ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
167,601 | CVE-2021-39897 | 5.3 | 5 | MEDIUM | Improper access control in GitLab CE/EE version 10.5 and above allowed subgroup members with inherited access to a project from a parent group to still have access even after the subgroup is transferred | CWE-281 |
167,602 | CVE-2021-39898 | 5.3 | 5 | MEDIUM | In all versions of GitLab CE/EE since version 10.6, a project export leaks the external webhook token value which may allow access to the project which it was exported from. | CWE-668 |
167,603 | CVE-2021-39899 | 4.2 | 1.9 | MEDIUM | In all versions of GitLab CE/EE, an attacker with physical access to a user’s machine may brute force the user’s password via the change password function. There is a rate limit in place, but the attack may still be conducted by stealing the session id from the physical compromise of the account and splitting the attack over several IP addresses and passing in the compromised session value from these various locations. | CWE-640 |
167,604 | CVE-2021-3990 | 6.5 | 4.3 | MEDIUM | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | CWE-338 |
167,605 | CVE-2021-39900 | 2.7 | 4 | LOW | Information disclosure from SendEntry in GitLab starting with 10.8 allowed exposure of full URL of artifacts stored in object-storage with a temporary availability via Rails logs. | CWE-668 |
167,606 | CVE-2021-39901 | 2.7 | 4 | LOW | In all versions of GitLab CE/EE since version 11.10, an admin of a group can see the SCIM token of that group by visiting a specific endpoint. | NVD-CWE-noinfo |
167,607 | CVE-2021-39902 | 4.3 | 4 | MEDIUM | Incorrect Authorization in GitLab CE/EE 13.4 or above allows a user with guest membership in a project to modify the severity of an incident. | CWE-863 |
167,608 | CVE-2021-39903 | 6.5 | 4 | MEDIUM | In all versions of GitLab CE/EE since version 13.0, a privileged user, through an API call, can change the visibility level of a group or a project to a restricted option even after the instance administrator sets that visibility option as restricted in settings. | CWE-863 |
167,609 | CVE-2021-39904 | 4.3 | 4 | MEDIUM | An Improper Access Control vulnerability in the GraphQL API in GitLab CE/EE since version 13.1 allows a Merge Request creator to resolve discussions and apply suggestions after a project owner has locked the Merge Request | CWE-863 |
167,610 | CVE-2021-39905 | 4.3 | 4 | MEDIUM | An information disclosure vulnerability in the GitLab CE/EE API since version 8.9.6 allows a user to see basic information on private groups that a public project has been shared with | NVD-CWE-noinfo |
167,611 | CVE-2021-39906 | 6.1 | 4.3 | MEDIUM | Improper validation of ipynb files in GitLab CE/EE version 13.5 and above allows an attacker to execute arbitrary JavaScript code on the victim's behalf. | CWE-79 |
167,612 | CVE-2021-39907 | 5.3 | 5 | MEDIUM | A potential DOS vulnerability was discovered in GitLab CE/EE starting with version 13.7. The stripping of EXIF data from certain images resulted in high CPU usage. | CWE-770 |
167,613 | CVE-2021-39909 | 5.3 | 3.5 | MEDIUM | Lack of email address ownership verification in the CODEOWNERS feature in all versions of GitLab EE since version 11.3 allows an attacker to bypass CODEOWNERS Merge Request approval requirement under rare circumstances | CWE-347 |
167,614 | CVE-2021-39910 | 4.3 | 4.3 | MEDIUM | An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.6 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab was vulnerable to HTML Injection through the Swagger UI feature. | CWE-74 |
167,615 | CVE-2021-39911 | 4.3 | 4 | MEDIUM | An improper access control flaw in GitLab CE/EE since version 13.9 exposes private email address of Issue and Merge Requests assignee to Webhook data consumers | CWE-863 |
167,616 | CVE-2021-39912 | 5.3 | 5 | MEDIUM | A potential DoS vulnerability was discovered in GitLab CE/EE starting with version 13.7. Using a malformed TIFF images was possible to trigger memory exhaustion. | CWE-770 |
167,617 | CVE-2021-39913 | 6.7 | 7.2 | MEDIUM | Accidental logging of system root password in the migration log in all versions of GitLab CE/EE allows an attacker with local file system access to obtain system root-level privileges | CWE-269 |
