instruction
stringlengths
55
56
inputs
stringclasses
1 value
outputs
stringlengths
86
4.06k
Please provide detailed information about CVE-2021-20183
CVE:CVE-2021-20183 Description:It was found in Moodle before version 3.10.1 that some search inputs were vulnerable to reflected XSS due to insufficient escaping of search queries. published:2021-01-28T19:15:13.160
Please provide detailed information about CVE-2021-20184
CVE:CVE-2021-20184 Description:It was found in Moodle before version 3.10.1, 3.9.4 and 3.8.7 that a insufficient capability checks in some grade related web services meant students were able to view other students grades. published:2021-01-28T19:15:13.237
Please provide detailed information about CVE-2021-20186
CVE:CVE-2021-20186 Description:It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that if the TeX notation filter was enabled, additional sanitizing of TeX content was required to prevent the risk of stored XSS. published:2021-01-28T19:15:13.300
Please provide detailed information about CVE-2021-20187
CVE:CVE-2021-20187 Description:It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that it was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication. published:2021-01-28T19:15:13.377
Please provide detailed information about CVE-2021-25647
CVE:CVE-2021-25647 Description:Mobile application "Testes de Codigo" v11.3 and prior allows stored XSS by injecting a payload in the "feedback" message field causing it to be stored in the remote database and leading to its execution on client devices when loading the "feedback list", either by accessing the website directly or using the mobile application. published:2021-01-28T19:15:13.473
Please provide detailed information about CVE-2021-20185
CVE:CVE-2021-20185 Description:It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that messaging did not impose a character limit when sending messages, which could result in client-side (browser) denial of service for users receiving very large messages. published:2021-01-28T20:15:13.133
Please provide detailed information about CVE-2021-3160
CVE:CVE-2021-3160 Description:Deserialization of untrusted data in the login page of ASSUWEB 359.3 build 1 subcomponent of ACA ASSUREX RENTES product allows a remote attacker to inject unsecure serialized Java object using a specially crafted HTTP request, resulting in an unauthenticated remote code execution on the server. published:2021-01-28T20:15:13.227
Please provide detailed information about CVE-2021-3337
CVE:CVE-2021-3337 Description:The Hide-Thread-Content plugin through 2021-01-27 for MyBB allows remote attackers to bypass intended content-reading restrictions by clicking on reply or quote in the postbit. published:2021-01-28T20:15:13.307
Please provide detailed information about CVE-2021-3341
CVE:CVE-2021-3341 Description:A path traversal vulnerability in the DxWebEngine component of DH2i DxEnterprise and DxOdyssey for Windows, version 19.5 through 20.x before 20.0.219.0, allows an attacker to read any file on the host file system via an HTTP request. published:2021-01-29T01:15:14.610
Please provide detailed information about CVE-2021-26303
CVE:CVE-2021-26303 Description:PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to stored XSS via the user-profile.php Full Name field. published:2021-01-29T02:15:13.453
Please provide detailed information about CVE-2021-26304
CVE:CVE-2021-26304 Description:PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to stored XSS via the add-expense.php Item parameter. published:2021-01-29T02:15:13.517
Please provide detailed information about CVE-2021-26305
CVE:CVE-2021-26305 Description:An issue was discovered in Deserializer::read_vec in the cdr crate before 0.2.4 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated heap memory, violating soundness. published:2021-01-29T03:15:12.363
Please provide detailed information about CVE-2021-26306
CVE:CVE-2021-26306 Description:An issue was discovered in the raw-cpuid crate before 9.0.0 for Rust. It has unsound transmute calls within as_string() methods. published:2021-01-29T03:15:12.427
Please provide detailed information about CVE-2021-26307
CVE:CVE-2021-26307 Description:An issue was discovered in the raw-cpuid crate before 9.0.0 for Rust. It allows __cpuid_count() calls even if the processor does not support the CPUID instruction, which is unsound and causes a deterministic crash. published:2021-01-29T03:15:12.490
Please provide detailed information about CVE-2021-26308
CVE:CVE-2021-26308 Description:An issue was discovered in the marc crate before 2.0.0 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated memory, violating soundness. published:2021-01-29T03:15:12.550
Please provide detailed information about CVE-2021-3336
CVE:CVE-2021-3336 Description:DoTls13CertificateVerify in tls13.c in wolfSSL before 4.7.0 does not cease processing for certain anomalous peer behavior (sending an ED22519, ED448, ECC, or RSA signature without the corresponding certificate). The client side is affected because man-in-the-middle attackers can impersonate TLS 1.3 servers. published:2021-01-29T05:15:12.197
