ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
168,501 | CVE-2021-41729 | 9.1 | 6.4 | CRITICAL | BaiCloud-cms v2.5.7 is affected by an arbitrary file deletion vulnerability, which allows an attacker to delete arbitrary files on the server through /user/ppsave.php. | CWE-862 |
168,502 | CVE-2021-4173 | null | null | null | vim is vulnerable to Use After Free | CWE-416 |
168,503 | CVE-2021-41732 | 7.5 | 5 | HIGH | ** DISPUTED ** An issue was discovered in zeek version 4.1.0. There is a HTTP request splitting vulnerability that will invalidate any ZEEK HTTP based security analysis. NOTE: the vendor's position is that the observed behavior is intended. | CWE-444 |
168,504 | CVE-2021-41733 | 6.1 | 5.8 | MEDIUM | Oppia 3.1.4 does not verify that certain URLs are valid before navigating to them. | CWE-601 |
168,505 | CVE-2021-41744 | 9.8 | 7.5 | CRITICAL | All versions of yongyou PLM are affected by a command injection issue. UFIDA PLM (Product Life Cycle Management) is a strategic management method. It applies a series of enterprise application systems to support the entire process from conceptual design to the end of product life, and the collaborative creation, distribution, application and management of product information across organizations. Yonyou PLM uses jboss by default, and you can access the management control background without authorization An attacker can use this vulnerability to gain server permissions. | CWE-77 |
168,506 | CVE-2021-41745 | 9.8 | 7.5 | CRITICAL | ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions. | CWE-434 |
168,507 | CVE-2021-41746 | 7.5 | 5 | HIGH | SQL Injection vulnerability exists in all versions of Yonyou TurboCRM.via the orgcode parameter in changepswd.php. Attackers can use the vulnerabilities to obtain sensitive database information. | CWE-89 |
168,508 | CVE-2021-41747 | 6.1 | 4.3 | MEDIUM | Cross-Site Scripting (XSS) vulnerability exists in Csdn APP 4.10.0, which can be exploited by attackers to obtain sensitive information such as user cookies. | CWE-79 |
168,509 | CVE-2021-4175 | null | null | null | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-79 |
168,510 | CVE-2021-41753 | 7.5 | 7.8 | HIGH | A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in D-Link DIR-X1560, v1.04B04, and DIR-X6060, v1.11B04 allows a remote unauthenticated attacker to disconnect a wireless client via sending specific spoofed SAE authentication frames. | CWE-287 |
168,511 | CVE-2021-4176 | null | null | null | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-79 |
168,512 | CVE-2021-41764 | 8.8 | 6.8 | HIGH | A cross-site request forgery (CSRF) vulnerability exists in Streama up to and including v1.10.3. The application does not have CSRF checks in place when performing actions such as uploading local files. As a result, attackers could make a logged-in administrator upload arbitrary local files via a CSRF attack and send them to the attacker. | CWE-352 |
168,513 | CVE-2021-41765 | 9.8 | 7.5 | CRITICAL | A SQL injection issue in pages/edit_fields/9_ajax/add_keyword.php of ResourceSpace 9.5 and 9.6 < rev 18274 allows remote unauthenticated attackers to execute arbitrary SQL commands via the k parameter. This allows attackers to uncover the full contents of the ResourceSpace database, including user session cookies. An attacker who gets an admin user session cookie can use the session cookie to execute arbitrary code on the server. | CWE-89 |
168,514 | CVE-2021-4177 | null | null | null | livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information | CWE-209 |
168,515 | CVE-2021-41770 | 7.5 | 5 | HIGH | Ping Identity PingFederate before 10.3.1 mishandles pre-parsing validation, leading to an XXE attack that can achieve XML file disclosure. | CWE-611 |
168,516 | CVE-2021-41771 | 7.5 | 5 | HIGH | ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation. | CWE-119 |
168,517 | CVE-2021-41772 | 7.5 | 5 | HIGH | Go before 1.16.10 and 1.17.x before 1.17.3 allows an archive/zip Reader.Open panic via a crafted ZIP archive containing an invalid name or an empty filename field. | CWE-20 |
168,518 | CVE-2021-41773 | 7.5 | 4.3 | HIGH | A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013. | CWE-22 |
168,519 | CVE-2021-4179 | null | null | null | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | CWE-79 |
