ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
168,701 | CVE-2021-42278 | 8.8 | 6.5 | HIGH | Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291. | CWE-269 |
168,702 | CVE-2021-42279 | 7.5 | 5.1 | HIGH | Chakra Scripting Engine Memory Corruption Vulnerability | CWE-787 |
168,703 | CVE-2021-42280 | 7.8 | 4.6 | HIGH | Windows Feedback Hub Elevation of Privilege Vulnerability | CWE-269 |
168,704 | CVE-2021-42282 | 8.8 | 6.5 | HIGH | Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42287, CVE-2021-42291. | CWE-269 |
168,705 | CVE-2021-42283 | 7.8 | 4.6 | HIGH | NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-41367, CVE-2021-41370. | CWE-269 |
168,706 | CVE-2021-42284 | 7.5 | 7.1 | HIGH | Windows Hyper-V Denial of Service Vulnerability | CWE-400 |
168,707 | CVE-2021-42285 | 7.8 | 7.2 | HIGH | Windows Kernel Elevation of Privilege Vulnerability | CWE-269 |
168,708 | CVE-2021-42286 | 7.8 | 4.6 | HIGH | Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability | CWE-269 |
168,709 | CVE-2021-42287 | 8.8 | 6.5 | HIGH | Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42291. | CWE-269 |
168,710 | CVE-2021-42288 | 6.1 | 3.6 | MEDIUM | Windows Hello Security Feature Bypass Vulnerability | CWE-863 |
168,711 | CVE-2021-42291 | 8.8 | 6.5 | HIGH | Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42278, CVE-2021-42282, CVE-2021-42287. | CWE-269 |
168,712 | CVE-2021-42292 | 7.8 | 6.8 | HIGH | Microsoft Excel Security Feature Bypass Vulnerability | CWE-863 |
168,713 | CVE-2021-42293 | 7.5 | 5 | HIGH | Microsoft Jet Red Database Engine and Access Connectivity Engine Elevation of Privilege Vulnerability | CWE-269 |
168,714 | CVE-2021-42294 | 7.2 | 6.5 | HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42309. | CWE-94 |
168,715 | CVE-2021-42295 | 5.5 | 1.9 | MEDIUM | Visual Basic for Applications Information Disclosure Vulnerability | CWE-668 |
168,716 | CVE-2021-42296 | 7.8 | 6.9 | HIGH | Microsoft Word Remote Code Execution Vulnerability | CWE-94 |
168,717 | CVE-2021-42297 | 7.8 | 6.9 | HIGH | Windows 10 Update Assistant Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-43211. | CWE-59 |
168,718 | CVE-2021-42298 | 7.8 | 9.3 | HIGH | Microsoft Defender Remote Code Execution Vulnerability | CWE-94 |
168,719 | CVE-2021-42299 | 6.1 | 3.6 | MEDIUM | Microsoft Surface Pro 3 Security Feature Bypass Vulnerability | CWE-863 |
168,720 | CVE-2021-42300 | 6.7 | 4.6 | MEDIUM | Azure Sphere Tampering Vulnerability | NVD-CWE-noinfo |
168,721 | CVE-2021-42301 | 4.6 | 2.1 | MEDIUM | Azure RTOS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26444, CVE-2021-42323. | CWE-668 |
168,722 | CVE-2021-42302 | 6.8 | 7.2 | MEDIUM | Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42303, CVE-2021-42304. | CWE-269 |
168,723 | CVE-2021-42303 | 6.8 | 7.2 | MEDIUM | Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42302, CVE-2021-42304. | CWE-269 |
168,724 | CVE-2021-42304 | 6.8 | 7.2 | MEDIUM | Azure RTOS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42302, CVE-2021-42303. | CWE-269 |
168,725 | CVE-2021-42305 | 6.5 | 4.3 | MEDIUM | Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-41349. | NVD-CWE-noinfo |
168,726 | CVE-2021-42306 | 6.5 | 4 | MEDIUM | Azure Active Directory Information Disclosure Vulnerability | CWE-668 |
168,727 | CVE-2021-42308 | 7.5 | 5 | HIGH | Microsoft Edge (Chromium-based) Spoofing Vulnerability | CWE-290 |
168,728 | CVE-2021-42309 | 8.8 | 6.5 | HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42294. | CWE-94 |
168,729 | CVE-2021-42310 | 9.8 | 7.5 | CRITICAL | Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889. | CWE-94 |
168,730 | CVE-2021-42311 | 9.8 | 10 | CRITICAL | Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889. | CWE-94 |
