instruction
stringlengths 55
56
| inputs
stringclasses 1
value | outputs
stringlengths 86
4.06k
|
|---|---|---|
Please provide detailed information about CVE-2021-20183
|
CVE:CVE-2021-20183
Description:It was found in Moodle before version 3.10.1 that some search inputs were vulnerable to reflected XSS due to insufficient escaping of search queries.
published:2021-01-28T19:15:13.160
|
|
Please provide detailed information about CVE-2021-20184
|
CVE:CVE-2021-20184
Description:It was found in Moodle before version 3.10.1, 3.9.4 and 3.8.7 that a insufficient capability checks in some grade related web services meant students were able to view other students grades.
published:2021-01-28T19:15:13.237
|
|
Please provide detailed information about CVE-2021-20186
|
CVE:CVE-2021-20186
Description:It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that if the TeX notation filter was enabled, additional sanitizing of TeX content was required to prevent the risk of stored XSS.
published:2021-01-28T19:15:13.300
|
|
Please provide detailed information about CVE-2021-20187
|
CVE:CVE-2021-20187
Description:It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that it was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication.
published:2021-01-28T19:15:13.377
|
|
Please provide detailed information about CVE-2021-25647
|
CVE:CVE-2021-25647
Description:Mobile application "Testes de Codigo" v11.3 and prior allows stored XSS by injecting a payload in the "feedback" message field causing it to be stored in the remote database and leading to its execution on client devices when loading the "feedback list", either by accessing the website directly or using the mobile application.
published:2021-01-28T19:15:13.473
|
|
Please provide detailed information about CVE-2021-20185
|
CVE:CVE-2021-20185
Description:It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that messaging did not impose a character limit when sending messages, which could result in client-side (browser) denial of service for users receiving very large messages.
published:2021-01-28T20:15:13.133
|
|
Please provide detailed information about CVE-2021-3160
|
CVE:CVE-2021-3160
Description:Deserialization of untrusted data in the login page of ASSUWEB 359.3 build 1 subcomponent of ACA ASSUREX RENTES product allows a remote attacker to inject unsecure serialized Java object using a specially crafted HTTP request, resulting in an unauthenticated remote code execution on the server.
published:2021-01-28T20:15:13.227
|
|
Please provide detailed information about CVE-2021-3337
|
CVE:CVE-2021-3337
Description:The Hide-Thread-Content plugin through 2021-01-27 for MyBB allows remote attackers to bypass intended content-reading restrictions by clicking on reply or quote in the postbit.
published:2021-01-28T20:15:13.307
|
|
Please provide detailed information about CVE-2021-3341
|
CVE:CVE-2021-3341
Description:A path traversal vulnerability in the DxWebEngine component of DH2i DxEnterprise and DxOdyssey for Windows, version 19.5 through 20.x before 20.0.219.0, allows an attacker to read any file on the host file system via an HTTP request.
published:2021-01-29T01:15:14.610
|
|
Please provide detailed information about CVE-2021-26303
|
CVE:CVE-2021-26303
Description:PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to stored XSS via the user-profile.php Full Name field.
published:2021-01-29T02:15:13.453
|
|
Please provide detailed information about CVE-2021-26304
|
CVE:CVE-2021-26304
Description:PHPGurukul Daily Expense Tracker System 1.0 is vulnerable to stored XSS via the add-expense.php Item parameter.
published:2021-01-29T02:15:13.517
|
|
Please provide detailed information about CVE-2021-26305
|
CVE:CVE-2021-26305
Description:An issue was discovered in Deserializer::read_vec in the cdr crate before 0.2.4 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated heap memory, violating soundness.
published:2021-01-29T03:15:12.363
|
|
Please provide detailed information about CVE-2021-26306
|
CVE:CVE-2021-26306
Description:An issue was discovered in the raw-cpuid crate before 9.0.0 for Rust. It has unsound transmute calls within as_string() methods.
published:2021-01-29T03:15:12.427
|
|
Please provide detailed information about CVE-2021-26307
|
CVE:CVE-2021-26307
Description:An issue was discovered in the raw-cpuid crate before 9.0.0 for Rust. It allows __cpuid_count() calls even if the processor does not support the CPUID instruction, which is unsound and causes a deterministic crash.
published:2021-01-29T03:15:12.490
|
|
Please provide detailed information about CVE-2021-26308
|
CVE:CVE-2021-26308
Description:An issue was discovered in the marc crate before 2.0.0 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated memory, violating soundness.