Please provide detailed information about CVE-2021-3298
CVE:CVE-2021-3298 Description:Collabtive 3.1 allows XSS when an authenticated user enters an XSS payload into the address section of the profile edit page, aka the manageuser.php?action=edit address1 parameter. published:2021-01-29T06:15:13.977
Please provide detailed information about CVE-2021-3176
CVE:CVE-2021-3176 Description:The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows before 6.4.15 and 7.x before 7.1.2 could allow an attacker to gain access to user information by sending certain code, due to improper input validation of http links. A successful exploit could allow an attacker to view user information and application data. published:2021-01-29T07:15:18.810
Please provide detailed information about CVE-2021-25123
CVE:CVE-2021-25123 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice addlicense_func function. published:2021-01-29T13:15:12.480
Please provide detailed information about CVE-2021-25909
CVE:CVE-2021-25909 Description:ZIV Automation 4CCT-EA6-334126BF firmware version 3.23.80.27.36371, allows an unauthenticated, remote attacker to cause a denial of service condition on the device. An attacker could exploit this vulnerability by sending specific packets to the port 7919. published:2021-01-29T14:15:12.277
Please provide detailed information about CVE-2021-25910
CVE:CVE-2021-25910 Description:Improper Authentication vulnerability in the cookie parameter of ZIV AUTOMATION 4CCT-EA6-334126BF allows a local attacker to perform modifications in several parameters of the affected device as an authenticated user. published:2021-01-29T14:15:12.467
Please provide detailed information about CVE-2021-20586
CVE:CVE-2021-20586 Description:Resource management errors vulnerability in a robot controller of MELFA FR Series(controller "CR800-*V*D" of RV-*FR***-D-* all versions, controller "CR800-*HD" of RH-*FRH***-D-* all versions, controller "CR800-*HRD" of RH-*FRHR***-D-* all versions, controller "CR800-*V*R with R16RTCPU" of RV-*FR***-R-* all versions, controller "CR800-*HR with R16RTCPU" of RH-*FRH***-R-* all versions, controller "CR800-*HRR with R16RTCPU" of RH-*FRHR***-R-* all versions, controller "CR800-*V*Q with Q172DSRCPU" of RV-*FR***-Q-* all versions, controller "CR800-*HQ with Q172DSRCPU" of RH-*FRH***-Q-* all versions, controller "CR800-*HRQ with Q172DSRCPU" of RH-*FRHR***-Q-* all versions) and a robot controller of MELFA CR Series(controller "CR800-CVD" of RV-8CRL-D-* all versions, controller "CR800-CHD" of RH-*CRH**-D-* all versions) as well as a cooperative robot ASSISTA(controller "CR800-05VD" of RV-5AS-D-* all versions) allows a remote unauthenticated attacker to cause a DoS of the execution of the robot program and the Ethernet communication by sending a large amount of packets in burst over a short period of time. As a result of DoS, an error may occur. A reset is required to recover it if the error occurs. published:2021-01-29T15:15:12.833
Please provide detailed information about CVE-2021-3345
CVE:CVE-2021-3345 Description:_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later. published:2021-01-29T15:15:13.083
Please provide detailed information about CVE-2021-23328
CVE:CVE-2021-23328 Description:This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program. published:2021-01-29T17:15:12.810
Please provide detailed information about CVE-2021-3346
CVE:CVE-2021-3346 Description:Foris before 101.1.1, as used in Turris OS, lacks certain HTML escaping in the login template. published:2021-01-29T17:15:12.887
Please provide detailed information about CVE-2021-3347
CVE:CVE-2021-3347 Description:An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458. published:2021-01-29T17:15:12.950
Please provide detailed information about CVE-2021-25124
CVE:CVE-2021-25124 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local spx_restservice deletevideo_func function path traversal vulnerability. published:2021-01-29T19:15:13.427
Please provide detailed information about CVE-2021-25125
CVE:CVE-2021-25125 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local spx_restservice delsolrecordedvideo_func function path traversal vulnerability. published:2021-01-29T19:15:13.490
Please provide detailed information about CVE-2021-25126
CVE:CVE-2021-25126 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice downloadkvmjnlp_func function. published:2021-01-29T19:15:13.553
Please provide detailed information about CVE-2021-25127
CVE:CVE-2021-25127 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice generatesslcertificate_func function. published:2021-01-29T19:15:13.630
Please provide detailed information about CVE-2021-25128
CVE:CVE-2021-25128 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local spx_restservice gethelpdata_func function path traversal vulnerability. published:2021-01-29T19:15:13.697
Please provide detailed information about CVE-2021-25129
