instruction
stringlengths 55
56
| inputs
stringclasses 1
value | outputs
stringlengths 86
4.06k
|
|---|---|---|
Please provide detailed information about CVE-2021-21120
|
CVE:CVE-2021-21120
Description:Use after free in WebSQL in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
published:2021-02-09T14:15:15.640
|
|
Please provide detailed information about CVE-2021-21121
|
CVE:CVE-2021-21121
Description:Use after free in Omnibox in Google Chrome on Linux prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
published:2021-02-09T14:15:15.717
|
|
Please provide detailed information about CVE-2021-21122
|
CVE:CVE-2021-21122
Description:Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
published:2021-02-09T14:15:15.780
|
|
Please provide detailed information about CVE-2021-21123
|
CVE:CVE-2021-21123
Description:Insufficient data validation in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
published:2021-02-09T14:15:15.843
|
|
Please provide detailed information about CVE-2021-21124
|
CVE:CVE-2021-21124
Description:Potential user after free in Speech Recognizer in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
published:2021-02-09T14:15:15.890
|
|
Please provide detailed information about CVE-2021-21125
|
CVE:CVE-2021-21125
Description:Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
published:2021-02-09T14:15:15.950
|
|
Please provide detailed information about CVE-2021-21126
|
CVE:CVE-2021-21126
Description:Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension.
published:2021-02-09T14:15:16.013
|
|
Please provide detailed information about CVE-2021-21127
|
CVE:CVE-2021-21127
Description:Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass content security policy via a crafted Chrome Extension.
published:2021-02-09T14:15:16.060
|
|
Please provide detailed information about CVE-2021-21128
|
CVE:CVE-2021-21128
Description:Heap buffer overflow in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
published:2021-02-09T14:15:16.123
|
|
Please provide detailed information about CVE-2021-21129
|
CVE:CVE-2021-21129
Description:Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
published:2021-02-09T14:15:16.187
|
|
Please provide detailed information about CVE-2021-21130
|
CVE:CVE-2021-21130
Description:Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
published:2021-02-09T14:15:16.263
|
|
Please provide detailed information about CVE-2021-21131
|
CVE:CVE-2021-21131
Description:Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
published:2021-02-09T14:15:16.327
|
|
Please provide detailed information about CVE-2021-21132
|
CVE:CVE-2021-21132
Description:Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension.
published:2021-02-09T14:15:16.390
|
|
Please provide detailed information about CVE-2021-21133
|
CVE:CVE-2021-21133
Description:Insufficient policy enforcement in Downloads in Google Chrome prior to 88.0.4324.96 allowed an attacker who convinced a user to download files to bypass navigation restrictions via a crafted HTML page.
published:2021-02-09T14:15:16.467
|
|
Please provide detailed information about CVE-2021-21134
|
CVE:CVE-2021-21134
Description:Incorrect security UI in Page Info in Google Chrome on iOS prior to 88.0.4324.96 allowed a remote attacker to spoof security UI via a crafted HTML page.
published:2021-02-09T14:15:16.530
|
|
Please provide detailed information about CVE-2021-21135
|
CVE:CVE-2021-21135
Description:Inappropriate implementation in Performance API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
published:2021-02-09T14:15:16.593
|
|
Please provide detailed information about CVE-2021-21136
|
CVE:CVE-2021-21136
Description:Insufficient policy enforcement in WebView in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
published:2021-02-09T14:15:16.653
|
|
Please provide detailed information about CVE-2021-21137
|
CVE:CVE-2021-21137
Description:Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page.
published:2021-02-09T14:15:16.717
|
|
Please provide detailed information about CVE-2021-21138
|
CVE:CVE-2021-21138
Description:Use after free in DevTools in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform a sandbox escape via a crafted file.
published:2021-02-09T14:15:16.797
|
|
Please provide detailed information about CVE-2021-21139
|
CVE:CVE-2021-21139
Description:Inappropriate implementation in iframe sandbox in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
published:2021-02-09T14:15:16.843
|
|
Please provide detailed information about CVE-2021-21140
|
CVE:CVE-2021-21140
Description:Uninitialized use in USB in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform out of bounds memory access via via a USB device.
published:2021-02-09T14:15:16.903
|
|
Please provide detailed information about CVE-2021-21141
|
CVE:CVE-2021-21141
Description:Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass file extension policy via a crafted HTML page.
published:2021-02-09T14:15:16.967
|
|
Please provide detailed information about CVE-2021-26719
|
CVE:CVE-2021-26719
Description:A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations.