published:2021-01-29T03:15:12.550
|
|
Please provide detailed information about CVE-2021-3336
|
CVE:CVE-2021-3336
Description:DoTls13CertificateVerify in tls13.c in wolfSSL before 4.7.0 does not cease processing for certain anomalous peer behavior (sending an ED22519, ED448, ECC, or RSA signature without the corresponding certificate). The client side is affected because man-in-the-middle attackers can impersonate TLS 1.3 servers.
published:2021-01-29T05:15:12.197
|
|
Please provide detailed information about CVE-2021-3298
|
CVE:CVE-2021-3298
Description:Collabtive 3.1 allows XSS when an authenticated user enters an XSS payload into the address section of the profile edit page, aka the manageuser.php?action=edit address1 parameter.
published:2021-01-29T06:15:13.977
|
|
Please provide detailed information about CVE-2021-3176
|
CVE:CVE-2021-3176
Description:The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows before 6.4.15 and 7.x before 7.1.2 could allow an attacker to gain access to user information by sending certain code, due to improper input validation of http links. A successful exploit could allow an attacker to view user information and application data.
published:2021-01-29T07:15:18.810
|
|
Please provide detailed information about CVE-2021-25123
|
CVE:CVE-2021-25123
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice addlicense_func function.
published:2021-01-29T13:15:12.480
|
|
Please provide detailed information about CVE-2021-25909
|
CVE:CVE-2021-25909
Description:ZIV Automation 4CCT-EA6-334126BF firmware version 3.23.80.27.36371, allows an unauthenticated, remote attacker to cause a denial of service condition on the device. An attacker could exploit this vulnerability by sending specific packets to the port 7919.
published:2021-01-29T14:15:12.277
|
|
Please provide detailed information about CVE-2021-25910
|
CVE:CVE-2021-25910
Description:Improper Authentication vulnerability in the cookie parameter of ZIV AUTOMATION 4CCT-EA6-334126BF allows a local attacker to perform modifications in several parameters of the affected device as an authenticated user.
published:2021-01-29T14:15:12.467
|
|
Please provide detailed information about CVE-2021-20586
|
CVE:CVE-2021-20586
Description:Resource management errors vulnerability in a robot controller of MELFA FR Series(controller "CR800-*V*D" of RV-*FR***-D-* all versions, controller "CR800-*HD" of RH-*FRH***-D-* all versions, controller "CR800-*HRD" of RH-*FRHR***-D-* all versions, controller "CR800-*V*R with R16RTCPU" of RV-*FR***-R-* all versions, controller "CR800-*HR with R16RTCPU" of RH-*FRH***-R-* all versions, controller "CR800-*HRR with R16RTCPU" of RH-*FRHR***-R-* all versions, controller "CR800-*V*Q with Q172DSRCPU" of RV-*FR***-Q-* all versions, controller "CR800-*HQ with Q172DSRCPU" of RH-*FRH***-Q-* all versions, controller "CR800-*HRQ with Q172DSRCPU" of RH-*FRHR***-Q-* all versions) and a robot controller of MELFA CR Series(controller "CR800-CVD" of RV-8CRL-D-* all versions, controller "CR800-CHD" of RH-*CRH**-D-* all versions) as well as a cooperative robot ASSISTA(controller "CR800-05VD" of RV-5AS-D-* all versions) allows a remote unauthenticated attacker to cause a DoS of the execution of the robot program and the Ethernet communication by sending a large amount of packets in burst over a short period of time. As a result of DoS, an error may occur. A reset is required to recover it if the error occurs.
published:2021-01-29T15:15:12.833
|
|
Please provide detailed information about CVE-2021-3345
|
CVE:CVE-2021-3345
Description:_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
published:2021-01-29T15:15:13.083
|
|
Please provide detailed information about CVE-2021-23328
|
CVE:CVE-2021-23328
Description:This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
published:2021-01-29T17:15:12.810
|
|
Please provide detailed information about CVE-2021-3346
|
CVE:CVE-2021-3346
Description:Foris before 101.1.1, as used in Turris OS, lacks certain HTML escaping in the login template.
published:2021-01-29T17:15:12.887
|
|
Please provide detailed information about CVE-2021-3347
|
CVE:CVE-2021-3347
Description:An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
published:2021-01-29T17:15:12.950
|
|
Please provide detailed information about CVE-2021-25124
|
CVE:CVE-2021-25124
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local spx_restservice deletevideo_func function path traversal vulnerability.
