Search Results (9651 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-35297 1 Scalabium 1 Dbase Viewer 2024-11-21 7.8 High
Scalabium dBase Viewer version 2.6 (Build 5.751) is vulnerable to remote code execution via a crafted DBF file that triggers a buffer overflow. An attacker can use the Structured Exception Handler (SEH) records and redirect execution to attacker-controlled code.
CVE-2021-35244 2 Microsoft, Solarwinds 2 Windows, Orion Platform 2024-11-21 6.8 Medium
The "Log alert to a file" action within action management enables any Orion Platform user with Orion alert management rights to write to any file. An attacker with Orion alert management rights could use this vulnerability to perform an unrestricted file upload causing a remote code execution.
CVE-2021-35223 1 Solarwinds 1 Serv-u 2024-11-21 8.5 High
The Serv-U File Server allows for events such as user login failures to be audited by executing a command. This command can be supplied with parameters that can take the form of user string variables, allowing remote code execution.
CVE-2021-35222 2 Microsoft, Solarwinds 2 Windows, Orion Platform 2024-11-21 8 High
This vulnerability allows attackers to impersonate users and perform arbitrary actions leading to a Remote Code Execution (RCE) from the Alerts Settings page.
CVE-2021-35221 2 Microsoft, Solarwinds 2 Windows, Orion Platform 2024-11-21 6.3 Medium
Improper Access Control Tampering Vulnerability using ImportAlert function which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.
CVE-2021-35220 1 Solarwinds 1 Orion Platform 2024-11-21 8.1 High
Command Injection vulnerability in EmailWebPage API which can lead to a Remote Code Execution (RCE) from the Alerts Settings page.
CVE-2021-35218 1 Solarwinds 1 Orion Platform 2024-11-21 8.9 High
Deserialization of Untrusted Data in the Web Console Chart Endpoint can lead to remote code execution. An unauthorized attacker who has network access to the Orion Patch Manager Web Console could potentially exploit this and compromise the server
CVE-2021-35217 1 Solarwinds 1 Patch Manager 2024-11-21 8.9 High
Insecure Deseralization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module and reported to us by ZDI. An Authenticated Attacker could exploit it by executing WSAsyncExecuteTasks deserialization of untrusted data.
CVE-2021-35216 1 Solarwinds 1 Patch Manager 2024-11-21 8.9 High
Insecure Deserialization of untrusted data remote code execution vulnerability was discovered in Patch Manager Orion Platform Integration module. An Authenticated Attacker with network access via HTTP can compromise this vulnerability can result in Remote Code Execution.
CVE-2021-35215 1 Solarwinds 1 Orion Platform 2024-11-21 8.9 High
Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability.
CVE-2021-34813 1 Matrix 1 Olm 2024-11-21 9.8 Critical
Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.
CVE-2021-34735 1 Cisco 6 Ata 190, Ata 190 Firmware, Ata 191 and 3 more 2024-11-21 8.8 High
Multiple vulnerabilities in the Cisco ATA 190 Series Analog Telephone Adapter Software could allow an attacker to perform a command injection attack resulting in remote code execution or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CVE-2021-34710 1 Cisco 6 Ata 190, Ata 190 Firmware, Ata 191 and 3 more 2024-11-21 8.8 High
Multiple vulnerabilities in the Cisco ATA 190 Series Analog Telephone Adapter Software could allow an attacker to perform a command injection attack resulting in remote code execution or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CVE-2021-34685 1 Hitachi 1 Vantara Pentaho 2024-11-21 2.7 Low
UploadService in Hitachi Vantara Pentaho Business Analytics through 9.1 does not properly verify uploaded user files, which allows an authenticated user to upload various files of different file types. Specifically, a .jsp file is not allowed, but a .jsp. file is allowed (and leads to remote code execution).
CVE-2021-34605 1 Xinje 1 Xd\/e Series Plc Program Tool 2024-11-21 7.3 High
A zip slip vulnerability in XINJE XD/E Series PLC Program Tool up to version v3.5.1 can provide an attacker with arbitrary file write privilege when opening a specially-crafted project file. This vulnerability can be triggered by manually opening an infected project file, or by initiating an upload program request from an infected Xinje PLC. This can result in remote code execution, information disclosure and denial of service of the system running the XINJE XD/E Series PLC Program Tool.
CVE-2021-34551 3 Fedoraproject, Microsoft, Phpmailer Project 3 Fedora, Windows, Phpmailer 2024-11-21 8.1 High
PHPMailer before 6.5.0 on Windows allows remote code execution if lang_path is untrusted data and has a UNC pathname.
CVE-2021-34534 1 Microsoft 9 Windows 10, Windows 10 1507, Windows 10 1607 and 6 more 2024-11-21 6.8 Medium
Windows MSHTML Platform Remote Code Execution Vulnerability
CVE-2021-34533 1 Microsoft 19 Windows 10, Windows 10 1507, Windows 10 1607 and 16 more 2024-11-21 7.8 High
Windows Graphics Component Font Parsing Remote Code Execution Vulnerability
CVE-2021-34530 1 Microsoft 11 Windows 10, Windows 10 1507, Windows 10 1607 and 8 more 2024-11-21 7.8 High
Windows Graphics Component Remote Code Execution Vulnerability
CVE-2021-34529 1 Microsoft 1 Visual Studio Code 2024-11-21 7.8 High
Visual Studio Code Remote Code Execution Vulnerability