ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
168,301 | CVE-2021-41291 | 7.5 | 5 | HIGH | ECOA BAS controller suffers from a path traversal content disclosure vulnerability. Using the GET parameter in File Manager, unauthenticated attackers can remotely disclose directory content on the affected device. | CWE-22 |
168,302 | CVE-2021-41292 | 9.1 | 6.4 | CRITICAL | ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate HVAC. | CWE-288 |
168,303 | CVE-2021-41293 | 7.5 | 5 | HIGH | ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information. | CWE-22 |
168,304 | CVE-2021-41294 | 9.1 | 6.4 | CRITICAL | ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario. | CWE-22 |
168,305 | CVE-2021-41295 | 8.8 | 6.8 | HIGH | ECOA BAS controller has a Cross-Site Request Forgery vulnerability, thus authenticated attacker can remotely place a forged request at a malicious web page and execute CRUD commands (GET, POST, PUT, DELETE) to perform arbitrary operations in the system. | CWE-352 |
168,306 | CVE-2021-41296 | 9.8 | 5 | CRITICAL | ECOA BAS controller uses weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system. | CWE-521 |
168,307 | CVE-2021-41297 | 8.8 | 4 | HIGH | ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text. | CWE-522 |
168,308 | CVE-2021-41298 | 8.8 | 6.5 | HIGH | ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities. | CWE-639 |
168,309 | CVE-2021-41299 | 9.8 | 10 | CRITICAL | ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administrator’s privilege without logging in. | CWE-798 |
168,310 | CVE-2021-4130 | 8.8 | 6.8 | HIGH | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | CWE-352 |
168,311 | CVE-2021-41300 | 9.8 | 5 | CRITICAL | ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality. | CWE-522 |
168,312 | CVE-2021-41301 | 9.8 | 10 | CRITICAL | ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access. | CWE-639 |
168,313 | CVE-2021-41302 | 7.3 | 5 | HIGH | ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain user’s privilege. | CWE-311 |
168,314 | CVE-2021-41303 | 9.8 | 7.5 | CRITICAL | Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0. | CWE-287 |
168,315 | CVE-2021-41304 | 6.1 | 4.3 | MEDIUM | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the /secure/admin/ImporterFinishedPage.jspa error message. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.1. | CWE-79 |
168,316 | CVE-2021-41305 | 7.5 | 5 | HIGH | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view the names of private projects and filters via an Insecure Direct Object References (IDOR) vulnerability in the Average Number of Times in Status Gadget. The affected versions are before version 8.13.12.. | CWE-200 |
168,317 | CVE-2021-41306 | 7.5 | 5 | HIGH | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view private project and filter names via an Insecure Direct Object References (IDOR) vulnerability in the Average Time in Status Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0. | CWE-200 |
168,318 | CVE-2021-41307 | 7.5 | 5 | HIGH | Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to view the names of private projects and private filters via an Insecure Direct Object References (IDOR) vulnerability in the Workload Pie Chart Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0. | CWE-639 |
168,319 | CVE-2021-41308 | 6.5 | 4 | MEDIUM | Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1. | CWE-287 |
168,320 | CVE-2021-41309 | 5.3 | 5 | MEDIUM | Affected versions of Atlassian Jira Server and Data Center allow a user who has had their Jira Service Management access revoked to export audit logs of another user's Jira Service Management project via a Broken Authentication vulnerability in the /plugins/servlet/audit/resource endpoint. The affected versions of Jira Server and Data Center are before version 8.19.1. | CWE-287 |
168,321 | CVE-2021-4131 | 8.8 | 6.8 | HIGH | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | CWE-352 |
168,322 | CVE-2021-41310 | 6.1 | 4.3 | MEDIUM | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Associated Projects feature (/secure/admin/AssociatedProjectsForCustomField.jspa). The affected versions are before version 8.5.19, from version 8.6.0 before 8.13.11, and from version 8.14.0 before 8.19.1. | CWE-79 |