CVE:CVE-2021-25129 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local spx_restservice getvideodata_func function path traversal vulnerability. published:2021-01-29T19:15:13.757
Please provide detailed information about CVE-2021-25130
CVE:CVE-2021-25130 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setactdir_func function. published:2021-01-29T19:15:13.817
Please provide detailed information about CVE-2021-25131
CVE:CVE-2021-25131 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setfwimagelocation_func function. published:2021-01-29T19:15:13.880
Please provide detailed information about CVE-2021-25132
CVE:CVE-2021-25132 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setmediaconfig_func function. published:2021-01-29T19:15:13.960
Please provide detailed information about CVE-2021-25133
CVE:CVE-2021-25133 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setradiusconfig_func function. published:2021-01-29T19:15:14.020
Please provide detailed information about CVE-2021-25134
CVE:CVE-2021-25134 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setremoteimageinfo_func function. published:2021-01-29T19:15:14.100
Please provide detailed information about CVE-2021-25135
CVE:CVE-2021-25135 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setsmtp_func function. published:2021-01-29T19:15:14.163
Please provide detailed information about CVE-2021-25136
CVE:CVE-2021-25136 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setsolvideoremotestorage_func function. published:2021-01-29T19:15:14.223
Please provide detailed information about CVE-2021-25137
CVE:CVE-2021-25137 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice startflash_func function. published:2021-01-29T19:15:14.287
Please provide detailed information about CVE-2021-25138
CVE:CVE-2021-25138 Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice uploadsshkey function. published:2021-01-29T19:15:14.350
Please provide detailed information about CVE-2021-25646
CVE:CVE-2021-25646 Description:Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process. published:2021-01-29T20:15:12.997
Please provide detailed information about CVE-2021-21254
CVE:CVE-2021-21254 Description:CKEditor 5 is an open source rich text editor framework with a modular architecture. The CKEditor 5 Markdown plugin (@ckeditor/ckeditor5-markdown-gfm) before version 25.0.0 has a regex denial of service (ReDoS) vulnerability. The vulnerability allowed to abuse link recognition regular expression, which could cause a significant performance drop resulting in browser tab freeze. It affects all users using CKEditor 5 Markdown plugin at version <= 24.0.0. The problem has been recognized and patched. The fix will be available in version 25.0.0. published:2021-01-29T22:15:14.797
Please provide detailed information about CVE-2021-23329
CVE:CVE-2021-23329 Description:The package nested-object-assign before 1.0.4 are vulnerable to Prototype Pollution via the default function, as demonstrated by running the PoC below. published:2021-01-31T16:15:12.377
Please provide detailed information about CVE-2021-3348
CVE:CVE-2021-3348 Description:nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71. published:2021-02-01T04:15:14.430
Please provide detailed information about CVE-2021-3349
CVE:CVE-2021-3349 Description:GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior published:2021-02-01T05:15:11.880
Please provide detailed information about CVE-2021-3350
CVE:CVE-2021-3350 Description:deleteaccount.php in the Delete Account plugin 1.4 for MyBB allows XSS via the deletereason parameter. published:2021-02-01T05:15:12.003
Please provide detailed information about CVE-2021-21266
CVE:CVE-2021-21266 Description:openHAB is a vendor and technology agnostic open source automation software for your home. In openHAB before versions 2.5.12 and 3.0.1 the XML external entity (XXE) attack allows attackers in the same network as the openHAB instance to retrieve internal information like the content of files from the file system. Responses to SSDP requests can be especially malicious. All add-ons that use SAX or JAXB parsing of externally received XML are potentially subject to this kind of attack. In openHAB, the following add-ons are potentially impacted: AvmFritz, BoseSoundtouch, DenonMarantz, DLinkSmarthome, Enigma2, FmiWeather, FSInternetRadio, Gce, Homematic, HPPrinter, IHC, Insteon, Onkyo, Roku, SamsungTV, Sonos, Roku, Tellstick, TR064, UPnPControl, Vitotronic, Wemo, YamahaReceiver and XPath Tranformation. The vulnerabilities have been fixed in versions 2.5.12 and 3.0.1 by a more strict configuration of the used XML parser. published:2021-02-01T15:15:13.057
Please provide detailed information about CVE-2021-21276
