Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2021-43140 | SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login. | Unknown | N/A | n/a | |
CVE-2021-43141 | Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Simple Subscription Website 1.0 via the id parameter in plan_application. | Unknown | N/A | n/a | |
CVE-2021-43142 | An XML External Entity (XXE) vulnerability exists in wuta jox 1.16 in the readObject method in JOXSAXBeanInput. | Unknown | N/A | n/a | |
CVE-2021-43145 | With certain LDAP configurations, Zammad 5.0.1 was found to be vulnerable to unauthorized access with existing user accounts. | Unknown | N/A | n/a | |
CVE-2021-4315 | A vulnerability has been found in NYUCCL psiTurk up to 3.2.0 and classified as critical. This vulnerability affects unknown code of the file psiturk/experiment.py. The manipulation of the argument mode leads to improper neutralization of special elements used in a template engine. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.1 is able to address this issue. The name of the patch is 47787e15cecd66f2aa87687bf852ae0194a4335f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-219676. | Unknown | N/A | NYUCCL | |
CVE-2021-43154 | Cross Site Scripting (XSS) vulnerability exists in CMS Made Simple 2.2.15 via the Name field in an Add Category action in moduleinterface.php. | Unknown | N/A | n/a | |
CVE-2021-43155 | Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the "bookisbn" parameter in cart.php. | Unknown | N/A | n/a | |
CVE-2021-43156 | In ProjectWorlds Online Book Store PHP 1.0 a CSRF vulnerability in admin_delete.php allows a remote attacker to delete any book. | Unknown | N/A | n/a | |
CVE-2021-43157 | Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php. | Unknown | N/A | n/a | |
CVE-2021-43158 | In ProjectWorlds Online Shopping System PHP 1.0, a CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart. | Unknown | N/A | n/a | |
CVE-2021-43159 | A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the setSessionTime function in /cgi-bin/luci/api/common.. | Unknown | N/A | n/a | |
CVE-2021-4316 | Inappropriate implementation in Cast UI in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to spoof browser UI via a crafted HTML page. (Chromium security severity: Low) | Unknown | N/A | ||
CVE-2021-43160 | A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the switchFastDhcp function in /cgi-bin/luci/api/diagnose. | Unknown | N/A | n/a | |
CVE-2021-43161 | A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the doSwitchApi function in /cgi-bin/luci/api/switch. | Unknown | N/A | n/a | |
CVE-2021-43162 | A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the runPackDiagnose function in /cgi-bin/luci/api/diagnose. | Unknown | N/A | n/a | |
CVE-2021-43163 | A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the checkNet function in /cgi-bin/luci/api/auth. | Unknown | N/A | n/a | |
CVE-2021-43164 | A Remote Code Execution (RCE) vulnerability exists in Ruijie Networks Ruijie RG-EW Series Routers up to ReyeeOS 1.55.1915 / EW_3.0(1)B11P55 via the updateVersion function in /cgi-bin/luci/api/wireless. | Unknown | N/A | n/a | |
CVE-2021-4317 | Use after free in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) | Unknown | N/A | ||
CVE-2021-43171 | Improper verification of applications' cryptographic signatures in the /e/OS app store client App Lounge before 0.19q allows attackers in control of the application server to install malicious applications on user's systems by altering the server's API response. | Unknown | N/A | n/a | |
CVE-2021-43172 | NLnet Labs Routinator prior to 0.10.2 happily processes a chain of RRDP repositories of infinite length causing it to never finish a validation run. In RPKI, a CA can choose the RRDP repository it wishes to publish its data in. By continuously generating a new child CA that only consists of another CA using a different RRDP repository, a malicious CA can create a chain of CAs of de-facto infinite length. Routinator prior to version 0.10.2 did not contain a limit on the length of such a chain and will therefore continue to process this chain forever. As a result, the validation run will never finish, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all. | Unknown | N/A | NLnet Labs | |
CVE-2021-43173 | In NLnet Labs Routinator prior to 0.10.2, a validation run can be delayed significantly by an RRDP repository by not answering but slowly drip-feeding bytes to keep the connection alive. This can be used to effectively stall validation. While Routinator has a configurable time-out value for RRDP connections, this time-out was only applied to individual read or write operations rather than the complete request. Thus, if an RRDP repository sends a little bit of data before that time-out expired, it can continuously extend the time it takes for the request to finish. Since validation will only continue once the update of an RRDP repository has concluded, this delay will cause validation to stall, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all. | Unknown | N/A | NLnet Labs | |
CVE-2021-43174 | NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element. | Unknown | N/A | NLnet Labs | |
