instruction
stringlengths 55
56
| inputs
stringclasses 1
value | outputs
stringlengths 86
4.06k
|
---|---|---|
Please provide detailed information about CVE-2020-13909 | CVE:CVE-2020-13909
Description:The Ignition component before 2.0.5 for Laravel mishandles globals, _get, _post, _cookie, and _env. NOTE: in the 1.x series, versions 1.16.15 and later are unaffected as a consequence of the CVE-2021-43996 fix.
published:2020-06-07T20:15:10.140 |
|
Please provide detailed information about CVE-2021-3002 | CVE:CVE-2021-3002
Description:Seo Panel 4.8.0 allows reflected XSS via the seo/seopanel/login.php?sec=forgot email parameter.
published:2021-01-01T19:15:11.077 |
|
Please provide detailed information about CVE-2021-3004 | CVE:CVE-2021-3004
Description:The _deposit function in the smart contract implementation for Stable Yield Credit (yCREDIT), an Ethereum token, has certain incorrect calculations. An attacker can obtain more yCREDIT tokens than they should.
published:2021-01-03T04:15:12.263 |
|
Please provide detailed information about CVE-2021-3005 | CVE:CVE-2021-3005
Description:MK-AUTH through 19.01 K4.9 allows remote attackers to obtain sensitive information (e.g., a CPF number) via a modified titulo (aka invoice number) value to the central/recibo.php URI.
published:2021-01-03T04:15:12.310 |
|
Please provide detailed information about CVE-2021-3006 | CVE:CVE-2021-3006
Description:The breed function in the smart contract implementation for Farm in Seal Finance (Seal), an Ethereum token, lacks access control and thus allows price manipulation, as exploited in the wild in December 2020 and January 2021.
published:2021-01-03T06:15:12.067 |
|
Please provide detailed information about CVE-2021-21494 | CVE:CVE-2021-21494
Description:MK-AUTH through 19.01 K4.9 allows XSS via the admin/logs_ajax.php tipo parameter. An attacker can leverage this to read the centralmka2 (session token) cookie, which is not set to HTTPOnly.
published:2021-01-04T03:15:13.387 |
|
Please provide detailed information about CVE-2021-21495 | CVE:CVE-2021-21495
Description:MK-AUTH through 19.01 K4.9 allows CSRF for password changes via the central/executar_central.php?acao=altsenha_princ URI.
published:2021-01-04T03:15:13.480 |
|
Please provide detailed information about CVE-2021-3007 | CVE:CVE-2021-3007
Description:Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
published:2021-01-04T03:15:13.527 |
|
Please provide detailed information about CVE-2021-3014 | CVE:CVE-2021-3014
Description:In MikroTik RouterOS through 2021-01-04, the hotspot login page is vulnerable to reflected XSS via the target parameter.
published:2021-01-04T19:15:15.390 |
|
Please provide detailed information about CVE-2021-3018 | CVE:CVE-2021-3018
Description:ipeak Infosystems ibexwebCMS (aka IPeakCMS) 3.5 is vulnerable to an unauthenticated Boolean-based SQL injection via the id parameter on the /cms/print.php page.
published:2021-01-05T05:15:10.813 |
|
Please provide detailed information about CVE-2021-3019 | CVE:CVE-2021-3019
Description:ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet.
published:2021-01-05T05:15:10.907 |
|
Please provide detailed information about CVE-2021-3021 | CVE:CVE-2021-3021
Description:ISPConfig before 3.2.2 allows SQL injection.
published:2021-01-05T16:15:15.937 |
|
Please provide detailed information about CVE-2021-21234 | CVE:CVE-2021-21234
Description:spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. It is maven package "eu.hinsch:spring-boot-actuator-logview". In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory). The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release. There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy.
published:2021-01-05T18:15:16.443 |
|
Please provide detailed information about CVE-2021-22492 | CVE:CVE-2021-22492
Description:An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) (Broadcom Bluetooth chipsets) software. The Bluetooth UART driver has a buffer overflow. The Samsung ID is SVE-2020-18731 (January 2021).
