instruction stringlengths 55 56 | inputs stringclasses 1
value | outputs stringlengths 86 4.06k |
|---|---|---|
Please provide detailed information about CVE-2021-1211 | CVE:CVE-2021-1211
Description:Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to impro... | |
Please provide detailed information about CVE-2021-1212 | CVE:CVE-2021-1212
Description:Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to impro... | |
Please provide detailed information about CVE-2021-1213 | CVE:CVE-2021-1213
Description:Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to impro... | |
Please provide detailed information about CVE-2021-1214 | CVE:CVE-2021-1214
Description:Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to impro... | |
Please provide detailed information about CVE-2021-1215 | CVE:CVE-2021-1215
Description:Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to impro... | |
Please provide detailed information about CVE-2021-1216 | CVE:CVE-2021-1216
Description:Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to impro... | |
Please provide detailed information about CVE-2021-1217 | CVE:CVE-2021-1217
Description:Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to impro... | |
Please provide detailed information about CVE-2021-1223 | CVE:CVE-2021-1223
Description:Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of an HTTP range header. An attacker could exploit this vul... | |
Please provide detailed information about CVE-2021-1224 | CVE:CVE-2021-1224
Description:Multiple Cisco products are affected by a vulnerability with TCP Fast Open (TFO) when used in conjunction with the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect detection of the... | |
Please provide detailed information about CVE-2021-1226 | CVE:CVE-2021-1226
Description:A vulnerability in the audit logging component of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, Cisco Unity Connection, Cisco Emergency Responder, and Cisco Prime Licens... | |
Please provide detailed information about CVE-2021-1236 | CVE:CVE-2021-1236
Description:Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could e... | |
Please provide detailed information about CVE-2021-1237 | CVE:CVE-2021-1237
Description:A vulnerability in the Network Access Manager and Web Security Agent components of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL injection attack. To exploit this vulnerability, the attacker would need to have valid creden... | |
Please provide detailed information about CVE-2021-1238 | CVE:CVE-2021-1238
Description:Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist bec... | |
Please provide detailed information about CVE-2021-1239 | CVE:CVE-2021-1239
Description:Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected system. The vulnerabilities exist bec... | |
Please provide detailed information about CVE-2021-1240 | CVE:CVE-2021-1240
Description:A vulnerability in the loading process of specific DLLs in Cisco Proximity Desktop for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. This vulnerability is due ... | |
Please provide detailed information about CVE-2021-1242 | CVE:CVE-2021-1242
Description:A vulnerability in Cisco Webex Teams could allow an unauthenticated, remote attacker to manipulate file names within the messaging interface. The vulnerability exists because the affected software mishandles character rendering. An attacker could exploit this vulnerability by sharing a fil... | |
Please provide detailed information about CVE-2021-1245 | CVE:CVE-2021-1245
Description:Cisco Finesse and Cisco Unified CVP OpenSocial Gadget Editor Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Finesse and Cisco Unified CVP could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack aga... | |
Please provide detailed information about CVE-2021-1246 | CVE:CVE-2021-1246
Description:Cisco Finesse, Cisco Virtualized Voice Browser, and Cisco Unified CVP OpenSocial Gadget Editor Unauthenticated Access Vulnerability
A vulnerability in the web management interface of Cisco Finesse, Cisco Virtualized Voice Browser, and Cisco Unified CVP could allow an unauthenticated, re... | |
Please provide detailed information about CVE-2021-1258 | CVE:CVE-2021-1258
Description:A vulnerability in the upgrade component of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker with low privileges to read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient file permissi... | |
Please provide detailed information about CVE-2021-1267 | CVE:CVE-2021-1267
Description:A vulnerability in the dashboard widget of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper restrictions on XML entities. An attacker could... | |
