ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
168,801 | CVE-2021-42546 | 6.1 | 4.3 | MEDIUM | Insufficient Input Validation in the search functionality of Wordpress plugin Use-Your-Drive prior to 1.18.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack. | CWE-79 |
168,802 | CVE-2021-42547 | 6.1 | 4.3 | MEDIUM | Insufficient Input Validation in the search functionality of Wordpress plugin Out-of-the-Box prior to 1.20.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack. | CWE-79 |
168,803 | CVE-2021-42548 | 6.1 | 4.3 | MEDIUM | Insufficient Input Validation in the search functionality of Wordpress plugin Share-one-Drive prior to 1.15.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack. | CWE-79 |
168,804 | CVE-2021-42549 | 6.1 | 4.3 | MEDIUM | Insufficient Input Validation in the search functionality of Wordpress plugin Lets-Box prior to 1.15.3 allows unauthenticated user to craft a reflected Cross-Site Scripting attack. | CWE-79 |
168,805 | CVE-2021-42550 | 6.6 | 8.5 | MEDIUM | In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. | CWE-502 |
168,806 | CVE-2021-42556 | 5.5 | 4.3 | MEDIUM | Rasa X before 0.42.4 allows Directory Traversal during archive extraction. In the functionality that allows a user to load a trained model archive, an attacker has arbitrary write capability within specific directories via a crafted archive file. | CWE-22 |
168,807 | CVE-2021-42557 | 7.5 | 5 | HIGH | In Jeedom through 4.1.19, a bug allows a remote attacker to bypass API access and retrieve users credentials. | CWE-522 |
168,808 | CVE-2021-42563 | 7.8 | 4.6 | HIGH | There is an Unquoted Service Path in NI Service Locator (nisvcloc.exe) in versions prior to 18.0 on Windows. This may allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges. | CWE-428 |
168,809 | CVE-2021-42564 | 5.4 | 4.9 | MEDIUM | An open redirect through HTML injection in confidential messages in Cryptshare before 5.1.0 allows remote attackers (with permission to provide confidential messages via Cryptshare) to redirect targeted victims to any URL via the '<meta http-equiv="refresh"' substring in the editor parameter. | CWE-601 |
168,810 | CVE-2021-42565 | 6.1 | 4.3 | MEDIUM | myfactory.FMS before 7.1-912 allows XSS via the UID parameter. | CWE-79 |
168,811 | CVE-2021-42566 | 6.1 | 4.3 | MEDIUM | myfactory.FMS before 7.1-912 allows XSS via the Error parameter. | CWE-79 |
168,812 | CVE-2021-42567 | 6.1 | 4.3 | MEDIUM | Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. | CWE-79 |
168,813 | CVE-2021-42568 | 4.3 | 4 | MEDIUM | Sonatype Nexus Repository Manager 3.x through 3.35.0 allows attackers to access the SSL Certificates Loading function via a low-privileged account. | CWE-200 |
168,814 | CVE-2021-42574 | 8.3 | 5.1 | HIGH | An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logical ordering of tokens ingested by compilers and interpreters. Adversaries can leverage this to encode source code for compilers accepting Unicode such that targeted vulnerabilities are introduced invisibly to human reviewers. | CWE-94 |
168,815 | CVE-2021-42575 | 9.8 | 7.5 | CRITICAL | The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements. | CWE-20 |
168,816 | CVE-2021-42576 | 9.8 | 7.5 | CRITICAL | The bluemonday sanitizer before 1.0.16 for Go, and before 0.0.8 for Python (in pybluemonday), does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements. | CWE-20 |
168,817 | CVE-2021-42580 | 9.8 | 7.5 | CRITICAL | Sourcecodester Online Learning System 2.0 is vunlerable to sql injection authentication bypass in admin login file (/admin/login.php) and authenticated file upload in (Master.php) file , we can craft these two vunlerablities to get unauthenticated remote command execution. | CWE-89 |
168,818 | CVE-2021-42584 | 5.4 | 3.5 | MEDIUM | A Stored Cross Site Scripting (XSS) issue exists in Convos-Chat before 6.32. | CWE-79 |
