ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
168,701
CVE-2021-42278
8.8
6.5
HIGH
Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291.
CWE-269
168,702
CVE-2021-42279
7.5
5.1
HIGH
Chakra Scripting Engine Memory Corruption Vulnerability
CWE-787
168,703
CVE-2021-42280
7.8
4.6
HIGH
Windows Feedback Hub Elevation of Privilege Vulnerability
CWE-269
168,704
CVE-2021-42282
8.8
6.5
HIGH
Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42287, CVE-2021-42291.
CWE-269
168,705
CVE-2021-42283
7.8
4.6
HIGH
NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41367, CVE-2021-41370.
CWE-269
168,706
CVE-2021-42284
7.5
7.1
HIGH
Windows Hyper-V Denial of Service Vulnerability
CWE-400
168,707
CVE-2021-42285
7.8
7.2
HIGH
Windows Kernel Elevation of Privilege Vulnerability
CWE-269
168,708
CVE-2021-42286
7.8
4.6
HIGH
Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
CWE-269
168,709
CVE-2021-42287
8.8
6.5
HIGH
Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291.
CWE-269
168,710
CVE-2021-42288
6.1
3.6
MEDIUM
Windows Hello Security Feature Bypass Vulnerability
CWE-863
168,711
CVE-2021-42291
8.8
6.5
HIGH
Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42287.
CWE-269
168,712
CVE-2021-42292
7.8
6.8
HIGH
Microsoft Excel Security Feature Bypass Vulnerability
CWE-863
168,713
CVE-2021-42293
7.5
5
HIGH
Microsoft Jet Red Database Engine and Access Connectivity Engine Elevation of Privilege Vulnerability
CWE-269
168,714
CVE-2021-42294
7.2
6.5
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42309.
CWE-94
168,715
CVE-2021-42295
5.5
1.9
MEDIUM
Visual Basic for Applications Information Disclosure Vulnerability
CWE-668
168,716
CVE-2021-42296
7.8
6.9
HIGH
Microsoft Word Remote Code Execution Vulnerability
CWE-94
168,717
CVE-2021-42297
7.8
6.9
HIGH
Windows 10 Update Assistant Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-43211.
CWE-59
168,718
CVE-2021-42298
7.8
9.3
HIGH
Microsoft Defender Remote Code Execution Vulnerability
CWE-94
168,719
CVE-2021-42299
6.1
3.6
MEDIUM
Microsoft Surface Pro 3 Security Feature Bypass Vulnerability
CWE-863
168,720
CVE-2021-42300
6.7
4.6
MEDIUM
Azure Sphere Tampering Vulnerability
NVD-CWE-noinfo
168,721
CVE-2021-42301
4.6
2.1
MEDIUM
Azure RTOS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26444, CVE-2021-42323.
CWE-668
168,722
CVE-2021-42302
6.8
7.2
MEDIUM
Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42303, CVE-2021-42304.
CWE-269
168,723
CVE-2021-42303
6.8
7.2
MEDIUM
Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42302, CVE-2021-42304.
CWE-269
168,724
CVE-2021-42304
6.8
7.2
MEDIUM
Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42302, CVE-2021-42303.
CWE-269
168,725
CVE-2021-42305
6.5
4.3
MEDIUM
Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-41349.
NVD-CWE-noinfo
168,726
CVE-2021-42306
6.5
4
MEDIUM
Azure Active Directory Information Disclosure Vulnerability
CWE-668
168,727
CVE-2021-42308
7.5
5
HIGH
Microsoft Edge (Chromium-based) Spoofing Vulnerability
CWE-290
168,728
CVE-2021-42309
8.8
6.5
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42294.
CWE-94
168,729
CVE-2021-42310
9.8
7.5
CRITICAL
Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889.
CWE-94
168,730
CVE-2021-42311
9.8
10
CRITICAL
Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889.
CWE-94
168,731
CVE-2021-42312
7.8
4.6
HIGH
Microsoft Defender for IOT Elevation of Privilege Vulnerability
CWE-269
168,732
CVE-2021-42313
9.8
10
CRITICAL
Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889.
