ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
158,201 |
CVE-2021-23986
| 6.5 | 4.3 |
MEDIUM
|
A malicious extension with the 'search' permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87.
|
CWE-346
|
158,202 |
CVE-2021-23987
| 8.8 | 6.8 |
HIGH
|
Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.
|
CWE-119
|
158,203 |
CVE-2021-23988
| 8.8 | 6.8 |
HIGH
|
Mozilla developers reported memory safety bugs present in Firefox 86. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 87.
|
CWE-119
|
158,204 |
CVE-2021-2399
| 4.9 | 4 |
MEDIUM
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
NVD-CWE-noinfo
|
158,205 |
CVE-2021-23991
| 6.8 | 4 |
MEDIUM
|
If a Thunderbird user has previously imported Alice's OpenPGP key, and Alice has extended the validity period of her key, but Alice's updated key has not yet been imported, an attacker may send an email containing a crafted version of Alice's key with an invalid subkey, Thunderbird might subsequently attempt to use the invalid subkey, and will fail to send encrypted email to Alice. This vulnerability affects Thunderbird < 78.9.1.
|
NVD-CWE-Other
|
158,206 |
CVE-2021-23992
| 4.3 | 4.3 |
MEDIUM
|
Thunderbird did not check if the user ID associated with an OpenPGP key has a valid self signature. An attacker may create a crafted version of an OpenPGP key, by either replacing the original user ID, or by adding another user ID. If Thunderbird imports and accepts the crafted key, the Thunderbird user may falsely conclude that the false user ID belongs to the correspondent. This vulnerability affects Thunderbird < 78.9.1.
|
CWE-347
|
158,207 |
CVE-2021-23993
| 6.5 | 4.3 |
MEDIUM
|
An attacker may perform a DoS attack to prevent a user from sending encrypted email to a correspondent. If an attacker creates a crafted OpenPGP key with a subkey that has an invalid self signature, and the Thunderbird user imports the crafted key, then Thunderbird may try to use the invalid subkey, but the RNP library rejects it from being used, causing encryption to fail. This vulnerability affects Thunderbird < 78.9.1.
|
CWE-327
|
158,208 |
CVE-2021-23994
| 8.8 | 6.8 |
HIGH
|
A WebGL framebuffer was not initialized early enough, resulting in memory corruption and an out of bound write. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
|
CWE-909
|
158,209 |
CVE-2021-23995
| 8.8 | 5.1 |
HIGH
|
When Responsive Design Mode was enabled, it used references to objects that were previously freed. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
|
CWE-672
|
158,210 |
CVE-2021-23996
| 6.5 | 4.3 |
MEDIUM
|
By utilizing 3D CSS in conjunction with Javascript, content could have been rendered outside the webpage's viewport, resulting in a spoofing attack that could have been used for phishing or other attacks on a user. This vulnerability affects Firefox < 88.
|
NVD-CWE-Other
|
158,211 |
CVE-2021-23997
| 8.8 | 6.8 |
HIGH
|
Due to unexpected data type conversions, a use-after-free could have occurred when interacting with the font cache. We presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox < 88.
|
CWE-681
|
158,212 |
CVE-2021-23998
| 6.5 | 4.3 |
MEDIUM
|
Through complicated navigations with new windows, an HTTP page could have inherited a secure lock icon from an HTTPS page. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
|
CWE-345
|
158,213 |
CVE-2021-23999
| 8.8 | 6.8 |
HIGH
|
If a Blob URL was loaded through some unusual user interaction, it could have been loaded by the System Principal and granted additional privileges that should not be granted to web content. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
|
CWE-269
|
158,214 |
CVE-2021-2400
| 7.5 | 5 |
HIGH
|
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: E-Business Suite - XDO). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle BI Publisher accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
NVD-CWE-noinfo
|
158,215 |
CVE-2021-24000
| 3.1 | 2.6 |
LOW
|
A race condition with requestPointerLock() and setTimeout() could have resulted in a user interacting with one tab when they believed they were on a separate tab. In conjunction with certain elements (such as <input type="file">) this could have led to an attack where a user was confused about the origin of the webpage and potentially disclosed information they did not intend to. This vulnerability affects Firefox < 88.
