2021 Security Vulnerability Report
CVE Statistics for 2021

Growth Curve
There were 20194 security vulnerabilities (CVEs) published in 2021. In 2020 there were 16989.

The average severity was 7.1 out of 10, which was about the same as in 2020.

Products & Vendors with the most security vulnerabilities published in 2021 Vulnerabilities may exist in multiple products or vendors

By Product

#1

Fedora Project Fedora

1147 vulnerabilities in 2021

#2

Debian Linux

1079 vulnerabilities in 2021

#3

Canonical Ubuntu Linux

704 vulnerabilities in 2021

#4

Google Android

574 vulnerabilities in 2021

#5

Microsoft Windows Server 2016

505 vulnerabilities in 2021

#6

Apple macOS

500 vulnerabilities in 2021

#7

Microsoft Windows 10

488 vulnerabilities in 2021

#8

Microsoft Windows Server 2019

467 vulnerabilities in 2021

#9

Apple iOS

383 vulnerabilities in 2021

#10

Apple iPadOS

336 vulnerabilities in 2021

#11

Microsoft Windows Server 2012

331 vulnerabilities in 2021

#12

Google Chrome

330 vulnerabilities in 2021

#13

Microsoft Windows 8.1

302 vulnerabilities in 2021

#14

Microsoft Windows Rt 8 1

293 vulnerabilities in 2021

#15

Microsoft Windows Server 2008

279 vulnerabilities in 2021

#16

Microsoft Windows 7

256 vulnerabilities in 2021

#17

Apple watchOS

253 vulnerabilities in 2021

#18

Apple tvOS

241 vulnerabilities in 2021

#19

NetApp Oncommand Insight

231 vulnerabilities in 2021

#20

Google Tensorflow

201 vulnerabilities in 2021

By Vendor

#1

Fedora Project

1147 vulnerabilities in 2021

#2

Google

1124 vulnerabilities in 2021

#3

Microsoft

1113 vulnerabilities in 2021

#4

Red Hat

1091 vulnerabilities in 2021

#5

Debian

1079 vulnerabilities in 2021

#6

Oracle

876 vulnerabilities in 2021

#7

Canonical

726 vulnerabilities in 2021

#8

Apple

603 vulnerabilities in 2021

#9

Cisco

541 vulnerabilities in 2021

#10

NetApp

524 vulnerabilities in 2021

#11

IBM

377 vulnerabilities in 2021

#12

Adobe

317 vulnerabilities in 2021

#13

F5 Networks

316 vulnerabilities in 2021

#14

Siemens

305 vulnerabilities in 2021

#15

Huawei

255 vulnerabilities in 2021

#16

SAP

204 vulnerabilities in 2021

#17

Apache

201 vulnerabilities in 2021

#18

Linux

174 vulnerabilities in 2021

#19

Mozilla

158 vulnerabilities in 2021

#20

GitLab

157 vulnerabilities in 2021

By Weakness

#1
XSS
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
2627
 
13.0%
#2
Memory Corruption
The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.
1465
 
7.3%
#3
SQL Injection
The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
727
 
3.6%
#4
Out-of-bounds Read
The software reads data past the end, or before the beginning, of the intended buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. A crash can occur when the code reads a variable amount of data and assumes that a sentinel exists to stop the read operation, such as a NUL in a string. The expected sentinel might not be located in the out-of-bounds memory, causing excessive data to be read, leading to a segmentation fault or a buffer overflow. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent read operation then produces undefined or unexpected results.
691
 
3.4%
#5
Directory traversal
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
525
 
2.6%
#6
Dangling pointer
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
515
 
2.6%
#7
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
470
 
2.3%
#8
Session Riding
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. When a web server is designed to receive a request from a client without any mechanism for verifying that it was intentionally sent, then it might be possible for an attacker to trick a client into making an unintentional request to the web server which will be treated as an authentic request. This can be done via a URL, image load, XMLHttpRequest, etc. and can result in exposure of data or unintended code execution.
464
 
2.3%
#9
Shell injection
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
389
 
1.9%
#10
Classic Buffer Overflow
The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow. A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold, or when a program attempts to put data in a memory area outside of the boundaries of a buffer. The simplest type of error, and the most common cause of buffer overflows, is the "classic" case in which the program copies the buffer without restricting how much is copied. Other variants exist, but the existence of a classic overflow strongly suggests that the programmer is not considering even the most basic of security protections.
384
 
