ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
158,201
CVE-2021-23986
6.5
4.3
MEDIUM
A malicious extension with the 'search' permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87.
CWE-346
158,202
CVE-2021-23987
8.8
6.8
HIGH
Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.
CWE-119
158,203
CVE-2021-23988
8.8
6.8
HIGH
Mozilla developers reported memory safety bugs present in Firefox 86. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 87.
CWE-119
158,204
CVE-2021-2399
4.9
4
MEDIUM
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
NVD-CWE-noinfo
158,205
CVE-2021-23991
6.8
4
MEDIUM
If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.
NVD-CWE-Other
158,206
CVE-2021-23992
4.3
4.3
MEDIUM
Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.
CWE-347
158,207
CVE-2021-23993
6.5
4.3
MEDIUM
An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.
CWE-327
158,208
CVE-2021-23994
8.8
6.8
HIGH
A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
CWE-909
158,209
CVE-2021-23995
8.8
5.1
HIGH
When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
CWE-672
158,210
CVE-2021-23996
6.5
4.3
MEDIUM
By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user. This vulnerability affects Firefox < 88.
NVD-CWE-Other
158,211
CVE-2021-23997
8.8
6.8
HIGH
Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox < 88.
CWE-681
158,212
CVE-2021-23998
6.5
4.3
MEDIUM
Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
CWE-345
158,213
CVE-2021-23999
8.8
6.8
HIGH
If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
CWE-269
158,214
CVE-2021-2400
7.5
5
HIGH
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: E-Business Suite - XDO). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
NVD-CWE-noinfo
158,215
CVE-2021-24000
3.1
2.6
LOW
A race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as &lt;input type="file"&gt;) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to. This vulnerability affects Firefox < 88.
NVD-CWE-Other
158,216
CVE-2021-24001
4.3
4.3
MEDIUM
A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations. This vulnerability affects Firefox < 88.
CWE-668
158,217
CVE-2021-24002
8.8
6.8
HIGH
When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
CWE-88
158,218
CVE-2021-24005
7.5
5
HIGH
Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key.
CWE-798
158,219
CVE-2021-24006
8.8
6.5
HIGH
An improper access control vulnerability in FortiManager versions 6.4.0 to 6.4.3 may allow an authenticated attacker with a restricted user profile to access the SD-WAN Orchestrator panel via directly visiting its URL.
CWE-863
158,220
CVE-2021-24007
9.8
7.5
CRITICAL
Multiple improper neutralization of special elements of SQL commands vulnerabilities in FortiMail before 6.4.4 may allow a non-authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
CWE-89
158,221
CVE-2021-2401
5.3
5
MEDIUM
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: E-Business Suite - XDO). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
CWE-200
158,222
CVE-2021-24010
6.5
4
MEDIUM
Improper limitation of a pathname to a restricted directory vulnerabilities in FortiSandbox 3.2.0 through 3.2.2, and 3.1.0 through 3.1.4 may allow an authenticated user to obtain unauthorized access to files and data via specifially crafted web requests.
CWE-22
158,223
CVE-2021-24011
7.2
9
HIGH
A privilege escalation vulnerability in FortiNAC version below 8.8.2 may allow an admin user to escalate the privileges to root by abusing the sudo privileges.
CWE-269
158,224
CVE-2021-24012
7.3
7.5
HIGH
An improper following of a certificate's chain of trust vulnerability in FortiGate versions 6.4.0 to 6.4.4 may allow an LDAP user to connect to SSLVPN with any certificate that is signed by a trusted Certificate Authority.
CWE-295
158,225
CVE-2021-24013
6.5
4
MEDIUM
Multiple Path traversal vulnerabilities in the Webmail of FortiMail before 6.4.4 may allow a regular user to obtain unauthorized access to files and data via specifically crafted web requests.
CWE-22
158,226
CVE-2021-24014
6.1
4.3
MEDIUM
Multiple instances of improper neutralization of input during web page generation vulnerabilities in FortiSandbox before 4.0.0 may allow an unauthenticated attacker to perform an XSS attack via specifically crafted request parameters.