|
NVD-CWE-Other
|
158,216 |
CVE-2021-24001
| 4.3 | 4.3 |
MEDIUM
|
A compromised content process could have performed session history manipulations it should not have been able to due to testing infrastructure that was not restricted to testing-only configurations. This vulnerability affects Firefox < 88.
|
CWE-668
|
158,217 |
CVE-2021-24002
| 8.8 | 6.8 |
HIGH
|
When a user clicked on an FTP URL containing encoded newline characters (%0A and %0D), the newlines would have been interpreted as such and allowed arbitrary commands to be sent to the FTP server. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
|
CWE-88
|
158,218 |
CVE-2021-24005
| 7.5 | 5 |
HIGH
|
Usage of hard-coded cryptographic keys to encrypt configuration files and debug logs in FortiAuthenticator versions before 6.3.0 may allow an attacker with access to the files or the CLI configuration to decrypt the sensitive data, via knowledge of the hard-coded key.
|
CWE-798
|
158,219 |
CVE-2021-24006
| 8.8 | 6.5 |
HIGH
|
An improper access control vulnerability in FortiManager versions 6.4.0 to 6.4.3 may allow an authenticated attacker with a restricted user profile to access the SD-WAN Orchestrator panel via directly visiting its URL.
|
CWE-863
|
158,220 |
CVE-2021-24007
| 9.8 | 7.5 |
CRITICAL
|
Multiple improper neutralization of special elements of SQL commands vulnerabilities in FortiMail before 6.4.4 may allow a non-authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
|
CWE-89
|
158,221 |
CVE-2021-2401
| 5.3 | 5 |
MEDIUM
|
Vulnerability in the Oracle BI Publisher product of Oracle Fusion Middleware (component: E-Business Suite - XDO). Supported versions that are affected are 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
CWE-200
|
158,222 |
CVE-2021-24010
| 6.5 | 4 |
MEDIUM
|
Improper limitation of a pathname to a restricted directory vulnerabilities in FortiSandbox 3.2.0 through 3.2.2, and 3.1.0 through 3.1.4 may allow an authenticated user to obtain unauthorized access to files and data via specifially crafted web requests.
|
CWE-22
|
158,223 |
CVE-2021-24011
| 7.2 | 9 |
HIGH
|
A privilege escalation vulnerability in FortiNAC version below 8.8.2 may allow an admin user to escalate the privileges to root by abusing the sudo privileges.
|
CWE-269
|
158,224 |
CVE-2021-24012
| 7.3 | 7.5 |
HIGH
|
An improper following of a certificate's chain of trust vulnerability in FortiGate versions 6.4.0 to 6.4.4 may allow an LDAP user to connect to SSLVPN with any certificate that is signed by a trusted Certificate Authority.
|
CWE-295
|
158,225 |
CVE-2021-24013
| 6.5 | 4 |
MEDIUM
|
Multiple Path traversal vulnerabilities in the Webmail of FortiMail before 6.4.4 may allow a regular user to obtain unauthorized access to files and data via specifically crafted web requests.
|
CWE-22
|
158,226 |
CVE-2021-24014
| 6.1 | 4.3 |
MEDIUM
|
Multiple instances of improper neutralization of input during web page generation vulnerabilities in FortiSandbox before 4.0.0 may allow an unauthenticated attacker to perform an XSS attack via specifically crafted request parameters.
|
CWE-79
|
158,227 |
CVE-2021-24015
| 8.8 | 6.5 |
HIGH
|
An improper neutralization of special elements used in an OS Command vulnerability in the administrative interface of FortiMail before 6.4.4 may allow an authenticated attacker to execute unauthorized commands via specifically crafted HTTP requests.
