ID
int64 1
170k
| CVE-ID
stringlengths 13
16
| CVSS-V3
float64 1.8
10
⌀ | CVSS-V2
float64 0
10
⌀ | SEVERITY
stringclasses 4
values | DESCRIPTION
stringlengths 20
3.84k
| CWE-ID
stringlengths 5
14
|
---|---|---|---|---|---|---|
161,001 | CVE-2021-28454 | 7.8 | 6.8 | HIGH | Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28451. | CWE-416 |
161,002 | CVE-2021-28455 | 8.8 | 6.5 | HIGH | Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability | CWE-77 |
161,003 | CVE-2021-28456 | 5.5 | 4.3 | MEDIUM | Microsoft Excel Information Disclosure Vulnerability | NVD-CWE-noinfo |
161,004 | CVE-2021-28457 | 7.8 | 6.8 | HIGH | Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28469, CVE-2021-28473, CVE-2021-28475, CVE-2021-28477. | NVD-CWE-noinfo |
161,005 | CVE-2021-28458 | 7.8 | 6.8 | HIGH | Azure ms-rest-nodeauth Library Elevation of Privilege Vulnerability | CWE-269 |
161,006 | CVE-2021-28459 | 6.1 | 4.3 | MEDIUM | Azure DevOps Server Spoofing Vulnerability | CWE-79 |
161,007 | CVE-2021-28460 | 7.8 | 4.6 | HIGH | Azure Sphere Unsigned Code Execution Vulnerability | NVD-CWE-noinfo |
161,008 | CVE-2021-28461 | 5.4 | 3.5 | MEDIUM | Dynamics Finance and Operations Cross-site Scripting Vulnerability | CWE-79 |
161,009 | CVE-2021-28464 | 7.8 | 6.8 | HIGH | VP9 Video Extensions Remote Code Execution Vulnerability | NVD-CWE-noinfo |
161,010 | CVE-2021-28465 | 7.8 | 6.8 | HIGH | Web Media Extensions Remote Code Execution Vulnerability | CWE-77 |
161,011 | CVE-2021-28466 | 7.8 | 6.8 | HIGH | Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28468. | NVD-CWE-noinfo |
161,012 | CVE-2021-28468 | 7.8 | 6.8 | HIGH | Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28466. | CWE-843 |
161,013 | CVE-2021-28469 | 7.8 | 6.8 | HIGH | Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28457, CVE-2021-28473, CVE-2021-28475, CVE-2021-28477. | NVD-CWE-noinfo |
161,014 | CVE-2021-28470 | 7.8 | 6.8 | HIGH | Visual Studio Code GitHub Pull Requests and Issues Extension Remote Code Execution Vulnerability | NVD-CWE-noinfo |
161,015 | CVE-2021-28471 | 7.8 | 6.8 | HIGH | Remote Development Extension for Visual Studio Code Remote Code Execution Vulnerability | NVD-CWE-noinfo |
161,016 | CVE-2021-28472 | 7.8 | 6.8 | HIGH | Visual Studio Code Maven for Java Extension Remote Code Execution Vulnerability | NVD-CWE-noinfo |
161,017 | CVE-2021-28473 | 7.8 | 6.8 | HIGH | Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28457, CVE-2021-28469, CVE-2021-28475, CVE-2021-28477. | NVD-CWE-noinfo |
161,018 | CVE-2021-28474 | 8.8 | 6.5 | HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability | CWE-77 |
161,019 | CVE-2021-28475 | 7.8 | 6.8 | HIGH | Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28457, CVE-2021-28469, CVE-2021-28473, CVE-2021-28477. | NVD-CWE-noinfo |
161,020 | CVE-2021-28476 | 9.9 | 6.5 | CRITICAL | Hyper-V Remote Code Execution Vulnerability | NVD-CWE-noinfo |
161,021 | CVE-2021-28477 | 7.8 | 6.8 | HIGH | Visual Studio Code Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28457, CVE-2021-28469, CVE-2021-28473, CVE-2021-28475. | NVD-CWE-noinfo |
161,022 | CVE-2021-28478 | 7.1 | 5.8 | HIGH | Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2021-26418, CVE-2021-31172. | NVD-CWE-noinfo |
161,023 | CVE-2021-28479 | 5.5 | 2.1 | MEDIUM | Windows CSC Service Information Disclosure Vulnerability | CWE-200 |
161,024 | CVE-2021-28480 | 9.8 | 10 | CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28481, CVE-2021-28482, CVE-2021-28483. | NVD-CWE-noinfo |
161,025 | CVE-2021-28481 | 9.8 | 10 | CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28480, CVE-2021-28482, CVE-2021-28483. | NVD-CWE-noinfo |
161,026 | CVE-2021-28482 | 8.8 | 9 | HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28480, CVE-2021-28481, CVE-2021-28483. | NVD-CWE-noinfo |
161,027 | CVE-2021-28483 | 9 | 7.7 | CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28480, CVE-2021-28481, CVE-2021-28482. | NVD-CWE-noinfo |
161,028 | CVE-2021-28484 | 7.5 | 5 | HIGH | An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing any further operations until the yubihsm-connector is restarted. An attacker can send 0, 1, or 2 bytes to trigger this. | CWE-835 |
