Search and browse vulnerability records from NVD
Showing 50 of 1484 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2021-36934
KEV
|
7.8 HIGH |
<p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker must have the ability to execute code on a victim system to exploit this vulnerability.</p> <p>After installing this security update, you <em>must</em> manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. <strong>Simply installing this security update will not fully mitigate this vulnerability.</strong> See <a href="https://support.microsoft.com/topic/1ceaa637-aaa3-4b58-a48b-baf72a2fa9e7">KB5005357- Delete Volume Shadow Copies</a>.</p> |
90.8% | 2021-07-22 | |
|
CVE-2021-34448
KEV
|
6.8 MEDIUM |
Scripting Engine Memory Corruption Vulnerability |
2.0% | 2021-07-16 | |
|
CVE-2021-35211
KEV
|
9.0 CRITICAL |
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability. |
94.3% | 2021-07-14 | |
|
CVE-2021-34523
KEV
|
9.0 CRITICAL |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
94.1% | 2021-07-14 | |
|
CVE-2021-34473
KEV
|
9.1 CRITICAL |
Microsoft Exchange Server Remote Code Execution Vulnerability |
94.2% | 2021-07-14 | |
|
CVE-2021-33771
KEV
|
7.8 HIGH |
Windows Kernel Elevation of Privilege Vulnerability |
10.6% | 2021-07-14 | |
|
CVE-2021-33766
KEV
|
7.3 HIGH |
Microsoft Exchange Server Information Disclosure Vulnerability |
93.5% | 2021-07-14 | |
|
CVE-2021-31979
KEV
|
7.8 HIGH |
Windows Kernel Elevation of Privilege Vulnerability |
14.4% | 2021-07-14 | |
|
CVE-2021-31196
KEV
|
7.2 HIGH |
Microsoft Exchange Server Remote Code Execution Vulnerability |
2.9% | 2021-07-14 | |
|
CVE-2021-30116
KEV
|
10.0 CRITICAL |
Kaseya VSA before 9.5.7 allows credential disclosure, as exploited in the wild in July 2021. By default Kaseya VSA on premise offers a download page where the clients for the installation can be downloaded. The default URL for this page is https://x.x.x.x/dl.asp When an attacker download a client for Windows and installs it, the file KaseyaD.ini is generated (C:\Program Files (x86)\Kaseya\XXXXXXXXXX\KaseyaD.ini) which contains an Agent_Guid and AgentPassword This Agent_Guid and AgentPassword can be used to log in on dl.asp (https://x.x.x.x/dl.asp?un=840997037507813&pw=113cc622839a4077a84837485ced6b93e440bf66d44057713cb2f95e503a06d9) This request authenticates the client and returns a sessionId cookie that can be used in subsequent attacks to bypass authentication. Security issues discovered --- * Unauthenticated download page leaks credentials * Credentials of agent software can be used to obtain a sessionId (cookie) that can be used for services not intended for use by agents * dl.asp accepts credentials via a GET request * Access to KaseyaD.ini gives an attacker access to sufficient information to penetrate the Kaseya installation and its clients. Impact --- Via the page /dl.asp enough information can be obtained to give an attacker a sessionId that can be used to execute further (semi-authenticated) attacks against the system. |
49.8% | 2021-07-09 | |
|
CVE-2021-22555
KEV
|
8.3 HIGH |
A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space |
85.3% | 2021-07-07 | |
|
CVE-2021-34527
KEV
|
8.8 HIGH |
<p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability.</p> <p>In addition to installing the updates, in order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined (<strong>Note</strong>: These registry keys do not exist by default, and therefore are already at the secure setting.), also that your Group Policy setting are correct (see FAQ):</p> <ul> <li>HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint</li> <li>NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)</li> <li>UpdatePromptSettings = 0 (DWORD) or not defined (default setting)</li> </ul> <p><strong>Having NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.</strong></p> <p>UPDATE July 6, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also <a href="https://support.microsoft.com/topic/31b91c02-05bc-4ada-a7ea-183b129578a7">KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates</a>.</p> <p>Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527.</p> |
94.3% | 2021-07-02 | |
|
CVE-2021-30554
KEV
|
8.8 HIGH |
Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
4.6% | 2021-07-02 | |
|
CVE-2021-30551
KEV
|
8.8 HIGH |
Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
71.9% | 2021-06-15 | |
|
CVE-2021-25395
KEV
|
6.4 MEDIUM |
A race condition in MFC charger driver prior to SMR MAY-2021 Release 1 allows local attackers to bypass signature check given a radio privilege is compromised. |
0.2% | 2021-06-11 | |
|
CVE-2021-25394
KEV
|
6.4 MEDIUM |
A use after free vulnerability via race condition in MFC charger driver prior to SMR MAY-2021 Release 1 allows arbitrary write given a radio privilege is compromised. |
0.6% | 2021-06-11 | |
|
CVE-2021-26829
KEV
|
5.4 MEDIUM |
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm. |
17.4% | 2021-06-11 | |
|
CVE-2021-26828
KEV
|
8.8 HIGH |
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm. |
80.1% | 2021-06-11 | |
|
CVE-2020-11261
KEV
|
7.8 HIGH |
Memory corruption due to improper check to return error when user application requests memory allocation of a huge size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables |
1.2% | 2021-06-09 | |
|
CVE-2021-33742
KEV
|
7.5 HIGH |
Windows MSHTML Platform Remote Code Execution Vulnerability |
47.3% | 2021-06-08 | |
|
CVE-2021-33739
KEV
|
8.4 HIGH |