168,323 | CVE-2021-41311 | 7.5 | 5 | HIGH | Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an administrator account that has had its access revoked to modify projects' Users & Roles settings, via a Broken Authentication vulnerability in the /plugins/servlet/project-config/PROJECT/roles endpoint. The affected versions are before version 8.19.1. | CWE-287 |
168,324 | CVE-2021-41312 | 7.5 | 5 | HIGH | Affected versions of Atlassian Jira Server and Data Center allow a remote attacker who has had their access revoked from Jira Service Management to enable and disable Issue Collectors on Jira Service Management projects via an Improper Authentication vulnerability in the /secure/ViewCollectors endpoint. The affected versions are before version 8.19.1. | CWE-287 |
168,325 | CVE-2021-41313 | 4.3 | 4 | MEDIUM | Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.21.0. | CWE-862 |
168,326 | CVE-2021-41314 | 8.8 | 8.3 | HIGH | Certain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. | CWE-287 |
168,327 | CVE-2021-41315 | 8.8 | 9 | HIGH | The Device42 Remote Collector before 17.05.01 does not sanitize user input in its SNMP Connectivity utility. This allows an authenticated attacker (with access to the console application) to execute arbitrary OS commands and escalate privileges. | CWE-78 |
168,328 | CVE-2021-41316 | 8.1 | 8.5 | HIGH | The Device42 Main Appliance before 17.05.01 does not sanitize user input in its Nmap Discovery utility. An attacker (with permissions to add or edit jobs run by this utility) can inject an extra argument to overwrite arbitrary files as the root user on the Remote Collector. | CWE-88 |
168,329 | CVE-2021-41317 | 9.8 | 7.5 | CRITICAL | XSS Hunter Express before 2021-09-17 does not properly enforce authentication requirements for paths. | CWE-287 |
168,330 | CVE-2021-41318 | 6.1 | 4.3 | MEDIUM | In Progress WhatsUp Gold prior to version 21.1.0, an application endpoint failed to adequately sanitize malicious input. which could allow an unauthenticated attacker to execute arbitrary code in a victim's browser. | CWE-79 |
168,331 | CVE-2021-4132 | 5.4 | 3.5 | MEDIUM | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-79 |
168,332 | CVE-2021-41320 | 5.5 | 2.1 | MEDIUM | A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. | CWE-798 |
168,333 | CVE-2021-41322 | 8.8 | 6.5 | HIGH | Poly VVX 400/410 5.3.1 allows low-privileged users to change the Admin password by modifying a POST parameter to 120 during the password reset process. | CWE-269 |
168,334 | CVE-2021-41323 | 6.5 | 4 | MEDIUM | Directory traversal in the Compress feature in Pydio Cells 2.2.9 allows remote authenticated users to overwrite personal files, or Cells files belonging to any user, via the format parameter. | CWE-22 |
168,335 | CVE-2021-41324 | 6.5 | 4 | MEDIUM | Directory traversal in the Copy, Move, and Delete features in Pydio Cells 2.2.9 allows remote authenticated users to enumerate personal files (or Cells files belonging to any user) via the nodes parameter (for Copy and Move) or via the Path parameter (for Delete). | CWE-22 |
168,336 | CVE-2021-41325 | 6.5 | 4 | MEDIUM | Broken access control for user creation in Pydio Cells 2.2.9 allows remote anonymous users to create standard users via the profile parameter. (In addition, such users can be granted several admin permissions via the Roles parameter.) | CWE-863 |
168,337 | CVE-2021-41326 | 9.8 | 7.5 | CRITICAL | In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call. | NVD-CWE-noinfo |
168,338 | CVE-2021-41329 | 6.5 | 4 | MEDIUM | Datalust Seq before 2021.2.6259 allows users (with view filters applied to their accounts) to see query results not constrained by their view filter. This information exposure, caused by an internal cache key collision, occurs when the user's view filter includes an array or IN clause, and when another user has recently executed an identical query differing only by the array elements. | CWE-668 |
168,339 | CVE-2021-41330 | 7.8 | 6.8 | HIGH | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,340 | CVE-2021-41331 | 7.8 | 6.8 | HIGH | Windows Media Audio Decoder Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,341 | CVE-2021-41332 | 6.5 | 4 | MEDIUM | Windows Print Spooler Information Disclosure Vulnerability | NVD-CWE-noinfo |