168,819 | CVE-2021-42624 | 7.8 | 4.6 | HIGH | A local buffer overflow vulnerability exists in the latest version of Miniftpd in ftpproto.c through the tmp variable, where a crafted payload can be sent to the affected function. | CWE-120 |
168,820 | CVE-2021-42650 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS vulnerability exists in Portainer before 2.9.1 via the node input box in Custom Templates. | CWE-79 |
168,821 | CVE-2021-42662 | 5.4 | 3.5 | MEDIUM | A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more. | CWE-79 |
168,822 | CVE-2021-42663 | 4.3 | 4.3 | MEDIUM | An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice. | CWE-74 |
168,823 | CVE-2021-42664 | 5.4 | 3.5 | MEDIUM | A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more. | CWE-79 |
168,824 | CVE-2021-42665 | 9.8 | 7.5 | CRITICAL | An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication. | CWE-89 |
168,825 | CVE-2021-42666 | 8.8 | 6.5 | HIGH | A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to quiz_question.php, which could let a malicious user extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server. | CWE-89 |
168,826 | CVE-2021-42667 | 9.8 | 7.5 | CRITICAL | A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server. | CWE-89 |
168,827 | CVE-2021-42668 | 9.8 | 7.5 | CRITICAL | A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server. | CWE-89 |
168,828 | CVE-2021-42669 | 9.8 | 10 | CRITICAL | A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing "<?php system($_GET["cmd"]); ?>" the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id. | CWE-434 |
168,829 | CVE-2021-42670 | 9.8 | 7.5 | CRITICAL | A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to the announcements_student.php web page. As a result a malicious user can extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server. | CWE-89 |
168,830 | CVE-2021-42671 | 7.5 | 5 | HIGH | An incorrect access control vulnerability exists in Sourcecodester Engineers Online Portal in PHP in nia_munoz_monitoring_system/admin/uploads. An attacker can leverage this vulnerability in order to bypass access controls and access all the files uploaded to the web server without the need of authentication or authorization. | CWE-863 |
168,831 | CVE-2021-42681 | 8.8 | 7.2 | HIGH | A Buffer Overflow vulnerability exists in Accops HyWorks DVM Tools prior to v3.3.1.105. The IOCTL Handler 0x22001B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,832 | CVE-2021-42682 | 8.8 | 7.2 | HIGH | An Integer Overflow vulnerability exists in Accops HyWorks DVM Tools prior to v3.3.1.105 .The IOCTL Handler 0x22001B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,833 | CVE-2021-42683 | 8.8 | 7.2 | HIGH | A Buffer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22001B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,834 | CVE-2021-42685 | 8.8 | 7.2 | HIGH | An Integer Overflow vulnerability exists in Accops HyWorks DVM Tools prior to v3.3.1.105 . The IOCTL Handler 0x22005B in the Accops HyWorks DVM Tools prior to v3.3.1.105 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,835 | CVE-2021-42686 | 8.8 | 7.2 | HIGH | An Integer Overflow exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22001B in the Accops HyWorks Windows Client prior to v 3.2.8.200 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,836 | CVE-2021-42687 | 8.8 | 7.2 | HIGH | A Buffer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22005B allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,837 | CVE-2021-42688 | 8.8 | 7.2 | HIGH | An Integer Overflow vulnerability exists in Accops HyWorks Windows Client prior to v 3.2.8.200. The IOCTL Handler 0x22005B in the Accops HyWorks Windows Client prior to v 3.2.8.200 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,838 | CVE-2021-42694 | 8.3 | 5.1 | HIGH | An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies invoked deceptively in downstream software. | CWE-94 |