published:2021-01-29T19:15:13.427
|
|
Please provide detailed information about CVE-2021-25125
|
CVE:CVE-2021-25125
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local spx_restservice delsolrecordedvideo_func function path traversal vulnerability.
published:2021-01-29T19:15:13.490
|
|
Please provide detailed information about CVE-2021-25126
|
CVE:CVE-2021-25126
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice downloadkvmjnlp_func function.
published:2021-01-29T19:15:13.553
|
|
Please provide detailed information about CVE-2021-25127
|
CVE:CVE-2021-25127
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice generatesslcertificate_func function.
published:2021-01-29T19:15:13.630
|
|
Please provide detailed information about CVE-2021-25128
|
CVE:CVE-2021-25128
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local spx_restservice gethelpdata_func function path traversal vulnerability.
published:2021-01-29T19:15:13.697
|
|
Please provide detailed information about CVE-2021-25129
|
CVE:CVE-2021-25129
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local spx_restservice getvideodata_func function path traversal vulnerability.
published:2021-01-29T19:15:13.757
|
|
Please provide detailed information about CVE-2021-25130
|
CVE:CVE-2021-25130
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setactdir_func function.
published:2021-01-29T19:15:13.817
|
|
Please provide detailed information about CVE-2021-25131
|
CVE:CVE-2021-25131
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setfwimagelocation_func function.
published:2021-01-29T19:15:13.880
|
|
Please provide detailed information about CVE-2021-25132
|
CVE:CVE-2021-25132
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setmediaconfig_func function.
published:2021-01-29T19:15:13.960
|
|
Please provide detailed information about CVE-2021-25133
|
CVE:CVE-2021-25133
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setradiusconfig_func function.
published:2021-01-29T19:15:14.020
|
|
Please provide detailed information about CVE-2021-25134
|
CVE:CVE-2021-25134
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setremoteimageinfo_func function.
published:2021-01-29T19:15:14.100
|
|
Please provide detailed information about CVE-2021-25135
|
CVE:CVE-2021-25135
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setsmtp_func function.
published:2021-01-29T19:15:14.163
|
|
Please provide detailed information about CVE-2021-25136
|
CVE:CVE-2021-25136
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setsolvideoremotestorage_func function.
published:2021-01-29T19:15:14.223
|
|
Please provide detailed information about CVE-2021-25137
|
CVE:CVE-2021-25137
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice startflash_func function.
published:2021-01-29T19:15:14.287
|
|
Please provide detailed information about CVE-2021-25138
|
CVE:CVE-2021-25138
Description:The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice uploadsshkey function.
published:2021-01-29T19:15:14.350
|
|
Please provide detailed information about CVE-2021-25646
|
CVE:CVE-2021-25646
Description:Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
published:2021-01-29T20:15:12.997
|
|
Please provide detailed information about CVE-2021-21254
|
CVE:CVE-2021-21254
Description:CKEditor 5 is an open source rich text editor framework with a modular architecture. The CKEditor 5 Markdown plugin (@ckeditor/ckeditor5-markdown-gfm) before version 25.0.0 has a regex denial of service (ReDoS) vulnerability. The vulnerability allowed to abuse link recognition regular expression, which could cause a significant performance drop resulting in browser tab freeze. It affects all users using CKEditor 5 Markdown plugin at version <= 24.0.0. The problem has been recognized and patched. The fix will be available in version 25.0.0.
published:2021-01-29T22:15:14.797
|
|
Please provide detailed information about CVE-2021-23329
|
CVE:CVE-2021-23329
Description:The package nested-object-assign before 1.0.4 are vulnerable to Prototype Pollution via the default function, as demonstrated by running the PoC below.
published:2021-01-31T16:15:12.377
|
|
Please provide detailed information about CVE-2021-3348
|
CVE:CVE-2021-3348
Description:nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
published:2021-02-01T04:15:14.430
|
|
Please provide detailed information about CVE-2021-3349
|
CVE:CVE-2021-3349
Description:GNOME Evolution through 3.38.3 produces a "Valid signature" message for an unknown identifier on a previously trusted key because Evolution does not retrieve enough information from the GnuPG API. NOTE: third parties dispute the significance of this issue, and dispute whether Evolution is the best place to change this behavior
published:2021-02-01T05:15:11.880
|
|
Please provide detailed information about CVE-2021-3350
|
CVE:CVE-2021-3350
Description:deleteaccount.php in the Delete Account plugin 1.4 for MyBB allows XSS via the deletereason parameter.