Please provide detailed information about CVE-2021-1307 | CVE:CVE-2021-1307
Description:Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to impro... | |
Please provide detailed information about CVE-2021-1310 | CVE:CVE-2021-1310
Description:A vulnerability in the web-based management interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to redirect a user to an untrusted web page, bypassing the warning mechanism that should prompt the user before the redirection. This vulnerability is due to improp... | |
Please provide detailed information about CVE-2021-1311 | CVE:CVE-2021-1311
Description:A vulnerability in the reclaim host role feature of Cisco Webex Meetings and Cisco Webex Meetings Server could allow an authenticated, remote attacker to take over the host role during a meeting. This vulnerability is due to a lack of protection against brute forcing of the host key. An at... | |
Please provide detailed information about CVE-2021-1360 | CVE:CVE-2021-1360
Description:Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to impro... | |
Please provide detailed information about CVE-2021-21006 | CVE:CVE-2021-21006
Description:Adobe Photoshop version 22.1 (and earlier) is affected by a heap buffer overflow vulnerability when handling a specially crafted font file. Successful exploitation could lead to arbitrary code execution. Exploitation of this issue requires user interaction in that a victim must open a mal... | |
Please provide detailed information about CVE-2021-21007 | CVE:CVE-2021-21007
Description:Adobe Illustrator version 25.0 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:202... | |
Please provide detailed information about CVE-2021-21008 | CVE:CVE-2021-21008
Description:Adobe Animate version 21.0 (and earlier) is affected by an uncontrolled search path element that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-01... | |
Please provide detailed information about CVE-2021-21009 | CVE:CVE-2021-21009
Description:Adobe Campaign Classic Gold Standard 10 (and earlier), 20.3.1 (and earlier), 20.2.3 (and earlier), 20.1.3 (and earlier), 19.2.3 (and earlier) and 19.1.7 (and earlier) are affected by a server-side request forgery (SSRF) vulnerability. Successful exploitation could allow an attacker to use... | |
Please provide detailed information about CVE-2021-21010 | CVE:CVE-2021-21010
Description:InCopy version 15.1.1 (and earlier) for Windows is affected by an uncontrolled search path vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
publ... | |
Please provide detailed information about CVE-2021-21011 | CVE:CVE-2021-21011
Description:Adobe Captivate 2019 version 11.5.1.499 (and earlier) is affected by an uncontrolled search path element vulnerability that could lead to privilege escalation. An attacker with permissions to write to the file system could leverage this vulnerability to escalate privileges.
published:2021... | |
Please provide detailed information about CVE-2021-21012 | CVE:CVE-2021-21012
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an insecure direct object vulnerability (IDOR) in the checkout module. Successful exploitation could lead to sensitive information disclosure.
published:2021-01-13T23:15:14.400 | |
Please provide detailed information about CVE-2021-21013 | CVE:CVE-2021-21013
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an insecure direct object vulnerability (IDOR) in the customer API module. Successful exploitation could lead to sensitive information disclosure and update arbitrary information on anot... | |
Please provide detailed information about CVE-2021-3138 | CVE:CVE-2021-3138
Description:In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2FA requirement for certain forms.
published:2021-01-14T04:15:15.073 | |
Please provide detailed information about CVE-2021-20617 | CVE:CVE-2021-20617
Description:Improper access control vulnerability in acmailer ver. 4.0.1 and earlier, and acmailer DB ver. 1.1.3 and earlier allows remote attackers to execute an arbitrary OS command, or gain an administrative privilege which may result in obtaining the sensitive information on the server via unspec... | |
Please provide detailed information about CVE-2021-20618 | CVE:CVE-2021-20618
Description:Privilege chaining vulnerability in acmailer ver. 4.0.2 and earlier, and acmailer DB ver. 1.1.4 and earlier allows remote attackers to bypass authentication and to gain an administrative privilege which may result in obtaining the sensitive information on the server via unspecified vector... | |
Please provide detailed information about CVE-2021-23926 | CVE:CVE-2021-23926
Description:The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.