published:2021-01-05T18:15:18.740 |
|
Please provide detailed information about CVE-2021-22493 | CVE:CVE-2021-22493
Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-25346. Reason: This candidate is a duplicate of CVE-2021-25346. Notes: All CVE users should reference CVE-2021-25346 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
published:2021-01-05T18:15:18.803 |
|
Please provide detailed information about CVE-2021-22494 | CVE:CVE-2021-22494
Description:An issue was discovered in the fingerprint scanner on Samsung Note20 mobile devices with Q(10.0) software. When a screen protector is used, the required image compensation is not present. Consequently, inversion can occur during fingerprint enrollment, and a high False Recognition Rate (FRR) can occur. The Samsung ID is SVE-2020-19216 (January 2021).
published:2021-01-05T18:15:18.850 |
|
Please provide detailed information about CVE-2021-22495 | CVE:CVE-2021-22495
Description:An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), Q(10.0), and R(11.0) (Exynos chipsets) software. The Mali GPU driver allows out-of-bounds access and a device reset. The Samsung ID is SVE-2020-19174 (January 2021).
published:2021-01-05T18:15:18.897 |
|
Please provide detailed information about CVE-2021-3022 | CVE:CVE-2021-3022
Description:An issue was discovered on LG mobile devices with Android OS 10 software. There was no write protection for the MTK protect2 partition. The LG ID is LVE-SMP-200028 (January 2021).
published:2021-01-05T18:15:19.020 |
|
Please provide detailed information about CVE-2021-3026 | CVE:CVE-2021-3026
Description:Invision Community IPS Community Suite before 4.5.4.2 allows XSS during the quoting of a post or comment.
published:2021-01-05T23:15:15.703 |
|
Please provide detailed information about CVE-2021-21235 | CVE:CVE-2021-21235
Description:kamadak-exif is an exif parsing library written in pure Rust. In kamadak-exif version 0.5.2, there is an infinite loop in parsing crafted PNG files. Specifically, reader::read_from_container can cause an infinite loop when a crafted PNG file is given. This is fixed in version 0.5.3. No workaround is available. Applications that do not pass files with the PNG signature to Reader::read_from_container are not affected.
published:2021-01-06T02:15:12.967 |
|
Please provide detailed information about CVE-2021-21236 | CVE:CVE-2021-21236
Description:CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability. When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. This is fixed in version 2.5.1. See Referenced GitHub advisory for more information.
published:2021-01-06T17:15:23.733 |
|
Please provide detailed information about CVE-2021-3029 | CVE:CVE-2021-3029
Description:EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has an OS Command Injection vulnerability via shell metacharacters and an IFS manipulation. The parameter "file" on the webpage /showfile.php can be exploited to gain root access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
published:2021-01-07T14:15:12.720 |
|
Please provide detailed information about CVE-2021-3011 | CVE:CVE-2021-3011
Description:An electromagnetic-wave side-channel issue was discovered on NXP SmartMX / P5x security microcontrollers and A7x secure authentication microcontrollers, with CryptoLib through v2.9. It allows attackers to extract the ECDSA private key after extensive physical access (and consequently produce a clone). This was demonstrated on the Google Titan Security Key, based on an NXP A7005a chip. Other FIDO U2F security keys are also impacted (Yubico YubiKey Neo and Feitian K9, K13, K21, and K40) as well as several NXP JavaCard smartcards (J3A081, J2A081, J3A041, J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60, J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61, J3D081_M59_DF, J3D081_M61_DF, J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64, J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, J2E082_M65, J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF, and J3E016_M64_DF).
published:2021-01-07T16:15:12.120 |
|
Please provide detailed information about CVE-2021-23241 | CVE:CVE-2021-23241
Description:MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ in conjunction with a loginLess or login.htm URI (for authentication bypass) to the web server, as demonstrated by the /loginLess/../../etc/passwd URI.