167,618 | CVE-2021-39914 | 4.3 | 5 | MEDIUM | A regular expression denial of service issue in GitLab versions 8.13 to 14.2.5, 14.3.0 to 14.3.3 and 14.4.0 could cause excessive usage of resources when a specially crafted username was used when provisioning a new user | CWE-770 |
167,619 | CVE-2021-39915 | 5.3 | 5 | MEDIUM | Improper access control in the GraphQL API in GitLab CE/EE affecting all versions starting from 13.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to see the names of project access tokens on arbitrary projects | CWE-668 |
167,620 | CVE-2021-39916 | 4.3 | 4 | MEDIUM | Lack of an access control check in the External Status Check feature allowed any authenticated user to retrieve the configuration of any External Status Check in GitLab EE starting from 14.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. | CWE-287 |
167,621 | CVE-2021-39917 | 6.5 | 4 | MEDIUM | An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.9 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression related to quick actions features was susceptible to catastrophic backtracking that could cause a DOS attack. | CWE-697 |
167,622 | CVE-2021-39918 | 4.3 | 4 | MEDIUM | Incorrect Authorization in GitLab EE affecting all versions starting from 11.1 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows a user to add comments to a vulnerability which cannot be accessed. | CWE-863 |
167,623 | CVE-2021-39919 | 4.4 | 2.1 | MEDIUM | In all versions of GitLab CE/EE starting version 14.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, the reset password token and new user email token are accidentally logged which may lead to information disclosure. | CWE-640 |
167,624 | CVE-2021-3992 | 6.5 | 4 | MEDIUM | kimai2 is vulnerable to Improper Access Control | CWE-863 |
167,625 | CVE-2021-39920 | 7.5 | 5 | HIGH | NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file | CWE-476 |
167,626 | CVE-2021-39921 | 7.5 | 5 | HIGH | NULL pointer exception in the Modbus dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file | CWE-476 |
167,627 | CVE-2021-39922 | 7.5 | 5 | HIGH | Buffer overflow in the C12.22 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file | CWE-120 |
167,628 | CVE-2021-39923 | 7.5 | 5 | HIGH | Large loop in the PNRP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file | CWE-834 |
167,629 | CVE-2021-39924 | 7.5 | 5 | HIGH | Large loop in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file | CWE-834 |
167,630 | CVE-2021-39925 | 7.5 | 5 | HIGH | Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file | CWE-120 |
167,631 | CVE-2021-39926 | 7.5 | 5 | HIGH | Buffer overflow in the Bluetooth HCI_ISO dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file | CWE-120 |
167,632 | CVE-2021-39928 | 7.5 | 5 | HIGH | NULL pointer exception in the IEEE 802.11 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file | CWE-476 |
167,633 | CVE-2021-39929 | 7.5 | 5 | HIGH | Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file | CWE-674 |
167,634 | CVE-2021-3993 | 6.5 | 4.3 | MEDIUM | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | CWE-352 |
167,635 | CVE-2021-39930 | 4.3 | 4 | MEDIUM | Missing authorization in GitLab EE versions between 12.4 and 14.3.6, between 14.4.0 and 14.4.4, and between 14.5.0 and 14.5.2 allowed an attacker to access a user's custom project and group templates | CWE-863 |
167,636 | CVE-2021-39931 | 4.3 | 3.5 | MEDIUM | An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.11 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Under specific condition an unauthorised project member was allowed to delete a protected branches due to a business logic error. | CWE-269 |
167,637 | CVE-2021-39932 | 4.3 | 4 | MEDIUM | An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Using large payloads, the diff feature could be used to trigger high load time for users reviewing code changes. | CWE-400 |
167,638 | CVE-2021-39933 | 6.5 | 4 | MEDIUM | An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A regular expression used for handling user input (notes, comments, etc) was susceptible to catastrophic backtracking that could cause a DOS attack. | NVD-CWE-Other |
167,639 | CVE-2021-39934 | 4.3 | 4 | MEDIUM | Improper access control allows any project member to retrieve the service desk email address in GitLab CE/EE versions starting 12.10 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. | CWE-863 |
