Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2021-31162 | In the standard library in Rust before 1.52.0, a double free can occur in the Vec::from_iter function if freeing the element panics. | Unknown | N/A | n/a | |
CVE-2021-31164 | Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements. | Unknown | N/A | Apache Software Foundation | |
CVE-2021-31165 | Windows Container Manager Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31166 | HTTP Protocol Stack Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31167 | Windows Container Manager Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31168 | Windows Container Manager Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31169 | Windows Container Manager Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31170 | Windows Graphics Component Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31171 | Microsoft SharePoint Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31172 | Microsoft SharePoint Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31173 | Microsoft SharePoint Server Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31174 | Microsoft Excel Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31175 | Microsoft Office Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31176 | Microsoft Office Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31177 | Microsoft Office Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31178 | Microsoft Office Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31179 | Microsoft Office Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3118 | EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has multiple SQL Injection issues in the login form and the password-forgotten form (such as /req_password_user.php?email=). This allows an attacker to steal data in the database and obtain access to the application. (The database component runs as root.) NOTE: This vulnerability only affects products that are no longer supported by the maintainer | Unknown | N/A | n/a | |
CVE-2021-31180 | Microsoft Office Graphics Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31181 | Microsoft SharePoint Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31182 | Microsoft Bluetooth Driver Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31183 | Windows TCP/IP Driver Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31184 | Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31185 | Windows Desktop Bridge Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31186 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31187 | Windows WalletService Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31188 | Windows Graphics Component Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3119 | Zetetic SQLCipher 4.x before 4.4.3 has a NULL pointer dereferencing issue related to sqlcipher_export in crypto.c and sqlite3StrICmp in sqlite3.c. This may allow an attacker to perform a remote denial of service attack. For example, an SQL injection can be used to execute the crafted SQL command sequence, which causes a segmentation fault. | Unknown | N/A | n/a | |
CVE-2021-31190 | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31191 | Windows Projected File System FS Filter Driver Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31192 | Windows Media Foundation Core Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31193 | Windows SSDP Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31194 | OLE Automation Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31195 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31196 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31198 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31199 | Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3120 | An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premium plugin before 3.3.1 for WordPress allows remote attackers to achieve remote code execution on the operating system in the security context of the web server. In order to exploit this vulnerability, an attacker must be able to place a valid Gift Card product into the shopping cart. An uploaded file is placed at a predetermined path on the web server with a user-specified filename and extension. This occurs because the ywgc-upload-picture parameter can have a .php value even though the intention was to only allow uploads of Gift Card images. | Unknown | N/A | n/a | |
CVE-2021-31200 | Common Utilities Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31201 | Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31204 | .NET and Visual Studio Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31205 | Windows SMB Client Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31206 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31207 | Microsoft Exchange Server Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31208 | Windows Container Manager Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31209 | Microsoft Exchange Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3121 | An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue. | Unknown | N/A | n/a | |
CVE-2021-31211 | Visual Studio Code Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31213 | Visual Studio Code Remote Containers Extension Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31214 | Visual Studio Code Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-31215 | SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling. | Unknown | N/A | n/a | |
CVE-2021-31216 | Siren Investigate before 11.1.1 contains a server side request forgery (SSRF) defect in the built-in image proxy route (which is enabled by default). An attacker with access to the Investigate installation can specify an arbitrary URL in the parameters of the image proxy route and fetch external URLs as the Investigate process on the host. | Unknown | N/A | n/a | |
CVE-2021-31217 | In SolarWinds DameWare Mini Remote Control Server 12.0.1.200, insecure file permissions allow file deletion as SYSTEM. | Unknown | N/A | n/a | |
CVE-2021-3122 | CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration." | Unknown | N/A | n/a | |
CVE-2021-31220 | SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies. | Unknown | N/A | n/a | |
CVE-2021-31221 | SES Evolution before 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed. | Unknown | N/A | n/a | |
CVE-2021-31222 | SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed. | Unknown | N/A | n/a | |
CVE-2021-31223 | SES Evolution before 2.1.0 allows reading some parts of a security policy by leveraging access to a computer having the administration console installed. | Unknown | N/A | n/a | |
CVE-2021-31224 | SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies. | Unknown | N/A | n/a | |
CVE-2021-31225 | SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed. | Unknown | N/A | n/a | |
CVE-2021-31226 | An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to lack of size validation. This vulnerability requires the attacker to send a crafted HTTP POST request with a URI longer than 50 bytes. This leads to a heap overflow in wbs_post() via an strcpy() call. | Unknown | N/A | n/a | |
CVE-2021-31227 | An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to an incorrect signed integer comparison. This vulnerability requires the attacker to send a malformed HTTP packet with a negative Content-Length, which bypasses the size checks and results in a large heap overflow in the wbs_multidata buffer copy. | Unknown | N/A | n/a | |