published:2021-01-07T21:15:14.040 |
|
Please provide detailed information about CVE-2021-23242 | CVE:CVE-2021-23242
Description:MERCUSYS Mercury X18G 1.0.5 devices allow Directory Traversal via ../ to the UPnP server, as demonstrated by the /../../conf/template/uhttpd.json URI.
published:2021-01-07T21:15:14.370 |
|
Please provide detailed information about CVE-2021-1051 | CVE:CVE-2021-1051
Description:NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which a local user can get elevated privileges to modify display configuration data, which may result in denial of service of the display.
published:2021-01-08T01:15:14.307 |
|
Please provide detailed information about CVE-2021-1052 | CVE:CVE-2021-1052
Description:NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape or IOCTL in which user-mode clients can access legacy privileged APIs, which may lead to denial of service, escalation of privileges, and information disclosure.
published:2021-01-08T01:15:14.400 |
|
Please provide detailed information about CVE-2021-1053 | CVE:CVE-2021-1053
Description:NVIDIA GPU Display Driver for Windows and Linux, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape or IOCTL in which improper validation of a user pointer may lead to denial of service.
published:2021-01-08T01:15:14.463 |
|
Please provide detailed information about CVE-2021-1054 | CVE:CVE-2021-1054
Description:NVIDIA GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which the software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action, which may lead to denial of service.
published:2021-01-08T01:15:14.510 |
|
Please provide detailed information about CVE-2021-1055 | CVE:CVE-2021-1055
Description:NVIDIA GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which improper access control may lead to denial of service and information disclosure.
published:2021-01-08T01:15:14.573 |
|
Please provide detailed information about CVE-2021-1056 | CVE:CVE-2021-1056
Description:NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure.
published:2021-01-08T01:15:14.620 |
|
Please provide detailed information about CVE-2021-3025 | CVE:CVE-2021-3025
Description:Invision Community IPS Community Suite before 4.5.4.2 allows SQL Injection via the Downloads REST API (the sortDir parameter in a sortBy=popular action to the GETindex() method in applications/downloads/api/files.php).
published:2021-01-08T07:15:11.920 |
|
Please provide detailed information about CVE-2021-1057 | CVE:CVE-2021-1057
Description:NVIDIA Virtual GPU Manager NVIDIA vGPU manager contains a vulnerability in the vGPU plugin in which it allows guests to allocate some resources for which the guest is not authorized, which may lead to integrity and confidentiality loss, denial of service, or information disclosure. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.000 |
|
Please provide detailed information about CVE-2021-1058 | CVE:CVE-2021-1058
Description:NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input data size is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.063 |
|
Please provide detailed information about CVE-2021-1059 | CVE:CVE-2021-1059
Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which an input index is not validated, which may lead to integer overflow, which in turn may cause tampering of data, information disclosure, or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.157 |
|
Please provide detailed information about CVE-2021-1060 | CVE:CVE-2021-1060
Description:NVIDIA vGPU software contains a vulnerability in the guest kernel mode driver and vGPU plugin, in which an input index is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.203 |
|
Please provide detailed information about CVE-2021-1061 | CVE:CVE-2021-1061
Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which a race condition may cause the vGPU plugin to continue using a previously validated resource that has since changed, which may lead to denial of service or information disclosure. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.280 |
|
Please provide detailed information about CVE-2021-1062 | CVE:CVE-2021-1062
Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which an input data length is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.343 |
|
Please provide detailed information about CVE-2021-1063 | CVE:CVE-2021-1063
Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which an input offset is not validated, which may lead to a buffer overread, which in turn may cause tampering of data, information disclosure, or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.407 |
|
Please provide detailed information about CVE-2021-1064 | CVE:CVE-2021-1064
Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which it obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer, which may lead to information disclosure or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.453 |
|
Please provide detailed information about CVE-2021-1065 | CVE:CVE-2021-1065
Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which input data is not validated, which may lead to tampering of data or denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.563 |
|
Please provide detailed information about CVE-2021-1066 | CVE:CVE-2021-1066
Description:NVIDIA vGPU manager contains a vulnerability in the vGPU plugin, in which input data is not validated, which may lead to unexpected consumption of resources, which in turn may lead to denial of service. This affects vGPU version 8.x (prior to 8.6) and version 11.0 (prior to 11.3).
