ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
168,601 | CVE-2021-42050 | 6.1 | 4.3 | MEDIUM | An issue was discovered in AbanteCart before 1.3.2. It allows DOM Based XSS. | CWE-79 |
168,602 | CVE-2021-42051 | 5.4 | 3.5 | MEDIUM | An issue was discovered in AbanteCart before 1.3.2. Any low-privileged user with file-upload permissions can upload a malicious SVG document that contains an XSS payload. | CWE-79 |
168,603 | CVE-2021-42053 | 5.4 | 3.5 | MEDIUM | The Unicorn framework through 0.35.3 for Django allows XSS via component.name. | CWE-79 |
168,604 | CVE-2021-42054 | 7.5 | 5 | HIGH | ACCEL-PPP 1.12.0 has an out-of-bounds read in triton_context_schedule if the client exits after authentication. | CWE-125 |
168,605 | CVE-2021-42055 | 6.8 | 4.6 | MEDIUM | ASUSTek ZenBook Pro Due 15 UX582 laptop firmware through 203 has Insecure Permissions that allow attacks by a physically proximate attacker. | CWE-276 |
168,606 | CVE-2021-42057 | 7.8 | 9.3 | HIGH | Obsidian Dataview through 0.4.12-hotfix1 allows eval injection. The evalInContext function in executes user input, which allows an attacker to craft malicious Markdown files that will execute arbitrary code once opened. NOTE: 0.4.13 provides a mitigation for some use cases. | CWE-94 |
168,607 | CVE-2021-42061 | 5.4 | 3.5 | MEDIUM | SAP BusinessObjects Business Intelligence Platform (Web Intelligence) - version 420, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. This allows a low privileged attacker to retrieve some data from the victim but will never be able to modify the document and publish these modifications to the server. It impacts the "Quick Prompt" workflow. | CWE-79 |
168,608 | CVE-2021-42062 | 4.3 | 4 | MEDIUM | SAP ERP HCM Portugal does not perform necessary authorization checks for a report that reads the payroll data of employees in a certain area. Since the affected report only reads the payroll information, the attacker can neither modify any information nor cause availability impacts. | CWE-862 |
168,609 | CVE-2021-42063 | 6.1 | 4.3 | MEDIUM | A security vulnerability has been discovered in the SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50. The usage of one SAP KW component within a Web browser enables unauthorized attackers to conduct XSS attacks, which might lead to disclose sensitive data. | CWE-79 |
168,610 | CVE-2021-42064 | 9.8 | 6.8 | CRITICAL | If configured to use an Oracle database and if a query is created using the flexible search java api with a parameterized "in" clause, SAP Commerce - versions 1905, 2005, 2105, 2011, allows attacker to execute crafted database queries, exposing backend database. The vulnerability is present if the parameterized "in" clause accepts more than 1000 values. | CWE-89 |
168,611 | CVE-2021-42066 | 4.4 | 3.5 | MEDIUM | SAP Business One - version 10.0, allows an admin user to view DB password in plain text over the network, which should otherwise be encrypted. For an attacker to discover vulnerable function in-depth application knowledge is required, but once exploited the attacker may be able to completely compromise confidentiality, integrity, and availability of the application. | CWE-312 |
168,612 | CVE-2021-42068 | 3.3 | 4.3 | LOW | When a user opens a manipulated GIF (.gif) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. | CWE-20 |
168,613 | CVE-2021-42069 | 3.3 | 4.3 | LOW | When a user opens manipulated Tagged Image File Format (.tif) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application | CWE-20 |
168,614 | CVE-2021-42070 | 3.3 | 4.3 | LOW | When a user opens manipulated Jupiter Tessellation (.jt) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application | CWE-20 |
168,615 | CVE-2021-42071 | 9.8 | 10 | CRITICAL | In Visual Tools DVR VX16 4.2.28.0, an unauthenticated attacker can achieve remote command execution via shell metacharacters in the cgi-bin/slogin/login.py User-Agent HTTP header. | CWE-78 |
168,616 | CVE-2021-42072 | 8.8 | 6.5 | HIGH | An issue was discovered in Barrier before 2.4.0. The barriers component (aka the server-side implementation of Barrier) does not sufficiently verify the identify of connecting clients. Clients can thus exploit weaknesses in the provided protocol to cause denial-of-service or stage further attacks that could lead to information leaks or integrity corruption. | CWE-287 |
168,617 | CVE-2021-42073 | 8.2 | 5.8 | HIGH | An issue was discovered in Barrier before 2.4.0. An attacker can enter an active session state with the barriers component (aka the server-side implementation of Barrier) simply by supplying a client label that identifies a valid client configuration. This label is "Unnamed" by default but could instead be guessed from hostnames or other publicly available information. In the active session state, an attacker can capture input device events from the server, and also modify the clipboard content on the server. | CWE-384 |
