instruction
stringlengths
55
56
inputs
stringclasses
1 value
outputs
stringlengths
86
4.06k
Please provide detailed information about CVE-2021-21120
CVE:CVE-2021-21120 Description:Use after free in WebSQL in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. published:2021-02-09T14:15:15.640
Please provide detailed information about CVE-2021-21121
CVE:CVE-2021-21121 Description:Use after free in Omnibox in Google Chrome on Linux prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. published:2021-02-09T14:15:15.717
Please provide detailed information about CVE-2021-21122
CVE:CVE-2021-21122 Description:Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. published:2021-02-09T14:15:15.780
Please provide detailed information about CVE-2021-21123
CVE:CVE-2021-21123 Description:Insufficient data validation in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. published:2021-02-09T14:15:15.843
Please provide detailed information about CVE-2021-21124
CVE:CVE-2021-21124 Description:Potential user after free in Speech Recognizer in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. published:2021-02-09T14:15:15.890
Please provide detailed information about CVE-2021-21125
CVE:CVE-2021-21125 Description:Insufficient policy enforcement in File System API in Google Chrome on Windows prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. published:2021-02-09T14:15:15.950
Please provide detailed information about CVE-2021-21126
CVE:CVE-2021-21126 Description:Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension. published:2021-02-09T14:15:16.013
Please provide detailed information about CVE-2021-21127
CVE:CVE-2021-21127 Description:Insufficient policy enforcement in extensions in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass content security policy via a crafted Chrome Extension. published:2021-02-09T14:15:16.060
Please provide detailed information about CVE-2021-21128
CVE:CVE-2021-21128 Description:Heap buffer overflow in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. published:2021-02-09T14:15:16.123
Please provide detailed information about CVE-2021-21129
CVE:CVE-2021-21129 Description:Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. published:2021-02-09T14:15:16.187
Please provide detailed information about CVE-2021-21130
CVE:CVE-2021-21130 Description:Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. published:2021-02-09T14:15:16.263
Please provide detailed information about CVE-2021-21131
CVE:CVE-2021-21131 Description:Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. published:2021-02-09T14:15:16.327
Please provide detailed information about CVE-2021-21132
CVE:CVE-2021-21132 Description:Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially perform a sandbox escape via a crafted Chrome Extension. published:2021-02-09T14:15:16.390
Please provide detailed information about CVE-2021-21133
CVE:CVE-2021-21133 Description:Insufficient policy enforcement in Downloads in Google Chrome prior to 88.0.4324.96 allowed an attacker who convinced a user to download files to bypass navigation restrictions via a crafted HTML page. published:2021-02-09T14:15:16.467
Please provide detailed information about CVE-2021-21134
CVE:CVE-2021-21134 Description:Incorrect security UI in Page Info in Google Chrome on iOS prior to 88.0.4324.96 allowed a remote attacker to spoof security UI via a crafted HTML page. published:2021-02-09T14:15:16.530
Please provide detailed information about CVE-2021-21135
CVE:CVE-2021-21135 Description:Inappropriate implementation in Performance API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. published:2021-02-09T14:15:16.593
Please provide detailed information about CVE-2021-21136
CVE:CVE-2021-21136 Description:Insufficient policy enforcement in WebView in Google Chrome on Android prior to 88.0.4324.96 allowed a remote attacker to leak cross-origin data via a crafted HTML page. published:2021-02-09T14:15:16.653
Please provide detailed information about CVE-2021-21137
CVE:CVE-2021-21137 Description:Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page. published:2021-02-09T14:15:16.717
Please provide detailed information about CVE-2021-21138
CVE:CVE-2021-21138 Description:Use after free in DevTools in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform a sandbox escape via a crafted file. published:2021-02-09T14:15:16.797
Please provide detailed information about CVE-2021-21139
CVE:CVE-2021-21139 Description:Inappropriate implementation in iframe sandbox in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. published:2021-02-09T14:15:16.843
Please provide detailed information about CVE-2021-21140
CVE:CVE-2021-21140 Description:Uninitialized use in USB in Google Chrome prior to 88.0.4324.96 allowed a local attacker to potentially perform out of bounds memory access via via a USB device. published:2021-02-09T14:15:16.903
Please provide detailed information about CVE-2021-21141
