Category: alerts
Cyber Security Monitor Alerts News Notifications. We monitor and send notifications on the latest Cyber Security alerts, blogs, news on data breaches and emerging cyber threats.
High Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
There were no high vulnerabilities recorded this week. |
Medium Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
apache — log4j | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2. | 2021-12-28 | 6 | CVE-2021-44832 MISC MISC MLIST CONFIRM MLIST |
livehelperchat — live_helper_chat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-26 | 4.3 | CVE-2021-4169 MISC CONFIRM |
mediawiki — mediawiki | In MediaWiki through 1.37, blocked IP addresses are allowed to edit EntitySchema items. | 2021-12-24 | 5 | CVE-2021-45471 MISC MISC MISC |
mediawiki — mediawiki | In MediaWiki through 1.37, XSS can occur in Wikibase because an external identifier property can have a URL format that includes a $1 formatter substitution marker, and the javascript: URL scheme (among others) can be used. | 2021-12-24 | 4.3 | CVE-2021-45472 MISC MISC |
mediawiki — mediawiki | In MediaWiki through 1.37, Wikibase item descriptions allow XSS, which is triggered upon a visit to an action=info URL (aka a page-information sidebar). | 2021-12-24 | 4.3 | CVE-2021-45473 MISC MISC |
mediawiki — mediawiki | In MediaWiki through 1.37, the Special:ImportFile URI (aka FileImporter) allows XSS, as demonstrated by the clientUrl parameter. | 2021-12-24 | 4.3 | CVE-2021-45474 MISC MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | 5.2 | CVE-2021-45584 MISC |
Low Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
invoiceninja — invoice_ninja | invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-24 | 3.5 | CVE-2021-3977 MISC CONFIRM |
Severity Not Yet Assigned
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
netgear — ac2600_firmware | Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects AC2100 before 1.2.0.88, AC2400 before 1.2.0.88, AC2600 before 1.2.0.88, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.84, R6330 before 1.1.0.84, R6350 before 1.1.0.84, R6700v2 before 1.2.0.88, R6800 before 1.2.0.88, R6850 before 1.1.0.84, R6900v2 before 1.2.0.88, R7200 before 1.2.0.88, R7350 before 1.2.0.88, R7400 before 1.2.0.88, and R7450 before 1.2.0.88. | 2021-12-26 | not yet calculated | CVE-2021-45644 MISC |
netgear — d7000v2_firmware | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, R7000 before 1.0.11.110, R7100LG before 1.0.0.72, R7900 before 1.0.4.30, R8000 before 1.0.4.62, XR300 before 1.0.3.56, R7000P before 1.3.2.132, R8500 before 1.0.2.144, R6900P before 1.3.2.132, and R8300 before 1.0.2.144. | 2021-12-26 | not yet calculated | CVE-2021-45624 MISC |
4nb — videooffice |
An arbitrary file download and execution vulnerability was found in the VideoOffice X2.9 and earlier versions (CVE-2020-7878). This issue is due to missing support for integrity check. | 2021-12-28 | not yet calculated | CVE-2020-7878 MISC |
actix — actix-web |
An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can unsoundly extend the lifetime of a string, leading to memory corruption. | 2021-12-27 | not yet calculated | CVE-2018-25025 MISC MISC |
actix — actix-web |
An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can unsoundly coerce an immutable reference into a mutable reference, leading to memory corruption. | 2021-12-27 | not yet calculated | CVE-2018-25024 MISC MISC |
actix — actix-web |
An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can add the Send marker trait to an object that cannot be sent between threads safely, leading to memory corruption. | 2021-12-27 | not yet calculated | CVE-2018-25026 MISC MISC |
apache — apisix_dashboard |
In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authentication. | 2021-12-27 | not yet calculated | CVE-2021-45232 CONFIRM MLIST |
archivy — archivy |
archivy is vulnerable to Cross-Site Request Forgery (CSRF) | 2021-12-25 | not yet calculated | CVE-2021-4162 CONFIRM MISC |
asus — rt-n53_devices |
ASUS RT-N53 3.0.0.4.376.3754 devices have a buffer overflow via a long lan_dns1_x or lan_dns2_x parameter to Advanced_LAN_Content.asp. | 2021-12-28 | not yet calculated | CVE-2019-20082 MISC MISC |
attendance_management_system — attendance_management_system |
Attendance Management System 1.0 is affected by a Cross Site Scripting (XSS) vulnerability. The value of the FirstRecord request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The attacker can access the system, by using the XSS-reflected method, and then can store information by injecting the admin account on this system. | 2021-12-26 | not yet calculated | CVE-2021-44598 MISC |
authguard — authguard |
basic/BasicAuthProvider.java in AuthGuard before 0.9.0 allows authentication via an inactive identifier. | 2021-12-27 | not yet calculated | CVE-2021-45890 MISC MISC MISC MISC |
avast — antivirus | Privilege escalation vulnerability in Avast Antivirus prior to 20.4 allows a local user to gain elevated privileges by “hollowing” trusted process which could lead to the bypassing of Avast self-defense. | 2021-12-27 | not yet calculated | CVE-2021-45339 MISC MISC |
avast — antivirus |
Privilege escalation vulnerability in the Sandbox component of Avast Antivirus prior to 20.4 allows a local sandboxed code to gain elevated privileges by using system IPC interfaces which could lead to exit the sandbox and acquire SYSTEM privileges. | 2021-12-27 | not yet calculated | CVE-2021-45336 MISC MISC |
avast — antivirus |
Privilege escalation vulnerability in the Self-Defense driver of Avast Antivirus prior to 20.8 allows a local user with SYSTEM privileges to gain elevated privileges by “hollowing” process wsc_proxy.exe which could lead to acquire antimalware (AM-PPL) protection. | 2021-12-27 | not yet calculated | CVE-2021-45337 MISC MISC |
avast — antivirus |
Multiple privilege escalation vulnerabilities in Avast Antivirus prior to 20.4 allow a local user to gain elevated privileges by calling unnecessarily powerful internal methods of the main antivirus service which could lead to the (1) arbitrary file delete, (2) write and (3) reset security. | 2021-12-27 | not yet calculated | CVE-2021-45338 MISC MISC MISC MISC |
avast — antivirus |
Sandbox component in Avast Antivirus prior to 20.4 has an insecure permission which could be abused by local user to control the outcome of scans, and therefore evade detection or delete arbitrary system files. | 2021-12-27 | not yet calculated | CVE-2021-45335 MISC MISC |