1.9%
#11
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
360
 
1.8%
#12
Command Injection
The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
344
 
1.7%
#13
Improper Privilege Management
The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
329
 
1.6%
#14
AuthZ
The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
306
 
1.5%
#15
authentification
When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
296
 
1.5%
#16
Information Disclosure
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
283
 
1.4%
#17
Buffer Overflow
The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
277
 
1.4%
#18
Unrestricted File Upload
The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
267
 
1.3%
#19
AuthZ
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
226
 
1.1%
#20
Integer Overflow or Wraparound
The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control. An integer overflow or wraparound occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may wrap to become a very small or negative number. While this may be intended behavior in circumstances that rely on wrapping, it can have security consequences if the wrap is unexpected. This is especially the case if the integer overflow can be triggered using user-supplied inputs. This becomes security-critical when the result is used to control looping, make a security decision, or determine the offset or size in behaviors such as memory allocation, copying, concatenation, etc.
207
 
1.0%
#21
Marshaling, Unmarshaling
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
206
 
1.0%
#22
SSRF
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. By providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests.
180
 
0.9%
#23
Resource Exhaustion
The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
171
 
0.8%
#24
Use of Hard-coded Credentials
The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
163
 
0.8%
#25
Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.
153
 
0.8%

By Category

Fortinet FortiWeb

29 vulnerabilities in 2021

Fortinet FortiOS

14 vulnerabilities in 2021

Fortinet FortiManager

12 vulnerabilities in 2021

Content Management

MediaWiki

46 vulnerabilities in 2021

Joomla

28 vulnerabilities in 2021

TYPO3

16 vulnerabilities in 2021

Database

Oracle MySQL

124 vulnerabilities in 2021

MariaDB

15 vulnerabilities in 2021

Couchbase Server

11 vulnerabilities in 2021

Desktop Software

Mozilla Thunderbird

73 vulnerabilities in 2021

Microsoft Office

64 vulnerabilities in 2021

Microsoft Excel

28 vulnerabilities in 2021

Development Tools

Jenkins

29 vulnerabilities in 2021

Microsoft Visual Studio Code

19 vulnerabilities in 2021

Microsoft Visual Studio

6 vulnerabilities in 2021

DevOps

GitLab

156 vulnerabilities in 2021

Kubernetes

6 vulnerabilities in 2021

Docker

2 vulnerabilities in 2021

Email

Microsoft Exchange Server

31 vulnerabilities in 2021

Exim

22 vulnerabilities in 2021

Firmware

Intel Core i5 Processor

2 vulnerabilities in 2021

Intel Core i7 Processor

2 vulnerabilities in 2021

Java Application Servers

Oracle Weblogic Server

44 vulnerabilities in 2021

Apache Tomcat

8 vulnerabilities in 2021

Eclipse Jetty

7 vulnerabilities in 2021

Java Libraries

FasterXML Jackson Databind

12 vulnerabilities in 2021

Libraries

Google Tensorflow

201 vulnerabilities in 2021

OpenSSL

8 vulnerabilities in 2021

Microsoft .NET Core

7 vulnerabilities in 2021

Operating Systems

Debian Linux

1071 vulnerabilities in 2021

Google Android

566 vulnerabilities in 2021

Microsoft Windows Server 2016

496 vulnerabilities in 2021

Runtime Environments

Oracle OpenJDK

20 vulnerabilities in 2021

GoLang Go

16 vulnerabilities in 2021

nodejs node.js

14 vulnerabilities in 2021

Server Software

Microsoft Sharepoint Server

48 vulnerabilities in 2021

Microsoft Sharepoint Enterprise Server

31 vulnerabilities in 2021

OpenBSD OpenSSH

3 vulnerabilities in 2021

Virtualization

Oracle VM VirtualBox

46 vulnerabilities in 2021

QEMU

26 vulnerabilities in 2021

Citrix Xen Desktop

1 vulnerability in 2021

Web Application Framework

Django Project Django

8 vulnerabilities in 2021

Microsoft ASP.NET Core

3 vulnerabilities in 2021

Laravel

1 vulnerability in 2021

Web Applications

Apple iCloud

12 vulnerabilities in 2021

Adobe Magento

1 vulnerability in 2021

Web Browsers

Google Chrome

308 vulnerabilities in 2021

Mozilla Firefox

123 vulnerabilities in 2021

Web Servers

Apache HTTP Server

17 vulnerabilities in 2021

2021 Known Exploited Vulnerabilities

These vulnerabilities may be considered some of the most dangerous vulnerabilities of 2021, because they are both known to have been exploited and have a high severity score. In fact 4 vulnerabilities scored the highest possible CVSS base score, of 10.

