CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities (CVSS score between 6 and 6.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
501 CVE-2021-24110 Exec Code 2021-03-11 2021-03-12
6.8
None Remote Medium Not required Partial Partial Partial
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24089, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.
502 CVE-2021-24109 269 2021-02-25 2021-03-03
6.0
None Remote Medium ??? Partial Partial Partial
Microsoft Azure Kubernetes Service Elevation of Privilege Vulnerability
503 CVE-2021-24108 Exec Code 2021-03-11 2021-03-18
6.8
None Remote Medium Not required Partial Partial Partial
Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27057, CVE-2021-27059.
504 CVE-2021-24105 Exec Code 2021-02-25 2021-03-03
6.8
None Remote Medium Not required Partial Partial Partial
Package Managers Configurations Remote Code Execution Vulnerability
505 CVE-2021-24093 Exec Code 2021-02-25 2021-03-03
6.8
None Remote Medium Not required Partial Partial Partial
Windows Graphics Component Remote Code Execution Vulnerability
506 CVE-2021-24091 787 Exec Code 2021-02-25 2021-03-25
6.8
None Remote Medium Not required Partial Partial Partial
Windows Camera Codec Pack Remote Code Execution Vulnerability
507 CVE-2021-24089 Exec Code 2021-03-11 2021-03-12
6.8
None Remote Medium Not required Partial Partial Partial
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24110, CVE-2021-26902, CVE-2021-27047, CVE-2021-27048, CVE-2021-27049, CVE-2021-27050, CVE-2021-27051, CVE-2021-27061, CVE-2021-27062.
508 CVE-2021-24088 Exec Code 2021-02-25 2021-03-03
6.5
None Remote Low ??? Partial Partial Partial
Windows Local Spooler Remote Code Execution Vulnerability
509 CVE-2021-24085 2021-02-25 2021-03-04
6.0
None Remote Medium ??? Partial Partial Partial
Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-1730.
510 CVE-2021-24083 787 Exec Code 2021-02-25 2021-03-04
6.8
None Remote Medium Not required Partial Partial Partial
Windows Address Book Remote Code Execution Vulnerability
511 CVE-2021-24081 787 Exec Code 2021-02-25 2021-03-04
6.8
None Remote Medium Not required Partial Partial Partial
Microsoft Windows Codecs Library Remote Code Execution Vulnerability
512 CVE-2021-24072 Exec Code 2021-02-25 2021-03-03
6.5
None Remote Low ??? Partial Partial Partial
Microsoft SharePoint Server Remote Code Execution Vulnerability
513 CVE-2021-24070 416 Exec Code 2021-02-25 2021-03-03
6.8
None Remote Medium Not required Partial Partial Partial
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24068, CVE-2021-24069.
514 CVE-2021-24069 Exec Code 2021-02-25 2021-03-03
6.8
None Remote Medium Not required Partial Partial Partial
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24068, CVE-2021-24070.
515 CVE-2021-24068 Exec Code 2021-02-25 2021-03-03
6.8
None Remote Medium Not required Partial Partial Partial
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24067, CVE-2021-24069, CVE-2021-24070.
516 CVE-2021-24067 416 Exec Code 2021-02-25 2021-03-03
6.8
None Remote Medium Not required Partial Partial Partial
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24068, CVE-2021-24069, CVE-2021-24070.
517 CVE-2021-24066 502 Exec Code 2021-02-25 2021-03-03
6.5
None Remote Low ??? Partial Partial Partial
Microsoft SharePoint Remote Code Execution Vulnerability
518 CVE-2021-24033 78 Exec Code 2021-03-09 2021-03-16
6.8
None Remote Medium Not required Partial Partial Partial
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
519 CVE-2021-23988 119 Overflow Mem. Corr. 2021-03-31 2021-06-02
6.8
None Remote Medium Not required Partial Partial Partial
Mozilla developers reported memory safety bugs present in Firefox 86. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 87.
520 CVE-2021-23987 119 Overflow Mem. Corr. 2021-03-31 2021-06-04
6.8
None Remote Medium Not required Partial Partial Partial
Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87.
521 CVE-2021-23979 119 Overflow Mem. Corr. 2021-02-26 2021-03-04
6.8
None Remote Medium Not required Partial Partial Partial
Mozilla developers reported memory safety bugs present in Firefox 85. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 86.
522 CVE-2021-23978 Mem. Corr. 2021-02-26 2021-05-01
6.8
None Remote Medium Not required Partial Partial Partial
Mozilla developers reported memory safety bugs present in Firefox 85 and Firefox ESR 78.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.
523 CVE-2021-23972 2021-02-26 2021-05-01
6.8
None Remote Medium Not required Partial Partial Partial
One phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://[email protected]'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.
524 CVE-2021-23965 119 Overflow Mem. Corr. 2021-02-26 2021-03-04
6.8
None Remote Medium Not required Partial Partial Partial
Mozilla developers reported memory safety bugs present in Firefox 84. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 85.
525 CVE-2021-23964 119 Overflow Mem. Corr. 2021-02-26 2021-03-04
6.8
None Remote Medium Not required Partial Partial Partial
Mozilla developers reported memory safety bugs present in Firefox 84 and Firefox ESR 78.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.
526 CVE-2021-23962 2021-02-26 2021-03-03
6.8
None Remote Medium Not required Partial Partial Partial
Incorrect use of the '<RowCountChanged>' method could have led to a user-after-poison and a potentially exploitable crash. This vulnerability affects Firefox < 85.
