ID
int64
1
170k
CVE-ID
stringlengths
13
16
CVSS-V3
float64
1.8
10
CVSS-V2
float64
0
10
SEVERITY
stringclasses
4 values
DESCRIPTION
stringlengths
20
3.84k
CWE-ID
stringlengths
5
14
164,501
CVE-2021-34384
7.8
4.6
HIGH
Bootloader contains a vulnerability in NVIDIA MB2 where a potential heap overflow could cause memory corruption, which might lead to denial of service or code execution.
CWE-787
164,502
CVE-2021-34385
6.7
4.6
MEDIUM
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the calculation of a length could lead to a heap overflow.
CWE-190
164,503
CVE-2021-34386
6.7
4.6
MEDIUM
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the calloc size calculation can cause the multiplication of count and size can overflow, which might lead to heap overflows.
CWE-190
164,504
CVE-2021-34387
6.7
7.2
MEDIUM
The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only.
CWE-276
164,505
CVE-2021-34388
7.8
4.6
HIGH
Bootloader contains a vulnerability in NVIDIA TegraBoot where a potential heap overflow might allow an attacker to control all the RAM after the heap block, leading to denial of service or code execution.
CWE-787
164,506
CVE-2021-34389
5
1.9
MEDIUM
Trusty contains a vulnerability in NVIDIA OTE protocol message parsing code, which is present in all the TAs. An incorrect bounds check can allow a local user through a malicious client to access memory from the heap in the TrustZone, which may lead to information disclosure.
CWE-401
164,507
CVE-2021-34390
5.5
2.1
MEDIUM
Trusty contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow through a specific SMC call that is triggered by the user, which may lead to denial of service.
CWE-190
164,508
CVE-2021-34391
5.5
4.9
MEDIUM
Trusty contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow through a specific SMC call that is triggered by the user, which may lead to denial of service.
CWE-190
164,509
CVE-2021-34392
5.5
2.1
MEDIUM
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.
CWE-190
164,510
CVE-2021-34393
4.4
2.1
MEDIUM
Trusty contains a vulnerability in TSEC TA which deserializes the incoming messages even though the TSEC TA does not expose any command. This vulnerability might allow an attacker to exploit the deserializer to impact code execution, causing information disclosure.
CWE-502
164,511
CVE-2021-34394
6.7
4.6
MEDIUM
Trusty contains a vulnerability in the NVIDIA OTE protocol that is present in all TAs. An incorrect message stream deserialization allows an attacker to use the malicious CA that is run by the user to cause the buffer overflow, which may lead to information disclosure and data modification.
CWE-502
164,512
CVE-2021-34395
4.2
4.6
MEDIUM
Trusty TLK contains a vulnerability in its access permission settings where it does not properly restrict access to a resource from a user with local privileges, which might lead to limited information disclosure, a low risk of modifcations to data, and limited denial of service.
CWE-276
164,513
CVE-2021-34396
2.3
2.1
LOW
Bootloader contains a vulnerability in access permission settings where unauthorized software may be able to overwrite NVIDIA MB2 code, which would result in limited denial of service.
CWE-863
164,514
CVE-2021-34397
2.3
2.1
LOW
Bootloader contains a vulnerability in NVIDIA MB2, which may cause free-the-wrong-heap, which may lead to limited denial of service.
CWE-787
164,515
CVE-2021-34398
7.8
7.2
HIGH
NVIDIA DCGM, all versions prior to 2.2.9, contains a vulnerability in the DIAG module where any user can inject shared libraries into the DCGM server, which is usually running as root, which may lead to privilege escalation, total loss of confidentiality and integrity, and complete denial of service.
CWE-829
164,516
CVE-2021-34399
4.4
2.1
MEDIUM
NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to gain access to information from unscrubbed registers, which may lead to information disclosure.
NVD-CWE-noinfo
164,517
CVE-2021-3440
7.8
4.6
HIGH
HP Print and Scan Doctor, an application within the HP Smart App for Windows, is potentially vulnerable to local elevation of privilege.
CWE-269
164,518
CVE-2021-34400
4.4
2.1
MEDIUM
NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to gain access to information from unscrubbed memory, which may lead to information disclosure.
