ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
168,301
CVE-2021-41291
7.5
5
HIGH
ECOA BAS controller suffers from a path traversal content disclosure vulnerability. Using the GET parameter in File Manager, unauthenticated attackers can remotely disclose directory content on the affected device.
CWE-22
168,302
CVE-2021-41292
9.1
6.4
CRITICAL
ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate HVAC.
CWE-288
168,303
CVE-2021-41293
7.5
5
HIGH
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information.
CWE-22
168,304
CVE-2021-41294
9.1
6.4
CRITICAL
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario.
CWE-22
168,305
CVE-2021-41295
8.8
6.8
HIGH
ECOA BAS controller has a Cross-Site Request Forgery vulnerability, thus authenticated attacker can remotely place a forged request at a malicious web page and execute CRUD commands (GET, POST, PUT, DELETE) to perform arbitrary operations in the system.
CWE-352
168,306
CVE-2021-41296
9.8
5
CRITICAL
ECOA BAS controller uses weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system.
CWE-521
168,307
CVE-2021-41297
8.8
4
HIGH
ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text.
CWE-522
168,308
CVE-2021-41298
8.8
6.5
HIGH
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities.
CWE-639
168,309
CVE-2021-41299
9.8
10
CRITICAL
ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administrator’s privilege without logging in.
CWE-798
168,310
CVE-2021-4130
8.8
6.8
HIGH
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
CWE-352
168,311
CVE-2021-41300
9.8
5
CRITICAL
ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality.
CWE-522
168,312
CVE-2021-41301
9.8
10
CRITICAL
ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.
CWE-639
168,313
CVE-2021-41302
7.3
5
HIGH
ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain user’s privilege.
CWE-311
168,314
CVE-2021-41303
9.8
7.5
CRITICAL
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
CWE-287
168,315
CVE-2021-41304
6.1
4.3
MEDIUM
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the /secure/admin/ImporterFinishedPage.jspa error message. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.1.
CWE-79
168,316
CVE-2021-41305
7.5
5
HIGH
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view the names of private projects and filters via an Insecure Direct Object References (IDOR) vulnerability in the Average Number of Times in Status Gadget. The affected versions are before version 8.13.12..
CWE-200
168,317
CVE-2021-41306
7.5
5
HIGH
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view private project and filter names via an Insecure Direct Object References (IDOR) vulnerability in the Average Time in Status Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0.
CWE-200
168,318
CVE-2021-41307
7.5
5
HIGH
Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to view the names of private projects and private filters via an Insecure Direct Object References (IDOR) vulnerability in the Workload Pie Chart Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0.
CWE-639
168,319
CVE-2021-41308
6.5
4
MEDIUM
Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1.
CWE-287
168,320
CVE-2021-41309
5.3
5
MEDIUM
Affected versions of Atlassian Jira Server and Data Center allow a user who has had their Jira Service Management access revoked to export audit logs of another user's Jira Service Management project via a Broken Authentication vulnerability in the /plugins/servlet/audit/resource endpoint. The affected versions of Jira Server and Data Center are before version 8.19.1.
CWE-287
168,321
CVE-2021-4131
8.8
6.8
HIGH
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
CWE-352
168,322
CVE-2021-41310
6.1
4.3
MEDIUM
Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Associated Projects feature (/secure/admin/AssociatedProjectsForCustomField.jspa). The affected versions are before version 8.5.19, from version 8.6.0 before 8.13.11, and from version 8.14.0 before 8.19.1.
CWE-79
168,323
CVE-2021-41311
7.5
5
HIGH
Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an administrator account that has had its access revoked to modify projects' Users & Roles settings, via a Broken Authentication vulnerability in the /plugins/servlet/project-config/PROJECT/roles endpoint. The affected versions are before version 8.19.1.
CWE-287
168,324
CVE-2021-41312
7.5
5
HIGH
Affected versions of Atlassian Jira Server and Data Center allow a remote attacker who has had their access revoked from Jira Service Management to enable and disable Issue Collectors on Jira Service Management projects via an Improper Authentication vulnerability in the /secure/ViewCollectors endpoint. The affected versions are before version 8.19.1.
