WAFPlanet

CVE Database - 2021

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

8151
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2021-44543

MEDIUM
6.10 CVSS 3.1

An XSS vulnerability was found in Privoxy which was fixed in cgi_error_no_template() by encode the template name when Privoxy is configured to servce the user-manual itself.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-44453

CRITICAL
9.80 CVSS 3.1

mySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.

OS Command Injection
WAF: High

CVE-2021-43984

CRITICAL
9.80 CVSS 3.1

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

OS Command Injection
WAF: High

CVE-2021-43981

CRITICAL
9.80 CVSS 3.1

mySCADA myPRO: Versions 8.20.0 and prior has a feature to send emails, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

OS Command Injection
WAF: High

CVE-2021-3584

HIGH
7.20 CVSS 3.1

A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0.

OS Command Injection
WAF: High

CVE-2021-23198

CRITICAL
9.80 CVSS 3.1

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

OS Command Injection
WAF: High

CVE-2021-22657

CRITICAL
9.80 CVSS 3.1

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

OS Command Injection
WAF: High

CVE-2021-20318

HIGH
7.20 CVSS 3.1

The HornetQ component of Artemis in EAP 7 was not updated with the fix for CVE-2016-4978. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage.

Insecure Deserialization
WAF: Medium

CVE-2018-4478

MEDIUM
6.80 CVSS 3.1

A validation issue was addressed with improved logic. This issue is fixed in macOS High Sierra 10.13.5, Security Update 2018-003 Sierra, Security Update 2018-003 El Capitan. An attacker with physical access to a device may be able to elevate privileges.

Improper Privilege Management
WAF: Low

CVE-2021-4118

HIGH
7.80 CVSS 3.1

pytorch-lightning is vulnerable to Deserialization of Untrusted Data

Insecure Deserialization
WAF: Medium

CVE-2021-43854

MEDIUM
5.00 CVSS 2.0

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. Versions prior to 3.6.5 are vulnerable to regular expression denial of service (ReDoS) attacks. The vulnerability is present in PunktSentenceTokenizer, sent_tokenize and word_tokenize. Any users of this class, or these two functions, are vulnerable to the ReDoS attack. In short, a specifically crafted long input to any of these vulnerable functions will cause them to take a significant amount of execution time. If your program relies on any of the vulnerable functions for tokenizing unpredictable user input, then we would strongly recommend upgrading to a version of NLTK without the vulnerability. For users unable to upgrade the execution time can be bounded by limiting the maximum length of an input to any of the vulnerable functions. Our recommendation is to implement such a limit.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2021-23175

HIGH
8.20 CVSS 3.1

NVIDIA GeForce Experience contains a vulnerability in user authorization, where GameStream does not correctly apply individual user access controls for users on the same device, which, with user intervention, may lead to escalation of privileges, information disclosure, data tampering, and denial of service, affecting other resources beyond the intended security authority of GameStream.

Incorrect Authorization
WAF: Low

CVE-2021-44600

HIGH
7.50 CVSS 3.1

The password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system.

SQL Injection
WAF: High

CVE-2021-44599

HIGH
7.50 CVSS 3.1

The id parameter from Online Enrollment Management System 1.0 system appears to be vulnerable to SQL injection attacks. A crafted payload injects a SQL sub-query that calls MySQL's load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve sensitive information for all users of this system.

SQL Injection
WAF: High

CVE-2021-44548

CRITICAL
9.80 CVSS 3.1

An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows.

Improper Input Validation Path Traversal
WAF: High

CVE-2021-4144

HIGH
8.80 CVSS 3.1

TP-Link wifi router TL-WR802N V4(JP), with firmware version prior to 211202, is vulnerable to OS command injection.

OS Command Injection
WAF: High

CVE-2021-4059

MEDIUM
6.50 CVSS 3.1

Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

Improper Input Validation
WAF: Medium

CVE-2021-38017

HIGH
8.80 CVSS 3.1

Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.

Incorrect Authorization
WAF: Low

CVE-2021-38016

HIGH
8.80 CVSS 3.1

Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page.

Incorrect Authorization
WAF: Low

CVE-2021-38015

HIGH
8.80 CVSS 3.1

Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.

