ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
166,701 | CVE-2021-38339 | 6.1 | 4.3 | MEDIUM | The Simple Matted Thumbnails WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/simple-matted-thumbnail.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.01. | CWE-79 |
166,702 | CVE-2021-3834 | 6.1 | 4.3 | MEDIUM | Integria IMS in its 5.0.92 version does not filter correctly some fields related to the login.php file. An attacker could exploit this vulnerability in order to perform a cross-site scripting attack (XSS). | CWE-79 |
166,703 | CVE-2021-38340 | 6.1 | 4.3 | MEDIUM | The Wordpress Simple Shop WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the update_row parameter found in the ~/includes/add_product.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2. | CWE-79 |
166,704 | CVE-2021-38341 | 6.1 | 4.3 | MEDIUM | The WooCommerce Payment Gateway Per Category WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/includes/plugin_settings.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.10. | CWE-79 |
166,705 | CVE-2021-38342 | 8.1 | 4.3 | HIGH | The Nested Pages WordPress plugin <= 3.1.15 was vulnerable to Cross-Site Request Forgery via the `npBulkAction`s and `npBulkEdit` `admin_post` actions, which allowed attackers to trash or permanently purge arbitrary posts as well as changing their status, reassigning their ownership, and editing other metadata. | CWE-352 |
166,706 | CVE-2021-38343 | 6.1 | 5.8 | MEDIUM | The Nested Pages WordPress plugin <= 3.1.15 was vulnerable to an Open Redirect via the `page` POST parameter in the `npBulkActions`, `npBulkEdit`, `npListingSort`, and `npCategoryFilter` `admin_post` actions. | CWE-601 |
166,707 | CVE-2021-38344 | 5.4 | 3.5 | MEDIUM | The Brizy Page Builder plugin <= 2.3.11 for WordPress was vulnerable to stored XSS by lower-privileged users such as a subscribers. It was possible to add malicious JavaScript to a page by modifying the request sent to update the page via the brizy_update_item AJAX action and adding JavaScript to the data parameter, which would be executed in the session of any visitor viewing or previewing the post or page. | CWE-79 |
166,708 | CVE-2021-38345 | 6.5 | 4 | MEDIUM | The Brizy Page Builder plugin <= 2.3.11 for WordPress used an incorrect authorization check that allowed any logged-in user accessing any endpoint in the wp-admin directory to modify the content of any existing post or page created with the Brizy editor. An identical issue was found by another researcher in Brizy <= 1.0.125 and fixed in version 1.0.126, but the vulnerability was reintroduced in version 1.0.127. | CWE-863 |
166,709 | CVE-2021-38346 | 8.8 | 6.5 | HIGH | The Brizy Page Builder plugin <= 2.3.11 for WordPress allowed authenticated users to upload executable files to a location of their choice using the brizy_create_block_screenshot AJAX action. The file would be named using the id parameter, which could be prepended with "../" to perform directory traversal, and the file contents were populated via the ibsf parameter, which would be base64-decoded and written to the file. While the plugin added a .jpg extension to all uploaded filenames, a double extension attack was still possible, e.g. a file named shell.php would be saved as shell.php.jpg, and would be executable on a number of common configurations. | CWE-22 |
166,710 | CVE-2021-38346 | 8.8 | 6.5 | HIGH | The Brizy Page Builder plugin <= 2.3.11 for WordPress allowed authenticated users to upload executable files to a location of their choice using the brizy_create_block_screenshot AJAX action. The file would be named using the id parameter, which could be prepended with "../" to perform directory traversal, and the file contents were populated via the ibsf parameter, which would be base64-decoded and written to the file. While the plugin added a .jpg extension to all uploaded filenames, a double extension attack was still possible, e.g. a file named shell.php would be saved as shell.php.jpg, and would be executable on a number of common configurations. | CWE-434 |
166,711 | CVE-2021-38347 | 6.1 | 4.3 | MEDIUM | The Custom Website Data WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the id parameter found in the ~/views/edit.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.2. | CWE-79 |
166,712 | CVE-2021-38348 | 6.1 | 4.3 | MEDIUM | The Advance Search WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the wpas_id parameter found in the ~/inc/admin/views/html-advance-search-admin-options.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.1.2. | CWE-79 |
166,713 | CVE-2021-38349 | 6.1 | 4.3 | MEDIUM | The Integration of Moneybird for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the error_description parameter found in the ~/templates/wcmb-admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.1. | CWE-79 |