CVE:CVE-2021-21141 Description:Insufficient policy enforcement in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass file extension policy via a crafted HTML page. published:2021-02-09T14:15:16.967
Please provide detailed information about CVE-2021-26719
CVE:CVE-2021-26719 Description:A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations. published:2021-02-09T14:15:17.577
Please provide detailed information about CVE-2021-21142
CVE:CVE-2021-21142 Description:Use after free in Payments in Google Chrome on Mac prior to 88.0.4324.146 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. published:2021-02-09T15:15:13.547
Please provide detailed information about CVE-2021-21143
CVE:CVE-2021-21143 Description:Heap buffer overflow in Extensions in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. published:2021-02-09T15:15:13.597
Please provide detailed information about CVE-2021-21144
CVE:CVE-2021-21144 Description:Heap buffer overflow in Tab Groups in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. published:2021-02-09T15:15:13.643
Please provide detailed information about CVE-2021-21145
CVE:CVE-2021-21145 Description:Use after free in Fonts in Google Chrome prior to 88.0.4324.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. published:2021-02-09T15:15:13.703
Please provide detailed information about CVE-2021-21146
CVE:CVE-2021-21146 Description:Use after free in Navigation in Google Chrome prior to 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. published:2021-02-09T15:15:13.750
Please provide detailed information about CVE-2021-21147
CVE:CVE-2021-21147 Description:Inappropriate implementation in Skia in Google Chrome prior to 88.0.4324.146 allowed a local attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. published:2021-02-09T15:15:13.813
Please provide detailed information about CVE-2021-26921
CVE:CVE-2021-26921 Description:In util/session/sessionmanager.go in Argo CD before 1.8.4, tokens continue to work even when the user account is disabled. published:2021-02-09T15:15:13.877
Please provide detailed information about CVE-2021-3394
CVE:CVE-2021-3394 Description:Millennium Millewin (also known as "Cartella clinica") 13.39.028, 13.39.28.3342, and 13.39.146.1 has insecure folder permissions allowing a malicious user for a local privilege escalation. published:2021-02-09T15:15:13.953
Please provide detailed information about CVE-2021-21148
CVE:CVE-2021-21148 Description:Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. published:2021-02-09T16:15:12.390
Please provide detailed information about CVE-2021-26675
CVE:CVE-2021-26675 Description:A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code. published:2021-02-09T16:15:12.453
Please provide detailed information about CVE-2021-26676
CVE:CVE-2021-26676 Description:gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp. published:2021-02-09T16:15:12.593
Please provide detailed information about CVE-2021-22663
CVE:CVE-2021-22663 Description:Cscape (All versions prior to 9.90 SP3.5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process. published:2021-02-09T17:15:14.563
Please provide detailed information about CVE-2021-25139
CVE:CVE-2021-25139 Description:A potential security vulnerability has been identified in the HPE Moonshot Provisioning Manager v1.20. The HPE Moonshot Provisioning Manager is an application that is installed in a VMWare or Microsoft Hyper-V environment that is used to setup and configure an HPE Moonshot 1500 chassis. This vulnerability could be remotely exploited by an unauthenticated user to cause a stack based buffer overflow using user supplied input to the `khuploadfile.cgi` CGI ELF. The stack based buffer overflow could lead to Remote Code Execution, Denial of Service, and/or compromise system integrity. **Note:** HPE recommends that customers discontinue the use of the HPE Moonshot Provisioning Manager. The HPE Moonshot Provisioning Manager application is discontinued, no longer supported, is not available to download from the HPE Support Center, and no patch is available. published:2021-02-09T17:15:14.640
Please provide detailed information about CVE-2021-25140
CVE:CVE-2021-25140 Description:A potential security vulnerability has been identified in the HPE Moonshot Provisioning Manager v1.20. The HPE Moonshot Provisioning Manager is an application that is installed in a VMWare or Microsoft Hyper-V environment that is used to setup and configure an HPE Moonshot 1500 chassis. This vulnerability could be remotely exploited by an unauthenticated user to cause a directory traversal in user supplied input to the `khuploadfile.cgi` CGI ELF. The directory traversal could lead to Remote Code Execution, Denial of Service, and/or compromise system integrity. **Note:** HPE recommends that customers discontinue the use of the HPE Moonshot Provisioning Manager. The HPE Moonshot Provisioning Manager application is discontinued, no longer supported, is not available to download from the HPE Support Center, and no patch is available. published:2021-02-09T17:15:14.703
