ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
168,901 | CVE-2021-42979 | 8.8 | 7.2 | HIGH | NoMachine Cloud Server is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Cloud Server above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,902 | CVE-2021-42980 | 8.8 | 7.2 | HIGH | NoMachine Cloud Server is affected by Buffer Overflow. IOCTL Handler 0x22001B in the NoMachine Cloud Server above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,903 | CVE-2021-42983 | 8.8 | 7.2 | HIGH | NoMachine Enterprise Client is affected by Buffer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Client above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,904 | CVE-2021-42986 | 8.8 | 7.2 | HIGH | NoMachine Enterprise Client is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Client above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,905 | CVE-2021-42987 | 8.8 | 7.2 | HIGH | Eltima USB Network Gate is affected by Integer Overflow. IOCTL Handler 0x22001B in the USB Network Gate above 7.0.1370 below 9.2.2420 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,906 | CVE-2021-42988 | 8.8 | 7.2 | HIGH | Eltima USB Network Gate is affected by Buffer Overflow. IOCTL Handler 0x22001B in the USB Network Gate above 7.0.1370 below 9.2.2420 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,907 | CVE-2021-42990 | 8.8 | 7.2 | HIGH | FlexiHub For Windows is affected by Buffer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below 5.3.14268 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,908 | CVE-2021-42993 | 8.8 | 7.2 | HIGH | FlexiHub For Windows is affected by Integer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below 5.3.14268 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,909 | CVE-2021-42994 | 8.8 | 7.2 | HIGH | Donglify is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Donglify above 1.0.12309 below 1.7.14110 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,910 | CVE-2021-42996 | 8.8 | 7.2 | HIGH | Donglify is affected by Integer Overflow. IOCTL Handler 0x22001B in the Donglify above 1.0.12309 below 1.7.14110 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,911 | CVE-2021-43000 | 8.8 | 7.2 | HIGH | Amzetta zPortal Windows zClient is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal Windows zClient <= v3.2.8180.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,912 | CVE-2021-43002 | 8.8 | 7.2 | HIGH | Amzetta zPortal DVM Tools is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal DVM Tools <= v3.3.148.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
168,913 | CVE-2021-43003 | 8.8 | 7.2 | HIGH | Amzetta zPortal Windows zClient is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal Windows zClient <= v3.2.8180.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,914 | CVE-2021-43006 | 8.8 | 7.2 | HIGH | AmZetta Amzetta zPortal DVM Tools is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal DVM Tools <= v3.3.148.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
168,915 | CVE-2021-43011 | 7.8 | 9.3 | HIGH | Adobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file. | CWE-788 |
168,916 | CVE-2021-43012 | 7.8 | 9.3 | HIGH | Adobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file. | CWE-788 |
168,917 | CVE-2021-43013 | 7.8 | 9.3 | HIGH | Adobe Media Encoder version 15.4.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-788 |
168,918 | CVE-2021-43015 | 7.8 | 9.3 | HIGH | Adobe InCopy version 16.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious GIF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability. | CWE-788 |
168,919 | CVE-2021-43016 | 5.5 | 4.3 | MEDIUM | Adobe InCopy version 16.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-476 |
168,920 | CVE-2021-43017 | 5.7 | 3.5 | MEDIUM | Adobe Creative Cloud version 5.5 (and earlier) are affected by an Application denial of service vulnerability in the Creative Cloud Desktop installer. An authenticated attacker could leverage this vulnerability to achieve denial of service in the context of the user. User interaction is required before product installation to abuse this vulnerability. | NVD-CWE-Other |
168,921 | CVE-2021-43017 | 5.7 | 3.5 | MEDIUM | Adobe Creative Cloud version 5.5 (and earlier) are affected by an Application denial of service vulnerability in the Creative Cloud Desktop installer. An authenticated attacker could leverage this vulnerability to achieve denial of service in the context of the user. User interaction is required before product installation to abuse this vulnerability. | CWE-379 |