166,714 | CVE-2021-38350 | 6.1 | 4.3 | MEDIUM | The spideranalyse WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the date parameter found in the ~/analyse/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.0.1. | CWE-79 |
166,715 | CVE-2021-38351 | 6.1 | 4.3 | MEDIUM | The OSD Subscribe WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the osd_subscribe_message parameter found in the ~/options/osd_subscribe_options_subscribers.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.2.3. | CWE-79 |
166,716 | CVE-2021-38352 | 6.1 | 4.3 | MEDIUM | The Feedify – Web Push Notifications WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the feedify_msg parameter found in the ~/includes/base.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.8. | CWE-79 |
166,717 | CVE-2021-38353 | 6.1 | 4.3 | MEDIUM | The Dropdown and scrollable Text WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the content parameter found in the ~/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0. | CWE-79 |
166,718 | CVE-2021-38354 | 6.1 | 4.3 | MEDIUM | The GNU-Mailman Integration WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the gm_error parameter found in the ~/includes/admin/mailing-lists-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.6. | CWE-79 |
166,719 | CVE-2021-38355 | 6.1 | 4.3 | MEDIUM | The Bug Library WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the successimportcount parameter found in the ~/bug-library.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.3. | CWE-79 |
166,720 | CVE-2021-38356 | 6.1 | 4.3 | MEDIUM | The NextScripts: Social Networks Auto-Poster <= 4.3.20 WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the $_REQUEST['page'] parameter which is echoed out on inc/nxs_class_snap.php by supplying the appropriate value 'nxssnap-post' to load the page in $_GET['page'] along with malicious JavaScript in $_POST['page']. | CWE-79 |
166,721 | CVE-2021-38357 | 6.1 | 4.3 | MEDIUM | The SMS OVH WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the position parameter found in the ~/sms-ovh-sent.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.1. | CWE-79 |
166,722 | CVE-2021-38358 | 6.1 | 4.3 | MEDIUM | The MoolaMojo WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the classes parameter found in the ~/views/button-generator.html.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.7.4.1. | CWE-79 |
166,723 | CVE-2021-38359 | 6.1 | 4.3 | MEDIUM | The WordPress InviteBox Plugin for viral Refer-a-Friend Promotions WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the message parameter found in the ~/admin/admin.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.1. | CWE-79 |
166,724 | CVE-2021-3836 | 5.5 | 4.3 | MEDIUM | dbeaver is vulnerable to Improper Restriction of XML External Entity Reference | CWE-611 |
166,725 | CVE-2021-38360 | 9.8 | 7.5 | CRITICAL | The wp-publications WordPress plugin is vulnerable to restrictive local file inclusion via the Q_FILE parameter found in the ~/bibtexbrowser.php file which allows attackers to include local zip files and achieve remote code execution, in versions up to and including 0.0. | CWE-829 |
166,726 | CVE-2021-38361 | 6.1 | 4.3 | MEDIUM | The .htaccess Redirect WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the link parameter found in the ~/htaccess-redirect.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.3.1. | CWE-79 |
166,727 | CVE-2021-38365 | 3.7 | 4.3 | LOW | Winner (aka ToneWinner) desktop speakers through 2021-08-09 allow remote attackers to recover speech signals from the power-indicator LED via a telescope and an electro-optical sensor, aka a "Glowworm" attack. | NVD-CWE-noinfo |
166,728 | CVE-2021-38366 | 8.8 | 6.8 | HIGH | Sitecore through 10.1, when Update Center is enabled, allows remote authenticated users to upload arbitrary files and achieve remote code execution by visiting an uploaded .aspx file at an admin/Packages URL. | CWE-434 |
166,729 | CVE-2021-38370 | 5.9 | 4.3 | MEDIUM | In Alpine through 2.24, untagged responses from an IMAP server are accepted before STARTTLS. | CWE-77 |
166,730 | CVE-2021-38371 | 7.5 | 5 | HIGH | The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending. | CWE-74 |
166,731 | CVE-2021-38372 | 3.7 | 4.3 | LOW | In KDE Trojita 0.7, man-in-the-middle attackers can create new folders because untagged responses from an IMAP server are accepted before STARTTLS. | CWE-77 |
166,732 | CVE-2021-38373 | 5.3 | 3.5 | MEDIUM | In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is not honored (and cleartext messages are sent) unless "Server requires authentication" is checked. | CWE-77 |