CVE:CVE-2021-21276 Description:Polr is an open source URL shortener. in Polr before version 2.3.0, a vulnerability in the setup process allows attackers to gain admin access to site instances, even if they do not possess an existing account. This vulnerability exists regardless of users' settings. If an attacker crafts a request with specific cookie headers to the /setup/finish endpoint, they may be able to obtain admin privileges on the instance. This is caused by a loose comparison (==) in SetupController that is susceptible to attack. The project has been patched to ensure that a strict comparison (===) is used to verify the setup key, and that /setup/finish verifies that no users table exists before performing any migrations or provisioning any new accounts. This is fixed in version 2.3.0. Users can patch this vulnerability without upgrading by adding abort(404) to the very first line of finishSetup in SetupController.php. published:2021-02-01T15:15:13.260
Please provide detailed information about CVE-2021-21277
CVE:CVE-2021-21277 Description:angular-expressions is "angular's nicest part extracted as a standalone module for the browser and node". In angular-expressions before version 1.1.2 there is a vulnerability which allows Remote Code Execution if you call "expressions.compile(userControlledInput)" where "userControlledInput" is text that comes from user input. The security of the package could be bypassed by using a more complex payload, using a ".constructor.constructor" technique. In terms of impact: If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. This is fixed in version 1.1.2 of angular-expressions A temporary workaround might be either to disable user-controlled input that will be fed into angular-expressions in your application or allow only following characters in the userControlledInput. published:2021-02-01T15:15:13.340
Please provide detailed information about CVE-2021-23330
CVE:CVE-2021-23330 Description:All versions of package launchpad are vulnerable to Command Injection via stop. published:2021-02-01T15:15:13.450
Please provide detailed information about CVE-2021-21286
CVE:CVE-2021-21286 Description:AVideo Platform is an open-source Audio and Video platform. It is similar to a self-hosted YouTube. In AVideo Platform before version 10.2 there is an authorization bypass vulnerability which enables an ordinary user to get admin control. This is fixed in version 10.2. All queries now remove the pass hash and the recoverPass hash. published:2021-02-01T16:15:13.047
Please provide detailed information about CVE-2021-3024
CVE:CVE-2021-3024 Description:HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7. published:2021-02-01T16:15:13.217
Please provide detailed information about CVE-2021-3282
CVE:CVE-2021-3282 Description:HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2. published:2021-02-01T16:15:13.280
Please provide detailed information about CVE-2021-3283
CVE:CVE-2021-3283 Description:HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java task drivers can access processes associated with other tasks on the same node. Fixed in 0.12.10, and 1.0.3. published:2021-02-01T16:15:13.357
Please provide detailed information about CVE-2021-21287
CVE:CVE-2021-21287 Description:MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with "MINIO_BROWSER=off" environment variable. published:2021-02-01T18:15:13.890
Please provide detailed information about CVE-2021-3340
CVE:CVE-2021-3340 Description:A cross-site scripting (XSS) vulnerability in many forms of Wikindx before 5.7.0 and 6.x through 6.4.0 allows remote attackers to inject arbitrary web script or HTML via the message parameter to index.php?action=initLogon or modules/admin/DELETEIMAGES.php. published:2021-02-01T22:15:14.067
Please provide detailed information about CVE-2021-3378
CVE:CVE-2021-3378 Description:FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp. published:2021-02-01T23:15:12.797
Please provide detailed information about CVE-2021-20207
CVE:CVE-2021-20207 Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs:CVE-2021-3348. Reason: This candidate is a reservation duplicate of CVE-2021-3348. Notes: All CVE users should reference CVE-2021-3348 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage published:2021-02-02T07:15:13.910
Please provide detailed information about CVE-2021-3281
CVE:CVE-2021-3281 Description:In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. published:2021-02-02T07:15:14.020
Please provide detailed information about CVE-2021-25310
CVE:CVE-2021-25310 Description:The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 devices allows remote authenticated attackers to execute system commands with root privileges via shell metacharacters in the ui_language POST parameter to the apply.cgi form endpoint. This occurs in do_upgrade_post in mini_httpd. NOTE: This vulnerability only affects products that are no longer supported by the maintaine published:2021-02-02T15:15:16.840
Please provide detailed information about CVE-2021-21284
CVE:CVE-2021-21284 Description:In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user. published:2021-02-02T18:15:11.827
Please provide detailed information about CVE-2021-21285
CVE:CVE-2021-21285 Description:In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing. published:2021-02-02T18:15:12.203
Please provide detailed information about CVE-2021-20199