168,342 | CVE-2021-41333 | 7.8 | 4.6 | HIGH | Windows Print Spooler Elevation of Privilege Vulnerability | CWE-269 |
168,343 | CVE-2021-41334 | 7.8 | 4.6 | HIGH | Windows Desktop Bridge Elevation of Privilege Vulnerability | CWE-269 |
168,344 | CVE-2021-41335 | 7.8 | 7.2 | HIGH | Windows Kernel Elevation of Privilege Vulnerability | CWE-269 |
168,345 | CVE-2021-41336 | 5.5 | 2.1 | MEDIUM | Windows Kernel Information Disclosure Vulnerability | NVD-CWE-noinfo |
168,346 | CVE-2021-41337 | 4.9 | 4 | MEDIUM | Active Directory Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
168,347 | CVE-2021-41338 | 5.5 | 2.1 | MEDIUM | Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
168,348 | CVE-2021-41339 | 7.8 | 4.6 | HIGH | Microsoft DWM Core Library Elevation of Privilege Vulnerability | CWE-269 |
168,349 | CVE-2021-41340 | 7.8 | 6.8 | HIGH | Windows Graphics Component Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,350 | CVE-2021-41342 | 8.8 | 6.8 | HIGH | Windows MSHTML Platform Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,351 | CVE-2021-41343 | 5.5 | 2.1 | MEDIUM | Windows Fast FAT File System Driver Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-38662. | NVD-CWE-noinfo |
168,352 | CVE-2021-41344 | 8.8 | 6.5 | HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40487. | NVD-CWE-noinfo |
168,353 | CVE-2021-41345 | 7.8 | 7.2 | HIGH | Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26441, CVE-2021-40478, CVE-2021-40488, CVE-2021-40489. | CWE-269 |
168,354 | CVE-2021-41346 | 7.8 | 4.6 | HIGH | Console Window Host Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
168,355 | CVE-2021-41347 | 7.8 | 4.6 | HIGH | Windows AppX Deployment Service Elevation of Privilege Vulnerability | CWE-269 |
168,356 | CVE-2021-41348 | 8 | 5.2 | HIGH | Microsoft Exchange Server Elevation of Privilege Vulnerability | CWE-269 |
168,357 | CVE-2021-41349 | 6.5 | 4.3 | MEDIUM | Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42305. | NVD-CWE-noinfo |
168,358 | CVE-2021-41350 | 4.3 | 4.3 | MEDIUM | Microsoft Exchange Server Spoofing Vulnerability | NVD-CWE-noinfo |
168,359 | CVE-2021-41351 | 4.3 | 4.3 | MEDIUM | Microsoft Edge (Chrome based) Spoofing on IE Mode | NVD-CWE-noinfo |
168,360 | CVE-2021-41352 | 7.5 | 5 | HIGH | SCOM Information Disclosure Vulnerability | NVD-CWE-noinfo |
168,361 | CVE-2021-41353 | 3.5 | 3.5 | LOW | Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability | NVD-CWE-noinfo |
168,362 | CVE-2021-41354 | 5.4 | 3.5 | MEDIUM | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | CWE-79 |
168,363 | CVE-2021-41355 | 5.7 | 2.9 | MEDIUM | .NET Core and Visual Studio Information Disclosure Vulnerability | NVD-CWE-noinfo |
168,364 | CVE-2021-41356 | 7.5 | 5 | HIGH | Windows Denial of Service Vulnerability | NVD-CWE-noinfo |
168,365 | CVE-2021-41357 | 7.8 | 4.6 | HIGH | Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40449, CVE-2021-40450. | CWE-269 |
168,366 | CVE-2021-4136 | 7.8 | 6.8 | HIGH | vim is vulnerable to Heap-based Buffer Overflow | CWE-122 |
168,367 | CVE-2021-41360 | 7.8 | 6.8 | HIGH | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40452, CVE-2021-40453. | NVD-CWE-noinfo |
168,368 | CVE-2021-41361 | 3.5 | 3.5 | LOW | Active Directory Federation Server Spoofing Vulnerability | NVD-CWE-noinfo |
168,369 | CVE-2021-41363 | 6.7 | 4.4 | MEDIUM | Intune Management Extension Security Feature Bypass Vulnerability | NVD-CWE-noinfo |
168,370 | CVE-2021-41365 | 8.8 | 6.5 | HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889. | CWE-94 |
168,371 | CVE-2021-41366 | 7.8 | 4.6 | HIGH | Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability | CWE-269 |
168,372 | CVE-2021-41367 | 7.8 | 4.6 | HIGH | NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41370, CVE-2021-42283. | CWE-269 |
168,373 | CVE-2021-41368 | 7.8 | 6.8 | HIGH | Microsoft Access Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,374 | CVE-2021-41370 | 7.8 | 4.6 | HIGH | NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41367, CVE-2021-42283. | CWE-269 |
168,375 | CVE-2021-41371 | 4.4 | 2.1 | MEDIUM | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-38631. | NVD-CWE-noinfo |
168,376 | CVE-2021-41372 | 9.6 | 6.8 | CRITICAL | Power BI Report Server Spoofing Vulnerability | CWE-352 |