published:2021-01-08T15:15:12.750 |
|
Please provide detailed information about CVE-2021-3111 | CVE:CVE-2021-3111
Description:The Express Entries Dashboard in Concrete5 8.5.4 allows stored XSS via the name field of a new data object at an index.php/dashboard/express/entries/view/ URI.
published:2021-01-08T15:15:12.953 |
|
Please provide detailed information about CVE-2021-21106 | CVE:CVE-2021-21106
Description:Use after free in autofill in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
published:2021-01-08T19:15:14.880 |
|
Please provide detailed information about CVE-2021-21107 | CVE:CVE-2021-21107
Description:Use after free in drag and drop in Google Chrome on Linux prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
published:2021-01-08T19:15:14.927 |
|
Please provide detailed information about CVE-2021-21108 | CVE:CVE-2021-21108
Description:Use after free in media in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
published:2021-01-08T19:15:14.990 |
|
Please provide detailed information about CVE-2021-21109 | CVE:CVE-2021-21109
Description:Use after free in payments in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
published:2021-01-08T19:15:15.037 |
|
Please provide detailed information about CVE-2021-21110 | CVE:CVE-2021-21110
Description:Use after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
published:2021-01-08T19:15:15.100 |
|
Please provide detailed information about CVE-2021-21111 | CVE:CVE-2021-21111
Description:Insufficient policy enforcement in WebUI in Google Chrome prior to 87.0.4280.141 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
published:2021-01-08T19:15:15.163 |
|
Please provide detailed information about CVE-2021-21112 | CVE:CVE-2021-21112
Description:Use after free in Blink in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
published:2021-01-08T19:15:15.210 |
|
Please provide detailed information about CVE-2021-21113 | CVE:CVE-2021-21113
Description:Heap buffer overflow in Skia in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
published:2021-01-08T19:15:15.273 |
|
Please provide detailed information about CVE-2021-21114 | CVE:CVE-2021-21114
Description:Use after free in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
published:2021-01-08T19:15:15.333 |
|
Please provide detailed information about CVE-2021-21115 | CVE:CVE-2021-21115
Description:User after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
published:2021-01-08T19:15:15.397 |
|
Please provide detailed information about CVE-2021-21116 | CVE:CVE-2021-21116
Description:Heap buffer overflow in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
published:2021-01-08T19:15:15.443 |
|
Please provide detailed information about CVE-2021-3116 | CVE:CVE-2021-3116
Description:before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or).
published:2021-01-11T05:15:10.987 |
|
Please provide detailed information about CVE-2021-3118 | CVE:CVE-2021-3118
Description:EVOLUCARE ECSIMAGING (aka ECS Imaging) through 6.21.5 has multiple SQL Injection issues in the login form and the password-forgotten form (such as /req_password_user.php?email=). This allows an attacker to steal data in the database and obtain access to the application. (The database component runs as root.) NOTE: This vulnerability only affects products that are no longer supported by the maintainer
published:2021-01-11T06:15:13.320 |
|
Please provide detailed information about CVE-2021-3121 | CVE:CVE-2021-3121
Description:An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.
published:2021-01-11T06:15:13.460 |
|
Please provide detailed information about CVE-2021-23253 | CVE:CVE-2021-23253
Description:Opera Mini for Android below 53.1 displays URL left-aligned in the address field. This allows a malicious attacker to craft a URL with a long domain name, e.g. www.safe.opera.com.attacker.com. With the URL being left-aligned, the user will only see the front part (e.g. www.safe.opera.comβ¦) The exact amount depends on the phone screen size but the attacker can craft a number of different domains and target different phones. Starting with version 53.1 Opera Mini displays long URLs with the top-level domain label aligned to the right of the address field which mitigates the issue.