CVE:CVE-2021-20199 Description:Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards. published:2021-02-02T19:15:14.000
Please provide detailed information about CVE-2021-21289
CVE:CVE-2021-21289 Description:Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes' methods which implicitly use Ruby's Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#save_as, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#read_body. This is fixed in version 2.7.7. published:2021-02-02T19:15:14.220
Please provide detailed information about CVE-2021-21291
CVE:CVE-2021-21291 Description:OAuth2 Proxy is an open-source reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. In OAuth2 Proxy before version 7.0.0, for users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. For example, if a whitelist domain was configured for ".example.com", the intention is that subdomains of example.com are allowed. Instead, "example.com" and "badexample.com" could also match. This is fixed in version 7.0.0 onwards. As a workaround, one can disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain. published:2021-02-02T19:15:14.330
Please provide detailed information about CVE-2021-23271
CVE:CVE-2021-23271 Description:The TIBCO EBX Web Server component of TIBCO Software Inc.'s TIBCO EBX contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) attack on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.9.12 and below. published:2021-02-02T19:15:14.423
Please provide detailed information about CVE-2021-25912
CVE:CVE-2021-25912 Description:Prototype pollution vulnerability in 'dotty' versions 0.0.1 through 0.1.0 allows attackers to cause a denial of service and may lead to remote code execution. published:2021-02-02T19:15:14.550
Please provide detailed information about CVE-2021-21292
CVE:CVE-2021-21292 Description:Traccar is an open source GPS tracking system. In Traccar before version 4.12 there is an unquoted Windows binary path vulnerability. Only Windows versions are impacted. Attacker needs write access to the filesystem on the host machine. If Java path includes a space, then attacker can lift their privilege to the same as Traccar service (system). This is fixed in version 4.12. published:2021-02-02T20:15:12.173
Please provide detailed information about CVE-2021-3395
CVE:CVE-2021-3395 Description:A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote authenticated users to upload an arbitrary file. The JavaScript code will execute when someone visits the attachment. published:2021-02-02T21:15:14.193
Please provide detailed information about CVE-2021-21293
CVE:CVE-2021-21293 Description:blaze is a Scala library for building asynchronous pipelines, with a focus on network IO. All servers running blaze-core before version 0.14.15 are affected by a vulnerability in which unbounded connection acceptance leads to file handle exhaustion. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. The issue is fixed in version 0.14.15 for "NIO1SocketServerGroup". A "maxConnections" parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. The "NIO2SocketServerGroup" has no such setting and is now deprecated. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xmw9-q7x9-j5qc. published:2021-02-02T22:15:12.290
Please provide detailed information about CVE-2021-21294
CVE:CVE-2021-21294 Description:Http4s (http4s-blaze-server) is a minimal, idiomatic Scala interface for HTTP services. Http4s before versions 0.21.17, 0.22.0-M2, and 1.0.0-M14 have a vulnerability which can lead to a denial-of-service. Blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. http4s provides a general "MaxActiveRequests" middleware mechanism for limiting open connections, but it is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. In 0.21.17, 0.22.0-M2, and 1.0.0-M14, a new "maxConnections" property, with a default value of 1024, has been added to the `BlazeServerBuilder`. Setting the value to a negative number restores unbounded behavior, but is strongly disrecommended. The NIO2 backend does not respect `maxConnections`. Its use is now deprecated in http4s-0.21, and the option is removed altogether starting in http4s-0.22. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xhv5-w9c5-2r2w. published:2021-02-02T22:15:12.387
Please provide detailed information about CVE-2021-21043
CVE:CVE-2021-21043 Description:ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful. published:2021-02-02T23:15:12.813
Please provide detailed information about CVE-2021-0352
CVE:CVE-2021-0352 Description:In RT regmap driver, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05453809. published:2021-02-03T00:15:14.780
Please provide detailed information about CVE-2021-0353
CVE:CVE-2021-0353 Description:In kisd, there is a possible memory corruption due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05425247. published:2021-02-03T00:15:15.017
Please provide detailed information about CVE-2021-0354
CVE:CVE-2021-0354 Description:In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11; Patch ID: ALPS05431161. published:2021-02-03T00:15:15.157