biostar — racing_gt_evo |
An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver’s device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000. | 2022-01-01 | not yet calculated | CVE-2021-44852 MISC |
bitmask — riseup |
Bitmask Riseup VPN 0.21.6 contains a local privilege escalation flaw due to improper access controls. When the software is installed with a non-default installation directory off of the system root, the installer fails to properly set ACLs. This allows lower privileged users to replace the VPN executable with a malicious one. When a higher privileged user such as an Administrator launches that executable, it is possible for the lower privileged user to escalate to Administrator privileges. | 2021-12-30 | not yet calculated | CVE-2021-44466 MISC |
brave — brave_desktop |
In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled, additional DNS requests are issued outside of the proxying extension using the system’s DNS settings, resulting in information disclosure. NOTE: this issue exists because of an incomplete fix for CVE-2021-21323 and CVE-2021-22916. | 2021-12-27 | not yet calculated | CVE-2021-45884 MISC MISC MISC MISC |
carinal — tien_hospital_health_report_system |
Carinal Tien Hospital Health Report System’s login page has improper authentication, a remote attacker can acquire another general user’s privilege by modifying the cookie parameter without authentication. The attacker can then perform limited operations on the system or modify data, making the service partially unavailable to the user. | 2021-12-29 | not yet calculated | CVE-2021-44160 MISC |
celery — celery |
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system. | 2021-12-29 | not yet calculated | CVE-2021-23727 MISC MISC |
cscms — cscms |
An issue in the user login box of CSCMS v4.0 allows attackers to hijack user accounts via brute force attacks. | 2021-12-27 | not yet calculated | CVE-2020-21238 MISC |
damicms — damicms |
A vulnerability in /damicms-master/admin.php?s=/Article/doedit of DamiCMS v6.0 allows attackers to compromise and impersonate user accounts via obtaining a user’s session cookie. | 2021-12-27 | not yet calculated | CVE-2020-21236 MISC |
dl-axist — devices |
The Datalogic DXU service on (for example) DL-Axist devices does not require authentication for configuration changes or disclosure of configuration settings. | 2022-01-01 | not yet calculated | CVE-2021-43333 MISC CONFIRM |
dmp — roadmap |
DMP Roadmap before 3.0.4 allows XSS. | 2022-01-01 | not yet calculated | CVE-2021-44896 MISC MISC MISC |
dnsmasq — dnsmasq |
Dnsmasq 2.86 has a heap-based buffer overflow in answer_request (called from FuzzAnswerTheRequest and fuzz_rfc1035.c). | 2022-01-01 | not yet calculated | CVE-2021-45957 MISC MISC |
dnsmasq — dnsmasq |
Dnsmasq 2.86 has a heap-based buffer overflow in check_bad_address (called from check_for_bogus_wildcard and FuzzCheckForBogusWildcard). | 2022-01-01 | not yet calculated | CVE-2021-45951 MISC MISC |
dnsmasq — dnsmasq |
Dnsmasq 2.86 has a heap-based buffer overflow in print_mac (called from log_packet and dhcp_reply). | 2022-01-01 | not yet calculated | CVE-2021-45956 MISC MISC |
dnsmasq — dnsmasq |
Dnsmasq 2.86 has a heap-based buffer overflow in dhcp_reply (called from dhcp_packet and FuzzDhcp). | 2022-01-01 | not yet calculated | CVE-2021-45952 MISC MISC |
dnsmasq — dnsmasq | Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from hash_questions and fuzz_util.c). | 2022-01-01 | not yet calculated | CVE-2021-45953 MISC MISC |
dnsmasq — dnsmasq |
Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from answer_auth and FuzzAuth). | 2022-01-01 | not yet calculated | CVE-2021-45954 MISC MISC |
dnsmasq — dnsmasq |
Dnsmasq 2.86 has a heap-based buffer overflow in resize_packet (called from FuzzResizePacket and fuzz_rfc1035.c). | 2022-01-01 | not yet calculated | CVE-2021-45955 MISC MISC |
elgg — elgg |
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-24 | not yet calculated | CVE-2021-4072 MISC CONFIRM |
emerson — xweb_300d_evo |
Emerson XWEB 300D EVO 3.0.7–3ee403 is affected by: unauthenticated arbitrary file deletion due to path traversal. An attacker can browse and delete files without any authentication due to incorrect access control and directory traversal. | 2021-12-30 | not yet calculated | CVE-2021-45427 MISC MISC MISC |
emuse — eservices_and_envoice |
Emuse – eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host. | 2021-12-29 | not yet calculated | CVE-2021-36722 CONFIRM |
emuse — eservices_and_envoice |
Emuse – eServices / eNvoice Exposure Of Private Personal Information due to lack of identification mechanisms and predictable IDs an attacker can scrape all the files on the service. | 2021-12-29 | not yet calculated | CVE-2021-36723 CONFIRM |
evga — precision_xoc |
The WinRin0x64.sys and WinRing0.sys low-level drivers in EVGA Precision XOC version v6.2.7 were discovered to be configured with the default security descriptor which allows attackers to access sensitive components and data. | 2021-12-28 | not yet calculated | CVE-2020-22057 MISC |
expat — expat |
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory). | 2022-01-01 | not yet calculated | CVE-2021-45960 MISC MISC MISC |
fatek — winproladder |
FATEK WinProladder Versions 3.30_24518 and prior are vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code. | 2021-12-28 | not yet calculated | CVE-2021-43556 MISC |
fatek — winproladder |
FATEK WinProladder Versions 3.30_24518 and prior are vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code. | 2021-12-28 | not yet calculated | CVE-2021-43554 MISC |
forescout — secureconnector_local_service |
ForeScout – SecureConnector Local Service DoS – A low privilaged user which doesn’t have permissions to shutdown the secure connector service writes a large amount of characters in the installationPath. This will cause the buffer to overflow and override the stack cookie causing the service to crash. | 2021-12-29 | not yet calculated | CVE-2021-36724 CONFIRM |
gdal — gdal |
GDAL 3.3.0 through 3.4.0 has a heap-based buffer overflow in PCIDSK::CPCIDSKFile::ReadFromFile (called from PCIDSK::CPCIDSKSegment::ReadFromFile and PCIDSK::CPCIDSKBinarySegment::CPCIDSKBinarySegment). | 2022-01-01 | not yet calculated | CVE-2021-45943 MISC MISC MISC MISC |
gerapy — gerapy |
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8. | 2021-12-27 | not yet calculated | CVE-2021-43857 CONFIRM MISC MISC |
