ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
168,901
CVE-2021-42979
8.8
7.2
HIGH
NoMachine Cloud Server is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Cloud Server above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-190
168,902
CVE-2021-42980
8.8
7.2
HIGH
NoMachine Cloud Server is affected by Buffer Overflow. IOCTL Handler 0x22001B in the NoMachine Cloud Server above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-120
168,903
CVE-2021-42983
8.8
7.2
HIGH
NoMachine Enterprise Client is affected by Buffer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Client above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-120
168,904
CVE-2021-42986
8.8
7.2
HIGH
NoMachine Enterprise Client is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Client above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-190
168,905
CVE-2021-42987
8.8
7.2
HIGH
Eltima USB Network Gate is affected by Integer Overflow. IOCTL Handler 0x22001B in the USB Network Gate above 7.0.1370 below 9.2.2420 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-190
168,906
CVE-2021-42988
8.8
7.2
HIGH
Eltima USB Network Gate is affected by Buffer Overflow. IOCTL Handler 0x22001B in the USB Network Gate above 7.0.1370 below 9.2.2420 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-120
168,907
CVE-2021-42990
8.8
7.2
HIGH
FlexiHub For Windows is affected by Buffer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below 5.3.14268 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-120
168,908
CVE-2021-42993
8.8
7.2
HIGH
FlexiHub For Windows is affected by Integer Overflow. IOCTL Handler 0x22001B in the FlexiHub For Windows above 2.0.4340 below 5.3.14268 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-190
168,909
CVE-2021-42994
8.8
7.2
HIGH
Donglify is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Donglify above 1.0.12309 below 1.7.14110 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-120
168,910
CVE-2021-42996
8.8
7.2
HIGH
Donglify is affected by Integer Overflow. IOCTL Handler 0x22001B in the Donglify above 1.0.12309 below 1.7.14110 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-190
168,911
CVE-2021-43000
8.8
7.2
HIGH
Amzetta zPortal Windows zClient is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal Windows zClient <= v3.2.8180.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-120
168,912
CVE-2021-43002
8.8
7.2
HIGH
Amzetta zPortal DVM Tools is affected by Buffer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal DVM Tools <= v3.3.148.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-120
168,913
CVE-2021-43003
8.8
7.2
HIGH
Amzetta zPortal Windows zClient is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal Windows zClient <= v3.2.8180.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-190
168,914
CVE-2021-43006
8.8
7.2
HIGH
AmZetta Amzetta zPortal DVM Tools is affected by Integer Overflow. IOCTL Handler 0x22001B in the Amzetta zPortal DVM Tools <= v3.3.148.148 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
CWE-190
168,915
CVE-2021-43011
7.8
9.3
HIGH
Adobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.
CWE-788
168,916
CVE-2021-43012
7.8
9.3
HIGH
Adobe Prelude version 10.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.
CWE-788
168,917
CVE-2021-43013
7.8
9.3
HIGH
Adobe Media Encoder version 15.4.1 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-788
168,918
CVE-2021-43015
7.8
9.3
HIGH
Adobe InCopy version 16.4 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious GIF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
CWE-788
168,919
CVE-2021-43016
5.5
4.3
MEDIUM
Adobe InCopy version 16.4 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CWE-476
168,920
CVE-2021-43017
5.7
3.5
MEDIUM
Adobe Creative Cloud version 5.5 (and earlier) are affected by an Application denial of service vulnerability in the Creative Cloud Desktop installer. An authenticated attacker could leverage this vulnerability to achieve denial of service in the context of the user. User interaction is required before product installation to abuse this vulnerability.
NVD-CWE-Other
168,921
CVE-2021-43017
5.7
3.5
MEDIUM
Adobe Creative Cloud version 5.5 (and earlier) are affected by an Application denial of service vulnerability in the Creative Cloud Desktop installer. An authenticated attacker could leverage this vulnerability to achieve denial of service in the context of the user. User interaction is required before product installation to abuse this vulnerability.