161,029 | CVE-2021-28490 | 8.8 | 6.8 | HIGH | In OWASP CSRFGuard through 3.1.0, CSRF can occur because the CSRF cookie may be retrieved by using only a session token. | CWE-352 |
161,030 | CVE-2021-28492 | 4.9 | 4 | MEDIUM | Unisys Stealth (core) 5.x before 5.0.048.0, 5.1.x before 5.1.017.0, and 6.x before 6.0.037.0 stores passwords in a recoverable format. | NVD-CWE-Other |
161,031 | CVE-2021-28493 | 7.8 | 4.6 | HIGH | In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, a user may be able to execute commands despite not having the privileges to do so. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.32.0 and prior releases | CWE-287 |
161,032 | CVE-2021-28494 | 8.8 | 6.5 | HIGH | In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, authentication is bypassed by unprivileged users who are accessing the Web UI. This issue affects: Arista Metamako Operating System MOS-0.34.0 and prior releases | CWE-287 |
161,033 | CVE-2021-28495 | 9.8 | 6.8 | CRITICAL | In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, user authentication can be bypassed when API access is enabled via the JSON-RPC APIs. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train | CWE-287 |
161,034 | CVE-2021-28496 | 6.5 | 4 | MEDIUM | On systems running Arista EOS and CloudEOS with the affected release version, when using shared secret profiles the password configured for use by BiDirectional Forwarding Detection (BFD) will be leaked when displaying output over eAPI or other JSON outputs to other authenticated users on the device. The affected EOS Versions are: all releases in 4.22.x train, 4.23.9 and below releases in the 4.23.x train, 4.24.7 and below releases in the 4.24.x train, 4.25.4 and below releases in the 4.25.x train, 4.26.1 and below releases in the 4.26.x train | CWE-311 |
161,035 | CVE-2021-28497 | 7.8 | 4.6 | HIGH | In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, under certain conditions, the bash shell might be accessible to unprivileged users in situations where they should not have access. This issue affects: Arista Metamako Operating System All releases in the MOS-0.1x train MOS-0.26.6 and below releases in the MOS-0.2x train MOS-0.31.1 and below releases in the MOS-0.3x train | NVD-CWE-Other |
161,036 | CVE-2021-28498 | 7.8 | 7.2 | HIGH | In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, user enable passwords set in clear text could result in unprivileged users getting complete access to the systems. This issue affects: Arista Metamako Operating System MOS-0.13 and post releases in the MOS-0.1x train MOS-0.26.6 and prior releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train | NVD-CWE-Other |
161,037 | CVE-2021-28499 | 5.5 | 2.1 | MEDIUM | In Arista's MOS (Metamako Operating System) software which is supported on the 7130 product line, user account passwords set in clear text could leak to users without any password. This issue affects: Arista Metamako Operating System MOS-0.18 and post releases in the MOS-0.1x train All releases in the MOS-0.2x train MOS-0.31.1 and prior releases in the MOS-0.3x train | CWE-522 |
161,038 | CVE-2021-28543 | 7.5 | 5 | HIGH | Varnish varnish-modules before 0.17.1 allows remote attackers to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varnish-modules. Specifically, an assertion failure or NULL pointer dereference can be triggered in Varnish Cache through the varnish-modules header.append() and header.copy() functions. For some Varnish Configuration Language (VCL) files, this gives remote clients an opportunity to cause a Varnish Cache restart. A restart reduces overall availability and performance due to an increased number of cache misses, and may cause higher load on backend servers. | CWE-476 |
161,039 | CVE-2021-28545 | 8.1 | 5.8 | HIGH | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker would have the ability to completely manipulate data in a certified PDF without invalidating the original certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. | CWE-353 |
161,040 | CVE-2021-28546 | 6.5 | 4.3 | MEDIUM | Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are missing support for an integrity check. An unauthenticated attacker could leverage this vulnerability to modify content in a certified PDF without invalidating the certification. Exploitation of this issue requires user interaction in that a victim must open the tampered file. | CWE-353 |