168,618 | CVE-2021-42074 | 7.5 | 5 | HIGH | An issue was discovered in Barrier before 2.3.4. An unauthenticated attacker can cause a segmentation fault in the barriers component (aka the server-side implementation of Barrier) by quickly opening and closing TCP connections while sending a Hello message for each TCP session. | CWE-416 |
168,619 | CVE-2021-42075 | 7.5 | 5 | HIGH | An issue was discovered in Barrier before 2.3.4. The barriers component (aka the server-side implementation of Barrier) does not correctly close file descriptors for established TCP connections. An unauthenticated remote attacker can thus cause file descriptor exhaustion in the server process, leading to denial of service. | CWE-400 |
168,620 | CVE-2021-42076 | 7.5 | 5 | HIGH | An issue was discovered in Barrier before 2.3.4. An attacker can cause memory exhaustion in the barriers component (aka the server-side implementation of Barrier) and barrierc by sending long TCP messages. | CWE-787 |
168,621 | CVE-2021-42077 | 9.8 | 10 | CRITICAL | PHP Event Calendar before 2021-09-03 allows SQL injection, as demonstrated by the /server/ajax/user_manager.php username parameter. This can be used to execute SQL statements directly on the database, allowing an adversary in some cases to completely compromise the database system. It can also be used to bypass the login form. | CWE-89 |
168,622 | CVE-2021-42078 | 6.1 | 4.3 | MEDIUM | PHP Event Calendar through 2021-11-04 allows persistent cross-site scripting (XSS), as demonstrated by the /server/ajax/events_manager.php title parameter. This can be exploited by an adversary in multiple ways, e.g., to perform actions on the page in the context of other users, or to deface the site. | CWE-79 |
168,623 | CVE-2021-42084 | 6.5 | 4 | MEDIUM | An issue was discovered in Zammad before 4.1.1. An attacker with valid agent credentials may send a series of crafted requests that cause an endless loop and thus cause denial of service. | CWE-835 |
168,624 | CVE-2021-42085 | 5.4 | 3.5 | MEDIUM | An issue was discovered in Zammad before 4.1.1. There is stored XSS via a custom Avatar. | CWE-79 |
168,625 | CVE-2021-42086 | 8.8 | 6.5 | HIGH | An issue was discovered in Zammad before 4.1.1. An Agent account can modify account data, and gain admin access, via a crafted request. | CWE-269 |
168,626 | CVE-2021-42087 | 4.9 | 4 | MEDIUM | An issue was discovered in Zammad before 4.1.1. An admin can discover the application secret via the API. | CWE-668 |
168,627 | CVE-2021-42088 | 6.1 | 4.3 | MEDIUM | An issue was discovered in Zammad before 4.1.1. The Chat functionality allows XSS because clipboard data is mishandled. | CWE-79 |
168,628 | CVE-2021-42089 | 7.5 | 5 | HIGH | An issue was discovered in Zammad before 4.1.1. The REST API discloses sensitive information. | CWE-200 |
168,629 | CVE-2021-42090 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Zammad before 4.1.1. The Form functionality allows remote code execution because deserialization is mishandled. | CWE-502 |
168,630 | CVE-2021-42091 | 9.1 | 6.4 | CRITICAL | An issue was discovered in Zammad before 4.1.1. SSRF can occur via GitHub or GitLab integration. | CWE-918 |
168,631 | CVE-2021-42092 | 5.4 | 3.5 | MEDIUM | An issue was discovered in Zammad before 4.1.1. Stored XSS may occur via an Article during addition of an attachment to a Ticket. | CWE-79 |
168,632 | CVE-2021-42093 | 7.2 | 6.5 | HIGH | An issue was discovered in Zammad before 4.1.1. An admin can execute code on the server via a crafted request that manipulates triggers. | NVD-CWE-noinfo |
168,633 | CVE-2021-42094 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Zammad before 4.1.1. Command Injection can occur via custom Packages. | CWE-77 |
168,634 | CVE-2021-42095 | 7.5 | 5 | HIGH | Xshell before 7.0.0.76 allows attackers to cause a crash by triggering rapid changes to the title bar. | NVD-CWE-noinfo |
168,635 | CVE-2021-42096 | 4.3 | 4 | MEDIUM | GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A certain csrf_token value is derived from the admin password, and may be useful in conducting a brute-force attack against that password. | CWE-307 |
168,636 | CVE-2021-42097 | 8 | 8.5 | HIGH | GNU Mailman before 2.1.35 may allow remote Privilege Escalation. A csrf_token value is not specific to a single user account. An attacker can obtain a value within the context of an unprivileged user account, and then use that value in a CSRF attack against an admin (e.g., for account takeover). | CWE-352 |