168,922 | CVE-2021-43019 | 7.8 | 9.3 | HIGH | Adobe Creative Cloud version 5.5 (and earlier) are affected by a privilege escalation vulnerability in the resources leveraged by the Setup.exe service. An unauthenticated attacker could leverage this vulnerability to remove files and escalate privileges under the context of SYSTEM . An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability on the product installer. User interaction is required before product installation to abuse this vulnerability. | CWE-284 |
168,923 | CVE-2021-43021 | 7.8 | 9.3 | HIGH | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EXR file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-787 |
168,924 | CVE-2021-43022 | 7.8 | 9.3 | HIGH | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious PNG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-787 |
168,925 | CVE-2021-43023 | 7.8 | 9.3 | HIGH | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EPS/TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-787 |
168,926 | CVE-2021-43024 | 7.8 | 9.3 | HIGH | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-787 |
168,927 | CVE-2021-43025 | 7.8 | 9.3 | HIGH | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-787 |
168,928 | CVE-2021-43026 | 7.8 | 9.3 | HIGH | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-787 |
168,929 | CVE-2021-43028 | 7.8 | 9.3 | HIGH | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-787 |
168,930 | CVE-2021-43029 | 7.8 | 9.3 | HIGH | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | CWE-787 |
168,931 | CVE-2021-43030 | 5.5 | 4.3 | MEDIUM | Adobe Premiere Rush versions 1.5.16 (and earlier) allows access to an uninitialized pointer vulnerability that allows remote attackers to disclose sensitive information on affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of MP4 files. The issue results from the lack of proper initialization of memory prior to accessing it. | CWE-824 |
168,932 | CVE-2021-43032 | 4.8 | 3.5 | MEDIUM | In XenForo through 2.2.7, a threat actor with access to the admin panel can create a new Advertisement via the Advertising function, and save an XSS payload in the body of the HTML document. This payload will execute globally on the client side. | CWE-79 |
168,933 | CVE-2021-43033 | 9.8 | 10 | CRITICAL | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. Multiple functions in the bpserverd daemon were vulnerable to arbitrary remote code execution as root. The vulnerability was caused by untrusted input (received by the server) being passed to system calls. | CWE-20 |
168,934 | CVE-2021-43034 | 7.8 | 4.6 | HIGH | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. A world writable file allowed local users to execute arbitrary code as the user apache, leading to privilege escalation. | CWE-269 |
168,935 | CVE-2021-43035 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. Two unauthenticated SQL injection vulnerabilities were discovered, allowing arbitrary SQL queries to be injected and executed under the postgres superuser account. Remote code execution was possible, leading to full access to the postgres user account. | CWE-89 |
168,936 | CVE-2021-43036 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The password for the PostgreSQL wguest account is weak. | CWE-521 |
168,937 | CVE-2021-43037 | 7.8 | 6.9 | HIGH | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Unitrends Windows agent was vulnerable to DLL injection and binary planting due to insecure default permissions. This allowed privilege escalation from an unprivileged user to SYSTEM. | CWE-427 |
168,938 | CVE-2021-43038 | 8.8 | 6.5 | HIGH | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The wguest account could execute commands by injecting into PostgreSQL trigger functions. This allowed privilege escalation from the wguest user to the postgres user. | CWE-74 |
168,939 | CVE-2021-43039 | 6.5 | 6.4 | MEDIUM | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Samba file sharing service allowed anonymous read/write access. | CWE-668 |
168,940 | CVE-2021-43040 | 8.8 | 6.5 | HIGH | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The privileged vaultServer could be leveraged to create arbitrary writable files, leading to privilege escalation. | CWE-269 |
