Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2021-27261

    This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious ... Read more

    Affected Products : foxit_reader phantompdf windows
    • EPSS Score: %4.57
    • Published: Mar. 30, 2021
    • Modified: Nov. 21, 2024
  • 3.2

    LOW
    CVE-2021-27260

    This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to explo... Read more

    Affected Products : parallels_desktop
    • EPSS Score: %0.10
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-27259

    This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vuln... Read more

    Affected Products : parallels_desktop
    • EPSS Score: %0.12
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-27258

    This vulnerability allows remote attackers to execute escalate privileges on affected installations of SolarWinds Orion Platform 2020.2. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SaveUserSetting endp... Read more

    Affected Products : orion_platform
    • EPSS Score: %11.23
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-27257

    This vulnerability allows network-adjacent attackers to compromise the integrity of downloaded information on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability. The specific fla... Read more

    • EPSS Score: %0.06
    • Published: Mar. 05, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27256

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Although authentication is required to exploit this vulnerability, the existing authentication mechanism c... Read more

    • EPSS Score: %0.56
    • Published: Mar. 05, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27255

    This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability. The specific flaw exists within the refresh_status.asp... Read more

    • EPSS Score: %1.66
    • Published: Mar. 05, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27254

    This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7800. Authentication is not required to exploit this vulnerability. The specific flaw exists within the apply_save.cgi endpoint. This issue... Read more

    • EPSS Score: %0.08
    • Published: Mar. 05, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27253

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. ... Read more

    • EPSS Score: %0.54
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27252

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling... Read more

    • EPSS Score: %0.41
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27251

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR Nighthawk R7800. Authentication is not required to exploit this vulnerability The specific flaw exists within handling of firmware updates.... Read more

    • EPSS Score: %0.22
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-27250

    This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-2020 v1.01rc001 Wi-Fi access points. Authentication is not required to exploit this vulnerability. The specific flaw exists with... Read more

    Affected Products : dap-2020_firmware dap-2020
    • EPSS Score: %73.69
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27249

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 v1.01rc001 Wi-Fi access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the p... Read more

    Affected Products : dap-2020_firmware dap-2020
    • EPSS Score: %1.44
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27248

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 v1.01rc001 Wi-Fi access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the p... Read more

    Affected Products : dap-2020_firmware dap-2020
    • EPSS Score: %0.66
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-27247

    This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat 2.9.5 desktop version. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or op... Read more

    Affected Products : wechat
    • EPSS Score: %0.60
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 8.0

    HIGH
    CVE-2021-27246

    This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 1.0.15 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling... Read more

    Affected Products : ac1750_firmware ac1750
    • EPSS Score: %8.03
    • Published: Apr. 14, 2021
    • Modified: Nov. 21, 2024
  • 9.3

    HIGH
    CVE-2021-27245

    This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists ... Read more

    Affected Products : archer_a7_firmware archer_a7
    • EPSS Score: %4.21
    • Published: Mar. 29, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-27244

    This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploi... Read more

    Affected Products : parallels_desktop
    • EPSS Score: %0.09
    • Published: Mar. 29, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27243

    This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vuln... Read more

    Affected Products : parallels_desktop
    • EPSS Score: %0.09
    • Published: Mar. 29, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-27242

    This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.0.1-48919. An attacker must first obtain the ability to execute low-privileged code on the target guest system in order to exploit this vuln... Read more

    Affected Products : parallels_desktop
    • EPSS Score: %0.19
    • Published: Mar. 29, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 291722 Results