161,041 | CVE-2021-28547 | 7.8 | 4.6 | HIGH | Adobe Creative Cloud Desktop Application for macOS version 5.3 (and earlier) is affected by a privilege escalation vulnerability that could allow a normal user to delete the OOBE directory and get permissions of any directory under the administrator authority. | CWE-20 |
161,042 | CVE-2021-28548 | 7.8 | 6.8 | HIGH | Adobe Photoshop versions 21.2.6 (and earlier) and 22.3 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted JSX file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-120 |
161,043 | CVE-2021-28549 | 7.8 | 6.8 | HIGH | Adobe Photoshop versions 21.2.6 (and earlier) and 22.3 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted JSX file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-120 |
161,044 | CVE-2021-28550 | 8.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-416 |
161,045 | CVE-2021-28551 | 7.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Out-of-bounds read vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,046 | CVE-2021-28552 | 7.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-416 |
161,047 | CVE-2021-28553 | 8.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-416 |
161,048 | CVE-2021-28554 | 7.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20155 (and earlier), 2020.001.30025 (and earlier) and 2017.011.30196 (and earlier) are affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,049 | CVE-2021-28555 | 6.5 | 4.3 | MEDIUM | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to get access to sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,050 | CVE-2021-28556 | 4.8 | 3.5 | MEDIUM | Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are affected by a DOM-based Cross-Site Scripting vulnerability on mage-messages cookies. Successful exploitation could lead to arbitrary JavaScript execution by an unauthenticated attacker. User interaction is required for successful exploitation. | CWE-79 |
161,051 | CVE-2021-28557 | 4.3 | 4.3 | MEDIUM | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to leak sensitive system information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,052 | CVE-2021-28558 | 8.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Heap-based buffer overflow vulnerability in the PDFLibTool component. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-122 |
161,053 | CVE-2021-28559 | 5.3 | 5 | MEDIUM | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Information Exposure vulnerability. An unauthenticated attacker could leverage this vulnerability to get access to restricted data stored within global variables and objects. | CWE-359 |
161,054 | CVE-2021-28560 | 8.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Heap-based Buffer Overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-122 |
161,055 | CVE-2021-28561 | 8.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-788 |
161,056 | CVE-2021-28562 | 8.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by a Use After Free vulnerability when executing search queries through Javascript. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-416 |
161,057 | CVE-2021-28563 | 6.5 | 6.4 | MEDIUM | Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are affected by an Improper Authorization vulnerability via the 'Create Customer' endpoint. Successful exploitation could lead to unauthorized modification of customer data by an unauthenticated attacker. Access to the admin console is required for successful exploitation. | CWE-285 |
161,058 | CVE-2021-28564 | 8.8 | 6.8 | HIGH | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Out-of-bounds Write vulnerability within the ImageTool component. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,059 | CVE-2021-28565 | 8.8 | 9.3 | HIGH | Acrobat Reader DC versions versions 2021.001.20150 (and earlier), 2020.001.30020 (and earlier) and 2017.011.30194 (and earlier) are affected by an Out-of-bounds Read vulnerability in the PDFLibTool component. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,060 | CVE-2021-28566 | 2.7 | 4 | LOW | Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are vulnerable to an Information Disclosure vulnerability when uploading a modified png file to a product image. Successful exploitation could lead to the disclosure of document root path by an unauthenticated attacker. Access to the admin console is required for successful exploitation. | CWE-200 |
