ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
169,101 | CVE-2021-43439 | 9.8 | 10 | CRITICAL | RCE in Add Review Function in iResturant 1.0 Allows remote attacker to execute commands remotely | CWE-74 |
169,102 | CVE-2021-43440 | 6.1 | 4.3 | MEDIUM | Multiple Stored XSS Vulnerabilities in the Source Code of iOrder 1.0 allow remote attackers to execute arbitrary code via signup form in the Name and Phone number field. | CWE-79 |
169,103 | CVE-2021-43441 | 5.3 | 5 | MEDIUM | An HTML Injection Vulnerability in iOrder 1.0 allows the remote attacker to execute Malicious HTML codes via the signup form | CWE-74 |
169,104 | CVE-2021-43451 | 9.8 | 7.5 | CRITICAL | SQL Injection vulnerability exists in PHPGURUKUL Employee Record Management System 1.2 via the Email POST parameter in /forgetpassword.php. | CWE-89 |
169,105 | CVE-2021-43466 | 9.8 | 6.8 | CRITICAL | In the thymeleaf-spring5:3.0.12 component, thymeleaf combined with specific scenarios in template injection may lead to remote code execution. | CWE-94 |
169,106 | CVE-2021-43469 | 8.8 | 6.5 | HIGH | VINGA WR-N300U 77.102.1.4853 is affected by a command execution vulnerability in the goahead component. | CWE-77 |
169,107 | CVE-2021-43471 | 7.5 | 7.8 | HIGH | In Canon LBP223 printers, the System Manager Mode login does not require an account password or PIN. An attacker can remotely shut down the device after entering the background, creating a denial of service vulnerability. | CWE-521 |
169,108 | CVE-2021-43492 | 7.5 | 5 | HIGH | AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system andcan significantly aid in getting remote code access. | CWE-22 |
169,109 | CVE-2021-43493 | 7.5 | 5 | HIGH | ServerManagement master branch as of commit 49491cc6f94980e6be7791d17be947c27071eb56 is affected by a directory traversal vulnerability. This vulnerability can be used to extract credentials which can in turn be used to execute code. | CWE-22 |
169,110 | CVE-2021-43494 | 7.5 | 5 | HIGH | OpenCV-REST-API master branch as of commit 69be158c05d4dd5a4aff38fdc680a162dd6b9e49 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access. | CWE-22 |
169,111 | CVE-2021-43495 | 7.5 | 5 | HIGH | AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access. | CWE-22 |
169,112 | CVE-2021-43496 | 7.5 | 5 | HIGH | Clustering master branch as of commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access. | CWE-22 |
169,113 | CVE-2021-43518 | 7.8 | 6.8 | HIGH | Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution. | CWE-120 |
169,114 | CVE-2021-43519 | 5.5 | 4.3 | MEDIUM | Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file. | CWE-787 |
169,115 | CVE-2021-43523 | 9.6 | 6.8 | CRITICAL | In uClibc and uClibc-ng before 1.0.39, incorrect handling of special characters in domain names returned by DNS servers via gethostbyname, getaddrinfo, gethostbyaddr, and getnameinfo can lead to output of wrong hostnames (leading to domain hijacking) or injection into applications (leading to remote code execution, XSS, applications crashes, etc.). In other words, a validation step, which is expected in any stub resolver, does not occur. | CWE-79 |
169,116 | CVE-2021-43527 | 9.8 | 7.5 | CRITICAL | NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1. | CWE-787 |
169,117 | CVE-2021-43528 | 6.5 | 4.3 | MEDIUM | Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0. | CWE-269 |
169,118 | CVE-2021-43530 | 6.1 | 4.3 | MEDIUM | A Universal XSS vulnerability was present in Firefox for Android resulting from improper sanitization when processing a URL scanned from a QR code. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 94. | CWE-79 |
169,119 | CVE-2021-43531 | 4.3 | 4.3 | MEDIUM | When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked. If the Web Extension lacked the WebRequest permission for the hosts involved in the redirect, this would be a same-origin-violation leaking data the Web Extension should have access to. This was fixed to provide the pre-redirect URL. This is related to CVE-2021-43532 but in the context of Web Extensions. This vulnerability affects Firefox < 94. | CWE-346 |
169,120 | CVE-2021-43532 | 6.1 | 5.8 | MEDIUM | The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox < 94. | CWE-601 |
169,121 | CVE-2021-43533 | 4.3 | 4.3 | MEDIUM | When parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishing. This vulnerability affects Firefox < 94. | NVD-CWE-noinfo |
169,122 | CVE-2021-43534 | 8.8 | 6.8 | HIGH | Mozilla developers and community members reported memory safety bugs present in Firefox 93 and Firefox ESR 91.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3. | CWE-787 |
