Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2021-26794 | Privilege escalation in 'upload.php' in FrogCMS SentCMS v0.9.5 allows attacker to execute arbitrary code via crafted php file. | Unknown | N/A | n/a | |
CVE-2021-26795 | A SQL Injection vulnerability in /appliance/shiftmgn.php in TalariaX sendQuick Alert Plus Server Admin 4.3 before 8HF11 allows attackers to obtain sensitive information via a Roster Time to Roster Management. | Unknown | N/A | n/a | |
CVE-2021-26797 | An access control vulnerability in Hame SD1 Wi-Fi firmware <=V.20140224154640 allows an attacker to get system administrator through an open Telnet service. | Unknown | N/A | n/a | |
CVE-2021-26799 | Cross Site Scripting (XSS) vulnerability in admin/files/edit in Omeka Classic <=2.7 allows remote attackers to inject arbitrary web script or HTML. | Unknown | N/A | n/a | |
CVE-2021-26800 | Cross Site Request Forgery (CSRF) vulnerability in Change-password.php in phpgurukul user management system in php using stored procedure V1.0, allows attackers to change the password to an arbitrary account. | Unknown | N/A | n/a | |
CVE-2021-26804 | Insecure Permissions in Centreon Web versions 19.10.18, 20.04.8, and 20.10.2 allows remote attackers to bypass validation by changing any file extension to ".gif", then uploading it in the "Administration/ Parameters/ Images" section of the application. | Unknown | N/A | n/a | |
CVE-2021-26805 | Buffer Overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a malicious WAV file. | Unknown | N/A | n/a | |
CVE-2021-26807 | GalaxyClient version 2.0.28.9 loads unsigned DLLs such as zlib1.dll, libgcc_s_dw2-1.dll and libwinpthread-1.dll from PATH, which allows an attacker to potentially run code locally through unsigned DLL loading. | Unknown | N/A | n/a | |
CVE-2021-26809 | PHPGurukul Car Rental Project version 2.0 suffers from a remote shell upload vulnerability in changeimage1.php. | Unknown | N/A | n/a | |
CVE-2021-26810 | D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter. | Unknown | N/A | n/a | |
CVE-2021-26812 | Cross Site Scripting (XSS) in the Jitsi Meet 2.7 through 2.8.3 plugin for Moodle via the "sessionpriv.php" module. This allows attackers to craft a malicious URL, which when clicked on by users, can inject javascript code to be run by the application. | Unknown | N/A | n/a | |
CVE-2021-26813 | markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of service vulnerability. If an attacker provides a malicious string, it can make markdown2 processing difficult or delayed for an extended period of time. | Unknown | N/A | n/a | |
CVE-2021-26814 | Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script. | Unknown | N/A | n/a | |
CVE-2021-26822 | Teachers Record Management System 1.0 is affected by a SQL injection vulnerability in 'searchteacher' POST parameter in search-teacher.php. This vulnerability can be exploited by a remote unauthenticated attacker to leak sensitive information and perform code execution attacks. | Unknown | N/A | n/a | |
CVE-2021-26824 | DM FingerTool v1.19 in the DM PD065 Secure USB is susceptible to improper authentication by a replay attack, allowing local attackers to bypass user authentication and access all features and data on the USB. | Unknown | N/A | n/a | |
CVE-2021-26825 | An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash. | Unknown | N/A | n/a | |
CVE-2021-26826 | A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash. | Unknown | N/A | n/a | |
CVE-2021-26827 | Buffer Overflow in TP-Link WR2041 v1 firmware for the TL-WR2041+ router allows remote attackers to cause a Denial-of-Service (DoS) by sending an HTTP request with a very long "ssid" parameter to the "/userRpm/popupSiteSurveyRpm.html" webpage, which crashes the router. | Unknown | N/A | n/a | |
CVE-2021-26828 | OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm. | Unknown | N/A | n/a | |
CVE-2021-26829 | OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm. | Unknown | N/A | n/a | |
CVE-2021-26830 | SQL Injection in Tribalsystems Zenario CMS 8.8.52729 allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module. | Unknown | N/A | n/a | |
CVE-2021-26832 | Cross Site Scripting (XSS) in the "Reset Password" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site. | Unknown | N/A | n/a | |
CVE-2021-26833 | Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted. | Unknown | N/A | n/a | |
CVE-2021-26834 | A cross-site scripting (XSS) vulnerability exists in Znote 0.5.2. An attacker can insert payloads, and the code execution will happen immediately on markdown view mode. | Unknown | N/A | n/a | |
CVE-2021-26835 | No filtering of cross-site scripting (XSS) payloads in the markdown-editor in Zettlr 1.8.7 allows attackers to perform remote code execution via a crafted file. | Unknown | N/A | n/a | |
CVE-2021-26837 | SQL Injection vulnerability in SearchTextBox parameter in Fortra (Formerly HelpSystems) DeliverNow before version 1.2.18, allows attackers to execute arbitrary code, escalate privileges, and gain sensitive information. | Unknown | N/A | n/a | |
CVE-2021-26843 | An issue was discovered in sthttpd through 2.27.1. On systems where the strcpy function is implemented with memcpy, the de_dotdot function may cause a Denial-of-Service (daemon crash) due to overlapping memory ranges being passed to memcpy. This can triggered with an HTTP GET request for a crafted filename. NOTE: this is similar to CVE-2017-10671, but occurs in a different part of the de_dotdot function. | Unknown | N/A | n/a | |