168,520 | CVE-2021-41790 | 8.8 | 6.5 | HIGH | An issue was discovered in Hyland org.alfresco:alfresco-content-services through 7.0.1.2. Script Action execution allows executing scripts uploaded outside of the Data Dictionary. This could allow a logged-in attacker to execute arbitrary code inside a sandboxed environment. | CWE-668 |
168,521 | CVE-2021-41791 | 5.4 | 3.5 | MEDIUM | An issue was discovered in Hyland org.alfresco:share through 7.0.0.2 and org.alfresco:community-share through 7.0. An evasion of the XSS filter for HTML input validation in the Alfresco Share User Interface leads to stored XSS that could be exploited by an attacker (given that he has privileges on the content collaboration features). | CWE-79 |
168,522 | CVE-2021-41792 | 5.3 | 5 | MEDIUM | An issue was discovered in Hyland org.alfresco:alfresco-content-services through 6.2.2.18 and org.alfresco:alfresco-transform-services through 1.3. A crafted HTML file, once uploaded, could trigger an unexpected request by the transformation engine. The response to the request is not available to the attacker, i.e., this is blind SSRF. | CWE-918 |
168,523 | CVE-2021-41794 | 7.5 | 5 | HIGH | ogs_fqdn_parse in Open5GS 1.0.0 through 2.3.3 inappropriately trusts a client-supplied length value, leading to a buffer overflow. The attacker can send a PFCP Session Establishment Request with "internet" as the PDI Network Instance. The first character is interpreted as a length value to be used in a memcpy call. The destination buffer is only 100 bytes long on the stack. Then, 'i' gets interpreted as 105 bytes to copy from the source buffer to the destination buffer. | CWE-120 |
168,524 | CVE-2021-41795 | 6.5 | 4.3 | MEDIUM | The Safari app extension bundled with 1Password for Mac 7.7.0 through 7.8.x before 7.8.7 is vulnerable to authorization bypass. By targeting a vulnerable component of this extension, a malicious web page could read a subset of 1Password vault items that would normally be fillable by the user on that web page. These items are usernames and passwords for vault items associated with its domain, usernames and passwords without a domain association, credit cards, and contact items. (1Password must be unlocked for these items to be accessible, but no further user interaction is required.) | CWE-863 |
168,525 | CVE-2021-41798 | 6.1 | 4.3 | MEDIUM | MediaWiki before 1.36.2 allows XSS. Month related MediaWiki messages are not escaped before being used on the Special:Search results page. | CWE-79 |
168,526 | CVE-2021-41799 | 7.5 | 5 | HIGH | MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). ApiQueryBacklinks (action=query&list=backlinks) can cause a full table scan. | CWE-770 |
168,527 | CVE-2021-41800 | 5.3 | 5 | MEDIUM | MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). Visiting Special:Contributions can sometimes result in a long running SQL query because PoolCounter protection is mishandled. | CWE-770 |
168,528 | CVE-2021-41801 | 8.8 | 6.5 | HIGH | The ReplaceText extension through 1.41 for MediaWiki has Incorrect Access Control. When a user is blocked after submitting a replace job, the job is still run, even if it may be run at a later time (due to the job queue backlog) | CWE-863 |
168,529 | CVE-2021-41802 | 5.4 | 5.5 | MEDIUM | HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other user’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4. | CWE-732 |
168,530 | CVE-2021-41805 | 8.8 | 6.5 | HIGH | HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a different namespace. | CWE-863 |
168,531 | CVE-2021-41821 | 6.5 | 4 | MEDIUM | Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Integer Underflow vulnerability that might lead to denial of service. A crafted message must be sent from an authenticated agent to the manager. | CWE-191 |
168,532 | CVE-2021-41824 | 8.8 | 6.8 | HIGH | Craft CMS before 3.7.14 allows CSV injection. | CWE-1236 |
168,533 | CVE-2021-41825 | 5.3 | 5 | MEDIUM | Verint Workforce Optimization (WFO) 15.2.5.1033 allows HTML injection via the /wfo/control/signin username parameter. | CWE-74 |
168,534 | CVE-2021-41826 | 6.1 | 5.8 | MEDIUM | PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect. | CWE-601 |
168,535 | CVE-2021-41827 | 7.5 | 5 | HIGH | Zoho ManageEngine Remote Access Plus before 10.1.2121.1 has hardcoded credentials for read-only access. The credentials are in the source code that corresponds to the DCBackupRestore JAR archive. | CWE-798 |
