Latest CVE Feed
-
9.8
CRITICALCVE-2021-24030
The fbgames protocol handler registered as part of Facebook Gameroom does not properly quote arguments passed to the executable. That allows a malicious URL to cause code execution. This issue affects versions prior to v1.26.0.... Read more
Affected Products : gameroom- EPSS Score: %1.16
- Published: Mar. 10, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-24029
A packet of death scenario is possible in mvfst via a specially crafted message during a QUIC session, which causes a crash via a failed assertion. Per QUIC specification, this particular message should be treated as a connection error. This issue affects... Read more
- EPSS Score: %0.47
- Published: Mar. 15, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-24028
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.... Read more
Affected Products : thrift- EPSS Score: %1.67
- Published: Apr. 14, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-24027
A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device’s external storage to read cached TLS material.... Read more
- EPSS Score: %15.23
- Published: Apr. 06, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-24026
A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 coul... Read more
- EPSS Score: %0.44
- Published: Apr. 06, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-24025
Due to incorrect string size calculations inside the preg_quote function, a large input string passed to the function can trigger an integer overflow leading to a heap overflow. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0... Read more
Affected Products : hhvm- EPSS Score: %0.45
- Published: Mar. 10, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-24024
A clear text storage of sensitive information into log file vulnerability in FortiADCManager 5.3.0 and below, 5.2.1 and below and FortiADC 5.3.7 and below may allow a remote authenticated attacker to read other local users' password in log files.... Read more
- EPSS Score: %0.18
- Published: Apr. 12, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-24023
An improper input validation in FortiAI v1.4.0 and earlier may allow an authenticated user to gain system shell access via a malicious payload in the "diagnose" command.... Read more
- EPSS Score: %0.23
- Published: Jun. 03, 2021
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2021-24022
A buffer overflow vulnerability in FortiAnalyzer CLI 6.4.5 and below, 6.2.7 and below, 6.0.x and FortiManager CLI 6.4.5 and below, 6.2.7 and below, 6.0.x may allow an authenticated, local attacker to perform a Denial of Service attack by running the `diag... Read more
- EPSS Score: %0.05
- Published: Jul. 20, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-24021
An improper neutralization of input vulnerability [CWE-79] in FortiAnalyzer versions 6.4.3 and below, 6.2.7 and below and 6.0.10 and below may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the column setti... Read more
Affected Products : fortianalyzer- EPSS Score: %0.19
- Published: Oct. 06, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-24020
A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of sig... Read more
Affected Products : fortimail- EPSS Score: %0.17
- Published: Jul. 09, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-24019
An insufficient session expiration vulnerability [CWE- 613] in FortiClientEMS versions 6.4.2 and below, 6.2.8 and below may allow an attacker to reuse the unexpired admin user session IDs to gain admin privileges, should the attacker be able to obtain tha... Read more
Affected Products : forticlient_endpoint_management_server- EPSS Score: %15.19
- Published: Oct. 06, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-24018
A buffer underwrite vulnerability in the firmware verification routine of FortiOS before 7.0.1 may allow an attacker located in the adjacent network to potentially execute arbitrary code via a specifically crafted firmware image.... Read more
Affected Products : fortios- EPSS Score: %0.08
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-24017
An improper authentication in Fortinet FortiManager version 6.4.3 and below, 6.2.6 and below allows attacker to assign arbitrary Policy and Object modules via crafted requests to the request handler.... Read more
Affected Products : fortimanager- EPSS Score: %0.15
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
9.3
HIGHCVE-2021-24016
An improper neutralization of formula elements in a csv file in Fortinet FortiManager version 6.4.3 and below, 6.2.7 and below allows attacker to execute arbitrary commands via crafted IPv4 field in policy name, when exported as excel file and opened unsa... Read more
Affected Products : fortimanager- EPSS Score: %0.14
- Published: Sep. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-24015
An improper neutralization of special elements used in an OS Command vulnerability in the administrative interface of FortiMail before 6.4.4 may allow an authenticated attacker to execute unauthorized commands via specifically crafted HTTP requests.... Read more
Affected Products : fortimail- EPSS Score: %0.31
- Published: Jul. 12, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-24014
Multiple instances of improper neutralization of input during web page generation vulnerabilities in FortiSandbox before 4.0.0 may allow an unauthenticated attacker to perform an XSS attack via specifically crafted request parameters.... Read more
Affected Products : fortisandbox- EPSS Score: %0.44
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-24013
Multiple Path traversal vulnerabilities in the Webmail of FortiMail before 6.4.4 may allow a regular user to obtain unauthorized access to files and data via specifically crafted web requests.... Read more
Affected Products : fortimail- EPSS Score: %0.39
- Published: Jul. 12, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-24012
An improper following of a certificate's chain of trust vulnerability in FortiGate versions 6.4.0 to 6.4.4 may allow an LDAP user to connect to SSLVPN with any certificate that is signed by a trusted Certificate Authority.... Read more
Affected Products : fortios- EPSS Score: %0.07
- Published: Jun. 02, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-24011
A privilege escalation vulnerability in FortiNAC version below 8.8.2 may allow an admin user to escalate the privileges to root by abusing the sudo privileges.... Read more
Affected Products : fortinac- EPSS Score: %0.37
- Published: May. 10, 2021
- Modified: Nov. 21, 2024