Export limit exceeded: 342715 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (2618 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-43858 2 Minio, Redhat 2 Minio, Acm 2024-11-21 8.8 High
MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
CVE-2021-43835 1 Sulu 1 Sulu 2024-11-21 7.2 High
Sulu is an open-source PHP content management system based on the Symfony framework. In affected versions Sulu users who have access to any subset of the admin UI are able to elevate their privilege. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction. The versions have been patched in 2.2.18, 2.3.8 and 2.4.0. For users unable to upgrade the only known workaround is to apply a patch to the ProfileController manually.
CVE-2021-43828 1 Patrowl 1 Patrowlmanager 2024-11-21 7.5 High
PatrOwl is a free and open-source solution for orchestrating Security Operations. In versions prior to 1.77 an improper privilege management (IDOR) has been found in PatrowlManager. All imports findings file is placed under /media/imports/<owner_id>/<tmp_file> In that, owner_id is predictable and tmp_file is in format of import_<ownder_id>_<time_created>, for example: import_1_1639213059582.json This filename is predictable and allows anyone without logging in to download all finding import files This vulnerability is capable of allowing unlogged in users to download all finding imports file. Users are advised to update to 1.7.7 as soon as possible. There are no known workarounds.
CVE-2021-43793 1 Discourse 1 Discourse 2024-11-21 4.3 Medium
Discourse is an open source discussion platform. In affected versions a vulnerability in the Polls feature allowed users to vote multiple times in a single-option poll. The problem is patched in the latest tests-passed, beta and stable versions of Discourse
CVE-2021-43528 3 Debian, Mozilla, Redhat 5 Debian Linux, Thunderbird, Enterprise Linux and 2 more 2024-11-21 6.5 Medium
Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0.
CVE-2021-43211 1 Microsoft 1 Windows 10 Update Assistant 2024-11-21 5.5 Medium
Windows 10 Update Assistant Elevation of Privilege Vulnerability
CVE-2021-43076 1 Fortinet 1 Fortiadc 2024-11-21 6.3 Medium
An improper privilege management vulnerability [CWE-269] in FortiADC versions 6.2.1 and below, 6.1.5 and below, 6.0.4 and below, 5.4.5 and below and 5.3.7 and below may allow a remote authenticated attacker with restricted user profile to modify the system files using the shell access.
CVE-2021-42956 2 Microsoft, Zoho 2 Windows, Manageengine Remote Access Plus Server 2024-11-21 7.8 High
Zoho Remote Access Plus Server Windows Desktop Binary fixed in 10.1.2132.6 is affected by a sensitive information disclosure vulnerability. Due to improper privilege management, the process launches as the logged in user, so memory dump can be done by non-admin also. Remotely, an attacker can dump all sensitive information including DB Connection string, entire IT infrastructure details, commands executed by IT admin including credentials, secrets, private keys and more.
CVE-2021-42562 1 Mitre 1 Caldera 2024-11-21 8.1 High
An issue was discovered in CALDERA 2.8.1. It does not properly segregate user privileges, resulting in non-admin users having access to read and modify configuration or other components that should only be accessible by admin users.
CVE-2021-42322 1 Microsoft 1 Visual Studio Code 2024-11-21 7.8 High
Visual Studio Code Elevation of Privilege Vulnerability
CVE-2021-42319 1 Microsoft 2 Visual Studio 2017, Visual Studio 2019 2024-11-21 4.7 Medium
Visual Studio Elevation of Privilege Vulnerability
CVE-2021-42304 1 Microsoft 1 Azure Real Time Operating System 2024-11-21 6.6 Medium
Azure RTOS Elevation of Privilege Vulnerability
CVE-2021-42303 1 Microsoft 1 Azure Real Time Operating System 2024-11-21 6.6 Medium
Azure RTOS Elevation of Privilege Vulnerability
CVE-2021-42302 1 Microsoft 1 Azure Real Time Operating System 2024-11-21 6.6 Medium
Azure RTOS Elevation of Privilege Vulnerability
CVE-2021-42291 1 Microsoft 11 Windows Server, Windows Server 2004, Windows Server 2008 and 8 more 2024-11-21 7.5 High
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2021-42286 1 Microsoft 8 Windows 10, Windows 10 1809, Windows 10 20h2 and 5 more 2024-11-21 7.8 High
Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
CVE-2021-42285 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2024-11-21 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2021-42283 1 Microsoft 23 Windows 10, Windows 10 1507, Windows 10 1607 and 20 more 2024-11-21 8.8 High
NTFS Elevation of Privilege Vulnerability
CVE-2021-42282 1 Microsoft 11 Windows Server, Windows Server 2004, Windows Server 2008 and 8 more 2024-11-21 7.5 High
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2021-42280 1 Microsoft 13 Windows 10, Windows 10 1607, Windows 10 1809 and 10 more 2024-11-21 5.5 Medium
Windows Feedback Hub Elevation of Privilege Vulnerability