|
CWE-78
|
158,228 |
CVE-2021-24016
| 6.3 | 9.3 |
MEDIUM
|
An improper neutralization of formula elements in a csv file in Fortinet FortiManager version 6.4.3 and below, 6.2.7 and below allows attacker to execute arbitrary commands via crafted IPv4 field in policy name, when exported as excel file and opened unsafely on the victim host.
|
CWE-1236
|
158,229 |
CVE-2021-24017
| 4.3 | 4 |
MEDIUM
|
An improper authentication in Fortinet FortiManager version 6.4.3 and below, 6.2.6 and below allows attacker to assign arbitrary Policy and Object modules via crafted requests to the request handler.
|
CWE-287
|
158,230 |
CVE-2021-24018
| 8.8 | 5.8 |
HIGH
|
A buffer underwrite vulnerability in the firmware verification routine of FortiOS before 7.0.1 may allow an attacker located in the adjacent network to potentially execute arbitrary code via a specifically crafted firmware image.
|
NVD-CWE-Other
|
158,231 |
CVE-2021-24019
| 9.8 | 7.5 |
CRITICAL
|
An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain that session ID (via other, hypothetical attacks)
|
CWE-613
|
158,232 |
CVE-2021-2402
| 4.9 | 4 |
MEDIUM
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
NVD-CWE-noinfo
|
158,233 |
CVE-2021-24020
| 9.8 | 7.5 |
CRITICAL
|
A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of signature verification.
|
CWE-326
|
158,234 |
CVE-2021-24021
| 5.4 | 3.5 |
MEDIUM
|
An improper neutralization of input vulnerability [CWE-79] in FortiAnalyzer versions 6.4.3 and below, 6.2.7 and below and 6.0.10 and below may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the column settings of Logview in FortiAnalyzer, should the attacker be able to obtain that POST request, via other, hypothetical attacks.
|
CWE-79
|
158,235 |
CVE-2021-24022
| 4.4 | 2.1 |
MEDIUM
|
A buffer overflow vulnerability in FortiAnalyzer CLI 6.4.5 and below, 6.2.7 and below, 6.0.x and FortiManager CLI 6.4.5 and below, 6.2.7 and below, 6.0.x may allow an authenticated, local attacker to perform a Denial of Service attack by running the `diagnose system geoip-city` command with a large ip value.
|
CWE-120
|
158,236 |
CVE-2021-24023
| 8.8 | 9 |
HIGH
|
An improper input validation in FortiAI v1.4.0 and earlier may allow an authenticated user to gain system shell access via a malicious payload in the "diagnose" command.
|
CWE-20
|
158,237 |
CVE-2021-24024
| 6.5 | 4 |
MEDIUM
|
A clear text storage of sensitive information into log file vulnerability in FortiADCManager 5.3.0 and below, 5.2.1 and below and FortiADC 5.3.7 and below may allow a remote authenticated attacker to read other local users' password in log files.
|
CWE-532
|
158,238 |
CVE-2021-24025
| 9.8 | 7.5 |
CRITICAL
|
Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
|
CWE-190
|
158,239 |
CVE-2021-24026
| 9.8 | 10 |
CRITICAL
|
A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write.
|
CWE-787
|
158,240 |
CVE-2021-24027
| 7.5 | 5 |
HIGH
|
A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device’s external storage to read cached TLS material.
|
CWE-668
|
158,241 |
CVE-2021-24028
| 9.8 | 7.5 |
CRITICAL
|
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
|
CWE-763
|
158,242 |
CVE-2021-24029
| 7.5 | 5 |
HIGH
|
A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects mvfst versions prior to commit a67083ff4b8dcbb7ee2839da6338032030d712b0 and proxygen versions prior to v2021.03.15.00.