published:2021-02-01T05:15:12.003
|
|
Please provide detailed information about CVE-2021-21266
|
CVE:CVE-2021-21266
Description:openHAB is a vendor and technology agnostic open source automation software for your home. In openHAB before versions 2.5.12 and 3.0.1 the XML external entity (XXE) attack allows attackers in the same network as the openHAB instance to retrieve internal information like the content of files from the file system. Responses to SSDP requests can be especially malicious. All add-ons that use SAX or JAXB parsing of externally received XML are potentially subject to this kind of attack. In openHAB, the following add-ons are potentially impacted: AvmFritz, BoseSoundtouch, DenonMarantz, DLinkSmarthome, Enigma2, FmiWeather, FSInternetRadio, Gce, Homematic, HPPrinter, IHC, Insteon, Onkyo, Roku, SamsungTV, Sonos, Roku, Tellstick, TR064, UPnPControl, Vitotronic, Wemo, YamahaReceiver and XPath Tranformation. The vulnerabilities have been fixed in versions 2.5.12 and 3.0.1 by a more strict configuration of the used XML parser.
published:2021-02-01T15:15:13.057
|
|
Please provide detailed information about CVE-2021-21276
|
CVE:CVE-2021-21276
Description:Polr is an open source URL shortener. in Polr before version 2.3.0, a vulnerability in the setup process allows attackers to gain admin access to site instances, even if they do not possess an existing account. This vulnerability exists regardless of users' settings. If an attacker crafts a request with specific cookie headers to the /setup/finish endpoint, they may be able to obtain admin privileges on the instance. This is caused by a loose comparison (==) in SetupController that is susceptible to attack. The project has been patched to ensure that a strict comparison (===) is used to verify the setup key, and that /setup/finish verifies that no users table exists before performing any migrations or provisioning any new accounts. This is fixed in version 2.3.0. Users can patch this vulnerability without upgrading by adding abort(404) to the very first line of finishSetup in SetupController.php.
published:2021-02-01T15:15:13.260
|
|
Please provide detailed information about CVE-2021-21277
|
CVE:CVE-2021-21277
Description:angular-expressions is "angular's nicest part extracted as a standalone module for the browser and node". In angular-expressions before version 1.1.2 there is a vulnerability which allows Remote Code Execution if you call "expressions.compile(userControlledInput)" where "userControlledInput" is text that comes from user input. The security of the package could be bypassed by using a more complex payload, using a ".constructor.constructor" technique. In terms of impact: If running angular-expressions in the browser, an attacker could run any browser script when the application code calls expressions.compile(userControlledInput). If running angular-expressions on the server, an attacker could run any Javascript expression, thus gaining Remote Code Execution. This is fixed in version 1.1.2 of angular-expressions A temporary workaround might be either to disable user-controlled input that will be fed into angular-expressions in your application or allow only following characters in the userControlledInput.
published:2021-02-01T15:15:13.340
|
|
Please provide detailed information about CVE-2021-23330
|
CVE:CVE-2021-23330
Description:All versions of package launchpad are vulnerable to Command Injection via stop.
published:2021-02-01T15:15:13.450
|
|
Please provide detailed information about CVE-2021-21286
|
CVE:CVE-2021-21286
Description:AVideo Platform is an open-source Audio and Video platform. It is similar to a self-hosted YouTube. In AVideo Platform before version 10.2 there is an authorization bypass vulnerability which enables an ordinary user to get admin control. This is fixed in version 10.2. All queries now remove the pass hash and the recoverPass hash.
published:2021-02-01T16:15:13.047
|
|
Please provide detailed information about CVE-2021-3024
|
CVE:CVE-2021-3024
Description:HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.
published:2021-02-01T16:15:13.217
|
|
Please provide detailed information about CVE-2021-3282
|
CVE:CVE-2021-3282
Description:HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2.
published:2021-02-01T16:15:13.280
|
|
Please provide detailed information about CVE-2021-3283
|
CVE:CVE-2021-3283
Description:HashiCorp Nomad and Nomad Enterprise up to 0.12.9 exec and java task drivers can access processes associated with other tasks on the same node. Fixed in 0.12.10, and 1.0.3.