published:2021-02-09T14:15:17.577
|
|
Please provide detailed information about CVE-2021-21142
|
CVE:CVE-2021-21142
Description:Use after free in Payments in Google Chrome on Mac prior to 88.0.4324.146 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
published:2021-02-09T15:15:13.547
|
|
Please provide detailed information about CVE-2021-21143
|
CVE:CVE-2021-21143
Description:Heap buffer overflow in Extensions in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
published:2021-02-09T15:15:13.597
|
|
Please provide detailed information about CVE-2021-21144
|
CVE:CVE-2021-21144
Description:Heap buffer overflow in Tab Groups in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
published:2021-02-09T15:15:13.643
|
|
Please provide detailed information about CVE-2021-21145
|
CVE:CVE-2021-21145
Description:Use after free in Fonts in Google Chrome prior to 88.0.4324.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
published:2021-02-09T15:15:13.703
|
|
Please provide detailed information about CVE-2021-21146
|
CVE:CVE-2021-21146
Description:Use after free in Navigation in Google Chrome prior to 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
published:2021-02-09T15:15:13.750
|
|
Please provide detailed information about CVE-2021-21147
|
CVE:CVE-2021-21147
Description:Inappropriate implementation in Skia in Google Chrome prior to 88.0.4324.146 allowed a local attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
published:2021-02-09T15:15:13.813
|
|
Please provide detailed information about CVE-2021-26921
|
CVE:CVE-2021-26921
Description:In util/session/sessionmanager.go in Argo CD before 1.8.4, tokens continue to work even when the user account is disabled.
published:2021-02-09T15:15:13.877
|
|
Please provide detailed information about CVE-2021-3394
|
CVE:CVE-2021-3394
Description:Millennium Millewin (also known as "Cartella clinica") 13.39.028, 13.39.28.3342, and 13.39.146.1 has insecure folder permissions allowing a malicious user for a local privilege escalation.
published:2021-02-09T15:15:13.953
|
|
Please provide detailed information about CVE-2021-21148
|
CVE:CVE-2021-21148
Description:Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
published:2021-02-09T16:15:12.390
|
|
Please provide detailed information about CVE-2021-26675
|
CVE:CVE-2021-26675
Description:A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
published:2021-02-09T16:15:12.453
|
|
Please provide detailed information about CVE-2021-26676
|
CVE:CVE-2021-26676
Description:gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
published:2021-02-09T16:15:12.593
|
|
Please provide detailed information about CVE-2021-22663
|
CVE:CVE-2021-22663
Description:Cscape (All versions prior to 9.90 SP3.5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process.
published:2021-02-09T17:15:14.563
|
|
Please provide detailed information about CVE-2021-25139
|
CVE:CVE-2021-25139
Description:A potential security vulnerability has been identified in the HPE Moonshot Provisioning Manager v1.20. The HPE Moonshot Provisioning Manager is an application that is installed in a VMWare or Microsoft Hyper-V environment that is used to setup and configure an HPE Moonshot 1500 chassis. This vulnerability could be remotely exploited by an unauthenticated user to cause a stack based buffer overflow using user supplied input to the `khuploadfile.cgi` CGI ELF. The stack based buffer overflow could lead to Remote Code Execution, Denial of Service, and/or compromise system integrity. **Note:** HPE recommends that customers discontinue the use of the HPE Moonshot Provisioning Manager. The HPE Moonshot Provisioning Manager application is discontinued, no longer supported, is not available to download from the HPE Support Center, and no patch is available.
published:2021-02-09T17:15:14.640
|
|
Please provide detailed information about CVE-2021-25140
|
CVE:CVE-2021-25140
Description:A potential security vulnerability has been identified in the HPE Moonshot Provisioning Manager v1.20. The HPE Moonshot Provisioning Manager is an application that is installed in a VMWare or Microsoft Hyper-V environment that is used to setup and configure an HPE Moonshot 1500 chassis. This vulnerability could be remotely exploited by an unauthenticated user to cause a directory traversal in user supplied input to the `khuploadfile.cgi` CGI ELF. The directory traversal could lead to Remote Code Execution, Denial of Service, and/or compromise system integrity. **Note:** HPE recommends that customers discontinue the use of the HPE Moonshot Provisioning Manager. The HPE Moonshot Provisioning Manager application is discontinued, no longer supported, is not available to download from the HPE Support Center, and no patch is available.