CVE-2021-26844 | A cross-site scripting (XSS) vulnerability in Power Admin PA Server Monitor 8.2.1.1 allows remote attackers to inject arbitrary web script or HTML via Console.exe. | Unknown | N/A | n/a | |
CVE-2021-26845 | Information Exposure vulnerability in Hitachi ABB Power Grids eSOMS allows unauthorized user to gain access to report data if the URL used to access the report is discovered. This issue affects: Hitachi ABB Power Grids eSOMS 6.0 versions prior to 6.0.4.2.2; 6.1 versions prior to 6.1.4; 6.3 versions prior to 6.3. | Unknown | N/A | n/a | |
CVE-2021-26854 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26855 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26857 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26858 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26859 | Microsoft Power BI Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26860 | Windows App-V Overlay Filter Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26861 | Windows Graphics Component Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26862 | Windows Installer Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26863 | Windows Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26864 | Windows Virtual Registry Provider Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26865 | Windows Container Execution Agent Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26866 | Windows Update Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26867 | Windows Hyper-V Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26868 | Windows Graphics Component Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26869 | Windows ActiveX Installer Service Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26870 | Windows Projected File System Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26871 | Windows WalletService Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26872 | Windows Event Tracing Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26873 | Windows User Profile Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26874 | Windows Overlay Filter Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26875 | Windows Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26876 | OpenType Font Parsing Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26877 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26878 | Windows Print Spooler Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26879 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26880 | Storage Spaces Controller Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26881 | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26882 | Remote Access API Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26884 | Windows Media Photo Codec Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26885 | Windows WalletService Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26886 | User Profile Service Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26887 | An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder. To exploit the vulnerability, an attacker can create a new folder under the Folder Redirection root path and create a junction on a newly created User folder. When the new user logs in, Folder Redirection would start redirecting to the folder and copying personal data. This elevation of privilege vulnerability can only be addressed by reconfiguring Folder Redirection with Offline files and restricting permissions, and NOT via a security update for affected Windows Servers. See the FAQ section of this CVE for configuration guidance. |
Unknown | N/A | Microsoft | |
CVE-2021-26889 | Windows Update Stack Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26890 | Application Virtualization Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26891 | Windows Container Execution Agent Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26892 | Windows Extensible Firmware Interface Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26893 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26894 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26895 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26896 | Windows DNS Server Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26897 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26898 | Windows Event Tracing Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26899 | Windows UPnP Device Host Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26900 | Windows Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26901 | Windows Event Tracing Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26902 | HEVC Video Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-26903 | LMA ISIDA Retriever 5.2 is vulnerable to XSS via query['text']. | Unknown | N/A | n/a | |
CVE-2021-26904 | LMA ISIDA Retriever 5.2 allows SQL Injection. | Unknown | N/A | n/a | |
CVE-2021-26905 | 1Password SCIM Bridge before 1.6.2 mishandles validation of authenticated requests for log files, leading to disclosure of a TLS private key. | Unknown | N/A | n/a | |
