instruction
stringlengths 55
56
| inputs
stringclasses 1
value | outputs
stringlengths 86
4.06k
|
---|---|---|
Please provide detailed information about CVE-2021-21464 | CVE:CVE-2021-21464
Description:SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
published:2021-01-12T15:15:15.813 |
|
Please provide detailed information about CVE-2021-21465 | CVE:CVE-2021-21465
Description:The BW Database Interface allows an attacker with low privileges to execute any crafted database queries, exposing the backend database. An attacker can include their own SQL commands which the database will execute without properly sanitizing the untrusted data leading to SQL injection vulnerability which can fully compromise the affected SAP system.
published:2021-01-12T15:15:15.860 |
|
Please provide detailed information about CVE-2021-21466 | CVE:CVE-2021-21466
Description:SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200, allow a low privileged attacker to inject code using a remote enabled function module over the network. Via the function module an attacker can create a malicious ABAP report which could be used to get access to sensitive data, to inject malicious UPDATE statements that could have also impact on the operating system, to disrupt the functionality of the SAP system which can thereby lead to a Denial of Service.
published:2021-01-12T15:15:15.953 |
|
Please provide detailed information about CVE-2021-21467 | CVE:CVE-2021-21467
Description:SAP Banking Services (Generic Market Data) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. An unauthorized User is allowed to display restricted Business Partner Generic Market Data (GMD), due to improper authorization check.
published:2021-01-12T15:15:16.033 |
|
Please provide detailed information about CVE-2021-21468 | CVE:CVE-2021-21468
Description:The BW Database Interface does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges that allows the user to practically read out any database table.
published:2021-01-12T15:15:16.093 |
|
Please provide detailed information about CVE-2021-21469 | CVE:CVE-2021-21469
Description:When security guidelines for SAP NetWeaver Master Data Management running on windows have not been thoroughly reviewed, it might be possible for an external operator to try and set custom paths in the MDS server configuration. When no adequate protection has been enforced on any level (e.g., MDS Server password not set, network and OS configuration not properly secured, etc.), a malicious user might define UNC paths which could then be exploited to put the system at risk using a so-called SMB relay attack and obtain highly sensitive data, which leads to Information Disclosure.
published:2021-01-12T15:15:16.187 |
|
Please provide detailed information about CVE-2021-21470 | CVE:CVE-2021-21470
Description:SAP EPM Add-in for Microsoft Office, version - 1010 and SAP EPM Add-in for SAP Analysis Office, version - 2.8, allows an authenticated attacker with user privileges to parse malicious XML files which could result in XXE-based attacks in applications that accept attacker-controlled XML configuration files. This occurs as logging service does not disable XML external entities when parsing configuration files and a successful exploit would result in limited impact on integrity and availability of the application.
published:2021-01-12T15:15:16.250 |
|
Please provide detailed information about CVE-2021-21471 | CVE:CVE-2021-21471
Description:In CLA-Assistant, versions before 2.8.5, due to improper access control an authenticated user could access API endpoints which are not intended to be used by the user. This could impact the integrity of the application.
published:2021-01-12T15:15:16.343 |
|
Please provide detailed information about CVE-2021-3129 | CVE:CVE-2021-3129
Description:Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
published:2021-01-12T15:15:16.453 |
|
Please provide detailed information about CVE-2021-3133 | CVE:CVE-2021-3133
Description:The Elementor Contact Form DB plugin before 1.6 for WordPress allows CSRF via backend admin pages.
