Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2021-34460 | Storage Spaces Controller Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34461 | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34462 | Windows AppX Deployment Extensions Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34464 | Microsoft Defender Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34466 | Windows Hello Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34467 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34468 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34469 | Microsoft Office Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3447 | A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2. | Unknown | N/A | n/a | |
CVE-2021-34470 | Microsoft Exchange Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34471 | Microsoft Windows Defender Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34473 | Microsoft Exchange Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34474 | Dynamics Business Central Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34475 | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34476 | Bowser.sys Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34477 | Visual Studio Code .NET Runtime Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34478 | Microsoft Office Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34479 | Microsoft Visual Studio Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3448 | A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity. | Unknown | N/A | n/a | |
CVE-2021-34480 | Scripting Engine Memory Corruption Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34481 | A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. UPDATE August 10, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. This security update changes the Point and Print default behavior; please see KB5005652. |
Unknown | N/A | Microsoft | |
CVE-2021-34483 | Windows Print Spooler Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34484 | Windows User Profile Service Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34485 | .NET Core and Visual Studio Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34486 | Windows Event Tracing Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34487 | Windows Event Tracing Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34488 | Windows Console Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34489 | DirectWrite Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3449 | An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j). | Unknown | N/A | OpenSSL | |
CVE-2021-34490 | Windows TCP/IP Driver Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34491 | Win32k Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34492 | Windows Certificate Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34493 | Windows Partition Management Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34494 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34496 | Windows GDI Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34497 | Windows MSHTML Platform Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34498 | Windows GDI Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34499 | Windows DNS Server Denial of Service Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3450 | The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j). | Unknown | N/A | OpenSSL | |
CVE-2021-34500 | Windows Kernel Memory Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34501 | Microsoft Excel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34503 | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34504 | Windows Address Book Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34506 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34507 | Windows Remote Assistance Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34508 | Windows Kernel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34509 | Storage Spaces Controller Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3451 | A denial of service vulnerability was reported in Lenovo PCManager, prior to version 3.0.400.3252, that could allow configuration files to be written to non-standard locations. | Unknown | N/A | Lenovo | |
CVE-2021-34510 | Storage Spaces Controller Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34511 | Windows Installer Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34512 | Storage Spaces Controller Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34513 | Storage Spaces Controller Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34514 | Windows Kernel Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34516 | Win32k Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34517 | Microsoft SharePoint Server Spoofing Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34518 | Microsoft Excel Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34519 | Microsoft SharePoint Server Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3452 | A potential vulnerability in the system shutdown SMI callback function in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code. | Unknown | N/A | Lenovo | |
CVE-2021-34520 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34521 | Raw Image Extension Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34522 | Microsoft Defender Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34523 | Microsoft Exchange Server Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34524 | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34525 | Windows DNS Server Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34527 | A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. UPDATE July 7, 2021: The security update for Windows Server 2012, Windows Server 2016 and Windows 10, Version 1607 have been released. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. In addition to installing the updates, in order to secure your system, you must confirm that the following registry settings are set to 0 (zero) or are not defined (Note: These registry keys do not exist by default, and therefore are already at the secure setting.), also that your Group Policy setting are correct (see FAQ):
