CVE-2021-33032 CVSS:10.0
eQ-3 HomeMatic CCU2 2.57.5 and CCU3 3.57.5 devices allow remote code execution. (Last Update:2021-07-27) (Publish Update:2021-07-22)
CVE-2021-22729 CVSS:10.0
A CWE-259: Use of Hard-coded Password vulnerability exists in EVlink City (EVC1S22P4 / EVC1S7P4 all versions prior to R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 all versions prior to R8 V3.4.0.1), and EVlink Smart Wallbox (EVB1A all versions prior to R8 V3.4.0.1 ) that could allow an attacker to gain unauthorized administrative privileges when accessing to the charging station web server. (Last Update:2021-07-28) (Publish Update:2021-07-21)
CVE-2021-22730 CVSS:10.0
A CWE-798: Use of Hard-coded Credentials vulnerability exists in EVlink City (EVC1S22P4 / EVC1S7P4 all versions prior to R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 all versions prior to R8 V3.4.0.1), and EVlink Smart Wallbox (EVB1A all versions prior to R8 V3.4.0.1 ) that could an attacker to gain unauthorized administrative privileges when accessing to the charging station web server. (Last Update:2021-07-28) (Publish Update:2021-07-21)
CVE-2021-22125 CVSS:9.0
An instance of improper neutralization of special elements in the sniffer module of FortiSandbox before 3.2.2 may allow an authenticated administrator to execute commands on the underlying system's shell via altering the content of its configuration file. (Last Update:2021-07-28) (Publish Update:2021-07-20)
CVE-2021-24453 CVSS:9.0
The Include Me WordPress plugin through 1.2.1 is vulnerable to path traversal / local file inclusion, which can lead to Remote Code Execution (RCE) of the system due to log poisoning and therefore potentially a full compromise of the underlying structure (Last Update:2021-07-28) (Publish Update:2021-07-19)
CVE-2021-20110 CVSS:10.0
Due to Manage Engine Asset Explorer Agent 1.0.34 not validating HTTPS certificates, an attacker on the network can statically configure their IP address to match the Asset Explorer's Server IP address. This will allow an attacker to send a NEWSCAN request to a listening agent on the network as well as receive the agent's HTTP request verifying its authtoken. In httphandler.cpp, the agent reaching out over HTTP is vulnerable to an Integer Overflow, which can be turned into a Heap Overflow allowing for remote code execution as NT AUTHORITY/SYSTEM on the agent machine. The Integer Overflow occurs when receiving POST response from the Manage Engine server, and the agent calling "HttpQueryInfoW" in order to get the "Content-Length" size from the incoming POST request. This size is taken, but multiplied to a larger amount. If an attacker specifies a Content-Length size of 1073741823 or larger, this integer arithmetic will wrap the value back around to smaller integer, then calls "calloc" with this size to allocate memory. The following API "InternetReadFile" will copy the POST data into this buffer, which will be too small for the contents, and cause heap overflow. (Last Update:2021-07-28) (Publish Update:2021-07-19)
CVE-2021-34439 CVSS:9.3
Microsoft Windows Media Foundation Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34441, CVE-2021-34503. (Last Update:2021-07-22) (Publish Update:2021-07-16)
CVE-2021-34450 CVSS:9.0
Windows Hyper-V Remote Code Execution Vulnerability (Last Update:2021-07-22) (Publish Update:2021-07-16)
CVE-2021-34458 CVSS:9.0
Windows Kernel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34508. (Last Update:2021-07-22) (Publish Update:2021-07-16)
CVE-2021-34464 CVSS:9.3
Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34522. (Last Update:2021-07-22) (Publish Update:2021-07-16)
CVE-2020-11633 CVSS:10.0
The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges. (Last Update:2021-07-27) (Publish Update:2021-07-15)
CVE-2021-34827 CVSS:8.3
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1.13B01 BETA routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the SOAPAction HTTP header. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-12029. (Last Update:2021-07-20) (Publish Update:2021-07-15)
CVE-2021-34828 CVSS:8.3
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1.13B01 BETA routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the SOAPAction HTTP header. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-12066. (Last Update:2021-07-20) (Publish Update:2021-07-15)
CVE-2021-34830 CVSS:8.3
