ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
169,501 | CVE-2021-44848 | 5.3 | 5 | MEDIUM | In Cibele Thinfinity VirtualUI before 3.0, /changePassword returns different responses for invalid authentication requests depending on whether the username exists. | CWE-287 |
169,502 | CVE-2021-44857 | 6.5 | 4 | MEDIUM | An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=mcrundo followed by action=mcrrestore to replace the content of any arbitrary page (that the user doesn't have edit rights for). This applies to any public wiki, or a private wiki that has at least one page set in $wgWhitelistRead. | CWE-269 |
169,503 | CVE-2021-44858 | 7.5 | 5 | HIGH | An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=edit&undo= followed by action=mcrundo and action=mcrrestore to view private pages on a private wiki that has at least one page set in $wgWhitelistRead. | CWE-276 |
169,504 | CVE-2021-44859 | 7.8 | 6.8 | HIGH | An out-of-bounds read vulnerability exists when reading a TGA file using Open Design Alliance Drawings SDK before 2022.12. The specific issue exists after loading TGA files. An unchecked input data from a crafted TGA file leads to an out-of-bounds read. An attacker can leverage this vulnerability to execute code in the context of the current process. | CWE-125 |
169,505 | CVE-2021-44860 | 7.8 | 6.8 | HIGH | An out-of-bounds read vulnerability exists when reading a TIF file using Open Design Alliance Drawings SDK before 2022.12. The specific issue exists after loading TIF files. An unchecked input data from a crafted TIF file leads to an out-of-bounds read. An attacker can leverage this vulnerability to execute code in the context of the current process. | CWE-125 |
169,506 | CVE-2021-44874 | 8.8 | 6.5 | HIGH | Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Insecure design on report build via SQL query. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. The bi report module exposes direct SQL commands via POST data in order to select data for report generation. A malicious actor can use the bi report endpoint as a direct SQL prompt under the authenticated user. | CWE-89 |
169,507 | CVE-2021-44875 | 5.3 | 5 | MEDIUM | Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to User enumeration. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. This issue occurs during the password recovery procedure for a given user, where a difference in messages could allow an attacker to determine if the given user is valid or not, enabling a brute force attack with valid users. | CWE-203 |
169,508 | CVE-2021-44876 | 5.3 | 5 | MEDIUM | Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to User enumeration. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. This issue occurs during the identification of the correct tenant for a given user, where a difference in messages could allow an attacker to determine if the given user is valid or not, enabling a brute force attack with valid users. | CWE-203 |
169,509 | CVE-2021-44877 | 7.5 | 5 | HIGH | Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. A broken access control vulnerability has been found while using a temporary generated token in order to consume api resources. The vulnerability allows an unauthenticated attacker to use an api endpoint to generate a temporary JWT token that is designed to reference the correct tenant prior to authentication, to request system configuration parameters using direct api requests. The correct exploitation of this vulnerability causes sensitive information exposure. In case the tenant has an smtp credential set, the full credential information is disclosed. | CWE-863 |
169,510 | CVE-2021-44916 | 6.1 | 4.3 | MEDIUM | Opmantek Open-AudIT Community 4.2.0 (Fixed in 4.3.0) is affected by a Cross Site Scripting (XSS) vulnerability. If a bad value is passed to the routine via a URL, malicious JavaScript code can be executed in the victim's browser. | CWE-79 |