Please provide detailed information about CVE-2021-25141
CVE:CVE-2021-25141 Description:A security vulnerability has been identified in in certain HPE and Aruba L2/L3 switch firmware. A data processing error due to improper handling of an unexpected data type in user supplied information to the switch's management interface has been identified. The data processing error could be exploited to cause a crash or reboot in the switch management interface and/or possibly the switch itself leading to local denial of service (DoS). The user must have administrator privileges to exploit this vulnerability. published:2021-02-09T17:15:14.780
Please provide detailed information about CVE-2021-25666
CVE:CVE-2021-25666 Description:A vulnerability has been identified in SCALANCE W780 and W740 (IEEE 802.11n) family (All versions < V6.3). Sending specially crafted packets through the ARP protocol to an affected device could cause a partial denial-of-service, preventing the device to operate normally for a short period of time. published:2021-02-09T18:15:51.573
Please provide detailed information about CVE-2021-22267
CVE:CVE-2021-22267 Description:Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows a remote replay attack for T0320L01^ABP through T0320L01^ABZ, T0952L01^AAH through T0952L01^AAR, T0986L01 through T0986L01^AAF, T0665L01^AAP, and T0662L01^AAP (L) and T0320H01^ABO through T0320H01^ABY, T0952H01^AAG through T0952H01^AAQ, T0986H01 through T0986H01^AAE, T0665H01^AAO, and T0662H01^AAO (J and H). published:2021-02-09T19:15:13.773
Please provide detailed information about CVE-2021-3191
CVE:CVE-2021-3191 Description:Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows Remote Unauthorized Access for T0320L01^ABY and T0320L01^ACD, T0952L01^AAR through T0952L01^AAX, and T0986L01^AAD through T0986L01^AAJ (L) and T0320H01^ABW through T0320H01^ACC, T0952H01^AAQ through T0952H01^AAW, and T0986H01^AAC through T0986H01^AAI (J and H). published:2021-02-09T19:15:13.837
Please provide detailed information about CVE-2021-26549
CVE:CVE-2021-26549 Description:An XSS issue was discovered in SmartFoxServer 2.17.0. Input passed to the AdminTool console is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site. published:2021-02-09T20:15:14.707
Please provide detailed information about CVE-2021-26550
CVE:CVE-2021-26550 Description:An issue was discovered in SmartFoxServer 2.17.0. Cleartext password disclosure can occur via /config/server.xml. published:2021-02-09T20:15:14.767
Please provide detailed information about CVE-2021-26551
CVE:CVE-2021-26551 Description:An issue was discovered in SmartFoxServer 2.17.0. An attacker can execute arbitrary Python code, and bypass the javashell.py protection mechanism, by creating /config/ConsoleModuleUnlock.txt and editing /config/admin/admintool.xml to enable the Console module. published:2021-02-09T20:15:14.847
Please provide detailed information about CVE-2021-26937
CVE:CVE-2021-26937 Description:encoding.c in GNU Screen through 4.8.0 allows remote attackers to cause a denial of service (invalid write access and application crash) or possibly have unspecified other impact via a crafted UTF-8 character sequence. published:2021-02-09T20:15:14.910
Please provide detailed information about CVE-2021-21444
CVE:CVE-2021-21444 Description:SAP Business Objects BI Platform, versions - 410, 420, 430, allows multiple X-Frame-Options headers entries in the response headers, which may not be predictably treated by all user agents. This could, as a result, nullify the added X-Frame-Options header leading to Clickjacking attack. published:2021-02-09T21:15:13.083
Please provide detailed information about CVE-2021-21472
CVE:CVE-2021-21472 Description:SAP Software Provisioning Manager 1.0 (SAP NetWeaver Master Data Management Server 7.1) does not have an option to set password during its installation, this allows an authenticated attacker to perform various security attacks like Directory Traversal, Password Brute force Attack, SMB Relay attack, Security Downgrade. published:2021-02-09T21:15:13.300
Please provide detailed information about CVE-2021-21474
CVE:CVE-2021-21474 Description:SAP HANA Database, versions - 1.0, 2.0, accepts SAML tokens with MD5 digest, an attacker who manages to obtain an MD5-digest signed SAML Assertion issued for an SAP HANA instance might be able to tamper with it and alter it in a way that the digest continues to be the same and without invalidating the digital signature, this allows them to impersonate as user in HANA database and be able to read the contents in the database. published:2021-02-09T21:15:13.393
Please provide detailed information about CVE-2021-21475
CVE:CVE-2021-21475 Description:Under specific circumstances SAP Master Data Management, versions - 710, 710.750, allows an unauthorized attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs. Due to this Directory Traversal vulnerability the attacker could read content of arbitrary files on the remote server and expose sensitive data. published:2021-02-09T21:15:13.457