168,731 | CVE-2021-42312 | 7.8 | 4.6 | HIGH | Microsoft Defender for IOT Elevation of Privilege Vulnerability | CWE-269 |
168,732 | CVE-2021-42313 | 9.8 | 10 | CRITICAL | Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889. | CWE-89 |
168,733 | CVE-2021-42314 | 8.8 | 6.5 | HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889. | CWE-94 |
168,734 | CVE-2021-42315 | 8.8 | 6.5 | HIGH | Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-43882, CVE-2021-43889. | CWE-94 |
168,735 | CVE-2021-42316 | 8.8 | 6.5 | HIGH | Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,736 | CVE-2021-42319 | 5.5 | 2.1 | MEDIUM | Visual Studio Elevation of Privilege Vulnerability | CWE-269 |
168,737 | CVE-2021-42320 | 3.5 | 3.5 | LOW | Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-43242. | CWE-290 |
168,738 | CVE-2021-42321 | 8.8 | 6.5 | HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability | NVD-CWE-noinfo |
168,739 | CVE-2021-42322 | 7.8 | 4.6 | HIGH | Visual Studio Code Elevation of Privilege Vulnerability | CWE-269 |
168,740 | CVE-2021-42323 | 3.3 | 2.1 | LOW | Azure RTOS Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-26444, CVE-2021-42301. | CWE-668 |
168,741 | CVE-2021-42325 | 9.8 | 7.5 | CRITICAL | Froxlor through 0.10.29.1 allows SQL injection in Database/Manager/DbManagerMySQL.php via a custom DB name. | CWE-89 |
168,742 | CVE-2021-42326 | 5.3 | 5 | MEDIUM | Redmine before 4.1.5 and 4.2.x before 4.2.3 may disclose the names of users on activity views due to an insufficient access filter. | CWE-200 |
168,743 | CVE-2021-42327 | 6.7 | 4.6 | MEDIUM | dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer. | CWE-787 |
168,744 | CVE-2021-42329 | 5.4 | 3.5 | MEDIUM | The “List_Add” function of message board of ShinHer StudyOnline System does not filter special characters in the title parameter. After logging in with user’s privilege, remote attackers can inject JavaScript and execute stored XSS attacks. | CWE-79 |
168,745 | CVE-2021-42330 | 8.1 | 5.5 | HIGH | The “Teacher Edit” function of ShinHer StudyOnline System does not perform authority control. After logging in with user’s privilege, remote attackers can access and edit other users’ credential and personal information by crafting URL parameters. | CWE-285 |
168,746 | CVE-2021-42331 | 5.4 | 5.5 | MEDIUM | The “Study Edit” function of ShinHer StudyOnline System does not perform permission control. After logging in with user’s privilege, remote attackers can access and edit other users’ tutorial schedule by crafting URL parameters. | CWE-285 |
168,747 | CVE-2021-42332 | 4.3 | 4 | MEDIUM | The “List View” function of ShinHer StudyOnline System is not under authority control. After logging in with user’s privilege, remote attackers can access the content of other users’ message boards by crafting URL parameters. | CWE-285 |
168,748 | CVE-2021-42333 | 8.8 | 6.5 | HIGH | The Easytest contains SQL injection vulnerabilities. After obtaining user’s privilege, remote attackers can inject SQL commands into the parameters of the learning history page to access all database and obtain administrator permissions. | CWE-89 |
168,749 | CVE-2021-42334 | 8.8 | 6.5 | HIGH | The Easytest contains SQL injection vulnerabilities. After obtaining a user’s privilege, remote attackers can inject SQL commands into the parameters of the elective course management page to obtain all database and administrator permissions. | CWE-89 |
168,750 | CVE-2021-42334 | 8.8 | 6.5 | HIGH | The Easytest contains SQL injection vulnerabilities. After obtaining a user’s privilege, remote attackers can inject SQL commands into the parameters of the elective course management page to obtain all database and administrator permissions. | CWE-89 |
