CVE-2021-43905
Microsoft Office app Remote Code Execution Vulnerability
Read morePage 2/26.
CVEs without a recognized CWE (not present in the CWE map or marked as N/A).
Microsoft Office app Remote Code Execution Vulnerability
Read moreMicrosoft 4K Wireless Display Adapter Remote Code Execution Vulnerability
Read moreMicrosoft PowerShell Spoofing Vulnerability
Read moreMicrosoft BizTalk ESB Toolkit Spoofing Vulnerability
Read moreVisual Studio Code Remote Code Execution Vulnerability
Read moreWe have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially…
Read moreMicrosoft Defender for IoT Remote Code Execution Vulnerability
Read moreMicrosoft Defender for IoT Information Disclosure Vulnerability
Read moreWindows Installer Elevation of Privilege Vulnerability
Read moreWindows Mobile Device Management Elevation of Privilege Vulnerability
Read moreASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
Read moreMicrosoft Office Graphics Remote Code Execution Vulnerability
Read moreMicrosoft Excel Remote Code Execution Vulnerability
Read moreMicrosoft Office Trust Center Spoofing Vulnerability
Read moreWindows Digital Media Receiver Elevation of Privilege Vulnerability
Read moreWindows Hyper-V Denial of Service Vulnerability
Read moreWindows Digital TV Tuner Elevation of Privilege Vulnerability
Read moreWindows Kernel Information Disclosure Vulnerability
Read moreVP9 Video Extensions Information Disclosure Vulnerability
Read moreMicrosoft SharePoint Server Spoofing Vulnerability
Read moreNTFS Set Short Name Elevation of Privilege Vulnerability
Read moreWindows Recovery Environment Agent Elevation of Privilege Vulnerability
Read moreMicrosoft Message Queuing Information Disclosure Vulnerability
Read moreStorage Spaces Controller Information Disclosure Vulnerability
Read moreWindows Fax Service Remote Code Execution Vulnerability
Read moreRemote Desktop Client Remote Code Execution Vulnerability
Read moreWindows Event Tracing Remote Code Execution Vulnerability
Read moreWindows NTFS Elevation of Privilege Vulnerability
Read moreWindows NTFS Elevation of Privilege Vulnerability
Read moreWindows NTFS Elevation of Privilege Vulnerability
Read moreSymCrypt Denial of Service Vulnerability
Read moreStorage Spaces Controller Information Disclosure Vulnerability
Read moreWindows Common Log File System Driver Elevation of Privilege Vulnerability
Read moreBot Framework SDK Remote Code Execution Vulnerability
Read moreWindows Common Log File System Driver Information Disclosure Vulnerability
Read moreWindows Remote Access Connection Manager Elevation of Privilege Vulnerability
Read moreMicrosoft Message Queuing Information Disclosure Vulnerability
Read moreDirectX Graphics Kernel File Denial of Service Vulnerability
Read moreWindows Encrypting File System (EFS) Remote Code Execution Vulnerability
Read moreWeb Media Extensions Remote Code Execution Vulnerability
Read moreWindows Common Log File System Driver Elevation of Privilege Vulnerability
Read moreMicrosoft Defender for IoT Remote Code Execution Vulnerability
Read moreMicrosoft Defender for IoT Remote Code Execution Vulnerability
Read moreMicrosoft Defender for IoT Elevation of Privilege Vulnerability
Read moreMicrosoft Defender for IoT Remote Code Execution Vulnerability
Read moreVisual Basic for Applications Information Disclosure Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreMicrosoft Jet Red Database Engine and Access Connectivity Engine Elevation of Privilege Vulnerability
Read moreHEVC Video Extensions Remote Code Execution Vulnerability
Read moreWindows Print Spooler Elevation of Privilege Vulnerability
Read moreHEVC Video Extensions Remote Code Execution Vulnerability
Read moreHEVC Video Extensions Remote Code Execution Vulnerability
Read moreWindows Media Center Elevation of Privilege Vulnerability
Read moreyetiforcecrm is vulnerable to Business Logic Errors
Read moreIrfanView 4.54 allows a user-mode write access violation starting at FORMATS!ReadXPM_W+0x0000000000000531.
Read moreIvanti Workspace Control before 10.4.50.0 allows attackers to degrade integrity.