166,733 | CVE-2021-38373 | 5.3 | 3.5 | MEDIUM | In KDE KMail 19.12.3 (aka 5.13.3), the SMTP STARTTLS option is not honored (and cleartext messages are sent) unless "Server requires authentication" is checked. | CWE-319 |
166,734 | CVE-2021-38374 | 5.4 | 3.5 | MEDIUM | OX App Suite through through 7.10.5 allows XSS via a crafted snippet that has an app loader reference within an app loader URL. | CWE-79 |
166,735 | CVE-2021-38375 | 6.1 | 4.3 | MEDIUM | OX App Suite through 7.10.5 allows XSS via the alt attribute of an IMG element in a truncated e-mail message. | CWE-79 |
166,736 | CVE-2021-38376 | 5.3 | 5 | MEDIUM | OX App Suite through 7.10.5 has Incorrect Access Control for retrieval of session information via the rampup action of the login API call. | CWE-668 |
166,737 | CVE-2021-38377 | 6.1 | 4.3 | MEDIUM | OX App Suite through 7.10.5 allows XSS via JavaScript code in an anchor HTML comment within truncated e-mail, because there is a predictable UUID with HTML transformation results. | CWE-79 |
166,738 | CVE-2021-38378 | 4.3 | 4 | MEDIUM | OX App Suite 7.10.5 allows Information Exposure because a caching mechanism can caused a Modified By response to show a person's name. | CWE-668 |
166,739 | CVE-2021-38379 | 5.5 | 2.1 | MEDIUM | The Hub in CFEngine Enterprise 3.6.7 through 3.18.0 has Insecure Permissions that allow local Information Disclosure. | CWE-276 |
166,740 | CVE-2021-38380 | 7.5 | 5 | HIGH | Live555 through 1.08 mishandles huge requests for the same MP3 stream, leading to recursion and s stack-based buffer over-read. An attacker can leverage this to launch a DoS attack. | CWE-125 |
166,741 | CVE-2021-38381 | 6.5 | 4.3 | MEDIUM | Live555 through 1.08 does not handle MPEG-1 or 2 files properly. Sending two successive RTSP SETUP commands for the same track causes a Use-After-Free and daemon crash. | CWE-416 |
166,742 | CVE-2021-38382 | 6.5 | 4.3 | MEDIUM | Live555 through 1.08 does not handle Matroska and Ogg files properly. Sending two successive RTSP SETUP commands for the same track causes a Use-After-Free and daemon crash. | CWE-416 |
166,743 | CVE-2021-38383 | 9.8 | 7.5 | CRITICAL | OwnTone (aka owntone-server) through 28.1 has a use-after-free in net_bind() in misc.c. | CWE-416 |
166,744 | CVE-2021-38384 | 9.8 | 7.5 | CRITICAL | Serverless Offline 8.0.0 returns a 403 HTTP status code for a route that has a trailing / character, which might cause a developer to implement incorrect access control, because the actual behavior within the Amazon AWS environment is a 200 HTTP status code (i.e., possibly greater than expected permissions). | CWE-863 |
166,745 | CVE-2021-38385 | 7.5 | 5 | HIGH | Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007. | CWE-617 |
166,746 | CVE-2021-38386 | 7.5 | 5 | HIGH | In Contiki 3.0, a buffer overflow in the Telnet service allows remote attackers to cause a denial of service because the ls command is mishandled when a directory has many files with long names. | CWE-120 |
166,747 | CVE-2021-38387 | 7.5 | 5 | HIGH | In Contiki 3.0, a Telnet server that silently quits (before disconnection with clients) leads to connected clients entering an infinite loop and waiting forever, which may cause excessive CPU consumption. | CWE-770 |
166,748 | CVE-2021-38388 | 8.8 | 6.5 | HIGH | Central Dogma allows privilege escalation with mirroring to the internal dogma repository that has a file managing the authorization of the project. | CWE-269 |
166,749 | CVE-2021-38389 | 9.8 | 7.5 | CRITICAL | Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code. | CWE-787 |
166,750 | CVE-2021-38390 | 9.8 | 10 | CRITICAL | A Blind SQL injection vulnerability exists in the /DataHandler/HandlerEnergyType.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter egyid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER. | CWE-89 |
166,751 | CVE-2021-38391 | 9.8 | 10 | CRITICAL | A Blind SQL injection vulnerability exists in the /DataHandler/AM/AM_Handler.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter type before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER. | CWE-89 |
166,752 | CVE-2021-38392 | 7.6 | 7.2 | HIGH | A skilled attacker with physical access to the affected device can gain access to the hard disk drive of the device to change the telemetry region and could use this setting to interrogate or program an implantable device in any region in the world. | CWE-284 |
166,753 | CVE-2021-38393 | 9.8 | 10 | CRITICAL | A Blind SQL injection vulnerability exists in the /DataHandler/HandlerAlarmGroup.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter agid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER. | CWE-89 |
166,754 | CVE-2021-38394 | 6.4 | 6.9 | MEDIUM | An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted. | CWE-1278 |