published:2021-02-09T17:15:14.703
|
|
Please provide detailed information about CVE-2021-25141
|
CVE:CVE-2021-25141
Description:A security vulnerability has been identified in in certain HPE and Aruba L2/L3 switch firmware. A data processing error due to improper handling of an unexpected data type in user supplied information to the switch's management interface has been identified. The data processing error could be exploited to cause a crash or reboot in the switch management interface and/or possibly the switch itself leading to local denial of service (DoS). The user must have administrator privileges to exploit this vulnerability.
published:2021-02-09T17:15:14.780
|
|
Please provide detailed information about CVE-2021-25666
|
CVE:CVE-2021-25666
Description:A vulnerability has been identified in SCALANCE W780 and W740 (IEEE 802.11n) family (All versions < V6.3). Sending specially crafted packets through the ARP protocol to an affected device could cause a partial denial-of-service, preventing the device to operate normally for a short period of time.
published:2021-02-09T18:15:51.573
|
|
Please provide detailed information about CVE-2021-22267
|
CVE:CVE-2021-22267
Description:Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows a remote replay attack for T0320L01^ABP through T0320L01^ABZ, T0952L01^AAH through T0952L01^AAR, T0986L01 through T0986L01^AAF, T0665L01^AAP, and T0662L01^AAP (L) and T0320H01^ABO through T0320H01^ABY, T0952H01^AAG through T0952H01^AAQ, T0986H01 through T0986H01^AAE, T0665H01^AAO, and T0662H01^AAO (J and H).
published:2021-02-09T19:15:13.773
|
|
Please provide detailed information about CVE-2021-3191
|
CVE:CVE-2021-3191
Description:Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows Remote Unauthorized Access for T0320L01^ABY and T0320L01^ACD, T0952L01^AAR through T0952L01^AAX, and T0986L01^AAD through T0986L01^AAJ (L) and T0320H01^ABW through T0320H01^ACC, T0952H01^AAQ through T0952H01^AAW, and T0986H01^AAC through T0986H01^AAI (J and H).
published:2021-02-09T19:15:13.837
|
|
Please provide detailed information about CVE-2021-26549
|
CVE:CVE-2021-26549
Description:An XSS issue was discovered in SmartFoxServer 2.17.0. Input passed to the AdminTool console is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.
published:2021-02-09T20:15:14.707
|
|
Please provide detailed information about CVE-2021-26550
|
CVE:CVE-2021-26550
Description:An issue was discovered in SmartFoxServer 2.17.0. Cleartext password disclosure can occur via /config/server.xml.
published:2021-02-09T20:15:14.767
|
|
Please provide detailed information about CVE-2021-26551
|
CVE:CVE-2021-26551
Description:An issue was discovered in SmartFoxServer 2.17.0. An attacker can execute arbitrary Python code, and bypass the javashell.py protection mechanism, by creating /config/ConsoleModuleUnlock.txt and editing /config/admin/admintool.xml to enable the Console module.
published:2021-02-09T20:15:14.847
|
|
Please provide detailed information about CVE-2021-26937
|
CVE:CVE-2021-26937
Description:encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence.
published:2021-02-09T20:15:14.910
|
|
Please provide detailed information about CVE-2021-21444
|
CVE:CVE-2021-21444
Description:SAP Business Objects BI Platform, versions - 410, 420, 430, allows multiple X-Frame-Options headers entries in the response headers, which may not be predictably treated by all user agents. This could, as a result, nullify the added X-Frame-Options header leading to Clickjacking attack.
published:2021-02-09T21:15:13.083
|
|
Please provide detailed information about CVE-2021-21472
|
CVE:CVE-2021-21472
Description:SAP Software Provisioning Manager 1.0 (SAP NetWeaver Master Data Management Server 7.1) does not have an option to set password during its installation, this allows an authenticated attacker to perform various security attacks like Directory Traversal, Password Brute force Attack, SMB Relay attack, Security Downgrade.
published:2021-02-09T21:15:13.300
|
|
Please provide detailed information about CVE-2021-21474
|
CVE:CVE-2021-21474
Description:SAP HANA Database, versions - 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages to obtain an MD5-digest signed SAML Assertion issued for an SAP HANA instance might be able to tamper with it and alter it in a way that the digest continues to be the same and without invalidating the digital signature, this allows them to impersonate as user in HANA database and be able to read the contents in the database.