|
CWE-617
|
158,243 |
CVE-2021-2403
| 5.3 | 5 |
MEDIUM
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
NVD-CWE-noinfo
|
158,244 |
CVE-2021-24030
| 9.8 | 7.5 |
CRITICAL
|
The fbgames protocol handler registered as part of Facebook Gameroom does not properly quote arguments passed to the executable. That allows a malicious URL to cause code execution. This issue affects versions prior to v1.26.0.
|
CWE-88
|
158,245 |
CVE-2021-24031
| 5.5 | 2.1 |
MEDIUM
|
In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.
|
CWE-276
|
158,246 |
CVE-2021-24032
| 4.7 | 1.9 |
MEDIUM
|
Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.
|
CWE-276
|
158,247 |
CVE-2021-24033
| 5.6 | 6.8 |
MEDIUM
|
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
|
CWE-78
|
158,248 |
CVE-2021-24035
| 9.1 | 6.4 |
CRITICAL
|
A lack of filename validation when unzipping archives prior to WhatsApp for Android v2.21.8.13 and WhatsApp Business for Android v2.21.8.13 could have allowed path traversal attacks that overwrite WhatsApp files.
|
CWE-22
|
158,249 |
CVE-2021-24036
| 9.8 | 7.5 |
CRITICAL
|
Passing an attacker controlled size when creating an IOBuf could cause integer overflow, leading to an out of bounds write on the heap with the possibility of remote code execution. This issue affects versions of folly prior to v2021.07.22.00. This issue affects HHVM versions prior to 4.80.5, all versions between 4.81.0 and 4.102.1, all versions between 4.103.0 and 4.113.0, and versions 4.114.0, 4.115.0, 4.116.0, 4.117.0, 4.118.0 and 4.118.1.
|
CWE-787
|
158,250 |
CVE-2021-24037
| 9.8 | 7.5 |
CRITICAL
|
A use after free in hermes, while emitting certain error messages, prior to commit d86e185e485b6330216dee8e854455c694e3a36e allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
|
CWE-416
|
158,251 |
CVE-2021-24038
| 7.8 | 4.6 |
HIGH
|
Due to a bug with management of handles in OVRServiceLauncher.exe, an attacker could expose a privileged process handle to an unprivileged process, leading to local privilege escalation. This issue affects Oculus Desktop versions after 1.39 and prior to 31.1.0.67.507.
|
CWE-269
|
158,252 |
CVE-2021-2404
| 6.5 | 6.4 |
MEDIUM
|
Vulnerability in the PeopleSoft Enterprise HCM Candidate Gateway product of Oracle PeopleSoft (component: e-mail notification). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise HCM Candidate Gateway. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise HCM Candidate Gateway accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise HCM Candidate Gateway accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
|
NVD-CWE-noinfo
|
158,253 |
CVE-2021-24040
| 9.8 | 7.5 |
CRITICAL
|
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
|
CWE-502
|
158,254 |
CVE-2021-24041
| 9.8 | 7.5 |
CRITICAL
|
A missing bounds check in image blurring code prior to WhatsApp for Android v2.21.22.7 and WhatsApp Business for Android v2.21.22.7 could have allowed an out-of-bounds write if a user sent a malicious image.
|
CWE-787
|
158,255 |
CVE-2021-24045
| 9.8 | 6.8 |
CRITICAL
|
A type confusion vulnerability could be triggered when resolving the "typeof" unary operator in Facebook Hermes prior to v0.10.0. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
|
CWE-843
|
158,256 |
CVE-2021-2405
| 8.1 | 5.5 |
HIGH
|
Vulnerability in the Oracle Engineering product of Oracle E-Business Suite (component: Change Management). Supported versions that are affected are 12.2.3-12.2.10. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Engineering. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Engineering accessible data as well as unauthorized access to critical data or complete access to all Oracle Engineering accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
NVD-CWE-noinfo
|
158,257 |
CVE-2021-2406
| 8.1 | 5.5 |
HIGH
|
Vulnerability in the Oracle Collaborative Planning product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Collaborative Planning. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Collaborative Planning accessible data as well as unauthorized access to critical data or complete access to all Oracle Collaborative Planning accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
NVD-CWE-noinfo
|
158,258 |
CVE-2021-24066
| 8.8 | 6.5 |
HIGH
|
Microsoft SharePoint Remote Code Execution Vulnerability
|
CWE-502
|
158,259 |
CVE-2021-24067
| 7.8 | 6.8 |
HIGH
|
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24068, CVE-2021-24069, CVE-2021-24070.