CWE-379
168,922
CVE-2021-43019
7.8
9.3
HIGH
Adobe Creative Cloud version 5.5 (and earlier) are affected by a privilege escalation vulnerability in the resources leveraged by the Setup.exe service. An unauthenticated attacker could leverage this vulnerability to remove files and escalate privileges under the context of SYSTEM . An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability on the product installer. User interaction is required before product installation to abuse this vulnerability.
CWE-284
168,923
CVE-2021-43021
7.8
9.3
HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EXR file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CWE-787
168,924
CVE-2021-43022
7.8
9.3
HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious PNG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CWE-787
168,925
CVE-2021-43023
7.8
9.3
HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EPS/TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CWE-787
168,926
CVE-2021-43024
7.8
9.3
HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CWE-787
168,927
CVE-2021-43025
7.8
9.3
HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CWE-787
168,928
CVE-2021-43026
7.8
9.3
HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CWE-787
168,929
CVE-2021-43028
7.8
9.3
HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CWE-787
168,930
CVE-2021-43029
7.8
9.3
HIGH
Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability.
CWE-787
168,931
CVE-2021-43030
5.5
4.3
MEDIUM
Adobe Premiere Rush versions 1.5.16 (and earlier) allows access to an uninitialized pointer vulnerability that allows remote attackers to disclose sensitive information on affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of MP4 files. The issue results from the lack of proper initialization of memory prior to accessing it.
CWE-824
168,932
CVE-2021-43032
4.8
3.5
MEDIUM
In XenForo through 2.2.7, a threat actor with access to the admin panel can create a new Advertisement via the Advertising function, and save an XSS payload in the body of the HTML document. This payload will execute globally on the client side.
CWE-79
168,933
CVE-2021-43033
9.8
10
CRITICAL
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. Multiple functions in the bpserverd daemon were vulnerable to arbitrary remote code execution as root. The vulnerability was caused by untrusted input (received by the server) being passed to system calls.
CWE-20
168,934
CVE-2021-43034
7.8
4.6
HIGH
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. A world writable file allowed local users to execute arbitrary code as the user apache, leading to privilege escalation.
CWE-269
168,935
CVE-2021-43035
9.8
7.5
CRITICAL
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. Two unauthenticated SQL injection vulnerabilities were discovered, allowing arbitrary SQL queries to be injected and executed under the postgres superuser account. Remote code execution was possible, leading to full access to the postgres user account.
CWE-89
168,936
CVE-2021-43036
9.8
7.5
CRITICAL
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The password for the PostgreSQL wguest account is weak.
CWE-521
168,937
CVE-2021-43037
7.8
6.9
HIGH
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Unitrends Windows agent was vulnerable to DLL injection and binary planting due to insecure default permissions. This allowed privilege escalation from an unprivileged user to SYSTEM.
CWE-427
168,938
CVE-2021-43038
8.8
6.5
HIGH
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The wguest account could execute commands by injecting into PostgreSQL trigger functions. This allowed privilege escalation from the wguest user to the postgres user.
CWE-74
168,939
CVE-2021-43039
6.5
6.4
MEDIUM
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Samba file sharing service allowed anonymous read/write access.
CWE-668
168,940
CVE-2021-43040
8.8
6.5
HIGH
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The privileged vaultServer could be leveraged to create arbitrary writable files, leading to privilege escalation.
CWE-269
168,941
CVE-2021-43041
8.8
6.5
HIGH
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. A crafted HTTP request could induce a format string vulnerability in the privileged vaultServer application.
CWE-134
168,942
CVE-2021-43042
9.8
7.5
CRITICAL
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. A buffer overflow existed in the vaultServer component. This was exploitable by a remote unauthenticated attacker.
CWE-120
168,943
CVE-2021-43043
6.5
4
MEDIUM
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The apache user could read arbitrary files such as /etc/shadow by abusing an insecure Sudo rule.
CWE-668
168,944
CVE-2021-43044
9.8
7.5
CRITICAL
An issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The SNMP daemon was configured with a weak default community.
CWE-798
168,945
CVE-2021-43046
8.8
9.3
HIGH
The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain an easily exploitable vulnerability that allows an unauthenticated attacker with network access to obtain session tokens for the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below.