published:2021-01-14T15:15:13.337 | |
Please provide detailed information about CVE-2021-24122 | CVE:CVE-2021-24122
Description:When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behav... | |
Please provide detailed information about CVE-2021-21722 | CVE:CVE-2021-21722
Description:A ZTE Smart STB is impacted by an information leak vulnerability. The device did not fully verify the log, so attackers could use this vulnerability to obtain sensitive user information for further information detection and attacks. This affects: ZXV10 B860A V2.1-T_V0032.1.1.04_jiangsuTel... | |
Please provide detailed information about CVE-2021-21261 | CVE:CVE-2021-21261
Description:Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is prese... | |
Please provide detailed information about CVE-2021-22132 | CVE:CVE-2021-22132
Description:Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other ... | |
Please provide detailed information about CVE-2021-23835 | CVE:CVE-2021-23835
Description:An issue was discovered in flatCore before 2.0.0 build 139. A local file disclosure vulnerability was identified in the docs_file HTTP request body parameter for the acp interface. This can be exploited with admin access rights. The affected parameter (which retrieves the contents of the ... | |
Please provide detailed information about CVE-2021-23836 | CVE:CVE-2021-23836
Description:An issue was discovered in flatCore before 2.0.0 build 139. A stored XSS vulnerability was identified in the prefs_smtp_psw HTTP request body parameter for the acp interface. An admin user can inject malicious client-side script into the affected parameter without any form of input saniti... | |
Please provide detailed information about CVE-2021-23837 | CVE:CVE-2021-23837
Description:An issue was discovered in flatCore before 2.0.0 build 139. A time-based blind SQL injection was identified in the selected_folder HTTP request body parameter for the acp interface. The affected parameter (which retrieves the file contents of the specified folder) was found to be acceptin... | |
Please provide detailed information about CVE-2021-23838 | CVE:CVE-2021-23838
Description:An issue was discovered in flatCore before 2.0.0 build 139. A reflected XSS vulnerability was identified in the media_filter HTTP request body parameter for the acp interface. The affected parameter accepts malicious client-side script without proper input sanitization. For example, a mal... | |
Please provide detailed information about CVE-2021-20189 | CVE:CVE-2021-20189
Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
published:2021-01-15T15:15:12.847 | |
Please provide detailed information about CVE-2021-22166 | CVE:CVE-2021-22166
Description:An attacker could cause a Prometheus denial of service in GitLab 13.7+ by sending an HTTP request with a malformed method
published:2021-01-15T16:15:13.217 | |
Please provide detailed information about CVE-2021-22167 | CVE:CVE-2021-22167
Description:An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers in specific project page allows attacker to have a temporary read access to the private repository
published:2021-01-15T16:15:13.390 | |
Please provide detailed information about CVE-2021-22168 | CVE:CVE-2021-22168
Description:A regular expression denial of service issue has been discovered in NuGet API affecting all versions of GitLab starting from version 12.8.