161,061 | CVE-2021-28567 | 6.5 | 4 | MEDIUM | Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are vulnerable to an Improper Authorization vulnerability in the customers module. Successful exploitation could allow a low-privileged user to modify customer data. Access to the admin console is required for successful exploitation. | CWE-863 |
161,062 | CVE-2021-28568 | 6.5 | 6.9 | MEDIUM | Adobe Genuine Services version 7.1 (and earlier) is affected by an Insecure file permission vulnerability during installation process. A local authenticated attacker could leverage this vulnerability to achieve privilege escalation in the context of the current user. | CWE-379 |
161,063 | CVE-2021-28569 | 4.3 | 4.3 | MEDIUM | Adobe Media Encoder version 15.1 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,064 | CVE-2021-28570 | 8.6 | 9.3 | HIGH | Adobe After Effects version 18.1 (and earlier) is affected by an Uncontrolled Search Path element vulnerability. An unauthenticated attacker could exploit this to to plant custom binaries and execute them with System permissions. Exploitation of this issue requires user interaction. | CWE-427 |
161,065 | CVE-2021-28571 | 8.8 | 7.6 | HIGH | Adobe After Effects version 18.1 (and earlier) is affected by a potential Command injection vulnerability when chained with a development and debugging tool for JavaScript scripts. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-78 |
161,066 | CVE-2021-28573 | 6.5 | 4.3 | MEDIUM | Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,067 | CVE-2021-28574 | 4.3 | 4.3 | MEDIUM | Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,068 | CVE-2021-28575 | 4.3 | 4.3 | MEDIUM | Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,069 | CVE-2021-28576 | 4.3 | 4.3 | MEDIUM | Adobe Animate version 21.0.5 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,070 | CVE-2021-28579 | 4.3 | 4 | MEDIUM | Adobe Connect version 11.2.1 (and earlier) is affected by an Improper access control vulnerability that can lead to the elevation of privileges. An attacker with 'Learner' permissions can leverage this scenario to access the list of event participants. | CWE-269 |
161,071 | CVE-2021-28580 | 7.8 | 9.3 | HIGH | Medium by Adobe version 2.4.5.331 (and earlier) is affected by a buffer overflow vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve remote code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-120 |
161,072 | CVE-2021-28581 | 7.3 | 4.4 | HIGH | Adobe Creative Cloud Desktop 3.5 (and earlier) is affected by an uncontrolled search path vulnerability that could result in elevation of privileges. Exploitation of this issue requires user interaction in that a victim must log on to the attacker's local machine. | CWE-427 |
161,073 | CVE-2021-28583 | 4.2 | 4.3 | MEDIUM | Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are affected by a Violation of Secure Design Principles vulnerability in RMA PDF filename formats. Successful exploitation could allow an attacker to get unauthorized access to restricted resources. | CWE-657 |
161,074 | CVE-2021-28584 | 7.2 | 6.5 | HIGH | Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are affected by a Path Traversal vulnerability when creating a store with child theme.Successful exploitation could lead to arbitrary file system write by an authenticated attacker. Access to the admin console is required for successful exploitation. | CWE-22 |
161,075 | CVE-2021-28585 | 5.3 | 5 | MEDIUM | Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are affected by an Improper input validation vulnerability in the New customer WebAPI.Successful exploitation could allow an attacker to send unsolicited spam e-mails. | CWE-20 |