ghostscript — ghostpdl | Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp). | 2022-01-01 | not yet calculated | CVE-2021-45944 MISC MISC |
ghostscript — ghostpdl |
Ghostscript GhostPDL 9.50 through 9.54.0 has a heap-based buffer overflow in sampled_data_finish (called from sampled_data_continue and interp). | 2022-01-01 | not yet calculated | CVE-2021-45949 MISC MISC MISC |
gif2apng — gif2apng | An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow within the main function. It allows an attacker to write data outside of the allocated buffer. The attacker has control over a part of the address that data is written to, control over the written data, and (to some extent) control over the amount of data that is written. | 2021-12-28 | not yet calculated | CVE-2021-45910 MISC |
gif2apng — gif2apng | An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow vulnerability in the DecodeLZW function. It allows an attacker to write a large amount of arbitrary data outside the boundaries of a buffer. | 2021-12-28 | not yet calculated | CVE-2021-45909 MISC |
gif2apng — gif2apng | An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a for loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted. | 2021-12-28 | not yet calculated | CVE-2021-45907 MISC |
gif2apng — gif2apng | An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted. | 2021-12-28 | not yet calculated | CVE-2021-45908 MISC |
gif2apng — gif2apng |
An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow in the main function. It allows an attacker to write 2 bytes outside the boundaries of the buffer. | 2021-12-28 | not yet calculated | CVE-2021-45911 MISC |
giftrans — giftrans |
The giftrans function in giftrans 1.12.2 contains a stack-based buffer overflow because a value inside the input file determines the amount of data to write. This allows an attacker to overwrite up to 250 bytes outside of the allocated buffer with arbitrary data. | 2022-01-01 | not yet calculated | CVE-2021-45972 MISC MISC MISC |
glewlwyd — glewlwyd |
Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password. | 2021-12-30 | not yet calculated | CVE-2021-45379 MISC MISC |
go — go |
net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests. | 2022-01-01 | not yet calculated | CVE-2021-44716 CONFIRM |
go — go |
Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion. | 2022-01-01 | not yet calculated | CVE-2021-44717 CONFIRM |
google — android |
An improper authentication vulnerability has been reported to affect Android App Qfile. If exploited, this vulnerability allows attackers to compromise app and access information We have already fixed this vulnerability in the following versions of Qfile: Qfile 3.0.0.1105 and later | 2021-12-29 | not yet calculated | CVE-2021-38688 CONFIRM |
grok — grok |
Grok 9.5.0 has a heap-based buffer overflow in openhtj2k::T1OpenHTJ2K::decompress (called from std::__1::__packaged_task_func<std::__1::__bind<grk::T1DecompressScheduler::deco and std::__1::packaged_task<int). | 2022-01-01 | not yet calculated | CVE-2021-45935 MISC MISC MISC |
groupsession — bycloud_and_zion |
Path traversal vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows an attacker with an administrative privilege to obtain sensitive information stored in the hierarchy above the directory on the published site’s server via unspecified vectors. | 2021-12-24 | not yet calculated | CVE-2021-20876 MISC MISC |
groupsession — bycloud_and_zion |
Incorrect permission assignment for critical resource vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to access arbitrary files on the server and obtain sensitive information via unspecified vectors. | 2021-12-24 | not yet calculated | CVE-2021-20874 MISC MISC |
groupsession — bycloud_and_zion | Open redirect vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks by having a user to access a specially crafted URL. | 2021-12-24 | not yet calculated | CVE-2021-20875 MISC MISC |
harfbuzz– harfbuzz | HarfBuzz 2.9.0 has an out-of-bounds write in hb_bit_set_invertible_t::set (called from hb_sparseset_t<hb_bit_set_invertible_t>::set and hb_set_copy). | 2022-01-01 | not yet calculated | CVE-2021-45931 MISC MISC MISC |
iball — wrd12en |
iBall WRD12EN 1.0.0 devices allow cross-site request forgery (CSRF) attacks as demonstrated by enabling DNS settings or modifying the range for IP addresses. | 2021-12-30 | not yet calculated | CVE-2020-29292 MISC MISC |
ibm — x-force |
IBM OPENBMC OP910 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212049. | 2021-12-27 | not yet calculated | CVE-2021-38961 CONFIRM XF |
ibm — x-force |
IBM i 7.2, 7.3, and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208404. | 2021-12-30 | not yet calculated | CVE-2021-38876 CONFIRM XF |
idec — idec |
Unprotected transport of credentials vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from the communication between the PLC and the software. As a result, the complete access privileges to the PLC Web server may be obtained, and manipulation of the PLC output and/or suspension of the PLC may be conducted. | 2021-12-24 | not yet calculated | CVE-2021-20826 MISC MISC |
idec — idec |
Plaintext storage of a password vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the attacker may access the PLC Web server and hijack the PLC, and manipulation of the PLC output and/or suspension of the PLC may be conducted. | 2021-12-24 | not yet calculated | CVE-2021-20827 MISC MISC |
idec — multiple_products | An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or downloaded. | 2021-12-28 | not yet calculated | CVE-2021-37401 MISC MISC MISC MISC |
idec — multiple_products | An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded. | 2021-12-28 | not yet calculated | CVE-2021-37400 MISC MISC MISC MISC |
ifme — ifme | In “ifme”, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability in the markdown editor. It can be exploited by making a victim a Leader of a group which triggers the payload for them. | 2021-12-29 | not yet calculated | CVE-2021-25989 MISC CONFIRM |
ifme — ifme |
In “ifme”, versions v7.22.0 to v7.31.4 are vulnerable against self-stored XSS in the contacts field as it allows loading XSS payloads fetched via an iframe. | 2021-12-29 | not yet calculated | CVE-2021-25990 MISC CONFIRM |
ifme — ifme |
In Ifme, versions v5.0.0 to v7.32 are vulnerable against an improper access control, which makes it possible for admins to ban themselves leading to their deactivation from Ifme account and complete loss of admin access to Ifme. | 2021-12-29 | not yet calculated | CVE-2021-25991 MISC CONFIRM |
