Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2021-35032

    A vulnerability in the 'libsal.so' of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call.... Read more

    • EPSS Score: %0.04
    • Published: Dec. 28, 2021
    • Modified: Nov. 21, 2024
  • 8.0

    HIGH
    CVE-2021-35031

    A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device.... Read more

    • EPSS Score: %0.08
    • Published: Dec. 28, 2021
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2021-35030

    A vulnerability was found in the CGI program in Zyxel GS1900-8 firmware version V2.60, that did not properly sterilize packet contents and could allow an authenticated, local user to perform a cross-site scripting (XSS) attack via a crafted LLDP packet.... Read more

    • EPSS Score: %0.12
    • Published: Jul. 26, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-35029

    An authentication bypasss vulnerability in the web-based management interface of Zyxel USG/Zywall series firmware versions 4.35 through 4.64 and USG Flex, ATP, and VPN series firmware versions 4.35 through 5.01, which could allow a remote attacker to exec... Read more

    • EPSS Score: %0.71
    • Published: Jul. 02, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-35028

    A command injection vulnerability in the CGI program of the Zyxel VPN2S firmware version 1.12 could allow an authenticated, local user to execute arbitrary OS commands.... Read more

    Affected Products : zywall_vpn2s_firmware zywall_vpn2s
    • EPSS Score: %0.07
    • Published: Sep. 29, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-35027

    A directory traversal vulnerability in the web server of the Zyxel VPN2S firmware version 1.12 could allow a remote attacker to gain access to sensitive information.... Read more

    Affected Products : zywall_vpn2s_firmware zywall_vpn2s
    • EPSS Score: %0.32
    • Published: Sep. 29, 2021
    • Modified: Nov. 21, 2024
  • 3.3

    LOW
    CVE-2021-35005

    This vulnerability allows local attackers to disclose sensitive information on affected installations of TeamViewer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ... Read more

    Affected Products : teamviewer
    • EPSS Score: %0.05
    • Published: Jan. 24, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2021-35004

    This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link TL-WA1201 1.0.1 Build 20200709 rel.66244(5553) wireless access points. Authentication is not required to exploit this vulnerability. The specific fla... Read more

    Affected Products : tl-wa1201_firmware tl-wa1201
    • EPSS Score: %16.46
    • Published: Jan. 21, 2022
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2021-35003

    This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer C90 1.0.6 Build 20200114 rel.73164(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists withi... Read more

    Affected Products : archer_c90_firmware archer_c90
    • EPSS Score: %10.63
    • Published: Jan. 21, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-34998

    This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Free Antivirus 20.2.0.0. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vu... Read more

    Affected Products : panda_antivirus
    • EPSS Score: %0.05
    • Published: Jan. 13, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-34997

    This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell 11.22.22. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The sp... Read more

    Affected Products : commcell commvault
    • EPSS Score: %2.77
    • Published: Jan. 13, 2022
    • Modified: Nov. 21, 2024
  • 9.0

    HIGH
    CVE-2021-34996

    This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell 11.22.22. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The sp... Read more

    Affected Products : commcell commvault
    • EPSS Score: %23.26
    • Published: Jan. 13, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-34995

    This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell 11.22.22. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The sp... Read more

    Affected Products : commcell commvault
    • EPSS Score: %2.86
    • Published: Jan. 13, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-34994

    This vulnerability allows remote attackers to execute arbitrary code on affected installations of Commvault CommCell 11.22.22. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The sp... Read more

    Affected Products : commcell commvault
    • EPSS Score: %0.60
    • Published: Jan. 13, 2022
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-34993

    This vulnerability allows remote attackers to bypass authentication on affected installations of Commvault CommCell 11.22.22. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CVSearchService service. The is... Read more

    Affected Products : commcell commvault
    • EPSS Score: %0.91
    • Published: Jan. 13, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-34992

    This vulnerability allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS 6.10. Authentication is required to exploit this vulnerability. The specific flaw exists within Composite.dll. The issue results from the la... Read more

    Affected Products : c1_cms
    • EPSS Score: %21.14
    • Published: Nov. 15, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-34991

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R6400v2 1.0.4.106_10.0.80 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPnP s... Read more

    • EPSS Score: %0.56
    • Published: Nov. 15, 2021
    • Modified: Nov. 21, 2024
  • 8.2

    HIGH
    CVE-2021-34987

    This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.1 (49187). An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this v... Read more

    Affected Products : parallels_desktop
    • EPSS Score: %0.24
    • Published: Jul. 15, 2022
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-34986

    This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.0 (49183). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerab... Read more

    Affected Products : parallels_desktop
    • EPSS Score: %0.19
    • Published: Jul. 15, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-34985

    This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley ContextCapture 10.18.0.232. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open... Read more

    Affected Products : contextcapture_viewer
    • EPSS Score: %0.51
    • Published: Jan. 13, 2022
    • Modified: Nov. 21, 2024
Showing 20 of 291368 Results