Search and browse vulnerability records from NVD
Showing 50 of 8456 CVEs
| CVE ID | Severity | Description | EPSS | Published | |
|---|---|---|---|---|---|
|
CVE-2021-22894
KEV
|
8.8 HIGH |
A buffer overflow vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to execute arbitrary code as the root user via maliciously crafted meeting room. |
50.6% | 2021-05-27 | |
| 7.8 HIGH |
A flaw was found in libcaca. A buffer overflow of export.c in function export_troff might lead to memory corruption and other potential consequences. |
0.1% | 2021-05-27 | ||
| 7.8 HIGH |
A flaw was found in libcaca. A heap buffer overflow in export.c in function export_tga might lead to memory corruption and other potential consequences. |
0.1% | 2021-05-26 | ||
|
CVE-2021-29256
KEV
|
8.8 HIGH |
. The Arm Mali GPU kernel driver allows an unprivileged user to achieve access to freed memory, leading to information disclosure or root privilege escalation. This affects Bifrost r16p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r28p0 through r30p0. |
0.6% | 2021-05-24 | |
| 8.1 HIGH |
Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, reflecting the authentication evidence from a Provisioner, to complete authentication without possessing the AuthValue, and potentially acquire a NetKey and AppKey. |
1.2% | 2021-05-24 | ||
| 8.8 HIGH |
Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (participating in the provisioning protocol) to identify the AuthValue used given the Provisionerโs public key, and the confirmation number and nonce provided by the provisioning device. This could permit a device without the AuthValue to complete provisioning without brute-forcing the AuthValue. |
1.7% | 2021-05-24 | ||
| 7.5 HIGH |
Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (without possession of the AuthValue used in the provisioning protocol) to determine the AuthValue via a brute-force attack (unless the AuthValue is sufficiently random and changed each time). |
1.2% | 2021-05-24 | ||
| 8.6 HIGH |
There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application. |
0.1% | 2021-05-19 | ||
|
CVE-2021-28664
KEV
|
8.8 HIGH |
The Arm Mali GPU kernel driver allows privilege escalation or a denial of service (memory corruption) because an unprivileged user can achieve read/write access to read-only pages. This affects Bifrost r0p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r8p0 through r30p0 before r31p0. |
0.2% | 2021-05-10 | |
|
CVE-2021-28663
KEV
|
8.8 HIGH |
The Arm Mali GPU kernel driver allows privilege escalation or information disclosure because GPU memory operations are mishandled, leading to a use-after-free. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r4p0 through r30p0. |
2.4% | 2021-05-10 | |
|
CVE-2021-1905
KEV
|
8.4 HIGH |
Possible use after free due to improper handling of memory mapping of multiple processes simultaneously. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables |
0.9% | 2021-05-07 | |
|
CVE-2021-21551
KEV
|
8.8 HIGH |
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required. |
72.2% | 2021-05-04 | |
|
CVE-2021-21224
KEV
|
8.8 HIGH |
Type confusion in V8 in Google Chrome prior to 90.0.4430.85 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. |
54.3% | 2021-04-26 | |
|
CVE-2021-21220
KEV
|
8.8 HIGH |
Insufficient validation of untrusted input in V8 in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
90.5% | 2021-04-26 | |
|
CVE-2021-21206
KEV
|
8.8 HIGH |
Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
21.9% | 2021-04-26 | |
| 8.8 HIGH |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype. |
30.1% | 2021-04-23 | ||
|
CVE-2021-3493
KEV
|
8.8 HIGH |
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges. |
76.8% | 2021-04-17 | |
|
CVE-2021-28310
KEV
|
7.8 HIGH |
Win32k Elevation of Privilege Vulnerability |
60.3% | 2021-04-13 | |
| 8.0 HIGH |
Valve Steam before 2021-04-17, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click. |
11.0% | 2021-04-10 | ||
|
CVE-2021-20022
KEV
|
7.2 HIGH |
SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host. |
32.6% | 2021-04-09 | |
|
CVE-2021-1789
KEV
|
8.8 HIGH |
A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution. |
0.2% | 2021-04-02 | |
|
CVE-2021-1782
KEV
|
7.0 HIGH |
A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited.. |
7.9% | 2021-04-02 | |
|
CVE-2021-21975
KEV
|
7.5 HIGH |
Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials. |
94.4% | 2021-03-31 | |
|
CVE-2021-22506
KEV
|