Improper Input Validation
WAF: Medium

CVE-2020-20605

MEDIUM
6.10 CVSS 3.1

Blog CMS v1.0 contains a cross-site scripting (XSS) vulnerability in the /controller/CommentAdminController.java component.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-20601

CRITICAL
9.80 CVSS 3.1

An issue in ThinkCMF X2.2.2 and below allows attackers to execute arbitrary code via a crafted packet.

Code Injection
WAF: Medium

CVE-2020-20600

MEDIUM
5.40 CVSS 3.1

MetInfo 7.0 beta contains a stored cross-site scripting (XSS) vulnerability in the $name parameter of admin/?n=column&c=index&a=doAddColumn.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-20598

MEDIUM
6.10 CVSS 3.1

A cross-site scripting (XSS) vulnerability in the Editing component of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-20597

MEDIUM
6.10 CVSS 3.1

A cross-site scripting (XSS) vulnerability in the potrtalItemName parameter in \web\PortalController.java of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-20595

MEDIUM
6.50 CVSS 3.1

A cross-site request forgery (CSRF) in OPMS v1.3 and below allows attackers to arbitrarily add a user account via /user/add.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-20593

HIGH
8.00 CVSS 3.1

A cross-site request forgery (CSRF) in Rockoa v1.9.8 allows an authenticated attacker to arbitrarily add an administrator account.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-20426

MEDIUM
6.10 CVSS 3.1

S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in /function/booksave.php.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-20425

MEDIUM
6.10 CVSS 3.1

S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in the search function.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-43853

MEDIUM
5.40 CVSS 3.1

Ajax.NET Professional (AjaxPro) is an AJAX framework available for Microsoft ASP.NET. Affected versions of this package are vulnerable to JavaScript object injection which may result in cross site scripting when leveraged by a malicious user. The affected core relates to JavaScript object creation when parsing json input. Releases before version 21.12.22.1 are affected. A workaround exists that replaces one of the core JavaScript files embedded in the library. See the GHSA-5q7q-qqw2-hjq7 for workaround details.

Cross-Site Scripting (XSS) Insecure Deserialization
WAF: High

CVE-2021-44544

MEDIUM
6.10 CVSS 3.1

DIAEnergie Version 1.7.5 and prior is vulnerable to multiple cross-site scripting vulnerabilities when arbitrary code is injected into the parameter “name” of the script “HandlerEnergyType.ashx”.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-44471

MEDIUM
6.10 CVSS 3.1

DIAEnergie Version 1.7.5 and prior is vulnerable to stored cross-site scripting when an unauthenticated user injects arbitrary code into the parameter “name” of the script “DIAE_HandlerAlarmGroup.ashx”.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-36886

HIGH
8.80 CVSS 3.1

Cross-Site Request Forgery (CSRF) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions <= 1.2.5.9).

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2021-36885

MEDIUM
6.10 CVSS 3.1

Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions <= 1.2.6.1).

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-31558

MEDIUM
6.10 CVSS 3.1

DIAEnergie Version 1.7.5 and prior is vulnerable to stored cross-site scripting when an unauthenticated user injects arbitrary code into the parameter “descr” of the script “DIAE_hierarchyHandler.ashx”.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-23228

MEDIUM
6.10 CVSS 3.1

DIAEnergie Version 1.7.5 and prior is vulnerable to a reflected cross-site scripting attack through error pages that are returned by “.NET Request.QueryString”.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-21952

CRITICAL
9.80 CVSS 3.1

An authentication bypass vulnerability exists in the CMD_DEVICE_GET_RSA_KEY_REQUEST functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to increased privileges.

Improper Authentication
WAF: Low

CVE-2021-21937

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘host_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21936

HIGH
8.80 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘health_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21935

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘host_alt_filter2’ parameter. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21934

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘imei_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21933

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘esn_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21932

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘name_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21931

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at‘ stat_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21930

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘sn_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21929

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘prod_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21928

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘mac_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.

SQL Injection
WAF: High

CVE-2021-21927

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘loc_filter’ parameter.

SQL Injection
WAF: High

CVE-2021-21926

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘health_filter’ parameter.

SQL Injection
WAF: High

CVE-2021-21925

MEDIUM
6.50 CVSS 3.1

A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘firm_filter’ parameter.

SQL Injection
WAF: High
Page 5 of 164 (8151 CVEs)