CWE-89
168,733
CVE-2021-42314
8.8
6.5
HIGH
Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889.
CWE-94
168,734
CVE-2021-42315
8.8
6.5
HIGH
Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-43882, CVE-2021-43889.
CWE-94
168,735
CVE-2021-42316
8.8
6.5
HIGH
Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability
NVD-CWE-noinfo
168,736
CVE-2021-42319
5.5
2.1
MEDIUM
Visual Studio Elevation of Privilege Vulnerability
CWE-269
168,737
CVE-2021-42320
3.5
3.5
LOW
Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-43242.
CWE-290
168,738
CVE-2021-42321
8.8
6.5
HIGH
Microsoft Exchange Server Remote Code Execution Vulnerability
NVD-CWE-noinfo
168,739
CVE-2021-42322
7.8
4.6
HIGH
Visual Studio Code Elevation of Privilege Vulnerability
CWE-269
168,740
CVE-2021-42323
3.3
2.1
LOW
Azure RTOS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26444, CVE-2021-42301.
CWE-668
168,741
CVE-2021-42325
9.8
7.5
CRITICAL
Froxlor through 0.10.29.1 allows SQL injection in Database/Manager/DbManagerMySQL.php via a custom DB name.
CWE-89
168,742
CVE-2021-42326
5.3
5
MEDIUM
Redmine before 4.1.5 and 4.2.x before 4.2.3 may disclose the names of users on activity views due to an insufficient access filter.
CWE-200
168,743
CVE-2021-42327
6.7
4.6
MEDIUM
dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
CWE-787
168,744
CVE-2021-42329
5.4
3.5
MEDIUM
The “List_Add” function of message board of ShinHer StudyOnline System does not filter special characters in the title parameter. After logging in with user’s privilege, remote attackers can inject JavaScript and execute stored XSS attacks.
CWE-79
168,745
CVE-2021-42330
8.1
5.5
HIGH
The “Teacher Edit” function of ShinHer StudyOnline System does not perform authority control. After logging in with user’s privilege, remote attackers can access and edit other users’ credential and personal information by crafting URL parameters.
CWE-285
168,746
CVE-2021-42331
5.4
5.5
MEDIUM
The “Study Edit” function of ShinHer StudyOnline System does not perform permission control. After logging in with user’s privilege, remote attackers can access and edit other users’ tutorial schedule by crafting URL parameters.
CWE-285
168,747
CVE-2021-42332
4.3
4
MEDIUM
The “List View” function of ShinHer StudyOnline System is not under authority control. After logging in with user’s privilege, remote attackers can access the content of other users’ message boards by crafting URL parameters.
CWE-285
168,748
CVE-2021-42333
8.8
6.5
HIGH
The Easytest contains SQL injection vulnerabilities. After obtaining user’s privilege, remote attackers can inject SQL commands into the parameters of the learning history page to access all database and obtain administrator permissions.
CWE-89
168,749
CVE-2021-42334
8.8
6.5
HIGH
The Easytest contains SQL injection vulnerabilities. After obtaining a user’s privilege, remote attackers can inject SQL commands into the parameters of the elective course management page to obtain all database and administrator permissions.
CWE-89
168,750
CVE-2021-42334
8.8
6.5
HIGH
The Easytest contains SQL injection vulnerabilities. After obtaining a user’s privilege, remote attackers can inject SQL commands into the parameters of the elective course management page to obtain all database and administrator permissions.
CWE-89
168,751
CVE-2021-42335
5.4
3.5
MEDIUM
Easytest bulletin board management function of online learning platform does not filter special characters. After obtaining a user’s privilege, remote attackers can inject JavaScript and execute stored XSS attack.
CWE-79
168,752
CVE-2021-42336
4.3
4
MEDIUM
The learning history page of the Easytest is vulnerable by permission bypass. After obtaining a user’s permission, remote attackers can access other users’ and administrator’s account information except password by crafting URL parameters.