Microsoft DWM Core Library Elevation of Privilege Vulnerability |
20.1% | 2021-06-08 | |
|
CVE-2021-31956
KEV
|
7.8 HIGH |
Windows NTFS Elevation of Privilege Vulnerability |
90.7% | 2021-06-08 | |
|
CVE-2021-31955
KEV
|
5.5 MEDIUM |
Windows Kernel Information Disclosure Vulnerability |
6.2% | 2021-06-08 | |
|
CVE-2021-31201
KEV
|
5.2 MEDIUM |
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability |
1.6% | 2021-06-08 | |
|
CVE-2021-31199
KEV
|
5.2 MEDIUM |
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability |
1.0% | 2021-06-08 | |
|
CVE-2021-1675
KEV
|
7.8 HIGH |
Windows Print Spooler Remote Code Execution Vulnerability |
94.3% | 2021-06-08 | |
|
CVE-2021-30533
KEV
|
6.5 MEDIUM |
Insufficient policy enforcement in PopupBlocker in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass navigation restrictions via a crafted iframe. |
10.5% | 2021-06-07 | |
|
CVE-2021-27852
KEV
|
9.8 CRITICAL |
Deserialization of Untrusted Data vulnerability in CheckboxWeb.dll of Checkbox Survey allows an unauthenticated remote attacker to execute arbitrary code. This issue affects: Checkbox Survey versions prior to 7. |
31.8% | 2021-05-27 | |
|
CVE-2021-22900
KEV
|
7.2 HIGH |
A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4 that could lead to an authenticated administrator to perform a file write via a maliciously crafted archive upload in the administrator web interface. |
1.6% | 2021-05-27 | |
|
CVE-2021-22899
KEV
|
8.8 HIGH |
A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to perform remote code execution via Windows Resource Profiles Feature |
38.0% | 2021-05-27 | |
|
CVE-2021-22894
KEV
|
8.8 HIGH |
A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room. |
50.6% | 2021-05-27 | |
|
CVE-2021-21985
KEV
|
9.8 CRITICAL |
The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in which is enabled by default in vCenter Server. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. |
94.4% | 2021-05-26 | |
|
CVE-2021-27562
KEV
|
5.5 MEDIUM |
In Arm Trusted Firmware M through 1.2, the NS world may trigger a system halt, an overwrite of secure data, or the printing out of secure data when calling secure functions under the NSPE handler mode. |
59.5% | 2021-05-25 | |
|
CVE-2021-29256
KEV
|
8.8 HIGH |
. The Arm Mali GPU kernel driver allows an unprivileged user to achieve access to freed memory, leading to information disclosure or root privilege escalation. This affects Bifrost r16p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r28p0 through r30p0. |
0.6% | 2021-05-24 | |
|
CVE-2021-28799
KEV
|
10.0 CRITICAL |
An improper authorization vulnerability has been reported to affect QNAP NAS running HBS 3 (Hybrid Backup Sync. ) If exploited, the vulnerability allows remote attackers to log in to a device. This issue affects: QNAP Systems Inc. HBS 3 versions prior to v16.0.0415 on QTS 4.5.2; versions prior to v3.0.210412 on QTS 4.3.6; versions prior to v3.0.210411 on QTS 4.3.4; versions prior to v3.0.210411 on QTS 4.3.3; versions prior to v16.0.0419 on QuTS hero h4.5.1; versions prior to v16.0.0419 on QuTScloud c4.5.1~c4.5.4. This issue does not affect: QNAP Systems Inc. HBS 2 . QNAP Systems Inc. HBS 1.3 . |
80.2% | 2021-05-13 | |
|
CVE-2021-31207
KEV
|
6.6 MEDIUM |
Microsoft Exchange Server Security Feature Bypass Vulnerability |
93.8% | 2021-05-11 | |
|
CVE-2021-31166
KEV
|
9.8 CRITICAL |
HTTP Protocol Stack Remote Code Execution Vulnerability |
93.1% | 2021-05-11 | |
|
CVE-2021-28664
KEV
|
8.8 HIGH |
The Arm Mali GPU kernel driver allows privilege escalation or a denial of service (memory corruption) because an unprivileged user can achieve read/write access to read-only pages. This affects Bifrost r0p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r8p0 through r30p0 before r31p0. |
0.2% | 2021-05-10 | |
|
CVE-2021-28663
KEV
|
8.8 HIGH |
The Arm Mali GPU kernel driver allows privilege escalation or information disclosure because GPU memory operations are mishandled, leading to a use-after-free. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r4p0 through r30p0. |
2.4% | 2021-05-10 | |
|
CVE-2021-31755
KEV
|
9.8 CRITICAL |
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request. |
94.3% | 2021-05-07 | |
|
CVE-2021-1906
KEV
|
6.2 MEDIUM |
Improper handling of address deregistration on failure can lead to new GPU address allocation failure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables |
0.1% | 2021-05-07 | |
|
CVE-2021-1905
KEV
|
8.4 HIGH |
Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables |
0.9% | 2021-05-07 | |
|
CVE-2021-32030
KEV
|
9.8 CRITICAL |
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN. |
94.2% | 2021-05-06 | |
|
CVE-2021-1498
KEV
|
9.8 CRITICAL |
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. |
94.0% | 2021-05-06 | |
|
CVE-2021-1497
KEV
|
9.8 CRITICAL |
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. |
94.4% | 2021-05-06 | |
|
CVE-2021-21551
KEV
|
8.8 HIGH |
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required. |
72.2% | 2021-05-04 | |
|
CVE-2021-20090
KEV
|
9.8 CRITICAL |
A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. |
94.4% | 2021-04-29 | |
|
CVE-2021-21224
KEV
|
8.8 HIGH |
Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. |
54.3% | 2021-04-26 | |
|
CVE-2021-21220
KEV
|
8.8 HIGH |
Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
90.5% | 2021-04-26 | |
|
CVE-2021-21206
KEV
|
8.8 HIGH |
Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
21.9% | 2021-04-26 |