Search and browse vulnerability records from NVD
Showing 50 of 1587 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2021-38647
KEV
|
9.8 CRITICAL |
Open Management Infrastructure Remote Code Execution Vulnerability |
94.4% | 2021-09-15 | |
|
CVE-2021-38646
KEV
|
7.8 HIGH |
Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability |
50.9% | 2021-09-15 | |
|
CVE-2021-38645
KEV
|
7.8 HIGH |
Open Management Infrastructure Elevation of Privilege Vulnerability |
11.5% | 2021-09-15 | |
|
CVE-2021-36955
KEV
|
7.8 HIGH |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
20.6% | 2021-09-15 | |
|
CVE-2021-38163
KEV
|
9.9 CRITICAL |
SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50, without restriction, an attacker authenticated as a non-administrative user can upload a malicious file over a network and trigger its processing, which is capable of running operating system commands with the privilege of the Java Server process. These commands can be used to read or modify any information on the server or shut the server down making it unavailable. |
84.8% | 2021-09-14 | |
|
CVE-2021-40870
KEV
|
9.8 CRITICAL |
An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal. |
94.3% | 2021-09-13 | |
|
CVE-2021-30713
KEV
|
7.8 HIGH |
A permissions issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.4. A malicious application may be able to bypass Privacy preferences. Apple is aware of a report that this issue may have been actively exploited.. |
0.1% | 2021-09-08 | |
|
CVE-2021-30666
KEV
|
8.8 HIGH |
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.5.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. |
1.5% | 2021-09-08 | |
|
CVE-2021-30665
KEV
|
8.8 HIGH |
A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. |
0.6% | 2021-09-08 | |
|
CVE-2021-30663
KEV
|
8.8 HIGH |
An integer overflow was addressed with improved input validation. This issue is fixed in iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, Safari 14.1.1, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. |
0.7% | 2021-09-08 | |
|
CVE-2021-30661
KEV
|
8.8 HIGH |
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. |
0.1% | 2021-09-08 | |
|
CVE-2021-30657
KEV
|
5.5 MEDIUM |
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, Security Update 2021-002 Catalina. A malicious application may bypass Gatekeeper checks. Apple is aware of a report that this issue may have been actively exploited.. |
83.1% | 2021-09-08 | |
|
CVE-2021-30762
KEV
|
8.8 HIGH |
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. |
0.0% | 2021-09-08 | |
|
CVE-2021-30761
KEV
|
8.8 HIGH |
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. |
0.5% | 2021-09-08 | |
|
CVE-2021-40539
KEV
|
9.8 CRITICAL |
Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution. |
94.4% | 2021-09-07 | |
|
CVE-2021-28550
KEV
|
8.8 HIGH |
Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
32.6% | 2021-09-02 | |
|
CVE-2021-37415
KEV
|
9.8 CRITICAL |
Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication. |
91.9% | 2021-09-01 | |
|
CVE-2021-26084
KEV
|
9.8 CRITICAL |
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5. |
94.4% | 2021-08-30 | |
|
CVE-2021-32648
KEV
|
8.2 HIGH |
octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5. |
93.0% | 2021-08-26 | |
|
CVE-2021-31010
KEV
|
7.5 HIGH |
A deserialization issue was addressed through improved validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 12.5.5, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. A sandboxed process may be able to circumvent sandbox restrictions. Apple was aware of a report that this issue may have been actively exploited at the time of release.. |
0.7% | 2021-08-24 | |
|
CVE-2021-30983
KEV
|
7.8 HIGH |
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 15.2 and iPadOS 15.2. An application may be able to execute arbitrary code with kernel privileges. |
0.5% | 2021-08-24 | |
|
CVE-2021-30952
KEV
|
7.8 HIGH |
An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution. |
0.9% | 2021-08-24 | |
|
CVE-2021-30900
KEV
|
7.8 HIGH |
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 14.8.1 and iPadOS 14.8.1, iOS 15.1 and iPadOS 15.1. A malicious application may be able to execute arbitrary code with kernel privileges. |
0.5% | 2021-08-24 | |
|
CVE-2021-30883
KEV
|
