CVE
1
CVE-2021-44228
2
CVE-2021-32648
3
CVE-2021-23401
4
CVE-2021-23393
5
CVE-2021-23414
6
CVE-2021-36750
7
CVE-2021-32618
8
CVE-2021-23435
9
CVE-2021-37352
10
CVE-2022-0215
11
CVE-2021-23385
12
CVE-2021-33056
13
CVE-2021-36751
14
CVE-2018-13379
15
CVE-2021-26855
16
CVE-2021-34523
17
CVE-2021-34473
18
CVE-2021-31207
19
CVE-2021-1636
20
CVE-2022-23181
21
CVE-2021-34527
22
CVE-2017-0144
23
CVE-2020-1472
24
CVE-2017-0143
25
CVE-2017-0148
26
CVE-2020-0796
27
CVE-2017-0145
28
CVE-2017-0146
29
CVE-2017-0147
30
CVE-2018-12808
31
CVE-2018-13374
32
CVE-2021-1675
33
CVE-2021-22986
34
CVE-2020-0688
35
CVE-2020-17144
Drag to adjust the number of frozen columns
Vendor affected
Product affected
Patches/Mitigations
Severity
CVSS 3.x Score
Has CSW called out CVE?
Is CVE part of CISA KEVs?
Field 9
Field 10
Field 11
Field 12
Field 13
Field 14
Field 15
Field 16
Multiple Vendors
Multiple Products
https://logging.apache.org/log4j/2.x/security.html
Critical
10
overall
35
csw
19
cisa
17
October CMS
October CMS
https://security.snyk.io/vuln/SNYK-PYTHON-FLASKUSER-1293188
Critical
9.1
airtable
Flask
Flask-User package
https://github.com/lingthio/Flask-User
Medium
6.1
ioc
Flask
Flask-Unchained
https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40
Medium
5.4
cves called out
videojs
video.js package
https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2
Medium
6.1
ENC Security
ENC DataVault
https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software
High
8.1
Flask
Flask-Security-Too Python package
https://github.com/Flask-Middleware/flask-security/issues/486
Medium
6.1
Thoughtbot
package clearance
https://github.com/thoughtbot/clearance/pull/945
Medium
6.1
Nagios
Nagios XI
https://www.nagios.com/downloads/nagios-xi/change-log/
Medium
6.1
WordPress
Login/Signup Popup, Waitlist Woocommerce ( Back in stock notifier ), and Side Cart Woocommerce (Ajax) WordPress plugins
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-0215
High
8.8
Flask
Flask Security
NA
NA
Belledonne Communications
Belle-sip
https://github.com/BelledonneCommunications/belle-sip/commit/116e3eb48fe43ea63eb9f3c4b4b30c48d58d6ff0
High
7.5
ENC Security
ENC DataVault
https://encsecurity.zendesk.com/hc/en-us/articles/4413283717265-Update-for-ENC-Software
Critical
9.1
Fortinet
FortiOS 6.0.0-6.0.4, 5.6.3-5.6.7, 5.4.6-5.4.12
https://www.fortiguard.com/psirt/FG-IR-18-384
Critical
9.8
Microsoft
Microsoft Exchange 2019
https://msrc-blog.microsoft.com/tag/cve-2021-26855/
Critical
9.8
Microsoft
MS Exchange Server 2013, 2016, 2019
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523
Critical
9.8
Microsoft
MS Exchange Server 2013, 2016, 2019
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473
Critical
9.8
Microsoft
MS Exchange Server 2013, 2016, 2019
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207
High
7.2
Microsoft
MS SQL Server 2012, 2014, 2016, 2017, 2019
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1636
High
8.8
Apache
Tomcat 8.5.55-73, 9.0.35-56, 10.0.0,10.0.1-14,10.1.0
https://security.netapp.com/advisory/ntap-20220217-0010/
High
7
Microsoft
Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 for x64-based Systems Service Pack 1, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows RT 8.1, Windows 8.1 x64 & x86, Windows 7 for x64-based & x86-based Systems Service Pack 1, Windows Server 2016, Windows 10 Version 1607, Windows 10, Windows Server - version 20H2, Windows Server - version 2004, Wind
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34527
High
8.8
Microsoft
Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2017-0144
High
8.1
Microsoft
Windows Server - version 20H2, Windows Server - version 2004, Windows Server - version 1909, Windows Server - version 1903, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows Server 2008 R2 for x64-based Systems Service Pack 1
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1472
Critical
10
Microsoft
SMBv1 server - Microsoft Windows Vista SP2,Windows Server 2008 SP2 and R2 SP1,Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, Windows Server 2016
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2017-0143
High
8.1
Microsoft
SMBv1 server - Microsoft Windows Vista SP2,Windows Server 2008 SP2 and R2 SP1,Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, Windows Server 2016
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2017-0148
High
8.1
Microsoft
Microsoft Windows server 2016 1903,1909; windows 10 1903,1909;
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-0796
Critical
10
Microsoft
SMBv1 server - Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0145
High
8.1
Microsoft
SMBv1 server - Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0146
High
8.1
Microsoft
SMBv1 server - Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0147
Medium
5.9
Adobe
Adobe Acrobat and Reader versions 2018.011.20055 and earlier, 2017.011.30096 and earlier, and 2015.006.30434 and earlier
https://helpx.adobe.com/security/products/acrobat/apsb18-29.html
Critical
9.8
Fortinet
FortiOS 6.0.2, 5.6.7 and before, FortiADC 6.1.0, 6.0.0 to 6.0.1, 5.4.0 to 5.4.4
https://fortiguard.com/advisory/FG-IR-18-157
High
8.8
Microsoft
microsoft windows 10,20h2,21h1,1607,1809,1909,2004,microsoft windows 7,sp1,microsoft windows 8.1,microsoft windows rt 8.1,microsoft windows server 2008 sp2,r2 sp1 ,microsoft windows server 2012,r2,windows server 2016,microsoft windows server 2019
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1675
High
8.8
F5
BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2
https://support.f5.com/csp/article/K03009991
Critical
9.8
Microsoft
Microsoft Exchange software
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688
High
8.8
Microsoft
Microsoft Exchange software
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17144
High
8.4
35 records

Alert

Lorem ipsum
Okay