168,751 | CVE-2021-42335 | 5.4 | 3.5 | MEDIUM | Easytest bulletin board management function of online learning platform does not filter special characters. After obtaining a user’s privilege, remote attackers can inject JavaScript and execute stored XSS attack. | CWE-79 |
168,752 | CVE-2021-42336 | 4.3 | 4 | MEDIUM | The learning history page of the Easytest is vulnerable by permission bypass. After obtaining a user’s permission, remote attackers can access other users’ and administrator’s account information except password by crafting URL parameters. | CWE-285 |
168,753 | CVE-2021-42337 | 4.3 | 4 | MEDIUM | The permission control of AIFU cashier management salary query function can be bypassed, thus after obtaining general user’s permission, the remote attacker can access account information except passwords by crafting URL parameters. | CWE-285 |
168,754 | CVE-2021-42338 | 9.8 | 10 | CRITICAL | 4MOSAn GCB Doctor’s login page has improper validation of Cookie, which allows an unauthenticated remote attacker to bypass authentication by code injection in cookie, and arbitrarily manipulate the system or interrupt services by upload and execution of arbitrary files. | CWE-287 |
168,755 | CVE-2021-42338 | 9.8 | 10 | CRITICAL | 4MOSAn GCB Doctor’s login page has improper validation of Cookie, which allows an unauthenticated remote attacker to bypass authentication by code injection in cookie, and arbitrarily manipulate the system or interrupt services by upload and execution of arbitrary files. | CWE-285 |
168,756 | CVE-2021-42340 | 7.5 | 5 | HIGH | The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError. | CWE-772 |
168,757 | CVE-2021-42341 | 7.5 | 5 | HIGH | checkpath in OpenRC before 0.44.7 uses the direct output of strlen() to allocate strings, which does not account for the '\0' byte at the end of the string. This results in memory corruption. CVE-2021-42341 was introduced in git commit 63db2d99e730547339d1bdd28e8437999c380cae, which was introduced as part of OpenRC 0.44.0 development. | NVD-CWE-Other |
168,758 | CVE-2021-42342 | 9.8 | 7.5 | CRITICAL | An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts. | CWE-434 |
168,759 | CVE-2021-42343 | 9.8 | 6.8 | CRITICAL | An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution. | CWE-668 |
168,760 | CVE-2021-42358 | 8.8 | 6.8 | HIGH | The Contact Form With Captcha WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation in the ~/cfwc-form.php file during contact form submission, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.6.2. | CWE-352 |
168,761 | CVE-2021-42359 | 9.1 | 6.4 | CRITICAL | WP DSGVO Tools (GDPR) <= 3.1.23 had an AJAX action, ‘admin-dismiss-unsubscribe‘, which lacked a capability check and a nonce check and was available to unauthenticated users, and did not check the post type when deleting unsubscription requests. As such, it was possible for an attacker to permanently delete an arbitrary post or page on the site by sending an AJAX request with the “action” parameter set to “admin-dismiss-unsubscribe” and the “id” parameter set to the post to be deleted. Sending such a request would move the post to the trash, and repeating the request would permanently delete the post in question. | CWE-862 |
168,762 | CVE-2021-42360 | 5.4 | 3.5 | MEDIUM | On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page. | CWE-79 |
168,763 | CVE-2021-42360 | 5.4 | 3.5 | MEDIUM | On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page. | CWE-284 |
168,764 | CVE-2021-42360 | 5.4 | 3.5 | MEDIUM | On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the post or page to overwrite. Any post or page that had been built with Elementor, including published pages, could be overwritten by the imported block, and the malicious JavaScript in the imported block would then be executed in the browser of any visitors to that page. | CWE-99 |