168,536 | CVE-2021-41828 | 7.5 | 5 | HIGH | Zoho ManageEngine Remote Access Plus before 10.1.2121.1 has hardcoded credentials associated with resetPWD.xml. | CWE-798 |
168,537 | CVE-2021-41829 | 7.5 | 5 | HIGH | Zoho ManageEngine Remote Access Plus before 10.1.2121.1 relies on the application's build number to calculate a certain encryption key. | CWE-326 |
168,538 | CVE-2021-41830 | 7.5 | 5 | HIGH | It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25633 for the LibreOffice advisory. | CWE-347 |
168,539 | CVE-2021-41831 | 5.3 | 5 | MEDIUM | It is possible for an attacker to manipulate the timestamp of signed documents. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25634 for the LibreOffice advisory. | CWE-347 |
168,540 | CVE-2021-41832 | 7.5 | 5 | HIGH | It is possible for an attacker to manipulate documents to appear to be signed by a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25635 for the LibreOffice advisory. | CWE-347 |
168,541 | CVE-2021-41833 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine Patch Connect Plus before 90099 is vulnerable to unauthenticated remote code execution. | CWE-434 |
168,542 | CVE-2021-41836 | 4.8 | 3.5 | MEDIUM | The Fathom Analytics WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the $site_id parameter found in the ~/fathom-analytics.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 3.0.4. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | CWE-79 |
168,543 | CVE-2021-41843 | 6.5 | 6.8 | MEDIUM | An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI. | CWE-89 |
168,544 | CVE-2021-41844 | 9.8 | 7.5 | CRITICAL | Crocoblock JetEngine before 2.9.1 does not properly validate and sanitize form data. | CWE-20 |
168,545 | CVE-2021-41845 | 6.5 | 4 | MEDIUM | A SQL injection issue was discovered in ThycoticCentrify Secret Server before 11.0.000007. The only affected versions are 10.9.000032 through 11.0.000006. | CWE-89 |
168,546 | CVE-2021-41847 | 8.8 | 6.5 | HIGH | An issue was discovered in 3xLogic Infinias Access Control through 6.7.10708.0, affecting physical security. Users with login credentials assigned to a specific zone can send modified HTTP GET and POST requests, allowing them to view user data such as personal information and Prox card credentials. Also, an authorized user of one zone can send API requests to unlock electronic locks associated with zones they are unauthorized to have access to. They can also create new user logins for zones they were not authorized to access, including the root zone of the software. | CWE-668 |
168,547 | CVE-2021-41861 | 3.3 | 2.1 | LOW | The Telegram application 7.5.0 through 7.8.0 for Android does not properly implement image self-destruction, a different vulnerability than CVE-2019-16248. After approximately two to four uses of the self-destruct feature, there is a misleading UI indication that an image was deleted (on both the sender and recipient sides). The images are still present in the /Storage/Emulated/0/Telegram/Telegram Image/ directory. | NVD-CWE-noinfo |
168,548 | CVE-2021-41862 | 9.8 | 7.5 | CRITICAL | AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL). | CWE-74 |
168,549 | CVE-2021-41864 | 7.8 | 4.6 | HIGH | prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel through 5.14.9 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write. | CWE-190 |
168,550 | CVE-2021-41865 | 6.5 | 4 | MEDIUM | HashiCorp Nomad and Nomad Enterprise 1.1.1 through 1.1.5 allowed authenticated users with job submission capabilities to cause denial of service by submitting incomplete job specifications with a Consul mesh gateway and host networking mode. Fixed in 1.1.6. | NVD-CWE-noinfo |
168,551 | CVE-2021-41866 | 5.4 | 3.5 | MEDIUM | MyBB before 1.8.28 allows stored XSS because the displayed Template Name value in the Admin CP's theme management is not escaped properly. | CWE-79 |
168,552 | CVE-2021-41867 | 5.3 | 5 | MEDIUM | An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature. | NVD-CWE-noinfo |
168,553 | CVE-2021-41868 | 9.8 | 7.5 | CRITICAL | OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality. | NVD-CWE-noinfo |
168,554 | CVE-2021-41869 | 8.8 | 6.5 | HIGH | SuiteCRM 7.10.x before 7.10.33 and 7.11.x before 7.11.22 is vulnerable to privilege escalation. | CWE-269 |