CVE-2021-31228 | An issue was discovered in HCC embedded InterNiche 4.0.1. This vulnerability allows the attacker to predict a DNS query's source port in order to send forged DNS response packets that will be accepted as valid answers to the DNS client's requests (without sniffing the specific request). Data is predictable because it is based on the time of day, and has too few bits. | Unknown | N/A | n/a | |
CVE-2021-31229 | An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd() performs incorrect memory handling while parsing crafted XML files, which leads to an out-of-bounds write of a one byte constant. | Unknown | N/A | n/a | |
CVE-2021-31231 | The Alertmanager in Grafana Enterprise Metrics before 1.2.1 and Metrics Enterprise 1.2.1 has a local file disclosure vulnerability when experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list. | Unknown | N/A | n/a | |
CVE-2021-31232 | The Alertmanager in CNCF Cortex before 1.8.1 has a local file disclosure vulnerability when -experimental.alertmanager.enable-api is used. The HTTP basic auth password_file can be used as an attack vector to send any file content via a webhook. The alertmanager templates can be used as an attack vector to send any file content because the alertmanager can load any text file specified in the templates list. | Unknown | N/A | n/a | |
CVE-2021-31233 | SQL Injection vulnerability found in Fighting Cock Information System v.1.0 allows a remote attacker to obtain sensitive information via the edit_breed.php parameter. | Unknown | N/A | n/a | |
CVE-2021-31239 | An issue found in SQLite SQLite3 v.3.35.4 that allows a remote attacker to cause a denial of service via the appendvfs.c function. | Unknown | N/A | n/a | |
CVE-2021-3124 | Stored cross-site scripting (XSS) in form field in robust.systems product Custom Global Variables v 1.0.5 allows a remote attacker to inject arbitrary code via the vars[0][name] field. | Unknown | N/A | n/a | |
CVE-2021-31240 | An issue found in libming v.0.4.8 allows a local attacker to execute arbitrary code via the parseSWF_IMPORTASSETS function in the parser.c file. | Unknown | N/A | n/a | |
CVE-2021-31245 | omr-admin.py in openmptcprouter-vps-admin 0.57.3 and earlier compares the user provided password with the original password in a length dependent manner, which allows remote attackers to guess the password via a timing attack. | Unknown | N/A | n/a | |
CVE-2021-31249 | A CRLF injection vulnerability was found on BF-430, BF-431, and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of validation on the parameter redirect= available on multiple CGI components. | Unknown | N/A | n/a | |
CVE-2021-3125 | In TP-Link TL-XDR3230 < 1.0.12, TL-XDR1850 < 1.0.9, TL-XDR1860 < 1.0.14, TL-XDR3250 < 1.0.2, TL-XDR6060 Turbo < 1.1.8, TL-XDR5430 < 1.0.11, and possibly others, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set. | Unknown | N/A | n/a | |
CVE-2021-31250 | Multiple storage XSS vulnerabilities were discovered on BF-430, BF-431 and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of sanitization of the input on the components man.cgi, if.cgi, dhcpc.cgi, ppp.cgi. | Unknown | N/A | n/a | |
CVE-2021-31251 | An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated. | Unknown | N/A | n/a | |
CVE-2021-31252 | An open redirect vulnerability exists in BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, and SEMAC devices from CHIYU Technology that can be exploited by sending a link that has a specially crafted URL to convince the user to click on it. | Unknown | N/A | n/a | |
CVE-2021-31254 | Buffer overflow in the tenc_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file, related invalid IV sizes. | Unknown | N/A | n/a | |
CVE-2021-31255 | Buffer overflow in the abst_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file. | Unknown | N/A | n/a | |
CVE-2021-31256 | Memory leak in the stbl_GetSampleInfos function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file. | Unknown | N/A | n/a | |
CVE-2021-31257 | The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | Unknown | N/A | n/a | |
CVE-2021-31258 | The gf_isom_set_extraction_slc function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | Unknown | N/A | n/a | |
CVE-2021-31259 | The gf_isom_cenc_get_default_info_internal function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | Unknown | N/A | n/a | |
CVE-2021-31260 | The MergeTrack function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | Unknown | N/A | n/a | |
CVE-2021-31261 | The gf_hinter_track_new function in GPAC 1.0.1 allows attackers to read memory via a crafted file in the MP4Box command. | Unknown | N/A | n/a | |
CVE-2021-31262 | The AV1_DuplicateConfig function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | Unknown | N/A | n/a | |
CVE-2021-3127 | NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled. | Unknown | N/A | n/a | |
CVE-2021-31272 | SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation. | Unknown | N/A | n/a | |
CVE-2021-31274 | In LibreNMS < 21.3.0, a stored XSS vulnerability was identified in the API Access page due to insufficient sanitization of the $api->description variable. As a result, arbitrary Javascript code can get executed. | Unknown | N/A | n/a | |
CVE-2021-3128 | In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set. | Unknown | N/A | n/a | |
CVE-2021-31280 | An issue was discovered in tp5cms through 2017-05-25. admin.php/system/set.html has XSS via the keywords parameter. | Unknown | N/A | n/a | |
CVE-2021-3129 | Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. | Unknown | N/A | n/a | |
CVE-2021-31292 | An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a heap-based buffer overflow and cause a denial of service (DOS) via crafted metadata. | Unknown | N/A | n/a | |
CVE-2021-31294 | Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server by sending a non-administrative command (specifically, a SET command). NOTE: this was fixed for Redis 6.2.x and 7.x in 2021. Versions before 6.2 were not intended to have safety guarantees related to this. | Unknown | N/A | n/a | |
CVE-2021-3130 | Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible. | Unknown | N/A | n/a | |
CVE-2021-3131 | The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter. | Unknown | N/A | n/a | |
CVE-2021-31314 | File upload vulnerability in ejinshan v8+ terminal security system allows attackers to upload arbitrary files to arbitrary locations on the server. | Unknown | N/A | n/a | |
CVE-2021-31315 | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the blit function of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker. | Unknown | N/A | n/a | |
CVE-2021-31316 | The unprivileged user portal part of CentOS Web Panel is affected by a SQL Injection via the 'idsession' HTTP POST parameter. | Unknown | N/A | n/a | |
CVE-2021-31317 | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the VDasher constructor of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's heap memory out-of-bounds on a victim device via a malicious animated sticker. | Unknown | N/A | n/a | |
CVE-2021-31318 | Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the LOTCompLayerItem::LOTCompLayerItem function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker. | Unknown | N/A | n/a |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v