Search Results (9656 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-38703 1 Kpn 2 Experia Wifi, Experia Wifi Firmware 2024-11-21 8.8 High
Wireless devices running certain Arcadyan-derived firmware (such as KPN Experia WiFi 1.00.15) do not properly sanitise user input to the syslog configuration form. An authenticated remote attacker could leverage this to alter the device configuration and achieve remote code execution. This can be exploited in conjunction with CVE-2021-20090.
CVE-2021-38672 1 Microsoft 3 Windows 11, Windows 11 21h2, Windows Server 2022 2024-11-21 8 High
Windows Hyper-V Remote Code Execution Vulnerability
CVE-2021-38666 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2024-11-21 8.8 High
Remote Desktop Client Remote Code Execution Vulnerability
CVE-2021-38661 1 Microsoft 1 Hevc Video Extensions 2024-11-21 7.8 High
HEVC Video Extensions Remote Code Execution Vulnerability
CVE-2021-38660 1 Microsoft 1 Excel 2024-11-21 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2021-38659 1 Microsoft 1 365 Apps 2024-11-21 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2021-38658 1 Microsoft 1 Office 2024-11-21 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2021-38656 1 Microsoft 1 365 Apps 2024-11-21 7.8 High
Microsoft Word Remote Code Execution Vulnerability
CVE-2021-38655 1 Microsoft 6 365 Apps, Excel, Office and 3 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-38654 1 Microsoft 2 365 Apps, Office 2024-11-21 7.8 High
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2021-38653 1 Microsoft 2 365 Apps, Office 2024-11-21 7.8 High
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2021-38644 1 Microsoft 1 Mpeg-2 Video Extension 2024-11-21 7.8 High
Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability
CVE-2021-38613 1 Nascent 1 Remkon Device Manager 2024-11-21 9.8 Critical
The assets/index.php Image Upload feature of the NASCENT RemKon Device Manager 4.0.0.0 allows attackers to upload any code to the target system and achieve remote code execution.
CVE-2021-38540 1 Apache 1 Airflow 2024-11-21 9.8 Critical
The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3.
CVE-2021-38484 1 Inhandnetworks 2 Ir615, Ir615 Firmware 2024-11-21 9.1 Critical
InHand Networks IR615 Router's Versions 2.3.0.r4724 and 2.3.0.r4870 do not have a filter or signature check to detect or prevent an upload of malicious files to the server, which may allow an attacker, acting as an administrator, to upload malicious files. This could result in cross-site scripting, deletion of system files, and remote code execution.
CVE-2021-38408 1 Advantech 1 Webaccess 2024-11-21 9.8 Critical
A stack-based buffer overflow vulnerability in Advantech WebAccess Versions 9.02 and prior caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.
CVE-2021-38366 1 Sitecore 1 Sitecore 2024-11-21 8.8 High
Sitecore through 10.1, when Update Center is enabled, allows remote authenticated users to upload arbitrary files and achieve remote code execution by visiting an uploaded .aspx file at an admin/Packages URL.
CVE-2021-38294 1 Apache 1 Storm 2024-11-21 9.8 Critical
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
CVE-2021-38142 1 Barco 1 Mirrorop Windows Sender 2024-11-21 8.8 High
Barco MirrorOp Windows Sender before 2.5.3.65 uses cleartext HTTP and thus allows rogue software upgrades. An attacker on the local network can achieve remote code execution on any computer that tries to update Windows Sender due to the fact that the upgrade mechanism is not secured (is not protected with TLS).
CVE-2021-38125 1 Microfocus 1 Operations Bridge 2024-11-21 9.8 Critical
Unauthenticated remote code execution in Micro Focus Operations Bridge containerized, affecting versions 2021.05, 2021.08, and newer versions of Micro Focus Operations Bridge containerized if the deployment was upgraded from 2021.05 or 2021.08. The vulnerability could be exploited to unauthenticated remote code execution.