CWE-285
168,753
CVE-2021-42337
4.3
4
MEDIUM
The permission control of AIFU cashier management salary query function can be bypassed, thus after obtaining general user’s permission, the remote attacker can access account information except passwords by crafting URL parameters.
CWE-285
168,754
CVE-2021-42338
9.8
10
CRITICAL
4MOSAn GCB Doctor’s login page has improper validation of Cookie, which allows an unauthenticated remote attacker to bypass authentication by code injection in cookie, and arbitrarily manipulate the system or interrupt services by upload and execution of arbitrary files.
CWE-287
168,755
CVE-2021-42338
9.8
10
CRITICAL
4MOSAn GCB Doctor’s login page has improper validation of Cookie, which allows an unauthenticated remote attacker to bypass authentication by code injection in cookie, and arbitrarily manipulate the system or interrupt services by upload and execution of arbitrary files.
CWE-285
168,756
CVE-2021-42340
7.5
5
HIGH
The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
CWE-772
168,757
CVE-2021-42341
7.5
5
HIGH
checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development.
NVD-CWE-Other
168,758
CVE-2021-42342
9.8
7.5
CRITICAL
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
CWE-434
168,759
CVE-2021-42343
9.8
6.8
CRITICAL
An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
CWE-668
168,760
CVE-2021-42358
8.8
6.8
HIGH
The Contact Form With Captcha WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation in the ~/cfwc-form.php file during contact form submission, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.6.2.
CWE-352
168,761
CVE-2021-42359
9.1
6.4
CRITICAL
WP DSGVO Tools (GDPR) <= 3.1.23 had an AJAX action, ‘admin-dismiss-unsubscribe‘, which lacked a capability check and a nonce check and was available to unauthenticated users, and did not check the post type when deleting unsubscription requests. As such, it was possible for an attacker to permanently delete an arbitrary post or page on the site by sending an AJAX request with the “action” parameter set to “admin-dismiss-unsubscribe” and the “id” parameter set to the post to be deleted. Sending such a request would move the post to the trash, and repeating the request would permanently delete the post in question.
CWE-862
168,762
CVE-2021-42360
5.4
3.5
MEDIUM
On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page.
CWE-79
168,763
CVE-2021-42360
5.4
3.5
MEDIUM
On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page.
CWE-284
168,764
CVE-2021-42360
5.4
3.5
MEDIUM
On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page.
CWE-99
168,765
CVE-2021-42361
4.8
2.1
MEDIUM
The Contact Form Email WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the name parameter found in the ~/trunk/cp-admin-int-list.inc.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.3.24. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
CWE-79
168,766
CVE-2021-42362
8.8
6.5
HIGH
The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2.
CWE-434
168,767
CVE-2021-42363
6.1
4.3
MEDIUM
The Preview E-Mails for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the search_order parameter found in the ~/views/form.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.6.8.
CWE-79
168,768
CVE-2021-42364
8.8
6.8
HIGH
The Stetic WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the stats_page function found in the ~/stetic.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.0.6.
CWE-352
168,769
CVE-2021-42365
4.8
2.1
MEDIUM
The Asgaros Forums WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the name parameter found in the ~/admin/tables/admin-structure-table.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.13. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
CWE-79
168,770
CVE-2021-42367
5.4
3.5
MEDIUM
The Variation Swatches for WooCommerce WordPress plugin is vulnerable to Stored Cross-Site Scripting via several parameters found in the ~/includes/class-menu-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.1. Due to missing authorization checks on the tawcvs_save_settings function, low-level authenticated users such as subscribers can exploit this vulnerability.
CWE-79
168,771
CVE-2021-42367
5.4
3.5
MEDIUM
The Variation Swatches for WooCommerce WordPress plugin is vulnerable to Stored Cross-Site Scripting via several parameters found in the ~/includes/class-menu-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.1. Due to missing authorization checks on the tawcvs_save_settings function, low-level authenticated users such as subscribers can exploit this vulnerability.