168,555 | CVE-2021-4187 | null | null | null | vim is vulnerable to Use After Free | CWE-416 |
168,556 | CVE-2021-41870 | 8.8 | 6.5 | HIGH | An issue was discovered in the firmware update form in Socomec REMOTE VIEW PRO 2.0.41.4. An authenticated attacker can bypass a client-side file-type check and upload arbitrary .php files. | CWE-434 |
168,557 | CVE-2021-41871 | 5.4 | 3.5 | MEDIUM | An issue was discovered in Socomec REMOTE VIEW PRO 2.0.41.4. Improper validation of input into the username field makes it possible to place a stored XSS payload. This is executed if an administrator views the System Event Log. | CWE-79 |
168,558 | CVE-2021-41872 | 7.5 | 5 | HIGH | Skyworth Digital Technology Penguin Aurora Box 41502 has a denial of service vulnerability, which can be exploited by attackers to cause a denial of service. | NVD-CWE-noinfo |
168,559 | CVE-2021-41873 | 10 | 6.4 | CRITICAL | Penguin Aurora TV Box 41502 is a high-end network HD set-top box produced by Tencent Video and Skyworth Digital. An unauthorized access vulnerability exists in the Penguin Aurora Box. An attacker can use the vulnerability to gain unauthorized access to a specific link to remotely control the TV. | CWE-863 |
168,560 | CVE-2021-41874 | 7.5 | 5 | HIGH | An unauthorized access vulnerabiitly exists in all versions of Portainer, which could let a malicious user obtain sensitive information. | CWE-863 |
168,561 | CVE-2021-41878 | 6.1 | 4.3 | MEDIUM | A reflected cross-site scripting (XSS) vulnerability exists in the i-Panel Administration System Version 2.0 that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console and it is possible to insert a vulnerable malicious button. | CWE-79 |
168,562 | CVE-2021-4188 | null | null | null | mruby is vulnerable to NULL Pointer Dereference | CWE-476 |
168,563 | CVE-2021-41916 | 8.8 | 6.8 | HIGH | A Cross-Site Request Forgery (CSRF) vulnerability in webTareas version 2.4 and earlier allows a remote attacker to create a new administrative profile and add a new user to the new profile. without the victim's knowledge, by enticing an authenticated admin user to visit an attacker's web page. | CWE-352 |
168,564 | CVE-2021-41917 | 5.4 | 3.5 | MEDIUM | webTareas version 2.4 and earlier allows an authenticated user to store arbitrary web script or HTML by creating or editing a client name in the clients section, due to incorrect sanitization of user-supplied data and achieve a Stored Cross-Site Scripting attack against the platform users and administrators. The affected endpoint is /clients/editclient.php, on the HTTP POST cn parameter. | CWE-79 |
168,565 | CVE-2021-41918 | 5.4 | 3.5 | MEDIUM | webTareas version 2.4 and earlier allows an authenticated user to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and achieve a Reflected Cross-Site Scripting attack against the platform users and administrators. The issue affects every endpoint on the application because it is related on how each URL is echoed back on every response page. | CWE-79 |
168,566 | CVE-2021-41919 | 8.8 | 6.5 | HIGH | webTareas version 2.4 and earlier allows an authenticated user to arbitrarily upload potentially dangerous files without restrictions. This is working by adding or replacing a personal profile picture. The affected endpoint is /includes/upload.php on the HTTP POST data. This allows an attacker to exploit the platform by injecting code or malware and, under certain conditions, to execute code on remote user browsers. | CWE-434 |
168,567 | CVE-2021-41920 | 7.5 | 5 | HIGH | webTareas version 2.4 and earlier allows an unauthenticated user to perform Time and Boolean-based blind SQL Injection on the endpoint /includes/library.php, via the sor_cible, sor_champs, and sor_ordre HTTP POST parameters. This allows an attacker to access all the data in the database and obtain access to the webTareas application. | CWE-89 |
168,568 | CVE-2021-41931 | 9.8 | 7.5 | CRITICAL | The Company's Recruitment Management System in id=2 of the parameter from view_vacancy app on-page appears to be vulnerable to SQL injection. The payloads 19424269' or '1309'='1309 and 39476597' or '2917'='2923 were each submitted in the id parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way. | CWE-89 |
168,569 | CVE-2021-41947 | 7.2 | 6.5 | HIGH | A SQL injection vulnerability exists in Subrion CMS v4.2.1 in the visual-mode. | CWE-89 |
