CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities (CVSS score between 5 and 5.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
301 CVE-2021-27432 674 Overflow 2021-05-20 2021-06-01
5.0
None Remote Low Not required None None Partial
OPC Foundation UA .NET Standard versions prior to 1.4.365.48 and OPC UA .NET Legacy are vulnerable to an uncontrolled recursion, which may allow an attacker to trigger a stack overflow.
302 CVE-2021-27405 400 DoS 2021-02-19 2021-03-30
5.0
None Remote Low Not required None None Partial
A ReDoS (regular expression denial of service) flaw was found in the @progfay/scrapbox-parser package before 6.0.3 for Node.js.
303 CVE-2021-27404 601 2021-02-19 2021-02-25
5.8
None Remote Medium Not required Partial Partial None
Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow injection of a Host HTTP header.
304 CVE-2021-27400 295 2021-04-22 2021-04-27
5.0
None Remote Low Not required None Partial None
HashiCorp Vault and Vault Enterprise Cassandra integrations (storage backend and database secrets engine plugin) did not validate TLS certificates when connecting to Cassandra clusters. Fixed in 1.6.4 and 1.7.1
305 CVE-2021-27393 330 2021-04-22 2021-04-30
5.0
None Remote Low Not required None Partial None
A vulnerability has been identified in Nucleus NET (All versions), Nucleus RTOS (versions including affected DNS modules), Nucleus ReadyStart (All versions < V2013.08), Nucleus Source Code (versions including affected DNS modules), VSTAR (versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.
306 CVE-2021-27386 401 2021-05-12 2021-05-21
5.0
None Remote Low Not required None None Partial
A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels 7\" & 15\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels 4\" - 22\" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced (All versions < V16 Update 4). SmartVNC has a heap allocation leak vulnerability in the device layout handler on client side, which could result in a Denial-of-Service condition.
307 CVE-2021-27385 400 2021-05-12 2021-05-21
5.0
None Remote Low Not required None None Partial
A remote attacker could send specially crafted packets to a SmartVNC device layout handler on the client side, which could influence the number of resources consumed and result in a denial-of-service condition (infinite loop) on the SIMATIC HMIs/WinCC Products SIMATIC HMI Comfort Outdoor Panels 7’ and 15’ (incl. SIPLUS variants), SIMATIC HMI Comfort Panels 4’to 22’ (incl. SIPLUS variants), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900, and KTP900F, SIMATIC WinCC Runtime Advanced (All versions prior to v16 Update 4).
308 CVE-2021-27383 770 2021-05-12 2021-05-21
5.0
None Remote Low Not required None None Partial
SmartVNC has a heap allocation leak vulnerability in the server Tight encoder, which could result in a denial-of-service condition on the SIMATIC HMIs/WinCC Products SIMATIC HMI Comfort Outdoor Panels 7’ and 15’ (incl. SIPLUS variants), SIMATIC HMI Comfort Panels 4’to 22’ (incl. SIPLUS variants), SIMATIC HMI KTP Mobile Panels KTP400F, KTP700, KTP700F, KTP900, and KTP900F, SIMATIC WinCC Runtime Advanced (All versions prior to v16 Update 4).
309 CVE-2021-27379 269 DoS +Priv 2021-02-18 2021-04-11
5.9
None Local Medium Not required Partial Partial Complete
An issue was discovered in Xen through 4.11.x, allowing x86 Intel HVM guest OS users to achieve unintended read/write DMA access, and possibly cause a denial of service (host OS crash) or gain privileges. This occurs because a backport missed a flush, and thus IOMMU updates were not always correct. NOTE: this issue exists because of an incomplete fix for CVE-2020-15565.
310 CVE-2021-27375 668 2021-02-18 2021-02-24
5.0
None Remote Low Not required None Partial None
Traefik before 2.4.5 allows the loading of IFRAME elements from other domains.
311 CVE-2021-27374 2021-02-17 2021-02-25
5.0
None Remote Low Not required Partial None None
VertiGIS WebOffice 10.7 SP1 before patch20210202 and 10.8 SP1 before patch20210207 allows attackers to achieve "Zugriff auf Inhalte der WebOffice Applikation."
312 CVE-2021-27367 22 Dir. Trav. 2021-02-17 2021-02-23
5.0
None Remote Low Not required Partial None None
Controller/Backend/FileEditController.php and Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow Directory Traversal.
313 CVE-2021-27358 DoS 2021-03-18 2021-05-13
5.0
None Remote Low Not required None None Partial
The snapshot feature in Grafana 6.7.3 through 7.4.1 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.
314 CVE-2021-27351 613 2021-02-19 2021-05-26
5.0
None Remote Low Not required None Partial None
The Terminate Session feature in the Telegram application through 7.2.1 for Android, and through 2.4.7 for Windows and UNIX, fails to invalidate a recently active session.
315 CVE-2021-27343 120 Overflow +Info 2021-04-06 2021-04-09
5.0
None Remote Low Not required Partial None None
SerenityOS Unspecified is affected by: Buffer Overflow. The impact is: obtain sensitive information (context-dependent). The component is: /Userland/Libraries/LibCrypto/ASN1/DER.h Crypto::der_decode_sequence() function. The attack vector is: Parsing RSA Key ASN.1.
316 CVE-2021-27320 89 Sql 2021-03-24 2021-03-24
5.0
None Remote Low Not required Partial None None
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via firstname parameter.
317 CVE-2021-27319 89 Sql 2021-03-24 2021-03-24
5.0
None Remote Low Not required Partial None None
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via email parameter.