168,941 | CVE-2021-43041 | 8.8 | 6.5 | HIGH | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. A crafted HTTP request could induce a format string vulnerability in the privileged vaultServer application. | CWE-134 |
168,942 | CVE-2021-43042 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. A buffer overflow existed in the vaultServer component. This was exploitable by a remote unauthenticated attacker. | CWE-120 |
168,943 | CVE-2021-43043 | 6.5 | 4 | MEDIUM | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The apache user could read arbitrary files such as /etc/shadow by abusing an insecure Sudo rule. | CWE-668 |
168,944 | CVE-2021-43044 | 9.8 | 7.5 | CRITICAL | An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The SNMP daemon was configured with a weak default community. | CWE-798 |
168,945 | CVE-2021-43046 | 8.8 | 9.3 | HIGH | The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain an easily exploitable vulnerability that allows an unauthenticated attacker with network access to obtain session tokens for the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below. | NVD-CWE-noinfo |
168,946 | CVE-2021-43047 | 9 | 8.5 | CRITICAL | The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain easily exploitable Stored and Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below. | CWE-79 |
168,947 | CVE-2021-43048 | 9.8 | 10 | CRITICAL | The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below. | CWE-1021 |
168,948 | CVE-2021-43051 | 6.8 | 8.5 | MEDIUM | The Spotfire Server component of TIBCO Software Inc.'s TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains a difficult to exploit vulnerability that allows malicious custom API clients with network access to execute internal API operations outside of the scope of those granted to it. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Server: versions 10.10.6 and below, TIBCO Spotfire Server: versions 11.0.0, 11.1.0, 11.2.0, 11.3.0, 11.4.0, and 11.4.1, and TIBCO Spotfire Server: versions 11.5.0 and 11.6.0. | CWE-863 |
168,949 | CVE-2021-43056 | 5.5 | 4.9 | MEDIUM | An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values. | NVD-CWE-noinfo |
168,950 | CVE-2021-43057 | 7.8 | 7.2 | HIGH | An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task. | CWE-416 |
168,951 | CVE-2021-43058 | 6.1 | 5.8 | MEDIUM | An open redirect vulnerability exists in Replicated Classic versions prior to 2.53.1 that could lead to spoofing. To exploit this vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link, redirecting the user to an untrusted site. | CWE-601 |
168,952 | CVE-2021-43063 | 6.1 | 4.3 | MEDIUM | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the login webpage. | CWE-79 |
168,953 | CVE-2021-43064 | 6.1 | 5.8 | MEDIUM | A url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to use the device as a proxy and reach external or protected hosts via redirection handlers. | CWE-601 |
168,954 | CVE-2021-43065 | 7.8 | 7.2 | HIGH | A incorrect permission assignment for critical resource in Fortinet FortiNAC version 9.2.0, version 9.1.3 and below, version 8.8.9 and below allows attacker to gain higher privileges via the access to sensitive system data. | CWE-732 |
168,955 | CVE-2021-43067 | 6.5 | 4.3 | MEDIUM | A exposure of sensitive information to an unauthorized actor in Fortinet FortiAuthenticator version 6.4.0, version 6.3.2 and below, version 6.2.1 and below, version 6.1.2 and below, version 6.0.7 to 6.0.1 allows attacker to duplicate a target LDAP user 2 factors authentication token via crafted HTTP requests. | CWE-200 |
168,956 | CVE-2021-43068 | 8.1 | 5.5 | HIGH | A improper authentication in Fortinet FortiAuthenticator version 6.4.0 allows user to bypass the second factor of authentication via a RADIUS login portal. | CWE-287 |
168,957 | CVE-2021-43071 | 8.8 | 6.5 | HIGH | A heap-based buffer overflow in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the LogReport API controller. | CWE-787 |
168,958 | CVE-2021-43082 | 9.8 | 7.5 | CRITICAL | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the stats-over-http plugin of Apache Traffic Server allows an attacker to overwrite memory. This issue affects Apache Traffic Server 9.1.0. | CWE-120 |
168,959 | CVE-2021-43113 | 9.8 | 7.5 | CRITICAL | iTextPDF in iText before 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java. | CWE-77 |