169,511 | CVE-2021-44917 | 5.5 | 4.3 | MEDIUM | A Divide by Zero vulnerability exists in gnuplot 5.4 in the boundary3d function in graph3d.c, which could cause a Arithmetic exception and application crash. | CWE-369 |
169,512 | CVE-2021-44918 | 5.5 | 4.3 | MEDIUM | A Null Pointer Dereference vulnerability exists in gpac 1.1.0 in the gf_node_get_field function, which can cause a segmentation fault and application crash. | CWE-476 |
169,513 | CVE-2021-44919 | 5.5 | 4.3 | MEDIUM | A Null Pointer Dereference vulnerability exists in the gf_sg_vrml_mf_alloc function, which causes a segmentation fault and application crash. | CWE-476 |
169,514 | CVE-2021-44920 | 5.5 | 4.3 | MEDIUM | An invalid memory address dereference vulnerability exists in gpac 1.1.0 in the dump_od_to_saf.isra function, which causes a segmentation fault and application crash. | CWE-119 |
169,515 | CVE-2021-44921 | 5.5 | 4.3 | MEDIUM | A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_internal function, which causes a segmentation fault and application crash. | CWE-476 |
169,516 | CVE-2021-44922 | 5.5 | 4.3 | MEDIUM | A null pointer dereference vulnerability exists in gpac 1.1.0 in the BD_CheckSFTimeOffset function, which causes a segmentation fault and application crash. | CWE-476 |
169,517 | CVE-2021-44923 | 5.5 | 4.3 | MEDIUM | A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_dump_vrml_dyn_field.isra function, which causes a segmentation fault and application crash. | CWE-476 |
169,518 | CVE-2021-44924 | 5.5 | 4.3 | MEDIUM | An infinite loop vulnerability exists in gpac 1.1.0 in the gf_log function, which causes a Denial of Service. | CWE-835 |
169,519 | CVE-2021-44925 | 5.5 | 4.3 | MEDIUM | A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_svg_get_attribute_name function, which causes a segmentation fault and application crash. | CWE-476 |
169,520 | CVE-2021-44927 | 5.5 | 4.3 | MEDIUM | A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_sg_vrml_mf_append function, which causes a segmentation fault and application crash. | CWE-476 |
169,521 | CVE-2021-44935 | 9.1 | 6.4 | CRITICAL | glFusion CMS v1.7.9 is affected by an arbitrary user impersonation vulnerability in /public_html/comment.php. The attacker can complete the attack remotely without interaction. | CWE-346 |
169,522 | CVE-2021-44937 | 5.3 | 5 | MEDIUM | glFusion CMS v1.7.9 is affected by an arbitrary user registration vulnerability in /public_html/users.php. An attacker can register with the mailbox of any user. When users want to register, they will find that the mailbox has been occupied. | CWE-862 |
169,523 | CVE-2021-44942 | 4.3 | 4.3 | MEDIUM | glFusion CMS 1.7.9 is affected by a Cross Site Request Forgery (CSRF) vulnerability in /public_html/admin/plugins/bad_behavior2/blacklist.php. Using the CSRF vulnerability to trick the administrator to click, an attacker can add a blacklist. | CWE-352 |
169,524 | CVE-2021-44948 | 4.3 | 4.3 | MEDIUM | glFusion CMS 1.7.9 is affected by a Cross Site Request Forgery (CSRF) vulnerability in /public_html/admin/plugins/bad_behavior2/blacklist.php. Using the CSRF vulnerability to trick the administrator to click, an attacker can add a blacklist. | CWE-352 |
169,525 | CVE-2021-44949 | 9.8 | 7.5 | CRITICAL | glFusion CMS 1.7.9 is affected by an access control vulnerability via /public_html/users.php. | CWE-287 |
169,526 | CVE-2021-44965 | 7.5 | 7.8 | HIGH | Directory traversal vulnerability in /admin/includes/* directory for PHPGURUKUL Employee Record Management System 1.2 The attacker can retrieve and download sensitive information from the vulnerable server. | CWE-22 |