published:2021-02-09T21:15:13.393
|
|
Please provide detailed information about CVE-2021-21475
|
CVE:CVE-2021-21475
Description:Under specific circumstances SAP Master Data Management, versions - 710, 710.750, allows an unauthorized attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs. Due to this Directory Traversal vulnerability the attacker could read content of arbitrary files on the remote server and expose sensitive data.
published:2021-02-09T21:15:13.457
|
|
Please provide detailed information about CVE-2021-21476
|
CVE:CVE-2021-21476
Description:SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
published:2021-02-09T21:15:13.533
|
|
Please provide detailed information about CVE-2021-21477
|
CVE:CVE-2021-21477
Description:SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads to Remote Code Execution vulnerability enabling the attacker to compromise the underlying host enabling him to impair confidentiality, integrity and availability of the application.
published:2021-02-09T21:15:13.613
|
|
Please provide detailed information about CVE-2021-21478
|
CVE:CVE-2021-21478
Description:SAP Web Dynpro ABAP allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
published:2021-02-09T21:15:13.783
|
|
Please provide detailed information about CVE-2021-21479
|
CVE:CVE-2021-21479
Description:In SCIMono before 0.0.19, it is possible for an attacker to inject and execute java expression compromising the availability and integrity of the system.
published:2021-02-09T21:15:13.863
|
|
Please provide detailed information about CVE-2021-21502
|
CVE:CVE-2021-21502
Description:Dell PowerScale OneFS versions 8.1.0 – 9.1.0 contain a "use of SSH key past account expiration" vulnerability. A user on the network with the ISI_PRIV_AUTH_SSH RBAC privilege that has an expired account may potentially exploit this vulnerability, giving them access to the same things they had before account expiration. This may by a high privileged account and hence Dell recommends customers upgrade at the earliest opportunity.
published:2021-02-09T22:15:13.697
|
|
Please provide detailed information about CVE-2021-26951
|
CVE:CVE-2021-26951
Description:An issue was discovered in the calamine crate before 0.17.0 for Rust. It allows attackers to overwrite heap-memory locations because Vec::set_len is used without proper memory claiming, and this uninitialized memory is used for a user-provided Read operation, as demonstrated by Sectors::get.
published:2021-02-09T23:15:13.663
|
|
Please provide detailed information about CVE-2021-26952
|
CVE:CVE-2021-26952
Description:An issue was discovered in the ms3d crate before 0.1.3 for Rust. It might allow attackers to obtain sensitive information from uninitialized memory locations via IoReader::read.
published:2021-02-09T23:15:13.727
|
|
Please provide detailed information about CVE-2021-26953
|
CVE:CVE-2021-26953
Description:An issue was discovered in the postscript crate before 0.14.0 for Rust. It might allow attackers to obtain sensitive information from uninitialized memory locations via a user-provided Read implementation.
published:2021-02-09T23:15:13.787
|
|
Please provide detailed information about CVE-2021-26954
|
CVE:CVE-2021-26954
Description:An issue was discovered in the qwutils crate before 0.3.1 for Rust. When a Clone panic occurs, insert_slice_clone can perform a double drop.
published:2021-02-09T23:15:13.850
|
|
Please provide detailed information about CVE-2021-26955
|
CVE:CVE-2021-26955
Description:An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because xcb::xproto::GetAtomNameReply::name() calls std::str::from_utf8_unchecked() on unvalidated bytes from an X server.
published:2021-02-09T23:15:13.913
|
|
Please provide detailed information about CVE-2021-26956
|
CVE:CVE-2021-26956
Description:An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because bytes from an X server can be interpreted as any data type returned by xcb::xproto::GetPropertyReply::value.
published:2021-02-09T23:15:13.960
|
|
Please provide detailed information about CVE-2021-26957
|
CVE:CVE-2021-26957
Description:An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because there is an out-of-bounds read in xcb::xproto::change_property(), as demonstrated by a format=32 T=u8 situation where out-of-bounds bytes are sent to an X server.
published:2021-02-09T23:15:14.023
|
|
Please provide detailed information about CVE-2021-26958
|
CVE:CVE-2021-26958
Description:An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type.
published:2021-02-09T23:15:14.383
|
|
Please provide detailed information about CVE-2021-26959
|
CVE:CVE-2021-26959
Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-21299. Reason: This candidate is a duplicate of CVE-2021-21299. Notes: All CVE users should reference CVE-2021-21299 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
published:2021-02-09T23:15:14.460
|
|
Please provide detailed information about CVE-2021-20654
|
CVE:CVE-2021-20654
Description:Wekan, open source kanban board system, between version 3.12 and 4.11, is vulnerable to multiple stored cross-site scripting. This is named 'Fieldbleed' in the vendor's site.