CWE-79
158,227
CVE-2021-24015
8.8
6.5
HIGH
An improper neutralization of special elements used in an OS Command vulnerability in the administrative interface of FortiMail before 6.4.4 may allow an authenticated attacker to execute unauthorized commands via specifically crafted HTTP requests.
CWE-78
158,228
CVE-2021-24016
6.3
9.3
MEDIUM
An improper neutralization of formula elements in a csv file in Fortinet FortiManager version 6.4.3 and below, 6.2.7 and below allows attacker to execute arbitrary commands via crafted IPv4 field in policy name, when exported as excel file and opened unsafely on the victim host.
CWE-1236
158,229
CVE-2021-24017
4.3
4
MEDIUM
An improper authentication in Fortinet FortiManager version 6.4.3 and below, 6.2.6 and below allows attacker to assign arbitrary Policy and Object modules via crafted requests to the request handler.
CWE-287
158,230
CVE-2021-24018
8.8
5.8
HIGH
A buffer underwrite vulnerability in the firmware verification routine of FortiOS before 7.0.1 may allow an attacker located in the adjacent network to potentially execute arbitrary code via a specifically crafted firmware image.
NVD-CWE-Other
158,231
CVE-2021-24019
9.8
7.5
CRITICAL
An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
CWE-613
158,232
CVE-2021-2402
4.9
4
MEDIUM
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
NVD-CWE-noinfo
158,233
CVE-2021-24020
9.8
7.5
CRITICAL
A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of signature verification.
CWE-326
158,234
CVE-2021-24021
5.4
3.5
MEDIUM
An improper neutralization of input vulnerability [CWE-79] in FortiAnalyzer versions 6.4.3 and below, 6.2.7 and below and 6.0.10 and below may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the column settings of Logview in FortiAnalyzer, should the attacker be able to obtain that POST request, via other, hypothetical attacks.
CWE-79
158,235
CVE-2021-24022
4.4
2.1
MEDIUM
A buffer overflow vulnerability in FortiAnalyzer CLI 6.4.5 and below, 6.2.7 and below, 6.0.x and FortiManager CLI 6.4.5 and below, 6.2.7 and below, 6.0.x may allow an authenticated, local attacker to perform a Denial of Service attack by running the `diagnose system geoip-city` command with a large ip value.
CWE-120
158,236
CVE-2021-24023
8.8
9
HIGH
An improper input validation in FortiAI v1.4.0 and earlier may allow an authenticated user to gain system shell access via a malicious payload in the "diagnose" command.
CWE-20
158,237
CVE-2021-24024
6.5
4
MEDIUM
A clear text storage of sensitive information into log file vulnerability in FortiADCManager 5.3.0 and below, 5.2.1 and below and FortiADC 5.3.7 and below may allow a remote authenticated attacker to read other local users' password in log files.
CWE-532
158,238
CVE-2021-24025
9.8
7.5
CRITICAL
Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
CWE-190
158,239
CVE-2021-24026
9.8
10
CRITICAL
A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write.
CWE-787
158,240
CVE-2021-24027
7.5
5
HIGH
A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device’s external storage to read cached TLS material.
CWE-668
158,241
CVE-2021-24028
9.8
7.5
CRITICAL
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
CWE-763
158,242
CVE-2021-24029
7.5
5
HIGH
A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects mvfst versions prior to commit a67083ff4b8dcbb7ee2839da6338032030d712b0 and proxygen versions prior to v2021.03.15.00.
CWE-617
158,243
CVE-2021-2403
5.3
5
MEDIUM
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
NVD-CWE-noinfo
158,244
CVE-2021-24030
9.8
7.5
CRITICAL
The fbgames protocol handler registered as part of Facebook Gameroom does not properly quote arguments passed to the executable. That allows a malicious URL to cause code execution. This issue affects versions prior to v1.26.0.
CWE-88
158,245
CVE-2021-24031
5.5
2.1
MEDIUM
In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.
CWE-276
158,246
CVE-2021-24032
4.7
1.9
MEDIUM
Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.
CWE-276
158,247
CVE-2021-24033
5.6
6.8
MEDIUM
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
CWE-78
158,248
CVE-2021-24035
9.1
6.4
CRITICAL
A lack of filename validation when unzipping archives prior to WhatsApp for Android v2.21.8.13 and WhatsApp Business for Android v2.21.8.13 could have allowed path traversal attacks that overwrite WhatsApp files.