169,123 | CVE-2021-43535 | 8.8 | 6.8 | HIGH | A use-after-free could have occured when an HTTP2 session object was released on a different thread, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.3, and Firefox ESR < 91.3. | CWE-416 |
169,124 | CVE-2021-43536 | 6.5 | 4.3 | MEDIUM | Under certain circumstances, asynchronous functions could have caused a navigation to fail but expose the target URL. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. | CWE-668 |
169,125 | CVE-2021-43537 | 8.8 | 6.8 | HIGH | An incorrect type conversion of sizes from 64bit to 32bit integers allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. | CWE-704 |
169,126 | CVE-2021-43538 | 4.3 | 4.3 | MEDIUM | By misusing a race in our notification code, an attacker could have forcefully hidden the notification for pages that had received full screen and pointer lock access, which could have been used for spoofing attacks. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. | CWE-362 |
169,127 | CVE-2021-43539 | 8.8 | 6.8 | HIGH | Failure to correctly record the location of live pointers across wasm instance calls resulted in a GC occurring within the call not tracing those live pointers. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. | CWE-416 |
169,128 | CVE-2021-43540 | 6.5 | 4.3 | MEDIUM | WebExtensions with the correct permissions were able to create and install ServiceWorkers for third-party websites that would not have been uninstalled with the extension. This vulnerability affects Firefox < 95. | CWE-732 |
169,129 | CVE-2021-43541 | 6.5 | 4.3 | MEDIUM | When invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. | NVD-CWE-Other |
169,130 | CVE-2021-43542 | 6.5 | 4.3 | MEDIUM | Using XMLHttpRequest, an attacker could have identified installed applications by probing error messages for loading external protocols. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. | CWE-209 |
169,131 | CVE-2021-43543 | 6.1 | 4.3 | MEDIUM | Documents loaded with the CSP sandbox directive could have escaped the sandbox's script restriction by embedding additional content. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. | CWE-79 |
169,132 | CVE-2021-43544 | 6.1 | 4.3 | MEDIUM | When receiving a URL through a SEND intent, Firefox would have searched for the text, but subsequent usages of the address bar might have caused the URL to load unintentionally, which could lead to XSS and spoofing attacks. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 95. | CWE-79 |
169,133 | CVE-2021-43545 | 6.5 | 4.3 | MEDIUM | Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. | CWE-834 |
169,134 | CVE-2021-43546 | 4.3 | 4.3 | MEDIUM | It was possible to recreate previous cursor spoofing attacks against users with a zoomed native cursor. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95. | CWE-1021 |
169,135 | CVE-2021-43548 | null | null | null | Patient Information Center iX (PIC iX) Versions C.02 and C.03 receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly. | CWE-20 |
169,136 | CVE-2021-43549 | 4.8 | 3.5 | MEDIUM | A remote authenticated attacker with write access to a PI Server could trick a user into interacting with a PI Web API endpoint and redirect them to a malicious website. As a result, a victim may disclose sensitive information to the attacker or be provided with false information. | CWE-79 |
169,137 | CVE-2021-43551 | 5.4 | 3.5 | MEDIUM | A remote attacker with write access to PI Vision could inject code into a display. Unauthorized information disclosure, modification, or deletion is possible if a victim views or interacts with the infected display using Microsoft Internet Explorer. The impact affects PI System data and other data accessible with victim’s user permissions. | CWE-79 |
169,138 | CVE-2021-43552 | null | null | null | The use of a hard-coded cryptographic key significantly increases the possibility encrypted data may be recovered from the Patient Information Center iX (PIC iX) Versions B.02, C.02, and C.03. | CWE-321 |
169,139 | CVE-2021-43553 | 4.3 | 4 | MEDIUM | PI Vision could disclose information to a user with insufficient privileges for an AF attribute that is the child of another attribute and is configured as a Limits property. | CWE-863 |
169,140 | CVE-2021-43554 | null | null | null | FATEK WinProladder Versions 3.30_24518 and prior are vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code. | CWE-787 |
169,141 | CVE-2021-43555 | 7.8 | 6.8 | HIGH | mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution. | CWE-23 |
169,142 | CVE-2021-43556 | null | null | null | FATEK WinProladder Versions 3.30_24518 and prior are vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code. | CWE-121 |
