Search and browse vulnerability records from NVD
Showing 50 of 115456 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
| 8.1 HIGH |
When PgBouncer is configured to use "cert" authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of TLS certificate verification and encryption. This flaw affects PgBouncer versions prior to 1.16.1. |
0.1% | 2021-11-22 | ||
| 5.5 MEDIUM |
Philips MRI 1.5T and MRI 3T Version 5.3 through 5.8.1 does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
0.0% | 2021-11-19 | ||
| 5.5 MEDIUM |
Philips MRI 1.5T and MRI 3T Version 5.3 through 5.8.1 does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
0.1% | 2021-11-19 | ||
| 5.5 MEDIUM |
Philips MRI 1.5T and MRI 3T Version 5.3 through 5.8.1 does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
0.1% | 2021-11-19 | ||
|
CVE-2021-44026
KEV
|
9.8 CRITICAL |
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params. |
72.5% | 2021-11-19 | |
|
CVE-2021-41277
KEV
|
10.0 CRITICAL |
Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If youβre unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application. |
94.4% | 2021-11-17 | |
| 7.2 HIGH |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the nvalloc function |
0.3% | 2021-11-15 | ||
| 7.2 HIGH |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the evaluate function |
0.3% | 2021-11-15 | ||
| 7.2 HIGH |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the handle_special function |
0.2% | 2021-11-15 | ||
| 7.2 HIGH |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_s function |
0.3% | 2021-11-15 | ||
| 7.2 HIGH |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the hash_init function |
0.3% | 2021-11-15 | ||
| 7.2 HIGH |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the clrvar function |
0.5% | 2021-11-15 | ||
| 7.2 HIGH |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the next_input_file function |
0.2% | 2021-11-15 | ||
| 7.2 HIGH |
A use-after-free in Busybox's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the getvar_i function |
0.2% | 2021-11-15 | ||
| 5.3 MEDIUM |
An out-of-bounds heap read in Busybox's unlzma applet leads to information leak and denial of service when crafted LZMA-compressed input is decompressed. This can be triggered by any applet/format that |
0.1% | 2021-11-15 | ||
| 4.3 MEDIUM |
BlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will always be hung in the singly linked list of cstates and will not be freed. This will cause a memory leak over time. The data can be a very large object, which can be caused by an attacker continuously sending sdp packets and this may cause the service of the target device to crash. |
0.0% | 2021-11-12 | ||
| 4.4 MEDIUM |
OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded NUL (\0) character). |
0.6% | 2021-11-11 | ||
| 8.8 HIGH |
The vCenter Server contains a privilege escalation vulnerability in the IWA (Integrated Windows Authentication) authentication mechanism. A malicious actor with non-administrative access to vCenter Server may exploit this issue to elevate privileges to a higher privileged group. |
0.8% | 2021-11-10 | ||
|
CVE-2021-42321
KEV
|
8.8 HIGH |
Microsoft Exchange Server Remote Code Execution Vulnerability |
93.6% | 2021-11-10 | |
|
CVE-2021-42292
KEV
|
7.8 HIGH |
Microsoft Excel Security Feature Bypass Vulnerability |
35.5% | 2021-11-10 | |
|
CVE-2021-42287
KEV
|
7.5 HIGH |
Active Directory Domain Services Elevation of Privilege Vulnerability |
94.0% | 2021-11-10 | |
|
CVE-2021-42278
KEV
|
7.5 HIGH |
Active Directory Domain Services Elevation of Privilege Vulnerability |
94.1% | 2021-11-10 | |
|
CVE-2021-41379
KEV
|
5.5 MEDIUM |
Windows Installer Elevation of Privilege Vulnerability |
1.2% | 2021-11-10 | |
| 7.6 HIGH |
A Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exists when Power BI Report Server Template file (pbix) containing HTML files is uploaded to the server and HTML files are accessed directly by the victim. Combining these 2 vulnerabilities together, an attacker is able to upload malicious Power BI templates files to the server using the victim's session and run scripts in the security context of the user and perform privilege escalation in case the victim has admin privileges when the victim access one of the HTML files present in the malicious Power BI template uploaded. The security update addresses the vulnerability by helping to ensure that Power BI Report Server properly sanitize file uploads. |
0.2% | 2021-11-10 | ||
| 6.5 MEDIUM |