318 CVE-2021-27316 89 Sql 2021-03-24 2021-03-24
5.0
None Remote Low Not required Partial None None
Blind SQL injection in contactus.php in doctor appointment system 1.0 allows an unauthenticated attacker to insert malicious SQL queries via lastname parameter.
319 CVE-2021-27315 89 Sql 2021-03-24 2021-03-24
5.0
None Remote Low Not required Partial None None
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via the comment parameter.
320 CVE-2021-27292 DoS 2021-03-17 2021-03-23
5.0
None Remote Low Not required None None Partial
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
321 CVE-2021-27291 DoS 2021-03-17 2021-04-11
5.0
None Remote Low Not required None None Partial
In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.
322 CVE-2021-27276 22 Dir. Trav. Bypass 2021-03-29 2021-03-30
5.5
None Remote Low ??? None Partial Partial
This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the MibController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12122.
323 CVE-2021-27231 2021-02-16 2021-06-03
5.5
None Remote Low ??? Partial Partial None
Hestia Control Panel 1.3.5 and below, in a shared-hosting environment, sometimes allows remote authenticated users to create a subdomain for a different customer's domain name, leading to spoofing of services or email messages.
324 CVE-2021-27225 863 2021-03-01 2021-03-05
5.5
None Remote Low ??? Partial Partial None
In Dataiku DSS before 8.0.6, insufficient access control in the Jupyter notebooks integration allows users (who have coding permissions) to read and overwrite notebooks in projects that they are not authorized to access.
325 CVE-2021-27224 787 Exec Code 2021-02-17 2021-02-22
5.0
None Remote Low Not required None None Partial
The WPG plugin before 3.1.0.0 for IrfanView 4.57 has a user-mode write access violation starting at WPG+0x0000000000012ec6, which might allow remote attackers to execute arbitrary code.
326 CVE-2021-27220 2021-03-31 2021-04-06
5.0
None Remote Low Not required Partial None None
An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server.
327 CVE-2021-27219 681 Overflow Mem. Corr. 2021-02-15 2021-03-22
5.0
None Remote Low Not required None None Partial
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
328 CVE-2021-27218 681 2021-02-15 2021-03-24
5.0
None Remote Low Not required None None Partial
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
329 CVE-2021-27212 617 DoS 2021-02-14 2021-03-26
5.0
None Remote Low Not required None None Partial
In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.
330 CVE-2021-27211 327 2021-02-15 2021-02-22
5.0
None Remote Low Not required Partial None None
steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for attackers to detect hidden data.
331 CVE-2021-27195 294 2021-03-25 2021-03-30
5.0
None Remote Low Not required None Partial None
Improper Authorization vulnerability in Netop Vision Pro up to and including to 9.7.1 allows an attacker to replay network traffic.
332 CVE-2021-27191 DoS 2021-02-11 2021-03-30
5.0
None Remote Low Not required None None Partial
The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion.
333 CVE-2021-27188 307 DoS 2021-02-12 2021-02-19
5.0
None Remote Low Not required None None Partial
The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended for five hours) by making five invalid login attempts to a victim's account.
334 CVE-2021-27187 522 2021-02-12 2021-02-18
5.0
None Remote Low Not required Partial None None
The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 stores authentication credentials in cleartext in login.sav when the Save Password box is checked.
335 CVE-2021-27186 476 2021-02-10 2021-02-16
5.0
None Remote Low Not required None None Partial
Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by flb_avro.c or http_server/api/v1/metrics.c.
336 CVE-2021-27184 611 2021-02-11 2021-02-17
5.0
None Remote Low Not required Partial None None
Pelco Digital Sentry Server 7.18.72.11464 has an XML External Entity vulnerability (exploitable via the DTD parameter entities technique), resulting in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the ControlPointCacheShare.xml file (in a %APPDATA%\Pelco directory) when DSControlPoint.exe is executed.
337 CVE-2021-27179 20 2021-02-10 2021-02-12
5.0
None Remote Low Not required None None Partial
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to crash the telnet daemon by sending a certain 0a 65 6e 61 62 6c 65 0a 02 0a 1a 0a string.
338 CVE-2021-27178 312 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. Some passwords are stored in cleartext in nvram.
339 CVE-2021-27176 312 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_5g.cfg has cleartext passwords and 0644 permissions.
340 CVE-2021-27175 312 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions.
341 CVE-2021-27174 312 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. wifi_custom.cfg has cleartext passwords and 0644 permissions.
342 CVE-2021-27173 287 2021-02-10 2021-02-12
5.0
None Remote Low Not required None Partial None
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach the telnet server (used for the CLI).
343 CVE-2021-27172 798 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh.
344 CVE-2021-27170 922 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. By default, there are no firewall rules for IPv6 connectivity, exposing the internal management interfaces to the Internet.
345 CVE-2021-27169 798 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome AN5506-04-FA devices with firmware RP2631. There is a gepon password for the gepon account.
346 CVE-2021-27168 798 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a 6GFJdY4aAuUKJjdtSn7d password for the rdsadmin account.
347 CVE-2021-27167 798 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a password of four hexadecimal characters for the admin account. These characters are generated in init_3bb_password in libci_adaptation_layer.so.
348 CVE-2021-27166 798 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon.
349 CVE-2021-27165 798 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials.
350 CVE-2021-27144 798 2021-02-10 2021-02-12
5.0
None Remote Low Not required Partial None None
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded [email protected]#r$h%o^m*esuperadmin / s(f)u_h+g|u credentials for an ISP.
Total number of vulnerabilities : 22711   Page : 1 2 3 4 5 6 7 (This Page)8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.