published:2021-01-15T16:15:13.453 | |
Please provide detailed information about CVE-2021-22171 | CVE:CVE-2021-22171
Description:Insufficient validation of authentication parameters in GitLab Pages for GitLab 11.5+ allows an attacker to steal a victim's API token if they click on a maliciously crafted link
published:2021-01-15T16:15:13.517 | |
Please provide detailed information about CVE-2021-0202 | CVE:CVE-2021-0202
Description:On Juniper Networks MX Series and EX9200 Series platforms with Trio-based MPC (Modular Port Concentrator) where Integrated Routing and Bridging (IRB) interface is configured and it is mapped to a VPLS instance or a Bridge-Domain, certain network events at Customer Edge (CE) device may caus... | |
Please provide detailed information about CVE-2021-0203 | CVE:CVE-2021-0203
Description:On Juniper Networks EX and QFX5K Series platforms configured with Redundant Trunk Group (RTG), Storm Control profile applied on the RTG interface might not take affect when it reaches the threshold condition. Storm Control enables the device to monitor traffic levels and to drop broadcast,... | |
Please provide detailed information about CVE-2021-0204 | CVE:CVE-2021-0204
Description:A sensitive information disclosure vulnerability in delta-export configuration utility (dexp) of Juniper Networks Junos OS may allow a locally authenticated shell user the ability to create and read database files generated by the dexp utility, including password hashes of local users. Sin... | |
Please provide detailed information about CVE-2021-0205 | CVE:CVE-2021-0205
Description:When the "Intrusion Detection Service" (IDS) feature is configured on Juniper Networks MX series with a dynamic firewall filter using IPv6 source or destination prefix, it may incorrectly match the prefix as /32, causing the filter to block unexpected traffic. This issue affects only IPv6 ... | |
Please provide detailed information about CVE-2021-0206 | CVE:CVE-2021-0206
Description:A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to send a specific packet causing the packet forwarding engine (PFE) to crash and restart, resulting in a Denial of Service (DoS). By continuously sending these specific packets, an attacker can repeat... | |
Please provide detailed information about CVE-2021-0207 | CVE:CVE-2021-0207
Description:An improper interpretation conflict of certain data between certain software components within the Juniper Networks Junos OS devices does not allow certain traffic to pass through the device upon receipt from an ingress interface filtering certain specific types of traffic which is then be... | |
Please provide detailed information about CVE-2021-0208 | CVE:CVE-2021-0208
Description:An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (D... | |
Please provide detailed information about CVE-2021-0209 | CVE:CVE-2021-0209
Description:In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an exten... | |
Please provide detailed information about CVE-2021-0210 | CVE:CVE-2021-0210
Description:An Information Exposure vulnerability in J-Web of Juniper Networks Junos OS allows an unauthenticated attacker to elevate their privileges over the target system through opportunistic use of an authenticated users session. This issue affects: Juniper Networks Junos OS 12.3 versions prior t... | |
Please provide detailed information about CVE-2021-0211 | CVE:CVE-2021-0211
Description:An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec d... | |
Please provide detailed information about CVE-2021-0212 | CVE:CVE-2021-0212
Description:An Information Exposure vulnerability in Juniper Networks Contrail Networking allows a locally authenticated attacker able to read files to retrieve administrator credentials stored in plaintext thereby elevating their privileges over the system. This issue affects: Juniper Networks Contra... | |
Please provide detailed information about CVE-2021-0215 | CVE:CVE-2021-0215
Description:On Juniper Networks Junos EX series, QFX Series, MX Series and SRX branch series devices, a memory leak occurs every time the 802.1X authenticator port interface flaps which can lead to other processes, such as the pfex process, responsible for packet forwarding, to crash and restart. An a... | |
Please provide detailed information about CVE-2021-0217 | CVE:CVE-2021-0217
Description:A vulnerability in processing of certain DHCP packets from adjacent clients on EX Series and QFX Series switches running Juniper Networks Junos OS with DHCP local/relay server configured may lead to exhaustion of DMA memory causing a Denial of Service (DoS). Over time, exploitation of this... | |
Please provide detailed information about CVE-2021-0218 | CVE:CVE-2021-0218
Description:A command injection vulnerability in the license-check daemon of Juniper Networks Junos OS that may allow a locally authenticated attacker with low privileges to execute commands with root privilege. license-check is a daemon used to manage licenses in Junos OS. To update licenses, a user ... | |
Please provide detailed information about CVE-2021-0219 | CVE:CVE-2021-0219
