CVE STALKER

PAST 7 DAYS RANKING

No NAME CVSS DESCRIPTION
1 CVE-2021-40444 N/A Microsoft MSHTML Remote Code Execution Vulnerability
2 CVE-2021-30860 N/A ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by the CVE program. Notes: none.
3 CVE-2021-38647 N/A Open Management Infrastructure Remote Code Execution Vulnerability
4 CVE-2021-30740 N/A A logic issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.4, tvOS 14.6, watchOS 7.5, iOS 14.6 and iPadOS 14.6. A malicious application may be able to execute arbitrary code with kernel privileges.
5 CVE-2021-30768 N/A A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. A sandboxed process may be able to circumvent sandbox restrictions.
6 CVE-2021-30773 N/A An issue in code signature validation was addressed with improved checks. This issue is fixed in iOS 14.7, tvOS 14.7, watchOS 7.6. A malicious application may be able to bypass code signing checks.
7 CVE-2021-30632 N/A N/A
8 CVE-2021-36968 N/A Windows DNS Elevation of Privilege Vulnerability
9 CVE-2019-3396 10 The Widget Connector macro in Atlassian Confluence Server before version 6.6.12 (the fixed version for 6.6.x), from version 6.7.0 before 6.12.3 (the fixed version for 6.12.x), from version 6.13.0 before 6.13.3 (the fixed version for 6.13.x), and from version 6.14.0 before 6.14.2 (the fixed version for 6.14.x), allows remote attackers to achieve path traversal and remote code execution on a Confluence Server or Data Center instance via server-side template injection.
10 CVE-2021-25741 N/A A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.