168,839 | CVE-2021-42697 | 7.5 | 5 | HIGH | Akka HTTP 10.1.x and 10.2.x before 10.2.7 can encounter stack exhaustion while parsing HTTP headers, which allows a remote attacker to conduct a Denial of Service attack by sending a User-Agent header with deeply nested comments. | CWE-787 |
168,840 | CVE-2021-42698 | 7.8 | 6.8 | HIGH | Project files are stored memory objects in the form of binary serialized data that can later be read and deserialized again to instantiate the original objects in memory. Malicious manipulation of these files may allow an attacker to corrupt memory. | CWE-502 |
168,841 | CVE-2021-42699 | 5.9 | 4.3 | MEDIUM | The affected product is vulnerable to cookie information being transmitted as cleartext over HTTP. An attacker can capture network traffic, obtain the user’s cookie and take over the account. | CWE-319 |
168,842 | CVE-2021-42701 | 6.3 | 2.6 | MEDIUM | An attacker could prepare a specially crafted project file that, if opened, would attempt to connect to the cloud and trigger a man in the middle (MiTM) attack. This could allow an attacker to obtain credentials and take over the user’s cloud account. | CWE-471 |
168,843 | CVE-2021-42703 | 6.1 | 4.3 | MEDIUM | This vulnerability could allow an attacker to send malicious Javascript code resulting in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage, and performing unintended browser action. | CWE-79 |
168,844 | CVE-2021-42705 | 7.8 | 6.8 | HIGH | PLC Editor Versions 1.3.8 and prior is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code. | CWE-121 |
168,845 | CVE-2021-42706 | 7.8 | 4.6 | HIGH | This vulnerability could allow an attacker to disclose information and execute arbitrary code on affected installations of WebAccess/MHI Designer | CWE-416 |
168,846 | CVE-2021-42707 | 7.8 | 6.8 | HIGH | PLC Editor Versions 1.3.8 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code. | CWE-787 |
168,847 | CVE-2021-42711 | 7.8 | 7.2 | HIGH | Barracuda Network Access Client before 5.2.2 creates a Temporary File in a Directory with Insecure Permissions. This file is executed with SYSTEM privileges when an unprivileged user performs a repair operation. | CWE-276 |
168,848 | CVE-2021-42715 | 5.5 | 4.3 | MEDIUM | An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR loader parsed truncated end-of-file RLE scanlines as an infinite sequence of zero-length runs. An attacker could potentially have caused denial of service in applications using stb_image by submitting crafted HDR files. | CWE-835 |
168,849 | CVE-2021-42716 | 9.1 | 6.4 | CRITICAL | An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location. | CWE-120 |
168,850 | CVE-2021-42717 | 7.5 | 5 | HIGH | ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests. Even a moderately large (e.g., 300KB) HTTP request can occupy one of the limited NGINX worker processes for minutes and consume almost all of the available CPU on the machine. Modsecurity 2 is similarly vulnerable: the affected versions include 2.8.0 through 2.9.4. | CWE-674 |
168,851 | CVE-2021-42721 | 7.8 | 9.3 | HIGH | Adobe Media Encoder version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file. | CWE-119 |
168,852 | CVE-2021-42723 | 7.8 | 9.3 | HIGH | Adobe Premiere Pro version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file. | CWE-788 |
168,853 | CVE-2021-42725 | 5.3 | 5 | MEDIUM | Adobe Experience Manager version 6.5.9.0 (and earlier) are affected by an improper access control vulnerability that leads to a security feature bypass. By manipulating referer headers, an unauthenticated attacker could gain access to arbitrary pages that they are not authorized to access. | CWE-863 |
168,854 | CVE-2021-42726 | 7.8 | 9.3 | HIGH | Adobe Media Encoder version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file. | CWE-788 |
