Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2021-41301 | ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access. | Unknown | N/A | ECOA | |
CVE-2021-41302 | ECOA BAS controller stores sensitive data (backup exports) in clear-text, thus the unauthenticated attacker can remotely query user password and obtain user’s privilege. | Unknown | N/A | ECOA | |
CVE-2021-41303 | Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0. | Unknown | N/A | Apache Software Foundation | |
CVE-2021-41304 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the /secure/admin/ImporterFinishedPage.jspa error message. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.2. | Unknown | N/A | Atlassian | |
CVE-2021-41305 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view the names of private projects and filters via an Insecure Direct Object References (IDOR) vulnerability in the Average Number of Times in Status Gadget. The affected versions are before version 8.13.12.. | Unknown | N/A | Atlassian | |
CVE-2021-41306 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to view private project and filter names via an Insecure Direct Object References (IDOR) vulnerability in the Average Time in Status Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0. | Unknown | N/A | Atlassian | |
CVE-2021-41307 | Affected versions of Atlassian Jira Server and Data Center allow unauthenticated remote attackers to view the names of private projects and private filters via an Insecure Direct Object References (IDOR) vulnerability in the Workload Pie Chart Gadget. The affected versions are before version 8.13.12, and from version 8.14.0 before 8.20.0. | Unknown | N/A | Atlassian | |
CVE-2021-41308 | Affected versions of Atlassian Jira Server and Data Center allow authenticated yet non-administrator remote attackers to edit the File Replication settings via a Broken Access Control vulnerability in the `ReplicationSettings!default.jspa` endpoint. The affected versions are before version 8.6.0, from version 8.7.0 before 8.13.12, and from version 8.14.0 before 8.20.1. | Unknown | N/A | Atlassian | |
CVE-2021-41309 | Affected versions of Atlassian Jira Server and Data Center allow a user who has had their Jira Service Management access revoked to export audit logs of another user's Jira Service Management project via a Broken Authentication vulnerability in the /plugins/servlet/audit/resource endpoint. The affected versions of Jira Server and Data Center are before version 8.19.1. | Unknown | N/A | Atlassian | |
CVE-2021-4131 | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | Unknown | N/A | livehelperchat | |
CVE-2021-41310 | Affected versions of Atlassian Jira Server and Data Center allow anonymous remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in the Associated Projects feature (/secure/admin/AssociatedProjectsForCustomField.jspa). The affected versions are before version 8.5.19, from version 8.6.0 before 8.13.11, and from version 8.14.0 before 8.19.1. | Unknown | N/A | Atlassian | |
CVE-2021-41311 | Affected versions of Atlassian Jira Server and Data Center allow attackers with access to an administrator account that has had its access revoked to modify projects' Users & Roles settings, via a Broken Authentication vulnerability in the /plugins/servlet/project-config/PROJECT/roles endpoint. The affected versions are before version 8.19.1. | Unknown | N/A | Atlassian | |
CVE-2021-41312 | Affected versions of Atlassian Jira Server and Data Center allow a remote attacker who has had their access revoked from Jira Service Management to enable and disable Issue Collectors on Jira Service Management projects via an Improper Authentication vulnerability in the /secure/ViewCollectors endpoint. The affected versions are before version 8.19.1. | Unknown | N/A | Atlassian | |
CVE-2021-41313 | Affected versions of Atlassian Jira Server and Data Center allow authenticated but non-admin remote attackers to edit email batch configurations via an Improper Authorization vulnerability in the /secure/admin/ConfigureBatching!default.jspa endpoint. The affected versions are before version 8.20.7. | Unknown | N/A | Atlassian | |
CVE-2021-41314 | Certain NETGEAR smart switches are affected by a \n injection in the web UI's password field, which - due to several faulty aspects of the authentication scheme - allows the attacker to create (or overwrite) a file with specific content (e.g., the "2" string). This leads to admin session crafting and therefore gaining full web UI admin privileges by an unauthenticated attacker. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS750E before 1.0.1.10, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. | Unknown | N/A | n/a | |
CVE-2021-41315 | The Device42 Remote Collector before 17.05.01 does not sanitize user input in its SNMP Connectivity utility. This allows an authenticated attacker (with access to the console application) to execute arbitrary OS commands and escalate privileges. | Unknown | N/A | n/a | |
CVE-2021-41316 | The Device42 Main Appliance before 17.05.01 does not sanitize user input in its Nmap Discovery utility. An attacker (with permissions to add or edit jobs run by this utility) can inject an extra argument to overwrite arbitrary files as the root user on the Remote Collector. | Unknown | N/A | n/a | |
CVE-2021-41317 | XSS Hunter Express before 2021-09-17 does not properly enforce authentication requirements for paths. | Unknown | N/A | n/a | |
CVE-2021-41318 | In Progress WhatsUp Gold prior to version 21.1.0, an application endpoint failed to adequately sanitize malicious input. which could allow an unauthenticated attacker to execute arbitrary code in a victim's browser. | Unknown | N/A | n/a | |