NVD-CWE-noinfo
168,946
CVE-2021-43047
9
8.5
CRITICAL
The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain easily exploitable Stored and Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below.
CWE-79
168,947
CVE-2021-43048
9.8
10
CRITICAL
The Interior Server and Gateway Server components of TIBCO Software Inc.'s TIBCO PartnerExpress contain a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a clickjacking attack on the affected system. A successful attack using this vulnerability does not require human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO PartnerExpress: versions 6.2.1 and below.
CWE-1021
168,948
CVE-2021-43051
6.8
8.5
MEDIUM
The Spotfire Server component of TIBCO Software Inc.'s TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains a difficult to exploit vulnerability that allows malicious custom API clients with network access to execute internal API operations outside of the scope of those granted to it. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Server: versions 10.10.6 and below, TIBCO Spotfire Server: versions 11.0.0, 11.1.0, 11.2.0, 11.3.0, 11.4.0, and 11.4.1, and TIBCO Spotfire Server: versions 11.5.0 and 11.6.0.
CWE-863
168,949
CVE-2021-43056
5.5
4.9
MEDIUM
An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.
NVD-CWE-noinfo
168,950
CVE-2021-43057
7.8
7.2
HIGH
An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task.
CWE-416
168,951
CVE-2021-43058
6.1
5.8
MEDIUM
An open redirect vulnerability exists in Replicated Classic versions prior to 2.53.1 that could lead to spoofing. To exploit this vulnerability, an attacker could send a link that has a specially crafted URL and convince the user to click the link, redirecting the user to an untrusted site.
CWE-601
168,952
CVE-2021-43063
6.1
4.3
MEDIUM
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the login webpage.
CWE-79
168,953
CVE-2021-43064
6.1
5.8
MEDIUM
A url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to use the device as a proxy and reach external or protected hosts via redirection handlers.
CWE-601
168,954
CVE-2021-43065
7.8
7.2
HIGH
A incorrect permission assignment for critical resource in Fortinet FortiNAC version 9.2.0, version 9.1.3 and below, version 8.8.9 and below allows attacker to gain higher privileges via the access to sensitive system data.
CWE-732
168,955
CVE-2021-43067
6.5
4.3
MEDIUM
A exposure of sensitive information to an unauthorized actor in Fortinet FortiAuthenticator version 6.4.0, version 6.3.2 and below, version 6.2.1 and below, version 6.1.2 and below, version 6.0.7 to 6.0.1 allows attacker to duplicate a target LDAP user 2 factors authentication token via crafted HTTP requests.
CWE-200
168,956
CVE-2021-43068
8.1
5.5
HIGH
A improper authentication in Fortinet FortiAuthenticator version 6.4.0 allows user to bypass the second factor of authentication via a RADIUS login portal.
CWE-287
168,957
CVE-2021-43071
8.8
6.5
HIGH
A heap-based buffer overflow in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests to the LogReport API controller.
CWE-787
168,958
CVE-2021-43082
9.8
7.5
CRITICAL
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the stats-over-http plugin of Apache Traffic Server allows an attacker to overwrite memory. This issue affects Apache Traffic Server 9.1.0.
CWE-120
168,959
CVE-2021-43113
9.8
7.5
CRITICAL
iTextPDF in iText before 7.1.17 allows command injection via a CompareTool filename that is mishandled on the gs (aka Ghostscript) command line in GhostscriptHelper.java.
CWE-77
168,960
CVE-2021-43114
7.5
5
HIGH
FORT Validator versions prior to 1.5.2 will crash if an RPKI CA publishes an X.509 EE certificate. This will lead to RTR clients such as BGP routers to lose access to the RPKI VRP data set, effectively disabling Route Origin Validation.
CWE-400
168,961
CVE-2021-43117
9.8
10
CRITICAL
fastadmin v1.2.1 is affected by a file upload vulnerability which allows arbitrary code execution through shell access.