10.0
GitLab Community and Enterprise Editions From 11.9 Remote Code Execution Vulnerability
CVE-2021-22205 vulnerability in ExifTool, disclosed on April 23, 2021
10.0
Apache Log4j2 Remote Code Execution Vulnerability
CVE-2021-44228 vulnerability in Log4j2, disclosed on December 10, 2021
10.0
SolarWinds Serv-U Remote Memory Escape Vulnerability
CVE-2021-35211 vulnerability in SolarWinds nServ-U, disclosed on July 14, 2021
10.0
Pulse Connect Secure Remote Code Execution Vulnerability
CVE-2021-22893 vulnerability in Pulse Connect Secure, disclosed on April 23, 2021
9.8
F5 iControl REST unauthenticated Remote Code Execution Vulnerability
CVE-2021-22986 vulnerability in BIG-IP, disclosed on March 31, 2021
9.8
Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability
CVE-2021-44529 vulnerability in Endpoint Manager Cloud Service Appliance (EPM CSA), disclosed on December 8, 2021
9.8
VMware vCenter Server File Upload
CVE-2021-22005 vulnerability in vCenter Server, disclosed on September 23, 2021
9.8
Atlassian Confluence Server < 6.13.23, 6.14.0 - 7.12.5 Arbitrary Code Execution
CVE-2021-26084 vulnerability in Confluence Server, disclosed on August 30, 2021
9.8
Hikvision Improper Input Validation
CVE-2021-36260 vulnerability in Security cameras web server, disclosed on September 22, 2021
9.8
Apache HTTP Server 2.4.49 and 2.4.50 Path Traversal
CVE-2021-42013 vulnerability in HTTP Server, disclosed on October 7, 2021
9.8
Zoho Corp. ManageEngine ADSelfService Plus Version 6113 and Earlier Authentication Bypass
CVE-2021-40539 vulnerability in ManageEngine ADSelfServicePlus, disclosed on September 7, 2021
9.8
Cisco HyperFlex HX Command Injection Vulnerabilities
CVE-2021-1497 vulnerability in HyperFlex HX, disclosed on May 6, 2021
9.8
Arcadyan Buffalo Firmware Multiple Versions Path Traversal
CVE-2021-20090 vulnerability in Buffalo WSR-2533DHPL2 and WSR-2533DHP3 firmware, disclosed on April 29, 2021
9.8
ForgeRock Access Management Remote Code Execution Vulnerability
CVE-2021-35464 vulnerability in Access Management server, disclosed on July 22, 2021
9.8
Sitecore XP Remote Command Execution Vulnerability
CVE-2021-42237 vulnerability in XP, disclosed on November 5, 2021
9.8
VMware vCenter Server Remote Code Execution Vulnerability
CVE-2021-21985 vulnerability in vCenter Server, disclosed on May 26, 2021
9.8
Microsoft Azure Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
CVE-2021-38647 vulnerability in Microsoft Azure Open Management Infrastructure (OMI), disclosed on September 15, 2021
9.8
Zoho ManageEngine ServiceDesk Plus Remote Code Execution Vulnerability
CVE-2021-44077 vulnerability in ManageEngine ServiceDesk Plus (SDP) / SupportCenter Plus, disclosed on November 29, 2021
9.8
Zoho Desktop Central Authentication Bypass Vulnerability
CVE-2021-44515 vulnerability in Desktop Central, disclosed on December 12, 2021
9.8
SonicWall SMA 100 Appliances Stack-Based Buffer Overflow Vulnerability
CVE-2021-20038 vulnerability in SMA 100 Appliances, disclosed on December 8, 2021
9.8
Laravel Ignition File Upload Vulnerability
CVE-2021-3129 vulnerability in Ignition, disclosed on January 12, 2021
9.8
Sunhillo SureLine OS Command Injection Vulnerablity
CVE-2021-36380 vulnerability in SureLine, disclosed on August 13, 2021
9.8
Dahua IP Camera Authentication Bypass Vulnerability
CVE-2021-33044 vulnerability in IP Camera Firmware, disclosed on September 15, 2021
9.8
Tenda AC11 Up to 02.03.01.104_CN Stack Buffer Overflow
CVE-2021-31755 vulnerability in Tenda AC11 devices, disclosed on May 7, 2021
