Search Results (9556 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-31211 1 Microsoft 1 Visual Studio Code 2024-11-21 7.8 High
Visual Studio Code Remote Code Execution Vulnerability
CVE-2021-31206 1 Microsoft 1 Exchange Server 2024-11-21 7.6 High
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2021-31200 1 Microsoft 1 Neural Network Intelligence 2024-11-21 7.2 High
Common Utilities Remote Code Execution Vulnerability
CVE-2021-31194 1 Microsoft 20 Windows 10, Windows 10 1507, Windows 10 1607 and 17 more 2024-11-21 8.8 High
OLE Automation Remote Code Execution Vulnerability
CVE-2021-31192 1 Microsoft 3 Windows 10, Windows 10 1809, Windows 10 20h2 2024-11-21 7.8 High
Windows Media Foundation Core Remote Code Execution Vulnerability
CVE-2021-31180 1 Microsoft 3 365 Apps, Office, Word 2024-11-21 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2021-31179 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-11-21 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2021-31177 1 Microsoft 6 365 Apps, Excel, Office and 3 more 2024-11-21 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2021-31176 1 Microsoft 4 365 Apps, Office, Office Online Server and 1 more 2024-11-21 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2021-31175 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-11-21 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2021-30503 1 Glsl Linting Project 1 Glsl Linting 2024-11-21 9.8 Critical
The unofficial GLSL Linting extension before 1.4.0 for Visual Studio Code allows remote code execution via a crafted glslangValidatorPath in the workspace configuration.
CVE-2021-30502 1 Simple Glasgow Haskell Compiler Project 1 Simple Glasgow Haskell Compiler 2024-11-21 9.8 Critical
The unofficial vscode-ghc-simple (aka Simple Glasgow Haskell Compiler) extension before 0.2.3 for Visual Studio Code allows remote code execution via a crafted workspace configuration with replCommand.
CVE-2021-30461 1 Voipmonitor 1 Voipmonitor 2024-11-21 9.8 Critical
A remote code execution issue was discovered in the web UI of VoIPmonitor before 24.61. When the recheck option is used, the user-supplied SPOOLDIR value (which might contain PHP code) is injected into config/configuration.php.
CVE-2021-30177 1 Phpnuke 1 Php-nuke 2024-11-21 9.8 Critical
There is a SQL Injection vulnerability in PHP-Nuke 8.3.3 in the User Registration section, leading to remote code execution. This occurs because the U.S. state is not validated to be two letters, and the OrderBy field is not validated to be one of LASTNAME, CITY, or STATE.
CVE-2021-30123 1 Ffmpeg 1 Ffmpeg 2024-11-21 8.8 High
FFmpeg <=4.3 contains a buffer overflow vulnerability in libavcodec through a crafted file that may lead to remote code execution.
CVE-2021-29996 1 Marktext 1 Marktext 2024-11-21 9.6 Critical
Mark Text through 0.16.3 allows attackers arbitrary command execution. This could lead to Remote Code Execution (RCE) by opening .md files containing a mutation Cross Site Scripting (XSS) payload.
CVE-2021-29654 1 Stackpath 1 Ajaxsearchpro 2024-11-21 7.2 High
AjaxSearchPro before 4.20.8 allows Deserialization of Untrusted Data (in the import database feature of the administration panel), leading to Remote Code execution.
CVE-2021-29644 2 Hitachi, Microsoft 15 It Operations Director, Job Management Partner 1\/it Desktop Management-manager, Job Management Partner 1\/it Desktop Management 2-manager and 12 more 2024-11-21 8.1 High
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
CVE-2021-29485 1 Ratpack Project 1 Ratpack 2024-11-21 9.9 Critical
Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, a malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store. If one's application does not use Ratpack's session mechanism, it is not vulnerable. Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used. Two possible workarounds exist. The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store. Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list.
CVE-2021-29478 3 Fedoraproject, Redhat, Redislabs 3 Fedora, Acm, Redis 2024-11-21 7.5 High
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `set-max-intset-entries` configuration parameter. This can be done using ACL to restrict unprivileged users from using the `CONFIG SET` command.