Search Results (346359 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-27591 1 Sap 1 3d Visual Enterprise Viewer 2024-11-21 7.8 High
When a user opens manipulated Portable Document Format (.PDF) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.
CVE-2021-27590 1 Sap 1 3d Visual Enterprise Viewer 2024-11-21 7.8 High
When a user opens manipulated Tag Image File Format (.TIFF) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.
CVE-2021-27589 1 Sap 1 3d Visual Enterprise Viewer 2024-11-21 7.8 High
When a user opens manipulated Scalable Vector Graphics (.SVG) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.
CVE-2021-27588 1 Sap 1 3d Visual Enterprise Viewer 2024-11-21 7.8 High
When a user opens manipulated HPGL format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.
CVE-2021-27587 1 Sap 1 3d Visual Enterprise Viewer 2024-11-21 7.8 High
When a user opens manipulated Jupiter Tessellation (.JT) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.
CVE-2021-27586 1 Sap 1 3d Visual Enterprise Viewer 2024-11-21 7.8 High
When a user opens manipulated Interchange File Format (.IFF) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.
CVE-2021-27585 1 Sap 1 3d Visual Enterprise Viewer 2024-11-21 7.8 High
When a user opens manipulated Computer Graphics Metafile (.CGM) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.
CVE-2021-27584 1 Sap 1 3d Visual Enterprise Viewer 2024-11-21 3.3 Low
When a user opens manipulated PhotoShop Document (.PSD) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application.
CVE-2021-27583 1 Rangerstudio 1 Directus 2024-11-21 5.3 Medium
In Directus 8.x through 8.8.1, an attacker can discover whether a user is present in the database through the password reset feature. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE-2021-27582 1 Mitreid 1 Connect 2024-11-21 9.1 Critical
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request parameters affect an authorizationRequest.
CVE-2021-27581 1 Kentico 1 Kentico Cms 2024-11-21 9.8 Critical
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
CVE-2021-27579 1 Snowsoftware 1 Snow Inventory Agent 2024-11-21 7.8 High
Snow Inventory Agent through 6.7.0 on Windows uses CPUID to report on processor types and versions that may be deployed and in use across an IT environment. A privilege-escalation vulnerability exists if CPUID is enabled, and thus it should be disabled via configuration settings.
CVE-2021-27578 1 Apache 1 Zeppelin 2024-11-21 6.1 Medium
Cross Site Scripting vulnerability in markdown interpreter of Apache Zeppelin allows an attacker to inject malicious scripts. This issue affects Apache Zeppelin Apache Zeppelin versions prior to 0.9.0.
CVE-2021-27577 2 Apache, Debian 2 Traffic Server, Debian Linux 2024-11-21 7.5 High
Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
CVE-2021-27574 1 Remotemouse 1 Emote Remote Mouse 2024-11-21 8.1 High
An issue was discovered in Emote Remote Mouse through 4.0.0.0. It uses cleartext HTTP to check, and request, updates. Thus, attackers can machine-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
CVE-2021-27573 1 Remotemouse 1 Emote Remote Mouse 2024-11-21 9.8 Critical
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication.
CVE-2021-27572 1 Remotemouse 1 Emote Remote Mouse 2024-11-21 8.1 High
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.
CVE-2021-27571 1 Remotemouse 1 Emote Remote Mouse 2024-11-21 5.3 Medium
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can retrieve recently used and running applications, their icons, and their file paths. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27570 1 Remotemouse 1 Emote Remote Mouse 2024-11-21 5.3 Medium
An issue was discovered in Emote Remote Mouse through 3.015. Attackers can close any running process by sending the process name in a specially crafted packet. This information is sent in cleartext and is not protected by any authentication logic.
CVE-2021-27569 1 Remotemouse 1 Emote Remote Mouse 2024-11-21 5.3 Medium
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.