9.8
Aviatrix Controller Unrestricted Upload of File
CVE-2021-40870 vulnerability in Aviatrix Controller, disclosed on September 13, 2021
9.8
Yealink Device Management Server Pre-Authorization SSRF
CVE-2021-27561 vulnerability in Device Management Platform, disclosed on October 15, 2021
9.8
Cisco HyperFlex HX Command Injection Vulnerabilities
CVE-2021-1498 vulnerability in HyperFlex HX, disclosed on May 6, 2021
9.8
Micro Focus Operation Bridge Report (OBR) Server Remote Code Execution Vulnerability
CVE-2021-22502 vulnerability in Micro Focus Operation Bridge Reporter (OBR), disclosed on February 8, 2021
9.8
BQE BillQuick Web Suite Versions Prior to 22.0.9.1 (from 2018 through 2021) Remote Code Execution Vu
CVE-2021-42258 vulnerability in BillQuick Web Suite, disclosed on October 22, 2021
9.8
Realtek Jungle SDK Remote Code Execution Vulnerability
CVE-2021-35394 vulnerability in Jungle Software Development Kit (SDK), disclosed on August 16, 2021
9.8
D-Link DNS-320 Command Injection Remote Code Execution Vulnerability
CVE-2020-25506 vulnerability in DNS-320, disclosed on February 2, 2021
9.8
Realtek SDK Arbitrary Code Execution
CVE-2021-35395 vulnerability in Jungle Software Development Kit (SDK), disclosed on August 16, 2021
9.8
Dahua IP Camera Authentication Bypass Vulnerability
CVE-2021-33045 vulnerability in IP Camera Firmware, disclosed on September 15, 2021
9.8
VMware vCenter Server Remote Code Execution Vulnerability
CVE-2021-21972 vulnerability in vCenter Server, disclosed on February 24, 2021
9.8
Microsoft HTTP Protocol Stack Remote Code Execution Vulnerability
CVE-2021-31166 vulnerability in HTTP Protocol Stack, disclosed on May 11, 2021
9.8
D-Link DIR-825 R1 Through 3.0.1 Before 11/2020 Buffer Overflow
CVE-2020-29557 vulnerability in DIR-825 R1, disclosed on January 29, 2021
9.8
Zoho ManageEngine ServiceDesk Authentication Bypass Vulnerability
CVE-2021-37415 vulnerability in ManageEngine ServiceDesk Plus (SDP), disclosed on September 1, 2021
9.8
QNAP NAS Improper Authorization Vulnerability
CVE-2021-28799 vulnerability in Network Attached Storage (NAS), disclosed on May 13, 2021
9.8
Citrix ShareFile Improper Access Control Vulnerability
CVE-2021-22941 vulnerability in ShareFile, disclosed on September 23, 2021
9.8
QNAP Network-Attached Storage (NAS) Command Injection Vulnerability
CVE-2020-2509 vulnerability in QNAP Network-Attached Storage (NAS), disclosed on April 17, 2021
9.8
SonicWall Secure Remote Access (SRA) SQL Injection Vulnerability
CVE-2021-20028 vulnerability in Secure Remote Access (SRA), disclosed on August 4, 2021
9.8
SonicWall Email Security Privilege Escalation Exploit Chain
CVE-2021-20021 vulnerability in SonicWall Email Security, disclosed on April 9, 2021
9.8
SonicWall SSL VPN SMA100 SQL Injection Vulnerability
CVE-2021-20016 vulnerability in SonicWall SSLVPN SMA100, disclosed on February 4, 2021
9.8
Roundcube Webmail SQL Injection Vulnerability
CVE-2021-44026 vulnerability in Roundcube Webmail, disclosed on November 19, 2021
9.8
F5 BIG-IP Traffic Management Microkernel Buffer Overflow
CVE-2021-22991 vulnerability in BIG-IP Traffic Management Microkernel, disclosed on March 31, 2021
9.8
QNAP Helpdesk Improper Access Control Vulnerability
CVE-2020-2506 vulnerability in Helpdesk, disclosed on February 3, 2021
9.8
Checkbox Survey Deserialization of Untrusted Data Vulnerability
CVE-2021-27852 vulnerability in Checkbox Survey, disclosed on May 27, 2021
9.8
Kaseya VSA Remote Code Execution Vulnerability