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1.13B01 BETA routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the Cookie HTTP header. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-12028. (Last Update:2021-07-20) (Publish Update:2021-07-15)
CVE-2021-34829 CVSS:8.3
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1.13B01 BETA routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the HNAP_AUTH HTTP header. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-12065. (Last Update:2021-07-20) (Publish Update:2021-07-15)
CVE-2021-35211 CVSS:10.0
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability. (Last Update:2021-07-26) (Publish Update:2021-07-14)
CVE-2021-34522 CVSS:9.3
Microsoft Defender Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34464. (Last Update:2021-07-22) (Publish Update:2021-07-14)
CVE-2021-34473 CVSS:10.0
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-31196, CVE-2021-31206. (Last Update:2021-07-19) (Publish Update:2021-07-14)
CVE-2021-0514 CVSS:9.3
In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-9 Android-11 Android-8.1Android ID: A-162604069 (Last Update:2021-07-16) (Publish Update:2021-07-14)
CVE-2021-0515 CVSS:10.0
In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-167389063 (Last Update:2021-07-16) (Publish Update:2021-07-14)
CVE-2021-0592 CVSS:9.3
In various functions in WideVine, there are possible out of bounds writes due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-188061006 (Last Update:2021-07-16) (Publish Update:2021-07-14)
CVE-2021-33740 CVSS:9.3
Windows Media Remote Code Execution Vulnerability (Last Update:2021-07-16) (Publish Update:2021-07-14)
CVE-2021-3570 CVSS:8.0
A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1. (Last Update:2021-07-16) (Publish Update:2021-07-09)
CVE-2021-32462 CVSS:9.0
Trend Micro Password Manager (Consumer) version 5.0.0.1217 and below is vulnerable to an Exposed Hazardous Function Remote Code Execution vulnerability which could allow an unprivileged client to manipulate the registry and escalate privileges to SYSTEM on affected installations. Authentication is required to exploit this vulnerability. (Last Update:2021-07-23) (Publish Update:2021-07-08)
CVE-2021-34610 CVSS:9.0
A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability. (Last Update:2021-07-12) (Publish Update:2021-07-08)
CVE-2021-34611 CVSS:9.0
A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability. (Last Update:2021-07-12) (Publish Update:2021-07-08)
CVE-2021-1359 CVSS:9.0
A vulnerability in the configuration management of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied XML input for the web interface. An attacker could exploit this vulnerability by uploading crafted XML configuration files that contain scripting code to a vulnerable device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. An attacker would need a valid user account with the rights to upload configuration files to exploit this vulnerability. (Last Update:2021-07-12) (Publish Update:2021-07-08)
CVE-2021-1585 CVSS:9.3
A vulnerability in the Cisco Adaptive Security Device Manager (ASDM) Launcher could allow an unauthenticated, remote attacker to execute arbitrary code on a user's operating system. This vulnerability is due to a lack of proper signature verification for specific code exchanged between the ASDM and the Launcher. An attacker could exploit this vulnerability by leveraging a man-in-the-middle position on the network to intercept the traffic between the Launcher and the ASDM and then inject arbitrary code. A successful exploit could allow the attacker to execute arbitrary code on the user's operating system with the level of privileges assigned to the ASDM Launcher. A successful exploit may require the attacker to perform a social engineering attack to persuade the user to initiate communication from the Launcher to the ASDM. (Last Update:2021-07-12) (Publish Update:2021-07-08)
CVE-2021-32525 CVSS:9.0
The same hard-coded password in QSAN Storage Manager's in the firmware allows remote attackers to access the control interface with the administrator’s credential, entering the hard-coded password of the debug mode to execute the restricted system instructions. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. (Last Update:2021-07-22) (Publish Update:2021-07-07)
CVE-2021-34527 CVSS:9.0
Windows Print Spooler Remote Code Execution Vulnerability (Last Update:2021-07-14) (Publish Update:2021-07-02)
Click here for a complete list of security vulnerabilities. This vulnerability list widget is provided by www.cvedetails.com