168,570 | CVE-2021-41950 | 9.1 | 6.4 | CRITICAL | A directory traversal issue in ResourceSpace 9.6 before 9.6 rev 18277 allows remote unauthenticated attackers to delete arbitrary files on the ResourceSpace server via the provider and variant parameters in pages/ajax/tiles.php. Attackers can delete configuration or source code files, causing the application to become unavailable to all users. | CWE-22 |
168,571 | CVE-2021-41951 | 6.1 | 4.3 | MEDIUM | ResourceSpace before 9.6 rev 18290 is affected by a reflected Cross-Site Scripting vulnerability in plugins/wordpress_sso/pages/index.php via the wordpress_user parameter. If an attacker is able to persuade a victim to visit a crafted URL, malicious JavaScript content may be executed within the context of the victim's browser. | CWE-79 |
168,572 | CVE-2021-41962 | 4.8 | 3.5 | MEDIUM | Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Owner fullname parameter in a Send Service Request in vehicle_service. | CWE-79 |
168,573 | CVE-2021-41971 | 8.8 | 6 | HIGH | Apache Superset up to and including 1.3.0 when configured with ENABLE_TEMPLATE_PROCESSING on (disabled by default) allowed SQL injection when a malicious authenticated user sends an http request with a custom URL. | CWE-89 |
168,574 | CVE-2021-41972 | 6.5 | 4 | MEDIUM | Apache Superset up to and including 1.3.1 allowed for database connections password leak for authenticated users. This information could be accessed in a non-trivial way. | CWE-522 |
168,575 | CVE-2021-41973 | 6.5 | 4.3 | MEDIUM | In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater. | CWE-835 |
168,576 | CVE-2021-41974 | 9.1 | 6.4 | CRITICAL | Tad Book3 editing book page does not perform identity verification. Remote attackers can use the vulnerability to view and modify arbitrary content of books without permission. | CWE-732 |
168,577 | CVE-2021-41975 | 9.1 | 6.4 | CRITICAL | TadTools special page is vulnerable to authorization bypass, thus remote attackers can use the specific parameter to delete arbitrary files in the system without logging in. | CWE-863 |
168,578 | CVE-2021-41976 | 5.3 | 5 | MEDIUM | Tad Uploader edit book list function is vulnerable to authorization bypass, thus remote attackers can use the function to amend the folder names in the book list without logging in. | CWE-863 |
168,579 | CVE-2021-41990 | 7.5 | 5 | HIGH | The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur. | CWE-190 |
168,580 | CVE-2021-41991 | 7.5 | 5 | HIGH | The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility. | CWE-190 |
168,581 | CVE-2021-42002 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine ADManager Plus before 7115 is vulnerable to a filter bypass that leads to file-upload remote code execution. | CWE-863 |
168,582 | CVE-2021-42006 | 8.8 | 6.8 | HIGH | An out-of-bounds access in GffLine::GffLine in gff.cpp in GCLib 0.12.7 allows an attacker to cause a segmentation fault or possibly have unspecified other impact via a crafted GFF file. | CWE-125 |
168,583 | CVE-2021-42008 | 7.8 | 6.9 | HIGH | The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access. | CWE-787 |
168,584 | CVE-2021-42009 | 4.3 | 4 | MEDIUM | An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3. | CWE-20 |
168,585 | CVE-2021-42011 | 7.8 | 4.6 | HIGH | An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | CWE-276 |
168,586 | CVE-2021-42012 | 7.8 | 4.6 | HIGH | A stack-based buffer overflow vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | CWE-787 |
168,587 | CVE-2021-42013 | 9.8 | 7.5 | CRITICAL | It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions. | CWE-22 |
168,588 | CVE-2021-42015 | 5.5 | 1.9 | MEDIUM | A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.26), Mendix Applications using Mendix 8 (All versions < V8.18.12), Mendix Applications using Mendix 9 (All versions < V9.6.1). Applications built with affected versions of Mendix Studio Pro do not prevent file documents from being cached when files are opened or downloaded using a browser. This could allow a local attacker to read those documents by exploring the browser cache. | CWE-525 |
168,589 | CVE-2021-42021 | 7.5 | 5 | HIGH | A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application’s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks. | CWE-26 |