CVE-2021-30116 vulnerability in Kaseya VSA, disclosed on July 9, 2021
9.8
Accellion FTA SSRF Vulnerability
CVE-2021-27103 vulnerability in FTA, disclosed on February 16, 2021
9.8
Accellion FTA OS Command Injection Vulnerability
CVE-2021-27104 vulnerability in FTA, disclosed on February 16, 2021
9.8
Accellion FTA SQL Injection Vulnerability
CVE-2021-27101 vulnerability in FTA, disclosed on February 16, 2021
9.8
Apple iOS Privilege Escalation and Code Execution Chain
CVE-2021-1871 vulnerability in iOS, disclosed on April 2, 2021
9.8
Veritas Backup Exec Agent Improper Authentication Vulnerability
CVE-2021-27877 vulnerability in Backup Exec Agent, disclosed on March 1, 2021
9.8
Apple iOS Privilege Escalation and Code Execution Chain
CVE-2021-1870 vulnerability in iOS, disclosed on April 2, 2021
9.6
Google Chrome Use-After-Free Vulnerability
CVE-2021-30633 vulnerability in Chrome, disclosed on October 8, 2021
9.6
Google Chrome Site Isolation Component Use-After-Free Remote Code Execution vulnerability
CVE-2020-16017 vulnerability in Chrome, disclosed on January 8, 2021
9.6
Google Chrome Use-After-Free Vulnerability
CVE-2021-37973 vulnerability in Chrome, disclosed on October 8, 2021
9.1
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2021-34473 vulnerability in Microsoft Exchange Server, disclosed on July 14, 2021
9.1
Microsoft OWA Exchange Control Panel (ECP) Exploit Chain
CVE-2021-26855 vulnerability in Microsoft Exchange Server, disclosed on March 3, 2021
9.1
October CMS Improper Authentication
CVE-2021-32648 vulnerability in October CMS, disclosed on August 26, 2021
9.0
Apache HTTP Server-Side Request Forgery (SSRF)
CVE-2021-40438 vulnerability in Apache, disclosed on September 16, 2021
9.0
Apache Log4j2 Deserialization of Untrusted Data Vulnerability
CVE-2021-45046 vulnerability in Log4j2, disclosed on December 14, 2021
9.0
Microsoft Exchange Server Privilege Escalation Vulnerability
CVE-2021-34523 vulnerability in Microsoft Exchange Server, disclosed on July 14, 2021
8.8
Microsoft Windows, Server (spec. IE) All Arbitrary Code Execution
CVE-2021-40444 vulnerability in Microsoft MSHTML, disclosed on September 15, 2021
8.8
"PrintNightmare" - Microsoft Windows Print Spooler Remote Code Execution Vulnerability
CVE-2021-34527 vulnerability in Windows, disclosed on July 2, 2021
8.8
Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2021-42321 vulnerability in Exchange, disclosed on November 10, 2021
8.8
Nagios XI OS Command Injection
CVE-2021-25296 vulnerability in Nagios XI, disclosed on February 15, 2021
8.8
Chromium V8 Input Validation Vulnerability
CVE-2021-21220 vulnerability in Chromium V8 Engine, disclosed on April 26, 2021
8.8
Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability
CVE-2021-21017 vulnerability in Acrobat and Reader, disclosed on February 11, 2021
8.8
Microsoft Internet Explorer and Edge Memory Corruption Vulnerability
CVE-2021-26411 vulnerability in Microsoft Edge, Internet Explorer, disclosed on March 11, 2021
8.8
SAP NetWeaver Unrestricted File Upload vulnerability
CVE-2021-38163 vulnerability in NetWeaver, disclosed on September 14, 2021
8.8
Google Chrome Out-of-bounds write
CVE-2021-30632 vulnerability in Chrome, disclosed on October 8, 2021
8.8
Nagios XI OS Command Injection
CVE-2021-25298 vulnerability in Nagios XI, disclosed on February 15, 2021
8.8
Chromium V8 Type Confusion Vulnerability
CVE-2021-30551 vulnerability in Chromium V8 Engine, disclosed on June 15, 2021
8.8
Google Chromium V8 Incorrect Implementation Vulnerability
