Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2021-27657

    Successful exploitation of this vulnerability could give an authenticated Metasys user an unintended level of access to the server file system, allowing them to access or modify system files by sending specifically crafted web messages to the Metasys syst... Read more

    Affected Products : metasys
    • EPSS Score: %0.29
    • Published: Jun. 04, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-27656

    A vulnerability in exacqVision Web Service 20.12.2.0 and prior could allow an unauthenticated attacker to view system-level information about the exacqVision Web Service and the operating system.... Read more

    Affected Products : exacqvision_web_service
    • EPSS Score: %0.25
    • Published: Mar. 18, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27654

    Forgotten password reset functionality for local accounts can be used to bypass local authentication checks.... Read more

    Affected Products : pega_platform infinity
    • EPSS Score: %0.13
    • Published: Jan. 28, 2022
    • Modified: Nov. 21, 2024
  • 6.6

    MEDIUM
    CVE-2021-27653

    Misconfiguration of the Pega Chat Access Group portal in Pega platform 7.4.0 - 8.5.x could lead to unintended data exposure.... Read more

    Affected Products : infinity
    • EPSS Score: %0.31
    • Published: Apr. 01, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-27651

    In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks.... Read more

    Affected Products : pega_platform infinity
    • EPSS Score: %90.36
    • Published: Apr. 29, 2021
    • Modified: Nov. 21, 2024
  • 9.0

    CRITICAL
    CVE-2021-27648

    Externally controlled reference to a resource in another sphere in quarantine functionality in Synology Antivirus Essential before 1.4.8-2801 allows remote authenticated users to obtain privilege via unspecified vectors.... Read more

    Affected Products : antivirus_essential
    • EPSS Score: %10.12
    • Published: Apr. 28, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27644

    In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password)... Read more

    Affected Products : dolphinscheduler
    • EPSS Score: %3.94
    • Published: Nov. 01, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-27643

    SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is cau... Read more

    Affected Products : 3d_visual_enterprise_viewer
    • EPSS Score: %0.14
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-27642

    SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PCX file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is cau... Read more

    Affected Products : 3d_visual_enterprise_viewer
    • EPSS Score: %0.14
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-27641

    SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated TIF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is cau... Read more

    Affected Products : 3d_visual_enterprise_viewer
    • EPSS Score: %0.14
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-27640

    SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PSD file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is cau... Read more

    Affected Products : 3d_visual_enterprise_viewer
    • EPSS Score: %0.14
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-27639

    SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated JT file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caus... Read more

    Affected Products : 3d_visual_enterprise_viewer
    • EPSS Score: %0.14
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-27638

    SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated JT file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caus... Read more

    Affected Products : 3d_visual_enterprise_viewer
    • EPSS Score: %0.14
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 5.9

    MEDIUM
    CVE-2021-27637

    Under certain conditions SAP Enable Now (SAP Workforce Performance Builder - Manager), versions - 1.0, 10 allows an attacker to access information which would otherwise be restricted leading to information disclosure.... Read more

    Affected Products : enable_now
    • EPSS Score: %0.06
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 9.0

    CRITICAL
    CVE-2021-27635

    SAP NetWeaver AS for JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker authenticated as an administrator to connect over a network and submit a specially crafted XML file in the application because of missing XML Validation, this vulnerabi... Read more

    • EPSS Score: %2.08
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-27634

    SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without spe... Read more

    Affected Products : netweaver_abap
    • EPSS Score: %0.21
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-27633

    SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without spe... Read more

    Affected Products : netweaver_abap
    • EPSS Score: %0.28
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-27632

    SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without sp... Read more

    Affected Products : netweaver_as_abap
    • EPSS Score: %0.32
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-27631

    SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without sp... Read more

    Affected Products : netweaver_as_abap
    • EPSS Score: %0.32
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-27630

    SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without sp... Read more

    Affected Products : netweaver_as_abap
    • EPSS Score: %0.32
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 291728 Results