Export limit exceeded: 351254 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Export limit exceeded: 10336 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (10336 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2021-34501 | 1 Microsoft | 4 365 Apps, Excel, Office and 1 more | 2024-11-21 | 7.8 High |
| Microsoft Excel Remote Code Execution Vulnerability | ||||
| CVE-2021-34497 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-11-21 | 6.8 Medium |
| Windows MSHTML Platform Remote Code Execution Vulnerability | ||||
| CVE-2021-34494 | 1 Microsoft | 9 Windows Server 2004, Windows Server 2008, Windows Server 2008 R2 and 6 more | 2024-11-21 | 8.8 High |
| Windows DNS Server Remote Code Execution Vulnerability | ||||
| CVE-2021-34489 | 1 Microsoft | 9 Windows 10, Windows 10 1809, Windows 10 1909 and 6 more | 2024-11-21 | 7.8 High |
| DirectWrite Remote Code Execution Vulnerability | ||||
| CVE-2021-34478 | 1 Microsoft | 2 365 Apps, Office | 2024-11-21 | 7.8 High |
| Microsoft Office Remote Code Execution Vulnerability | ||||
| CVE-2021-34474 | 1 Microsoft | 1 Dynamics 365 Business Central | 2024-11-21 | 8 High |
| Dynamics Business Central Remote Code Execution Vulnerability | ||||
| CVE-2021-34468 | 1 Microsoft | 2 Sharepoint Foundation, Sharepoint Server | 2024-11-21 | 7.1 High |
| Microsoft SharePoint Server Remote Code Execution Vulnerability | ||||
| CVE-2021-34467 | 1 Microsoft | 2 Sharepoint Foundation, Sharepoint Server | 2024-11-21 | 7.1 High |
| Microsoft SharePoint Server Remote Code Execution Vulnerability | ||||
| CVE-2021-34464 | 1 Microsoft | 1 Malware Protection Engine | 2024-11-21 | 7.8 High |
| Microsoft Defender Remote Code Execution Vulnerability | ||||
| CVE-2021-34458 | 1 Microsoft | 4 Windows Server 2004, Windows Server 2016, Windows Server 2019 and 1 more | 2024-11-21 | 9.9 Critical |
| Windows Kernel Remote Code Execution Vulnerability | ||||
| CVE-2021-34452 | 1 Microsoft | 3 365 Apps, Office, Word | 2024-11-21 | 7.8 High |
| Microsoft Word Remote Code Execution Vulnerability | ||||
| CVE-2021-34450 | 1 Microsoft | 8 Windows 10, Windows 10 1809, Windows 10 1909 and 5 more | 2024-11-21 | 8.5 High |
| Windows Hyper-V Remote Code Execution Vulnerability | ||||
| CVE-2021-34447 | 1 Microsoft | 17 Windows 10, Windows 10 1507, Windows 10 1607 and 14 more | 2024-11-21 | 6.8 Medium |
| Windows MSHTML Platform Remote Code Execution Vulnerability | ||||
| CVE-2021-34442 | 1 Microsoft | 9 Windows Server 2004, Windows Server 2008, Windows Server 2008 R2 and 6 more | 2024-11-21 | 8.8 High |
| Windows DNS Server Remote Code Execution Vulnerability | ||||
| CVE-2021-34441 | 1 Microsoft | 19 Windows 10, Windows 10 1507, Windows 10 1607 and 16 more | 2024-11-21 | 7.8 High |
| Microsoft Windows Media Foundation Remote Code Execution Vulnerability | ||||
| CVE-2021-34439 | 1 Microsoft | 4 Windows 10, Windows 10 1507, Windows 10 1607 and 1 more | 2024-11-21 | 7.8 High |
| Microsoft Windows Media Foundation Remote Code Execution Vulnerability | ||||
| CVE-2021-34438 | 1 Microsoft | 9 Windows 10, Windows 10 1809, Windows 10 1909 and 6 more | 2024-11-21 | 7.8 High |
| Windows Font Driver Host Remote Code Execution Vulnerability | ||||
| CVE-2021-34436 | 1 Eclipse | 1 Theia | 2024-11-21 | 9.8 Critical |
| In Eclipse Theia 0.1.1 to 0.2.0, it is possible to exploit the default build to obtain remote code execution (and XXE) via the theia-xml-extension. This extension uses lsp4xml (recently renamed to LemMinX) in order to provide language support for XML. This is installed by default. | ||||
| CVE-2021-34422 | 1 Keybase | 1 Keybase | 2024-11-21 | 7.2 High |
| The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution. | ||||
| CVE-2021-34371 | 1 Neo4j | 1 Neo4j | 2024-11-21 | 9.8 Critical |
| Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains. | ||||