Vulnerabilities (CVE)

Filtered by CWE-269
Total 2059 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-1681 1 Microsoft 1 Windows 10 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows WalletService Elevation of Privilege Vulnerability
CVE-2021-1680 1 Microsoft 6 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 3 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
CVE-2021-1662 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Event Tracing Elevation of Privilege Vulnerability
CVE-2021-1659 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows CSC Service Elevation of Privilege Vulnerability
CVE-2021-1657 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows Fax Compose Form Remote Code Execution Vulnerability
CVE-2021-1655 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows CSC Service Elevation of Privilege Vulnerability
CVE-2021-1654 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows CSC Service Elevation of Privilege Vulnerability
CVE-2021-1653 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows CSC Service Elevation of Privilege Vulnerability
CVE-2021-1652 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows CSC Service Elevation of Privilege Vulnerability
CVE-2021-1651 1 Microsoft 6 Visual Studio, Visual Studio 2017, Visual Studio 2019 and 3 more 2024-11-21 7.2 HIGH 7.8 HIGH
Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability
CVE-2021-1650 1 Microsoft 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more 2024-11-21 7.2 HIGH 7.8 HIGH
Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
CVE-2021-1649 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 7.2 HIGH 7.8 HIGH
Active Template Library Elevation of Privilege Vulnerability
CVE-2021-1648 1 Microsoft 5 Windows 10, Windows 8.1, Windows Server 2012 and 2 more 2024-11-21 7.2 HIGH 7.8 HIGH
Microsoft splwow64 Elevation of Privilege Vulnerability
CVE-2021-1646 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2024-11-21 7.2 HIGH 6.6 MEDIUM
Windows WLAN Service Elevation of Privilege Vulnerability
CVE-2021-1642 1 Microsoft 3 Windows 10, Windows Server 2016, Windows Server 2019 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
CVE-2021-1640 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2021-1579 1 Cisco 2 Application Policy Infrastructure Controller, Cloud Application Policy Infrastructure Controller 2024-11-21 9.0 HIGH 8.1 HIGH
A vulnerability in an API endpoint of Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC) could allow an authenticated, remote attacker with Administrator read-only credentials to elevate privileges on an affected system. This vulnerability is due to an insufficient role-based access control (RBAC). An attacker with Administrator read-only credentials could exploit this vulnerability by sending a specific API request using an app with admin write credentials. A successful exploit could allow the attacker to elevate privileges to Administrator with write privileges on the affected device.
CVE-2021-1572 1 Cisco 2 Confd, Network Services Orchestrator 2024-11-21 6.9 MEDIUM 7.8 HIGH
A vulnerability in ConfD could allow an authenticated, local attacker to execute arbitrary commands at the level of the account under which ConfD is running, which is commonly root. To exploit this vulnerability, an attacker must have a valid account on an affected device. The vulnerability exists because the affected software incorrectly runs the SFTP user service at the privilege level of the account that was running when the ConfD built-in Secure Shell (SSH) server for CLI was enabled. If the ConfD built-in SSH server was not enabled, the device is not affected by this vulnerability. An attacker with low-level privileges could exploit this vulnerability by authenticating to an affected device and issuing a series of commands at the SFTP interface. A successful exploit could allow the attacker to elevate privileges to the level of the account under which ConfD is running, which is commonly root. Note: Any user who can authenticate to the built-in SSH server may exploit this vulnerability. By default, all ConfD users have this access if the server is enabled. Software updates that address this vulnerability have been released.
CVE-2021-1447 1 Cisco 1 Content Security Management Appliance 2024-11-21 7.2 HIGH 6.7 MEDIUM
A vulnerability in the user account management system of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, local attacker to elevate their privileges to root. This vulnerability is due to a procedural flaw in the password generation algorithm. An attacker could exploit this vulnerability by enabling specific Administrator-only features and connecting to the appliance through the CLI with elevated privileges. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. To exploit this vulnerability, the attacker must have valid Administrator credentials.
CVE-2021-1400 1 Cisco 12 Wap125, Wap125 Firmware, Wap131 and 9 more 2024-11-21 6.5 MEDIUM 8.8 HIGH
Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote attacker to obtain sensitive information from or inject arbitrary commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.