168,637 | CVE-2021-42098 | 8.8 | 6.5 | HIGH | An incomplete permission check on entries in Devolutions Remote Desktop Manager before 2021.2.16 allows attackers to bypass permissions via batch custom PowerShell. | CWE-276 |
168,638 | CVE-2021-42099 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine M365 Manager Plus before 4421 is vulnerable to file-upload remote code execution. | CWE-434 |
168,639 | CVE-2021-42101 | 7.8 | 4.6 | HIGH | An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42103. | CWE-427 |
168,640 | CVE-2021-42102 | 7.8 | 4.6 | HIGH | An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service agents could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | CWE-427 |
168,641 | CVE-2021-42103 | 7.8 | 4.6 | HIGH | An uncontrolled search path element vulnerabilities in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar but not identical to CVE-2021-42101. | CWE-427 |
168,642 | CVE-2021-42104 | 7.8 | 4.6 | HIGH | Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42105, 42106 and 42107. | CWE-269 |
168,643 | CVE-2021-42105 | 7.8 | 4.6 | HIGH | Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42106 and 42107. | CWE-269 |
168,644 | CVE-2021-42106 | 7.8 | 4.6 | HIGH | Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42107. | CWE-269 |
168,645 | CVE-2021-42107 | 7.8 | 4.6 | HIGH | Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42106. | CWE-269 |
168,646 | CVE-2021-42108 | 7.8 | 4.6 | HIGH | Unnecessary privilege vulnerabilities in the Web Console of Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | CWE-269 |
168,647 | CVE-2021-42109 | 9.8 | 10 | CRITICAL | VITEC Exterity IPTV products through 2021-04-30 allow privilege escalation to root. | CWE-269 |
168,648 | CVE-2021-42110 | 7.8 | 6.2 | HIGH | An issue was discovered in Allegro Windows (formerly Popsy Windows) before 3.3.4156.1. A standard user can escalate privileges to SYSTEM if the FTP module is installed, because of DLL hijacking. | NVD-CWE-noinfo |
168,649 | CVE-2021-42111 | 5.5 | 2.1 | MEDIUM | An issue was discovered in the RCDevs OpenOTP app 1.4.13 and 1.4.14 for iOS. If it is installed on a jailbroken device, it is possible to retrieve the PIN code used to access the application. The IOS app version 1.4.1631262629 resolves this issue by storing a hash PIN code. | CWE-319 |
168,650 | CVE-2021-42112 | 6.1 | 4.3 | MEDIUM | The "File upload question" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js. | CWE-79 |
168,651 | CVE-2021-42114 | 8.3 | 7.9 | HIGH | Modern DRAM devices (PC-DDR4, LPDDR4X) are affected by a vulnerability in their internal Target Row Refresh (TRR) mitigation against Rowhammer attacks. Novel non-uniform Rowhammer access patterns, consisting of aggressors with different frequencies, phases, and amplitudes allow triggering bit flips on affected memory modules using our Blacksmith fuzzer. The patterns generated by Blacksmith were able to trigger bitflips on all 40 PC-DDR4 DRAM devices in our test pool, which cover the three major DRAM manufacturers: Samsung, SK Hynix, and Micron. This means that, even when chips advertised as Rowhammer-free are used, attackers may still be able to exploit Rowhammer. For example, this enables privilege-escalation attacks against the kernel or binaries such as the sudo binary, and also triggering bit flips in RSA-2048 keys (e.g., SSH keys) to gain cross-tenant virtual-machine access. We can confirm that DRAM devices acquired in July 2020 with DRAM chips from all three major DRAM vendors (Samsung, SK Hynix, Micron) are affected by this vulnerability. For more details, please refer to our publication. | NVD-CWE-Other |
168,652 | CVE-2021-42115 | 9.1 | 6.4 | CRITICAL | Missing HTTPOnly flag in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 allows an unauthenticated remote attacker to escalate privileges from unauthenticated to authenticated user via stealing and injecting the session- independent and static cookie UID. | CWE-732 |
168,653 | CVE-2021-42116 | 4.3 | 4 | MEDIUM | Incorrect Access Control in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 allows an authenticated remote attacker to view the Shape Editor and Settings, which are functionality for higher privileged users, via identifying said components in the front-end source code or other means. | CWE-668 |
168,654 | CVE-2021-42117 | 4.3 | 4 | MEDIUM | Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 allows an authenticated remote attacker with Object Modification privileges to insert arbitrary HTML without code execution. | CWE-74 |