7.8 HIGH |
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, macOS Big Sur 11.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.. |
0.4% | 2021-08-24 | |
|
CVE-2021-30869
KEV
|
7.8 HIGH |
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 12.5.5, iOS 14.4 and iPadOS 14.4, macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, Security Update 2021-006 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild. |
1.8% | 2021-08-24 | |
|
CVE-2021-30860
KEV
|
7.8 HIGH |
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
70.6% | 2021-08-24 | |
|
CVE-2021-30858
KEV
|
8.8 HIGH |
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
0.8% | 2021-08-24 | |
|
CVE-2021-39144
KEV
|
8.5 HIGH |
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. |
94.3% | 2021-08-23 | |
|
CVE-2021-35395
KEV
|
9.8 CRITICAL |
Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device. |
93.7% | 2021-08-16 | |
|
CVE-2021-35394
KEV
|
9.8 CRITICAL |
Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called 'MP Daemon' that is usually compiled as 'UDPServer' binary. The binary is affected by multiple memory corruption vulnerabilities and an arbitrary command injection vulnerability that can be exploited by remote unauthenticated attackers. |
94.2% | 2021-08-16 | |
|
CVE-2021-26086
KEV
|
5.3 MEDIUM |
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1. |
94.2% | 2021-08-16 | |
|
CVE-2021-36380
KEV
|
9.8 CRITICAL |
Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi. |
93.6% | 2021-08-13 | |
|
CVE-2021-36948
KEV
|
7.8 HIGH |
Windows Update Medic Service Elevation of Privilege Vulnerability |
1.1% | 2021-08-12 | |
|
CVE-2021-36942
KEV
|
7.5 HIGH |
Windows LSA Spoofing Vulnerability |
93.7% | 2021-08-12 | |
|
CVE-2021-34486
KEV
|
7.8 HIGH |
Windows Event Tracing Elevation of Privilege Vulnerability |
36.5% | 2021-08-12 | |
|
CVE-2021-34484
KEV
|
7.8 HIGH |
Windows User Profile Service Elevation of Privilege Vulnerability |
2.8% | 2021-08-12 | |
|
CVE-2021-20028
KEV
|
9.8 CRITICAL |
Improper neutralization of a SQL Command leading to SQL Injection vulnerability impacting end-of-life Secure Remote Access (SRA) products, specifically the SRA appliances running all 8.x firmware and 9.0.0.9-26sv or earlier |
82.9% | 2021-08-04 | |
|
CVE-2021-30563
KEV
|
8.8 HIGH |
Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
3.1% | 2021-08-03 | |
|
CVE-2021-26085
KEV
|
5.3 MEDIUM |
Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3. |
94.0% | 2021-08-03 | |
|
CVE-2021-36742
KEV
|
7.8 HIGH |
A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. |
1.4% | 2021-07-29 | |
|
CVE-2021-36741
KEV
|
8.8 HIGH |
An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the productοΏ½s management console in order to exploit this vulnerability. |
0.7% | 2021-07-29 | |
|
CVE-2021-35464
KEV
|
9.8 CRITICAL |
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier |
94.4% | 2021-07-22 | |
|
CVE-2021-36934
KEV
|
7.8 HIGH |
<p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker must have the ability to execute code on a victim system to exploit this vulnerability.</p> <p>After installing this security update, you <em>must</em> manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. <strong>Simply installing this security update will not fully mitigate this vulnerability.</strong> See <a href="https://support.microsoft.com/topic/1ceaa637-aaa3-4b58-a48b-baf72a2fa9e7">KB5005357- Delete Volume Shadow Copies</a>.</p> |
90.5% | 2021-07-22 | |
|
CVE-2021-34448
KEV
|
6.8 MEDIUM |
Scripting Engine Memory Corruption Vulnerability |
2.0% | 2021-07-16 | |
|
CVE-2021-35211
KEV
|
9.0 CRITICAL |
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability. |
94.3% | 2021-07-14 | |
|
CVE-2021-34523
KEV
|
9.0 CRITICAL |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
94.1% | 2021-07-14 | |
|
CVE-2021-34473
KEV
|
9.1 CRITICAL |
Microsoft Exchange Server Remote Code Execution Vulnerability |
94.2% | 2021-07-14 | |
|
CVE-2021-33771
KEV
|
7.8 HIGH |
Windows Kernel Elevation of Privilege Vulnerability |
6.6% | 2021-07-14 | |
|
CVE-2021-33766
KEV
|
7.3 HIGH |
Microsoft Exchange Server Information Disclosure Vulnerability |
93.6% | 2021-07-14 | |
|
CVE-2021-31979
KEV
|
7.8 HIGH |
Windows Kernel Elevation of Privilege Vulnerability |
8.1% | 2021-07-14 |