168,765 | CVE-2021-42361 | 4.8 | 2.1 | MEDIUM | The Contact Form Email WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via the name parameter found in the ~/trunk/cp-admin-int-list.inc.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.3.24. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | CWE-79 |
168,766 | CVE-2021-42362 | 8.8 | 6.5 | HIGH | The WordPress Popular Posts WordPress plugin is vulnerable to arbitrary file uploads due to insufficient input file type validation found in the ~/src/Image.php file which makes it possible for attackers with contributor level access and above to upload malicious files that can be used to obtain remote code execution, in versions up to and including 5.3.2. | CWE-434 |
168,767 | CVE-2021-42363 | 6.1 | 4.3 | MEDIUM | The Preview E-Mails for WooCommerce WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the search_order parameter found in the ~/views/form.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.6.8. | CWE-79 |
168,768 | CVE-2021-42364 | 8.8 | 6.8 | HIGH | The Stetic WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the stats_page function found in the ~/stetic.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.0.6. | CWE-352 |
168,769 | CVE-2021-42365 | 4.8 | 2.1 | MEDIUM | The Asgaros Forums WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the name parameter found in the ~/admin/tables/admin-structure-table.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.15.13. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. | CWE-79 |
168,770 | CVE-2021-42367 | 5.4 | 3.5 | MEDIUM | The Variation Swatches for WooCommerce WordPress plugin is vulnerable to Stored Cross-Site Scripting via several parameters found in the ~/includes/class-menu-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.1. Due to missing authorization checks on the tawcvs_save_settings function, low-level authenticated users such as subscribers can exploit this vulnerability. | CWE-79 |
168,771 | CVE-2021-42367 | 5.4 | 3.5 | MEDIUM | The Variation Swatches for WooCommerce WordPress plugin is vulnerable to Stored Cross-Site Scripting via several parameters found in the ~/includes/class-menu-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.1.1. Due to missing authorization checks on the tawcvs_save_settings function, low-level authenticated users such as subscribers can exploit this vulnerability. | CWE-862 |
168,772 | CVE-2021-42369 | 8.8 | 6.5 | HIGH | Imagicle Application Suite (for Cisco UC) before 2021.Summer.2 allows SQL injection. A low-privileged user could inject a SQL statement through the "Export to CSV" feature of the Contact Manager web GUI. | CWE-89 |
168,773 | CVE-2021-42370 | 7.5 | 4.3 | HIGH | A password mismanagement situation exists in XoruX LPAR2RRD and STOR2RRD before 7.30 because cleartext information is present in HTML password input fields in the device properties. (Viewing the passwords requires configuring a web browser to display HTML password input fields.) | CWE-312 |
168,774 | CVE-2021-42371 | 9.8 | 7.5 | CRITICAL | lpar2rrd is a hardcoded system account in XoruX LPAR2RRD and STOR2RRD before 7.30. | CWE-922 |
168,775 | CVE-2021-42372 | 8.8 | 9 | HIGH | A shell command injection in the HW Events SNMP community in XoruX LPAR2RRD and STOR2RRD before 7.30 allows authenticated remote attackers to execute arbitrary shell commands as the user running the service. | CWE-78 |
168,776 | CVE-2021-42373 | 5.5 | 2.1 | MEDIUM | A NULL pointer dereference in Busybox's man applet leads to denial of service when a section name is supplied but no page argument is given | CWE-476 |
168,777 | CVE-2021-42374 | 5.3 | 3.3 | MEDIUM | An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that | CWE-125 |
168,778 | CVE-2021-42375 | 5.5 | 1.9 | MEDIUM | An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input. | NVD-CWE-Other |