166,755 | CVE-2021-38396 | 6.8 | 4.6 | MEDIUM | The programmer installation utility does not perform a cryptographic authenticity or integrity checks of the software on the flash drive. An attacker could leverage this weakness to install unauthorized software using a specially crafted USB. | CWE-345 |
166,756 | CVE-2021-38398 | 6.8 | 4.6 | MEDIUM | The affected device uses off-the-shelf software components that contain unpatched vulnerabilities. A malicious attacker with physical access to the affected device could exploit these vulnerabilities. | NVD-CWE-Other |
166,757 | CVE-2021-3840 | 8.8 | 6.8 | HIGH | A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi). MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi. The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi. | CWE-427 |
166,758 | CVE-2021-38400 | 6.8 | 4.6 | MEDIUM | An attacker with physical access to Boston Scientific Zoom Latitude Model 3120 can remove the hard disk drive or create a specially crafted USB to extract the password hash for brute force reverse engineering of the system password. | CWE-916 |
166,759 | CVE-2021-38401 | 7.8 | 6.8 | HIGH | Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an untrusted pointer dereference, which may allow an attacker to execute arbitrary code and cause the application to crash. | CWE-822 |
166,760 | CVE-2021-38402 | 7.8 | 6.8 | HIGH | Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could lead to a stack-based buffer overflow while trying to copy to a buffer during font string handling. An attacker could leverage this vulnerability to execute code in the context of the current process. | CWE-121 |
166,761 | CVE-2021-38403 | 4.8 | 3.5 | MEDIUM | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter supplier of the API maintenance, which may allow an attacker to remotely execute code. | CWE-79 |
166,762 | CVE-2021-38404 | 7.8 | 6.8 | HIGH | Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. | CWE-122 |
166,763 | CVE-2021-38406 | 7.8 | 6.8 | HIGH | Delta Electronic DOPSoft 2 (Version 2.00.07 and prior) lacks proper validation of user-supplied data when parsing specific project files. This could result in multiple out-of-bounds write instances. An attacker could leverage this vulnerability to execute code in the context of the current process. | CWE-787 |
166,764 | CVE-2021-38407 | 4.8 | 3.5 | MEDIUM | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code. | CWE-79 |
166,765 | CVE-2021-38408 | 9.8 | 7.5 | CRITICAL | A stack-based buffer overflow vulnerability in Advantech WebAccess Versions 9.02 and prior caused by a lack of proper validation of the length of user-supplied data may allow remote code execution. | CWE-121 |
166,766 | CVE-2021-38409 | 7.8 | 6.8 | HIGH | Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an access of uninitialized pointer, which may allow an attacker read from or write to unexpected memory locations, leading to a denial-of-service. | CWE-824 |
166,767 | CVE-2021-38411 | 4.8 | 3.5 | MEDIUM | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter deviceName of the API modbusWriter-Reader, which may allow an attacker to remotely execute code. | CWE-79 |
166,768 | CVE-2021-38412 | 9.8 | 7.5 | CRITICAL | Properly formatted POST requests to multiple resources on the HTTP and HTTPS web servers of the Digi PortServer TS 16 Rack device do not require authentication or authentication tokens. This vulnerability could allow an attacker to enable the SNMP service and manipulate the community strings to achieve further control in. | CWE-287 |
166,769 | CVE-2021-38413 | 7.8 | 6.8 | HIGH | Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to a stack-based buffer overflow, which may allow an attacker to achieve code execution. | CWE-121 |
166,770 | CVE-2021-38415 | 7.8 | 6.8 | HIGH | Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable a heap-based buffer overflow when parsing a specially crafted project file, which may allow an attacker to execute arbitrary code. | CWE-122 |
166,771 | CVE-2021-38416 | 7.8 | 4.4 | HIGH | Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an attacker to use DLL hijacking and takeover the system where the software is installed. | CWE-427 |
166,772 | CVE-2021-38418 | 5.9 | 4.3 | MEDIUM | Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an attacker to be positioned between the traffic and perform a machine-in-the-middle attack to access information without authorization. | CWE-319 |
166,773 | CVE-2021-38419 | 7.8 | 6.8 | HIGH | Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an out-of-bounds write, which can result in data corruption, a system crash, or code execution. | CWE-787 |
166,774 | CVE-2021-38420 | 7.8 | 4.6 | HIGH | Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files. | CWE-276 |