CVE-2021-38003 vulnerability in Chromium V8 Engine, disclosed on November 23, 2021
8.8
Chromium V8 JavaScript Engine Remote Code Execution Vulnerability
CVE-2021-21224 vulnerability in Chromium V8 Engine, disclosed on April 26, 2021
8.8
Google Chrome Use-After-Free Vulnerability
CVE-2021-37975 vulnerability in Chrome, disclosed on October 8, 2021
8.8
Nagios XI OS Command Injection
CVE-2021-25297 vulnerability in Nagios XI, disclosed on February 15, 2021
8.8
Pulse Connect Secure Collaboration Suite Remote Code Execution Vulnerability
CVE-2021-22894 vulnerability in Pulse Connect Secure, disclosed on May 27, 2021
8.8
FatPipe WARP, IPVPN, and MPVPN Configuration Upload exploit
CVE-2021-27860 vulnerability in WARP, IPVPN, and MPVPN software, disclosed on December 8, 2021
8.8
Google Chrome Heap Buffer Overflow in WebAudio Vulnerability
CVE-2021-21166 vulnerability in Chrome, disclosed on March 9, 2021
8.8
Chromium V8 JavaScript Rendering Engine Heap Buffer Overflow Vulnerability
CVE-2021-21148 vulnerability in Chromium V8 Engine, disclosed on February 9, 2021
8.8
Chromium V8 Incorrect Implementation Vulnerabililty
CVE-2020-16013 vulnerability in Chromium V8 Engine, disclosed on January 8, 2021
8.8
Chromium Blink Use-After-Free Vulnerability
CVE-2021-21206 vulnerability in Chromium Blink, disclosed on April 26, 2021
8.8
Adobe Acrobat and Reader Use-After-Free Vulnerability
CVE-2021-28550 vulnerability in Acrobat and Reader, disclosed on September 2, 2021
8.8
Pulse Connect Secure Remote Code Execution Vulnerability
CVE-2021-22899 vulnerability in Pulse Connect Secure, disclosed on May 27, 2021
8.8
Google Chrome Prior to 81.0.4044.92 Use-After-Free Vulnerability
CVE-2020-6572 vulnerability in Chrome, disclosed on January 14, 2021
8.8
Google Chrome WebGL Use-After-Free Vulnerability
CVE-2021-30554 vulnerability in Chrome, disclosed on July 2, 2021
8.8
Chromium V8 Use-After-Free Vulnerability
CVE-2021-21193 vulnerability in Chromium V8 Engine, disclosed on March 16, 2021
8.8
Google Chrome Browser V8 Arbitrary Code Execution
CVE-2021-30563 vulnerability in Chrome, disclosed on August 3, 2021
8.8
Arm Mali GPU Kernel Use-After-Free Vulnerability
CVE-2021-28663 vulnerability in Mali Graphics Processing Unit (GPU), disclosed on May 10, 2021
8.8
Internet Explorer 11 Remote Code Execution Vulnerability
CVE-2021-27085 vulnerability in Internet Explorer, disclosed on March 11, 2021
8.8
Trend Micro Systems Multiple Products Buffer Overflow - Arbitrary File Upload
CVE-2021-36741 vulnerability in Trend Micro Multiple Products, disclosed on July 29, 2021
8.8
Apple Apple iOS and iPadOS Use-After-Free Vulnerability
CVE-2021-30858 vulnerability in iOS and iPadOS, disclosed on August 24, 2021
8.8
Veritas Backup Exec Agent Command Execution Vulnerability
CVE-2021-27878 vulnerability in Backup Exec Agent, disclosed on March 1, 2021
8.8
Arm Mali GPU Kernel Driver Use-After-Free Vulnerability
CVE-2021-29256 vulnerability in Mali Graphics Processing Unit (GPU), disclosed on May 24, 2021
8.8
Apple iOS12.x Buffer Overflow
CVE-2021-30666 vulnerability in iOS, disclosed on September 8, 2021
8.8
Apple Safari Webkit Browser Engine Buffer Overflow Vulnerability
CVE-2021-30665 vulnerability in Safari, disclosed on September 8, 2021
8.8
Apple WebKit Browser Engine Memory Corruption Vulnerability
CVE-2021-30761 vulnerability in iOS, disclosed on September 8, 2021
8.8
Arm Mali GPU Kernel Boundary Error Vulnerability
CVE-2021-28664 vulnerability in Mali Graphics Processing Unit (GPU), disclosed on May 10, 2021