169,527 | CVE-2021-44966 | 9.8 | 10 | CRITICAL | SQL injection bypass authentication vulnerability in PHPGURUKUL Employee Record Management System 1.2 via index.php. An attacker can log in as an admin account of this system and can destroy, change or manipulate all sensitive information on the system. | CWE-89 |
169,528 | CVE-2021-45014 | 9.8 | 7.5 | CRITICAL | There is an upload sql injection vulnerability in the background of taocms 3.0.2 in parameter id:action=cms&ctrl=update&id=26 | CWE-89 |
169,529 | CVE-2021-45015 | 9.1 | 6.4 | CRITICAL | taocms 3.0.2 is vulnerable to arbitrary file deletion via taocms\include\Model\file.php from line 60 to line 72. | CWE-862 |
169,530 | CVE-2021-45017 | 8.8 | 6.8 | HIGH | Cross Site Request Forgery (CSRF) vulnerability exits in Catfish <=6.1.* when you upload an html file containing CSRF on the website that uses a google editor; you can specify the menu url address as your malicious url address in the Add Menu column. | CWE-352 |
169,531 | CVE-2021-45018 | 6.1 | 4.3 | MEDIUM | Cross Site Scripting (XSS) vulnerability exists in Catfish <=6.3.0 via a Google search in url:/catfishcms/index.php/admin/Index/addmenu.htmland then the .html file on the website that uses this editor (the file suffix is allowed). | CWE-79 |
169,532 | CVE-2021-45038 | 5.3 | 5 | MEDIUM | An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. By using an action=rollback query, attackers can view private wiki contents. | CWE-200 |
169,533 | CVE-2021-45041 | 8.8 | 6.5 | HIGH | SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection via the Tooltips action in the Project module, involving resource_id and start_date. | CWE-89 |
169,534 | CVE-2021-45043 | 7.5 | 5 | HIGH | HD-Network Real-time Monitoring System 2.0 allows ../ directory traversal to read /etc/shadow via the /language/lang s_Language parameter. | CWE-22 |
169,535 | CVE-2021-45046 | 9 | 5.1 | CRITICAL | It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default. | CWE-502 |
169,536 | CVE-2021-45078 | 7.8 | 6.8 | HIGH | stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699. | CWE-787 |
169,537 | CVE-2021-45085 | 6.1 | 4.3 | MEDIUM | XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an about: page, as demonstrated by ephy-about:overview when a user visits an XSS payload page often enough to place that page on the Most Visited list. | CWE-79 |
169,538 | CVE-2021-45086 | 6.1 | 4.3 | MEDIUM | XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 because a server's suggested_filename is used as the pdf_name value in PDF.js. | CWE-79 |
169,539 | CVE-2021-45087 | 6.1 | 4.3 | MEDIUM | XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 when View Source mode or Reader mode is used, as demonstrated by a a page title. | CWE-79 |
169,540 | CVE-2021-45088 | 6.1 | 4.3 | MEDIUM | XSS can occur in GNOME Web (aka Epiphany) before 40.4 and 41.x before 41.1 via an error page. | CWE-79 |
169,541 | CVE-2021-45092 | 9.8 | 7.5 | CRITICAL | Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter. | CWE-74 |
169,542 | CVE-2021-45095 | 5.5 | 2.1 | MEDIUM | pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak. | CWE-200 |
169,543 | CVE-2021-45096 | 4.3 | 4.3 | MEDIUM | KNIME Analytics Platform before 4.5.0 is vulnerable to XXE (external XML entity injection) via a crafted workflow file (.knwf), aka AP-17730. | CWE-611 |
169,544 | CVE-2021-45097 | 5.5 | 2.1 | MEDIUM | KNIME Server before 4.12.6 and 4.13.x before 4.13.4 (when installed in unattended mode) keeps the administrator's password in a file without appropriate file access controls, allowing all local users to read its content. | CWE-668 |
169,545 | CVE-2021-45100 | 7.5 | 5 | HIGH | The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption. | CWE-319 |
169,546 | CVE-2021-45101 | 8.1 | 5.5 | HIGH | An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data. | CWE-668 |