CVE-2021-26906 | An issue was discovered in res_pjsip_session.c in Digium Asterisk through 13.38.1; 14.x, 15.x, and 16.x through 16.16.0; 17.x through 17.9.1; and 18.x through 18.2.0, and Certified Asterisk through 16.8-cert5. An SDP negotiation vulnerability in PJSIP allows a remote server to potentially crash Asterisk by sending specific SIP responses that cause an SDP negotiation failure. | Unknown | N/A | n/a | |
CVE-2021-26908 | Automox Agent prior to version 31 logs potentially sensitive information in local log files, which could be used by a locally-authenticated attacker to subvert an organization's security program. The issue has since been fixed in version 31 of the Automox Agent. | Unknown | N/A | Automox | |
CVE-2021-26909 | Automox Agent prior to version 31 uses an insufficiently protected S3 bucket endpoint for storing sensitive files, which could be brute-forced by an attacker to subvert an organization's security program. The issue has since been fixed in version 31 of the Automox Agent. | Unknown | N/A | Automox | |
CVE-2021-26910 | Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation. | Unknown | N/A | n/a | |
CVE-2021-26911 | core/imap/MCIMAPSession.cpp in Canary Mail before 3.22 has Missing SSL Certificate Validation for IMAP in STARTTLS mode. | Unknown | N/A | n/a | |
CVE-2021-26912 | NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in SupportRpcServlet. | Unknown | N/A | n/a | |
CVE-2021-26913 | NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in RpcServlet. | Unknown | N/A | n/a | |
CVE-2021-26914 | NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in MvcUtil valueStringToObject. | Unknown | N/A | n/a | |
CVE-2021-26915 | NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in webrepdb StatusServlet. | Unknown | N/A | n/a | |
CVE-2021-26916 | In nopCommerce 4.30, a Reflected XSS issue in the Discount Coupon component allows remote attackers to inject arbitrary web script or HTML through the Filters/CheckDiscountCouponAttribute.cs discountcode parameter. | Unknown | N/A | n/a | |
CVE-2021-26917 | PyBitmessage through 0.6.3.2 allows attackers to write screen captures to Potentially Unwanted Directories via a crafted apinotifypath value. NOTE: the discoverer states "security mitigation may not be necessary as there is no evidence yet that these screen intercepts are actually transported away from the local host." NOTE: it is unclear whether there are any common use cases in which apinotifypath is controlled by an attacker | Unknown | N/A | n/a | |
CVE-2021-26918 | The ProBot bot through 2021-02-08 for Discord might allow attackers to interfere with the intended purpose of the "Send an image when a user joins the server" feature (or possibly have unspecified other impact) because the uploader web service allows double extensions (such as .html.jpg) with the text/html content type. NOTE: there may not be cases in which an uploader web service is customer controlled; however, the nature of the issue has substantial interaction with customer controlled configuration. NOTE: the vendor states "This is just an uploader (like any other one) which uploads files to cloud storage and accepts various file types. There is no kind of vulnerability and it won't compromise either the client side or the server side. | Unknown | N/A | n/a | |
CVE-2021-26919 | Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2 | Unknown | N/A | Apache Software Foundation | |
CVE-2021-26920 | In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. | Unknown | N/A | Apache Software Foundation | |
CVE-2021-26921 | In util/session/sessionmanager.go in Argo CD before 1.8.4, tokens continue to work even when the user account is disabled. | Unknown | N/A | n/a | |
CVE-2021-26923 | An issue was discovered in Argo CD before 1.8.4. Accessing the endpoint /api/version leaks internal information for the system, and this endpoint is not protected with authentication. | Unknown | N/A | n/a | |
CVE-2021-26924 | An issue was discovered in Argo CD before 1.8.4. Browser XSS protection is not activated due to the missing XSS protection header. | Unknown | N/A | n/a | |
CVE-2021-26925 | Roundcube before 1.4.11 allows XSS via crafted Cascading Style Sheets (CSS) token sequences during HTML email rendering. | Unknown | N/A | n/a | |
CVE-2021-26926 | A flaw was found in jasper before 2.0.25. An out of bounds read issue was found in jp2_decode function whic may lead to disclosure of information or program crash. | Unknown | N/A | n/a | |
CVE-2021-26927 | A flaw was found in jasper before 2.0.25. A null pointer dereference in jp2_decode in jp2_dec.c may lead to program crash and denial of service. | Unknown | N/A | n/a | |
CVE-2021-26928 | BIRD through 2.0.7 does not provide functionality for password authentication of BGP peers. Because of this, products that use BIRD (which may, for example, include Tigera products in some configurations, as well as products of other vendors) may have been susceptible to route redirection for Denial of Service and/or Information Disclosure. NOTE: a researcher has asserted that the behavior is within Tigera’s area of responsibility; however, Tigera disagrees | Unknown | N/A | n/a | |
CVE-2021-26929 | An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses. | Unknown | N/A | n/a |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v