published:2021-02-01T16:15:13.357
|
|
Please provide detailed information about CVE-2021-21287
|
CVE:CVE-2021-21287
Description:MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with "MINIO_BROWSER=off" environment variable.
published:2021-02-01T18:15:13.890
|
|
Please provide detailed information about CVE-2021-3340
|
CVE:CVE-2021-3340
Description:A cross-site scripting (XSS) vulnerability in many forms of Wikindx before 5.7.0 and 6.x through 6.4.0 allows remote attackers to inject arbitrary web script or HTML via the message parameter to index.php?action=initLogon or modules/admin/DELETEIMAGES.php.
published:2021-02-01T22:15:14.067
|
|
Please provide detailed information about CVE-2021-3378
|
CVE:CVE-2021-3378
Description:FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
published:2021-02-01T23:15:12.797
|
|
Please provide detailed information about CVE-2021-20207
|
CVE:CVE-2021-20207
Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs:CVE-2021-3348. Reason: This candidate is a reservation duplicate of CVE-2021-3348. Notes: All CVE users should reference CVE-2021-3348 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
published:2021-02-02T07:15:13.910
|
|
Please provide detailed information about CVE-2021-3281
|
CVE:CVE-2021-3281
Description:In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
published:2021-02-02T07:15:14.020
|
|
Please provide detailed information about CVE-2021-25310
|
CVE:CVE-2021-25310
Description:The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 devices allows remote authenticated attackers to execute system commands with root privileges via shell metacharacters in the ui_language POST parameter to the apply.cgi form endpoint. This occurs in do_upgrade_post in mini_httpd. NOTE: This vulnerability only affects products that are no longer supported by the maintaine
published:2021-02-02T15:15:16.840
|
|
Please provide detailed information about CVE-2021-21284
|
CVE:CVE-2021-21284
Description:In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/<remapping>" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
published:2021-02-02T18:15:11.827
|
|
Please provide detailed information about CVE-2021-21285
|
CVE:CVE-2021-21285
Description:In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.
published:2021-02-02T18:15:12.203
|
|
Please provide detailed information about CVE-2021-20199
|
CVE:CVE-2021-20199
Description:Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards.
published:2021-02-02T19:15:14.000
|
|
Please provide detailed information about CVE-2021-21289
|
CVE:CVE-2021-21289
Description:Mechanize is an open-source ruby library that makes automated web interaction easy. In Mechanize from version 2.0.0 and before version 2.7.7 there is a command injection vulnerability. Affected versions of mechanize allow for OS commands to be injected using several classes' methods which implicitly use Ruby's Kernel.open method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: Mechanize::CookieJar#load, Mechanize::CookieJar#save_as, Mechanize#download, Mechanize::Download#save, Mechanize::File#save, and Mechanize::FileResponse#read_body. This is fixed in version 2.7.7.
published:2021-02-02T19:15:14.220
|
|
Please provide detailed information about CVE-2021-21291
|
CVE:CVE-2021-21291
Description:OAuth2 Proxy is an open-source reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. In OAuth2 Proxy before version 7.0.0, for users that use the whitelist domain feature, a domain that ended in a similar way to the intended domain could have been allowed as a redirect. For example, if a whitelist domain was configured for ".example.com", the intention is that subdomains of example.com are allowed. Instead, "example.com" and "badexample.com" could also match. This is fixed in version 7.0.0 onwards. As a workaround, one can disable the whitelist domain feature and run separate OAuth2 Proxy instances for each subdomain.
published:2021-02-02T19:15:14.330
|
|
Please provide detailed information about CVE-2021-23271
|
CVE:CVE-2021-23271
Description:The TIBCO EBX Web Server component of TIBCO Software Inc.'s TIBCO EBX contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) attack on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.9.12 and below.
published:2021-02-02T19:15:14.423
|
|
Please provide detailed information about CVE-2021-25912
|
CVE:CVE-2021-25912
Description:Prototype pollution vulnerability in 'dotty' versions 0.0.1 through 0.1.0 allows attackers to cause a denial of service and may lead to remote code execution.
published:2021-02-02T19:15:14.550
|
|
Please provide detailed information about CVE-2021-21292
|
CVE:CVE-2021-21292
Description:Traccar is an open source GPS tracking system. In Traccar before version 4.12 there is an unquoted Windows binary path vulnerability. Only Windows versions are impacted. Attacker needs write access to the filesystem on the host machine. If Java path includes a space, then attacker can lift their privilege to the same as Traccar service (system). This is fixed in version 4.12.
