Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2021-27063 | Windows DNS Server Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27064 | Visual Studio Installer Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27065 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27066 | Windows Admin Center Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27067 | Azure DevOps Server and Team Foundation Server Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27068 | Visual Studio Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27070 | Windows 10 Update Assistant Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27072 | Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27074 | Azure Sphere Unsigned Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27075 | Azure Virtual Machine Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27076 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27077 | Windows Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27078 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27079 | Windows Media Photo Codec Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27080 | Azure Sphere Unsigned Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27081 | Visual Studio Code ESLint Extension Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27082 | Quantum Development Kit for Visual Studio Code Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27083 | Remote Development Extension for Visual Studio Code Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27084 | Visual Studio Code Java Extension Pack Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27085 | Internet Explorer Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27086 | Windows Services and Controller App Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27088 | Windows Event Tracing Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27089 | Microsoft Internet Messaging API Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27090 | Windows Secure Kernel Mode Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27091 | RPC Endpoint Mapper Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27092 | Azure AD Web Sign-in Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27093 | Windows Kernel Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27094 | Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27095 | Windows Media Video Decoder Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27096 | NTFS Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-27097 | The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT. | Unknown | N/A | n/a | |
CVE-2021-27098 | In SPIRE 0.8.1 through 0.8.4 and before versions 0.9.4, 0.10.2, 0.11.3 and 0.12.1, specially crafted requests to the FetchX509SVID RPC of SPIRE Server’s Legacy Node API can result in the possible issuance of an X.509 certificate with a URI SAN for a SPIFFE ID that the agent is not authorized to distribute. Proper controls are in place to require that the caller presents a valid agent certificate that is already authorized to issue at least one SPIFFE ID, and the requested SPIFFE ID belongs to the same trust domain, prior to being able to trigger this vulnerability. This issue has been fixed in SPIRE versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1. | Unknown | N/A | n/a | |
CVE-2021-27099 | In SPIRE before versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1, the "aws_iid" Node Attestor improperly normalizes the path provided through the agent ID templating feature, which may allow the issuance of an arbitrary SPIFFE ID within the same trust domain, if the attacker controls the value of an EC2 tag prior to attestation, and the attestor is configured for agent ID templating where the tag value is the last element in the path. This issue has been fixed in SPIRE versions 0.11.3 and 0.12.1 | Unknown | N/A | n/a | |
CVE-2021-27101 | Accellion FTA 9_12_370 and earlier is affected by SQL injection via a crafted Host header in a request to document_root.html. The fixed version is FTA_9_12_380 and later. | Unknown | N/A | n/a | |
CVE-2021-27102 | Accellion FTA 9_12_411 and earlier is affected by OS command execution via a local web service call. The fixed version is FTA_9_12_416 and later. | Unknown | N/A | n/a | |
CVE-2021-27103 | Accellion FTA 9_12_411 and earlier is affected by SSRF via a crafted POST request to wmProgressstat.html. The fixed version is FTA_9_12_416 and later. | Unknown | N/A | n/a | |
CVE-2021-27104 | Accellion FTA 9_12_370 and earlier is affected by OS command execution via a crafted POST request to various admin endpoints. The fixed version is FTA_9_12_380 and later. | Unknown | N/A | n/a | |
CVE-2021-27112 | LightCMS v1.3.5 contains a remote code execution vulnerability in /app/Http/Controllers/Admin/NEditorController.php during the downloading of external images. | Unknown | N/A | n/a | |
CVE-2021-27113 | An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters. | Unknown | N/A | n/a | |
CVE-2021-27114 | An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. Within the handler function of the /goform/addassignment route, a very long text entry for the"'s_ip" and "s_mac" fields could lead to a Stack-Based Buffer Overflow and overwrite the return address. | Unknown | N/A | n/a | |