published:2021-01-11T16:15:15.663 |
|
Please provide detailed information about CVE-2021-0342 | CVE:CVE-2021-0342
Description:In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.
published:2021-01-11T21:15:13.313 |
|
Please provide detailed information about CVE-2021-21241 | CVE:CVE-2021-21241
Description:The Python "Flask-Security-Too" package is used for adding security features to your Flask application. It is an is a independently maintained version of Flask-Security based on the 3.0.0 version of Flask-Security. In Flask-Security-Too from version 3.3.0 and before version 3.4.5, the /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token. Version 3.4.5 and version 4.0.0 are patched. As a workaround, if you aren't using authentication tokens - you can set the SECURITY_TOKEN_MAX_AGE to "0" (seconds) which should make the token unusable.
published:2021-01-11T21:15:13.377 |
|
Please provide detailed information about CVE-2021-0301 | CVE:CVE-2021-0301
Description:In ged, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android SoC; Android ID: A-172514667.
published:2021-01-11T22:15:12.893 |
|
Please provide detailed information about CVE-2021-0303 | CVE:CVE-2021-0303
Description:In dispatchGraphTerminationMessage() of packages/services/Car/computepipe/runner/graph/StreamSetObserver.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-170407229.
published:2021-01-11T22:15:12.987 |
|
Please provide detailed information about CVE-2021-0304 | CVE:CVE-2021-0304
Description:In several functions of GlobalScreenshot.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure of the user's contacts with User execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-8.0, Android-8.1, Android-9; Android ID: A-162738636.
published:2021-01-11T22:15:13.033 |
|
Please provide detailed information about CVE-2021-0306 | CVE:CVE-2021-0306
Description:In addAllPermissions of PermissionManagerService.java, there is a possible permissions bypass when upgrading major Android versions which allows an app to gain the android.permission.ACTIVITY_RECOGNITION permission without user confirmation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11, Android-8.0, Android-8.1, Android-9, Android-10; Android ID: A-154505240.
published:2021-01-11T22:15:13.080 |
|
Please provide detailed information about CVE-2021-0307 | CVE:CVE-2021-0307
Description:In updatePermissionSourcePackage of PermissionManagerService.java, there is a possible automatic runtime permission grant due to a confused deputy. This could lead to local escalation of privilege allowing a malicious app to silently gain access to a dangerous permission with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Android ID: A-155648771.
published:2021-01-11T22:15:13.127 |
|
Please provide detailed information about CVE-2021-0308 | CVE:CVE-2021-0308
Description:In ReadLogicalParts of basicmbr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-158063095.
published:2021-01-11T22:15:13.173 |
|
Please provide detailed information about CVE-2021-0309 | CVE:CVE-2021-0309
Description:In onCreate of grantCredentialsPermissionActivity, there is a confused deputy. This could lead to local information disclosure and account access with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-158480899.
published:2021-01-11T22:15:13.220 |
|
Please provide detailed information about CVE-2021-0310 | CVE:CVE-2021-0310
Description:In LazyServiceRegistrar of LazyServiceRegistrar.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-170212632.
published:2021-01-11T22:15:13.267 |
|
Please provide detailed information about CVE-2021-0311 | CVE:CVE-2021-0311
Description:In ElementaryStreamQueue::dequeueAccessUnitH264() of ESQueue.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-9, Android-10, Android-11, Android-8.0, Android-8.1; Android ID: A-170240631.
published:2021-01-11T22:15:13.313 |
|
Please provide detailed information about CVE-2021-0312 | CVE:CVE-2021-0312
Description:In WAVSource::read of WAVExtractor.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-170583712.