CWE-862
168,772
CVE-2021-42369
8.8
6.5
HIGH
Imagicle Application Suite (for Cisco UC) before 2021.Summer.2 allows SQL injection. A low-privileged user could inject a SQL statement through the "Export to CSV" feature of the Contact Manager web GUI.
CWE-89
168,773
CVE-2021-42370
7.5
4.3
HIGH
A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.)
CWE-312
168,774
CVE-2021-42371
9.8
7.5
CRITICAL
lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30.
CWE-922
168,775
CVE-2021-42372
8.8
9
HIGH
A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service.
CWE-78
168,776
CVE-2021-42373
5.5
2.1
MEDIUM
A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given
CWE-476
168,777
CVE-2021-42374
5.3
3.3
MEDIUM
An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that
CWE-125
168,778
CVE-2021-42375
5.5
1.9
MEDIUM
An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.
NVD-CWE-Other
168,779
CVE-2021-42376
5.5
1.9
MEDIUM
A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input.
CWE-476
168,780
CVE-2021-42377
9.8
6.8
CRITICAL
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input.
CWE-763
168,781
CVE-2021-42378
7.2
6.5
HIGH
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function
CWE-416
168,782
CVE-2021-42379
7.2
6.5
HIGH
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function
CWE-416
168,783
CVE-2021-42380
7.2
6.5
HIGH
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function
CWE-416
168,784
CVE-2021-42381
7.2
6.5
HIGH
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function
CWE-416
168,785
CVE-2021-42382
7.2
6.5
HIGH
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function
CWE-416
168,786
CVE-2021-42383
7.2
6.5
HIGH
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
CWE-416
168,787
CVE-2021-42384
7.2
6.5
HIGH
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function
CWE-416
168,788
CVE-2021-42385
7.2
6.5
HIGH
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function
CWE-416
168,789
CVE-2021-42386
7.2
6.5
HIGH
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function
CWE-416
168,790
CVE-2021-42524
7.8
9.3
HIGH
Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file.
CWE-787
168,791
CVE-2021-42525
3.3
4.3
LOW
Acrobat Animate versions 21.0.9 (and earlier)is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-125
168,792
CVE-2021-42534
6.1
4.3
MEDIUM
The affected product’s web application does not properly neutralize the input during webpage generation, which could allow an attacker to inject code in the input forms.
CWE-79
168,793
CVE-2021-42536
6.5
4
MEDIUM
The affected product is vulnerable to a disclosure of peer username and password by allowing all users access to read global variables.
CWE-668
168,794
CVE-2021-42538
8.8
6.5
HIGH
The affected product is vulnerable to a parameter injection via passphrase, which enables the attacker to supply uncontrolled input.
CWE-77
168,795
CVE-2021-42539
8.8
6.5
HIGH
The affected product is vulnerable to a missing permission validation on system backup restore, which could lead to account take over and unapproved settings change.
CWE-306
168,796
CVE-2021-42540
8.8
6.5
HIGH
The affected product is vulnerable to a unsanitized extract folder for system configuration. A low-privileged user can leverage this logic to overwrite the settings and other key functionality.
CWE-123
168,797
CVE-2021-42542
8.8
6.5
HIGH
The affected product is vulnerable to directory traversal due to mishandling of provided backup folder structure.
CWE-22
168,798
CVE-2021-42543
7.8
7.5
HIGH
The affected application uses specific functions that could be abused through a crafted project file, which could lead to code execution, system reboot, and system shutdown.
CWE-242
168,799
CVE-2021-42544
9.8
7.5
CRITICAL
Missing Rate Limiting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on the Login Form allows an unauthenticated remote attacker to perform multiple login attempts, which facilitates gaining privileges.
CWE-307
168,800
CVE-2021-42545
9.1
6.4
CRITICAL
An insufficient session expiration vulnerability exists in Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27, which allows a remote attacker to reuse, spoof, or steal other user and admin sessions.
CWE-613