168,855 | CVE-2021-42727 | 7.8 | 6.8 | HIGH | Acrobat RoboHelp Server versions 2020.0.1 (and earlier) are affected by a Path traversal vulnerability. The authenticated attacker can upload arbitrary files outside of the intended directory to cause remote code execution with privileges of user running Tomcat. Exploitation of this issue requires user interaction in that a victim must navigate to a planted file on the server. | CWE-22 |
168,856 | CVE-2021-42731 | 7.8 | 9.3 | HIGH | Adobe InDesign versions 16.4 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-120 |
168,857 | CVE-2021-42733 | 7.8 | 6.8 | HIGH | Adobe Prelude version 10.1 (and earlier) is affected by an improper input validation vulnerability in the XDCAMSAM directory. An unauthenticated attacker could leverage this vulnerability to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-20 |
168,858 | CVE-2021-42737 | 7.8 | 6.8 | HIGH | Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability. | CWE-788 |
168,859 | CVE-2021-42738 | 7.8 | 9.3 | HIGH | Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability. | CWE-788 |
168,860 | CVE-2021-42739 | 6.7 | 4.6 | MEDIUM | The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking. | CWE-787 |
168,861 | CVE-2021-42740 | 9.8 | 7.5 | CRITICAL | The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character. | CWE-77 |
168,862 | CVE-2021-42744 | 5.5 | 2.1 | MEDIUM | Philips MRI 1.5T and MRI 3T Version 5.x.x exposes sensitive information to an actor not explicitly authorized to have access. | CWE-668 |
168,863 | CVE-2021-42752 | 5.4 | 3.5 | MEDIUM | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWLM version 8.6.1 and below allows attacker to execute malicious javascript code on victim's host via crafted HTTP requests | CWE-79 |
168,864 | CVE-2021-42754 | 5 | 3.5 | MEDIUM | An improper control of generation of code vulnerability [CWE-94] in FortiClientMacOS versions 7.0.0 and below and 6.4.5 and below may allow an authenticated attacker to hijack the MacOS camera without the user permission via the malicious dylib file. | CWE-94 |
168,865 | CVE-2021-42757 | 6.7 | 4.6 | MEDIUM | A buffer overflow [CWE-121] in the TFTP client library of FortiOS before 6.4.7 and FortiOS 7.0.0 through 7.0.2, may allow an authenticated local attacker to achieve arbitrary code execution via specially crafted command line arguments. | CWE-120 |
168,866 | CVE-2021-42758 | 8.8 | 9 | HIGH | An improper access control vulnerability [CWE-284] in FortiWLC 8.6.1 and below may allow an authenticated and remote attacker with low privileges to execute any command as an admin user with full access rights via bypassing the GUI restrictions. | CWE-863 |
168,867 | CVE-2021-42759 | 6.7 | 7.2 | MEDIUM | A violation of secure design principles in Fortinet Meru AP version 8.6.1 and below, version 8.5.5 and below allows attacker to execute unauthorized code or commands via crafted cli commands. | CWE-78 |
168,868 | CVE-2021-42760 | 8.8 | 7.5 | HIGH | A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiWLM version 8.6.1 and below allows attacker to disclose sensitive information from DB tables via crafted requests. | CWE-89 |
168,869 | CVE-2021-42762 | 5.3 | 4.6 | MEDIUM | BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133. | NVD-CWE-Other |
168,870 | CVE-2021-42763 | 7.5 | 5 | HIGH | Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the "@" user credentials of the node processing the UI request. | CWE-312 |
168,871 | CVE-2021-42764 | 9.1 | 6.4 | CRITICAL | The Proof-of-Stake (PoS) Ethereum consensus protocol through 2021-10-19 allows an adversary to cause a denial of service (delayed consensus decisions), and also increase the profits of individual validators, via short-range reorganizations of the underlying consensus chain. | NVD-CWE-noinfo |
168,872 | CVE-2021-42765 | 7.5 | 5 | HIGH | The Proof-of-Stake (PoS) Ethereum consensus protocol through 2021-10-19 allows an adversary to leverage network delay to cause a denial of service (indefinite stalling of consensus decisions). | NVD-CWE-noinfo |