CWE-287
168,325
CVE-2021-41313
4.3
4
MEDIUM
Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.21.0.
CWE-862
168,326
CVE-2021-41314
8.8
8.3
HIGH
Certain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2.
CWE-287
168,327
CVE-2021-41315
8.8
9
HIGH
The Device42 Remote Collector before 17.05.01 does not sanitize user input in its SNMP Connectivity utility. This allows an authenticated attacker (with access to the console application) to execute arbitrary OS commands and escalate privileges.
CWE-78
168,328
CVE-2021-41316
8.1
8.5
HIGH
The Device42 Main Appliance before 17.05.01 does not sanitize user input in its Nmap Discovery utility. An attacker (with permissions to add or edit jobs run by this utility) can inject an extra argument to overwrite arbitrary files as the root user on the Remote Collector.
CWE-88
168,329
CVE-2021-41317
9.8
7.5
CRITICAL
XSS Hunter Express before 2021-09-17 does not properly enforce authentication requirements for paths.
CWE-287
168,330
CVE-2021-41318
6.1
4.3
MEDIUM
In Progress WhatsUp Gold prior to version 21.1.0, an application endpoint failed to adequately sanitize malicious input. which could allow an unauthenticated attacker to execute arbitrary code in a victim's browser.
CWE-79
168,331
CVE-2021-4132
5.4
3.5
MEDIUM
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79
168,332
CVE-2021-41320
5.5
2.1
MEDIUM
A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user.
CWE-798
168,333
CVE-2021-41322
8.8
6.5
HIGH
Poly VVX 400/410 5.3.1 allows low-privileged users to change the Admin password by modifying a POST parameter to 120 during the password reset process.
CWE-269
168,334
CVE-2021-41323
6.5
4
MEDIUM
Directory traversal in the Compress feature in Pydio Cells 2.2.9 allows remote authenticated users to overwrite personal files, or Cells files belonging to any user, via the format parameter.
CWE-22
168,335
CVE-2021-41324
6.5
4
MEDIUM
Directory traversal in the Copy, Move, and Delete features in Pydio Cells 2.2.9 allows remote authenticated users to enumerate personal files (or Cells files belonging to any user) via the nodes parameter (for Copy and Move) or via the Path parameter (for Delete).
CWE-22
168,336
CVE-2021-41325
6.5
4
MEDIUM
Broken access control for user creation in Pydio Cells 2.2.9 allows remote anonymous users to create standard users via the profile parameter. (In addition, such users can be granted several admin permissions via the Roles parameter.)
CWE-863
168,337
CVE-2021-41326
9.8
7.5
CRITICAL
In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call.
NVD-CWE-noinfo
168,338
CVE-2021-41329
6.5
4
MEDIUM
Datalust Seq before 2021.2.6259 allows users (with view filters applied to their accounts) to see query results not constrained by their view filter. This information exposure, caused by an internal cache key collision, occurs when the user's view filter includes an array or IN clause, and when another user has recently executed an identical query differing only by the array elements.
CWE-668
168,339
CVE-2021-41330
7.8
6.8
HIGH
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
NVD-CWE-noinfo
168,340
CVE-2021-41331
7.8
6.8
HIGH
Windows Media Audio Decoder Remote Code Execution Vulnerability
NVD-CWE-noinfo
168,341
CVE-2021-41332
6.5
4
MEDIUM
Windows Print Spooler Information Disclosure Vulnerability
NVD-CWE-noinfo
168,342
CVE-2021-41333
7.8
4.6
HIGH
Windows Print Spooler Elevation of Privilege Vulnerability
CWE-269
168,343
CVE-2021-41334
7.8
4.6
HIGH
Windows Desktop Bridge Elevation of Privilege Vulnerability
CWE-269
168,344
CVE-2021-41335
7.8
7.2
HIGH
Windows Kernel Elevation of Privilege Vulnerability
CWE-269
168,345
CVE-2021-41336
5.5
2.1
MEDIUM
Windows Kernel Information Disclosure Vulnerability
NVD-CWE-noinfo
168,346
CVE-2021-41337
4.9
4
MEDIUM
Active Directory Security Feature Bypass Vulnerability
NVD-CWE-noinfo
168,347
CVE-2021-41338
5.5
2.1
MEDIUM
Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability
NVD-CWE-noinfo
168,348
CVE-2021-41339
7.8
4.6
HIGH
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CWE-269
168,349
CVE-2021-41340
7.8
6.8
HIGH
Windows Graphics Component Remote Code Execution Vulnerability
NVD-CWE-noinfo
168,350
CVE-2021-41342
8.8
6.8
HIGH
Windows MSHTML Platform Remote Code Execution Vulnerability
NVD-CWE-noinfo
168,351
CVE-2021-41343
5.5
2.1
MEDIUM
Windows Fast FAT File System Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-38662.
