Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 9.8

    CRITICAL
    CVE-2021-22160

    If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instance... Read more

    Affected Products : pulsar
    • EPSS Score: %18.53
    • Published: May. 26, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-22159

    Insider Threat Management Windows Agent Local Privilege Escalation Vulnerability The Proofpoint Insider Threat Management (formerly ObserveIT) Agent for Windows before 7.4.3, 7.5.4, 7.6.5, 7.7.5, 7.8.4, 7.9.3, 7.10.2, and 7.11.0.25 as well as versions 7.3... Read more

    Affected Products : insider_threat_management
    • EPSS Score: %0.03
    • Published: Jan. 26, 2021
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2021-22158

    The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is vulnerable to XML external entity (XXE) injection in the Web Console. The vulnerability requires admin user privileges and knowledge of the XML file's encryption key to success... Read more

    Affected Products : insider_threat_management
    • EPSS Score: %0.21
    • Published: Apr. 06, 2021
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2021-22157

    Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.11.1 allows stored XSS.... Read more

    Affected Products : insider_threat_management
    • EPSS Score: %0.32
    • Published: Apr. 06, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-22155

    An Authentication Bypass vulnerability in the SAML Authentication component of BlackBerry Workspaces Server (deployed with Appliance-X) version(s) 10.1, 9.1 and earlier could allow an attacker to potentially gain access to the application in the context o... Read more

    Affected Products : workspaces_server workspaces
    • EPSS Score: %0.37
    • Published: May. 13, 2021
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2021-22154

    An Information Disclosure vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially gain access to a victim's web history.... Read more

    • EPSS Score: %0.24
    • Published: May. 13, 2021
    • Modified: Nov. 21, 2024
  • 7.3

    HIGH
    CVE-2021-22153

    A Remote Code Execution vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially cause the spreadsheet application to run commands on the vic... Read more

    • EPSS Score: %0.65
    • Published: May. 13, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-22152

    A Denial of Service due to Improper Input Validation vulnerability in the Management Console component of BlackBerry UEM version(s) 12.13.1 QF2 and earlier and 12.12.1a QF6 and earlier could allow an attacker to potentially to prevent any new user connect... Read more

    • EPSS Score: %0.05
    • Published: May. 13, 2021
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2021-22151

    It was discovered that Kibana was not validating a user supplied path, which would load .pbf files. Because of this, a malicious user could arbitrarily traverse the Kibana host to load internal files ending in the .pbf extension.... Read more

    Affected Products : kibana
    • EPSS Score: %0.80
    • Published: Nov. 22, 2023
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2021-22150

    It was discovered that a user with Fleet admin permissions could upload a malicious package. Due to using an older version of the js-yaml library, this package would be loaded in an insecure manner, allowing an attacker to execute commands on the Kibana s... Read more

    Affected Products : kibana
    • EPSS Score: %0.16
    • Published: Nov. 22, 2023
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-22149

    Elastic Enterprise Search App Search versions before 7.14.0 are vulnerable to an issue where API keys were missing authorization via an alternate route. Using this vulnerability, an authenticated attacker could utilize API keys belonging to higher privile... Read more

    Affected Products : enterprise_search
    • EPSS Score: %0.68
    • Published: Sep. 15, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-22148

    Elastic Enterprise Search App Search versions before 7.14.0 was vulnerable to an issue where API keys were not bound to the same engines as their creator. This could lead to a less privileged user gaining access to unauthorized engines.... Read more

    Affected Products : enterprise_search
    • EPSS Score: %0.23
    • Published: Sep. 15, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-22147

    Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view.... Read more

    Affected Products : elasticsearch
    • EPSS Score: %0.28
    • Published: Sep. 15, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-22146

    All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an atta... Read more

    Affected Products : elasticsearch
    • EPSS Score: %29.90
    • Published: Jul. 21, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-22144

    In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticsearch ... Read more

    • EPSS Score: %0.30
    • Published: Jul. 26, 2021
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2021-22143

    The Elastic APM .NET Agent can leak sensitive HTTP header information when logging the details during an application error. Normally, the APM agent will sanitize sensitive HTTP header details before sending the information to the APM server. During an app... Read more

    Affected Products : apm_.net_agent
    • EPSS Score: %0.20
    • Published: Nov. 22, 2023
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-22142

    Kibana contains an embedded version of the Chromium browser that the Reporting feature uses to generate the downloadable reports. If a user with permissions to generate reports is able to render arbitrary HTML with this browser, they may be able to levera... Read more

    Affected Products : kibana
    • EPSS Score: %0.47
    • Published: Nov. 22, 2023
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-22140

    Elastic App Search versions after 7.11.0 and before 7.12.0 contain an XML External Entity Injection issue (XXE) in the App Search web crawler beta feature. Using this vector, an attacker whose website is being crawled by App Search could craft a malicious... Read more

    Affected Products : elastic_app_search
    • EPSS Score: %0.37
    • Published: May. 13, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-22139

    Kibana versions before 7.12.1 contain a denial of service vulnerability was found in the webhook actions due to a lack of timeout or a limit on the request size. An attacker with permissions to create webhook actions could drain the Kibana host connection... Read more

    Affected Products : kibana
    • EPSS Score: %0.39
    • Published: May. 13, 2021
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2021-22138

    In Logstash versions after 6.4.0 and before 6.8.15 and 7.12.0 a TLS certificate validation flaw was found in the monitoring feature. When specifying a trusted server CA certificate Logstash would not properly verify the certificate returned by the monitor... Read more

    Affected Products : elasticsearch logstash
    • EPSS Score: %0.11
    • Published: May. 13, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 291401 Results