Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Total 21891 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-30621 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Chromium: CVE-2021-30621 UI Spoofing in Autofill
CVE-2021-30620 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink
CVE-2021-30619 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Chromium: CVE-2021-30619 UI Spoofing in Autofill
CVE-2021-30618 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30618 Inappropriate implementation in DevTools
CVE-2021-30617 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Chromium: CVE-2021-30617 Policy bypass in Blink
CVE-2021-30616 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30616 Use after free in Media
CVE-2021-30615 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Chromium: CVE-2021-30615 Cross-origin data leak in Navigation
CVE-2021-30614 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip
CVE-2021-30613 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30613 Use after free in Base internals
CVE-2021-30612 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30612 Use after free in WebRTC
CVE-2021-30611 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30611 Use after free in WebRTC
CVE-2021-30610 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30610 Use after free in Extensions API
CVE-2021-30609 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30609 Use after free in Sign-In
CVE-2021-30608 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30608 Use after free in Web Share
CVE-2021-30607 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30607 Use after free in Permissions
CVE-2021-30606 2 Fedoraproject, Microsoft 3 Fedora, Edge, Edge Chromium 2024-11-21 6.8 MEDIUM 8.8 HIGH
Chromium: CVE-2021-30606 Use after free in Blink
CVE-2021-30605 2 Google, Microsoft 4 Chrome Os Readiness Tool, Windows 10, Windows 7 and 1 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Inappropriate implementation in the ChromeOS Readiness Tool installer on Windows prior to 1.0.2.0 loosens DCOM access rights on two objects allowing an attacker to potentially bypass discretionary access controls.
CVE-2021-30490 2 Microsoft, Power-software-download 2 Windows, Viewpower 2024-11-21 N/A 7.8 HIGH
upsMonitor in ViewPower (aka ViewPowerHTML) 1.04-21012 through 1.04-21353 has insecure permissions for the service binary that enable an Authenticated User to modify files, allowing for privilege escalation.
CVE-2021-30480 3 Apple, Microsoft, Zoom 3 Macos, Windows, Chat 2024-11-21 9.0 HIGH 8.5 HIGH
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat software, which is different from the chat feature of the Zoom Meetings and Zoom Video Webinars software.
CVE-2021-30359 2 Checkpoint, Microsoft 3 Harmony Browse, Sandblast Agent For Browsers, Windows 2024-11-21 7.2 HIGH 7.8 HIGH
The Harmony Browse and the SandBlast Agent for Browsers installers must have admin privileges to execute some steps during the installation. Because the MS Installer allows regular users to repair their installation, an attacker running an installer before 90.08.7405 can start the installation repair and place a specially crafted binary in the repair folder, which runs with the admin privileges.