ifme — ifme |
In “ifme”, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability (notifications section) which can be directly triggered by sending an ally request to the admin. | 2021-12-29 | not yet calculated | CVE-2021-25988 CONFIRM MISC |
intellibridge — ec_40_and_60_hub | The standard access path of the IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) requires authentication, but the product has an alternate path or channel that does not require authentication. | 2021-12-27 | not yet calculated | CVE-2021-33017 MISC |
intellibridge — ec_40_and_60_hub |
IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains hard-coded credentials, such as a password or a cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. | 2021-12-27 | not yet calculated | CVE-2021-32993 MISC |
iris — iris | This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder. | 2021-12-24 | not yet calculated | CVE-2021-23772 CONFIRM CONFIRM CONFIRM |
jeecg — jeecg |
An arbitrary file download vulnerability in jeecg v3.8 allows attackers to access sensitive files via modification of the “localPath” variable. | 2021-12-27 | not yet calculated | CVE-2020-20948 MISC |
jquery — terminal_emulator |
jQuery Terminal Emulator is a plugin for creating command line interpreters in your applications. Versions prior to 2.31.1 contain a low impact and limited cross-site scripting (XSS) vulnerability. The code for XSS payload is always visible, but an attacker can use other techniques to hide the code the victim sees. If the application uses the `execHash` option and executes code from URL, the attacker can use this URL to execute their code. The scope is limited because the javascript attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. This issue is fixed in version 2.31.1. As a workaround, the user can use formatting that wrap whole user input and its no op. The code for this workaround is available in the GitHub Security Advisory. The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way). | 2021-12-30 | not yet calculated | CVE-2021-43862 CONFIRM MISC MISC MISC |
js-data — js-data |
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655). | 2021-12-24 | not yet calculated | CVE-2021-23574 CONFIRM CONFIRM CONFIRM CONFIRM CONFIRM CONFIRM |
kubernetes — minio |
MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users. | 2021-12-27 | not yet calculated | CVE-2021-43858 MISC MISC MISC CONFIRM MISC |
libbpf — libbpf |
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c). | 2022-01-01 | not yet calculated | CVE-2021-45941 MISC MISC |
libbpf — libbpf |
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c). | 2022-01-01 | not yet calculated | CVE-2021-45940 MISC MISC |
libjxl — libjxl |
libjxl b02d6b9, as used in libvips 8.11 through 8.11.2 and other products, has an out-of-bounds write in jxl::ModularFrameDecoder::DecodeGroup (called from jxl::FrameDecoder::ProcessACGroup and jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections). | 2022-01-01 | not yet calculated | CVE-2021-45928 MISC MISC MISC MISC MISC |
libredwg — libredwg |
LibreDWG 0.12.4.4313 through 0.12.4.4367 has an out-of-bounds write in dwg_free_BLOCK_private (called from dwg_free_BLOCK and dwg_free_object). | 2022-01-01 | not yet calculated | CVE-2021-45950 MISC MISC |
linux — linux_kernel |
In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn’t properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses. | 2021-12-25 | not yet calculated | CVE-2021-45485 MISC MISC MISC |
linux — linux_kernel |
An issue was discovered in the Linux kernel before 5.15.11. There is a memory leak in the __rds_conn_create() function in net/rds/connection.c in a certain combination of circumstances. | 2021-12-24 | not yet calculated | CVE-2021-45480 MISC MISC |
linux — linux_kernel |
In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small. | 2021-12-25 | not yet calculated | CVE-2021-45486 MISC MISC MISC |
livehelperchat — livehelperchat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-29 | not yet calculated | CVE-2021-4175 MISC CONFIRM |
livehelperchat — livehelperchat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-29 | not yet calculated | CVE-2021-4176 CONFIRM MISC |
livehelperchat — livehelperchat | livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information | 2021-12-28 | not yet calculated | CVE-2021-4177 MISC CONFIRM |
livehelperchat — livehelperchat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-28 | not yet calculated | CVE-2021-4179 MISC CONFIRM |
ljcms — ljcms |
An issue in the user login box of LJCMS v1.11 allows attackers to hijack user accounts via brute force attacks. | 2021-12-27 | not yet calculated | CVE-2020-21237 MISC |
max_mazurov — maddy |
A Broken or Risky Cryptographic Algorithm exists in Max Mazurov Maddy before 0.5.2, which is an unnecessary risk that may result in the exposure of sensitive information. | 2021-12-28 | not yet calculated | CVE-2021-42583 MISC MISC |
mdbtools — mdbtools | MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd0c689be0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind). | 2022-01-01 | not yet calculated | CVE-2021-45926 MISC MISC MISC |
mdbtools — mdbtools |
MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd6e029ee0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind). | 2022-01-01 | not yet calculated | CVE-2021-45927 MISC MISC MISC |
mermaid — mermaid |
Mermaid is a Javascript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. Prior to version 8.13.8, malicious diagrams can run javascript code at diagram readers’ machines. Users should upgrade to version 8.13.8 to receive a patch. There are no known workarounds aside from upgrading. | 2021-12-30 | not yet calculated | CVE-2021-43861 MISC MISC CONFIRM |
microsoft — sharepoint |
Microsoft SharePoint Elevation of Privilege Vulnerability. | 2021-12-29 | not yet calculated | CVE-2021-43876 MISC |
motp — motp |
Changing MOTP (Mobile One Time Password) system’s specific function parameter has insufficient validation for user input. A attacker in local area network can perform SQL injection attack to read, modify or delete backend database without authentication. | 2021-12-29 | not yet calculated | CVE-2021-44161 MISC |
moxa — multiple_mgate_products |
The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server. | 2021-12-27 | not yet calculated | CVE-2021-4161 MISC |
mruby — mruby |
mruby is vulnerable to NULL Pointer Dereference | 2021-12-30 | not yet calculated | CVE-2021-4188 MISC CONFIRM |