CWE-22
158,249
CVE-2021-24036
9.8
7.5
CRITICAL
Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1.
CWE-787
158,250
CVE-2021-24037
9.8
7.5
CRITICAL
A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
CWE-416
158,251
CVE-2021-24038
7.8
4.6
HIGH
Due to a bug with management of handles in OVRServiceLauncher.exe, an attacker could expose a privileged process handle to an unprivileged process, leading to local privilege escalation. This issue affects Oculus Desktop versions after 1.39 and prior to 31.1.0.67.507.
CWE-269
158,252
CVE-2021-2404
6.5
6.4
MEDIUM
Vulnerability in the PeopleSoft Enterprise HCM Candidate Gateway product of Oracle PeopleSoft (component: e-mail notification). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Candidate Gateway. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Candidate Gateway accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Candidate Gateway accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
NVD-CWE-noinfo
158,253
CVE-2021-24040
9.8
7.5
CRITICAL
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
CWE-502
158,254
CVE-2021-24041
9.8
7.5
CRITICAL
A missing bounds check in image blurring code prior to WhatsApp for Android v2.21.22.7 and WhatsApp Business for Android v2.21.22.7 could have allowed an out-of-bounds write if a user sent a malicious image.
CWE-787
158,255
CVE-2021-24045
9.8
6.8
CRITICAL
A type confusion vulnerability could be triggered when resolving the "typeof" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
CWE-843
158,256
CVE-2021-2405
8.1
5.5
HIGH
Vulnerability in the Oracle Engineering product of Oracle E-Business Suite (component: Change Management). Supported versions that are affected are 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Engineering. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Engineering accessible data as well as unauthorized access to critical data or complete access to all Oracle Engineering accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
NVD-CWE-noinfo
158,257
CVE-2021-2406
8.1
5.5
HIGH
Vulnerability in the Oracle Collaborative Planning product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Collaborative Planning. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Collaborative Planning accessible data as well as unauthorized access to critical data or complete access to all Oracle Collaborative Planning accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
NVD-CWE-noinfo
158,258
CVE-2021-24066
8.8
6.5
HIGH
Microsoft SharePoint Remote Code Execution Vulnerability
CWE-502
158,259
CVE-2021-24067
7.8
6.8
HIGH
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24068, CVE-2021-24069, CVE-2021-24070.
CWE-416
158,260
CVE-2021-24068
7.8
6.8
HIGH
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24069, CVE-2021-24070.
NVD-CWE-noinfo
158,261
CVE-2021-24069
7.8
6.8
HIGH
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24068, CVE-2021-24070.
NVD-CWE-noinfo
158,262
CVE-2021-2407
5.3
5
MEDIUM
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
NVD-CWE-noinfo
158,263
CVE-2021-24070
7.8
6.8
HIGH
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24068, CVE-2021-24069.
CWE-416
158,264
CVE-2021-24071
6.5
4
MEDIUM
Microsoft SharePoint Information Disclosure Vulnerability
CWE-200
158,265
CVE-2021-24072
8.8
6.5
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability
NVD-CWE-noinfo
158,266
CVE-2021-24073
7.1
5.8
HIGH
Skype for Business and Lync Spoofing Vulnerability
NVD-CWE-noinfo
158,267
CVE-2021-24074
9.8
7.5
CRITICAL
Windows TCP/IP Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24094.
NVD-CWE-noinfo
158,268
CVE-2021-24075
6.8
3.5
MEDIUM
Windows Network File System Denial of Service Vulnerability
NVD-CWE-noinfo
158,269
CVE-2021-24076
5.5
2.1
MEDIUM
Microsoft Windows VMSwitch Information Disclosure Vulnerability
CWE-200
158,270
CVE-2021-24077
9.8
7.5
CRITICAL
Windows Fax Service Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1722.