published:2021-01-11T22:15:13.360 |
|
Please provide detailed information about CVE-2021-0313 | CVE:CVE-2021-0313
Description:In isWordBreakAfter of LayoutUtils.cpp, there is a possible way to slow or crash a TextView due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-10, Android-11, Android-8.0, Android-8.1; Android ID: A-170968514.
published:2021-01-11T22:15:13.407 |
|
Please provide detailed information about CVE-2021-0315 | CVE:CVE-2021-0315
Description:In onCreate of GrantCredentialsPermissionActivity.java, there is a possible way to convince the user to grant an app access to an account due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.1, Android-9, Android-10, Android-11, Android-8.0; Android ID: A-169763814.
published:2021-01-11T22:15:13.457 |
|
Please provide detailed information about CVE-2021-0316 | CVE:CVE-2021-0316
Description:In avrc_pars_vendor_cmd of avrc_pars_tg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11, Android-8.0, Android-8.1, Android-9, Android-10; Android ID: A-168802990.
published:2021-01-11T22:15:13.503 |
|
Please provide detailed information about CVE-2021-0317 | CVE:CVE-2021-0317
Description:In createOrUpdate of Permission.java and related code, there is possible permission escalation due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-10, Android-11, Android-8.0, Android-8.1, Android-9; Android ID: A-168319670.
published:2021-01-11T22:15:13.550 |
|
Please provide detailed information about CVE-2021-0318 | CVE:CVE-2021-0318
Description:In appendEventsToCacheLocked of SensorEventConnection.cpp, there is a possible out of bounds write due to a use-after-free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-8.1, Android-10, Android-11; Android ID: A-168211968.
published:2021-01-11T22:15:13.597 |
|
Please provide detailed information about CVE-2021-0319 | CVE:CVE-2021-0319
Description:In checkCallerIsSystemOr of CompanionDeviceManagerService.java, there is a possible way to get a nearby Bluetooth device's MAC address without appropriate permissions due to a permissions bypass. This could lead to local escalation of privilege that grants access to nearby MAC addresses, with User execution privileges needed. User interaction is needed for exploitation. Product: Android; Versions: Android-8.0, Android-8.1, Android-9, Android-10, Android-11; Android ID: A-167244818.
published:2021-01-11T22:15:13.643 |
|
Please provide detailed information about CVE-2021-0320 | CVE:CVE-2021-0320
Description:In is_device_locked and set_device_locked of keystore_keymaster_enforcement.h, there is a possible bypass of lockscreen requirements for keyguard bound keys due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-10, Android-11; Android ID: A-169933423.
published:2021-01-11T22:15:13.690 |
|
Please provide detailed information about CVE-2021-0321 | CVE:CVE-2021-0321
Description:In enforceDumpPermissionForPackage of ActivityManagerService.java, there is a possible way to determine if a package is installed due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-166667403.
published:2021-01-11T22:15:13.737 |
|
Please provide detailed information about CVE-2021-0322 | CVE:CVE-2021-0322
Description:In onCreate of SlicePermissionActivity.java, there is a possible misleading string displayed due to improper input validation. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: Android; Versions: Android-10, Android-11, Android-9; Android ID: A-159145361.
published:2021-01-11T22:15:13.783 |
|
Please provide detailed information about CVE-2021-23239 | CVE:CVE-2021-23239
Description:The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
published:2021-01-12T09:15:14.043 |
|
Please provide detailed information about CVE-2021-23240 | CVE:CVE-2021-23240
Description:selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
published:2021-01-12T09:15:14.107 |
|
Please provide detailed information about CVE-2021-21445 | CVE:CVE-2021-21445
Description:SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, 2011, allows an authenticated attacker to include invalidated data in the HTTP response Content Type header, due to improper input validation, and sent to a Web user. A successful exploitation of this vulnerability may lead to advanced attacks, including cross-site scripting and page hijacking.