CWE-434
168,962
CVE-2021-43130
9.8
10
CRITICAL
An SQL Injection vulnerability exists in Sourcecodester Customer Relationship Management System (CRM) 1.0 via the username parameter in customer/login.php.
CWE-89
168,963
CVE-2021-43136
9.8
6.8
CRITICAL
An authentication bypass issue in FormaLMS <= 2.4.4 allows an attacker to bypass the authentication mechanism and obtain a valid access to the platform.
CWE-287
168,964
CVE-2021-43137
8.8
6.8
HIGH
Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exits in hostel management system 2.1 via the name field in my-profile.php. Chaining to this both vulnerabilities leads to account takeover.
CWE-352
168,965
CVE-2021-43137
8.8
6.8
HIGH
Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exits in hostel management system 2.1 via the name field in my-profile.php. Chaining to this both vulnerabilities leads to account takeover.
CWE-79
168,966
CVE-2021-43140
9.8
7.5
CRITICAL
SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login.
CWE-89
168,967
CVE-2021-43141
6.1
4.3
MEDIUM
Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0 via the id parameter in plan_application.
CWE-79
168,968
CVE-2021-43155
9.8
7.5
CRITICAL
Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the "bookisbn" parameter in cart.php.
CWE-89
168,969
CVE-2021-43156
6.5
4.3
MEDIUM
In ProjectWorlds Online Book Store PHP 1.0 a CSRF vulnerability in admin_delete.php allows a remote attacker to delete any book.
CWE-352
168,970
CVE-2021-43157
9.8
7.5
CRITICAL
Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php.
CWE-89
168,971
CVE-2021-43158
4.3
4.3
MEDIUM
In ProjectWorlds Online Shopping System PHP 1.0, a CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart.
CWE-352
168,972
CVE-2021-43172
7.5
5
HIGH
NLnet Labs Routinator prior to 0.10.2 happily processes a chain of RRDP repositories of infinite length causing it to never finish a validation run. In RPKI, a CA can choose the RRDP repository it wishes to publish its data in. By continuously generating a new child CA that only consists of another CA using a different RRDP repository, a malicious CA can create a chain of CAs of de-facto infinite length. Routinator prior to version 0.10.2 did not contain a limit on the length of such a chain and will therefore continue to process this chain forever. As a result, the validation run will never finish, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all.
CWE-674
168,973
CVE-2021-43173
7.5
5
HIGH
In NLnet Labs Routinator prior to 0.10.2, a validation run can be delayed significantly by an RRDP repository by not answering but slowly drip-feeding bytes to keep the connection alive. This can be used to effectively stall validation. While Routinator has a configurable time-out value for RRDP connections, this time-out was only applied to individual read or write operations rather than the complete request. Thus, if an RRDP repository sends a little bit of data before that time-out expired, it can continuously extend the time it takes for the request to finish. Since validation will only continue once the update of an RRDP repository has concluded, this delay will cause validation to stall, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all.
CWE-755
168,974
CVE-2021-43174
7.5
5
HIGH
NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element.
CWE-787
168,975
CVE-2021-43175
7.5
5
HIGH
The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 exposes an API router that accepts a username, password, and action that routes to other PHP files that implement the various API functions. Vulnerable versions of GOautodial validate the username and password incorrectly, allowing the caller to specify any values for these parameters and successfully authenticate. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
CWE-287
168,976
CVE-2021-43176
8.8
6.5
HIGH
The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 takes a user-supplied “action” parameter and appends a .php file extension to locate and load the correct PHP file to implement the API call. Vulnerable versions of GOautodial do not sanitize the user input that specifies the action. This permits an attacker to execute any PHP source file with a .php extension that is present on the disk and readable by the GOautodial web server process. Combined with CVE-2021-43175, it is possible for the attacker to do this without valid credentials. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CWE-22
168,977
CVE-2021-43180
7.5
5
HIGH
In JetBrains Hub before 2021.1.13690, information disclosure via avatar metadata is possible.
NVD-CWE-noinfo
168,978
CVE-2021-43181
6.1
4.3
MEDIUM
In JetBrains Hub before 2021.1.13690, stored XSS is possible.