published:2021-01-12T19:15:13.070 |
|
Please provide detailed information about CVE-2021-1636 | CVE:CVE-2021-1636
Description:Microsoft SQL Elevation of Privilege Vulnerability
published:2021-01-12T20:15:30.167 |
|
Please provide detailed information about CVE-2021-1637 | CVE:CVE-2021-1637
Description:Windows DNS Query Information Disclosure Vulnerability
published:2021-01-12T20:15:30.213 |
|
Please provide detailed information about CVE-2021-1638 | CVE:CVE-2021-1638
Description:Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key
published:2021-01-12T20:15:30.277 |
|
Please provide detailed information about CVE-2021-1641 | CVE:CVE-2021-1641
Description:Microsoft SharePoint Server Spoofing Vulnerability
published:2021-01-12T20:15:30.337 |
|
Please provide detailed information about CVE-2021-1642 | CVE:CVE-2021-1642
Description:Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
published:2021-01-12T20:15:30.400 |
|
Please provide detailed information about CVE-2021-1643 | CVE:CVE-2021-1643
Description:HEVC Video Extensions Remote Code Execution Vulnerability
published:2021-01-12T20:15:30.477 |
|
Please provide detailed information about CVE-2021-1644 | CVE:CVE-2021-1644
Description:HEVC Video Extensions Remote Code Execution Vulnerability
published:2021-01-12T20:15:30.540 |
|
Please provide detailed information about CVE-2021-1645 | CVE:CVE-2021-1645
Description:Windows Docker Information Disclosure Vulnerability
published:2021-01-12T20:15:30.603 |
|
Please provide detailed information about CVE-2021-1646 | CVE:CVE-2021-1646
Description:Windows WLAN Service Elevation of Privilege Vulnerability
published:2021-01-12T20:15:30.667 |
|
Please provide detailed information about CVE-2021-1647 | CVE:CVE-2021-1647
Description:Microsoft Defender Remote Code Execution Vulnerability
published:2021-01-12T20:15:30.727 |
|
Please provide detailed information about CVE-2021-1648 | CVE:CVE-2021-1648
Description:Microsoft splwow64 Elevation of Privilege Vulnerability
published:2021-01-12T20:15:30.790 |
|
Please provide detailed information about CVE-2021-1649 | CVE:CVE-2021-1649
Description:Active Template Library Elevation of Privilege Vulnerability
published:2021-01-12T20:15:30.837 |
|
Please provide detailed information about CVE-2021-1650 | CVE:CVE-2021-1650
Description:Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
published:2021-01-12T20:15:30.900 |
|
Please provide detailed information about CVE-2021-1651 | CVE:CVE-2021-1651
Description:Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
published:2021-01-12T20:15:30.963 |
|
Please provide detailed information about CVE-2021-1652 | CVE:CVE-2021-1652
Description:Windows CSC Service Elevation of Privilege Vulnerability
published:2021-01-12T20:15:31.027 |
|
Please provide detailed information about CVE-2021-1653 | CVE:CVE-2021-1653
Description:Windows CSC Service Elevation of Privilege Vulnerability
published:2021-01-12T20:15:31.087 |
|
Please provide detailed information about CVE-2021-1654 | CVE:CVE-2021-1654
Description:Windows CSC Service Elevation of Privilege Vulnerability
published:2021-01-12T20:15:31.150 |
|
Please provide detailed information about CVE-2021-1655 | CVE:CVE-2021-1655
Description:Windows CSC Service Elevation of Privilege Vulnerability
published:2021-01-12T20:15:31.213 |
|
Please provide detailed information about CVE-2021-1656 | CVE:CVE-2021-1656
Description:TPM Device Driver Information Disclosure Vulnerability
published:2021-01-12T20:15:31.277 |
|
Please provide detailed information about CVE-2021-1657 | CVE:CVE-2021-1657
Description:Windows Fax Compose Form Remote Code Execution Vulnerability
published:2021-01-12T20:15:31.340 |
|
Please provide detailed information about CVE-2021-1658 | CVE:CVE-2021-1658
Description:Remote Procedure Call Runtime Remote Code Execution Vulnerability
published:2021-01-12T20:15:31.400 |
|
Please provide detailed information about CVE-2021-1659 | CVE:CVE-2021-1659
Description:Windows CSC Service Elevation of Privilege Vulnerability
published:2021-01-12T20:15:31.463 |
|
Please provide detailed information about CVE-2021-1660 | CVE:CVE-2021-1660
Description:Remote Procedure Call Runtime Remote Code Execution Vulnerability
published:2021-01-12T20:15:31.510 |
|
Please provide detailed information about CVE-2021-1661 | CVE:CVE-2021-1661