netbsd — netbsd |
In NetBSD through 9.2, the IPv4 ID generation algorithm does not use appropriate cryptographic measures. | 2021-12-25 | not yet calculated | CVE-2021-45487 MISC MISC |
netbsd — netbsd |
In NetBSD through 9.2, the IPv6 fragment ID generation algorithm employs a weak cryptographic PRNG. | 2021-12-25 | not yet calculated | CVE-2021-45484 MISC MISC |
netbsd — netbsd |
In NetBSD through 9.2, the IPv6 Flow Label generation algorithm employs a weak cryptographic PRNG. | 2021-12-25 | not yet calculated | CVE-2021-45489 MISC MISC |
netbsd — netbsd |
In NetBSD through 9.2, there is an information leak in the TCP ISN (ISS) generation algorithm. | 2021-12-25 | not yet calculated | CVE-2021-45488 MISC MISC |
netgear — ac2100_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects AC2100 before 1.2.0.88, AC2400 before 1.2.0.88, AC2600 before 1.2.0.88, D7000 before 1.0.1.82, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.84, R6330 before 1.1.0.84, R6350 before 1.1.0.84, R6700v2 before 1.2.0.88, R6800 before 1.2.0.88, R6850 before 1.1.0.84, R6900v2 before 1.2.0.88, R7200 before 1.2.0.88, R7350 before 1.2.0.88, R7400 before 1.2.0.88, and R7450 before 1.2.0.88. | 2021-12-26 | not yet calculated | CVE-2021-45534 MISC MISC |
netgear — ac2100_firmware |
Certain NETGEAR devices are affected by authentication bypass. This affects AC2100 before 2021-08-27, AC2400 before 2021-08-27, AC2600 before 2021-08-27, D7000 before 2021-08-27, R6220 before 2021-08-27, R6230 before 2021-08-27, R6260 before 2021-08-27, R6330 before 2021-08-27, R6350 before 2021-08-27, R6700v2 before 2021-08-27, R6800 before 2021-08-27, R6850 before 2021-08-27, R6900v2 before 2021-08-27, R7200 before 2021-08-27, R7350 before 2021-08-27, R7400 before 2021-08-27, and R7450 before 2021-08-27. | 2021-12-26 | not yet calculated | CVE-2021-45511 MISC |
netgear — ac2400_firmware |
Certain NETGEAR devices are affected by authentication bypass. This affects AC2400 before 1.1.0.84, AC2600 before 1.1.0.84, D7000 before 1.0.1.82, R6020 before 1.0.0.52, R6080 before 1.0.0.52, R6120 before 1.0.0.80, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.84, R6330 before 1.1.0.84, R6350 before 1.1.0.84, R6700v2 before 1.1.0.84, R6800 before 1.1.0.84, R6850 before 1.1.0.84, R6900v2 before 1.1.0.84, R7200 before 1.1.0.84, R7350 before 1.1.0.84, R7400 before 1.1.0.84, and R7450 before 1.1.0.84. | 2021-12-26 | not yet calculated | CVE-2021-45501 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX7500 before 1.0.0.72, R6400 before 1.0.1.68, R6900P before 1.3.2.132, R7000 before 1.0.11.116, R7000P before 1.3.2.132, R7900 before 1.0.4.38, R7960P before 1.4.1.66, R8000 before 1.0.4.66, RAX200 before 1.0.3.106, RS400 before 1.5.1.80, XR300 before 1.0.3.68, MK62 before 1.0.6.110, MR60 before 1.0.6.110, R6400v2 before 1.0.4.106, R8000P before 1.4.1.66, RAX20 before 1.0.2.64, RAX45 before 1.0.2.82, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, R6700v3 before 1.0.4.106, R7900P before 1.4.1.66, RAX15 before 1.0.2.64, RAX50 before 1.0.2.82, RAX75 before 1.0.3.106, RBR750 before 3.2.16.22, RBR850 before 3.2.16.22, RBS750 before 3.2.16.22, RBS850 before 3.2.16.22, RBK752 before 3.2.16.22, and RBK852 before 3.2.16.22. | 2021-12-26 | not yet calculated | CVE-2021-45617 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45598 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45597 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by reflected XSS. This affects CBR40 before 2.5.0.10, EAX20 before 1.0.0.32, EAX80 before 1.0.1.62, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7000 before 1.0.1.104, EX7500 before 1.0.0.72, R7000 before 1.0.11.110, R7900 before 1.0.4.30, R7960P before 1.4.1.66, R8000 before 1.0.4.62, RAX200 before 1.0.2.102, XR300 before 1.0.3.50, EX3700 before 1.0.0.90, MR60 before 1.0.5.102, R7000P before 1.3.2.126, R8000P before 1.4.1.66, RAX20 before 1.0.1.64, RAX50 before 1.0.2.28, RAX80 before 1.0.3.102, EX3800 before 1.0.0.90, MS60 before 1.0.5.102, R6900P before 1.3.2.126, R7900P before 1.4.1.66, RAX15 before 1.0.1.64, RAX45 before 1.0.2.28, RAX75 before 1.0.3.102, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45639 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000P before 1.4.2.84, R8300 before 1.0.2.154, R8500 before 1.0.2.154, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45615 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, EAX20 before 1.0.0.58, EAX80 before 1.0.1.68, EX7500 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, R6400 before 1.0.1.70, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.116, R7000P before 1.3.3.140, R7850 before 1.0.5.68, R7900 before 1.0.4.38, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RS400 before 1.5.1.80, XR1000 before 1.0.0.58, and XR300 before 1.0.3.68. | 2021-12-26 | not yet calculated | CVE-2021-45622 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, R7960P before 1.4.1.66, RAX200 before 1.0.3.106, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, EX3700 before 1.0.0.90, MR60 before 1.0.6.110, R8000P before 1.4.1.66, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, EX3800 before 1.0.0.90, MS60 before 1.0.6.110, R7900P before 1.4.1.66, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45667 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 3.2.18.2, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, RBS40V before 2.6.2.4, and RBW30 before 2.6.2.2. | 2021-12-26 | not yet calculated | CVE-2021-45628 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45631 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45630 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, EAX20 before 1.0.0.58, EAX80 before 1.0.1.68, EX7500 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.126, R7000P before 1.3.3.140, R7850 before 1.0.5.74, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RS400 before 1.5.1.80, XR1000 before 1.0.0.58, and XR300 before 1.0.3.68. | 2021-12-26 | not yet calculated | CVE-2021-45612 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX80 before 1.0.1.62, EX7500 before 1.0.0.72, R7900 before 1.0.4.38, R8000 before 1.0.4.68, RAX200 before 1.0.4.120, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.4.120, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.4.120, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45671 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, D7000v2 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, MR80 before 1.1.2.20, MS80 before 1.1.2.20, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX43 