Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 8.8

    HIGH
    CVE-2021-21506

    PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in its API handler. An un-authtenticated with ISI_PRIV_SYS_SUPPORT and ISI_PRIV_LOGIN_PAPI privileges could potentially exploit this vulnerability, leading to potential p... Read more

    • EPSS Score: %0.52
    • Published: Mar. 08, 2021
    • Modified: Nov. 21, 2024
  • 10.0

    HIGH
    CVE-2021-21505

    Dell EMC Integrated System for Microsoft Azure Stack Hub, versions 1906 – 2011, contain an undocumented default iDRAC account. A remote unauthenticated attacker, with the knowledge of the default credentials, could potentially exploit this to log in to th... Read more

    • EPSS Score: %5.75
    • Published: May. 06, 2021
    • Modified: Nov. 21, 2024
  • 7.8

    HIGH
    CVE-2021-21503

    PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation.... Read more

    • EPSS Score: %0.12
    • Published: Mar. 08, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-21502

    Dell PowerScale OneFS versions 8.1.0 – 9.1.0 contain a "use of SSH key past account expiration" vulnerability. A user on the network with the ISI_PRIV_AUTH_SSH RBAC privilege that has an expired account may potentially exploit this vulnerability, giving t... Read more

    • EPSS Score: %0.27
    • Published: Feb. 09, 2021
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2021-21501

    Improper configuration will cause ServiceComb ServiceCenter Directory Traversal problem in ServcieCenter 1.x.x versions and fixed in 2.0.0.... Read more

    Affected Products : servicecomb
    • EPSS Score: %1.01
    • Published: Aug. 10, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-21495

    MK-AUTH through 19.01 K4.9 allows CSRF for password changes via the central/executar_central.php?acao=altsenha_princ URI.... Read more

    Affected Products : mk-auth
    • EPSS Score: %0.21
    • Published: Jan. 04, 2021
    • Modified: Nov. 21, 2024
  • 4.8

    MEDIUM
    CVE-2021-21494

    MK-AUTH through 19.01 K4.9 allows XSS via the admin/logs_ajax.php tipo parameter. An attacker can leverage this to read the centralmka2 (session token) cookie, which is not set to HTTPOnly.... Read more

    Affected Products : mk-auth
    • EPSS Score: %0.19
    • Published: Jan. 04, 2021
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2021-21493

    When a user opens manipulated Graphics Interchange Format (.GIF) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the applic... Read more

    Affected Products : 3d_visual_enterprise_viewer
    • EPSS Score: %0.20
    • Published: Mar. 09, 2021
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2021-21492

    SAP NetWeaver Application Server Java(HTTP Service), versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate logon group in URLs, resulting in a content spoofing vulnerability when directory listing is enabled.... Read more

    • EPSS Score: %0.16
    • Published: Apr. 13, 2021
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2021-21491

    SAP Netweaver Application Server Java (Applications based on WebDynpro Java) versions 7.00, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allow an attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.... Read more

    • EPSS Score: %0.13
    • Published: Mar. 10, 2021
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2021-21490

    SAP NetWeaver AS for ABAP (Web Survey), versions - 700, 702, 710, 711, 730, 731, 750, 750, 752, 75A, 75F, does not sufficiently encode input and output parameters which results in reflected cross site scripting vulnerability, through which a malicious use... Read more

    • EPSS Score: %0.25
    • Published: Jun. 09, 2021
    • Modified: Nov. 21, 2024
  • 4.8

    MEDIUM
    CVE-2021-21489

    SAP NetWeaver Enterprise Portal versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user related data, resulting in Stored Cross-Site Scripting (XSS) vulnerability. This would allow an attacker with administrative privileges ... Read more

    Affected Products : netweaver_enterprise_portal
    • EPSS Score: %0.24
    • Published: Sep. 14, 2021
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2021-21488

    Knowledge Management versions 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 allows a remote attacker with basic privileges to deserialize user-controlled data without verification, leading to insecure deserialization which triggers the attacker’s code, therefore imp... Read more

    Affected Products : netweaver_knowledge_management
    • EPSS Score: %0.67
    • Published: Mar. 09, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-21487

    SAP Payment Engine version 500, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.... Read more

    Affected Products : payment_engine
    • EPSS Score: %0.15
    • Published: Mar. 09, 2021
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2021-21486

    SAP Enterprise Financial Services versions, 101, 102, 103, 104, 105, 600, 603, 604, 605, 606, 616, 617, 618, 800, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.... Read more

    Affected Products : enterprise_financial_services
    • EPSS Score: %0.15
    • Published: Mar. 09, 2021
    • Modified: Nov. 21, 2024
  • 7.4

    HIGH
    CVE-2021-21485

    An unauthorized attacker may be able to entice an administrator to invoke telnet commands of an SAP NetWeaver Application Server for Java that allow the attacker to gain NTLM hashes of a privileged user.... Read more

    • EPSS Score: %0.27
    • Published: Apr. 13, 2021
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2021-21484

    LDAP authentication in SAP HANA Database version 2.0 can be bypassed if the attached LDAP directory server is configured to enable unauthenticated bind.... Read more

    Affected Products : hana
    • EPSS Score: %0.22
    • Published: Mar. 09, 2021
    • Modified: Nov. 21, 2024
  • 8.2

    HIGH
    CVE-2021-21483

    Under certain conditions SAP Solution Manager, version - 720, allows a high privileged attacker to get access to sensitive information which has a direct serious impact beyond the exploitable component thereby affecting the confidentiality in the applicat... Read more

    Affected Products : solution_manager
    • EPSS Score: %0.24
    • Published: Apr. 13, 2021
    • Modified: Nov. 21, 2024
  • 8.3

    HIGH
    CVE-2021-21482

    SAP NetWeaver Master Data Management, versions - 710, 710.750, allows a malicious unauthorized user with access to the MDM Server subnet to find the password using a brute force method. If successful, the attacker could obtain access to highly sensitive d... Read more

    Affected Products : netweaver_master_data_management
    • EPSS Score: %0.09
    • Published: Apr. 13, 2021
    • Modified: Nov. 21, 2024
  • 9.6

    CRITICAL
    CVE-2021-21481

    The MigrationService, which is part of SAP NetWeaver versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not perform an authorization check. This might allow an unauthorized attacker to access configuration objects, including such that grant administr... Read more

    Affected Products : netweaver
    • EPSS Score: %0.16
    • Published: Mar. 09, 2021
    • Modified: Nov. 21, 2024
Showing 20 of 291002 Results