CVE-2021-27116 | An issue was discovered in file profile.go in function MemProf in beego through 2.0.2, allows attackers to launch symlink attacks locally. | Unknown | N/A | n/a | |
CVE-2021-27117 | An issue was discovered in file profile.go in function GetCPUProfile in beego through 2.0.2, allows attackers to launch symlink attacks locally. | Unknown | N/A | n/a | |
CVE-2021-27124 | SQL injection in the expertise parameter in search_result.php in Doctor Appointment System v1.0 allows an authenticated patient user to dump the database credentials via a SQL injection attack. | Unknown | N/A | n/a | |
CVE-2021-27129 | CASAP Automated Enrollment System version 1.0 contains a cross-site scripting (XSS) vulnerability through the Students > Edit > ROUTE parameter. | Unknown | N/A | n/a | |
CVE-2021-27130 | Online Reviewer System 1.0 contains a SQL injection vulnerability through authentication bypass, which may lead to a reverse shell upload. | Unknown | N/A | n/a | |
CVE-2021-27131 | Moodle 3.10.1 is vulnerable to persistent/stored cross-site scripting (XSS) due to the improper input sanitization on the "Additional HTML Section" via "Header and Footer" parameter in /admin/settings.php. This vulnerability is leading an attacker to steal admin and all user account cookies by storing the malicious XSS payload in Header and Footer. NOTE: this is disputed by the vendor because the "Additional HTML Section" for "Header and Footer" can only be supplied by an administrator, who is intentionally allowed to enter unsanitized input (e.g., site-specific JavaScript). | Unknown | N/A | n/a | |
CVE-2021-27132 | SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header. | Unknown | N/A | n/a | |
CVE-2021-27135 | xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence. | Unknown | N/A | n/a | |
CVE-2021-27138 | The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT. | Unknown | N/A | n/a | |
CVE-2021-27139 | An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to extract information from the device without authentication by disabling JavaScript and visiting /info.asp. | Unknown | N/A | n/a | |
CVE-2021-27140 | An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to find passwords and authentication cookies stored in cleartext in the web.log HTTP logs. | Unknown | N/A | n/a | |
CVE-2021-27141 | An issue was discovered on FiberHome HG6245D devices through RP2613. Credentials in /fhconf/umconfig.txt are obfuscated via XOR with the hardcoded *j7a(L#yZ98sSd5HfSgGjMj8;Ss;d)(*&^#@$a2s0i3g key. (The webs binary has details on how XOR is used.) | Unknown | N/A | n/a | |
CVE-2021-27142 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web management is done over HTTPS, using a hardcoded private key that has 0777 permissions. | Unknown | N/A | n/a | |
CVE-2021-27143 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / user1234 credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27144 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded f~i!b@e#r$h%o^m*esuperadmin / s(f)u_h+g|u credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27145 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / lnadmin credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27146 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / CUadmin credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27147 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / admin credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27148 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded telecomadmin / nE7jA%5m credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27149 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded adminpldt / z6dUABtl270qRxt7a2uGTiw credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27150 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded gestiontelebucaramanga / t3l3buc4r4m4ng42013 credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27151 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded rootmet / m3tr0r00t credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27152 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded awnfibre / fibre@dm!n credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27153 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded trueadmin / admintrue credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27154 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / G0R2U1P2ag credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27155 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 3UJUh2VemEfUtesEchEC2d2e credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27156 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains credentials for an ISP that equal the last part of the MAC address of the br0 interface. | Unknown | N/A | n/a | |
CVE-2021-27157 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 888888 credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27158 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded L1vt1m4eng / 888888 credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27159 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded useradmin / 888888 credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27160 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / 888888 credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27161 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 1234 credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27162 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / tattoo@home credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27163 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / tele1234 credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27164 | An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / aisadmin credentials for an ISP. | Unknown | N/A | n/a | |