CWE-79
168,979
CVE-2021-43182
7.5
5
HIGH
In JetBrains Hub before 2021.1.13415, a DoS via user information is possible.
NVD-CWE-noinfo
168,980
CVE-2021-43183
9.8
7.5
CRITICAL
In JetBrains Hub before 2021.1.13690, the authentication throttling mechanism could be bypassed.
CWE-287
168,981
CVE-2021-43184
5.4
3.5
MEDIUM
In JetBrains YouTrack before 2021.3.21051, stored XSS is possible.
CWE-79
168,982
CVE-2021-43185
9.8
7.5
CRITICAL
JetBrains YouTrack before 2021.3.23639 is vulnerable to Host header injection.
CWE-74
168,983
CVE-2021-43186
5.4
3.5
MEDIUM
JetBrains YouTrack before 2021.3.24402 is vulnerable to stored XSS.
CWE-79
168,984
CVE-2021-43187
5.3
5
MEDIUM
In JetBrains YouTrack Mobile before 2021.2, the client-side cache on iOS could contain sensitive information.
NVD-CWE-noinfo
168,985
CVE-2021-43188
7.3
7.5
HIGH
In JetBrains YouTrack Mobile before 2021.2, access token protection on iOS is incomplete.
NVD-CWE-noinfo
168,986
CVE-2021-43189
7.3
7.5
HIGH
In JetBrains YouTrack Mobile before 2021.2, access token protection on Android is incomplete.
NVD-CWE-noinfo
168,987
CVE-2021-43190
5.3
5
MEDIUM
In JetBrains YouTrack Mobile before 2021.2, task hijacking on Android is possible.
NVD-CWE-noinfo
168,988
CVE-2021-43191
5.3
5
MEDIUM
JetBrains YouTrack Mobile before 2021.2, is missing the security screen on Android and iOS.
NVD-CWE-noinfo
168,989
CVE-2021-43192
5.3
5
MEDIUM
In JetBrains YouTrack Mobile before 2021.2, iOS URL scheme hijacking is possible.
NVD-CWE-noinfo
168,990
CVE-2021-43193
9.8
7.5
CRITICAL
In JetBrains TeamCity before 2021.1.2, remote code execution via the agent push functionality is possible.
NVD-CWE-noinfo
168,991
CVE-2021-43194
5.3
5
MEDIUM
In JetBrains TeamCity before 2021.1.2, user enumeration was possible.
NVD-CWE-noinfo
168,992
CVE-2021-43195
5.3
5
MEDIUM
In JetBrains TeamCity before 2021.1.2, some HTTP security headers were missing.
NVD-CWE-noinfo
168,993
CVE-2021-43196
7.5
5
HIGH
In JetBrains TeamCity before 2021.1, information disclosure via the Docker Registry connection dialog is possible.
CWE-668
168,994
CVE-2021-43197
6.1
4.3
MEDIUM
In JetBrains TeamCity before 2021.1.2, email notifications could include unescaped HTML for XSS.
CWE-79
168,995
CVE-2021-43198
5.4
3.5
MEDIUM
In JetBrains TeamCity before 2021.1.2, stored XSS is possible.
CWE-79
168,996
CVE-2021-43199
5.3
5
MEDIUM
In JetBrains TeamCity before 2021.1.2, permission checks in the Create Patch functionality are insufficient.
CWE-276
168,997
CVE-2021-43200
9.8
7.5
CRITICAL
In JetBrains TeamCity before 2021.1.2, permission checks in the Agent Push functionality were insufficient.
NVD-CWE-noinfo
168,998
CVE-2021-43201
5.3
5
MEDIUM
In JetBrains TeamCity before 2021.1.3, a newly created project could take settings from an already deleted project.
NVD-CWE-noinfo
168,999
CVE-2021-43202
9.8
7.5
CRITICAL
In JetBrains TeamCity before 2021.1.3, the X-Frame-Options header is missing in some cases.
NVD-CWE-noinfo
169,000
CVE-2021-43203
7.5
5
HIGH
In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly.
CWE-287