published:2021-02-02T20:15:12.173
|
|
Please provide detailed information about CVE-2021-3395
|
CVE:CVE-2021-3395
Description:A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote authenticated users to upload an arbitrary file. The JavaScript code will execute when someone visits the attachment.
published:2021-02-02T21:15:14.193
|
|
Please provide detailed information about CVE-2021-21293
|
CVE:CVE-2021-21293
Description:blaze is a Scala library for building asynchronous pipelines, with a focus on network IO. All servers running blaze-core before version 0.14.15 are affected by a vulnerability in which unbounded connection acceptance leads to file handle exhaustion. Blaze, accepts connections unconditionally on a dedicated thread pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. The vast majority of affected users are using it as part of http4s-blaze-server <= 0.21.16. http4s provides a mechanism for limiting open connections, but is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. The issue is fixed in version 0.14.15 for "NIO1SocketServerGroup". A "maxConnections" parameter is added, with a default value of 512. Concurrent connections beyond this limit are rejected. To run unbounded, which is not recommended, set a negative number. The "NIO2SocketServerGroup" has no such setting and is now deprecated. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xmw9-q7x9-j5qc.
published:2021-02-02T22:15:12.290
|
|
Please provide detailed information about CVE-2021-21294
|
CVE:CVE-2021-21294
Description:Http4s (http4s-blaze-server) is a minimal, idiomatic Scala interface for HTTP services. Http4s before versions 0.21.17, 0.22.0-M2, and 1.0.0-M14 have a vulnerability which can lead to a denial-of-service. Blaze-core, a library underlying http4s-blaze-server, accepts connections unboundedly on its selector pool. This has the net effect of amplifying degradation in services that are unable to handle their current request load, since incoming connections are still accepted and added to an unbounded queue. Each connection allocates a socket handle, which drains a scarce OS resource. This can also confound higher level circuit breakers which work based on detecting failed connections. http4s provides a general "MaxActiveRequests" middleware mechanism for limiting open connections, but it is enforced inside the Blaze accept loop, after the connection is accepted and the socket opened. Thus, the limit only prevents the number of connections which can be simultaneously processed, not the number of connections which can be held open. In 0.21.17, 0.22.0-M2, and 1.0.0-M14, a new "maxConnections" property, with a default value of 1024, has been added to the `BlazeServerBuilder`. Setting the value to a negative number restores unbounded behavior, but is strongly disrecommended. The NIO2 backend does not respect `maxConnections`. Its use is now deprecated in http4s-0.21, and the option is removed altogether starting in http4s-0.22. There are several possible workarounds described in the refrenced GitHub Advisory GHSA-xhv5-w9c5-2r2w.
published:2021-02-02T22:15:12.387
|
|
Please provide detailed information about CVE-2021-21043
|
CVE:CVE-2021-21043
Description:ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful.
published:2021-02-02T23:15:12.813
|
|
Please provide detailed information about CVE-2021-0352
|
CVE:CVE-2021-0352
Description:In RT regmap driver, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05453809.
published:2021-02-03T00:15:14.780
|
|
Please provide detailed information about CVE-2021-0353
|
CVE:CVE-2021-0353
Description:In kisd, there is a possible memory corruption due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05425247.
published:2021-02-03T00:15:15.017
|
|
Please provide detailed information about CVE-2021-0354
|
CVE:CVE-2021-0354
Description:In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11; Patch ID: ALPS05431161.
published:2021-02-03T00:15:15.157
|
|
Please provide detailed information about CVE-2021-0355
|
CVE:CVE-2021-0355
Description:In kisd, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05425581.
published:2021-02-03T00:15:15.343
|
|
Please provide detailed information about CVE-2021-0356
|
CVE:CVE-2021-0356
Description:In netdiag, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442014.
published:2021-02-03T00:15:15.610
|
|
Please provide detailed information about CVE-2021-0357
|
CVE:CVE-2021-0357
Description:In netdiag, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442002.
published:2021-02-03T00:15:15.767
|
|
Please provide detailed information about CVE-2021-0358
|
CVE:CVE-2021-0358
Description:In netdiag, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442022.
published:2021-02-03T00:15:15.920
|
|
Please provide detailed information about CVE-2021-0359
|
CVE:CVE-2021-0359
Description:In netdiag, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442011.
