingerprint recognition in Google Chrome on ChromeOS prior to 96.0.4664.45 allowed a remote attacker who had compromised a WebUI renderer process to potentially perform a sandbox escape via a crafted HTML page. | CWE-787 |
166,521 | CVE-2021-38014 | 8.8 | 6.8 | HIGH | Out of bounds write in Swiftshader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | CWE-787 |
166,522 | CVE-2021-38015 | 8.8 | 6.8 | HIGH | Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. | CWE-20 |
166,523 | CVE-2021-38016 | 8.8 | 6.8 | HIGH | Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page. | CWE-863 |
166,524 | CVE-2021-38017 | 8.8 | 6.8 | HIGH | Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | CWE-863 |
166,525 | CVE-2021-38018 | 6.5 | 4.3 | MEDIUM | Inappropriate implementation in navigation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | NVD-CWE-noinfo |
166,526 | CVE-2021-38019 | 6.5 | 4.3 | MEDIUM | Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | CWE-863 |
166,527 | CVE-2021-3802 | 4.2 | 6.3 | MEDIUM | A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability. | CWE-20 |
166,528 | CVE-2021-38020 | 4.3 | 4.3 | MEDIUM | Insufficient policy enforcement in contacts picker in Google Chrome on Android prior to 96.0.4664.45 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | CWE-863 |
166,529 | CVE-2021-38021 | 6.5 | 4.3 | MEDIUM | Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | NVD-CWE-noinfo |
166,530 | CVE-2021-38022 | 6.5 | 4.3 | MEDIUM | Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | NVD-CWE-noinfo |
166,531 | CVE-2021-3803 | 7.5 | 5 | HIGH | nth-check is vulnerable to Inefficient Regular Expression Complexity | NVD-CWE-Other |
166,532 | CVE-2021-3804 | 7.5 | 7.8 | HIGH | taro is vulnerable to Inefficient Regular Expression Complexity | NVD-CWE-Other |
166,533 | CVE-2021-3805 | 7.5 | 5 | HIGH | object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | CWE-915 |
166,534 | CVE-2021-3806 | 5.9 | 7.1 | MEDIUM | A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system. | CWE-22 |
166,535 | CVE-2021-3807 | 7.5 | 7.8 | HIGH | ansi-regex is vulnerable to Inefficient Regular Expression Complexity | NVD-CWE-Other |
166,536 | CVE-2021-38084 | 8.1 | 6.8 | HIGH | An issue was discovered in the POP3 component of Courier Mail Server before 1.1.5. Meddler-in-the-middle attackers can pipeline commands after the POP3 STLS command, injecting plaintext commands into an encrypted user session. | CWE-74 |
166,537 | CVE-2021-38085 | 7.8 | 7.2 | HIGH | The Canon TR150 print driver through 3.71.2.10 is vulnerable to a privilege escalation issue. During the add printer process, a local attacker can overwrite CNMurGE.dll and, if timed properly, the overwritten DLL will be loaded into a SYSTEM process resulting in escalation of privileges. This occurs because the driver drops a world-writable DLL into a CanonBJ %PROGRAMDATA% location that gets loaded by printisolationhost (a system process). | CWE-269 |
166,538 | CVE-2021-38086 | 7.8 | 4.4 | HIGH | Acronis Cyber Protect 15 for Windows prior to build 27009 and Acronis Agent for Windows prior to build 26226 allowed local privilege escalation via DLL hijacking. | CWE-427 |
166,539 | CVE-2021-38087 | 6.1 | 4.3 | MEDIUM | Reflected cross-site scripting (XSS) was possible on the login page in Acronis Cyber Protect 15 prior to build 27009. | CWE-79 |
166,540 | CVE-2021-38088 | 7.8 | 4.6 | HIGH | Acronis Cyber Protect 15 for Windows prior to build 27009 allowed local privilege escalation via binary hijacking. | CWE-269 |
166,541 | CVE-2021-38090 | 8.8 | 6.8 | HIGH | Integer Overflow vulnerability in function filter16_roberts in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. | CWE-190 |
166,542 | CVE-2021-38090 | 8.8 | 6.8 | HIGH | Integer Overflow vulnerability in function filter16_roberts in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. | CWE-120 |
166,543 | CVE-2021-38091 | 8.8 | 6.8 | HIGH | Integer Overflow vulnerability in function filter16_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. | CWE-190 |
166,544 | CVE-2021-38092 | 8.8 | 6.8 | HIGH | Integer Overflow vulnerability in function filter_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. | CWE-190 |