CVE-2021-43175 | The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 exposes an API router that accepts a username, password, and action that routes to other PHP files that implement the various API functions. Vulnerable versions of GOautodial validate the username and password incorrectly, allowing the caller to specify any values for these parameters and successfully authenticate. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C | Unknown | N/A | GOautodial | |
CVE-2021-43176 | The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 takes a user-supplied “action” parameter and appends a .php file extension to locate and load the correct PHP file to implement the API call. Vulnerable versions of GOautodial do not sanitize the user input that specifies the action. This permits an attacker to execute any PHP source file with a .php extension that is present on the disk and readable by the GOautodial web server process. Combined with CVE-2021-43175, it is possible for the attacker to do this without valid credentials. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C | Unknown | N/A | GOautodial | |
CVE-2021-43177 | As a result of an incomplete fix for CVE-2015-7225, in versions of devise-two-factor prior to 4.0.2 it is possible to reuse a One-Time-Password (OTP) for one (and only one) immediately trailing interval. CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N) | Unknown | N/A | Tinfoil | |
CVE-2021-4318 | Object corruption in Blink in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High) | Unknown | N/A | ||
CVE-2021-43180 | In JetBrains Hub before 2021.1.13690, information disclosure via avatar metadata is possible. | Unknown | N/A | n/a | |
CVE-2021-43181 | In JetBrains Hub before 2021.1.13690, stored XSS is possible. | Unknown | N/A | n/a | |
CVE-2021-43182 | In JetBrains Hub before 2021.1.13415, a DoS via user information is possible. | Unknown | N/A | n/a | |
CVE-2021-43183 | In JetBrains Hub before 2021.1.13690, the authentication throttling mechanism could be bypassed. | Unknown | N/A | n/a | |
CVE-2021-43184 | In JetBrains YouTrack before 2021.3.21051, stored XSS is possible. | Unknown | N/A | n/a | |
CVE-2021-43185 | JetBrains YouTrack before 2021.3.23639 is vulnerable to Host header injection. | Unknown | N/A | n/a | |
CVE-2021-43186 | JetBrains YouTrack before 2021.3.24402 is vulnerable to stored XSS. | Unknown | N/A | n/a | |
CVE-2021-43187 | In JetBrains YouTrack Mobile before 2021.2, the client-side cache on iOS could contain sensitive information. | Unknown | N/A | n/a | |
CVE-2021-43188 | In JetBrains YouTrack Mobile before 2021.2, access token protection on iOS is incomplete. | Unknown | N/A | n/a | |
CVE-2021-43189 | In JetBrains YouTrack Mobile before 2021.2, access token protection on Android is incomplete. | Unknown | N/A | n/a | |
CVE-2021-4319 | Use after free in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) | Unknown | N/A | ||
CVE-2021-43190 | In JetBrains YouTrack Mobile before 2021.2, task hijacking on Android is possible. | Unknown | N/A | n/a | |
CVE-2021-43191 | JetBrains YouTrack Mobile before 2021.2, is missing the security screen on Android and iOS. | Unknown | N/A | n/a | |
CVE-2021-43192 | In JetBrains YouTrack Mobile before 2021.2, iOS URL scheme hijacking is possible. | Unknown | N/A | n/a | |
CVE-2021-43193 | In JetBrains TeamCity before 2021.1.2, remote code execution via the agent push functionality is possible. | Unknown | N/A | n/a | |
CVE-2021-43194 | In JetBrains TeamCity before 2021.1.2, user enumeration was possible. | Unknown | N/A | n/a | |
CVE-2021-43195 | In JetBrains TeamCity before 2021.1.2, some HTTP security headers were missing. | Unknown | N/A | n/a | |
CVE-2021-43196 | In JetBrains TeamCity before 2021.1, information disclosure via the Docker Registry connection dialog is possible. | Unknown | N/A | n/a | |
CVE-2021-43197 | In JetBrains TeamCity before 2021.1.2, email notifications could include unescaped HTML for XSS. | Unknown | N/A | n/a | |
CVE-2021-43198 | In JetBrains TeamCity before 2021.1.2, stored XSS is possible. | Unknown | N/A | n/a | |
CVE-2021-43199 | In JetBrains TeamCity before 2021.1.2, permission checks in the Create Patch functionality are insufficient. | Unknown | N/A | n/a | |
CVE-2021-4320 | Use after free in Blink in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) | Unknown | N/A | ||
CVE-2021-43200 | In JetBrains TeamCity before 2021.1.2, permission checks in the Agent Push functionality were insufficient. | Unknown | N/A | n/a | |
CVE-2021-43201 | In JetBrains TeamCity before 2021.1.3, a newly created project could take settings from an already deleted project. | Unknown | N/A | n/a | |
CVE-2021-43202 | In JetBrains TeamCity before 2021.1.3, the X-Frame-Options header is missing in some cases. | Unknown | N/A | n/a | |
CVE-2021-43203 | In JetBrains Ktor before 1.6.4, nonce verification during the OAuth2 authentication process is implemented improperly. | Unknown | N/A | n/a | |
CVE-2021-43204 | A improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete denial of service of its components via changes of directory access permissions. | Unknown | N/A | Fortinet | |