169,547 | CVE-2021-45102 | 8.8 | 6.5 | HIGH | An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow. | CWE-863 |
169,548 | CVE-2021-45105 | 7.5 | 5 | HIGH | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1. | CWE-20 |
169,549 | CVE-2021-45105 | 7.5 | 5 | HIGH | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1. | CWE-674 |
169,550 | CVE-2021-45252 | 9.8 | 7.5 | CRITICAL | Multiple SQL injection vulnerabilities are found on Simple Forum-Discussion System 1.0 For example on three applications which are manage_topic.php, manage_user.php, and ajax.php. The attacker can be retrieving all information from the database of this system by using this vulnerability. | CWE-89 |
169,551 | CVE-2021-45253 | 9.8 | 7.5 | CRITICAL | The id parameter in view_storage.php from Simple Cold Storage Management System 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. | CWE-89 |
169,552 | CVE-2021-45258 | 5.5 | 4.3 | MEDIUM | A stack overflow vulnerability exists in gpac 1.1.0 via the gf_bifs_dec_proto_list function, which causes a segmentation fault and application crash. | CWE-787 |
169,553 | CVE-2021-45259 | 5.5 | 4.3 | MEDIUM | An Invalid pointer reference vulnerability exists in gpac 1.1.0 via the gf_svg_node_del function, which causes a segmentation fault and application crash. | CWE-476 |
169,554 | CVE-2021-45260 | 5.5 | 4.3 | MEDIUM | A null pointer dereference vulnerability exists in gpac 1.1.0 in the lsr_read_id.part function, which causes a segmentation fault and application crash. | CWE-476 |
169,555 | CVE-2021-45261 | 5.5 | 4.3 | MEDIUM | An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service. | CWE-763 |
169,556 | CVE-2021-45262 | 5.5 | 4.3 | MEDIUM | An invalid free vulnerability exists in gpac 1.1.0 via the gf_sg_command_del function, which causes a segmentation fault and application crash. | CWE-416 |
169,557 | CVE-2021-45263 | 5.5 | 4.3 | MEDIUM | An invalid free vulnerability exists in gpac 1.1.0 via the gf_svg_delete_attribute_value function, which causes a segmentation fault and application crash. | CWE-416 |
169,558 | CVE-2021-45266 | 7.5 | 5 | HIGH | A null pointer dereference vulnerability exists in gpac 1.1.0 via the lsr_read_anim_values_ex function, which causes a segmentation fault and application crash. | CWE-476 |
169,559 | CVE-2021-45267 | 5.5 | 4.3 | MEDIUM | An invalid memory address dereference vulnerability exists in gpac 1.1.0 via the svg_node_start function, which causes a segmentation fault and application crash. | CWE-476 |
169,560 | CVE-2021-45297 | 5.5 | 4.3 | MEDIUM | An infinite loop vulnerability exists in Gpac 1.0.1 in gf_get_bit_size. | CWE-835 |
169,561 | CVE-2021-45459 | 9.8 | 7.5 | CRITICAL | lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter. | CWE-77 |
169,562 | CVE-2021-45470 | 7.5 | 5 | HIGH | lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service) or other impacts. | NVD-CWE-Other |
169,563 | CVE-2021-45471 | 5.3 | 5 | MEDIUM | In MediaWiki through 1.37, blocked IP addresses are allowed to edit EntitySchema items. | NVD-CWE-noinfo |
169,564 | CVE-2021-45472 | 6.1 | 4.3 | MEDIUM | In MediaWiki through 1.37, XSS can occur in Wikibase because an external identifier property can have a URL format that includes a $1 formatter substitution marker, and the javascript: URL scheme (among others) can be used. | CWE-79 |
169,565 | CVE-2021-45473 | 6.1 | 4.3 | MEDIUM | In MediaWiki through 1.37, Wikibase item descriptions allow XSS, which is triggered upon a visit to an action=info URL (aka a page-information sidebar). | CWE-79 |
169,566 | CVE-2021-45474 | 6.1 | 4.3 | MEDIUM | In MediaWiki through 1.37, the Special:ImportFile URI (aka FileImporter) allows XSS, as demonstrated by the clientUrl parameter. | CWE-79 |