168,873 | CVE-2021-42766 | 9.1 | 6.4 | CRITICAL | The Proof-of-Stake (PoS) Ethereum consensus protocol through 2021-10-19 allows an adversary to cause a denial of service (long-range consensus chain reorganizations), even when this adversary has little stake and cannot influence network message propagation. This can cause a protocol stall, or an increase in the profits of individual validators. | NVD-CWE-noinfo |
168,874 | CVE-2021-42770 | 6.1 | 4.3 | MEDIUM | A Cross-site scripting (XSS) vulnerability was discovered in OPNsense before 21.7.4 via the LDAP attribute return in the authentication tester. | CWE-79 |
168,875 | CVE-2021-42771 | 7.8 | 7.2 | HIGH | Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution. | CWE-22 |
168,876 | CVE-2021-42772 | 9.8 | 6.8 | CRITICAL | Broadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, have a buffer overflow vulnerability in the remote GetDumpFile command that could allow a user to attempt various attacks. In non-secure mode, the user is unauthenticated | CWE-120 |
168,877 | CVE-2021-42773 | 7.5 | 5 | HIGH | Broadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, could allow a user to retrieve an arbitrary file from a remote host with the GetDumpFile command. In non-secure mode, the user is unauthenticated. | CWE-200 |
168,878 | CVE-2021-42774 | 9.8 | 7.5 | CRITICAL | Broadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, have a buffer overflow vulnerability in the remote firmware download feature that could allow remote unauthenticated users to perform various attacks. In non-secure mode, the user is unauthenticated. | CWE-120 |
168,879 | CVE-2021-42775 | 9.1 | 6.4 | CRITICAL | Broadcom Emulex HBA Manager/One Command Manager versions before 11.4.425.0 and 12.8.542.31, if not installed in Strictly Local Management mode, have a vulnerability in the remote firmware download feature that could allow a user to place or replace an arbitrary file on the remote host. In non-secure mode, the user is unauthenticated. | NVD-CWE-noinfo |
168,880 | CVE-2021-42776 | 7.7 | 6.8 | HIGH | CloverDX Server before 5.11.2 and and 5.12.x before 5.12.1 allows XXE during configuration import. | CWE-611 |
168,881 | CVE-2021-42783 | 9.8 | 10 | CRITICAL | Missing Authentication for Critical Function vulnerability in debug_post_set.cgi of D-Link DWR-932C E1 firmware allows an unauthenticated attacker to execute administrative actions. | CWE-306 |
168,882 | CVE-2021-42784 | 9.8 | 10 | CRITICAL | OS Command Injection vulnerability in debug_fcgi of D-Link DWR-932C E1 firmware allows a remote attacker to perform command injection via a crafted HTTP request. | CWE-78 |
168,883 | CVE-2021-42785 | 9.8 | 7.5 | CRITICAL | Buffer Overflow vulnerability in tvnviewer.exe of TightVNC Viewer allows a remote attacker to execute arbitrary instructions via a crafted FramebufferUpdate packet from a VNC server. | CWE-120 |
168,884 | CVE-2021-42835 | 7 | 6.9 | HIGH | An issue was discovered in Plex Media Server through 1.24.4.5081-e362dc1ee. An attacker (with a foothold in a endpoint via a low-privileged user account) can access the exposed RPC service of the update service component. This RPC functionality allows the attacker to interact with the RPC functionality and execute code from a path of his choice (local, or remote via SMB) because of a TOCTOU race condition. This code execution is in the context of the Plex update service (which runs as SYSTEM). | CWE-367 |
168,885 | CVE-2021-42836 | 7.5 | 5 | HIGH | GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack. | CWE-697 |
168,886 | CVE-2021-42837 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Talend Data Catalog before 7.3-20210930. After setting up SAML/OAuth, authentication is not correctly enforced on the native login page. Any valid user from the SAML/OAuth provider can be used as the username with an arbitrary password, and login will succeed. | CWE-863 |