167,640 | CVE-2021-39935 | 7.5 | 5 | HIGH | An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.5 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Unauthorized external users could perform Server Side Requests via the CI Lint API | CWE-918 |
167,641 | CVE-2021-39936 | 4.3 | 4 | MEDIUM | Improper access control in GitLab CE/EE affecting all versions starting from 10.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker in possession of a deploy token to access a project's disabled wiki. | CWE-863 |
167,642 | CVE-2021-39937 | 8.8 | 6.5 | HIGH | A collision in access memoization logic in all versions of GitLab CE/EE before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, leads to potential elevated privileges in groups and projects under rare circumstances | CWE-269 |
167,643 | CVE-2021-39938 | 6.5 | 4 | MEDIUM | A vulnerable regular expression pattern in GitLab CE/EE since version 8.15 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker to cause uncontrolled resource consumption leading to Denial of Service via specially crafted deploy Slash commands | CWE-400 |
167,644 | CVE-2021-39939 | 6.5 | 4 | MEDIUM | An uncontrolled resource consumption vulnerability in GitLab Runner affecting all versions starting from 13.7 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an attacker triggering a job with a specially crafted docker image to exhaust resources on runner manager | CWE-400 |
167,645 | CVE-2021-3994 | 9.6 | 6.8 | CRITICAL | django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-79 |
167,646 | CVE-2021-39940 | 6.5 | 4 | MEDIUM | An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. GitLab Maven Package registry is vulnerable to a regular expression denial of service when a specifically crafted string is sent. | NVD-CWE-Other |
167,647 | CVE-2021-39941 | 5.3 | 5 | MEDIUM | An information disclosure vulnerability in GitLab CE/EE versions 12.0 to 14.3.6, 14.4 to 14.4.4, and 14.5 to 14.5.2 allowed non-project members to see the default branch name for projects that restrict access to the repository to project members | CWE-200 |
167,648 | CVE-2021-39944 | 7.1 | 5.5 | HIGH | An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.0 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. A permissions validation flaw allowed group members with a developer role to elevate their privilege to a maintainer on projects they import | CWE-269 |
167,649 | CVE-2021-39945 | 2.7 | 4 | LOW | Improper access control in the GitLab CE/EE API affecting all versions starting from 9.4 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2, allows an author of a Merge Request to approve the Merge Request even after having their project access revoked | CWE-863 |
167,650 | CVE-2021-39976 | 7.8 | 7.2 | HIGH | There is a privilege escalation vulnerability in CloudEngine 5800 V200R020C00SPC600. Due to lack of privilege restrictions, an authenticated local attacker can perform specific operation to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege. | CWE-269 |
167,651 | CVE-2021-39995 | 6.5 | 6.8 | MEDIUM | Some Huawei products use the OpenHpi software for hardware management. A function that parses data returned by OpenHpi contains an out-of-bounds read vulnerability that could lead to a denial of service. Affected product versions include: eCNS280_TD V100R005C10; eSE620X vESS V100R001C10SPC200, V100R001C20SPC200, V200R001C00SPC300. | CWE-125 |
167,652 | CVE-2021-4000 | 6.1 | 5.8 | MEDIUM | showdoc is vulnerable to URL Redirection to Untrusted Site | CWE-601 |
167,653 | CVE-2021-40007 | 6.5 | 4 | MEDIUM | There is an information leak vulnerability in eCNS280_TD V100R005C10SPC650. The vulnerability is caused by improper log output management. An attacker with the ability to access the log file of device may lead to information disclosure. | CWE-116 |
167,654 | CVE-2021-40008 | 7.5 | 5 | HIGH | There is a memory leak vulnerability in CloudEngine 12800 V200R019C00SPC800, CloudEngine 5800 V200R019C00SPC800, CloudEngine 6800 V200R019C00SPC800 and CloudEngine 7800 V200R019C00SPC800. The software does not sufficiently track and release allocated memory while parse a series of crafted binary messages, which could consume remaining memory. Successful exploit could cause memory exhaust. | CWE-772 |