Having NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design. UPDATE July 6, 2021: Microsoft has completed the investigation and has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. If you are unable to install these updates, see the FAQ and Workaround sections in this CVE for information on how to help protect your system from this vulnerability. See also KB5005010: Restricting installation of new printer drivers after applying the July 6, 2021 updates. Note that the security updates released on and after July 6, 2021 contain protections for CVE-2021-1675 and the additional remote code execution exploit in the Windows Print Spooler service known as “PrintNightmare”, documented in CVE-2021-34527. |
Unknown | N/A | Microsoft | |
CVE-2021-34528 | Visual Studio Code Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34529 | Visual Studio Code Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-3453 | Some Lenovo Notebook, ThinkPad, and Lenovo Desktop systems have BIOS modules unprotected by Intel Boot Guard that could allow an attacker with physical access the ability to write to the SPI flash storage. | Unknown | N/A | Lenovo | |
CVE-2021-34530 | Windows Graphics Component Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34532 | ASP.NET Core and Visual Studio Information Disclosure Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34533 | Windows Graphics Component Font Parsing Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34534 | Windows MSHTML Platform Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34535 | Remote Desktop Client Remote Code Execution Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34536 | Storage Spaces Controller Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34537 | Windows Bluetooth Driver Elevation of Privilege Vulnerability | Unknown | N/A | Microsoft | |
CVE-2021-34538 | Apache Hive before 3.1.3 "CREATE" and "DROP" function operations does not check for necessary authorization of involved entities in the query. It was found that an unauthorized user can manipulate an existing UDF without having the privileges to do so. This allowed unauthorized or underprivileged users to drop and recreate UDFs pointing them to new jars that could be potentially malicious. | Unknown | N/A | Apache Software Foundation | |
CVE-2021-34539 | An issue was discovered in CubeCoders AMP before 2.1.1.8. A lack of validation of the Java Version setting means that an unintended executable path can be set. The result is that high-privileged users can trigger code execution. | Unknown | N/A | n/a | |
CVE-2021-3454 | Truncated L2CAP K-frame causes assertion failure. Zephyr versions >= 2.4.0, >= v.2.50 contain Improper Handling of Length Parameter Inconsistency (CWE-130), Reachable Assertion (CWE-617). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3 | Unknown | N/A | zephyrproject-rtos | |
CVE-2021-34540 | Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard. | Unknown | N/A | n/a | |
CVE-2021-34543 | The web administration server in Solar-Log 500 before 2.8.2 Build 52 does not require authentication, which allows remote attackers to gain administrative privileges by connecting to the server. As a result, the attacker can modify configuration files and change the system status. | Unknown | N/A | n/a | |
CVE-2021-34544 | An issue was discovered in Solar-Log 500 before 2.8.2 Build 52 23.04.2013. In /export.html, email.html, and sms.html, cleartext passwords are stored. This may allow sensitive information to be read by someone with access to the device. | Unknown | N/A | n/a | |
CVE-2021-34546 | An unauthenticated attacker with physical access to a computer with NetSetMan Pro before 5.0 installed, that has the pre-logon profile switch button within the Windows logon screen enabled, is able to drop to an administrative shell and execute arbitrary commands as SYSTEM via the "save log to file" feature. To accomplish this, the attacker can navigate to cmd.exe. | Unknown | N/A | n/a | |
CVE-2021-34547 | PRTG Network Monitor 20.1.55.1775 allows /editsettings CSRF for user account creation. | Unknown | N/A | n/a | |
CVE-2021-34548 | An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream. | Unknown | N/A | n/a | |
CVE-2021-34549 | An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency. | Unknown | N/A | n/a | |
CVE-2021-3455 | Disconnecting L2CAP channel right after invalid ATT request leads freeze. Zephyr versions >= 2.4.0, >= 2.5.0 contain Use After Free (CWE-416). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp | Unknown | N/A | zephyrproject-rtos | |
CVE-2021-34550 | An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor | Unknown | N/A | n/a | |
CVE-2021-34551 | PHPMailer before 6.5.0 on Windows allows remote code execution if lang_path is untrusted data and has a UNC pathname. | Unknown | N/A | n/a | |
CVE-2021-34552 | Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c. | Unknown | N/A | n/a | |
CVE-2021-34553 | Sonatype Nexus Repository Manager 3.x before 3.31.0 allows a remote authenticated attacker to get a list of blob files and read the content of a blob file (via a GET request) without having been granted access. | Unknown | N/A | n/a | |
CVE-2021-34555 | OpenDMARC 1.4.1 and 1.4.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a multi-value From header field. | Unknown | N/A | n/a | |
CVE-2021-34556 | In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack. | Unknown | N/A | n/a | |
CVE-2021-34557 | XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs. | Unknown | N/A | n/a | |
CVE-2021-34558 | The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic. | Unknown | N/A | n/a | |
CVE-2021-34559 | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings. | Unknown | N/A | Phoenix Contact | |
CVE-2021-3456 | An improper authorization handling flaw was found in Foreman. The Salt plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability. | Unknown | N/A | n/a | |
CVE-2021-34560 | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once. | Unknown | N/A | Phoenix Contact | |
CVE-2021-34561 | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser. | Unknown | N/A | Phoenix Contact | |
CVE-2021-34562 | In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response. | Unknown | N/A | Phoenix Contact | |
CVE-2021-34563 | In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript. | Unknown | N/A | Phoenix Contact |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v