CVE-2021-4132 | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | Unknown | N/A | livehelperchat | |
CVE-2021-41320 | A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. NOTE: the vendor disputes this because the password is not hardcoded (it can be changed during installation or at any later time). | Unknown | N/A | n/a | |
CVE-2021-41322 | Poly VVX 400/410 5.3.1 allows low-privileged users to change the Admin password by modifying a POST parameter to 120 during the password reset process. | Unknown | N/A | n/a | |
CVE-2021-41323 | Directory traversal in the Compress feature in Pydio Cells 2.2.9 allows remote authenticated users to overwrite personal files, or Cells files belonging to any user, via the format parameter. | Unknown | N/A | n/a | |
CVE-2021-41324 | Directory traversal in the Copy, Move, and Delete features in Pydio Cells 2.2.9 allows remote authenticated users to enumerate personal files (or Cells files belonging to any user) via the nodes parameter (for Copy and Move) or via the Path parameter (for Delete). | Unknown | N/A | n/a | |
CVE-2021-41325 | Broken access control for user creation in Pydio Cells 2.2.9 allows remote anonymous users to create standard users via the profile parameter. (In addition, such users can be granted several admin permissions via the Roles parameter.) | Unknown | N/A | n/a | |
CVE-2021-41326 | In MISP before 2.4.148, app/Lib/Export/OpendataExport.php mishandles parameter data that is used in a shell_exec call. | Unknown | N/A | n/a | |
CVE-2021-41329 | Datalust Seq before 2021.2.6259 allows users (with view filters applied to their accounts) to see query results not constrained by their view filter. This information exposure, caused by an internal cache key collision, occurs when the user's view filter includes an array or IN clause, and when another user has recently executed an identical query differing only by the array elements. | Unknown | N/A | n/a | |
CVE-2021-4133 | A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled. | Unknown | N/A | n/a | |
CVE-2021-41330 | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41331 | Windows Media Audio Decoder Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41332 | Windows Print Spooler Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41333 | Windows Print Spooler Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41334 | Windows Desktop Bridge Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41335 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41336 | Windows Kernel Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41337 | Active Directory Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41338 | Windows AppContainer Firewall Rules Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41339 | Microsoft DWM Core Library Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-4134 | The Fancy Product Designer WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the ID parameter found in the ~/inc/api/class-view.php file which allows attackers with administrative level permissions to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 4.7.4. | Unknown | N/A | Fancy Product Designer | |
CVE-2021-41340 | Windows Graphics Component Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41342 | Windows MSHTML Platform Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41343 | Windows Fast FAT File System Driver Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41344 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41345 | Storage Spaces Controller Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41346 | Console Window Host Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41347 | Windows AppX Deployment Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41348 | Microsoft Exchange Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41349 | Microsoft Exchange Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-4135 | A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthorized access to some data. | Unknown | N/A | n/a | |
CVE-2021-41350 | Microsoft Exchange Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41351 | Microsoft Edge (Chrome based) Spoofing on IE Mode | Unknown | N/A | Microsoft | |
CVE-2021-41352 | SCOM Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41353 | Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41354 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41355 | .NET Core and Visual Studio Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41356 | Windows Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41357 | Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-4136 | vim is vulnerable to Heap-based Buffer Overflow | Unknown | N/A | vim | |
CVE-2021-41360 | HEVC Video Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41361 | Active Directory Federation Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41363 | Intune Management Extension Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41365 | Microsoft Defender for IoT Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41366 | Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41367 | NTFS Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41368 | Microsoft Access Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41370 | NTFS Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41371 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41372 | A Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerability exists when Power BI Report Server Template file (pbix) containing HTML files is uploaded to the server and HTML files are accessed directly by the victim. Combining these 2 vulnerabilities together, an attacker is able to upload malicious Power BI templates files to the server using the victim's session and run scripts in the security context of the user and perform privilege escalation in case the victim has admin privileges when the victim access one of the HTML files present in the malicious Power BI template uploaded. The security update addresses the vulnerability by helping to ensure that Power BI Report Server properly sanitize file uploads. | Unknown | N/A | Microsoft | |