Report Last Updated: May 21, 2025

Error

Lucee [5.4.3.2] - Error (Expression)
Messagerequest [/stats/report.cfm (/web/stack.watch/www/web/stats/report.cfm)] has run into a timeout (timeout: [30] seconds) and has been stopped. The thread started [30056] ms ago.
Java Stacktrace
lucee.runtime.exp.RequestTimeoutException: request [/stats/report.cfm (/web/stack.watch/www/web/stats/report.cfm)] has run into a timeout (timeout: [30] seconds) and has been stopped. The thread started [30056] ms ago.
at java.base/java.lang.Thread.getStackTrace(Thread.java:1602)
at lucee.runtime.CFMLFactoryImpl.createRequestTimeoutException(CFMLFactoryImpl.java:723)
at lucee.runtime.util.PageContextUtil.checkRequestTimeout(PageContextUtil.java:247)
at lucee.runtime.PageContextImpl._doInclude(PageContextImpl.java:946)
at lucee.runtime.PageContextImpl.doInclude(PageContextImpl.java:929)
at lucee.runtime.PageContextImpl.handlePageException(PageContextImpl.java:2113)
at lucee.runtime.PageContextImpl.handlePageException(PageContextImpl.java:2029)
at lucee.runtime.listener.ModernAppListener.onError(ModernAppListener.java:439)
at lucee.runtime.listener.MixedAppListener.onError(MixedAppListener.java:138)
at lucee.runtime.PageContextImpl.execute(PageContextImpl.java:2521)
at lucee.runtime.PageContextImpl._execute(PageContextImpl.java:2478)
at lucee.runtime.PageContextImpl.executeCFML(PageContextImpl.java:2449)
at lucee.runtime.engine.Request.exe(Request.java:45)
at lucee.runtime.engine.CFMLEngineImpl._service(CFMLEngineImpl.java:1216)
at lucee.runtime.engine.CFMLEngineImpl.serviceCFML(CFMLEngineImpl.java:1162)
at lucee.loader.engine.CFMLEngineWrapper.serviceCFML(CFMLEngineWrapper.java:97)
at lucee.loader.servlet.CFMLServlet.service(CFMLServlet.java:51)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:590)
at io.undertow.servlet.handlers.ServletHandler.handleRequest(ServletHandler.java:74)
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:129)
at org.cfmlprojects.regexpathinfofilter.RegexPathInfoFilter.doFilter(RegexPathInfoFilter.java:47)
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:67)
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
at io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler.java:84)
at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java:62)
at io.undertow.servlet.handlers.ServletChain$1.handleRequest(ServletChain.java:68)
at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java:36)
at runwar.undertow.SSLClientCertHeaderHandler.handleRequest(SSLClientCertHeaderHandler.java:144)
at io.undertow.servlet.handlers.RedirectDirHandler.handleRequest(RedirectDirHandler.java:68)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java:257)
at io.undertow.servlet.handlers.ServletInitialHandler.dispatchToPath(ServletInitialHandler.java:182)
at io.undertow.servlet.spec.RequestDispatcherImpl.forwardImpl(RequestDispatcherImpl.java:188)
at io.undertow.servlet.spec.RequestDispatcherImpl.forwardImplSetup(RequestDispatcherImpl.java:136)
at io.undertow.servlet.spec.RequestDispatcherImpl.forward(RequestDispatcherImpl.java:99)
at org.tuckey.web.filters.urlrewrite.NormalRewrittenUrl.doRewrite(NormalRewrittenUrl.java:215)
at org.tuckey.web.filters.urlrewrite.RuleChain.handleRewrite(RuleChain.java:171)
at org.tuckey.web.filters.urlrewrite.RuleChain.doRules(RuleChain.java:145)
at org.tuckey.web.filters.urlrewrite.UrlRewriter.processRequest(UrlRewriter.java:92)
at org.tuckey.web.filters.urlrewrite.UrlRewriteFilter.doFilter(UrlRewriteFilter.java:405)
at io.undertow.servlet.core.ManagedFilter.doFilter(ManagedFilter.java:67)