167,655 | CVE-2021-4005 | 4.3 | 4.3 | MEDIUM | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | CWE-352 |
167,656 | CVE-2021-40066 | 5.3 | 3.5 | MEDIUM | The access controls on the Mobility read-only API improperly validate user access permissions. Attackers with both network access to the API and valid credentials can read data from it; regardless of access control group membership settings. This vulnerability is fixed in Mobility v11.76 and Mobility v12.14. | CWE-732 |
167,657 | CVE-2021-40067 | 6.8 | 4.9 | MEDIUM | The access controls on the Mobility read-write API improperly validate user access permissions; this API is disabled by default. If the API is manually enabled, attackers with both network access to the API and valid credentials can read and write data to it; regardless of access control group membership settings. This vulnerability is fixed in Mobility v12.14. | CWE-732 |
167,658 | CVE-2021-4007 | 7.8 | 7.2 | HIGH | Rapid7 Insight Agent, versions 3.0.1 to 3.1.2.34, suffer from a local privilege escalation due to an uncontrolled DLL search path. Specifically, when Insight Agent versions 3.0.1 to 3.1.2.34 start, the Python interpreter attempts to load python3.dll at "C:\DLLs\python3.dll," which normally is writable by locally authenticated users. Because of this, a malicious local user could use Insight Agent's startup conditions to elevate to SYSTEM privileges. This issue was fixed in Rapid7 Insight Agent 3.1.2.35. This vulnerability is a regression of CVE-2019-5629. | CWE-427 |
167,659 | CVE-2021-4008 | 7.8 | 4.6 | HIGH | A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-119 |
167,660 | CVE-2021-40083 | 7.5 | 5 | HIGH | Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof). | CWE-617 |
167,661 | CVE-2021-40084 | 9.8 | 7.5 | CRITICAL | opensysusers through 0.6 does not safely use eval on files in sysusers.d that may contain shell metacharacters. For example, it allows command execution via a crafted GECOS field whereas systemd-sysusers (a program with the same specification) does not do that. | CWE-77 |
167,662 | CVE-2021-40085 | 6.5 | 4 | MEDIUM | An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value. | NVD-CWE-noinfo |
167,663 | CVE-2021-40086 | 2.2 | 3.5 | LOW | An issue was discovered in PrimeKey EJBCA before 7.6.0. As part of the configuration of the aliases for SCEP, CMP, EST, and Auto-enrollment, the enrollment secret was reflected on a page (that can only be viewed by an administrator). While hidden from direct view, checking the page source would reveal the secret. | CWE-668 |
167,664 | CVE-2021-40087 | 2.7 | 4 | LOW | An issue was discovered in PrimeKey EJBCA before 7.6.0. When audit logging changes to the alias configurations of various protocols that use an enrollment secret, any modifications to the secret were logged in cleartext in the audit log (that can only be viewed by an administrator). This affects use of any of the following protocols: SCEP, CMP, or EST. | CWE-312 |
167,665 | CVE-2021-40088 | 5.4 | 4.9 | MEDIUM | An issue was discovered in PrimeKey EJBCA before 7.6.0. CMP RA Mode can be configured to use a known client certificate to authenticate enrolling clients. The same RA client certificate is used for revocation requests as well. While enrollment enforces multi tenancy constraints (by verifying that the client certificate has access to the CA and Profiles being enrolled against), this check was not performed when authenticating revocation operations, allowing a known tenant to revoke a certificate belonging to another tenant. | CWE-862 |
167,666 | CVE-2021-40089 | 2.3 | 1.9 | LOW | An issue was discovered in PrimeKey EJBCA before 7.6.0. The General Purpose Custom Publisher, which is normally run to invoke a local script upon a publishing operation, was still able to run if the System Configuration setting Enable External Script Access was disabled. With this setting disabled it's not possible to create new such publishers, but existing publishers would continue to run. | NVD-CWE-noinfo |
167,667 | CVE-2021-4009 | 7.8 | 4.6 | HIGH | A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-119 |
167,668 | CVE-2021-40091 | 9.8 | 7.5 | CRITICAL | An SSRF issue was discovered in SquaredUp for SCOM 5.2.1.6654. | CWE-918 |