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX35v2 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and XR1000 before 1.0.0.58. | 2021-12-26 | not yet calculated | CVE-2021-45613 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, EAX20 before 1.0.0.58, EAX80 before 1.0.1.68, LAX20 before 1.1.6.28, MR60 before 1.0.6.116, MR80 before 1.1.2.20, MS60 before 1.0.6.116, MS80 before 1.1.2.20, MK62 before 1.0.6.116, MK83 before 1.1.2.20, R6400 before 1.0.1.70, R6400v2 before 1.0.4.106, R6700v3 before 1.0.4.106, R6900P before 1.3.3.140, R7000 before 1.0.11.126, R7000P before 1.3.3.140, R7850 before 1.0.5.74, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RS400 before 1.5.1.80, XR1000 before 1.0.0.58, and XR300 before 1.0.3.68. | 2021-12-26 | not yet calculated | CVE-2021-45620 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects CBR40 before 2.3.5.12, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, R6400 before 1.0.1.70, R7000 before 1.0.11.126, R6900P before 1.3.2.124, R7000P before 1.3.2.124, R7900 before 1.0.4.30, R8000 before 1.0.4.52, and WNR3500Lv2 before 1.2.0.62. | 2021-12-26 | not yet calculated | CVE-2021-45529 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBW30 before 2.6.2.2, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and RBS40V before 2.6.2.8. | 2021-12-26 | not yet calculated | CVE-2021-45507 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX80 before 1.0.1.64, EX3700 before 1.0.0.90, EX3800 before 1.0.0.90, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, RBW30 before 2.6.1.4, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, and RBS40V before 2.6.1.4. | 2021-12-26 | not yet calculated | CVE-2021-45666 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 3.2.18.2, EAX20 before 1.0.0.58, EAX80 before 1.0.1.68, EX3700 before 1.0.0.94, EX3800 before 1.0.0.94, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7000 before 1.0.1.104, EX7500 before 1.0.0.74, LAX20 before 1.1.6.28, MR60 before 1.0.6.116, MS60 before 1.0.6.116, R6300v2 before 1.0.4.52, R6400 before 1.0.1.70, R6400v2 before 1.0.4.106, R6700v3 before 1.0.4.106, R6900P before 1.3.3.140, R7000 before 1.0.11.126, R7000P before 1.3.3.140, R7100LG before 1.0.0.72, R7850 before 1.0.5.74, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, R8300 before 1.0.2.154, R8500 before 1.0.2.154, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBS850 before 3.2.17.12, RS400 before 1.5.1.80, XR1000 before 1.0.0.58, and XR300 before 1.0.3.68. | 2021-12-26 | not yet calculated | CVE-2021-45621 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBR852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45504 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by stored XSS. This affects CBR40 before 2.5.0.10, EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, R7000 before 1.0.11.116, R7900 before 1.0.4.38, R8000 before 1.0.4.68, RAX200 before 1.0.3.106, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, EX3700 before 1.0.0.90, MR60 before 1.0.6.110, R7000P before 1.3.2.126, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, EX3800 before 1.0.0.90, MS60 before 1.0.6.110, R6900P before 1.3.2.126, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45670 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, and RBR850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45508 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.24, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45509 MISC |
netgear — cbr40_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45601 MISC |
netgear — cbr40_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45599 MISC |
netgear — cbr750_firmware | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45627 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR750 before 4.6.3.6, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45600 MISC |
netgear — cbr750_firmware | Certain NETGEAR devices are affected by authentication bypass. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45506 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by authentication bypass. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45503 MISC |
netgear — cbr750_firmware | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45633 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects CBR750 before 3.2.18.2, D6220 before 1.0.0.68, D6400 before 1.0.0.102, D8500 before 1.0.3.60, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, R6300v2 before 1.0.4.50, R6400 before 1.0.1.68, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.116, R7000P before 1.3.3.140, R7850 before 1.0.5.68, R7900 before 1.0.4.38, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RS400 before 1.5.1.80, and XR1000 before 1.0.0.58. | 2021-12-26 | not yet calculated | CVE-2021-45604 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by authentication bypass. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45505 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45596 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by authentication bypass. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45502 MISC |
netgear — cbr750_firmware | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45632 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45634 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45635 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 3.2.18.2, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, R6900P before 1.3.3.140, R7000 before 1.0.11.126, R7000P before 1.3.3.140, R7850 before 1.0.5.68, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RS400 before 1.5.1.80, and XR1000 before 1.0.0.58. | 2021-12-26 | not yet calculated | CVE-2021-45616 MISC |
netgear — cbr750_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR750 before 4.6.3.6, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45629 MISC |
netgear — d3600_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.78, D6100 before 1.0.0.63, D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DGN2200Bv4 before 1.0.0.109, DGN2200v4 before 1.0.0.110, R6250 before 1.0.4.34, R6300v2 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700 before 1.0.2.6, R6700v3 before 1.0.2.66, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7100LG before 1.0.0.50, R7300 before 1.0.0.70, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.28, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, WNDR3400v3 before 1.0.1.24, WNR3500Lv2 before 1.2.0.62, and XR500 before 2.3.2.56. | 2021-12-26 | not yet calculated | CVE-2021-45550 MISC |
