Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2021-3581

    Buffer Access with Incorrect Length Value in zephyr. Zephyr versions >= >=2.5.0 contain Buffer Access with Incorrect Length Value (CWE-805). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5... Read more

    Affected Products : zephyr
    • Published: Oct. 05, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-3580

    A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.... Read more

    • Published: Aug. 05, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-3579

    Incorrect Default Permissions vulnerability in the bdservicehost.exe and Vulnerability.Scan.exe components as used in Bitdefender Endpoint Security Tools for Windows, Total Security allows a local attacker to elevate privileges to NT AUTHORITY\SYSTEM This... Read more

    • Published: Oct. 28, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-3578

    A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This ... Read more

    Affected Products : fedora debian_linux isync
    • Published: Feb. 16, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-3577

    An unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device.... Read more

    • Published: Nov. 12, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-3576

    Execution with Unnecessary Privileges vulnerability in Bitdefender Endpoint Security Tools, Total Security allows a local attacker to elevate to 'NT AUTHORITY\System. Impersonation enables the server thread to perform actions on behalf of the client but w... Read more

    • Published: Oct. 28, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-3575

    A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.... Read more

    Affected Products : enterprise_linux fedora openjpeg
    • Published: Mar. 04, 2022
    • Modified: Nov. 21, 2024
  • 3.3

    LOW
    CVE-2021-3574

    A vulnerability was found in ImageMagick-7.0.11-5, where executing a crafted file with the convert command, ASAN detects memory leaks.... Read more

    Affected Products : fedora imagemagick
    • Published: Aug. 26, 2022
    • Modified: Nov. 21, 2024
  • 6.9

    MEDIUM
    CVE-2021-3573

    A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blackli... Read more

    Affected Products : linux_kernel enterprise_linux fedora
    • Published: Aug. 13, 2021
    • Modified: Nov. 21, 2024
  • 5.7

    MEDIUM
    CVE-2021-3572

    A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. Th... Read more

    • Published: Nov. 10, 2021
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2021-3571

    A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The high... Read more

    Affected Products : enterprise_linux fedora linuxptp
    • Published: Jul. 09, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-3570

    A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from t... Read more

    • Published: Jul. 09, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-3569

    A stack corruption bug was found in libtpms in versions before 0.7.2 and before 0.8.0 while decrypting data using RSA. This flaw could result in a SIGBUS (bad memory access) and termination of swtpm. The highest threat from this vulnerability is to system... Read more

    Affected Products : enterprise_linux libtpms
    • Published: Jun. 03, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-3567

    A flaw was found in Caribou due to a regression of CVE-2020-25712 fix. An attacker could use this flaw to bypass screen-locking applications that leverage Caribou as an input mechanism. The highest threat from this vulnerability is to system availability.... Read more

    Affected Products : caribou
    • Published: Mar. 25, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-3566

    Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_probe' function assigned to it. By crafting a legitimate "ffconcat" file that references an image, followed by a file the triggers the tty demuxer, the contents of the second file will be c... Read more

    Affected Products : debian_linux ffmpeg
    • Published: Aug. 05, 2021
    • Modified: Nov. 21, 2024
  • 5.9

    MEDIUM
    CVE-2021-3565

    A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from t... Read more

    Affected Products : enterprise_linux fedora tpm2-tools
    • Published: Jun. 04, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-3564

    A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel ... Read more

    Affected Products : linux_kernel fedora debian_linux
    • Published: Jun. 08, 2021
    • Modified: Nov. 21, 2024
  • 7.4

    HIGH
    CVE-2021-3563

    A flaw was found in openstack-keystone. Only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data co... Read more

    • Published: Aug. 26, 2022
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2021-3561

    An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest thre... Read more

    Affected Products : fedora debian_linux fig2dev
    • Published: May. 26, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-3559

    A flaw was found in libvirt in the virConnectListAllNodeDevices API in versions before 7.0.0. It only affects hosts with a PCI device and driver that supports mediated devices (e.g., GRID driver). This flaw could be used by an unprivileged client with a r... Read more

    • Published: May. 24, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 292803 Results