Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2021-22638

    Fatek FvDesigner Version 1.5.76 and prior is vulnerable to an out-of-bounds read while processing project files, allowing an attacker to craft a special project file that may permit arbitrary code execution.... Read more

    Affected Products : fvdesigner
    • EPSS Score: %0.17
    • Published: Mar. 03, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-22637

    Multiple stack-based buffer overflow issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server L... Read more

    • EPSS Score: %0.36
    • Published: Jan. 27, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-22636

    Texas Instruments TI-RTOS, when configured to use HeapMem heap(default), malloc returns a valid pointer to a small buffer on extremely large values, which can trigger an integer overflow vulnerability in 'HeapMem_allocUnprotected' and result in cod... Read more

    • EPSS Score: %0.04
    • Published: Nov. 20, 2023
    • Modified: Nov. 21, 2024
  • 8.7

    HIGH
    CVE-2021-22573

    The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom pa... Read more

    Affected Products : oauth_client_library_for_java
    • EPSS Score: %0.05
    • Published: May. 03, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-22572

    On unix-like systems, the system temporary directory is shared between all users on that system. The root cause is File.createTempFile creates files in the the system temporary directory with world readable permissions. Any sensitive information written t... Read more

    Affected Products : data_transfer_project
    • EPSS Score: %0.01
    • Published: Mar. 29, 2022
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-22571

    A local attacker could read files from some other users' SA360 reports stored in the /tmp folder during staging process before the files are loaded in BigQuery. We recommend upgrading to version 1.0.3 or above.... Read more

    • EPSS Score: %0.03
    • Published: Mar. 18, 2022
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-22570

    Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file... Read more

    • EPSS Score: %0.12
    • Published: Jan. 26, 2022
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-22569

    An issue in protobuf-java allowed the interleaving of com.google.protobuf.UnknownFieldSet fields in such a way that would be processed out of order. A small malicious payload can occupy the parser for several minutes by creating large numbers of short-liv... Read more

    • EPSS Score: %0.35
    • Published: Jan. 10, 2022
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-22568

    When using the dart pub publish command to publish a package to a third-party package server, the request would be authenticated with an oauth2 access_token that is valid for publishing on pub.dev. Using these obtained credentials, an attacker can imperso... Read more

    Affected Products : dart_software_development_kit
    • EPSS Score: %0.45
    • Published: Dec. 09, 2021
    • Modified: Nov. 21, 2024
  • 4.6

    MEDIUM
    CVE-2021-22567

    Bidirectional Unicode text can be interpreted and compiled differently than how it appears in editors which can be exploited to get nefarious code passed a code review by appearing benign. An attacker could embed a source that is invisible to a code revie... Read more

    Affected Products : dart_software_development_kit
    • EPSS Score: %0.23
    • Published: Jan. 05, 2022
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-22566

    An incorrect setting of UXN bits within mmu_flags_to_s1_pte_attr lead to privileged executable pages being mapped as executable from an unprivileged context. This can be leveraged by an attacker to bypass executability restrictions of kernel-mode pages fr... Read more

    Affected Products : fuchsia
    • EPSS Score: %0.01
    • Published: Jan. 18, 2022
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-22565

    An attacker could prematurely expire a verification code, making it unusable by the patient, making the patient unable to upload their TEKs to generate exposure notifications. We recommend upgrading the Exposure Notification server to V1.1.2 or greater.... Read more

    • EPSS Score: %0.16
    • Published: Dec. 09, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-22564

    For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to anothe... Read more

    Affected Products : libjxl
    • EPSS Score: %0.04
    • Published: Nov. 01, 2021
    • Modified: Nov. 21, 2024
  • 4.5

    MEDIUM
    CVE-2021-22563

    Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgr... Read more

    Affected Products : libjxl
    • EPSS Score: %0.04
    • Published: Nov. 01, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-22557

    SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173... Read more

    Affected Products : slo_generator
    • EPSS Score: %0.54
    • Published: Oct. 04, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-22556

    The Security Team discovered an integer overflow bug that allows an attacker with code execution to issue memory cache invalidation operations on pages that they don’t own, allowing them to control kernel memory from userspace. We recommend upgrading to k... Read more

    Affected Products : fuchsia
    • EPSS Score: %0.02
    • Published: May. 03, 2022
    • Modified: Nov. 21, 2024
  • 8.3

    HIGH
    CVE-2021-22555

    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space... Read more

    • EPSS Score: %82.42
    • Published: Jul. 07, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-22553

    Any git operation is passed through Jetty and a session is created. No expiry is set for the session and Jetty does not automatically dispose of the session. Over multiple git actions, this can lead to a heap memory exhaustion for Gerrit servers. We recom... Read more

    Affected Products : gerrit
    • EPSS Score: %0.15
    • Published: Feb. 17, 2021
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2021-22552

    An untrusted memory read vulnerability in Asylo versions up to 0.6.1 allows an untrusted attacker to pass a syscall number in MessageReader that is then used by sysno() and can bypass validation. This can allow the attacker to read memory from within the ... Read more

    Affected Products : asylo
    • EPSS Score: %0.02
    • Published: Aug. 02, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-22550

    An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c... Read more

    Affected Products : asylo
    • EPSS Score: %0.02
    • Published: Jun. 08, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 291712 Results