Please provide detailed information about CVE-2021-21476
CVE:CVE-2021-21476 Description:SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities. published:2021-02-09T21:15:13.533
Please provide detailed information about CVE-2021-21477
CVE:CVE-2021-21477 Description:SAP Commerce Cloud, versions - 1808,1811,1905,2005,2011, enables certain users with required privileges to edit drools rules, an authenticated attacker with this privilege will be able to inject malicious code in the drools rules which when executed leads to Remote Code Execution vulnerability enabling the attacker to compromise the underlying host enabling him to impair confidentiality, integrity and availability of the application. published:2021-02-09T21:15:13.613
Please provide detailed information about CVE-2021-21478
CVE:CVE-2021-21478 Description:SAP Web Dynpro ABAP allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities. published:2021-02-09T21:15:13.783
Please provide detailed information about CVE-2021-21479
CVE:CVE-2021-21479 Description:In SCIMono before 0.0.19, it is possible for an attacker to inject and execute java expression compromising the availability and integrity of the system. published:2021-02-09T21:15:13.863
Please provide detailed information about CVE-2021-21502
CVE:CVE-2021-21502 Description:Dell PowerScale OneFS versions 8.1.0 – 9.1.0 contain a "use of SSH key past account expiration" vulnerability. A user on the network with the ISI_PRIV_AUTH_SSH RBAC privilege that has an expired account may potentially exploit this vulnerability, giving them access to the same things they had before account expiration. This may by a high privileged account and hence Dell recommends customers upgrade at the earliest opportunity. published:2021-02-09T22:15:13.697
Please provide detailed information about CVE-2021-26951
CVE:CVE-2021-26951 Description:An issue was discovered in the calamine crate before 0.17.0 for Rust. It allows attackers to overwrite heap-memory locations because Vec::set_len is used without proper memory claiming, and this uninitialized memory is used for a user-provided Read operation, as demonstrated by Sectors::get. published:2021-02-09T23:15:13.663
Please provide detailed information about CVE-2021-26952
CVE:CVE-2021-26952 Description:An issue was discovered in the ms3d crate before 0.1.3 for Rust. It might allow attackers to obtain sensitive information from uninitialized memory locations via IoReader::read. published:2021-02-09T23:15:13.727
Please provide detailed information about CVE-2021-26953
CVE:CVE-2021-26953 Description:An issue was discovered in the postscript crate before 0.14.0 for Rust. It might allow attackers to obtain sensitive information from uninitialized memory locations via a user-provided Read implementation. published:2021-02-09T23:15:13.787
Please provide detailed information about CVE-2021-26954
CVE:CVE-2021-26954 Description:An issue was discovered in the qwutils crate before 0.3.1 for Rust. When a Clone panic occurs, insert_slice_clone can perform a double drop. published:2021-02-09T23:15:13.850
Please provide detailed information about CVE-2021-26955
CVE:CVE-2021-26955 Description:An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because xcb::xproto::GetAtomNameReply::name() calls std::str::from_utf8_unchecked() on unvalidated bytes from an X server. published:2021-02-09T23:15:13.913
Please provide detailed information about CVE-2021-26956
CVE:CVE-2021-26956 Description:An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because bytes from an X server can be interpreted as any data type returned by xcb::xproto::GetPropertyReply::value. published:2021-02-09T23:15:13.960
Please provide detailed information about CVE-2021-26957
CVE:CVE-2021-26957 Description:An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because there is an out-of-bounds read in xcb::xproto::change_property(), as demonstrated by a format=32 T=u8 situation where out-of-bounds bytes are sent to an X server. published:2021-02-09T23:15:14.023
Please provide detailed information about CVE-2021-26958
CVE:CVE-2021-26958 Description:An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type. published:2021-02-09T23:15:14.383
Please provide detailed information about CVE-2021-26959
CVE:CVE-2021-26959 Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-21299. Reason: This candidate is a duplicate of CVE-2021-21299. Notes: All CVE users should reference CVE-2021-21299 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage published:2021-02-09T23:15:14.460
Please provide detailed information about CVE-2021-20654
CVE:CVE-2021-20654 Description:Wekan, open source kanban board system, between version 3.12 and 4.11, is vulnerable to multiple stored cross-site scripting. This is named 'Fieldbleed' in the vendor's site. published:2021-02-10T09:15:12.887
Please provide detailed information about CVE-2021-23878