169,143 | CVE-2021-43557 | 7.5 | 5 | HIGH | The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $request_uri is the full original request URI without normalization. This makes it possible to construct a URI to bypass the block list on some occasions. For instance, when the block list contains "^/internal/", a URI like `//internal/` can be used to bypass it. Some other plugins also have the same issue. And it may affect the developer's custom plugin. | CWE-77 |
169,144 | CVE-2021-43558 | 6.1 | 4.3 | MEDIUM | A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A URL parameter in the filetype site administrator tool required extra sanitizing to prevent a reflected XSS risk. | CWE-79 |
169,145 | CVE-2021-43559 | 8.8 | 6.8 | HIGH | A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. The "delete related badge" functionality did not include the necessary token check to prevent a CSRF risk. | CWE-352 |
169,146 | CVE-2021-43560 | 5.3 | 5 | MEDIUM | A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. Insufficient capability checks made it possible to fetch other users' calendar action events. | CWE-668 |
169,147 | CVE-2021-43561 | 5.4 | 3.5 | MEDIUM | An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | CWE-79 |
169,148 | CVE-2021-43562 | 8.8 | 6.5 | HIGH | An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The extension fails to restrict the image download to the configured pixx.io DAM URL, resulting in SSRF. As a result, an attacker can download various content from a remote location and save it to a user-controlled filename, which may result in Remote Code Execution. A TYPO3 backend user account is required to exploit this. | CWE-918 |
169,149 | CVE-2021-43563 | 8.8 | 6.5 | HIGH | An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The Access Control in the bundled media browser is broken, which allows an unauthenticated attacker to perform requests to the pixx.io API for the configured API user. This allows an attacker to download various media files from the DAM system. | CWE-287 |
169,150 | CVE-2021-43564 | 7.5 | 5 | HIGH | An issue was discovered in the jobfair (aka Job Fair) extension before 1.0.13 and 2.x before 2.0.2 for TYPO3. The extension fails to protect or obfuscate filenames of uploaded files. This allows unauthenticated users to download files with sensitive data by simply guessing the filename of uploaded files (e.g., uploads/tx_jobfair/cv.pdf). | CWE-200 |
169,151 | CVE-2021-43568 | 9.8 | 7.5 | CRITICAL | The verify function in the Stark Bank Elixir ECDSA library (ecdsa-elixir) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | CWE-347 |
169,152 | CVE-2021-43569 | 9.8 | 7.5 | CRITICAL | The verify function in the Stark Bank .NET ECDSA library (ecdsa-dotnet) 1.3.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | CWE-347 |
169,153 | CVE-2021-43570 | 9.8 | 7.5 | CRITICAL | The verify function in the Stark Bank Java ECDSA library (ecdsa-java) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | CWE-347 |
169,154 | CVE-2021-43571 | 9.8 | 7.5 | CRITICAL | The verify function in the Stark Bank Node.js ECDSA library (ecdsa-node) 1.1.2 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | CWE-347 |
169,155 | CVE-2021-43572 | 9.8 | 7.5 | CRITICAL | The verify function in the Stark Bank Python ECDSA library (ecdsa-python) 2.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages. | CWE-347 |
169,156 | CVE-2021-43573 | 9.8 | 7.5 | CRITICAL | A buffer overflow was discovered on Realtek RTL8195AM devices before 2.0.10. It exists in the client code when processing a malformed IE length of HT capability information in the Beacon and Association response frame. | CWE-120 |
169,157 | CVE-2021-43574 | 6.1 | 4.3 | MEDIUM | ** UNSUPPORTED WHEN ASSIGNED ** WebAdmin Control Panel in Atmail 6.5.0 (a version released in 2012) allows XSS via the format parameter to the default URI. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | CWE-79 |
169,158 | CVE-2021-43575 | 5.5 | 2.1 | MEDIUM | ** DISPUTED ** KNX ETS6 through 6.0.0 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information, a similar issue to CVE-2021-36799. NOTE: The vendor disputes this because it is not the responsibility of the ETS to securely store cryptographic key material when it is not being exported. | CWE-798 |
169,159 | CVE-2021-43576 | 6.5 | 4.3 | MEDIUM | Jenkins pom2config Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks, allowing attackers with Overall/Read and Item/Read permissions to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery. | CWE-611 |
169,160 | CVE-2021-43577 | 7.1 | 5.5 | HIGH | Jenkins OWASP Dependency-Check Plugin 5.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | CWE-611 |