166,545 | CVE-2021-38093 | 8.8 | 6.8 | HIGH | Integer Overflow vulnerability in function filter_robert in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. | CWE-190 |
166,546 | CVE-2021-38094 | 8.8 | 6.8 | HIGH | Integer Overflow vulnerability in function filter_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. | CWE-190 |
166,547 | CVE-2021-38095 | 7.5 | 5 | HIGH | The REST API in Planview Spigit 4.5.3 allows remote unauthenticated attackers to query sensitive user accounts data, as demonstrated by an api/v1/users/1 request. | NVD-CWE-noinfo |
166,548 | CVE-2021-38096 | 7.8 | 9.3 | HIGH | Coreip.dll in Corel PDF Fusion 2.6.2.0 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file. | CWE-787 |
166,549 | CVE-2021-38097 | 7.8 | 9.3 | HIGH | Corel PDF Fusion 2.6.2.0 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file. | CWE-787 |
166,550 | CVE-2021-38098 | 7.8 | 6.8 | HIGH | Corel PDF Fusion 2.6.2.0 is affected by a Heap Corruption vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file. | CWE-787 |
166,551 | CVE-2021-38099 | 7.8 | 9.3 | HIGH | CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38101. | CWE-787 |
166,552 | CVE-2021-3810 | 7.5 | 7.8 | HIGH | code-server is vulnerable to Inefficient Regular Expression Complexity | NVD-CWE-Other |
166,553 | CVE-2021-38100 | 7.8 | 6.8 | HIGH | Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. | CWE-787 |
166,554 | CVE-2021-38101 | 7.8 | 6.8 | HIGH | CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38099. | CWE-787 |
166,555 | CVE-2021-38102 | 5.5 | 4.3 | MEDIUM | IPPP82.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. This is different from CVE-2021-38105. | CWE-125 |
166,556 | CVE-2021-38103 | 7.8 | 9.3 | HIGH | IBJPG2.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. | CWE-787 |
166,557 | CVE-2021-38104 | 5.5 | 4.3 | MEDIUM | IPPP72.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. | CWE-125 |
166,558 | CVE-2021-38105 | 5.5 | 4.3 | MEDIUM | IPPP82.FLT in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. This is different from CVE-2021-38102. | CWE-125 |
166,559 | CVE-2021-38106 | 5.5 | 4.3 | MEDIUM | UAX200.dll in Corel Presentations 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious PPT file. | CWE-125 |
166,560 | CVE-2021-38107 | 5.5 | 4.3 | MEDIUM | CdrCore.dll in Corel DrawStandard 2020 22.0.0.474 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CDR file. | CWE-125 |
166,561 | CVE-2021-38108 | 5.5 | 4.3 | MEDIUM | Word97Import200.dll in Corel WordPerfect 2020 20.0.0.200 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious DOC file. | CWE-125 |
166,562 | CVE-2021-38109 | 5.5 | 4.3 | MEDIUM | Corel DrawStandard 2020 22.0.0.474 is affected by an Out-of-bounds Read vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to access unauthorized system memory in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CDR file. | CWE-125 |
166,563 | CVE-2021-3811 | 6.1 | 4.3 | MEDIUM | adminlte is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-79 |
166,564 | CVE-2021-38110 | 7.8 | 6.8 | HIGH | Word97Import200.dll in Corel WordPerfect 2020 20.0.0.200 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious DOC file. | CWE-787 |
166,565 | CVE-2021-38111 | 8.8 | 5.8 | HIGH | The DEF CON 27 badge allows remote attackers to exploit a buffer overflow by sending an oversized packet via the NFMI (Near Field Magnetic Induction) protocol. | CWE-120 |
166,566 | CVE-2021-38112 | 8.8 | 9.3 | HIGH | In the Amazon AWS WorkSpaces client 3.0.10 through 3.1.8 on Windows, argument injection in the workspaces:// URI handler can lead to remote code execution because of the Chromium Embedded Framework (CEF) --gpu-launcher argument. This is fixed in 3.1.9. | CWE-88 |
166,567 | CVE-2021-38113 | 5.4 | 3.5 | MEDIUM | In addBouquet in js/bqe.js in OpenWebif (aka e2openplugin-OpenWebif) through 1.4.7, inserting JavaScript into the Add Bouquet feature of the Bouquet Editor (i.e., bouqueteditor/api/addbouquet?name=) leads to Stored XSS. | CWE-79 |
166,568 | CVE-2021-38114 | 5.5 | 4.3 | MEDIUM | libavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the init_vlc function, a similar issue to CVE-2013-0868. | CWE-252 |
166,569 | CVE-2021-38115 | 6.5 | 4.3 | MEDIUM | read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file. | CWE-125 |
166,570 | CVE-2021-3812 | 6.1 | 4.3 | MEDIUM | adminlte is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-79 |