CVE:CVE-2021-23878 Description:Clear text storage of sensitive Information in memory vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows a local user to view ENS settings and credentials via accessing process memory after the ENS administrator has performed specific actions. To exploit this, the local user has to access the relevant memory location immediately after an ENS administrator has made a configuration change through the console on their machine published:2021-02-10T09:15:13.090
Please provide detailed information about CVE-2021-23880
CVE:CVE-2021-23880 Description:Improper Access Control in attribute in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows authenticated local administrator user to perform an uninstallation of the anti-malware engine via the running of a specific command with the correct parameters. published:2021-02-10T10:15:13.177
Please provide detailed information about CVE-2021-23882
CVE:CVE-2021-23882 Description:Improper Access Control vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows local administrators to prevent the installation of some ENS files by placing carefully crafted files where ENS will be installed. This is only applicable to clean installations of ENS as the Access Control rules will prevent modification prior to up an upgrade. published:2021-02-10T10:15:13.363
Please provide detailed information about CVE-2021-23883
CVE:CVE-2021-23883 Description:A Null Pointer Dereference vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows a local administrator to cause Windows to crash via a specific system call which is not handled correctly. This varies by machine and had partial protection prior to this update. published:2021-02-10T10:15:13.473
Please provide detailed information about CVE-2021-23873
CVE:CVE-2021-23873 Description:Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and perform arbitrary file deletion as the SYSTEM user potentially causing Denial of Service via manipulating Junction link, after enumerating certain files, at a specific time. published:2021-02-10T11:15:12.817
Please provide detailed information about CVE-2021-23874
CVE:CVE-2021-23874 Description:Arbitrary Process Execution vulnerability in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and execute arbitrary code bypassing MTP self-defense. published:2021-02-10T11:15:12.943
Please provide detailed information about CVE-2021-23876
CVE:CVE-2021-23876 Description:Bypass Remote Procedure call in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and perform arbitrary file modification as the SYSTEM user potentially causing Denial of Service via executing carefully constructed malware. published:2021-02-10T11:15:13.100
Please provide detailed information about CVE-2021-23881
CVE:CVE-2021-23881 Description:A stored cross site scripting vulnerability in ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 February 2021 Update allows an ENS ePO administrator to add a script to a policy event which will trigger the script to be run through a browser block page when a local non-administrator user triggers the policy. published:2021-02-10T11:15:13.177
Please provide detailed information about CVE-2021-27135
CVE:CVE-2021-27135 Description:xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence. published:2021-02-10T16:15:13.787
Please provide detailed information about CVE-2021-0302
CVE:CVE-2021-0302 Description:In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782 published:2021-02-10T17:15:16.927
Please provide detailed information about CVE-2021-0305
CVE:CVE-2021-0305 Description:In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447 published:2021-02-10T17:15:17.553
Please provide detailed information about CVE-2021-0314
CVE:CVE-2021-0314 Description:In onCreate of UninstallerActivity, there is a possible way to uninstall an all without informed user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-171221302 published:2021-02-10T17:15:18.037
Please provide detailed information about CVE-2021-0325
CVE:CVE-2021-0325 Description:In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784 published:2021-02-10T17:15:18.630
Please provide detailed information about CVE-2021-0326
CVE:CVE-2021-0326 Description:In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525 published:2021-02-10T17:15:19.177
Please provide detailed information about CVE-2021-0327
CVE:CVE-2021-0327 Description:In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-172935267 published:2021-02-10T17:15:19.333
Please provide detailed information about CVE-2021-0328
CVE:CVE-2021-0328 Description:In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172670415 published:2021-02-10T17:15:19.707
Please provide detailed information about CVE-2021-0329
CVE:CVE-2021-0329 Description:In several native functions called by AdvertiseManager.java, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-171400004 published:2021-02-10T17:15:19.910
Please provide detailed information about CVE-2021-0330
