Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 10.0

    HIGH
    CVE-2021-36287

    Dell VNX2 for file version 8.1.21.266 and earlier, contain an unauthenticated remote code execution vulnerability which may lead unauthenticated users to execute commands on the system.... Read more

    • EPSS Score: %4.68
    • Published: Apr. 08, 2022
    • Modified: Nov. 21, 2024
  • 7.1

    HIGH
    CVE-2021-36286

    Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any... Read more

    • EPSS Score: %0.11
    • Published: Sep. 28, 2021
    • Modified: Nov. 21, 2024
  • 5.7

    MEDIUM
    CVE-2021-36285

    Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive NVMe password attempt mitigations in order to carry out a bru... Read more

    • EPSS Score: %0.05
    • Published: Sep. 28, 2021
    • Modified: Nov. 21, 2024
  • 5.7

    MEDIUM
    CVE-2021-36284

    Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive admin password attempt mitigations in order to carry out a br... Read more

    • EPSS Score: %0.05
    • Published: Sep. 28, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-36283

    Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.... Read more

    • EPSS Score: %0.04
    • Published: Sep. 28, 2021
    • Modified: Nov. 21, 2024
  • 3.3

    LOW
    CVE-2021-36282

    Dell EMC PowerScale OneFS versions 8.2.x - 9.1.0.x contain a use of uninitialized resource vulnerability. This can potentially allow an authenticated user with ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH privileges to gain access up to 24 bytes of data w... Read more

    • EPSS Score: %0.05
    • Published: Aug. 16, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-36281

    Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an incorrect permission assignment vulnerability. A low privileged authenticated user can potentially exploit this vulnerability to escalate privileges.... Read more

    • EPSS Score: %0.40
    • Published: Aug. 16, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-36280

    Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an incorrect permission assignment for critical resource vulnerability. This could allow a user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE to access privileged information about the cluster.... Read more

    • EPSS Score: %0.05
    • Published: Aug. 16, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-36279

    Dell EMC PowerScale OneFS versions 8.2.x - 9.2.x contain an incorrect permission assignment for critical resource vulnerability. This could allow a user with ISI_PRIV_LOGIN_SSH or ISI_PRIV_LOGIN_CONSOLE to access privileged information about the cluster.... Read more

    • EPSS Score: %0.04
    • Published: Aug. 16, 2021
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2021-36278

    Dell EMC PowerScale OneFS versions 8.2.x, 9.1.0.x, and 9.1.1.1 contain a sensitive information exposure vulnerability in log files. A local malicious user with ISI_PRIV_LOGIN_SSH, ISI_PRIV_LOGIN_CONSOLE, or ISI_PRIV_SYS_SUPPORT privileges may exploit this... Read more

    • EPSS Score: %0.19
    • Published: Aug. 16, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-36277

    Dell Command | Update, Dell Update, and Alienware Update versions before 4.3 contains an Improper Verification of Cryptographic Signature Vulnerability. A local authenticated malicious user may exploit this vulnerability by executing arbitrary code on the... Read more

    • EPSS Score: %0.02
    • Published: Aug. 09, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-36276

    Dell DBUtilDrv2.sys driver (versions 2.5 and 2.6) contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.... Read more

    • EPSS Score: %0.04
    • Published: Aug. 09, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-36235

    An issue was discovered in Ivanti Workspace Control before 10.6.30.0. A locally authenticated user with low privileges can bypass File and Folder Security by leveraging an unspecified attack vector. As a result, the attacker can start applications with el... Read more

    Affected Products : workspace_control
    • EPSS Score: %0.30
    • Published: Sep. 01, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-36234

    Use of a hard-coded cryptographic key in MIK.starlight 7.9.5.24363 allows local users to decrypt credentials via unspecified vectors.... Read more

    Affected Products : mik.starlight
    • EPSS Score: %0.05
    • Published: Aug. 31, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-36233

    The function AdminGetFirstFileContentByFilePath in MIK.starlight 7.9.5.24363 allows (by design) an authenticated attacker to read arbitrary files from the filesystem by specifying the file path.... Read more

    Affected Products : mik.starlight
    • EPSS Score: %0.42
    • Published: Aug. 31, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-36232

    Improper Authorization in multiple functions in MIK.starlight 7.9.5.24363 allows an authenticated attacker to escalate privileges.... Read more

    Affected Products : mik.starlight
    • EPSS Score: %0.43
    • Published: Aug. 31, 2021
    • Modified: Nov. 21, 2024
  • 9.0

    HIGH
    CVE-2021-36231

    Deserialization of untrusted data in multiple functions in MIK.starlight 7.9.5.24363 allows authenticated remote attackers to execute operating system commands by crafting serialized objects.... Read more

    Affected Products : mik.starlight
    • EPSS Score: %1.10
    • Published: Aug. 31, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-36230

    HashiCorp Terraform Enterprise releases up to v202106-1 did not properly perform authorization checks on a subset of API requests executed using the run token, allowing privilege escalation to organization owner. Fixed in v202107-1.... Read more

    Affected Products : terraform
    • EPSS Score: %0.55
    • Published: Jul. 20, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-36224

    Western Digital My Cloud devices before OS5 have a nobody account with a blank password.... Read more

    Affected Products : my_cloud_os my_cloud_pr4100
    • EPSS Score: %0.08
    • Published: Feb. 06, 2023
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-36222

    ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is ... Read more

    • EPSS Score: %5.58
    • Published: Jul. 22, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 291638 Results