Description:A command injection vulnerability in install package validation subsystem of Juniper Networks Junos OS that may allow a locally authenticated attacker with privileges to execute commands with root privilege. To validate a package in Junos before installation, an administrator executes the ... | |
Please provide detailed information about CVE-2021-0220 | CVE:CVE-2021-0220
Description:The Junos Space Network Management Platform has been found to store shared secrets in a recoverable format that can be exposed through the UI. An attacker who is able to execute arbitrary code in the victim browser (for example via XSS) or access cached contents may be able to obtain a cop... | |
Please provide detailed information about CVE-2021-0221 | CVE:CVE-2021-0221
Description:In an EVPN/VXLAN scenario, if an IRB interface with a virtual gateway address (VGA) is configured on a PE, a traffic loop may occur upon receipt of specific IP multicast traffic. The traffic loop will cause interface traffic to increase abnormally, ultimately leading to a Denial of Service... | |
Please provide detailed information about CVE-2021-0222 | CVE:CVE-2021-0222
Description:A vulnerability in Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending certain crafted protocol packets from an adjacent device with invalid payloads to the device. These crafted packets, which should be discarded, are instead replicated... | |
Please provide detailed information about CVE-2021-0223 | CVE:CVE-2021-0223
Description:A local privilege escalation vulnerability in telnetd.real of Juniper Networks Junos OS may allow a locally authenticated shell user to escalate privileges and execute arbitrary commands as root. telnetd.real is shipped with setuid permissions enabled and is owned by the root user, allowin... | |
Please provide detailed information about CVE-2021-21237 | CVE:CVE-2021-21237
Description:Git LFS is a command line extension for managing large files with Git. On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect... | |
Please provide detailed information about CVE-2021-21243 | CVE:CVE-2021-21243
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, a Kubernetes REST endpoint exposes two methods that deserialize untrusted data from the request body. These endpoints do not enforce any authentication or authorization checks. This issue may lead to pre-auth RCE. Th... | |
Please provide detailed information about CVE-2021-21244 | CVE:CVE-2021-21244
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, There is a vulnerability that enabled pre-auth server side template injection via Bean validation message tampering. Full details in the reference GHSA. This issue was fixed in 4.0.3 by disabling validation interpola... | |
Please provide detailed information about CVE-2021-21242 | CVE:CVE-2021-21242
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authenti... | |
Please provide detailed information about CVE-2021-21245 | CVE:CVE-2021-21245
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to ... | |
Please provide detailed information about CVE-2021-21246 | CVE:CVE-2021-21246
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check to make sure that only administrators can list user details. However for the `/users/{id}` endpoint there are no security checks enforced so it is possible to ... | |
Please provide detailed information about CVE-2021-21247 | CVE:CVE-2021-21247
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the application's BasePage registers an AJAX event listener (`AbstractPostAjaxBehavior`) in all pages other than the login page. This listener decodes and deserializes the `data` query parameter. We can access this l... | |
Please provide detailed information about CVE-2021-21248 | CVE:CVE-2021-21248
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability involving the build endpoint parameters. InputSpec is used to define parameters of a Build spec. It does so by using dynamically generated Groovy classes. A user able to control job ... | |
Please provide detailed information about CVE-2021-21249 | CVE:CVE-2021-21249
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is an issue involving YAML parsing which can lead to post-auth remote code execution. In order to parse and process YAML files, OneDev uses SnakeYaml which by default (when not using `SafeConstructor`) allows t... | |
Please provide detailed information about CVE-2021-21250 | CVE:CVE-2021-21250
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which may lead to arbitrary file read. When BuildSpec is provided in XML format, the spec is processed by XmlBuildSpecMigrator.migrate(buildSpecString); which processes the XML docum... | |
Please provide detailed information about CVE-2021-21251 | CVE:CVE-2021-21251
Description:OneDev is an all-in-one devops platform. In OneDev before version 4.0.3 there is a critical "zip slip" vulnerability. This issue may lead to arbitrary file write. The KubernetesResource REST endpoint untars user controlled data from the request body using TarUtils. TarUtils is a custom li... | |
Please provide detailed information about CVE-2021-3162 | CVE:CVE-2021-3162
Description:Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.