Description:Windows Installer Elevation of Privilege Vulnerability
published:2021-01-12T20:15:31.573 |
|
Please provide detailed information about CVE-2021-1662 | CVE:CVE-2021-1662
Description:Windows Event Tracing Elevation of Privilege Vulnerability
published:2021-01-12T20:15:31.637 |
|
Please provide detailed information about CVE-2021-1663 | CVE:CVE-2021-1663
Description:Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
published:2021-01-12T20:15:31.680 |
|
Please provide detailed information about CVE-2021-1664 | CVE:CVE-2021-1664
Description:Remote Procedure Call Runtime Remote Code Execution Vulnerability
published:2021-01-12T20:15:31.743 |
|
Please provide detailed information about CVE-2021-1665 | CVE:CVE-2021-1665
Description:GDI+ Remote Code Execution Vulnerability
published:2021-01-12T20:15:31.807 |
|
Please provide detailed information about CVE-2021-1666 | CVE:CVE-2021-1666
Description:Remote Procedure Call Runtime Remote Code Execution Vulnerability
published:2021-01-12T20:15:31.853 |
|
Please provide detailed information about CVE-2021-1667 | CVE:CVE-2021-1667
Description:Remote Procedure Call Runtime Remote Code Execution Vulnerability
published:2021-01-12T20:15:31.917 |
|
Please provide detailed information about CVE-2021-1668 | CVE:CVE-2021-1668
Description:Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability
published:2021-01-12T20:15:31.977 |
|
Please provide detailed information about CVE-2021-1669 | CVE:CVE-2021-1669
Description:Windows Remote Desktop Security Feature Bypass Vulnerability
published:2021-01-12T20:15:32.040 |
|
Please provide detailed information about CVE-2021-1670 | CVE:CVE-2021-1670
Description:Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
published:2021-01-12T20:15:32.087 |
|
Please provide detailed information about CVE-2021-1671 | CVE:CVE-2021-1671
Description:Remote Procedure Call Runtime Remote Code Execution Vulnerability
published:2021-01-12T20:15:32.150 |
|
Please provide detailed information about CVE-2021-1672 | CVE:CVE-2021-1672
Description:Windows Projected File System FS Filter Driver Information Disclosure Vulnerability
published:2021-01-12T20:15:32.213 |
|
Please provide detailed information about CVE-2021-1673 | CVE:CVE-2021-1673
Description:Remote Procedure Call Runtime Remote Code Execution Vulnerability
published:2021-01-12T20:15:32.277 |
|
Please provide detailed information about CVE-2021-1674 | CVE:CVE-2021-1674
Description:Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability
published:2021-01-12T20:15:32.337 |
|
Please provide detailed information about CVE-2021-1676 | CVE:CVE-2021-1676
Description:Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability
published:2021-01-12T20:15:32.400 |
|
Please provide detailed information about CVE-2021-1677 | CVE:CVE-2021-1677
Description:Azure Active Directory Pod Identity Spoofing Vulnerability
published:2021-01-12T20:15:32.463 |
|
Please provide detailed information about CVE-2021-1678 | CVE:CVE-2021-1678
Description:Windows Print Spooler Spoofing Vulnerability
published:2021-01-12T20:15:32.510 |
|
Please provide detailed information about CVE-2021-1679 | CVE:CVE-2021-1679
Description:Windows CryptoAPI Denial of Service Vulnerability
published:2021-01-12T20:15:32.573 |
|
Please provide detailed information about CVE-2021-1680 | CVE:CVE-2021-1680
Description:Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
published:2021-01-12T20:15:32.637 |
|
Please provide detailed information about CVE-2021-1681 | CVE:CVE-2021-1681
Description:Windows WalletService Elevation of Privilege Vulnerability
published:2021-01-12T20:15:32.697 |
|
Please provide detailed information about CVE-2021-1682 | CVE:CVE-2021-1682
Description:Windows Kernel Elevation of Privilege Vulnerability
published:2021-01-12T20:15:32.743 |
|
Please provide detailed information about CVE-2021-1683 | CVE:CVE-2021-1683
Description:Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key
published:2021-01-12T20:15:32.807 |
|
Please provide detailed information about CVE-2021-1684 | CVE:CVE-2021-1684
Description:Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see this statement from the Bluetooth SIG. To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key