Please provide detailed information about CVE-2021-0355
CVE:CVE-2021-0355 Description:In kisd, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05425581. published:2021-02-03T00:15:15.343
Please provide detailed information about CVE-2021-0356
CVE:CVE-2021-0356 Description:In netdiag, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442014. published:2021-02-03T00:15:15.610
Please provide detailed information about CVE-2021-0357
CVE:CVE-2021-0357 Description:In netdiag, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442002. published:2021-02-03T00:15:15.767
Please provide detailed information about CVE-2021-0358
CVE:CVE-2021-0358 Description:In netdiag, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442022. published:2021-02-03T00:15:15.920
Please provide detailed information about CVE-2021-0359
CVE:CVE-2021-0359 Description:In netdiag, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442011. published:2021-02-03T00:15:16.110
Please provide detailed information about CVE-2021-0360
CVE:CVE-2021-0360 Description:In netdiag, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442006. published:2021-02-03T00:15:16.297
Please provide detailed information about CVE-2021-0361
CVE:CVE-2021-0361 Description:In kisd, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05449968. published:2021-02-03T00:15:16.420
Please provide detailed information about CVE-2021-0362
CVE:CVE-2021-0362 Description:In aee, there is a possible memory corruption due to a stack buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05457070. published:2021-02-03T00:15:16.657
Please provide detailed information about CVE-2021-0363
CVE:CVE-2021-0363 Description:In mobile_log_d, there is a possible command injection due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05458478. published:2021-02-03T00:15:16.717
Please provide detailed information about CVE-2021-0364
CVE:CVE-2021-0364 Description:In mobile_log_d, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05458478; Issue ID: ALPS05458503. published:2021-02-03T00:15:16.827
Please provide detailed information about CVE-2021-0365
CVE:CVE-2021-0365 Description:In display driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05454782. published:2021-02-03T00:15:17.063
Please provide detailed information about CVE-2021-25755
CVE:CVE-2021-25755 Description:In JetBrains Code With Me before 2020.3, an attacker on the local network, knowing a session ID, could get access to the encrypted traffic. published:2021-02-03T16:15:14.227
Please provide detailed information about CVE-2021-25756
CVE:CVE-2021-25756 Description:In JetBrains IntelliJ IDEA before 2020.2, HTTP links were used for several remote repositories instead of HTTPS. published:2021-02-03T16:15:14.307
Please provide detailed information about CVE-2021-25757
CVE:CVE-2021-25757 Description:In JetBrains Hub before 2020.1.12629, an open redirect was possible. published:2021-02-03T16:15:14.367
Please provide detailed information about CVE-2021-25758
CVE:CVE-2021-25758 Description:In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to local code execution. published:2021-02-03T16:15:14.430
Please provide detailed information about CVE-2021-25759
CVE:CVE-2021-25759 Description:In JetBrains Hub before 2020.1.12629, an authenticated user can delete 2FA settings of any other user. published:2021-02-03T16:15:14.493
Please provide detailed information about CVE-2021-25760
CVE:CVE-2021-25760 Description:In JetBrains Hub before 2020.1.12669, information disclosure via the public API was possible. published:2021-02-03T16:15:14.570
Please provide detailed information about CVE-2021-25761
CVE:CVE-2021-25761 Description:In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible. published:2021-02-03T16:15:14.633
Please provide detailed information about CVE-2021-25762
CVE:CVE-2021-25762 Description:In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible. published:2021-02-03T16:15:14.713
Please provide detailed information about CVE-2021-25763
CVE:CVE-2021-25763 Description:In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default. published:2021-02-03T16:15:14.773
Please provide detailed information about CVE-2021-25765
CVE:CVE-2021-25765 Description:In JetBrains YouTrack before 2020.4.4701, CSRF via attachment upload was possible. published:2021-02-03T16:15:14.883
Please provide detailed information about CVE-2021-25766
CVE:CVE-2021-25766 Description:In JetBrains YouTrack before 2020.4.4701, improper resource access checks were made. published:2021-02-03T16:15:14.947
Please provide detailed information about CVE-2021-25767
CVE:CVE-2021-25767 Description:In JetBrains YouTrack before 2020.6.1767, an issue's existence could be disclosed via YouTrack command execution. published:2021-02-03T16:15:15.023
Please provide detailed information about CVE-2021-25768
CVE:CVE-2021-25768 Description:In JetBrains YouTrack before 2020.4.4701, permissions for attachments actions were checked improperly. published:2021-02-03T16:15:15.103