at io.undertow.servlet.handlers.FilterHandler$FilterChainImpl.doFilter(FilterHandler.java:131)
at io.undertow.servlet.handlers.FilterHandler.handleRequest(FilterHandler.java:84)
at io.undertow.servlet.handlers.security.ServletSecurityRoleHandler.handleRequest(ServletSecurityRoleHandler.java:62)
at io.undertow.servlet.handlers.ServletChain$1.handleRequest(ServletChain.java:68)
at io.undertow.servlet.handlers.ServletDispatchingHandler.handleRequest(ServletDispatchingHandler.java:36)
at runwar.undertow.SSLClientCertHeaderHandler.handleRequest(SSLClientCertHeaderHandler.java:144)
at io.undertow.servlet.handlers.RedirectDirHandler.handleRequest(RedirectDirHandler.java:68)
at io.undertow.servlet.handlers.security.SSLInformationAssociationHandler.handleRequest(SSLInformationAssociationHandler.java:117)
at io.undertow.servlet.handlers.security.ServletAuthenticationCallHandler.handleRequest(ServletAuthenticationCallHandler.java:57)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
at io.undertow.security.handlers.AbstractConfidentialityHandler.handleRequest(AbstractConfidentialityHandler.java:46)
at io.undertow.servlet.handlers.security.ServletConfidentialityConstraintHandler.handleRequest(ServletConfidentialityConstraintHandler.java:64)
at io.undertow.security.handlers.AuthenticationMechanismsHandler.handleRequest(AuthenticationMechanismsHandler.java:60)
at io.undertow.servlet.handlers.security.CachedAuthenticatedSessionHandler.handleRequest(CachedAuthenticatedSessionHandler.java:77)
at io.undertow.security.handlers.AbstractSecurityContextAssociationHandler.handleRequest(AbstractSecurityContextAssociationHandler.java:43)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
at io.undertow.servlet.handlers.SendErrorPageHandler.handleRequest(SendErrorPageHandler.java:52)
at io.undertow.server.handlers.PredicateHandler.handleRequest(PredicateHandler.java:43)
at io.undertow.servlet.handlers.ServletInitialHandler.handleFirstRequest(ServletInitialHandler.java:275)
at io.undertow.servlet.handlers.ServletInitialHandler.access$100(ServletInitialHandler.java:79)
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:134)
at io.undertow.servlet.handlers.ServletInitialHandler$2.call(ServletInitialHandler.java:131)
at io.undertow.servlet.core.ServletRequestContextThreadSetupAction$1.call(ServletRequestContextThreadSetupAction.java:48)
at io.undertow.servlet.core.ContextClassLoaderSetupAction$1.call(ContextClassLoaderSetupAction.java:43)
at io.undertow.servlet.api.LegacyThreadSetupActionWrapper$1.call(LegacyThreadSetupActionWrapper.java:44)
at io.undertow.servlet.handlers.ServletInitialHandler.dispatchRequest(ServletInitialHandler.java:255)
at io.undertow.servlet.handlers.ServletInitialHandler.access$000(ServletInitialHandler.java:79)
at io.undertow.servlet.handlers.ServletInitialHandler$1.handleRequest(ServletInitialHandler.java:100)
at io.undertow.server.Connectors.executeRootHandler(Connectors.java:393)
at io.undertow.server.HttpServerExchange$1.run(HttpServerExchange.java:852)
at org.jboss.threads.ContextClassLoaderSavingRunnable.run(ContextClassLoaderSavingRunnable.java:35)
at org.jboss.threads.EnhancedQueueExecutor.safeRun(EnhancedQueueExecutor.java:2019)
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.doRunTask(EnhancedQueueExecutor.java:1558)
at org.jboss.threads.EnhancedQueueExecutor$ThreadBody.run(EnhancedQueueExecutor.java:1449)
at org.xnio.XnioWorker$WorkerThreadFactory$1$1.run(XnioWorker.java:1282)
at java.base/java.lang.Thread.run(Thread.java:829)