166,571 | CVE-2021-38123 | 6.1 | 5.8 | MEDIUM | Open Redirect vulnerability in Micro Focus Network Automation, affecting Network Automation versions 10.4x, 10.5x, 2018.05, 2018.11, 2019.05, 2020.02, 2020.08, 2020.11, 2021.05. The vulnerability could allow redirect users to malicious websites after authentication. | CWE-601 |
166,572 | CVE-2021-38124 | 9.8 | 7.5 | CRITICAL | Remote Code Execution vulnerability in Micro Focus ArcSight Enterprise Security Manager (ESM) product, affecting versions 7.0.2 through 7.5. The vulnerability could be exploited resulting in remote code execution. | CWE-77 |
166,573 | CVE-2021-38136 | 6.5 | 4 | MEDIUM | Corero SecureWatch Managed Services 9.7.2.0020 is affected by a Path Traversal vulnerability via the snap_file parameter in the /it-IT/splunkd/__raw/services/get_snapshot HTTP API endpoint. A ‘low privileged’ attacker can read any file on the target host. | CWE-22 |
166,574 | CVE-2021-38137 | 8.1 | 5.5 | HIGH | Corero SecureWatch Managed Services 9.7.2.0020 does not correctly check swa-monitor and cns-monitor user’s privileges, allowing a user to perform actions not belonging to his role. | CWE-287 |
166,575 | CVE-2021-38138 | 5.4 | 3.5 | MEDIUM | OneNav beta 0.9.12 allows XSS via the Add Link feature. NOTE: the vendor's position is that there intentionally is not any XSS protection at present, because the attack risk is largely limited to a compromised account; however, XSS protection is planned for a future release. | CWE-79 |
166,576 | CVE-2021-38140 | 9.8 | 7.5 | CRITICAL | The set_user extension module before 2.0.1 for PostgreSQL allows a potential privilege escalation using RESET SESSION AUTHORIZATION after set_user(). | CWE-269 |
166,577 | CVE-2021-38142 | 8.8 | 7.2 | HIGH | Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS). | CWE-94 |
166,578 | CVE-2021-38143 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Form Tools through 3.0.20. When an administrator creates a customer account, it is possible for the customer to log in and proceed with a change of name and last name. However, these fields are vulnerable to XSS payload insertion, being triggered in the admin panel when the admin tries to see the client list. This type of XSS (stored) can lead to the extraction of the PHPSESSID cookie belonging to the admin. | CWE-79 |
166,579 | CVE-2021-38144 | 5.4 | 3.5 | MEDIUM | An issue was discovered in Form Tools through 3.0.20. A low-privileged user can trigger Reflected XSS when a viewing a form via the submission_id parameter, e.g., clients/forms/edit_submission.php?form_id=1&view_id=1&submission_id=[XSS]. | CWE-79 |
166,580 | CVE-2021-38145 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Form Tools through 3.0.20. SQL Injection can occur via the export_group_id field when a low-privileged user (client) tries to export a form with data, e.g., manipulation of modules/export_manager/export.php?export_group_id=1&export_group_1_results=all&export_type_id=1. | CWE-89 |
166,581 | CVE-2021-38146 | 7.5 | 5 | HIGH | The File Download API in Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to read arbitrary files via absolute path traversal in the SearchString JSON field in /home/download POST data. | CWE-22 |
166,582 | CVE-2021-38147 | 7.5 | 5 | HIGH | Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to download arbitrary files, such as reports containing sensitive information, because authentication is not required for API access to processexecution/DownloadExcelFile/Domain_Credential_Report_Excel, processexecution/DownloadExcelFile/User_Report_Excel, processexecution/DownloadExcelFile/Process_Report_Excel, processexecution/DownloadExcelFile/Infrastructure_Report_Excel, or processexecution/DownloadExcelFile/Resolver_Report_Excel. | CWE-306 |
166,583 | CVE-2021-38148 | 9.8 | 7.5 | CRITICAL | Obsidian before 0.12.12 does not require user confirmation for non-http/https URLs. | NVD-CWE-noinfo |
166,584 | CVE-2021-38149 | 5.4 | 3.5 | MEDIUM | index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS. | CWE-79 |
166,585 | CVE-2021-3815 | 9.8 | 7.5 | CRITICAL | utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | CWE-1321 |