CVE:CVE-2021-0330 Description:In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441 published:2021-02-10T17:15:19.957
Please provide detailed information about CVE-2021-0331
CVE:CVE-2021-0331 Description:In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-170731783 published:2021-02-10T17:15:20.367
Please provide detailed information about CVE-2021-0332
CVE:CVE-2021-0332 Description:In bootFinished of SurfaceFlinger.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-169256435 published:2021-02-10T17:15:20.413
Please provide detailed information about CVE-2021-0333
CVE:CVE-2021-0333 Description:In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-168504491 published:2021-02-10T17:15:20.663
Please provide detailed information about CVE-2021-0334
CVE:CVE-2021-0334 Description:In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811 published:2021-02-10T17:15:20.833
Please provide detailed information about CVE-2021-0335
CVE:CVE-2021-0335 Description:In process of C2SoftHevcDec.cpp, there is a possible out of bounds write due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160346309 published:2021-02-10T17:15:20.880
Please provide detailed information about CVE-2021-0336
CVE:CVE-2021-0336 Description:In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-158219161 published:2021-02-10T17:15:21.193
Please provide detailed information about CVE-2021-0337
CVE:CVE-2021-0337 Description:In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-157474195 published:2021-02-10T17:15:21.367
Please provide detailed information about CVE-2021-0338
CVE:CVE-2021-0338 Description:In SystemSettingsValidators, there is a possible permanent denial of service due to missing bounds checks on UI settings. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-156260178 published:2021-02-10T17:15:21.553
Please provide detailed information about CVE-2021-0339
CVE:CVE-2021-0339 Description:In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-145728687 published:2021-02-10T17:15:21.850
Please provide detailed information about CVE-2021-0340
CVE:CVE-2021-0340 Description:In parseNextBox of IsoInterface.java, there is a possible leak of unredacted location information due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-134155286 published:2021-02-10T17:15:21.897
Please provide detailed information about CVE-2021-0341
CVE:CVE-2021-0341 Description:In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069 published:2021-02-10T17:15:22.037
Please provide detailed information about CVE-2021-20353
CVE:CVE-2021-20353 Description:IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 194882. published:2021-02-10T17:15:22.333
Please provide detailed information about CVE-2021-26936
CVE:CVE-2021-26936 Description:The replay-sorcery program in ReplaySorcery 0.4.0 through 0.5.0, when using the default setuid-root configuration, allows a local attacker to escalate privileges to root by specifying video output paths in privileged locations. published:2021-02-10T18:15:13.017
Please provide detailed information about CVE-2021-26938
CVE:CVE-2021-26938 Description:A stored XSS issue exists in henriquedornas 5.2.17 via online live chat. NOTE: Third parties report that no such product exists. That henriquedornas is the web design agency and 5.2.17 is simply the PHP version running on this hosts published:2021-02-10T18:15:13.093
Please provide detailed information about CVE-2021-26939
CVE:CVE-2021-26939 Description:An information disclosure issue exists in henriquedornas 5.2.17 because an attacker can dump phpMyAdmin SQL content. NOTE: third parties report that this is a site-specific problem published:2021-02-10T18:15:13.170
Please provide detailed information about CVE-2021-3033
CVE:CVE-2021-3033 Description:An improper verification of cryptographic signature vulnerability exists in the Palo Alto Networks Prisma Cloud Compute console. This vulnerability enables an attacker to bypass signature validation during SAML authentication by logging in to the Prisma Cloud Compute console as any authorized user. This issue impacts: All versions of Prisma Cloud Compute 19.11, Prisma Cloud Compute 20.04, and Prisma Cloud Compute 20.09; Prisma Cloud Compute 20.12 before update 1. Prisma Cloud Compute SaaS version is not impacted by this vulnerability. published:2021-02-10T18:15:13.267
Please provide detailed information about CVE-2021-22133
CVE:CVE-2021-22133 Description:The Elastic APM agent for Go versions before 1.11.0 can leak sensitive HTTP header information when logging the details during an application panic. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an application panic it is possible the headers will not be sanitized before being sent. published:2021-02-10T19:15:12.090
Please provide detailed information about CVE-2021-27139
CVE:CVE-2021-27139 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to extract information from the device without authentication by disabling JavaScript and visiting /info.asp. published:2021-02-10T19:15:12.653