published:2021-02-10T09:15:12.887
|
|
Please provide detailed information about CVE-2021-23878
|
CVE:CVE-2021-23878
Description:Clear text storage of sensitive Information in memory vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows a local user to view ENS settings and credentials via accessing process memory after the ENS administrator has performed specific actions. To exploit this, the local user has to access the relevant memory location immediately after an ENS administrator has made a configuration change through the console on their machine
published:2021-02-10T09:15:13.090
|
|
Please provide detailed information about CVE-2021-23880
|
CVE:CVE-2021-23880
Description:Improper Access Control in attribute in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows authenticated local administrator user to perform an uninstallation of the anti-malware engine via the running of a specific command with the correct parameters.
published:2021-02-10T10:15:13.177
|
|
Please provide detailed information about CVE-2021-23882
|
CVE:CVE-2021-23882
Description:Improper Access Control vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows local administrators to prevent the installation of some ENS files by placing carefully crafted files where ENS will be installed. This is only applicable to clean installations of ENS as the Access Control rules will prevent modification prior to up an upgrade.
published:2021-02-10T10:15:13.363
|
|
Please provide detailed information about CVE-2021-23883
|
CVE:CVE-2021-23883
Description:A Null Pointer Dereference vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows a local administrator to cause Windows to crash via a specific system call which is not handled correctly. This varies by machine and had partial protection prior to this update.
published:2021-02-10T10:15:13.473
|
|
Please provide detailed information about CVE-2021-23873
|
CVE:CVE-2021-23873
Description:Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and perform arbitrary file deletion as the SYSTEM user potentially causing Denial of Service via manipulating Junction link, after enumerating certain files, at a specific time.
published:2021-02-10T11:15:12.817
|
|
Please provide detailed information about CVE-2021-23874
|
CVE:CVE-2021-23874
Description:Arbitrary Process Execution vulnerability in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and execute arbitrary code bypassing MTP self-defense.
published:2021-02-10T11:15:12.943
|
|
Please provide detailed information about CVE-2021-23876
|
CVE:CVE-2021-23876
Description:Bypass Remote Procedure call in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and perform arbitrary file modification as the SYSTEM user potentially causing Denial of Service via executing carefully constructed malware.
published:2021-02-10T11:15:13.100
|
|
Please provide detailed information about CVE-2021-23881
|
CVE:CVE-2021-23881
Description:A stored cross site scripting vulnerability in ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 February 2021 Update allows an ENS ePO administrator to add a script to a policy event which will trigger the script to be run through a browser block page when a local non-administrator user triggers the policy.
published:2021-02-10T11:15:13.177
|
|
Please provide detailed information about CVE-2021-27135
|
CVE:CVE-2021-27135
Description:xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
published:2021-02-10T16:15:13.787
|
|
Please provide detailed information about CVE-2021-0302
|
CVE:CVE-2021-0302
Description:In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782
published:2021-02-10T17:15:16.927
|
|
Please provide detailed information about CVE-2021-0305
|
CVE:CVE-2021-0305
Description:In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447
published:2021-02-10T17:15:17.553
|
|
Please provide detailed information about CVE-2021-0314
|
CVE:CVE-2021-0314
Description:In onCreate of UninstallerActivity, there is a possible way to uninstall an all without informed user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-171221302
published:2021-02-10T17:15:18.037
|
|
Please provide detailed information about CVE-2021-0325
|
CVE:CVE-2021-0325
Description:In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784
published:2021-02-10T17:15:18.630
|
|
Please provide detailed information about CVE-2021-0326
|
CVE:CVE-2021-0326
Description:In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525
published:2021-02-10T17:15:19.177
|
|
Please provide detailed information about CVE-2021-0327
|
CVE:CVE-2021-0327
Description:In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-172935267
published:2021-02-10T17:15:19.333
|
|
Please provide detailed information about CVE-2021-0328
|
CVE:CVE-2021-0328
Description:In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172670415
published:2021-02-10T17:15:19.707
|
|
Please provide detailed information about CVE-2021-0329
|
CVE:CVE-2021-0329
Description:In several native functions called by AdvertiseManager.java, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-171400004
published:2021-02-10T17:15:19.910
|
|
Please provide detailed information about CVE-2021-0330