CVE-2021-27165 | An issue was discovered on FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials. | Unknown | N/A | n/a | |
CVE-2021-27166 | An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon. | Unknown | N/A | n/a | |
CVE-2021-27167 | An issue was discovered on FiberHome HG6245D devices through RP2613. There is a password of four hexadecimal characters for the admin account. These characters are generated in init_3bb_password in libci_adaptation_layer.so. | Unknown | N/A | n/a | |
CVE-2021-27168 | An issue was discovered on FiberHome HG6245D devices through RP2613. There is a 6GFJdY4aAuUKJjdtSn7d password for the rdsadmin account. | Unknown | N/A | n/a | |
CVE-2021-27169 | An issue was discovered on FiberHome AN5506-04-FA devices with firmware RP2631. There is a gepon password for the gepon account. | Unknown | N/A | n/a | |
CVE-2021-27170 | An issue was discovered on FiberHome HG6245D devices through RP2613. By default, there are no firewall rules for IPv6 connectivity, exposing the internal management interfaces to the Internet. | Unknown | N/A | n/a | |
CVE-2021-27171 | An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to start a Linux telnetd as root on port 26/tcp by using the CLI interface commands of ddd and shell (or tshell). | Unknown | N/A | n/a | |
CVE-2021-27172 | An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh. | Unknown | N/A | n/a | |
CVE-2021-27173 | An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach the telnet server (used for the CLI). | Unknown | N/A | n/a | |
CVE-2021-27174 | An issue was discovered on FiberHome HG6245D devices through RP2613. wifi_custom.cfg has cleartext passwords and 0644 permissions. | Unknown | N/A | n/a | |
CVE-2021-27175 | An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions. | Unknown | N/A | n/a | |
CVE-2021-27176 | An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_5g.cfg has cleartext passwords and 0644 permissions. | Unknown | N/A | n/a | |
CVE-2021-27177 | An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server. | Unknown | N/A | n/a | |
CVE-2021-27178 | An issue was discovered on FiberHome HG6245D devices through RP2613. Some passwords are stored in cleartext in nvram. | Unknown | N/A | n/a | |
CVE-2021-27179 | An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to crash the telnet daemon by sending a certain 0a 65 6e 61 62 6c 65 0a 02 0a 1a 0a string. | Unknown | N/A | n/a | |
CVE-2021-27180 | An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user. | Unknown | N/A | n/a | |
CVE-2021-27181 | An issue was discovered in MDaemon before 20.0.4. Remote Administration allows an attacker to perform a fixation of the anti-CSRF token. In order to exploit this issue, the user has to click on a malicious URL provided by the attacker and successfully authenticate into the application. Having the value of the anti-CSRF token, the attacker may trick the user into visiting his malicious page and performing any request with the privileges of attacked user. | Unknown | N/A | n/a | |
CVE-2021-27182 | An issue was discovered in MDaemon before 20.0.4. There is an IFRAME injection vulnerability in Webmail (aka WorldClient). It can be exploited via an email message. It allows an attacker to perform any action with the privileges of the attacked user. | Unknown | N/A | n/a | |
CVE-2021-27183 | An issue was discovered in MDaemon before 20.0.4. Administrators can use Remote Administration to exploit an Arbitrary File Write vulnerability. An attacker is able to create new files in any location of the filesystem, or he may be able to modify existing files. This vulnerability may directly lead to Remote Code Execution. | Unknown | N/A | n/a | |
CVE-2021-27184 | Pelco Digital Sentry Server 7.18.72.11464 has an XML External Entity vulnerability (exploitable via the DTD parameter entities technique), resulting in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the ControlPointCacheShare.xml file (in a %APPDATA%\Pelco directory) when DSControlPoint.exe is executed. | Unknown | N/A | n/a | |
CVE-2021-27185 | The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec. | Unknown | N/A | n/a | |
CVE-2021-27186 | Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by flb_avro.c or http_server/api/v1/metrics.c. | Unknown | N/A | n/a | |
CVE-2021-27187 | The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 stores authentication credentials in cleartext in login.sav when the Save Password box is checked. | Unknown | N/A | n/a | |
CVE-2021-27188 | The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended for five hours) by making five invalid login attempts to a victim's account. | Unknown | N/A | n/a | |
CVE-2021-27189 | The CIRA Canadian Shield app before 4.0.13 for iOS lacks SSL Certificate Validation. | Unknown | N/A | n/a |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v