Search Results (8904 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-42562 1 Mitre 1 Caldera 2024-11-21 8.1 High
An issue was discovered in CALDERA 2.8.1. It does not properly segregate user privileges, resulting in non-admin users having access to read and modify configuration or other components that should only be accessible by admin users.
CVE-2021-42322 1 Microsoft 1 Visual Studio Code 2024-11-21 7.8 High
Visual Studio Code Elevation of Privilege Vulnerability
CVE-2021-42319 1 Microsoft 2 Visual Studio 2017, Visual Studio 2019 2024-11-21 4.7 Medium
Visual Studio Elevation of Privilege Vulnerability
CVE-2021-42304 1 Microsoft 1 Azure Real Time Operating System 2024-11-21 6.6 Medium
Azure RTOS Elevation of Privilege Vulnerability
CVE-2021-42303 1 Microsoft 1 Azure Real Time Operating System 2024-11-21 6.6 Medium
Azure RTOS Elevation of Privilege Vulnerability
CVE-2021-42302 1 Microsoft 1 Azure Real Time Operating System 2024-11-21 6.6 Medium
Azure RTOS Elevation of Privilege Vulnerability
CVE-2021-42291 1 Microsoft 11 Windows Server, Windows Server 2004, Windows Server 2008 and 8 more 2024-11-21 7.5 High
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2021-42286 1 Microsoft 8 Windows 10, Windows 10 1809, Windows 10 20h2 and 5 more 2024-11-21 7.8 High
Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
CVE-2021-42285 1 Microsoft 22 Windows 10, Windows 10 1507, Windows 10 1607 and 19 more 2024-11-21 7.8 High
Windows Kernel Elevation of Privilege Vulnerability
CVE-2021-42283 1 Microsoft 23 Windows 10, Windows 10 1507, Windows 10 1607 and 20 more 2024-11-21 8.8 High
NTFS Elevation of Privilege Vulnerability
CVE-2021-42282 1 Microsoft 11 Windows Server, Windows Server 2004, Windows Server 2008 and 8 more 2024-11-21 7.5 High
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2021-42280 1 Microsoft 13 Windows 10, Windows 10 1607, Windows 10 1809 and 10 more 2024-11-21 5.5 Medium
Windows Feedback Hub Elevation of Privilege Vulnerability
CVE-2021-42277 1 Microsoft 17 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 14 more 2024-11-21 5.5 Medium
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
CVE-2021-42135 1 Hashicorp 1 Vault 2024-11-21 8.1 High
HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials.
CVE-2021-42108 2 Microsoft, Trendmicro 4 Windows, Apex One, Worry-free Business Security and 1 more 2024-11-21 7.8 High
Unnecessary privilege vulnerabilities in the Web Console of Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2021-42107 2 Microsoft, Trendmicro 4 Windows, Apex One, Worry-free Business Security and 1 more 2024-11-21 7.8 High
Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42106.
CVE-2021-42106 2 Microsoft, Trendmicro 4 Windows, Apex One, Worry-free Business Security and 1 more 2024-11-21 7.8 High
Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42107.
CVE-2021-42105 2 Microsoft, Trendmicro 4 Windows, Apex One, Worry-free Business Security and 1 more 2024-11-21 7.8 High
Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42106 and 42107.
CVE-2021-42104 2 Microsoft, Trendmicro 4 Windows, Apex One, Worry-free Business Security and 1 more 2024-11-21 7.8 High
Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42105, 42106 and 42107.
CVE-2021-42021 1 Siemens 6 Siveillance Video Dlna Server, Siveillance Video Management Software 2019 R1, Siveillance Video Management Software 2019 R2 and 3 more 2024-11-21 7.5 High
A vulnerability has been identified in Siveillance Video DLNA Server (2019 R1), Siveillance Video DLNA Server (2019 R2), Siveillance Video DLNA Server (2019 R3), Siveillance Video DLNA Server (2020 R1), Siveillance Video DLNA Server (2020 R2), Siveillance Video DLNA Server (2020 R3), Siveillance Video DLNA Server (2021 R1). The affected application contains a path traversal vulnerability that could allow to read arbitrary files on the server that are outside the application’s web document directory. An unauthenticated remote attacker could exploit this issue to access sensitive information for subsequent attacks.