The Redirect 404 Error Page to Homepage or Custom Page with Logs WordPress plugin before 1.7.9 does not check for CSRF when deleting logs, which could allow attacker to make a logged in admin delete them via a CSRF attack |
0.1% | 2021-11-08 | ||
|
CVE-2021-42237
KEV
|
9.8 CRITICAL |
Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability. |
94.4% | 2021-11-05 | |
| 9.1 CRITICAL |
An issue was discovered in gatt-database.c in BlueZ 5.61. A use-after-free can occur when a client disconnects during D-Bus processing of a WriteValue call. |
0.2% | 2021-11-04 | ||
| 9.8 CRITICAL |
Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters.. |
3.7% | 2021-10-29 | ||
| 9.8 CRITICAL |
Remote Code Exection (RCE) vulnerability exists in Sourcecodester Online Food Ordering System 2.0 via a maliciously crafted PHP file that bypasses the image upload filters. |
0.8% | 2021-10-29 | ||
| 9.8 CRITICAL |
An SQL Injection vulnerability exists in Sourcecodester Complaint Management System 1.0 via the cid parameter in complaint-details.php. |
0.3% | 2021-10-27 | ||
| 6.5 MEDIUM |
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `of` option of the `.position()` util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. A workaround is to not accept the value of the `of` option from untrusted sources. |
25.4% | 2021-10-26 | ||
|
CVE-2021-42258
KEV
|
9.8 CRITICAL |
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell. |
94.1% | 2021-10-22 | |
| 5.3 MEDIUM |
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region. This issue has been patched in FreeRDP 2.4.1. |
0.1% | 2021-10-21 | ||
|
CVE-2021-30807
KEV
|
7.8 HIGH |
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.5.1, iOS 14.7.1 and iPadOS 14.7.1, watchOS 7.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited. |
24.5% | 2021-10-19 | |
| 7.8 HIGH |
vim is vulnerable to Heap-based Buffer Overflow |
0.2% | 2021-10-19 | ||
|
CVE-2021-27561
KEV
|
9.8 CRITICAL |
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication. |
94.1% | 2021-10-15 | |
| 5.5 MEDIUM |
The Business Manager WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization found throughout the plugin which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.4.5. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled. |
0.4% | 2021-10-15 | ||
| 6.5 MEDIUM |
The Manage Backgrounds functionality within NagVis versions prior to 1.9.29 is vulnerable to an authenticated path traversal vulnerability. Exploitation of this results in a malicious actor having the ability to arbitrarily delete files on the local system. |
0.6% | 2021-10-14 | ||
| 6.1 MEDIUM |
XMP Toolkit version 2020.1 (and earlier) is affected by a null pointer dereference vulnerability that could result in leaking data from certain memory locations and causing a local denial of service in the context of the current user. User interaction is required to exploit this vulnerability in that the victim will need to open a specially crafted MXF file. |
0.1% | 2021-10-13 | ||
|
CVE-2021-20124
KEV
|
7.5 HIGH |
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. |
94.1% | 2021-10-13 | |
|
CVE-2021-20123
KEV
|
7.5 HIGH |
A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges. |
94.0% | 2021-10-13 | |
|
CVE-2021-41357
KEV
|
7.8 HIGH |
Win32k Elevation of Privilege Vulnerability |
5.5% | 2021-10-13 | |
|
CVE-2021-40450
KEV
|
7.8 HIGH |
Win32k Elevation of Privilege Vulnerability |
5.6% | 2021-10-13 | |
|
CVE-2021-40449
KEV
|
7.8 HIGH |
Win32k Elevation of Privilege Vulnerability |
91.8% | 2021-10-13 | |
| 9.8 CRITICAL |
SAP Business One - version 10.0, allows an attacker to inject formulas when exporting data to Excel (CSV injection) due to improper sanitation during the data export. An attacker could thereby execute arbitrary commands on the victim's computer but only if the victim allows to execute macros while opening the file and the security settings of Excel allow for command execution. |
1.3% | 2021-10-12 | ||
| 7.5 HIGH |
TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service. |
1.1% | 2021-10-11 | ||
|
CVE-2021-37976
KEV
|
6.5 MEDIUM |
Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. |
7.7% | 2021-10-08 | |
|
CVE-2021-37975
KEV
|
8.8 HIGH |
Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
63.0% | 2021-10-08 | |
|
CVE-2021-37973
KEV
|
9.6 CRITICAL |
Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. |
6.5% | 2021-10-08 | |
|
CVE-2021-30633
KEV
|
9.6 CRITICAL |
Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. |
38.2% | 2021-10-08 |