|
CWE-416
|
158,260 |
CVE-2021-24068
| 7.8 | 6.8 |
HIGH
|
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24069, CVE-2021-24070.
|
NVD-CWE-noinfo
|
158,261 |
CVE-2021-24069
| 7.8 | 6.8 |
HIGH
|
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24068, CVE-2021-24070.
|
NVD-CWE-noinfo
|
158,262 |
CVE-2021-2407
| 5.3 | 5 |
MEDIUM
|
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.57, 8.58 and 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
NVD-CWE-noinfo
|
158,263 |
CVE-2021-24070
| 7.8 | 6.8 |
HIGH
|
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24068, CVE-2021-24069.
|
CWE-416
|
158,264 |
CVE-2021-24071
| 6.5 | 4 |
MEDIUM
|
Microsoft SharePoint Information Disclosure Vulnerability
|
CWE-200
|
158,265 |
CVE-2021-24072
| 8.8 | 6.5 |
HIGH
|
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
NVD-CWE-noinfo
|
158,266 |
CVE-2021-24073
| 7.1 | 5.8 |
HIGH
|
Skype for Business and Lync Spoofing Vulnerability
|
NVD-CWE-noinfo
|
158,267 |
CVE-2021-24074
| 9.8 | 7.5 |
CRITICAL
|
Windows TCP/IP Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24094.
|
NVD-CWE-noinfo
|
158,268 |
CVE-2021-24075
| 6.8 | 3.5 |
MEDIUM
|
Windows Network File System Denial of Service Vulnerability
|
NVD-CWE-noinfo
|
158,269 |
CVE-2021-24076
| 5.5 | 2.1 |
MEDIUM
|
Microsoft Windows VMSwitch Information Disclosure Vulnerability
|
CWE-200
|
158,270 |
CVE-2021-24077
| 9.8 | 7.5 |
CRITICAL
|
Windows Fax Service Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1722.
|
NVD-CWE-noinfo
|
158,271 |
CVE-2021-24078
| 9.8 | 7.5 |
CRITICAL
|
Windows DNS Server Remote Code Execution Vulnerability
|
NVD-CWE-noinfo
|
158,272 |
CVE-2021-24079
| 5.5 | 2.1 |
MEDIUM
|
Windows Backup Engine Information Disclosure Vulnerability
|
CWE-200
|
158,273 |
CVE-2021-2408
| 6.1 | 5.8 |
MEDIUM
|
Vulnerability in the PeopleSoft Enterprise PT PeopleTools product of Oracle PeopleSoft (component: Notification Configuration). The supported version that is affected is 8.59. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PT PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PT PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PT PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PT PeopleTools accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
NVD-CWE-noinfo
|
158,274 |
CVE-2021-24080
| 6.5 | 4.3 |
MEDIUM
|
Windows Trust Verification API Denial of Service Vulnerability
|
NVD-CWE-noinfo
|
158,275 |
CVE-2021-24081
| 7.8 | 6.8 |
HIGH
|
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
|
CWE-787
|
158,276 |
CVE-2021-24082
| 6.5 | 4 |
MEDIUM
|
Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass Vulnerability
|
NVD-CWE-noinfo
|
158,277 |
CVE-2021-24083
| 7.8 | 6.8 |
HIGH
|
Windows Address Book Remote Code Execution Vulnerability
|
CWE-787
|
158,278 |
CVE-2021-24084
| 5.5 | 4.9 |
MEDIUM
|
Windows Mobile Device Management Information Disclosure Vulnerability
|
CWE-200
|
158,279 |
CVE-2021-24085
| 5.5 | 6 |
MEDIUM
|
Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-1730.