NVD-CWE-noinfo
164,519
CVE-2021-34408
7.8
4.6
HIGH
The Zoom Client for Meetings for Windows in all versions before version 5.3.2 writes log files to a user writable directory as a privileged user during the installation or update of the client. This could allow for potential privilege escalation if a link was created between the user writable directory used and a non-user writable directory.
CWE-269
164,520
CVE-2021-34409
7.8
7.2
HIGH
It was discovered that the installation packages of the Zoom Client for Meetings for MacOS (Standard and for IT Admin) installation before version 5.2.0, Zoom Client Plugin for Sharing iPhone/iPad before version 5.2.0, and Zoom Rooms for Conference before version 5.1.0, copy pre- and post- installation shell scripts to a user-writable directory. In the affected products listed below, a malicious actor with local access to a user's machine could use this flaw to potentially run arbitrary system commands in a higher privileged context during the installation process.
CWE-269
164,521
CVE-2021-3441
4.8
3.5
MEDIUM
A potential security vulnerability has been identified for the HP OfficeJet 7110 Wide Format ePrinter that enables Cross-Site Scripting (XSS).
CWE-79
164,522
CVE-2021-34410
7.8
7.2
HIGH
A user-writable application bundle unpacked during the install for all versions of the Zoom Plugin for Microsoft Outlook for Mac before 5.0.25611.0521 allows for privilege escalation to root.
CWE-269
164,523
CVE-2021-34411
7.8
4.6
HIGH
During the installation process forZoom Rooms for Conference Room for Windows before version 5.3.0 it is possible to launch Internet Explorer with elevated privileges. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation.
CWE-269
164,524
CVE-2021-34412
7.8
4.6
HIGH
During the installation process for all versions of the Zoom Client for Meetings for Windows before 5.4.0, it is possible to launch Internet Explorer. If the installer was launched with elevated privileges such as by SCCM this can result in a local privilege escalation.
CWE-269
164,525
CVE-2021-34413
7.5
6
HIGH
All versions of the Zoom Plugin for Microsoft Outlook for MacOS before 5.3.52553.0918 contain a Time-of-check Time-of-use (TOC/TOU) vulnerability during the plugin installation process. This could allow a standard user to write their own malicious application to the plugin directory, allowing the malicious application to execute in a privileged context.
CWE-367
164,526
CVE-2021-34414
7.2
6.5
HIGH
The network proxy page on the web portal for the Zoom on-premise Meeting Connector Controller before version 4.6.348.20201217, Zoom on-premise Meeting Connector MMR before version 4.6.348.20201217, Zoom on-premise Recording Connector before version 3.8.42.20200905, Zoom on-premise Virtual Room Connector before version 4.4.6620.20201110, and Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5495.20210326 fails to validate input sent in requests to update the network proxy configuration, which could lead to remote command injection on the on-premise image by a web portal administrator.
CWE-20
164,527
CVE-2021-34415
7.5
7.8
HIGH
The Zone Controller service in the Zoom On-Premise Meeting Connector Controller before version 4.6.358.20210205 does not verify the cnt field sent in incoming network packets, which leads to exhaustion of resources and system crash.
CWE-20
164,528
CVE-2021-34416
9.8
7.5
CRITICAL
The network address administrative settings web portal for the Zoom on-premise Meeting Connector before version 4.6.360.20210325, Zoom on-premise Meeting Connector MMR before version 4.6.360.20210325, Zoom on-premise Recording Connector before version 3.8.44.20210326, Zoom on-premise Virtual Room Connector before version 4.4.6752.20210326, and Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5495.20210326 fails to validate input sent in requests to update the network configuration, which could lead to remote command injection on the on-premise image by the web portal administrators.
CWE-20
164,529
CVE-2021-34417
7.2
9
HIGH
The network proxy page on the web portal for the Zoom On-Premise Meeting Connector Controller before version 4.6.365.20210703, Zoom On-Premise Meeting Connector MMR before version 4.6.365.20210703, Zoom On-Premise Recording Connector before version 3.8.45.20210703, Zoom On-Premise Virtual Room Connector before version 4.4.6868.20210703, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5496.20210703 fails to validate input sent in requests to set the network proxy password. This could lead to remote command injection by a web portal administrator.