|
CVE:CVE-2021-0330
Description:In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441
published:2021-02-10T17:15:19.957
|
|
Please provide detailed information about CVE-2021-0331
|
CVE:CVE-2021-0331
Description:In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-170731783
published:2021-02-10T17:15:20.367
|
|
Please provide detailed information about CVE-2021-0332
|
CVE:CVE-2021-0332
Description:In bootFinished of SurfaceFlinger.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-169256435
published:2021-02-10T17:15:20.413
|
|
Please provide detailed information about CVE-2021-0333
|
CVE:CVE-2021-0333
Description:In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-168504491
published:2021-02-10T17:15:20.663
|
|
Please provide detailed information about CVE-2021-0334
|
CVE:CVE-2021-0334
Description:In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811
published:2021-02-10T17:15:20.833
|
|
Please provide detailed information about CVE-2021-0335
|
CVE:CVE-2021-0335
Description:In process of C2SoftHevcDec.cpp, there is a possible out of bounds write due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160346309
published:2021-02-10T17:15:20.880
|
|
Please provide detailed information about CVE-2021-0336
|
CVE:CVE-2021-0336
Description:In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-158219161
published:2021-02-10T17:15:21.193
|
|
Please provide detailed information about CVE-2021-0337
|
CVE:CVE-2021-0337
Description:In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-157474195
published:2021-02-10T17:15:21.367
|
|
Please provide detailed information about CVE-2021-0338
|
CVE:CVE-2021-0338
Description:In SystemSettingsValidators, there is a possible permanent denial of service due to missing bounds checks on UI settings. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-156260178
published:2021-02-10T17:15:21.553
|
|
Please provide detailed information about CVE-2021-0339
|
CVE:CVE-2021-0339
Description:In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-145728687
published:2021-02-10T17:15:21.850
|
|
Please provide detailed information about CVE-2021-0340
|
CVE:CVE-2021-0340
Description:In parseNextBox of IsoInterface.java, there is a possible leak of unredacted location information due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-134155286
published:2021-02-10T17:15:21.897
|
|
Please provide detailed information about CVE-2021-0341
|
CVE:CVE-2021-0341
Description:In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069
published:2021-02-10T17:15:22.037
|
|
Please provide detailed information about CVE-2021-20353
|
CVE:CVE-2021-20353
Description:IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 194882.
published:2021-02-10T17:15:22.333
|
|
Please provide detailed information about CVE-2021-26936
|
CVE:CVE-2021-26936
Description:The replay-sorcery program in ReplaySorcery 0.4.0 through 0.5.0, when using the default setuid-root configuration, allows a local attacker to escalate privileges to root by specifying video output paths in privileged locations.
published:2021-02-10T18:15:13.017
|
|
Please provide detailed information about CVE-2021-26938
|
CVE:CVE-2021-26938
Description:A stored XSS issue exists in henriquedornas 5.2.17 via online live chat. NOTE: Third parties report that no such product exists. That henriquedornas is the web design agency and 5.2.17 is simply the PHP version running on this hosts
published:2021-02-10T18:15:13.093
|
|
Please provide detailed information about CVE-2021-26939
|
CVE:CVE-2021-26939
Description:An information disclosure issue exists in henriquedornas 5.2.17 because an attacker can dump phpMyAdmin SQL content. NOTE: third parties report that this is a site-specific problem
published:2021-02-10T18:15:13.170
|
|
Please provide detailed information about CVE-2021-3033
|
CVE:CVE-2021-3033
Description:An improper verification of cryptographic signature vulnerability exists in the Palo Alto Networks Prisma Cloud Compute console. This vulnerability enables an attacker to bypass signature validation during SAML authentication by logging in to the Prisma Cloud Compute console as any authorized user. This issue impacts: All versions of Prisma Cloud Compute 19.11, Prisma Cloud Compute 20.04, and Prisma Cloud Compute 20.09; Prisma Cloud Compute 20.12 before update 1. Prisma Cloud Compute SaaS version is not impacted by this vulnerability.
published:2021-02-10T18:15:13.267
|
|
Please provide detailed information about CVE-2021-22133
|
CVE:CVE-2021-22133
Description:The Elastic APM agent for Go versions before 1.11.0 can leak sensitive HTTP header information when logging the details during an application panic. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an application panic it is possible the headers will not be sanitized before being sent.
published:2021-02-10T19:15:12.090
|
|
Please provide detailed information about CVE-2021-27139
|
CVE:CVE-2021-27139
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to extract information from the device without authentication by disabling JavaScript and visiting /info.asp.
published:2021-02-10T19:15:12.653
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.