netgear — d3600_firmware | Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D3600 before 1.0.0.72, D6000 before 1.0.0.72, D6200 before 1.1.00.34, D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7000 before 1.0.1.74, D7000v2 before 1.0.0.53, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DC112A before 1.0.0.42, DGN2200v4 before 1.0.0.110, DGND2200Bv4 before 1.0.0.109, DM200 before 1.0.0.61, EX3700 before 1.0.0.76, EX3800 before 1.0.0.76, EX6120 before 1.0.0.46, EX6130 before 1.0.0.28, EX7000 before 1.0.1.78, PR2000 before 1.0.0.28, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6250 before 1.0.4.34, R6300v2 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700 before 1.0.2.6, R6700v3 before 1.0.2.66, R6900 before 1.0.2.6, R7000 before 1.0.9.34, R7100LG before 1.0.0.50, R7500v2 before 1.0.3.40, R7900P before 1.4.1.50, R8000P before 1.4.1.50, R8900 before 1.0.4.12, R9000 before 1.0.4.12, RBK20 before 2.3.0.28, RBK40 before 2.3.0.28, RBK50 before 2.3.0.32, RBR20 before 2.3.0.28, RBR40 before 2.3.0.28, RBR50 before 2.3.0.32, RBS20 before 2.3.0.28, RBS40 before 2.3.0.28, RBS50 before 2.3.0.32, WN3000RPv2 before 1.0.0.78, WNDR3400v3 before 1.0.1.24, WNR2000v5 before 1.0.0.70, WNR2020 before 1.1.0.62, WNR3500Lv2 before 1.2.0.62, XR450 before 2.3.2.56, and XR500 before 2.3.2.56. | 2021-12-26 | not yet calculated | CVE-2021-45640 MISC |
netgear — d3600_firmware |
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D3600 before 1.0.0.72, D6000 before 1.0.0.72, D6200 before 1.1.00.34, D6220 before 1.0.0.52, D6400 before 1.0.0.86, D7000 before 1.0.1.74, D7000v2 before 1.0.0.53, D7800 before 1.0.1.56, D8500 before 1.0.3.44, DC112A before 1.0.0.42, DGN2200Bv4 before 1.0.0.109, DGN2200v4 before 1.0.0.110, DM200 before 1.0.0.61, EX3700 before 1.0.0.76, EX3800 before 1.0.0.76, EX6120 before 1.0.0.46, EX6130 before 1.0.0.28, EX7000 before 1.0.1.78, PR2000 before 1.0.0.28, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6250 before 1.0.4.34, R6300v2 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700v3 before 1.0.2.66, R6700 before 1.0.2.6, R6900 before 1.0.2.6, R7000 before 1.0.9.34, R7100LG before 1.0.0.50, R7500v2 before 1.0.3.40, R7900P before 1.4.1.50, R8000P before 1.4.1.50, R8900 before 1.0.4.12, R9000 before 1.0.4.12, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK40 before 2.3.0.28, RBR40 before 2.3.0.28, RBS40 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, WN3000RPv2 before 1.0.0.78, WNDR3400v3 before 1.0.1.24, WNR2000v5 before 1.0.0.70, WNR2020 before 1.1.0.62, and XR500 before 2.3.2.56. | 2021-12-26 | not yet calculated | CVE-2021-45641 MISC |
netgear — d6200_firmware |
Certain NETGEAR devices are affected by Stored XSS. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6120 before 1.0.0.76, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.78, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6700v2 before 1.2.0.76, R6850 before 1.1.0.78, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, and RAX40 before 1.0.3.62. | 2021-12-26 | not yet calculated | CVE-2021-45672 MISC |
netgear — d6200_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6050 before 1.0.1.26, JR6150 before 1.0.1.26, R6120 before 1.0.0.66, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.64, R6800 before 1.2.0.62, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, AC2600 before 1.2.0.62, and WNR2020 before 1.1.0.62. | 2021-12-26 | not yet calculated | CVE-2021-45551 MISC |
netgear — d6200_firmware | Certain NETGEAR devices are affected by server-side injection. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6050 before 1.0.1.26, JR6150 before 1.0.1.26, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.78, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6700v2 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, RBK40 before 2.5.1.16, RBR40 before 2.5.1.16, RBS40 before 2.5.1.16, RBK20 before 2.5.1.16, RBR20 before 2.5.1.16, RBS20 before 2.5.1.16, RBK50 before 2.5.1.16, RBR50 before 2.5.1.16, RBS50 before 2.5.1.16, and RBS50Y before 2.6.1.40. | 2021-12-26 | not yet calculated | CVE-2021-45656 MISC |
netgear — d6200_firmware |
Certain NETGEAR devices are affected by server-side injection. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, R6020 before 1.0.0.48, R6080 before 1.0.0.48, R6050 before 1.0.1.26, JR6150 before 1.0.1.26, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.78, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6700v2 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, RBK40 before 2.5.1.16, RBR40 before 2.5.1.16, RBS40 before 2.5.1.16, RBK20 before 2.5.1.16, RBR20 before 2.5.1.16, RBS20 before 2.5.1.16, RBK50 before 2.5.1.16, RBR50 before 2.5.1.16, RBS50 before 2.5.1.16, RBS50Y before 2.6.1.40, and WNR2020 before 1.1.0.62. | 2021-12-26 | not yet calculated | CVE-2021-45657 MISC |
netgear — d6220_firmware | NETGEAR D6220 devices before 1.0.0.76 are affected by command injection by an authenticated user. | 2021-12-26 | not yet calculated | CVE-2021-45531 MISC |
netgear — d6220_firmware |
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D6220 before 1.0.0.66, D6400 before 1.0.0.100, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, DC112A before 1.0.0.52, DGN2200v4 before 1.0.0.118, EAX80 before 1.0.1.64, R6250 before 1.0.4.48, R7000 before 1.0.11.110, R7100LG before 1.0.0.72, R7900 before 1.0.4.30, R7960P before 1.4.1.64, R8000 before 1.0.4.62, RAX200 before 1.0.3.106, RS400 before 1.5.1.80, XR300 before 1.0.3.68, R6400v2 before 1.0.4.106, R7000P before 1.3.2.132, R8000P before 1.4.1.64, RAX20 before 1.0.2.82, RAX45 before 1.0.2.82, RAX80 before 1.0.3.106, R6700v3 before 1.0.4.106, R6900P before 1.3.2.132, R7900P before 1.4.1.64, RAX15 before 1.0.2.82, RAX50 before 1.0.2.82, and RAX75 before 1.0.3.106. | 2021-12-26 | not yet calculated | CVE-2021-45610 MISC |
netgear — d6220_firmware |
Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects D6220 before 1.0.0.68, D6400 before 1.0.0.102, D7000v2 before 1.0.0.74, D8500 before 1.0.3.60, DC112A before 1.0.0.56, R6300v2 before 1.0.4.50, R6400 before 1.0.1.68, R7000 before 1.0.11.116, R7100LG before 1.0.0.70, RBS40V before 2.6.2.8, RBW30 before 2.6.2.2, RS400 before 1.5.1.80, R7000P before 1.3.2.132, and R6900P before 1.3.2.132. | 2021-12-26 | not yet calculated | CVE-2021-45638 MISC |
netgear — d6220_firmware |