CWE-20
164,530
CVE-2021-34418
5.3
5
MEDIUM
The login routine of the web console in the Zoom On-Premise Meeting Connector before version 4.6.239.20200613, Zoom On-Premise Meeting Connector MMR before version 4.6.239.20200613, Zoom On-Premise Recording Connector before version 3.8.42.20200905, Zoom On-Premise Virtual Room Connector before version 4.4.6344.20200612, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5492.20200616 fails to validate that a NULL byte was sent while authenticating. This could lead to a crash of the login service.
CWE-476
164,531
CVE-2021-34419
5.3
5
MEDIUM
In the Zoom Client for Meetings for Ubuntu Linux before version 5.1.0, there is an HTML injection flaw when sending a remote control request to a user in the process of in-meeting screen sharing. This could allow meeting participants to be targeted for social engineering attacks.
CWE-74
164,532
CVE-2021-34420
7.4
4.3
HIGH
The Zoom Client for Meetings for Windows installer before version 5.5.4 does not properly verify the signature of files with .msi, .ps1, and .bat extensions. This could lead to a malicious actor installing malicious software on a customer’s computer.
CWE-347
164,533
CVE-2021-34421
4.3
4.3
MEDIUM
The Keybase Client for Android before version 5.8.0 and the Keybase Client for iOS before version 5.8.0 fails to properly remove exploded messages initiated by a user if the receiving user places the chat session in the background while the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from the customer's device.
CWE-200
164,534
CVE-2021-34422
9
6
CRITICAL
The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
CWE-22
164,535
CVE-2021-34423
9.8
7.5
CRITICAL
A buffer overflow vulnerability was discovered in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom On-Premise Meeting Connector Controller before version 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR before version 4.8.12.20211115, Zoom On-Premise Recording Connector before version 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector before version 4.4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64. This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code.
CWE-120
164,536
CVE-2021-34424
7.5
5
HIGH
A vulnerability was discovered in the Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom on-premise Meeting Connector before version 4.8.12.20211115, Zoom on-premise Meeting Connector MMR before version 4.8.12.20211115, Zoom on-premise Recording Connector before version 5.1.0.65.20211116, Zoom on-premise Virtual Room Connector before version 4.4.7266.20211117, Zoom on-premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64 which potentially allowed for the exposure of the state of process memory. This issue could be used to potentially gain insight into arbitrary areas of the product's memory.
CWE-668
164,537
CVE-2021-34425
6.1
4
MEDIUM
The Zoom Client for Meetings before version 5.7.3 (for Android, iOS, Linux, macOS, and Windows) contain a server side request forgery vulnerability in the chat’s “link preview” functionality. In versions prior to 5.7.3, if a user were to enable the chat’s “link preview” feature, a malicious actor could trick the user into potentially sending arbitrary HTTP GET requests to URLs that the actor cannot reach directly.
CWE-918
164,538
CVE-2021-34426
7.8
7.2
HIGH
A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user’s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user’s local system.
NVD-CWE-noinfo
164,539
CVE-2021-34427
9.8
7.5
CRITICAL
In Eclipse BIRT versions 4.8.0 and earlier, an attacker can use query parameters to create a JSP file which is accessible from remote (current BIRT viewer dir) to inject JSP code into the running instance.
CWE-20
164,540
CVE-2021-34428
3.5
3.6
LOW
For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
CWE-613
164,541
CVE-2021-34429
5.3
5
MEDIUM
For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. This is a variation of the vulnerability reported in CVE-2021-28164/GHSA-v7ff-8wcx-gmc5.
CWE-863
164,542
CVE-2021-3443
5.5
4.3
MEDIUM
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
CWE-476
164,543
CVE-2021-34430
7.5
5
HIGH
Eclipse TinyDTLS through 0.9-rc1 relies on the rand function in the C library, which makes it easier for remote attackers to compute the master key and then decrypt DTLS traffic.
CWE-326
164,544
CVE-2021-34431
6.5
4
MEDIUM
In Eclipse Mosquitto version 1.6 to 2.0.10, if an authenticated client that had connected with MQTT v5 sent a crafted CONNECT message to the broker a memory leak would occur, which could be used to provide a DoS attack against the broker.