published:2021-01-12T20:15:32.853 |
|
Please provide detailed information about CVE-2021-1685 | CVE:CVE-2021-1685
Description:Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
published:2021-01-12T20:15:32.933 |
|
Please provide detailed information about CVE-2021-1686 | CVE:CVE-2021-1686
Description:Windows WalletService Elevation of Privilege Vulnerability
published:2021-01-12T20:15:32.993 |
|
Please provide detailed information about CVE-2021-1687 | CVE:CVE-2021-1687
Description:Windows WalletService Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.057 |
|
Please provide detailed information about CVE-2021-1688 | CVE:CVE-2021-1688
Description:Windows CSC Service Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.167 |
|
Please provide detailed information about CVE-2021-1689 | CVE:CVE-2021-1689
Description:Windows Multipoint Management Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.230 |
|
Please provide detailed information about CVE-2021-1690 | CVE:CVE-2021-1690
Description:Windows WalletService Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.290 |
|
Please provide detailed information about CVE-2021-1691 | CVE:CVE-2021-1691
Description:Windows Hyper-V Denial of Service Vulnerability
published:2021-01-12T20:15:33.353 |
|
Please provide detailed information about CVE-2021-1692 | CVE:CVE-2021-1692
Description:Windows Hyper-V Denial of Service Vulnerability
published:2021-01-12T20:15:33.400 |
|
Please provide detailed information about CVE-2021-1693 | CVE:CVE-2021-1693
Description:Windows CSC Service Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.463 |
|
Please provide detailed information about CVE-2021-1694 | CVE:CVE-2021-1694
Description:Windows Update Stack Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.510 |
|
Please provide detailed information about CVE-2021-1695 | CVE:CVE-2021-1695
Description:Windows Print Spooler Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.557 |
|
Please provide detailed information about CVE-2021-1696 | CVE:CVE-2021-1696
Description:Windows Graphics Component Information Disclosure Vulnerability
published:2021-01-12T20:15:33.620 |
|
Please provide detailed information about CVE-2021-1697 | CVE:CVE-2021-1697
Description:Windows InstallService Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.683 |
|
Please provide detailed information about CVE-2021-1699 | CVE:CVE-2021-1699
Description:Windows (modem.sys) Information Disclosure Vulnerability
published:2021-01-12T20:15:33.743 |
|
Please provide detailed information about CVE-2021-1700 | CVE:CVE-2021-1700
Description:Remote Procedure Call Runtime Remote Code Execution Vulnerability
published:2021-01-12T20:15:33.807 |
|
Please provide detailed information about CVE-2021-1701 | CVE:CVE-2021-1701
Description:Remote Procedure Call Runtime Remote Code Execution Vulnerability
published:2021-01-12T20:15:33.870 |
|
Please provide detailed information about CVE-2021-1702 | CVE:CVE-2021-1702
Description:Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.933 |
|
Please provide detailed information about CVE-2021-1703 | CVE:CVE-2021-1703
Description:Windows Event Logging Service Elevation of Privilege Vulnerability
published:2021-01-12T20:15:33.993 |
|
Please provide detailed information about CVE-2021-1704 | CVE:CVE-2021-1704
Description:Windows Hyper-V Elevation of Privilege Vulnerability
published:2021-01-12T20:15:34.040 |
|
Please provide detailed information about CVE-2021-1705 | CVE:CVE-2021-1705
Description:Microsoft Edge (HTML-based) Memory Corruption Vulnerability
published:2021-01-12T20:15:34.103 |
|
Please provide detailed information about CVE-2021-1706 | CVE:CVE-2021-1706
Description:Windows LUAFV Elevation of Privilege Vulnerability
published:2021-01-12T20:15:34.167 |
|
Please provide detailed information about CVE-2021-1707 | CVE:CVE-2021-1707
Description:Microsoft SharePoint Server Remote Code Execution Vulnerability
published:2021-01-12T20:15:34.230 |
|
Please provide detailed information about CVE-2021-1708 | CVE:CVE-2021-1708
Description:Windows GDI+ Information Disclosure Vulnerability
published:2021-01-12T20:15:34.277 |
|
Please provide detailed information about CVE-2021-1709 | CVE:CVE-2021-1709
Description:Windows Win32k Elevation of Privilege Vulnerability
published:2021-01-12T20:15:34.357 |