527 CVE-2021-23960 2021-02-26 2021-03-03
6.8
None Remote Medium Not required Partial Partial Partial
Performing garbage collection on re-declared JavaScript variables resulted in a user-after-poison, and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.
528 CVE-2021-23954 843 Mem. Corr. 2021-02-26 2021-03-03
6.8
None Remote Medium Not required Partial Partial Partial
Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.
529 CVE-2021-23926 776 2021-01-14 2021-05-17
6.4
None Remote Low Not required Partial None Partial
The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.
530 CVE-2021-23921 2021-04-01 2021-04-06
6.4
None Remote Low Not required Partial Partial None
An issue was discovered in Devolutions Server before 2020.3. There is broken access control on Password List entry elements.
531 CVE-2021-23901 611 2021-01-25 2021-05-17
6.4
None Remote Low Not required Partial Partial None
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Nutch 1.18.
532 CVE-2021-23892 362 2021-05-12 2021-05-20
6.9
None Local Medium Not required Complete Complete Complete
By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux Threat Prevention and Firewall (ENSL TP/FW) installation process, a local user can perform a privilege escalation attack to obtain administrator privileges for the purpose of executing arbitrary code through insecure use of predictable temporary file locations.
533 CVE-2021-23363 77 Exec Code 2021-03-30 2021-04-02
6.5
None Remote Low ??? Partial Partial Partial
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
534 CVE-2021-23360 77 Exec Code 2021-03-21 2021-03-26
6.5
None Remote Low ??? Partial Partial Partial
This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
535 CVE-2021-23359 20 Exec Code 2021-03-18 2021-03-24
6.5
None Remote Low ??? Partial Partial Partial
This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
536 CVE-2021-23348 77 Exec Code 2021-03-31 2021-04-02
6.5
None Remote Low ??? Partial Partial Partial
This affects the package portprocesses before 1.0.5. If (attacker-controlled) user input is given to the killProcess function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
537 CVE-2021-23339 444 2021-02-17 2021-03-11
6.4
None Remote Low Not required Partial Partial None
This affects all versions before 10.1.14 and from 10.2.0 to 10.2.4 of package com.typesafe.akka:akka-http-core. It allows multiple Transfer-Encoding headers.
538 CVE-2021-23338 502 2021-02-15 2021-02-25
6.5
None Remote Low ??? Partial Partial Partial
This affects all versions of package qlib. The workflow function in cli part of qlib was using an unsafe YAML load function.
539 CVE-2021-23337 77 2021-02-15 2021-03-26
6.5
None Remote Low ??? Partial Partial Partial
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
540 CVE-2021-23328 2021-01-29 2021-02-04
6.8
None Remote Medium Not required Partial Partial Partial
This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
541 CVE-2021-23280 434 Exec Code 2021-04-13 2021-04-21
6.5
None Remote Low ??? Partial Partial Partial
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability.
542 CVE-2021-23279 20 2021-04-13 2021-04-21
6.4
None Remote Low Not required None Partial Partial
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
543 CVE-2021-23276 89 Sql 2021-04-13 2021-04-21
6.5
None Remote Low ??? Partial Partial Partial
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit the vulnerability. Successful exploitation of this vulnerability can allow attackers to add users in the data base.
544 CVE-2021-23271 79 XSS 2021-02-02 2021-02-10
6.0
None Remote Medium ??? Partial Partial Partial
The TIBCO EBX Web Server component of TIBCO Software Inc.'s TIBCO EBX contains a vulnerability that theoretically allows a low privileged attacker with network access to execute a Stored Cross Site Scripting (XSS) attack on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO EBX: versions 5.9.12 and below.
545 CVE-2021-23169 787 Exec Code Overflow 2021-06-08 2021-06-11
6.8
None Remote Medium Not required Partial Partial Partial
A heap-buffer overflow was found in the copyIntoFrameBuffer function of OpenEXR in versions before 3.0.1. An attacker could use this flaw to execute arbitrary code with the permissions of the user running the application compiled against OpenEXR.
546 CVE-2021-23133 362 2021-04-22 2021-06-11
6.9
None Local Medium Not required Complete Complete Complete
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
547 CVE-2021-23128 2021-03-04 2021-03-05
6.4
None Remote Low Not required Partial Partial None
An issue was discovered in Joomla! 3.2.0 through 3.9.24. The core shipped but unused randval implementation within FOF (FOFEncryptRandval) used an potential insecure implemetation. That has now been replaced with a call to 'random_bytes()' and its backport that is shipped within random_compat.
548 CVE-2021-23127 2021-03-04 2021-03-05
6.4
None Remote Low Not required Partial Partial None
An issue was discovered in Joomla! 3.2.0 through 3.9.24. Usage of an insufficient length for the 2FA secret accoring to RFC 4226 of 10 bytes vs 20 bytes.
549 CVE-2021-23019 522 2021-06-01 2021-06-11
6.9
None Local Medium Not required Complete Complete Complete
The NGINX Controller 2.0.0 thru 2.9.0 and 3.x before 3.15.0 Administrator password may be exposed in the systemd.txt file that is included in the NGINX support package.
550 CVE-2021-23015 863 Bypass 2021-05-10 2021-05-24
6.5
None Remote Low ??? Partial Partial Partial
On BIG-IP 15.1.x before 15.1.3, 14.1.x before 14.1.4.2, 13.1.0.8 through 13.1.3.6, and all versions of 16.0.x, when running in Appliance Mode, an authenticated user assigned the 'Administrator' role may be able to bypass Appliance Mode restrictions utilizing undisclosed iControl REST endpoints. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.