NVD-CWE-noinfo
168,352
CVE-2021-41344
8.8
6.5
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40487.
NVD-CWE-noinfo
168,353
CVE-2021-41345
7.8
7.2
HIGH
Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26441, CVE-2021-40478, CVE-2021-40488, CVE-2021-40489.
CWE-269
168,354
CVE-2021-41346
7.8
4.6
HIGH
Console Window Host Security Feature Bypass Vulnerability
NVD-CWE-noinfo
168,355
CVE-2021-41347
7.8
4.6
HIGH
Windows AppX Deployment Service Elevation of Privilege Vulnerability
CWE-269
168,356
CVE-2021-41348
8
5.2
HIGH
Microsoft Exchange Server Elevation of Privilege Vulnerability
CWE-269
168,357
CVE-2021-41349
6.5
4.3
MEDIUM
Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305.
NVD-CWE-noinfo
168,358
CVE-2021-41350
4.3
4.3
MEDIUM
Microsoft Exchange Server Spoofing Vulnerability
NVD-CWE-noinfo
168,359
CVE-2021-41351
4.3
4.3
MEDIUM
Microsoft Edge (Chrome based) Spoofing on IE Mode
NVD-CWE-noinfo
168,360
CVE-2021-41352
7.5
5
HIGH
SCOM Information Disclosure Vulnerability
NVD-CWE-noinfo
168,361
CVE-2021-41353
3.5
3.5
LOW
Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability
NVD-CWE-noinfo
168,362
CVE-2021-41354
5.4
3.5
MEDIUM
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CWE-79
168,363
CVE-2021-41355
5.7
2.9
MEDIUM
.NET Core and Visual Studio Information Disclosure Vulnerability
NVD-CWE-noinfo
168,364
CVE-2021-41356
7.5
5
HIGH
Windows Denial of Service Vulnerability
NVD-CWE-noinfo
168,365
CVE-2021-41357
7.8
4.6
HIGH
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40449, CVE-2021-40450.
CWE-269
168,366
CVE-2021-4136
7.8
6.8
HIGH
vim is vulnerable to Heap-based Buffer Overflow
CWE-122
168,367
CVE-2021-41360
7.8
6.8
HIGH
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40452, CVE-2021-40453.
NVD-CWE-noinfo
168,368
CVE-2021-41361
3.5
3.5
LOW
Active Directory Federation Server Spoofing Vulnerability
NVD-CWE-noinfo
168,369
CVE-2021-41363
6.7
4.4
MEDIUM
Intune Management Extension Security Feature Bypass Vulnerability
NVD-CWE-noinfo
168,370
CVE-2021-41365
8.8
6.5
HIGH
Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889.
CWE-94
168,371
CVE-2021-41366
7.8
4.6
HIGH
Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability
CWE-269
168,372
CVE-2021-41367
7.8
4.6
HIGH
NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41370, CVE-2021-42283.
CWE-269
168,373
CVE-2021-41368
7.8
6.8
HIGH
Microsoft Access Remote Code Execution Vulnerability
NVD-CWE-noinfo
168,374
CVE-2021-41370
7.8
4.6
HIGH
NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41367, CVE-2021-42283.
CWE-269
168,375
CVE-2021-41371
4.4
2.1
MEDIUM
Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-38631.