CWE-401
164,545
CVE-2021-34432
7.5
5
HIGH
In Eclipse Mosquitto versions 2.07 and earlier, the server will crash if the client tries to send a PUBLISH packet with topic length = 0.
NVD-CWE-noinfo
164,546
CVE-2021-34433
7.5
5
HIGH
In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes accidentally succeeds without verifying the server side's signature on the client side, if that signature is not included in the server's ServerKeyExchange.
CWE-347
164,547
CVE-2021-34434
5.3
5
MEDIUM
In Eclipse Mosquitto versions 2.0 to 2.0.11, when using the dynamic security plugin, if the ability for a client to make subscriptions on a topic is revoked when a durable client is offline, then existing subscriptions for that client are not revoked.
CWE-863
164,548
CVE-2021-34435
8.8
6.8
HIGH
In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file..
CWE-668
164,549
CVE-2021-34436
9.8
7.5
CRITICAL
In Eclipse Theia 0.1.1 to 0.2.0, it is possible to exploit the default build to obtain remote code execution (and XXE) via the theia-xml-extension. This extension uses lsp4xml (recently renamed to LemMinX) in order to provide language support for XML. This is installed by default.
CWE-22
164,550
CVE-2021-34436
9.8
7.5
CRITICAL
In Eclipse Theia 0.1.1 to 0.2.0, it is possible to exploit the default build to obtain remote code execution (and XXE) via the theia-xml-extension. This extension uses lsp4xml (recently renamed to LemMinX) in order to provide language support for XML. This is installed by default.
CWE-611
164,551
CVE-2021-34438
7.8
6.8
HIGH
Windows Font Driver Host Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,552
CVE-2021-34439
7.8
9.3
HIGH
Microsoft Windows Media Foundation Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34441, CVE-2021-34503.
NVD-CWE-noinfo
164,553
CVE-2021-3444
7.8
4.6
HIGH
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
CWE-125
164,554
CVE-2021-3444
7.8
4.6
HIGH
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
CWE-681
164,555
CVE-2021-34440
5.5
2.1
MEDIUM
GDI+ Information Disclosure Vulnerability
NVD-CWE-noinfo
164,556
CVE-2021-34441
7.8
6.8
HIGH
Microsoft Windows Media Foundation Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34439, CVE-2021-34503.
NVD-CWE-noinfo
164,557
CVE-2021-34442
7.5
5
HIGH
Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33745, CVE-2021-34444, CVE-2021-34499.
NVD-CWE-noinfo
164,558
CVE-2021-34444
6.5
4
MEDIUM
Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33745, CVE-2021-34442, CVE-2021-34499.
NVD-CWE-noinfo
164,559
CVE-2021-34445
7.8
4.6
HIGH
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-33773, CVE-2021-34456.
CWE-269
164,560
CVE-2021-34446
8.8
6.8
HIGH
Windows HTML Platforms Security Feature Bypass Vulnerability
NVD-CWE-noinfo
164,561
CVE-2021-34447
8.8
6.8
HIGH
Windows MSHTML Platform Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34497.
NVD-CWE-noinfo
164,562
CVE-2021-34448
8.8
9.3
HIGH
Scripting Engine Memory Corruption Vulnerability
CWE-787
164,563
CVE-2021-34449
7.8
4.6
HIGH
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-34516.
CWE-269
164,564
CVE-2021-3445
8.8
5.1
HIGH
A flaw was found in libdnf's signature verification functionality in versions before 0.60.1. This flaw allows an attacker to achieve code execution if they can alter the header information of an RPM package and then trick a user or system into installing it. The highest risk of this vulnerability is to confidentiality, integrity, as well as system availability.
CWE-347
164,565
CVE-2021-34450
9.9
9
CRITICAL
Windows Hyper-V Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,566
CVE-2021-34451
5.3
5
MEDIUM
Microsoft Office Online Server Spoofing Vulnerability
NVD-CWE-noinfo
164,567
CVE-2021-34452
7.8
6.8
HIGH
Microsoft Word Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,568
CVE-2021-34453
7.5
5
HIGH
Microsoft Exchange Server Denial of Service Vulnerability
NVD-CWE-noinfo
164,569
CVE-2021-34454
5.5
2.1
MEDIUM
Windows Remote Access Connection Manager Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-33763, CVE-2021-34457.
