Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 10.0

    HIGH
    CVE-2021-44735

    Embedded web server command injection vulnerability in Lexmark devices through 2021-12-07.... Read more

    • Published: Jan. 20, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2021-44734

    Embedded web server input sanitization vulnerability in Lexmark devices through 2021-12-07, which can which can lead to remote code execution on the device.... Read more

    • Published: Jan. 20, 2022
    • Modified: Nov. 21, 2024
  • 7.0

    HIGH
    CVE-2021-44733

    A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.... Read more

    • Published: Dec. 22, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-44732

    Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.... Read more

    Affected Products : debian_linux mbed_tls
    • Published: Dec. 20, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-44731

    A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace a... Read more

    Affected Products : ubuntu_linux fedora debian_linux snapd
    • Published: Feb. 17, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-44730

    snapd 2.54.2 did not properly validate the location of the snap-confine binary. A local attacker who can hardlink this binary to another location to cause snap-confine to execute other arbitrary binaries and hence gain privilege escalation. Fixed in snapd... Read more

    Affected Products : ubuntu_linux fedora debian_linux snapd
    • Published: Feb. 17, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-44726

    KNIME Server before 4.13.4 allows XSS via the old WebPortal login page.... Read more

    Affected Products : knime_server
    • Published: Dec. 08, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-44725

    KNIME Server before 4.13.4 allows directory traversal in a request for a client profile.... Read more

    Affected Products : knime_server
    • Published: Dec. 08, 2021
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2021-44720

    In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the "Maintenance > Push Configuration > Targets > Target Name" targets.cgi screen. A read-only administrative user can escalat... Read more

    Affected Products : pulse_connect_secure connect_secure
    • Published: Aug. 12, 2022
    • Modified: Nov. 21, 2024
  • 8.4

    HIGH
    CVE-2021-44719

    Docker Desktop 4.3.0 has Incorrect Access Control.... Read more

    Affected Products : macos mac_os_x desktop docker_desktop
    • Published: May. 25, 2022
    • Modified: Nov. 21, 2024
  • 5.9

    MEDIUM
    CVE-2021-44718

    wolfSSL through 5.0.0 allows an attacker to cause a denial of service and infinite loop in the client component by sending crafted traffic from a Machine-in-the-Middle (MITM) position. The root cause is that the client module accepts TLS messages that nor... Read more

    Affected Products : wolfssl
    • Published: Sep. 02, 2022
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2021-44717

    Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.... Read more

    Affected Products : debian_linux go unix
    • Published: Jan. 01, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-44716

    net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.... Read more

    • Published: Jan. 01, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-44715

    Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memo... Read more

    • Published: Jan. 14, 2022
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2021-44714

    Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a Violation of Secure Design Principles that could lead to a Security feature bypass. Acrobat Reader DC displays a warning mess... Read more

    • Published: Jan. 14, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-44713

    Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in application denial of service. Ex... Read more

    • Published: Jan. 14, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-44712

    Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an Access of Memory Location After End of Buffer vulnerability that could lead to application denial-of-service. Exploitation o... Read more

    • Published: Jan. 14, 2022
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2021-44711

    Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current use... Read more

    • Published: Jan. 14, 2022
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2021-44710

    Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a use-after-free vulnerability in the processing of Format event actions that could result in arbitrary code execution in the c... Read more

    • Published: Jan. 14, 2022
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2021-44709

    Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a heap overflow vulnerability due to insecure handling of a crafted file, potentially resulting in arbitrary code execution in ... Read more

    • Published: Jan. 14, 2022
    • Modified: Nov. 21, 2024
Showing 20 of 293647 Results