169,161 | CVE-2021-43578 | 8.1 | 5.5 | HIGH | Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string. | CWE-693 |
169,162 | CVE-2021-43581 | 8.8 | 6.8 | HIGH | An Out-of-Bounds Read vulnerability exists when reading a U3D file using Open Design Alliance PRC SDK before 2022.11. The specific issue exists within the parsing of U3D files. Incorrect use of the LibJpeg source manager inside the U3D library, and crafted data in a U3D file, can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. | CWE-125 |
169,163 | CVE-2021-43582 | 7.8 | 6.8 | HIGH | A Use-After-Free Remote Vulnerability exists when reading a DWG file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DWG files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. | CWE-416 |
169,164 | CVE-2021-43587 | null | null | null | Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges. | CWE-321 |
169,165 | CVE-2021-43608 | 9.8 | 7.5 | CRITICAL | Doctrine DBAL 3.x before 3.1.4 allows SQL Injection. The escaping of offset and length inputs to the generation of a LIMIT clause was not probably cast to an integer, allowing SQL injection to take place if application developers passed unescaped user input to the DBAL QueryBuilder or any other API that ultimately uses the AbstractPlatform::modifyLimitQuery API. | CWE-89 |
169,166 | CVE-2021-43610 | 7.5 | 5 | HIGH | Belledonne Belle-sip before 5.0.20 can crash applications such as Linphone via an invalid From header (request URI without a parameter) in an unauthenticated SIP message, a different issue than CVE-2021-33056. | CWE-444 |
169,167 | CVE-2021-43611 | 7.5 | 5 | HIGH | Belledonne Belle-sip before 5.0.20 can crash applications such as Linphone via " \ " in the display name of a From header. | CWE-404 |
169,168 | CVE-2021-43616 | 9.8 | 7.5 | CRITICAL | The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. | CWE-345 |
169,169 | CVE-2021-43617 | 9.8 | 7.5 | CRITICAL | Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. NOTE: this CVE Record is for Laravel Framework, and is unrelated to any reports concerning incorrectly written user applications for image upload. | CWE-434 |
169,170 | CVE-2021-43618 | 7.5 | 5 | HIGH | GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms. | CWE-190 |
169,171 | CVE-2021-43620 | 7.5 | 5 | HIGH | An issue was discovered in the fruity crate through 0.2.0 for Rust. Security-relevant validation of filename extensions is plausibly affected. Methods of NSString for conversion to a string may return a partial result. Because they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first '\0' byte, which might not be the end of the string. | NVD-CWE-Other |
169,172 | CVE-2021-43628 | 9.8 | 7.5 | CRITICAL | Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the email parameter in hms-staff.php. | CWE-89 |
169,173 | CVE-2021-43629 | 9.8 | 7.5 | CRITICAL | Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in admin_home.php. | CWE-89 |
169,174 | CVE-2021-43630 | 8.8 | 6.5 | HIGH | Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server. | CWE-89 |
169,175 | CVE-2021-43631 | 9.8 | 7.5 | CRITICAL | Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the appointment_no parameter in payment.php. | CWE-89 |
169,176 | CVE-2021-43637 | 8.8 | 7.2 | HIGH | Amazon WorkSpaces agent is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Amazon WorkSpaces agent below v1.0.1.1537 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-120 |
169,177 | CVE-2021-43638 | 8.8 | 7.2 | HIGH | Amazon Amazon WorkSpaces agent is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amazon WorkSpaces agent below v1.0.1.1537 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet. | CWE-190 |
169,178 | CVE-2021-43667 | 7.5 | 5 | HIGH | A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.1.0. This bug can be leveraged by constructing a message whose payload is nil and sending this message with the method 'forwardToLeader'. This bug has been admitted and fixed by the developers of Fabric. If leveraged, any leader node will crash. | CWE-476 |
169,179 | CVE-2021-43668 | 5.5 | 2.1 | MEDIUM | Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with "runtime error: invalid memory address or nil pointer dereference" and arise a SEGV signal. | CWE-476 |
169,180 | CVE-2021-43669 | 7.5 | 5 | HIGH | A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.0.1, v2.3.0. It can easily break down as many orderers as the attacker wants. This bug can be leveraged by constructing a message whose header is invalid to the interface Order. This bug has been admitted and fixed by the developers of Fabric. | CWE-444 |