NVD-CWE-noinfo
164,570
CVE-2021-34455
7.8
4.6
HIGH
Windows File History Service Elevation of Privilege Vulnerability
CWE-269
164,571
CVE-2021-34456
7.8
4.6
HIGH
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-33773, CVE-2021-34445.
CWE-269
164,572
CVE-2021-34457
5.5
2.1
MEDIUM
Windows Remote Access Connection Manager Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-33763, CVE-2021-34454.
NVD-CWE-noinfo
164,573
CVE-2021-34458
9.9
9
CRITICAL
Windows Kernel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34508.
NVD-CWE-noinfo
164,574
CVE-2021-34459
7.8
4.6
HIGH
Windows AppContainer Elevation Of Privilege Vulnerability
CWE-269
164,575
CVE-2021-3446
5.5
2.1
MEDIUM
A flaw was found in libtpms in versions before 0.8.2. The commonly used integration of libtpms with OpenSSL contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality.
CWE-327
164,576
CVE-2021-34460
7.8
4.6
HIGH
Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33751, CVE-2021-34510, CVE-2021-34512, CVE-2021-34513.
CWE-269
164,577
CVE-2021-34461
7.8
4.6
HIGH
Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability
CWE-269
164,578
CVE-2021-34462
7.8
4.6
HIGH
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
CWE-269
164,579
CVE-2021-34464
7.8
9.3
HIGH
Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34522.
NVD-CWE-noinfo
164,580
CVE-2021-34466
6.1
3.6
MEDIUM
Windows Hello Security Feature Bypass Vulnerability
CWE-863
164,581
CVE-2021-34467
8.8
6.5
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34468, CVE-2021-34520.
NVD-CWE-noinfo
164,582
CVE-2021-34468
8
5.4
HIGH
Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34467, CVE-2021-34520.
NVD-CWE-noinfo
164,583
CVE-2021-34469
8.1
5.8
HIGH
Microsoft Office Security Feature Bypass Vulnerability
CWE-863
164,584
CVE-2021-3447
5.5
2.1
MEDIUM
A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.
CWE-532
164,585
CVE-2021-34470
8
5.2
HIGH
Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33768, CVE-2021-34523.
CWE-269
164,586
CVE-2021-34471
7.8
4.6
HIGH
Microsoft Windows Defender Elevation of Privilege Vulnerability
CWE-269
164,587
CVE-2021-34473
9.8
10
CRITICAL
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206.
NVD-CWE-noinfo
164,588
CVE-2021-34474
7.2
6.5
HIGH
Dynamics Business Central Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,589
CVE-2021-34476
7.5
5
HIGH
Bowser.sys Denial of Service Vulnerability
NVD-CWE-noinfo
164,590
CVE-2021-34477
7.8
4.6
HIGH
Visual Studio Code .NET Runtime Elevation of Privilege Vulnerability
CWE-269
164,591
CVE-2021-34478
7.8
6.8
HIGH
Microsoft Office Remote Code Execution Vulnerability
NVD-CWE-noinfo
164,592
CVE-2021-34479
5.5
4.3
MEDIUM
Microsoft Visual Studio Spoofing Vulnerability
NVD-CWE-noinfo
164,593
CVE-2021-3448
4
4.3
MEDIUM
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
CWE-358
164,594
CVE-2021-34480
8.8
6.8
HIGH
Scripting Engine Memory Corruption Vulnerability
CWE-787
164,595
CVE-2021-34481
7.8
4.6
HIGH
Windows Print Spooler Elevation of Privilege Vulnerability
CWE-269
164,596
CVE-2021-34483
7.8
4.6
HIGH
Windows Print Spooler Elevation of Privilege Vulnerability
CWE-269
164,597
CVE-2021-34484
7.8
4.6
HIGH
Windows User Profile Service Elevation of Privilege Vulnerability
CWE-269
164,598
CVE-2021-34485
5.5
2.1
MEDIUM
.NET Core and Visual Studio Information Disclosure Vulnerability
NVD-CWE-noinfo
164,599
CVE-2021-34486
7.8
4.6
HIGH
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26425, CVE-2021-34487.
CWE-269
164,600
CVE-2021-34487
7.8
4.6
HIGH
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26425, CVE-2021-34486.
CWE-269