CVE Notify
18.4K subscribers
4 photos
163K links
Alert on the latest CVEs

Partner channel: @malwr
Download Telegram
🚨 CVE-2021-26857
Microsoft Exchange Server Remote Code Execution Vulnerability

🎖@cveNotify
🚨 CVE-2021-26858
Microsoft Exchange Server Remote Code Execution Vulnerability

🎖@cveNotify
🚨 CVE-2021-26411
Internet Explorer Memory Corruption Vulnerability

🎖@cveNotify
🚨 CVE-2021-27059
Microsoft Office Remote Code Execution Vulnerability

🎖@cveNotify
🚨 CVE-2021-27085
Internet Explorer Remote Code Execution Vulnerability

🎖@cveNotify
🚨 CVE-2021-28310
Win32k Elevation of Privilege Vulnerability

🎖@cveNotify
🚨 CVE-2021-31199
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability

🎖@cveNotify
🚨 CVE-2021-31201
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability

🎖@cveNotify
🚨 CVE-2021-31955
Windows Kernel Information Disclosure Vulnerability

🎖@cveNotify
🚨 CVE-2021-31956
Windows NTFS Elevation of Privilege Vulnerability

🎖@cveNotify
🚨 CVE-2021-33739
Microsoft DWM Core Library Elevation of Privilege Vulnerability

🎖@cveNotify
🚨 CVE-2022-22965
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

🎖@cveNotify
🔥1
🚨 CVE-2018-6961
VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.

🎖@cveNotify
🚨 CVE-2020-3950
VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.

🎖@cveNotify
🚨 CVE-2020-3952
Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.

🎖@cveNotify
🚨 CVE-2020-3992
OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.

🎖@cveNotify
🚨 CVE-2020-4006
VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector address have a command injection vulnerability.

🎖@cveNotify