167,669 | CVE-2021-40092 | 5.4 | 3.5 | MEDIUM | A cross-site scripting (XSS) vulnerability in Image Tile in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via an SVG file. | CWE-79 |
167,670 | CVE-2021-40093 | 5.4 | 3.5 | MEDIUM | A cross-site scripting (XSS) vulnerability in integration configuration in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via dashboard actions. | CWE-79 |
167,671 | CVE-2021-40094 | 5.4 | 3.5 | MEDIUM | A DOM-based XSS vulnerability affects SquaredUp for SCOM 5.2.1.6654. If successfully exploited, this vulnerability may allow attackers to inject malicious code into a user's device. | CWE-79 |
167,672 | CVE-2021-40095 | 4.9 | 4 | MEDIUM | An issue was discovered in SquaredUp for SCOM 5.2.1.6654. The Download Log feature in System / Maintenance was susceptible to a local file inclusion vulnerability (when processing remote input in the log files downloaded by an authenticated administrator user), leading to the ability to read arbitrary files on the server filesystems. | NVD-CWE-Other |
167,673 | CVE-2021-40096 | 5.4 | 3.5 | MEDIUM | A cross-site scripting (XSS) vulnerability in integration configuration in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via modification of the authorisationUrl in some integration configurations. | CWE-79 |
167,674 | CVE-2021-40097 | 8.8 | 6.5 | HIGH | An issue was discovered in Concrete CMS through 8.5.5. Authenticated path traversal leads to to remote code execution via uploaded PHP code, related to the bFilename parameter. | CWE-22 |
167,675 | CVE-2021-40098 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Concrete CMS through 8.5.5. Path Traversal leading to RCE via external form by adding a regular expression. | CWE-22 |
167,676 | CVE-2021-40099 | 7.2 | 6.5 | HIGH | An issue was discovered in Concrete CMS through 8.5.5. Fetching the update json scheme over HTTP leads to remote code execution. | NVD-CWE-noinfo |
167,677 | CVE-2021-4010 | 7.8 | 4.6 | HIGH | A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-119 |
167,678 | CVE-2021-4010 | 7.8 | 4.6 | HIGH | A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-119 |
167,679 | CVE-2021-40100 | 5.4 | 3.5 | MEDIUM | An issue was discovered in Concrete CMS through 8.5.5. Stored XSS can occur in Conversations when the Active Conversation Editor is set to Rich Text. | CWE-79 |
167,680 | CVE-2021-40101 | 7.2 | 6.5 | HIGH | An issue was discovered in Concrete CMS before 8.5.7. The Dashboard allows a user's password to be changed without a prompt for the current password. | CWE-732 |
167,681 | CVE-2021-40102 | 9.1 | 6.4 | CRITICAL | An issue was discovered in Concrete CMS through 8.5.5. Arbitrary File deletion can occur via PHAR deserialization in is_dir (PHP Object Injection associated with the __wakeup magic method). | CWE-502 |
167,682 | CVE-2021-40103 | 7.5 | 5 | HIGH | An issue was discovered in Concrete CMS through 8.5.5. Path Traversal can lead to Arbitrary File Reading and SSRF. | CWE-22 |
167,683 | CVE-2021-40104 | 7.5 | 5 | HIGH | An issue was discovered in Concrete CMS through 8.5.5. There is an SVG sanitizer bypass. | CWE-863 |
167,684 | CVE-2021-40105 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Concrete CMS through 8.5.5. There is XSS via Markdown Comments. | CWE-79 |
167,685 | CVE-2021-40106 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Concrete CMS through 8.5.5. There is unauthenticated stored XSS in blog comments via the website field. | CWE-79 |
167,686 | CVE-2021-40108 | 8.8 | 6.8 | HIGH | An issue was discovered in Concrete CMS through 8.5.5. The Calendar is vulnerable to CSRF. ccm_token is not verified on the ccm/calendar/dialogs/event/add/save endpoint. | CWE-352 |
167,687 | CVE-2021-40109 | 6.4 | 5.5 | MEDIUM | A SSRF issue was discovered in Concrete CMS through 8.5.5. Users can access forbidden files on their local network. A user with permissions to upload files from external sites can upload a URL that redirects to an internal resource of any file type. The redirect is followed and loads the contents of the file from the redirected-to server. Files of disallowed types can be uploaded. | CWE-918 |
167,688 | CVE-2021-4011 | 7.8 | 4.6 | HIGH | A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | CWE-119 |
167,689 | CVE-2021-40112 | 7.5 | 5 | HIGH | Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory. | CWE-20 |
