CVE-2021-23892
Summary: By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux...
Summary: By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux...
Summary: Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges...
Summary: Privilege Escalation vulnerability in the File Lock component of McAfee Total Protection (MTP) prior to 16.0.32 allows a local...
Summary: A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can...
Summary: OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers...
Summary: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is...
Summary: A privilege escalation vulnerability in FortiNAC version below 8.8.2 may allow an admin user to escalate the privileges to...
Summary: Cross Site Request Forgery (CSRF) Vulnerability in ForestBlog latest version via the website Management background, which could let a...
Summary: In JetBrains Code With Me bundled to the compatible IDEs before version 2021.1, the client could execute code in...
Summary: An issue exists on NightOwl WDB-20-V2 WDB-20-V2_20190314 devices that allows an unauthenticated user to gain access to snapshots and...
Summary: Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2),...
Summary: strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable. Reference Links(if available):...
Summary: TensorFlow is an end-to-end open source platform for machine learning. Incomplete validation in `SparseAdd` results in allowing attackers to...
Summary: A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to perform a command...
Summary: A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications...
Summary: A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications...
Summary: A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications...
Summary: Insufficient length checks in the ShapeShift KeepKey hardware wallet firmware before 7.1.0 allow a stack buffer overflow via crafted...
Summary: Use after free in Dev Tools in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit...
Summary: Use after free in Dev Tools in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to potentially exploit...
Summary: Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 90.0.4430.93 allowed a remote attacker to potentially...
Summary: Heap buffer overflow in ANGLE in Google Chrome on Windows prior to 90.0.4430.93 allowed a remote attacker to potentially...
Summary: Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files....
Summary: NVIDIA GeForce Experience, all versions prior to 3.22, contains a vulnerability in GameStream plugins where log files are created...