NVD-CWE-noinfo
168,376
CVE-2021-41372
9.6
6.8
CRITICAL
Power BI Report Server Spoofing Vulnerability
CWE-352
168,377
CVE-2021-41372
9.6
6.8
CRITICAL
Power BI Report Server Spoofing Vulnerability
CWE-79
168,378
CVE-2021-41373
5.5
2.1
MEDIUM
FSLogix Information Disclosure Vulnerability
NVD-CWE-noinfo
168,379
CVE-2021-41374
5.5
2.1
MEDIUM
Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41375, CVE-2021-41376.
NVD-CWE-noinfo
168,380
CVE-2021-41375
4.4
2.1
MEDIUM
Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41374, CVE-2021-41376.
NVD-CWE-noinfo
168,381
CVE-2021-41376
4.4
2.1
MEDIUM
Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41374, CVE-2021-41375.
NVD-CWE-noinfo
168,382
CVE-2021-41377
7.8
4.6
HIGH
Windows Fast FAT File System Driver Elevation of Privilege Vulnerability
CWE-269
168,383
CVE-2021-41378
8.8
6.5
HIGH
Windows NTFS Remote Code Execution Vulnerability
NVD-CWE-noinfo
168,384
CVE-2021-41379
7.8
4.6
HIGH
Windows Installer Elevation of Privilege Vulnerability
CWE-269
168,385
CVE-2021-41380
6.5
4.3
MEDIUM
** DISPUTED ** RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. NOTE: It is asserted that this issue requires social engineering a user into connecting to a fake VNC Server. The VNC Viewer application they are using will then hang, until terminated, but no memory leak occurs - the resources are freed once the hung process is terminated and the resource usage is constant during the hang. Only the process that is connected to the fake Server is affected. This is an application bug, not a security issue.
CWE-20
168,386
CVE-2021-41381
7.5
4.3
HIGH
Payara Micro Community 5.2021.6 and below allows Directory Traversal.
CWE-22
168,387
CVE-2021-41382
7.5
5
HIGH
Plastic SCM before 10.0.16.5622 mishandles the WebAdmin server management interface.
NVD-CWE-noinfo
168,388
CVE-2021-41383
7.2
9
HIGH
setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the ntp_server field.
CWE-77
168,389
CVE-2021-41385
6.5
4
MEDIUM
The third party intelligence connector in Securonix SNYPR 6.3.1 Build 184295_0302 allows an authenticated user to obtain access to server configuration details via SSRF.
CWE-918
168,390
CVE-2021-41387
8.8
8.5
HIGH
seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root.
CWE-269
168,391
CVE-2021-4139
null
null
null
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79
168,392
CVE-2021-41390
8
6
HIGH
In Ericsson ECM before 18.0, it was observed that Security Provider Endpoint in the User Profile Management Section is vulnerable to CSV Injection.
CWE-74
168,393
CVE-2021-41391
5.4
3.5
MEDIUM
In Ericsson ECM before 18.0, it was observed that Security Management Endpoint in User Profile Management Section is vulnerable to stored XSS via a name, leading to session hijacking and full account takeover.
CWE-79
168,394
CVE-2021-41392
9.8
7.5
CRITICAL
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.
CWE-74
168,395
CVE-2021-41393
9.8
7.5
CRITICAL
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CWE-287
168,396
CVE-2021-41394
5.3
5
MEDIUM
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
NVD-CWE-noinfo
168,397
CVE-2021-41395
6.5
6.4
MEDIUM
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
NVD-CWE-noinfo
168,398
CVE-2021-41426
8.8
6.8
HIGH
Beeline Smart box 2.0.38 is vulnerable to Cross Site Request Forgery (CSRF) via mgt_end_user.htm.
CWE-352
168,399
CVE-2021-41427
6.1
4.3
MEDIUM
Beeline Smart Box 2.0.38 is vulnerable to Cross Site Scripting (XSS) via the choose_mac parameter to setup.cgi.
CWE-79
168,400
CVE-2021-41435
9.8
10
CRITICAL
A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request.
CWE-307