published:2021-01-12T15:15:14.360 |
|
Please provide detailed information about CVE-2021-21446 | CVE:CVE-2021-21446
Description:SAP NetWeaver AS ABAP, versions 740, 750, 751, 752, 753, 754, 755, allows an unauthenticated attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service, this has a high impact on the availability of the service.
published:2021-01-12T15:15:14.470 |
|
Please provide detailed information about CVE-2021-21447 | CVE:CVE-2021-21447
Description:SAP BusinessObjects Business Intelligence platform, versions 410, 420, allows an authenticated attacker to inject malicious JavaScript payload into the custom value input field of an Input Control, which can be executed by User who views the relevant application content, which leads to Stored Cross-Site Scripting.
published:2021-01-12T15:15:14.547 |
|
Please provide detailed information about CVE-2021-21448 | CVE:CVE-2021-21448
Description:SAP GUI for Windows, version - 7.60, allows an attacker to spoof logon credentials for Application Server ABAP backend systems in the client PCs memory. Under certain conditions the attacker can access information which would otherwise be restricted. The exploit can only be executed locally on the client PC and not via Network and the attacker needs at least user authorization of the Operating System user of the victim.
published:2021-01-12T15:15:14.610 |
|
Please provide detailed information about CVE-2021-21449 | CVE:CVE-2021-21449
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:14.703 |
|
Please provide detailed information about CVE-2021-21450 | CVE:CVE-2021-21450
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PSD file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:14.813 |
|
Please provide detailed information about CVE-2021-21451 | CVE:CVE-2021-21451
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated SGI file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:14.907 |
|
Please provide detailed information about CVE-2021-21452 | CVE:CVE-2021-21452
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated GIF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:14.987 |
|
Please provide detailed information about CVE-2021-21453 | CVE:CVE-2021-21453
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated RLE file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.047 |
|
Please provide detailed information about CVE-2021-21454 | CVE:CVE-2021-21454
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated RLE file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.110 |
|
Please provide detailed information about CVE-2021-21455 | CVE:CVE-2021-21455
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.190 |
|
Please provide detailed information about CVE-2021-21456 | CVE:CVE-2021-21456
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.250 |
|
Please provide detailed information about CVE-2021-21457 | CVE:CVE-2021-21457
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.313 |
|
Please provide detailed information about CVE-2021-21458 | CVE:CVE-2021-21458
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.390 |
|
Please provide detailed information about CVE-2021-21459 | CVE:CVE-2021-21459
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.437 |
|
Please provide detailed information about CVE-2021-21460 | CVE:CVE-2021-21460
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated DIB file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.517 |
|
Please provide detailed information about CVE-2021-21461 | CVE:CVE-2021-21461
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated BMP file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.593 |
|
Please provide detailed information about CVE-2021-21462 | CVE:CVE-2021-21462
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.657 |
|
Please provide detailed information about CVE-2021-21463 | CVE:CVE-2021-21463
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.720 |
Cybersecurity-LLM-CVE Dataset Introduction π
Overview π‘οΈ
An open-source cybersecurity vulnerability dataset designed for training/evaluating Large Language Models (LLMs) in security domains. Covers all public CVE IDs from January 1, 2021 to April 9, 2025, with structured data including vulnerability details (affected products) and disclosure dates.
Key Highlights β¨
Comprehensive π: 5-year global vulnerability records (software/hardware/protocols)
Authoritative Integration π: Data sourced from NVD, CVE lists, and community contributions, double-verified
Usage Declaration π‘
If using this dataset, please cite via:
[Hugging Face Datasets Library] πβ¨
Typical Use Cases π οΈ
π§ LLM-powered vulnerability patch generation
π€ Automated threat intelligence analysis
π§ Penetration testing toolkit enhancement
Final Notes π
π¬ Feel free to leave suggestions in the community forum! I'll keep optimizing based on your feedback~ π₯°
- Downloads last month
- 221