|
Please provide detailed information about CVE-2021-1710 | CVE:CVE-2021-1710
Description:Microsoft Windows Media Foundation Remote Code Execution Vulnerability
published:2021-01-12T20:15:34.417 |
|
Please provide detailed information about CVE-2021-1711 | CVE:CVE-2021-1711
Description:Microsoft Office Remote Code Execution Vulnerability
published:2021-01-12T20:15:34.463 |
|
Please provide detailed information about CVE-2021-1712 | CVE:CVE-2021-1712
Description:Microsoft SharePoint Elevation of Privilege Vulnerability
published:2021-01-12T20:15:34.527 |
|
Please provide detailed information about CVE-2021-1713 | CVE:CVE-2021-1713
Description:Microsoft Excel Remote Code Execution Vulnerability
published:2021-01-12T20:15:34.573 |
|
Please provide detailed information about CVE-2021-1714 | CVE:CVE-2021-1714
Description:Microsoft Excel Remote Code Execution Vulnerability
published:2021-01-12T20:15:34.637 |
|
Please provide detailed information about CVE-2021-1715 | CVE:CVE-2021-1715
Description:Microsoft Word Remote Code Execution Vulnerability
published:2021-01-12T20:15:34.697 |
|
Please provide detailed information about CVE-2021-1716 | CVE:CVE-2021-1716
Description:Microsoft Word Remote Code Execution Vulnerability
published:2021-01-12T20:15:34.743 |
|
Please provide detailed information about CVE-2021-1717 | CVE:CVE-2021-1717
Description:Microsoft SharePoint Server Spoofing Vulnerability
published:2021-01-12T20:15:34.807 |
|
Please provide detailed information about CVE-2021-1718 | CVE:CVE-2021-1718
Description:Microsoft SharePoint Server Tampering Vulnerability
published:2021-01-12T20:15:34.870 |
|
Please provide detailed information about CVE-2021-1719 | CVE:CVE-2021-1719
Description:Microsoft SharePoint Elevation of Privilege Vulnerability
published:2021-01-12T20:15:34.933 |
|
Please provide detailed information about CVE-2021-1723 | CVE:CVE-2021-1723
Description:ASP.NET Core and Visual Studio Denial of Service Vulnerability
published:2021-01-12T20:15:34.993 |
|
Please provide detailed information about CVE-2021-1725 | CVE:CVE-2021-1725
Description:Bot Framework SDK Information Disclosure Vulnerability
published:2021-01-12T20:15:35.040 |
|
Please provide detailed information about CVE-2021-3134 | CVE:CVE-2021-3134
Description:Mubu 2.2.1 allows local users to gain privileges to execute commands, aka CNVD-2020-68878.
published:2021-01-12T20:15:35.103 |
|
Please provide detailed information about CVE-2021-23123 | CVE:CVE-2021-23123
Description:An issue was discovered in Joomla! 3.0.0 through 3.9.23. The lack of ACL checks in the orderPosition endpoint of com_modules leak names of unpublished and/or inaccessible modules.
published:2021-01-12T21:15:18.887 |
|
Please provide detailed information about CVE-2021-23124 | CVE:CVE-2021-23124
Description:An issue was discovered in Joomla! 3.9.0 through 3.9.23. The lack of escaping in mod_breadcrumbs aria-label attribute allows XSS attacks.
published:2021-01-12T21:15:18.947 |
|
Please provide detailed information about CVE-2021-23125 | CVE:CVE-2021-23125
Description:An issue was discovered in Joomla! 3.1.0 through 3.9.23. The lack of escaping of image-related parameters in multiple com_tags views cause lead to XSS attack vectors.
published:2021-01-12T21:15:18.997 |
|
Please provide detailed information about CVE-2021-23927 | CVE:CVE-2021-23927
Description:OX App Suite through 7.10.4 allows SSRF via a URL with an @ character in an appsuite/api/oauth/proxy PUT request.
published:2021-01-12T22:15:12.447 |
|
Please provide detailed information about CVE-2021-23928 | CVE:CVE-2021-23928
Description:OX App Suite through 7.10.3 allows XSS via the ajax/apps/manifests query string.
published:2021-01-12T22:15:12.510 |
|
Please provide detailed information about CVE-2021-23929 | CVE:CVE-2021-23929
Description:OX App Suite through 7.10.4 allows XSS via a crafted Content-Disposition header in an uploaded HTML document to an ajax/share/<share-token>?delivery=view URI.
published:2021-01-12T22:15:12.573 |
|
Please provide detailed information about CVE-2021-23930 | CVE:CVE-2021-23930
Description:OX App Suite through 7.10.4 allows XSS via use of the conversion API for a distributedFile.
published:2021-01-12T22:15:12.637 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.