published:2021-01-15T22:15:13.227 | |
Please provide detailed information about CVE-2021-3113 | CVE:CVE-2021-3113
Description:Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request oc... | |
Please provide detailed information about CVE-2021-3166 | CVE:CVE-2021-3166
Description:An issue was discovered on ASUS DSL-N14U-B1 1.1.2.3_805 devices. An attacker can upload arbitrary file content as a firmware update when the filename Settings_DSL-N14U-B1.trx is used. Once this file is loaded, shutdown measures on a wide range of services are triggered as if it were a real... | |
Please provide detailed information about CVE-2021-25294 | CVE:CVE-2021-25294
Description:OpenCATS through 0.9.5-3 unsafely deserializes index.php?m=activity requests, leading to remote code execution. This occurs because lib/DataGrid.php calls unserialize for the parametersactivity:ActivityDataGrid parameter. The PHP object injection exploit chain can leverage an __destruct m... | |
Please provide detailed information about CVE-2021-25295 | CVE:CVE-2021-25295
Description:OpenCATS through 0.9.5-3 has multiple Cross-site Scripting (XSS) issues.
published:2021-01-18T06:15:13.707 | |
Please provide detailed information about CVE-2021-25173 | CVE:CVE-2021-25173
Description:An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
published:... | |
Please provide detailed information about CVE-2021-25174 | CVE:CVE-2021-25174
Description:An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).
published:2021-01-18T08:15:13.... | |
Please provide detailed information about CVE-2021-25175 | CVE:CVE-2021-25175
Description:An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Conversion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart).
published:2021-01... | |
Please provide detailed information about CVE-2021-25176 | CVE:CVE-2021-25176
Description:An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A NULL pointer dereference exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart).
published:2021... | |
Please provide detailed information about CVE-2021-25177 | CVE:CVE-2021-25177
Description:An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Confusion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart).
published:2021-01-... | |
Please provide detailed information about CVE-2021-25178 | CVE:CVE-2021-25178
Description:An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. This can allow attackers to cause a crash potentially enabling a denial of service attack (... | |
Please provide detailed information about CVE-2020-28476 | CVE:CVE-2020-28476
Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-23336. Reason: This candidate is a reservation duplicate of CVE-2021-23336. Notes: All CVE users should reference CVE-2021-23336 instead of this candidate. All references and descriptions in this candidate have been r... | |
Please provide detailed information about CVE-2021-20619 | CVE:CVE-2021-20619
Description:Cross-site scripting vulnerability in GROWI (v4.2 Series) versions prior to v4.2.3 allows remote attackers to inject an arbitrary script via unspecified vectors.
published:2021-01-19T05:15:13.933 | |
Please provide detailed information about CVE-2021-3177 | CVE:CVE-2021-3177
Description:Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because... | |
Please provide detailed information about CVE-2021-3178 | CVE:CVE-2021-3178
Description:fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirectory export is not intended to prevent thi... | |
Please provide detailed information about CVE-2021-22850 | CVE:CVE-2021-22850
Description:HGiga EIP product lacks ineffective access control in certain pages that allow attackers to access database or perform privileged functions.
published:2021-01-19T10:15:15.243 | |
Please provide detailed information about CVE-2021-22851 | CVE:CVE-2021-22851
Description:HGiga EIP product contains SQL Injection vulnerability. Attackers can inject SQL commands into specific URL parameter (document management page) to obtain database schema and data.
published:2021-01-19T10:15:15.807 | |
Please provide detailed information about CVE-2021-22852 | CVE:CVE-2021-22852
Description:HGiga EIP product contains SQL Injection vulnerability. Attackers can inject SQL commands into specific URL parameter (online registration) to obtain database schema and data.
published:2021-01-19T10:15:15.930 | |
Please provide detailed information about CVE-2021-3181 | CVE:CVE-2021-3181
Description:rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large ... | |
Please provide detailed information about CVE-2021-3182 | CVE:CVE-2021-3182
Description:D-Link DCS-5220 devices have a buffer overflow. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
published:2021-01-19T15:15:12.403 | |
Please provide detailed information about CVE-2021-3183 | CVE:CVE-2021-3183
Description:Files.com Fat Client 3.3.6 allows authentication bypass because the client continues to have access after a logout and a removal of a login profile.
published:2021-01-19T15:15:12.467 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.