CVE-2021-41373 | FSLogix Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41374 | Azure Sphere Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41375 | Azure Sphere Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41376 | Azure Sphere Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41377 | Windows Fast FAT File System Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41378 | Windows NTFS Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-41379 | Windows Installer Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-4138 | Improved Host header checks to reject requests not sent to a well-known local hostname or IP, or the server-specified hostname. | Unknown | N/A | Mozilla | |
CVE-2021-41380 | RealVNC Viewer 6.21.406 allows remote VNC servers to cause a denial of service (application crash) via crafted RFB protocol data. NOTE: It is asserted that this issue requires social engineering a user into connecting to a fake VNC Server. The VNC Viewer application they are using will then hang, until terminated, but no memory leak occurs - the resources are freed once the hung process is terminated and the resource usage is constant during the hang. Only the process that is connected to the fake Server is affected. This is an application bug, not a security issue | Unknown | N/A | n/a | |
CVE-2021-41381 | Payara Micro Community 5.2021.6 and below allows Directory Traversal. | Unknown | N/A | n/a | |
CVE-2021-41382 | Plastic SCM before 10.0.16.5622 mishandles the WebAdmin server management interface. | Unknown | N/A | n/a | |
CVE-2021-41383 | setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the ntp_server field. | Unknown | N/A | n/a | |
CVE-2021-41385 | The third party intelligence connector in Securonix SNYPR 6.3.1 Build 184295_0302 allows an authenticated user to obtain access to server configuration details via SSRF. | Unknown | N/A | n/a | |
CVE-2021-41387 | seatd-launch in seatd 0.6.x before 0.6.2 allows privilege escalation because it uses execlp and may be installed setuid root. | Unknown | N/A | n/a | |
CVE-2021-41388 | Netskope client prior to 89.x on macOS is impacted by a local privilege escalation vulnerability. The XPC implementation of nsAuxiliarySvc process does not perform validation on new connections before accepting the connection. Thus any low privileged user can connect and call external methods defined in XPC service as root, elevating their privilege to the highest level. | Unknown | N/A | n/a | |
CVE-2021-4139 | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | Unknown | N/A | pimcore | |
CVE-2021-41390 | In Ericsson ECM before 18.0, it was observed that Security Provider Endpoint in the User Profile Management Section is vulnerable to CSV Injection. | Unknown | N/A | n/a | |
CVE-2021-41391 | In Ericsson ECM before 18.0, it was observed that Security Management Endpoint in User Profile Management Section is vulnerable to stored XSS via a name, leading to session hijacking and full account takeover. | Unknown | N/A | n/a | |
CVE-2021-41392 | static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API. | Unknown | N/A | n/a | |
CVE-2021-41393 | Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations. | Unknown | N/A | n/a | |
CVE-2021-41394 | Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations. | Unknown | N/A | n/a | |
CVE-2021-41395 | Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username. | Unknown | N/A | n/a | |
CVE-2021-41396 | Live555 through 1.08 does not handle socket connections properly. A huge number of incoming socket connections in a short time invokes the error-handling module, in which a heap-based buffer overflow happens. An attacker can leverage this to launch a DoS attack. | Unknown | N/A | n/a | |
CVE-2021-4140 | It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5. | Unknown | N/A | Mozilla | |
CVE-2021-41402 | flatCore-CMS v2.0.8 has a code execution vulnerability, which could let a remote malicious user execute arbitrary PHP code. | Unknown | N/A | n/a | |
CVE-2021-41403 | flatCore-CMS version 2.0.8 calls dangerous functions, causing server-side request forgery vulnerabilities. | Unknown | N/A | n/a | |
CVE-2021-41408 | VoIPmonitor WEB GUI up to version 24.61 is affected by SQL injection through the "api.php" file and "user" parameter. | Unknown | N/A | n/a | |
CVE-2021-41411 | drools <=7.59.x is affected by an XML External Entity (XXE) vulnerability in KieModuleMarshaller.java. The Validator class is not used correctly, resulting in the XXE injection vulnerability. | Unknown | N/A | n/a | |
CVE-2021-41413 | ok-file-formats master 2021-9-12 is affected by a buffer overflow in ok_jpg_convert_data_unit_grayscale and ok_jpg_convert_YCbCr_to_RGB. | Unknown | N/A | n/a | |
CVE-2021-41415 | Subscription-Manager v1.0 /main.js has a cross-site scripting (XSS) vulnerability in the machineDetail parameter. | Unknown | N/A | n/a | |
CVE-2021-41418 | AriaNg v0.1.0~v1.2.2 is affected by an incorrect access control vulnerability through not authenticating visitors' access rights. | Unknown | N/A | n/a | |
CVE-2021-41419 | QVIS NVR DVR before 2021-12-13 is vulnerable to Remote Code Execution via Java deserialization. | Unknown | N/A | n/a |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v