published:2021-02-03T00:15:16.110
|
|
Please provide detailed information about CVE-2021-0360
|
CVE:CVE-2021-0360
Description:In netdiag, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05442006.
published:2021-02-03T00:15:16.297
|
|
Please provide detailed information about CVE-2021-0361
|
CVE:CVE-2021-0361
Description:In kisd, there is a possible out of bounds read due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05449968.
published:2021-02-03T00:15:16.420
|
|
Please provide detailed information about CVE-2021-0362
|
CVE:CVE-2021-0362
Description:In aee, there is a possible memory corruption due to a stack buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05457070.
published:2021-02-03T00:15:16.657
|
|
Please provide detailed information about CVE-2021-0363
|
CVE:CVE-2021-0363
Description:In mobile_log_d, there is a possible command injection due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05458478.
published:2021-02-03T00:15:16.717
|
|
Please provide detailed information about CVE-2021-0364
|
CVE:CVE-2021-0364
Description:In mobile_log_d, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05458478; Issue ID: ALPS05458503.
published:2021-02-03T00:15:16.827
|
|
Please provide detailed information about CVE-2021-0365
|
CVE:CVE-2021-0365
Description:In display driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Patch ID: ALPS05454782.
published:2021-02-03T00:15:17.063
|
|
Please provide detailed information about CVE-2021-25755
|
CVE:CVE-2021-25755
Description:In JetBrains Code With Me before 2020.3, an attacker on the local network, knowing a session ID, could get access to the encrypted traffic.
published:2021-02-03T16:15:14.227
|
|
Please provide detailed information about CVE-2021-25756
|
CVE:CVE-2021-25756
Description:In JetBrains IntelliJ IDEA before 2020.2, HTTP links were used for several remote repositories instead of HTTPS.
published:2021-02-03T16:15:14.307
|
|
Please provide detailed information about CVE-2021-25757
|
CVE:CVE-2021-25757
Description:In JetBrains Hub before 2020.1.12629, an open redirect was possible.
published:2021-02-03T16:15:14.367
|
|
Please provide detailed information about CVE-2021-25758
|
CVE:CVE-2021-25758
Description:In JetBrains IntelliJ IDEA before 2020.3, potentially insecure deserialization of the workspace model could lead to local code execution.
published:2021-02-03T16:15:14.430
|
|
Please provide detailed information about CVE-2021-25759
|
CVE:CVE-2021-25759
Description:In JetBrains Hub before 2020.1.12629, an authenticated user can delete 2FA settings of any other user.
published:2021-02-03T16:15:14.493
|
|
Please provide detailed information about CVE-2021-25760
|
CVE:CVE-2021-25760
Description:In JetBrains Hub before 2020.1.12669, information disclosure via the public API was possible.
published:2021-02-03T16:15:14.570
|
|
Please provide detailed information about CVE-2021-25761
|
CVE:CVE-2021-25761
Description:In JetBrains Ktor before 1.5.0, a birthday attack on SessionStorage key was possible.
published:2021-02-03T16:15:14.633
|
|
Please provide detailed information about CVE-2021-25762
|
CVE:CVE-2021-25762
Description:In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible.
published:2021-02-03T16:15:14.713
|
|
Please provide detailed information about CVE-2021-25763
|
CVE:CVE-2021-25763
Description:In JetBrains Ktor before 1.4.2, weak cipher suites were enabled by default.
published:2021-02-03T16:15:14.773
|
|
Please provide detailed information about CVE-2021-25765
|
CVE:CVE-2021-25765
Description:In JetBrains YouTrack before 2020.4.4701, CSRF via attachment upload was possible.
published:2021-02-03T16:15:14.883
|
|
Please provide detailed information about CVE-2021-25766
|
CVE:CVE-2021-25766
Description:In JetBrains YouTrack before 2020.4.4701, improper resource access checks were made.
published:2021-02-03T16:15:14.947
|
|
Please provide detailed information about CVE-2021-25767
|
CVE:CVE-2021-25767
Description:In JetBrains YouTrack before 2020.6.1767, an issue's existence could be disclosed via YouTrack command execution.
published:2021-02-03T16:15:15.023
|
|
Please provide detailed information about CVE-2021-25768
|
CVE:CVE-2021-25768
Description:In JetBrains YouTrack before 2020.4.4701, permissions for attachments actions were checked improperly.
published:2021-02-03T16:15:15.103
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.