|
NVD-CWE-noinfo
|
158,280 |
CVE-2021-24086
| 7.5 | 5 |
HIGH
|
Windows TCP/IP Denial of Service Vulnerability
|
NVD-CWE-noinfo
|
158,281 |
CVE-2021-24087
| 7.8 | 4.6 |
HIGH
|
Azure IoT CLI extension Elevation of Privilege Vulnerability
|
CWE-269
|
158,282 |
CVE-2021-24088
| 8.8 | 6.5 |
HIGH
|
Windows Local Spooler Remote Code Execution Vulnerability
|
NVD-CWE-noinfo
|
158,283 |
CVE-2021-24089
| 7.8 | 6.8 |
HIGH
|
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.
|
NVD-CWE-noinfo
|
158,284 |
CVE-2021-2409
| 8.2 | 4.6 |
HIGH
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.24. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
|
NVD-CWE-noinfo
|
158,285 |
CVE-2021-24090
| 7.8 | 9.3 |
HIGH
|
Windows Error Reporting Elevation of Privilege Vulnerability
|
CWE-269
|
158,286 |
CVE-2021-24091
| 8.8 | 6.8 |
HIGH
|
Windows Camera Codec Pack Remote Code Execution Vulnerability
|
CWE-787
|
158,287 |
CVE-2021-24092
| 7.8 | 4.6 |
HIGH
|
Microsoft Defender Elevation of Privilege Vulnerability
|
CWE-269
|
158,288 |
CVE-2021-24093
| 8.8 | 6.8 |
HIGH
|
Windows Graphics Component Remote Code Execution Vulnerability
|
NVD-CWE-noinfo
|
158,289 |
CVE-2021-24094
| 9.8 | 7.5 |
CRITICAL
|
Windows TCP/IP Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24074.
|
NVD-CWE-noinfo
|
158,290 |
CVE-2021-24095
| 7.8 | 4.6 |
HIGH
|
DirectX Elevation of Privilege Vulnerability
|
CWE-269
|
158,291 |
CVE-2021-24096
| 7.8 | 4.6 |
HIGH
|
Windows Kernel Elevation of Privilege Vulnerability
|
CWE-269
|
158,292 |
CVE-2021-24098
| 5.5 | 2.1 |
MEDIUM
|
Windows Console Driver Denial of Service Vulnerability
|
NVD-CWE-noinfo
|
158,293 |
CVE-2021-24099
| 6.5 | 4 |
MEDIUM
|
Skype for Business and Lync Denial of Service Vulnerability
|
NVD-CWE-noinfo
|
158,294 |
CVE-2021-2410
| 4.9 | 4 |
MEDIUM
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
NVD-CWE-noinfo
|
158,295 |
CVE-2021-24100
| 4.4 | 2.6 |
MEDIUM
|
Microsoft Edge for Android Information Disclosure Vulnerability
|
CWE-200
|
158,296 |
CVE-2021-24101
| 6.5 | 4 |
MEDIUM
|
Microsoft Dataverse Information Disclosure Vulnerability
|
CWE-200
|
158,297 |
CVE-2021-24102
| 7.8 | 4.6 |
HIGH
|
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-24103.
|
CWE-269
|
158,298 |
CVE-2021-24103
| 7.8 | 4.6 |
HIGH
|
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-24102.
|
CWE-269
|
158,299 |
CVE-2021-24104
| 5.4 | 5.8 |
MEDIUM
|
Microsoft SharePoint Spoofing Vulnerability
|
CWE-20
|
158,300 |
CVE-2021-24105
| 7.8 | 6.8 |
HIGH
|
Package Managers Configurations Remote Code Execution Vulnerability
|
NVD-CWE-noinfo
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.