Read moreThe absence of notifications regarding an ongoing RF jamming attack in the SecuritasHome home alarm system, version HPGW-G 0.0.2.23F BG_U-ITR-F1-BD_BL.A30.20181117, allows an attacker to block legiti…
Read moreThe Spotfire Server component of TIBCO Software Inc.'s TIBCO Spotfire Server, TIBCO Spotfire Server, and TIBCO Spotfire Server contains a difficult to exploit vulnerability that allows malicious cust…
Read moreA vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a mali…
Read moreIBM MQ on HPE NonStop 8.0.4 and 8.1.0 is vulnerable to a privilege escalation attack when SharedBindingsUserId is set to effective. IBM X-ForceID: 211404.
Read moreAn issue was discovered in Cuppa CMS Versions Before 31 Jan 2021 allows authenticated attackers to gain escalated privileges via a crafted POST request using the user_group_id_field parameter.
Read moreSysaid API User Enumeration - Attacker sending requests to specific api path without any authorization before 21.3.60 version could get users names from the LDAP server.
Read moreA remote code execution vulnerability in the BMP image codec of BlackBerry QNX SDP version(s) 6.4 to 7.1 could allow an attacker to potentially execute code in the context of the affected process.
Read moreIBM Spectrum Copy Data Management 2.2.13 and earlier could allow a remote attacker to obtain sensitive information, caused by the improper handling of requests for Spectrum Copy Data Management Admin…
Read moreIBM Spectrum Copy Data Management 2.2.13 and earlier could allow a remote attacker to access the Spring Boot console without authorization. IBM X-Force ID: 214523.
Read moreThe CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.
Read moreAn issue has been discovered in GitLab CE/EE affecting all versions starting from 8.11 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Und…
Read moreA Hidden Functionality in Fortinet FortiOS 7.x before 7.0.1, FortiOS 6.4.x before 6.4.7 allows attacker to Execute unauthorized code or commands via specific hex read/write operations.
Read moreThe NEX-Forms WordPress plugin before 8.4.3 does not have CSRF checks in place when editing a form, and does not escape some of its settings as well as form fields before outputting them in attribute…
Read moreAn issue was discovered in Reprise RLM 14.2. When editing the license file, it is possible for an admin user to enable an option to run arbitrary executables, as demonstrated by an ISV demo "C:\Windo…
Read moreZoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17…
Read moreA malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior ins…
Read moreImproper handling of pointers in the System Management Mode (SMM) handling code may allow for a privileged attacker with physical or administrative access to potentially manipulate the AMD Generic En…
Read moreThe package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
Read moreRemote Code Execution (RCE) vulnerability exists in MaxSite CMS v107.5 via the Documents page.
Read moreIBM PowerVM Hypervisor FW940, FW950, and FW1010 could allow an authenticated user to cause the system to crash using a specially crafted IBMi Hypervisor call. IBM X-Force ID: 210894.
Read moreIBM PowerVM Hypervisor FW860, FW940, and FW950 could allow an attacker that gains service access to the FSP can read and write arbitrary host system memory through a series of carefully crafted servi…
Read moreA security vulnerability has been identified in HPE StoreServ Management Console (SSMC). An authenticated SSMC administrator could exploit the vulnerability to inject code and elevate their privilege…
Read moreAn Incorrect Access Control vulnerability exists in zzcms less than or equal to 2019 via admin.php. After disabling JavaScript, you can directly access the administrator console.
Read moreIBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to a denial of service, caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to caus…
Read moreIBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local user to gain privileges due to allowing modification of columns of existing tasks…
Read moreWhen using the dart pub publish command to publish a package to a third-party package server, the request would be authenticated with an oauth2 access_token that is valid for publishing on pub.dev. U…
Read moreIBM Db2 9.7, 10.1, 10.5, 11.1, and 11.5 may be vulnerable to an Information Disclosure when using the LOAD utility as under certain circumstances the LOAD utility does not enforce directory restricti…
Read moreAn improper authorization vulnerabiltiy [CWE-285] in FortiClient Windows versions 7.0.0 and 6.4.6 and below and 6.2.8 and below may allow an unauthenticated attacker to bypass the webfilter control v…
Read moreA improper control of a resource through its lifetime in Fortinet FortiClientWindows version 6.4.1 and 6.4.0, version 6.2.9 and below, version 6.0.10 and below allows attacker to cause a complete den…
Read moreWhen invoking protocol handlers for external protocols, a supplied parameter URL containing spaces was not properly escaped. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and…
Read moreWebExtensions with the correct permissions were able to create and install ServiceWorkers for third-party websites that would not have been uninstalled with the extension. This vulnerability affects…
Read moreWhen parsing internationalized domain names, high bits of the characters in the URLs were sometimes stripped, resulting in inconsistencies that could lead to user confusion or attacks such as phishin…
Read moreThe executable file warning was not presented when downloading .inetloc files, which, due to a flaw in Mac OS, can run commands on a user's computer.*Note: This issue only affected Mac OS operating s…
Read moreA privilege escalation vulnerability in FortiNAC versions 8.8.8 and below and 9.1.2 and below may allow an admin user to escalate the privileges to root via the sudo command.