166,775 | CVE-2021-38421 | 7.1 | 5.8 | HIGH | Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an out-of-bounds read, which may allow an attacker to read sensitive information from other memory locations or cause a crash. | CWE-125 |
166,776 | CVE-2021-38422 | 7.8 | 4.6 | HIGH | Delta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, which may allow an attacker to have extensive access to the application directory and escalate privileges. | CWE-312 |
166,777 | CVE-2021-38424 | 7.8 | 6.8 | HIGH | The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application. | CWE-1236 |
166,778 | CVE-2021-38426 | 7.8 | 6.8 | HIGH | FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code. | CWE-787 |
166,779 | CVE-2021-38428 | 4.8 | 3.5 | MEDIUM | Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API schedule, which may allow an attacker to remotely execute code. | CWE-79 |
166,780 | CVE-2021-3843 | 6.7 | 7.2 | MEDIUM | A potential vulnerability in the SMI function to access EEPROM in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code. | NVD-CWE-noinfo |
166,781 | CVE-2021-38430 | 7.8 | 6.8 | HIGH | FATEK Automation WinProladder versions 3.30 and prior proper validation of user-supplied data when parsing project files, which could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code. | CWE-121 |
166,782 | CVE-2021-38431 | 4.3 | 4 | MEDIUM | An authenticated user using Advantech WebAccess SCADA in versions 9.0.3 and prior can use API functions to disclose project names and paths from other users. | CWE-862 |
166,783 | CVE-2021-38432 | 9.8 | 7.5 | CRITICAL | FATEK Automation Communication Server Versions 1.13 and prior lacks proper validation of user-supplied data, which could result in a stack-based buffer overflow condition and allow an attacker to remotely execute code. | CWE-121 |
166,784 | CVE-2021-38434 | 7.8 | 6.8 | HIGH | FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in an unexpected sign extension. An attacker could leverage this vulnerability to execute arbitrary code. | CWE-194 |
166,785 | CVE-2021-38436 | 7.8 | 6.8 | HIGH | FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a memory-corruption condition. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. | CWE-119 |
166,786 | CVE-2021-38438 | 7.8 | 6.8 | HIGH | A use after free vulnerability in FATEK Automation WinProladder versions 3.30 and prior may be exploited when a valid user opens a malformed project file, which may allow arbitrary code execution. | CWE-416 |
166,787 | CVE-2021-38440 | 3.3 | 4.3 | LOW | FATEK Automation WinProladder versions 3.30 and prior is vulnerable to an out-of-bounds read, which may allow an attacker to read unauthorized information. | CWE-125 |
166,788 | CVE-2021-38442 | 7.8 | 6.8 | HIGH | FATEK Automation WinProladder versions 3.30 and prior lacks proper validation of user-supplied data when parsing project files, which could result in a heap-corruption condition. An attacker could leverage this vulnerability to execute code in the context of the current process. | CWE-119 |
166,789 | CVE-2021-38448 | 7.6 | 4.6 | HIGH | The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software. | CWE-94 |
166,790 | CVE-2021-38449 | 9.8 | 7.5 | CRITICAL | Some API functions permit by-design writing or copying data into a given buffer. Since the client controls these parameters, an attacker could rewrite the memory in any location of the affected product. | CWE-123 |
166,791 | CVE-2021-38450 | 8.8 | 6.5 | HIGH | The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software. | CWE-20 |
166,792 | CVE-2021-38451 | 5.7 | 3.5 | MEDIUM | The affected product’s proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify any offset and read out-of-bounds data. | CWE-125 |
166,793 | CVE-2021-38452 | 9.1 | 6.4 | CRITICAL | A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. | CWE-22 |
166,794 | CVE-2021-38453 | 9.1 | 6.4 | CRITICAL | Some API functions allow interaction with the registry, which includes reading values as well as data modification. | CWE-15 |
166,795 | CVE-2021-38454 | 10 | 7.5 | CRITICAL | A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. | CWE-863 |
166,796 | CVE-2021-38455 | 6.5 | 4 | MEDIUM | The affected product’s OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value. | CWE-20 |
166,797 | CVE-2021-38456 | 9.8 | 7.5 | CRITICAL | A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords | CWE-798 |
166,798 | CVE-2021-38457 | 9.8 | 7.5 | CRITICAL | The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication. | CWE-284 |
166,799 | CVE-2021-38458 | 9.8 | 7.5 | CRITICAL | A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries. | CWE-74 |
166,800 | CVE-2021-38459 | 9.8 | 7.5 | CRITICAL | The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database. | CWE-294 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.