168,960 | CVE-2021-43114 | 7.5 | 5 | HIGH | FORT Validator versions prior to 1.5.2 will crash if an RPKI CA publishes an X.509 EE certificate. This will lead to RTR clients such as BGP routers to lose access to the RPKI VRP data set, effectively disabling Route Origin Validation. | CWE-400 |
168,961 | CVE-2021-43117 | 9.8 | 10 | CRITICAL | fastadmin v1.2.1 is affected by a file upload vulnerability which allows arbitrary code execution through shell access. | CWE-434 |
168,962 | CVE-2021-43130 | 9.8 | 10 | CRITICAL | An SQL Injection vulnerability exists in Sourcecodester Customer Relationship Management System (CRM) 1.0 via the username parameter in customer/login.php. | CWE-89 |
168,963 | CVE-2021-43136 | 9.8 | 6.8 | CRITICAL | An authentication bypass issue in FormaLMS <= 2.4.4 allows an attacker to bypass the authentication mechanism and obtain a valid access to the platform. | CWE-287 |
168,964 | CVE-2021-43137 | 8.8 | 6.8 | HIGH | Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exits in hostel management system 2.1 via the name field in my-profile.php. Chaining to this both vulnerabilities leads to account takeover. | CWE-352 |
168,965 | CVE-2021-43137 | 8.8 | 6.8 | HIGH | Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exits in hostel management system 2.1 via the name field in my-profile.php. Chaining to this both vulnerabilities leads to account takeover. | CWE-79 |
168,966 | CVE-2021-43140 | 9.8 | 7.5 | CRITICAL | SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login. | CWE-89 |
168,967 | CVE-2021-43141 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0 via the id parameter in plan_application. | CWE-79 |
168,968 | CVE-2021-43155 | 9.8 | 7.5 | CRITICAL | Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the "bookisbn" parameter in cart.php. | CWE-89 |
168,969 | CVE-2021-43156 | 6.5 | 4.3 | MEDIUM | In ProjectWorlds Online Book Store PHP 1.0 a CSRF vulnerability in admin_delete.php allows a remote attacker to delete any book. | CWE-352 |
168,970 | CVE-2021-43157 | 9.8 | 7.5 | CRITICAL | Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php. | CWE-89 |
168,971 | CVE-2021-43158 | 4.3 | 4.3 | MEDIUM | In ProjectWorlds Online Shopping System PHP 1.0, a CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart. | CWE-352 |
168,972 | CVE-2021-43172 | 7.5 | 5 | HIGH | NLnet Labs Routinator prior to 0.10.2 happily processes a chain of RRDP repositories of infinite length causing it to never finish a validation run. In RPKI, a CA can choose the RRDP repository it wishes to publish its data in. By continuously generating a new child CA that only consists of another CA using a different RRDP repository, a malicious CA can create a chain of CAs of de-facto infinite length. Routinator prior to version 0.10.2 did not contain a limit on the length of such a chain and will therefore continue to process this chain forever. As a result, the validation run will never finish, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all. | CWE-674 |
168,973 | CVE-2021-43173 | 7.5 | 5 | HIGH | In NLnet Labs Routinator prior to 0.10.2, a validation run can be delayed significantly by an RRDP repository by not answering but slowly drip-feeding bytes to keep the connection alive. This can be used to effectively stall validation. While Routinator has a configurable time-out value for RRDP connections, this time-out was only applied to individual read or write operations rather than the complete request. Thus, if an RRDP repository sends a little bit of data before that time-out expired, it can continuously extend the time it takes for the request to finish. Since validation will only continue once the update of an RRDP repository has concluded, this delay will cause validation to stall, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all. | CWE-755 |
168,974 | CVE-2021-43174 | 7.5 | 5 | HIGH | NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element. | CWE-787 |
168,975 | CVE-2021-43175 | 7.5 | 5 | HIGH | The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 exposes an API router that accepts a username, password, and action that routes to other PHP files that implement the various API functions. Vulnerable versions of GOautodial validate the username and password incorrectly, allowing the caller to specify any values for these parameters and successfully authenticate. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C | CWE-287 |