166,586 | CVE-2021-38150 | 6.5 | 4.3 | MEDIUM | When an attacker manages to get access to the local memory, or the memory dump of a victim, for example by a social engineering attack, SAP Business Client versions - 7.0, 7.70, will allow him to read extremely sensitive data, such as credentials. This would allow the attacker to compromise the corresponding backend for which the credentials are valid. | CWE-522 |
166,587 | CVE-2021-38151 | 5.4 | 3.5 | MEDIUM | index.php/appointment/todos in Chikitsa Patient Management System 2.0.0 allows XSS. | CWE-79 |
166,588 | CVE-2021-38152 | 5.4 | 3.5 | MEDIUM | index.php/appointment/insert_patient_add_appointment in Chikitsa Patient Management System 2.0.0 allows XSS. | CWE-79 |
166,589 | CVE-2021-38153 | 5.9 | 4.3 | MEDIUM | Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0. | CWE-203 |
166,590 | CVE-2021-38154 | 7.5 | 4.3 | HIGH | Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021. | CWE-732 |
166,591 | CVE-2021-38155 | 7.5 | 5 | HIGH | OpenStack Keystone 10.x through 16.x before 16.0.2, 17.x before 17.0.1, 18.x before 18.0.1, and 19.x before 19.0.1 allows information disclosure during account locking (related to PCI DSS features). By guessing the name of an account and failing to authenticate multiple times, any unauthenticated actor could both confirm the account exists and obtain that account's corresponding UUID, which might be leveraged for other unrelated attacks. All deployments enabling security_compliance.lockout_failure_attempts are affected. | CWE-307 |
166,592 | CVE-2021-38156 | 5.4 | 3.5 | MEDIUM | In Nagios XI before 5.8.6, XSS exists in the dashboard page (/dashboards/#) when administrative users attempt to edit a dashboard. | CWE-79 |
166,593 | CVE-2021-38157 | 6.1 | 4.3 | MEDIUM | ** UNSUPPORTED WHEN ASSIGNED ** LeoStream Connection Broker 9.x before 9.0.34.3 allows Unauthenticated Reflected XSS via the /index.pl user parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | CWE-79 |
166,594 | CVE-2021-38159 | 9.8 | 7.5 | CRITICAL | In certain Progress MOVEit Transfer versions before 2021.0.4 (aka 13.0.4), SQL injection in the MOVEit Transfer web application could allow an unauthenticated remote attacker to gain access to the database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, or execute SQL statements that alter or delete database elements, via crafted strings sent to unique MOVEit Transfer transaction types. The fixed versions are 2019.0.8 (11.0.8), 2019.1.7 (11.1.7), 2019.2.4 (11.2.4), 2020.0.7 (12.0.7), 2020.1.6 (12.1.6), and 2021.0.4 (13.0.4). | CWE-89 |
166,595 | CVE-2021-38160 | 7.8 | 7.2 | HIGH | ** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior. | CWE-120 |
166,596 | CVE-2021-38161 | 8.1 | 6.8 | HIGH | Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8. | CWE-287 |
166,597 | CVE-2021-38162 | 9.4 | 7.5 | CRITICAL | SAP Web Dispatcher versions - 7.49, 7.53, 7.77, 7.81, KRNL64NUC - 7.22, 7.22EXT, 7.49, KRNL64UC -7.22, 7.22EXT, 7.49, 7.53, KERNEL - 7.22, 7.49, 7.53, 7.77, 7.81, 7.83 processes allow an unauthenticated attacker to submit a malicious crafted request over a network to a front-end server which may, over several attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages. This can result in the back-end server executing a malicious payload which can be used to read or modify any information on the server or consume server resources making it temporarily unavailable. | CWE-444 |
166,598 | CVE-2021-38163 | 8.8 | 9 | HIGH | SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable. | CWE-434 |
166,599 | CVE-2021-38164 | 5.4 | 5.5 | MEDIUM | SAP ERP Financial Accounting (RFOPENPOSTING_FR) versions - SAP_APPL - 600, 602, 603, 604, 605, 606, 616, SAP_FIN - 617, 618, 700, 720, 730, SAPSCORE - 125, S4CORE, 100, 101, 102, 103, 104, 105, allows a registered attacker to invoke certain functions that would otherwise be restricted to specific users. These functions are normally exposed over the network and once exploited the attacker may be able to view and modify financial accounting data that only a specific user should have access to. | CWE-862 |
166,600 | CVE-2021-38165 | 5.3 | 2.6 | MEDIUM | Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which allows remote attackers to discover cleartext credentials because they may appear in SNI data. | CWE-522 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.