CVE-2021-43205 | An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in FortiClient for Linux version 7.0.2 and below, 6.4.7 and below and 6.2.9 and below may allow an unauthenticated attacker to access the confighandler webserver via external binaries. | Unknown | N/A | Fortinet | |
CVE-2021-43206 | A server-generated error message containing sensitive information in Fortinet FortiOS 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.x, 6.0.x and FortiProxy 7.0.0 through 7.0.1, 2.0.x allows malicious webservers to retrieve a web proxy's client username and IP via same origin HTTP requests triggering proxy-generated HTTP status codes pages. | Unknown | N/A | Fortinet | |
CVE-2021-43207 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43208 | 3D Viewer Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43209 | 3D Viewer Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-4321 | Policy bypass in Blink in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low) | Unknown | N/A | ||
CVE-2021-43211 | Windows 10 Update Assistant Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43214 | Web Media Extensions Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43215 | iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution | Unknown | N/A | Microsoft | |
CVE-2021-43216 | Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43217 | Windows Encrypting File System (EFS) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43219 | DirectX Graphics Kernel File Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-4322 | Use after free in DevTools in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium) | Unknown | N/A | ||
CVE-2021-43220 | Microsoft Edge for iOS Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43221 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43222 | Microsoft Message Queuing Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43223 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43224 | Windows Common Log File System Driver Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43225 | Bot Framework SDK Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43226 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43227 | Storage Spaces Controller Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43228 | SymCrypt Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43229 | Windows NTFS Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-4323 | Insufficient validation of untrusted input in Extensions in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to access local files via a crafted Chrome Extension. (Chromium security severity: Medium) | Unknown | N/A | ||
CVE-2021-43230 | Windows NTFS Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43231 | Windows NTFS Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43232 | Windows Event Tracing Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43233 | Remote Desktop Client Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43234 | Windows Fax Service Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43235 | Storage Spaces Controller Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43236 | Microsoft Message Queuing Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43237 | Windows Setup Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43238 | Windows Remote Access Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43239 | Windows Recovery Environment Agent Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-4324 | Insufficient policy enforcement in Google Update in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to read arbitrary files via a malicious file. (Chromium security severity: Medium) | Unknown | N/A | ||
CVE-2021-43240 | NTFS Set Short Name Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43242 | Microsoft SharePoint Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43243 | VP9 Video Extensions Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43244 | Windows Kernel Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43245 | Windows Digital TV Tuner Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43246 | Windows Hyper-V Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43247 | Windows TCP/IP Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43248 | Windows Digital Media Receiver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-4325 | A vulnerability, which was classified as problematic, has been found in NHN TOAST UI Chart 4.1.4. This issue affects some unknown processing of the component Legend Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 4.2.0 is able to address this issue. The identifier of the patch is 1a3f455d17df379e11b501bb5ba1dd1bcc41d63e. It is recommended to upgrade the affected component. The identifier VDB-221501 was assigned to this vulnerability. | Unknown | N/A | NHN | |
CVE-2021-43255 | Microsoft Office Trust Center Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43256 | Microsoft Excel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-43257 | Lack of Neutralization of Formula Elements in the CSV API of MantisBT before 2.25.3 allows an unprivileged attacker to execute code or gain access to information when a user opens the csv_export.php generated CSV file in Excel. | Unknown | N/A | n/a |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v