168,779 | CVE-2021-42376 | 5.5 | 1.9 | MEDIUM | A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \x03 delimiter character. This may be used for DoS under very rare conditions of filtered command input. | CWE-476 |
168,780 | CVE-2021-42377 | 9.8 | 6.8 | CRITICAL | An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under rare conditions of filtered command input. | CWE-763 |
168,781 | CVE-2021-42378 | 7.2 | 6.5 | HIGH | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function | CWE-416 |
168,782 | CVE-2021-42379 | 7.2 | 6.5 | HIGH | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function | CWE-416 |
168,783 | CVE-2021-42380 | 7.2 | 6.5 | HIGH | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function | CWE-416 |
168,784 | CVE-2021-42381 | 7.2 | 6.5 | HIGH | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function | CWE-416 |
168,785 | CVE-2021-42382 | 7.2 | 6.5 | HIGH | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function | CWE-416 |
168,786 | CVE-2021-42383 | 7.2 | 6.5 | HIGH | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function | CWE-416 |
168,787 | CVE-2021-42384 | 7.2 | 6.5 | HIGH | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function | CWE-416 |
168,788 | CVE-2021-42385 | 7.2 | 6.5 | HIGH | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function | CWE-416 |
168,789 | CVE-2021-42386 | 7.2 | 6.5 | HIGH | A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function | CWE-416 |
168,790 | CVE-2021-42524 | 7.8 | 9.3 | HIGH | Adobe Animate version 21.0.9 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious BMP file. | CWE-787 |
168,791 | CVE-2021-42525 | 3.3 | 4.3 | LOW | Acrobat Animate versions 21.0.9 (and earlier)is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
168,792 | CVE-2021-42534 | 6.1 | 4.3 | MEDIUM | The affected product’s web application does not properly neutralize the input during webpage generation, which could allow an attacker to inject code in the input forms. | CWE-79 |
168,793 | CVE-2021-42536 | 6.5 | 4 | MEDIUM | The affected product is vulnerable to a disclosure of peer username and password by allowing all users access to read global variables. | CWE-668 |
168,794 | CVE-2021-42538 | 8.8 | 6.5 | HIGH | The affected product is vulnerable to a parameter injection via passphrase, which enables the attacker to supply uncontrolled input. | CWE-77 |
168,795 | CVE-2021-42539 | 8.8 | 6.5 | HIGH | The affected product is vulnerable to a missing permission validation on system backup restore, which could lead to account take over and unapproved settings change. | CWE-306 |
168,796 | CVE-2021-42540 | 8.8 | 6.5 | HIGH | The affected product is vulnerable to a unsanitized extract folder for system configuration. A low-privileged user can leverage this logic to overwrite the settings and other key functionality. | CWE-123 |
168,797 | CVE-2021-42542 | 8.8 | 6.5 | HIGH | The affected product is vulnerable to directory traversal due to mishandling of provided backup folder structure. | CWE-22 |
168,798 | CVE-2021-42543 | 7.8 | 7.5 | HIGH | The affected application uses specific functions that could be abused through a crafted project file, which could lead to code execution, system reboot, and system shutdown. | CWE-242 |
168,799 | CVE-2021-42544 | 9.8 | 7.5 | CRITICAL | Missing Rate Limiting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 on the Login Form allows an unauthenticated remote attacker to perform multiple login attempts, which facilitates gaining privileges. | CWE-307 |
168,800 | CVE-2021-42545 | 9.1 | 6.4 | CRITICAL | An insufficient session expiration vulnerability exists in Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27, which allows a remote attacker to reuse, spoof, or steal other user and admin sessions. | CWE-613 |
Subsets and Splits