Read moreAn issue was discovered in Allegro Windows (formerly Popsy Windows) before 3.3.4156.1. A standard user can escalate privileges to SYSTEM if the FTP module is installed, because of DLL hijacking.
Read moreThere is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages.
Read moreThere is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected.
Read moreThere is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS.
Read moreThere is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart.
Read moreAn improper intent redirection handling in Tags prior to SMR Dec-2021 Release 1 allows attackers to access sensitive information.
Read moreA unintended proxy or intermediary ('confused deputy') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows an unauthenticated attacker to access protected hosts via crafted HTTP req…
Read moreA missing cryptographic steps vulnerability in the function that encrypts users' LDAP and RADIUS credentials in FortiSandbox before 4.0.1, FortiWeb before 6.3.12, FortiADC before 6.2.1, FortiMail 7.0…
Read moreAn improper access control vulnerability [CWE-284] in FortiOS autod daemon 7.0.0, 6.4.6 and below, 6.2.9 and below, 6.0.12 and below and FortiProxy 2.0.1 and below, 1.2.9 and below may allow an authe…
Read moreIn Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
Read moreAn issue was discovered in Trusted Firmware OP-TEE Trusted OS through 3.15.0. The OPTEE-OS CSU driver for NXP i.MX6UL SoC devices lacks security access configuration for wakeup-related registers, res…
Read moreThe devise_masquerade gem before 1.3 allows certain attacks when a password's salt is unknown. An application that uses this gem to let administrators masquerade/impersonate users loses one layer of…
Read moreBackdoors were discovered in Auerswald COMpact 5500R 7.8A and 8.0B devices, that allow attackers with access to the web based management application full administrative access to the device.
Read moreThere is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected.
Read moreThere is a Business Logic Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to persistent dos.
Read moreThere is a Resource Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to denial of Service Attacks.
Read moreThere is a Cryptographic Issues vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to read and delete images of Harmony devices.
Read moreThere is a Weaknesses Introduced During Design
Read moreThere is a Permissions,Privileges,and Access Controls vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user's nickname is maliciously tampered with.
Read moreThere is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information.
Read moreThere is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality.
Read moreAn issue was discovered in SquaredUp for SCOM 5.2.1.6654. The Download Log feature in System / Maintenance was susceptible to a local file inclusion vulnerability (when processing remote input in the…
Read moregrant table v2 status pages may remain accessible after de-allocation (take two) Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associa…
Read moreAn issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The apache user could read arbitrary files such as /etc/shadow by abusing an insecure Sudo rule.
Read moreAn issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The privileged vaultServer could be leveraged to create arbitrary writable files, leading to privilege escalation.
Read moreAn issue was discovered in Kaseya Unitrends Backup Appliance before 10.5.5. The Samba file sharing service allowed anonymous read/write access.
Read moreHashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0, with the QEMU task driver enabled, allowed authenticated users with job submission capabilities to bypass the configured allowed i…
Read moreIBM Cognos Analytics 11.1.7 and 11.2.0 could allow an authenticated to view or edit a Jupyter notebook that they should not have access to. IBM X-Force ID: 206212.
Read moreIBM Cognos Analytics 11.1.7 and 11.2.0 could be vulnerable to client side vulnerabilties due to a web response specifying an incorrect content type. IBM X-Force ID: 201091
Read moreIBM Cognos Analytics 11.1.7 and 11.2.0 could allow a low level user to reas of the application that privileged user should only be allowed to view. IBM X-Force ID: 201087.
Read more