168,590 | CVE-2021-42022 | 6.5 | 3.5 | MEDIUM | A vulnerability has been identified in SIMATIC eaSie PCS 7 Skill Package (All versions < V21.00 SP3). When downloading files, the affected systems do not properly neutralize special elements within the pathname. An attacker could then cause the pathname to resolve to a location outside of the restricted directory on the server and read unexpected critical files. The affected file download function is disabled by default. | CWE-22 |
168,591 | CVE-2021-42023 | 6.5 | 2.1 | MEDIUM | A vulnerability has been identified in ModelSim Simulation (All versions), Questa Simulation (All versions). The RSA white-box implementation in affected applications insufficiently protects the built-in private keys that are required to decrypt electronic intellectual property (IP) data in accordance with the IEEE 1735 recommended practice. This could allow a sophisticated attacker to discover the keys, bypassing the protection intended by the IEEE 1735 recommended practice. | CWE-522 |
168,592 | CVE-2021-42024 | 7.8 | 6.8 | HIGH | A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions < 2021.3.1). The starview+.exe application lacks proper validation of user-supplied data when parsing scene files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. | CWE-787 |
168,593 | CVE-2021-42025 | 6.5 | 6.8 | MEDIUM | A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control write access for certain client actions. This could allow authenticated attackers to manipulate the content of System.FileDocument objects in some cases, regardless whether they have write access to it. | CWE-863 |
168,594 | CVE-2021-42026 | 4.3 | 4 | MEDIUM | A vulnerability has been identified in Mendix Applications using Mendix 8 (All versions < V8.18.13), Mendix Applications using Mendix 9 (All versions < V9.6.2). Applications built with affected versions of Mendix Studio Pro do not properly control read access for certain client actions. This could allow authenticated attackers to retrieve the changedDate attribute of arbitrary objects, even when they don't have read access to them. | CWE-863 |
168,595 | CVE-2021-42027 | 7.4 | 5.8 | HIGH | A vulnerability has been identified in SINUMERIK Edge (All versions < V3.2). The affected software does not properly validate the server certificate when initiating a TLS connection. This could allow an attacker to spoof a trusted entity by interfering in the communication path between the client and the intended server. | CWE-295 |
168,596 | CVE-2021-42040 | 7.5 | 5 | HIGH | An issue was discovered in MediaWiki through 1.36.2. A parser function related to loop control allowed for an infinite loop (and php-fpm hang) within the Loops extension because egLoopsCountLimit is mishandled. This could lead to memory exhaustion. | CWE-835 |
168,597 | CVE-2021-42041 | 6.1 | 4.3 | MEDIUM | An issue was discovered in CentralAuth in MediaWiki through 1.36.2. The rightsnone MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the setchange log. | CWE-79 |
168,598 | CVE-2021-42042 | 4.8 | 3.5 | MEDIUM | An issue was discovered in SpecialEditGrowthConfig in the GrowthExperiments extension in MediaWiki through 1.36.2. The growthexperiments-edit-config-error-invalid-title MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript. | CWE-79 |
168,599 | CVE-2021-42043 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Special:MediaSearch in the MediaSearch extension in MediaWiki through 1.36.2. The suggestion text (a parameter to mediasearch-did-you-mean) was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the intitle: search operator within the query. | CWE-79 |
168,600 | CVE-2021-42044 | 4.8 | 3.5 | MEDIUM | An issue was discovered in the Mentor dashboard in the GrowthExperiments extension in MediaWiki through 1.36.2. The Growthexperiments-mentor-dashboard-mentee-overview-add-filter-total-edits-headline, growthexperiments-mentor-dashboard-mentee-overview-add-filter-starred-headline, growthexperiments-mentor-dashboard-mentee-overview-info-text, growthexperiments-mentor-dashboard-mentee-overview-info-legend-headline, and growthexperiments-mentor-dashboard-mentee-overview-active-ago MediaWiki messages were not being properly sanitized and allowed for the injection and execution of HTML and JavaScript. | CWE-79 |
Subsets and Splits