161,076 | CVE-2021-28586 | 7.8 | 9.3 | HIGH | After Effects version 18.0 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,077 | CVE-2021-28587 | 3.3 | 4.3 | LOW | After Effects versions 18.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,078 | CVE-2021-28588 | 8.8 | 9 | HIGH | Adobe RoboHelp Server version 2019.0.9 (and earlier) is affected by a Path Traversal vulnerability when parsing a crafted HTTP POST request. An authenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. | CWE-22 |
161,079 | CVE-2021-28589 | 7.8 | 6.8 | HIGH | Adobe Media Encoder version 15.2 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,080 | CVE-2021-28590 | 7.8 | 6.8 | HIGH | Adobe Media Encoder version 15.2 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,081 | CVE-2021-28591 | 7.8 | 6.8 | HIGH | Adobe Illustrator version 25.2.3 (and earlier) is affected by an Out-of-bounds Write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,082 | CVE-2021-28592 | 7.8 | 6.8 | HIGH | Adobe Illustrator version 25.2.3 (and earlier) is affected by an Out-of-bounds Write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,083 | CVE-2021-28593 | 5.5 | 4.3 | MEDIUM | Adobe Illustrator version 25.2.3 (and earlier) is affected by a Use After Free vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose potential sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-416 |
161,084 | CVE-2021-28594 | 7.8 | 9.3 | HIGH | Adobe Creative Cloud Desktop Application (installer) version 2.4 (and earlier) is affected by an Uncontrolled Search Path Element vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-427 |
161,085 | CVE-2021-28595 | 7.8 | 9.3 | HIGH | Adobe Dimension version 3.4 (and earlier) is affected by an Uncontrolled Search Path Element element. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-427 |
161,086 | CVE-2021-28596 | 7.8 | 9.3 | HIGH | Adobe Framemaker version 2020.0.1 (and earlier) and 2019.0.8 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,087 | CVE-2021-28597 | 5.5 | 2.1 | MEDIUM | Adobe Photoshop Elements version 5.2 (and earlier) is affected by an insecure temporary file creation vulnerability. An unauthenticated attacker could leverage this vulnerability to call functions against the installer to perform high privileged actions. Exploitation of this issue does not require user interaction. | CWE-379 |
161,088 | CVE-2021-28600 | 5.5 | 4.3 | MEDIUM | Adobe After Effects version 18.2 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,089 | CVE-2021-28601 | 5.5 | 4.3 | MEDIUM | Adobe After Effects version 18.2 (and earlier) is affected by a Null pointer dereference vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-476 |
161,090 | CVE-2021-28602 | 7.8 | 6.8 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-788 |
161,091 | CVE-2021-28603 | 7.8 | 9.3 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,092 | CVE-2021-28604 | 7.8 | 9.3 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,093 | CVE-2021-28605 | 7.8 | 9.3 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by a memory corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-788 |
161,094 | CVE-2021-28606 | 7.8 | 9.3 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by a Stack-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,095 | CVE-2021-28607 | 7.8 | 9.3 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by a heap corruption vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-119 |
161,096 | CVE-2021-28608 | 7.8 | 9.3 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,097 | CVE-2021-28609 | 5.5 | 4.3 | MEDIUM | Adobe After Effects version 18.2 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,098 | CVE-2021-28610 | 7.8 | 9.3 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by a Heap-based Buffer Overflow vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-787 |
161,099 | CVE-2021-28611 | 7.1 | 5.8 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by an Our-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information and cause a denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
161,100 | CVE-2021-28612 | 7.1 | 5.8 | HIGH | Adobe After Effects version 18.2 (and earlier) is affected by an Our-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive memory information and cause a denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | CWE-125 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.