168,377 | CVE-2021-41372 | 9.6 | 6.8 | CRITICAL | Power BI Report Server Spoofing Vulnerability | CWE-79 |
168,378 | CVE-2021-41373 | 5.5 | 2.1 | MEDIUM | FSLogix Information Disclosure Vulnerability | NVD-CWE-noinfo |
168,379 | CVE-2021-41374 | 5.5 | 2.1 | MEDIUM | Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41375, CVE-2021-41376. | NVD-CWE-noinfo |
168,380 | CVE-2021-41375 | 4.4 | 2.1 | MEDIUM | Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41374, CVE-2021-41376. | NVD-CWE-noinfo |
168,381 | CVE-2021-41376 | 4.4 | 2.1 | MEDIUM | Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-41374, CVE-2021-41375. | NVD-CWE-noinfo |
168,382 | CVE-2021-41377 | 7.8 | 4.6 | HIGH | Windows Fast FAT File System Driver Elevation of Privilege Vulnerability | CWE-269 |
168,383 | CVE-2021-41378 | 8.8 | 6.5 | HIGH | Windows NTFS Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,384 | CVE-2021-41379 | 7.8 | 4.6 | HIGH | Windows Installer Elevation of Privilege Vulnerability | CWE-269 |
168,385 | CVE-2021-41380 | 6.5 | 4.3 | MEDIUM | ** DISPUTED ** RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. NOTE: It is asserted that this issue requires social engineering a user into connecting to a fake VNC Server. The VNC Viewer application they are using will then hang, until terminated, but no memory leak occurs - the resources are freed once the hung process is terminated and the resource usage is constant during the hang. Only the process that is connected to the fake Server is affected. This is an application bug, not a security issue. | CWE-20 |
168,386 | CVE-2021-41381 | 7.5 | 4.3 | HIGH | Payara Micro Community 5.2021.6 and below allows Directory Traversal. | CWE-22 |
168,387 | CVE-2021-41382 | 7.5 | 5 | HIGH | Plastic SCM before 10.0.16.5622 mishandles the WebAdmin server management interface. | NVD-CWE-noinfo |
168,388 | CVE-2021-41383 | 7.2 | 9 | HIGH | setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the ntp_server field. | CWE-77 |
168,389 | CVE-2021-41385 | 6.5 | 4 | MEDIUM | The third party intelligence connector in Securonix SNYPR 6.3.1 Build 184295_0302 allows an authenticated user to obtain access to server configuration details via SSRF. | CWE-918 |
168,390 | CVE-2021-41387 | 8.8 | 8.5 | HIGH | seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root. | CWE-269 |
168,391 | CVE-2021-4139 | null | null | null | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-79 |
168,392 | CVE-2021-41390 | 8 | 6 | HIGH | In Ericsson ECM before 18.0, it was observed that Security Provider Endpoint in the User Profile Management Section is vulnerable to CSV Injection. | CWE-74 |
168,393 | CVE-2021-41391 | 5.4 | 3.5 | MEDIUM | In Ericsson ECM before 18.0, it was observed that Security Management Endpoint in User Profile Management Section is vulnerable to stored XSS via a name, leading to session hijacking and full account takeover. | CWE-79 |
168,394 | CVE-2021-41392 | 9.8 | 7.5 | CRITICAL | static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API. | CWE-74 |
168,395 | CVE-2021-41393 | 9.8 | 7.5 | CRITICAL | Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations. | CWE-287 |
168,396 | CVE-2021-41394 | 5.3 | 5 | MEDIUM | Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations. | NVD-CWE-noinfo |
168,397 | CVE-2021-41395 | 6.5 | 6.4 | MEDIUM | Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username. | NVD-CWE-noinfo |
168,398 | CVE-2021-41426 | 8.8 | 6.8 | HIGH | Beeline Smart box 2.0.38 is vulnerable to Cross Site Request Forgery (CSRF) via mgt_end_user.htm. | CWE-352 |
168,399 | CVE-2021-41427 | 6.1 | 4.3 | MEDIUM | Beeline Smart Box 2.0.38 is vulnerable to Cross Site Scripting (XSS) via the choose_mac parameter to setup.cgi. | CWE-79 |
168,400 | CVE-2021-41435 | 9.8 | 10 | CRITICAL | A brute-force protection bypass in CAPTCHA protection in ASUS ROG Rapture GT-AX11000, RT-AX3000, RT-AX55, RT-AX56U, RT-AX56U_V2, RT-AX58U, RT-AX82U, RT-AX82U GUNDAM EDITION, RT-AX86 Series(RT-AX86U/RT-AX86S), RT-AX86U ZAKU II EDITION, RT-AX88U, RT-AX92U, TUF Gaming AX3000, TUF Gaming AX5400 (TUF-AX5400), ASUS ZenWiFi XD6, ASUS ZenWiFi AX (XT8) before 3.0.0.4.386.45898, and RT-AX68U before 3.0.0.4.386.45911, allows a remote attacker to attempt any number of login attempts via sending a specific HTTP request. | CWE-307 |
Subsets and Splits