168,976 | CVE-2021-43176 | 8.8 | 6.5 | HIGH | The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 takes a user-supplied “action” parameter and appends a .php file extension to locate and load the correct PHP file to implement the API call. Vulnerable versions of GOautodial do not sanitize the user input that specifies the action. This permits an attacker to execute any PHP source file with a .php extension that is present on the disk and readable by the GOautodial web server process. Combined with CVE-2021-43175, it is possible for the attacker to do this without valid credentials. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C | CWE-22 |
168,977 | CVE-2021-43180 | 7.5 | 5 | HIGH | In JetBrains Hub before 2021.1.13690, information disclosure via avatar metadata is possible. | NVD-CWE-noinfo |
168,978 | CVE-2021-43181 | 6.1 | 4.3 | MEDIUM | In JetBrains Hub before 2021.1.13690, stored XSS is possible. | CWE-79 |
168,979 | CVE-2021-43182 | 7.5 | 5 | HIGH | In JetBrains Hub before 2021.1.13415, a DoS via user information is possible. | NVD-CWE-noinfo |
168,980 | CVE-2021-43183 | 9.8 | 7.5 | CRITICAL | In JetBrains Hub before 2021.1.13690, the authentication throttling mechanism could be bypassed. | CWE-287 |
168,981 | CVE-2021-43184 | 5.4 | 3.5 | MEDIUM | In JetBrains YouTrack before 2021.3.21051, stored XSS is possible. | CWE-79 |
168,982 | CVE-2021-43185 | 9.8 | 7.5 | CRITICAL | JetBrains YouTrack before 2021.3.23639 is vulnerable to Host header injection. | CWE-74 |
168,983 | CVE-2021-43186 | 5.4 | 3.5 | MEDIUM | JetBrains YouTrack before 2021.3.24402 is vulnerable to stored XSS. | CWE-79 |
168,984 | CVE-2021-43187 | 5.3 | 5 | MEDIUM | In JetBrains YouTrack Mobile before 2021.2, the client-side cache on iOS could contain sensitive information. | NVD-CWE-noinfo |
168,985 | CVE-2021-43188 | 7.3 | 7.5 | HIGH | In JetBrains YouTrack Mobile before 2021.2, access token protection on iOS is incomplete. | NVD-CWE-noinfo |
168,986 | CVE-2021-43189 | 7.3 | 7.5 | HIGH | In JetBrains YouTrack Mobile before 2021.2, access token protection on Android is incomplete. | NVD-CWE-noinfo |
168,987 | CVE-2021-43190 | 5.3 | 5 | MEDIUM | In JetBrains YouTrack Mobile before 2021.2, task hijacking on Android is possible. | NVD-CWE-noinfo |
168,988 | CVE-2021-43191 | 5.3 | 5 | MEDIUM | JetBrains YouTrack Mobile before 2021.2, is missing the security screen on Android and iOS. | NVD-CWE-noinfo |
168,989 | CVE-2021-43192 | 5.3 | 5 | MEDIUM | In JetBrains YouTrack Mobile before 2021.2, iOS URL scheme hijacking is possible. | NVD-CWE-noinfo |
168,990 | CVE-2021-43193 | 9.8 | 7.5 | CRITICAL | In JetBrains TeamCity before 2021.1.2, remote code execution via the agent push functionality is possible. | NVD-CWE-noinfo |
168,991 | CVE-2021-43194 | 5.3 | 5 | MEDIUM | In JetBrains TeamCity before 2021.1.2, user enumeration was possible. | NVD-CWE-noinfo |
168,992 | CVE-2021-43195 | 5.3 | 5 | MEDIUM | In JetBrains TeamCity before 2021.1.2, some HTTP security headers were missing. | NVD-CWE-noinfo |
168,993 | CVE-2021-43196 | 7.5 | 5 | HIGH | In JetBrains TeamCity before 2021.1, information disclosure via the Docker Registry connection dialog is possible. | CWE-668 |
168,994 | CVE-2021-43197 | 6.1 | 4.3 | MEDIUM | In JetBrains TeamCity before 2021.1.2, email notifications could include unescaped HTML for XSS. | CWE-79 |
168,995 | CVE-2021-43198 | 5.4 | 3.5 | MEDIUM | In JetBrains TeamCity before 2021.1.2, stored XSS is possible. | CWE-79 |
168,996 | CVE-2021-43199 | 5.3 | 5 | MEDIUM | In JetBrains TeamCity before 2021.1.2, permission checks in the Create Patch functionality are insufficient. | CWE-276 |
168,997 | CVE-2021-43200 | 9.8 | 7.5 | CRITICAL | In JetBrains TeamCity before 2021.1.2, permission checks in the Agent Push functionality were insufficient. | NVD-CWE-noinfo |
168,998 | CVE-2021-43201 | 5.3 | 5 | MEDIUM | In JetBrains TeamCity before 2021.1.3, a newly created project could take settings from an already deleted project. | NVD-CWE-noinfo |
168,999 | CVE-2021-43202 | 9.8 | 7.5 | CRITICAL | In JetBrains TeamCity before 2021.1.3, the X-Frame-Options header is missing in some cases. | NVD-CWE-noinfo |
169,000 | CVE-2021-43203 | 7.5 | 5 | HIGH | In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly. | CWE-287 |
Subsets and Splits