169,181 | CVE-2021-43673 | 6.1 | 4.3 | MEDIUM | dzzoffice 2.02.1_SC_UTF8 is affected by a Cross Site Scripting (XSS) vulnerability in explorerfile.php. The output of the exit function is printed for the user via exit(json_encode($return)). | CWE-79 |
169,182 | CVE-2021-43674 | 9.8 | 7.5 | CRITICAL | ** UNSUPPORTED WHEN ASSIGNED ** ThinkUp 2.0-beta.10 is affected by a path manipulation vulnerability in Smarty.class.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | CWE-22 |
169,183 | CVE-2021-43675 | 6.1 | 4.3 | MEDIUM | Lychee-v3 3.2.16 is affected by a Cross Site Scripting (XSS) vulnerability in php/Access/Guest.php. The function exit will terminate the script and print the message to the user. The message will contain albumID which is controlled by the user. | CWE-79 |
169,184 | CVE-2021-43676 | 9.8 | 7.5 | CRITICAL | matyhtf framework v3.0.5 is affected by a path manipulation vulnerability in Smarty.class.php. | CWE-22 |
169,185 | CVE-2021-43678 | 6.1 | 4.3 | MEDIUM | Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php. | CWE-79 |
169,186 | CVE-2021-43679 | 9.8 | 7.5 | CRITICAL | ecshop v2.7.3 is affected by a SQL injection vulnerability in shopex\ecshop\upload\api\client\api.php. | CWE-89 |
169,187 | CVE-2021-43681 | 6.1 | 4.3 | MEDIUM | SakuraPanel v1.0.1.1 is affected by a Cross Site Scripting (XSS) vulnerability in /master/core/PostHandler.php. The exit function will terminate the script and print the message $data['proxy_name']. | CWE-79 |
169,188 | CVE-2021-43682 | 6.1 | 4.3 | MEDIUM | thinkphp-bjyblog (last update Jun 4 2021) is affected by a Cross Site Scripting (XSS) vulnerability in AdminBaseController.class.php. The exit function terminates the script and prints a message to the user that contains $_SERVER['HTTP_HOST']. | CWE-79 |
169,189 | CVE-2021-43683 | 6.1 | 4.3 | MEDIUM | pictshare v1.5 is affected by a Cross Site Scripting (XSS) vulnerability in api/info.php. The exit function will terminate the script and print the message which has $_REQUEST['hash']. | CWE-79 |
169,190 | CVE-2021-43685 | 9.8 | 7.5 | CRITICAL | libretime hv3.0.0-alpha.10 is affected by a path manipulation vulnerability in /blob/master/legacy/application/modules/rest/controllers/ShowImageController.php through the rename function. | CWE-610 |
169,191 | CVE-2021-43686 | 6.1 | 4.3 | MEDIUM | nZEDb v0.4.20 is affected by a Cross Site Scripting (XSS) vulnerability in www/pages/api.php. The exit function will terminate the script and print the message which has the input $_GET['t']. | CWE-79 |
169,192 | CVE-2021-43687 | 6.1 | 4.3 | MEDIUM | chamilo-lms v1.11.14 is affected by a Cross Site Scripting (XSS) vulnerability in /plugin/jcapture/applet.php if an attacker passes a message hex2bin in the cookie. | CWE-79 |
169,193 | CVE-2021-43689 | 6.1 | 4.3 | MEDIUM | manage (last update Oct 24, 2017) is affected by a Cross Site Scripting (XSS) vulnerability in Application/Home/Controller/GoodsController.class.php. The exit function will terminate the script and print a message which have values from $_POST. | CWE-79 |
169,194 | CVE-2021-43690 | 6.1 | 4.3 | MEDIUM | YurunProxy v0.01 is affected by a Cross Site Scripting (XSS) vulnerability in src/Client.php. The exit function will terminate the script and print a message which have values from the socket_read. | CWE-79 |
169,195 | CVE-2021-43691 | 9.8 | 7.5 | CRITICAL | tripexpress v1.1 is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability. | CWE-22 |
169,196 | CVE-2021-43692 | 6.1 | 4.3 | MEDIUM | youtube-php-mirroring (last update Jun 9, 2017) is affected by a Cross Site Scripting (XSS) vulnerability in file ytproxy/index.php. | CWE-79 |
169,197 | CVE-2021-43693 | 9.8 | 7.5 | CRITICAL | vesta 0.9.8-24 is affected by a file inclusion vulnerability in file web/add/user/index.php. | NVD-CWE-Other |
169,198 | CVE-2021-43695 | 6.1 | 4.3 | MEDIUM | issabelPBX version 2.11 is affected by a Cross Site Scripting (XSS) vulnerability. In file page.backup_restore.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST without sanitization, then there is a XSS vulnerability. | CWE-79 |
169,199 | CVE-2021-43696 | 6.1 | 4.3 | MEDIUM | twmap v2.91_v4.33 is affected by a Cross Site Scripting (XSS) vulnerability. In file list.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST then there is a XSS vulnerability. | CWE-79 |
169,200 | CVE-2021-43697 | 6.1 | 4.3 | MEDIUM | Workerman-ThinkPHP-Redis (last update Mar 16, 2018) is affected by a Cross Site Scripting (XSS) vulnerability. In file Controller.class.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET{C('VAR_JSONP_HANDLER')] then there is a XSS vulnerability. | CWE-79 |
Subsets and Splits