168,655 | CVE-2021-42118 | 5.4 | 3.5 | MEDIUM | Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 via the Structure Component allows an authenticated remote attacker with Object Modification privileges to inject arbitrary HTML and JavaScript code in an object attribute, which is then rendered in the Structure Component, to alter the intended functionality and steal cookies, the latter allowing for account takeover. | CWE-79 |
168,656 | CVE-2021-42119 | 5.4 | 3.5 | MEDIUM | Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 via the Search Functionality allows authenticated users with Object Modification privileges to inject arbitrary HTML and JavaScript in object attributes, which is then rendered in the Search Functionality, to alter the intended functionality and steal cookies, the latter allowing for account takeover. | CWE-79 |
168,657 | CVE-2021-42120 | 6.5 | 4 | MEDIUM | Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on all object attributes allows an authenticated remote attacker with Object Modification privileges to insert arbitrarily long strings, eventually leading to exhaustion of the underlying resource. | CWE-400 |
168,658 | CVE-2021-42121 | 4.3 | 4 | MEDIUM | Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on an object’s date attribute(s) allows an authenticated remote attacker with Object Modification privileges to insert an unexpected format into date fields, which leads to breaking the object page that the date field is present. | CWE-20 |
168,659 | CVE-2021-42122 | 4.3 | 4 | MEDIUM | Insufficient Input Validation in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on an object’s attributes with numeric format allows an authenticated remote attacker with Object Modification privileges to insert an unexpected format, which makes the affected attribute non-editable. | CWE-20 |
168,660 | CVE-2021-42123 | 8.8 | 6.5 | HIGH | Unrestricted File Upload in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 in the File Upload Functions allows an authenticated remote attacker with Upload privileges to upload files with any file type, enabling client-side attacks. | CWE-434 |
168,661 | CVE-2021-42124 | 8.8 | 6.5 | HIGH | An improper access control vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform a session takeover. | CWE-863 |
168,662 | CVE-2021-42125 | 8.8 | 6.5 | HIGH | An unrestricted file upload vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to write dangerous files. | CWE-434 |
168,663 | CVE-2021-42126 | 8.8 | 6.5 | HIGH | An improper authorization control vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform privilege escalation. | CWE-863 |
168,664 | CVE-2021-42127 | 9.8 | 7.5 | CRITICAL | A deserialization of untrusted data vulnerability exists in Ivanti Avalanche before 6.3.3 using Inforail Service allows arbitrary code execution via Data Repository Service. | CWE-502 |
168,665 | CVE-2021-42128 | 9.8 | 7.5 | CRITICAL | An exposed dangerous function vulnerability exists in Ivanti Avalanche before 6.3.3 using inforail Service allows Privilege Escalation via Enterprise Server Service. | CWE-269 |
168,666 | CVE-2021-42129 | 8.8 | 6.5 | HIGH | A command injection vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform arbitrary command execution. | CWE-77 |
168,667 | CVE-2021-42130 | 8.8 | 6.5 | HIGH | A deserialization of untrusted data vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform arbitrary code execution. | CWE-502 |
168,668 | CVE-2021-42131 | 8.8 | 6.5 | HIGH | A SQL Injection vulnerability exists in Ivanti Avalance before 6.3.3 allows an attacker with access to the Inforail Service to perform privilege escalation. | CWE-89 |
168,669 | CVE-2021-42132 | 8.8 | 6.5 | HIGH | A command Injection vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform arbitrary command execution. | CWE-77 |
168,670 | CVE-2021-42133 | 8.1 | 5.5 | HIGH | An exposed dangerous function vulnerability exists in Ivanti Avalanche before 6.3.3 allows an attacker with access to the Inforail Service to perform an arbitrary file write. | CWE-829 |
168,671 | CVE-2021-42134 | 6.1 | 4.3 | MEDIUM | The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053. | CWE-79 |
168,672 | CVE-2021-42135 | 8.1 | 4.9 | HIGH | HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials. | CWE-863 |
168,673 | CVE-2021-42137 | 5.3 | 5 | MEDIUM | An issue was discovered in Zammad before 5.0.1. In some cases, there is improper enforcement of the privilege requirement for viewing a list of tickets that shows title, state, etc. | CWE-269 |
168,674 | CVE-2021-42139 | 9.8 | 6.8 | CRITICAL | Deno Standard Modules before 0.107.0 allows Code Injection via an untrusted YAML file in certain configurations. | CWE-94 |