168,887 | CVE-2021-42838 | 6.1 | 4.3 | MEDIUM | Grand Vice info Co. webopac7 book search field parameter does not properly restrict the input of special characters, thus unauthenticated attackers can inject JavaScript syntax remotely, and further perform reflective XSS attacks. | CWE-79 |
168,888 | CVE-2021-42839 | 8.8 | 9 | HIGH | Grand Vice info Co. webopac7 file upload function fails to filter special characters. While logging in with general user’s permission, remote attackers can upload malicious script and execute arbitrary code to control the system or interrupt services. | CWE-434 |
168,889 | CVE-2021-42840 | 8.8 | 9 | HIGH | SuiteCRM before 7.11.19 allows remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled PHP file under the web root, because only the all-lowercase PHP file extensions were blocked. NOTE: this issue exists because of an incomplete fix for CVE-2020-28328. | CWE-434 |
168,890 | CVE-2021-42847 | 9.8 | 7.5 | CRITICAL | Zoho ManageEngine ADAudit Plus before 7006 allows attackers to write to, and execute, arbitrary files. | NVD-CWE-noinfo |
168,891 | CVE-2021-42912 | 8.8 | 9 | HIGH | FiberHome ONU GPON AN5506-04-F RP2617 is affected by an OS command injection vulnerability. This vulnerability allows the attacker, once logged in, to send commands to the operating system as the root user via the ping diagnostic tool, bypassing the IP address field, and concatenating OS commands with a semicolon. | CWE-78 |
168,892 | CVE-2021-42917 | 5.5 | 4.3 | MEDIUM | Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream. | CWE-120 |
168,893 | CVE-2021-42945 | 9.8 | 7.5 | CRITICAL | A SQL Injection vulnerability exists in ZZCMS 2021 via the askbigclassid parameter in /admin/ask.php. | CWE-89 |
168,894 | CVE-2021-42954 | 7.8 | 4.6 | HIGH | Zoho Remote Access Plus Server Windows Desktop Binary fixed from 10.1.2121.1 is affected by incorrect access control. The installation directory is vulnerable to weak file permissions by allowing full control for Windows Everyone user group (non-admin or any guest users), thereby allowing privilege escalation, unauthorized password reset, stealing of sensitive data, access to credentials in plaintext, access to registry values, tampering with configuration files, etc. | CWE-863 |
168,895 | CVE-2021-42955 | 7.8 | 7.2 | HIGH | Zoho Remote Access Plus Server Windows Desktop binary fixed in version 10.1.2132 is affected by an unauthorized password reset vulnerability. Because of the designed password reset mechanism, any non-admin Windows user can reset the password of the Remote Access Plus Server Admin account. | CWE-863 |
168,896 | CVE-2021-42956 | 8.8 | 6.5 | HIGH | Zoho Remote Access Plus Server Windows Desktop Binary fixed in 10.1.2132.6 is affected by a sensitive information disclosure vulnerability. Due to improper privilege management, the process launches as the logged in user, so memory dump can be done by non-admin also. Remotely, an attacker can dump all sensitive information including DB Connection string, entire IT infrastructure details, commands executed by IT admin including credentials, secrets, private keys and more. | CWE-269 |
168,897 | CVE-2021-42972 | 8.8 | 7.2 | HIGH | NoMachine Server is affected by Buffer Overflow. IOCTL Handler 0x22001B in the NoMachine Server above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,898 | CVE-2021-42973 | 8.8 | 7.2 | HIGH | NoMachine Server is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Server above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,899 | CVE-2021-42976 | 8.8 | 7.2 | HIGH | NoMachine Enterprise Desktop is affected by Buffer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,900 | CVE-2021-42977 | 8.8 | 7.2 | HIGH | NoMachine Enterprise Desktop is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Desktop above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
Subsets and Splits