NVD-CWE-noinfo
158,271
CVE-2021-24078
9.8
7.5
CRITICAL
Windows DNS Server Remote Code Execution Vulnerability
NVD-CWE-noinfo
158,272
CVE-2021-24079
5.5
2.1
MEDIUM
Windows Backup Engine Information Disclosure Vulnerability
CWE-200
158,273
CVE-2021-2408
6.1
5.8
MEDIUM
Vulnerability in the PeopleSoft Enterprise PT PeopleTools product of Oracle PeopleSoft (component: Notification Configuration). The supported version that is affected is 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PT PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PT PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PT PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PT PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
NVD-CWE-noinfo
158,274
CVE-2021-24080
6.5
4.3
MEDIUM
Windows Trust Verification API Denial of Service Vulnerability
NVD-CWE-noinfo
158,275
CVE-2021-24081
7.8
6.8
HIGH
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
CWE-787
158,276
CVE-2021-24082
6.5
4
MEDIUM
Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
NVD-CWE-noinfo
158,277
CVE-2021-24083
7.8
6.8
HIGH
Windows Address Book Remote Code Execution Vulnerability
CWE-787
158,278
CVE-2021-24084
5.5
4.9
MEDIUM
Windows Mobile Device Management Information Disclosure Vulnerability
CWE-200
158,279
CVE-2021-24085
5.5
6
MEDIUM
Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-1730.
NVD-CWE-noinfo
158,280
CVE-2021-24086
7.5
5
HIGH
Windows TCP/IP Denial of Service Vulnerability
NVD-CWE-noinfo
158,281
CVE-2021-24087
7.8
4.6
HIGH
Azure IoT CLI extension Elevation of Privilege Vulnerability
CWE-269
158,282
CVE-2021-24088
8.8
6.5
HIGH
Windows Local Spooler Remote Code Execution Vulnerability
NVD-CWE-noinfo
158,283
CVE-2021-24089
7.8
6.8
HIGH
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.
NVD-CWE-noinfo
158,284
CVE-2021-2409
8.2
4.6
HIGH
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
NVD-CWE-noinfo
158,285
CVE-2021-24090
7.8
9.3
HIGH
Windows Error Reporting Elevation of Privilege Vulnerability
CWE-269
158,286
CVE-2021-24091
8.8
6.8
HIGH
Windows Camera Codec Pack Remote Code Execution Vulnerability
CWE-787
158,287
CVE-2021-24092
7.8
4.6
HIGH
Microsoft Defender Elevation of Privilege Vulnerability
CWE-269
158,288
CVE-2021-24093
8.8
6.8
HIGH
Windows Graphics Component Remote Code Execution Vulnerability
NVD-CWE-noinfo
158,289
CVE-2021-24094
9.8
7.5
CRITICAL
Windows TCP/IP Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24074.
NVD-CWE-noinfo
158,290
CVE-2021-24095
7.8
4.6
HIGH
DirectX Elevation of Privilege Vulnerability
CWE-269
158,291
CVE-2021-24096
7.8
4.6
HIGH
Windows Kernel Elevation of Privilege Vulnerability
CWE-269
158,292
CVE-2021-24098
5.5
2.1
MEDIUM
Windows Console Driver Denial of Service Vulnerability
NVD-CWE-noinfo
158,293
CVE-2021-24099
6.5
4
MEDIUM
Skype for Business and Lync Denial of Service Vulnerability
NVD-CWE-noinfo
158,294
CVE-2021-2410
4.9
4
MEDIUM
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
NVD-CWE-noinfo
158,295
CVE-2021-24100
4.4
2.6
MEDIUM
Microsoft Edge for Android Information Disclosure Vulnerability
CWE-200
158,296
CVE-2021-24101
6.5
4
MEDIUM
Microsoft Dataverse Information Disclosure Vulnerability
CWE-200
158,297
CVE-2021-24102
7.8
4.6
HIGH
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-24103.
CWE-269
158,298
CVE-2021-24103
7.8
4.6
HIGH
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-24102.
CWE-269
158,299
CVE-2021-24104
5.4
5.8
MEDIUM
Microsoft SharePoint Spoofing Vulnerability
CWE-20
158,300
CVE-2021-24105
7.8
6.8
HIGH
Package Managers Configurations Remote Code Execution Vulnerability
NVD-CWE-noinfo