168,675 | CVE-2021-42169 | 9.8 | 7.5 | CRITICAL | The Simple Payroll System with Dynamic Tax Bracket in PHP using SQLite Free Source Code (by: oretnom23 ) is vulnerable from remote SQL-Injection-Bypass-Authentication for the admin account. The parameter (username) from the login form is not protected correctly and there is no security and escaping from malicious payloads. | CWE-89 |
168,676 | CVE-2021-42216 | 9.8 | 7.5 | CRITICAL | A Broken or Risky Cryptographic Algorithm exists in AnonAddy 0.8.5 via VerificationController.php. | CWE-327 |
168,677 | CVE-2021-42220 | 5.4 | 3.5 | MEDIUM | A Cross Site Scripting (XSS) vulnerability exists in Dolibarr before 14.0.3 via the ticket creation flow. Exploitation requires that an admin copies the payload into a box. | CWE-79 |
168,678 | CVE-2021-42223 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS).vulnerability exists in Online DJ Booking Management System 1.0 in view-booking-detail.php. | CWE-79 |
168,679 | CVE-2021-42224 | 9.8 | 7.5 | CRITICAL | SQL Injection vulnerability exists in IFSC Code Finder Project 1.0 via the searchifsccode POST parameter in /search.php. | CWE-89 |
168,680 | CVE-2021-42227 | 6.1 | 4.3 | MEDIUM | Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed). | CWE-79 |
168,681 | CVE-2021-42228 | 8.8 | 6.8 | HIGH | A Cross Site Request Forgery (CSRF) vulnerability exists in KindEditor 4.1.x, as demonstrated by examples/uploadbutton.html. | CWE-352 |
168,682 | CVE-2021-42237 | 9.8 | 10 | CRITICAL | Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability. | CWE-502 |
168,683 | CVE-2021-42250 | 6.5 | 4 | MEDIUM | Improper output neutralization for Logs. A specific Apache Superset HTTP endpoint allowed for an authenticated user to forge log entries or inject malicious content into logs. | CWE-116 |
168,684 | CVE-2021-42252 | 7.8 | 4.6 | HIGH | An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes. | NVD-CWE-noinfo |
168,685 | CVE-2021-42254 | 7.8 | 7.2 | HIGH | BeyondTrust Privilege Management prior to version 21.6 creates a Temporary File in a Directory with Insecure Permissions. | CWE-668 |
168,686 | CVE-2021-42257 | 7.1 | 3.6 | HIGH | check_smart before 6.9.1 allows unintended drive access by an unprivileged user because it only checks for a substring match of a device path (the /dev/bus substring and a number), aka an unanchored regular expression. | CWE-20 |
168,687 | CVE-2021-42258 | 9.8 | 6.8 | CRITICAL | BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell. | CWE-89 |
168,688 | CVE-2021-42260 | 7.5 | 5 | HIGH | TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service. | CWE-835 |
168,689 | CVE-2021-42261 | 7.5 | 5 | HIGH | Revisor Video Management System (VMS) before 2.0.0 has a directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of restricted directory on the remote server. This could lead to the disclosure of sensitive data on the vulnerable server. | CWE-22 |
168,690 | CVE-2021-42266 | 7.8 | 9.3 | HIGH | Adobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious FLA file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-788 |
168,691 | CVE-2021-42267 | 7.8 | 9.3 | HIGH | Adobe Animate version 21.0.9 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious FLA file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-119 |
168,692 | CVE-2021-42268 | 5.5 | 4.3 | MEDIUM | Adobe Animate version 21.0.9 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted FLA file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-476 |
168,693 | CVE-2021-42269 | 7.8 | 9.3 | HIGH | Adobe Animate version 21.0.9 (and earlier) are affected by a use-after-free vulnerability in the processing of a malformed FLA file that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-416 |
168,694 | CVE-2021-42270 | 7.8 | 9.3 | HIGH | Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file. | CWE-787 |
168,695 | CVE-2021-42271 | 7.8 | 9.3 | HIGH | Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file. | CWE-787 |
168,696 | CVE-2021-42272 | 7.8 | 9.3 | HIGH | Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file. | CWE-787 |
168,697 | CVE-2021-42274 | 6.5 | 2.1 | MEDIUM | Windows Hyper-V Discrete Device Assignment (DDA) Denial of Service Vulnerability | NVD-CWE-noinfo |
168,698 | CVE-2021-42275 | 8.8 | 6.5 | HIGH | Microsoft COM for Windows Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,699 | CVE-2021-42276 | 7.8 | 6.8 | HIGH | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,700 | CVE-2021-42277 | 7.8 | 4.6 | HIGH | Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability | CWE-269 |
Subsets and Splits