167,690 | CVE-2021-40113 | 9.8 | 7.5 | CRITICAL | Multiple vulnerabilities in the web-based management interface of the Cisco Catalyst Passive Optical Network (PON) Series Switches Optical Network Terminal (ONT) could allow an unauthenticated, remote attacker to perform the following actions: Log in with a default credential if the Telnet protocol is enabled Perform command injection Modify the configuration For more information about these vulnerabilities, see the Details section of this advisory. | CWE-77 |
167,691 | CVE-2021-40114 | 7.5 | 7.8 | HIGH | Multiple Cisco products are affected by a vulnerability in the way the Snort detection engine processes ICMP traffic that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper memory resource management while the Snort detection engine is processing ICMP packets. An attacker could exploit this vulnerability by sending a series of ICMP packets through an affected device. A successful exploit could allow the attacker to exhaust resources on the affected device, causing the device to reload. | CWE-401 |
167,692 | CVE-2021-40115 | 6.1 | 4.3 | MEDIUM | A vulnerability in Cisco Webex Video Mesh could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. | CWE-79 |
167,693 | CVE-2021-40116 | 7.5 | 7.1 | HIGH | Multiple Cisco products are affected by a vulnerability in Snort rules that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.The vulnerability is due to improper handling of the Block with Reset or Interactive Block with Reset actions if a rule is configured without proper constraints. An attacker could exploit this vulnerability by sending a crafted IP packet to the affected device. A successful exploit could allow the attacker to cause through traffic to be dropped. Note: Only products with Snort3 configured and either a rule with Block with Reset or Interactive Block with Reset actions configured are vulnerable. Products configured with Snort2 are not vulnerable. | NVD-CWE-noinfo |
167,694 | CVE-2021-40117 | 7.5 | 7.8 | HIGH | A vulnerability in SSL/TLS message handler for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because incoming SSL/TLS packets are not properly processed. An attacker could exploit this vulnerability by sending a crafted SSL/TLS packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. | CWE-400 |
167,695 | CVE-2021-40118 | 7.5 | 7.1 | HIGH | Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. These vulnerabilities are due to improper input validation when parsing HTTPS requests. An attacker could exploit these vulnerabilities by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. | CWE-20 |
167,696 | CVE-2021-40119 | 9.8 | 10 | CRITICAL | A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user. This vulnerability is due to the re-use of static SSH keys across installations. An attacker could exploit this vulnerability by extracting a key from a system under their control. A successful exploit could allow the attacker to log in to an affected system as the root user. | CWE-798 |
167,697 | CVE-2021-40120 | 7.2 | 9 | HIGH | A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system and execute them using root-level privileges. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as a user with root-level privileges. | CWE-20 |
167,698 | CVE-2021-40121 | 4.8 | 3.5 | MEDIUM | Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. | CWE-79 |
167,699 | CVE-2021-40122 | 7.5 | 5 | HIGH | A vulnerability in an API of the Call Bridge feature of Cisco Meeting Server could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper handling of large series of message requests. An attacker could exploit this vulnerability by sending a series of messages to the vulnerable API. A successful exploit could allow the attacker to cause the affected device to reload, dropping all ongoing calls and resulting in a DoS condition. | CWE-404 |
167,700 | CVE-2021-40123 | 6.5 | 4 | MEDIUM | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker with administrative read-only privileges to download files that should be restricted. This vulnerability is due to incorrect permissions settings on an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the device. A successful exploit could allow the attacker to download files that should be restricted. | CWE-276 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.