7.5 HIGH |
Advance configuration exposing Information Leakage vulnerability in Micro Focus Access Manager product, affects all versions prior to version 5.0. The vulnerability could cause information leakage. |
10.5% | 2021-03-26 | |
| 7.5 HIGH |
decompress_gunzip.c in BusyBox through 1.32.1 mishandles the error bit on the huft_build result pointer, with a resultant invalid free or segmentation fault, via malformed gzip data. |
1.0% | 2021-03-19 | ||
| 7.5 HIGH |
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. |
0.4% | 2021-03-18 | ||
|
CVE-2021-21193
KEV
|
8.8 HIGH |
Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
14.8% | 2021-03-16 | |
|
CVE-2021-27085
KEV
|
8.8 HIGH |
Internet Explorer Remote Code Execution Vulnerability |
2.2% | 2021-03-11 | |
|
CVE-2021-27059
KEV
|
7.6 HIGH |
Microsoft Office Remote Code Execution Vulnerability |
2.3% | 2021-03-11 | |
|
CVE-2021-26411
KEV
|
8.8 HIGH |
Internet Explorer Memory Corruption Vulnerability |
92.5% | 2021-03-11 | |
|
CVE-2021-21166
KEV
|
8.8 HIGH |
Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
61.1% | 2021-03-09 | |
|
CVE-2021-27065
KEV
|
7.8 HIGH |
Microsoft Exchange Server Remote Code Execution Vulnerability |
94.3% | 2021-03-03 | |
|
CVE-2021-26858
KEV
|
7.8 HIGH |
Microsoft Exchange Server Remote Code Execution Vulnerability |
53.3% | 2021-03-03 | |
|
CVE-2021-26857
KEV
|
7.8 HIGH |
Microsoft Exchange Server Remote Code Execution Vulnerability |
36.9% | 2021-03-03 | |
|
CVE-2021-27878
KEV
|
8.8 HIGH |
An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. The attacker could use one of these commands to execute an arbitrary command on the system using system privileges. |
6.9% | 2021-03-01 | |
|
CVE-2021-27877
KEV
|
8.2 HIGH |
An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands. |
29.4% | 2021-03-01 | |
|
CVE-2021-27876
KEV
|
8.1 HIGH |
An issue was discovered in Veritas Backup Exec before 21.2. The communication between a client and an Agent requires successful authentication, which is typically completed over a secure TLS communication. However, due to a vulnerability in the SHA Authentication scheme, an attacker is able to gain unauthorized access and complete the authentication process. Subsequently, the client can execute data management protocol commands on the authenticated connection. By using crafted input parameters in one of these commands, an attacker can access an arbitrary file on the system using System privileges. |
2.0% | 2021-03-01 | |
| 7.5 HIGH |
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range. |
0.3% | 2021-02-26 | ||
|
CVE-2021-1732
KEV
|
7.8 HIGH |
Windows Win32k Elevation of Privilege Vulnerability |
91.0% | 2021-02-25 | |
| 8.1 HIGH |
scp.c in Dropbear before 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685. |
0.3% | 2021-02-25 | ||
| 8.2 HIGH |
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. |
1.4% | 2021-02-24 | ||
| 7.8 HIGH |
The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT. |
0.1% | 2021-02-17 | ||
| 7.8 HIGH |
The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT. |
0.1% | 2021-02-17 | ||
| 7.2 HIGH |
An arbitrary file upload vulnerability has been identified in posts.php in Baby Care System 1.0. The vulnerability could be exploited by an remote attacker to upload content to the server, including PHP files, which could result in command execution and obtaining a shell. |
4.0% | 2021-02-17 | ||
|
CVE-2021-27102
KEV
|
7.8 HIGH |
Accellion FTA 9_12_411 and earlier is affected by OS command execution via a local web service call. The fixed version is FTA_9_12_416 and later. |
0.3% | 2021-02-16 | |
|
CVE-2021-21315
KEV
|
7.1 HIGH |
The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected. |
93.8% | 2021-02-16 | |
|
CVE-2021-25298
KEV
|
8.8 HIGH |
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/cloud-vm/cloud-vm.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server. |
80.3% | 2021-02-15 | |
|
CVE-2021-25297
KEV
|
8.8 HIGH |
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server. |
60.6% | 2021-02-15 | |
|
CVE-2021-25296
KEV
|
8.8 HIGH |
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server. |
93.7% | 2021-02-15 | |
| 7.5 HIGH |
An issue was discovered in OpenZFS through 2.0.3. When an NFS share is exported to IPv6 addresses via the sharenfs feature, there is a silent failure to parse the IPv6 address data, and access is allowed to everyone. IPv6 restrictions from the configuration are not applied. |
0.2% | 2021-02-12 |