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D6220 before 1.0.0.68, D6400 before 1.0.0.102, D7000v2 before 1.0.0.66, D8500 before 1.0.3.58, DC112A before 1.0.0.54, EX7000 before 1.0.1.94, EX7500 before 1.0.0.72, R6250 before 1.0.4.48, R6300v2 before 1.0.4.52, R6400 before 1.0.1.70, R6400v2 before 1.0.4.102, R6700v3 before 1.0.4.102, R7000 before 1.0.11.116, R7100LG before 1.0.0.64, R7850 before 1.0.5.68, R7900 before 1.0.4.30, R7960P before 1.4.1.68, R8000 before 1.0.4.52, RAX200 before 1.0.2.88, RBS40V before 2.6.2.4, RS400 before 1.5.1.80, XR300 before 1.0.3.56, R7000P before 1.3.2.124, R8000P before 1.4.1.68, R8500 before 1.0.2.144, RAX80 before 1.0.3.102, R6900P before 1.3.2.124, R7900P before 1.4.1.68, R8300 before 1.0.2.144, RAX75 before 1.0.3.102, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45527 MISC |
netgear — d7000_firmware | NETGEAR D7000 devices before 1.0.1.82 are affected by authentication bypass. | 2021-12-26 | not yet calculated | CVE-2021-45497 MISC |
netgear — d7000_firmware | NETGEAR D7000 devices before 1.0.1.68 are affected by authentication bypass. | 2021-12-26 | not yet calculated | CVE-2021-45495 MISC |
netgear — d7000_firmware | NETGEAR D7000 devices before 1.0.1.82 are affected by authentication bypass. | 2021-12-26 | not yet calculated | CVE-2021-45496 MISC |
netgear — d7000_firmware | NETGEAR D7000 devices before 1.0.1.82 are affected by a stack-based buffer overflow by an unauthenticated attacker. | 2021-12-26 | not yet calculated | CVE-2021-45636 MISC |
netgear — d7000v2_firmware | Certain NETGEAR devices are affected by weak cryptography. This affects D7000v2 before 1.0.0.62, D8500 before 1.0.3.50, EX3700 before 1.0.0.84, EX3800 before 1.0.0.84, EX6120 before 1.0.0.54, EX6130 before 1.0.0.36, EX7000 before 1.0.1.90, R6250 before 1.0.4.42, R6400v2 before 1.0.4.98, R6700v3 before 1.0.4.98, R6900P before 1.3.2.124, R7000 before 1.0.11.106, R7000P before 1.3.2.124, R7100LG before 1.0.0.56, R7900 before 1.0.4.26, R8000 before 1.0.4.58, R8300 before 1.0.2.134, R8500 before 1.0.2.134, RS400 before 1.5.0.48, WNR3500Lv2 before 1.2.0.62, and XR300 before 1.0.3.50. | 2021-12-26 | not yet calculated | CVE-2021-45512 MISC |
netgear — d7000v2_firmware | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7000v2 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX43 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX35v2 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and XR1000 before 1.0.0.58. | 2021-12-26 | not yet calculated | CVE-2021-45614 MISC |
netgear — d7800_firmware |
Certain NETGEAR devices are affected by server-side injection. This affects D7800 before 1.0.1.58, DM200 before 1.0.0.66, EX2700 before 1.0.1.56, EX6150v2 before 1.0.1.86, EX6100v2 before 1.0.1.86, EX6200v2 before 1.0.1.78, EX6250 before 1.0.0.110, EX6410 before 1.0.0.110, EX6420 before 1.0.0.110, EX6400v2 before 1.0.0.110, EX7300 before 1.0.2.144, EX6400 before 1.0.2.144, EX7320 before 1.0.0.110, EX7300v2 before 1.0.0.110, R7500v2 before 1.0.3.48, R7800 before 1.0.2.68, R8900 before 1.0.5.2, R9000 before 1.0.5.2, RAX120 before 1.0.1.90, RBK40 before 2.5.1.16, RBK20 before 2.5.1.16, RBR20 before 2.5.1.16, RBS20 before 2.5.1.16, RBK50 before 2.5.1.16, RBR50 before 2.5.1.16, RBS50 before 2.5.1.16, RBS50Y before 2.6.1.40, WN3000RPv2 before 1.0.0.78, WN3000RPv3 before 1.0.2.80, WNR2000v5 before 1.0.0.72, XR500 before 2.3.2.56, and XR700 before 1.0.1.20. | 2021-12-26 | not yet calculated | CVE-2021-45658 MISC |
netgear — d7800_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.66, EX2700 before 1.0.1.68, WN3000RPv2 before 1.0.0.90, WN3000RPv3 before 1.0.2.100, LBR1020 before 2.6.5.20, LBR20 before 2.6.5.32, R6700AX before 1.0.10.110, R7800 before 1.0.2.86, R8900 before 1.0.5.38, R9000 before 1.0.5.38, RAX10 before 1.0.10.110, RAX120v1 before 1.2.3.28, RAX120v2 before 1.2.3.28, RAX70 before 1.0.10.110, RAX78 before 1.0.10.110, XR450 before 2.3.2.130, XR500 before 2.3.2.130, and XR700 before 1.0.1.46. | 2021-12-26 | not yet calculated | CVE-2021-45602 MISC MISC |
netgear — d7800_firmware | Certain NETGEAR devices are affected by disclosure of sensitive information. A UPnP request reveals a device’s serial number, which can be used for a password reset. This affects D7800 before 1.0.1.66, EX2700 before 1.0.1.68, WN3000RPv2 before 1.0.0.90, WN3000RPv3 before 1.0.2.100, LBR1020 before 2.6.5.20, LBR20 before 2.6.5.32, R6700AX before 1.0.10.110, R7800 before 1.0.2.86, R8900 before 1.0.5.38, R9000 before 1.0.5.38, RAX10 before 1.0.10.110, RAX120v1 before 1.2.3.28, RAX120v2 before 1.2.3.28, RAX70 before 1.0.10.110, RAX78 before 1.0.10.110, XR450 before 2.3.2.130, XR500 before 2.3.2.130, and XR700 before 1.0.1.46. | 2021-12-26 | not yet calculated | CVE-2021-45603 MISC MISC |
netgear — d7800_firmware |
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D7800 before 1.0.1.64, EX6250 before 1.0.0.134, EX7700 before 1.0.0.222, LBR20 before 2.6.3.50, RBS50Y before 2.7.3.22, R8900 before 1.0.5.26, R9000 before 1.0.5.26, XR450 before 2.3.2.66, XR500 before 2.3.2.66, XR700 before 1.0.1.36, EX7320 before 1.0.0.134, RAX120 before 1.2.2.24, EX7300v2 before 1.0.0.134, RAX120v2 before 1.2.2.24, EX6410 before 1.0.0.134, RBR10 before 2.7.3.22, RBR20 before 2.7.3.22, RBR40 before 2.7.3.22, RBR50 before 2.7.3.22, EX6420 before 1.0.0.134, RBS10 before 2.7.3.22, RBS20 before 2.7.3.22, RBS40 before 2.7.3.22, RBS50 before 2.7.3.22, EX6400v2 before 1.0.0.134, RBK12 before 2.7.3.22, RBK20 before 2.7.3.22, RBK40 before 2.7.3.22, and RBK50 before 2.7.3.22. | 2021-12-26 | not yet calculated | CVE-2021-45642 MISC |
netgear — d7800_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.58, R7500v2 before 1.0.3.48, R7800 before 1.0.2.68, R8900 before 1.0.5.2, R9000 before 1.0.5.2, RAX120 before 1.0.1.108, and XR700 before 1.0.1.20. | 2021-12-26 | not yet calculated | CVE-2021-45552 MISC |
netgear — d7800_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.60, DM200 before 1.0.0.66, EX2700 before 1.0.1.56, EX6150v2 before 1.0.1.86, EX6200v2 before 1.0.1.86, EX6250 before 1.0.0.128, EX6400 before 1.0.2.144, EX6400v2 before 1.0.0.128, EX6410 before 1.0.0.128, EX6420 before 1.0.0.128, EX7300 before 1.0.2.144, EX7300v2 before 1.0.0.128, EX7320 before 1.0.0.128, R7500v2 before 1.0.3.46, R7800 before 1.0.2.74, R8900 before 1.0.5.26, R9000 before 1.0.5.2, RAX120 before 1.0.1.128, WN3000RPv2 before 1.0.0.78, WN3000RPv3 before 1.0.2.80, WNR2000v5 before 1.0.0.74, XR500 before 2.3.2.66, RBK20 before 2.7.3.22, RBR20 before 2.7.3.22, RBS20 before 2.7.3.22, RBK40 before 2.7.3.22, RBR40 before 2.7.3.22, and RBS40 before 2.7.3.22. | 2021-12-26 | not yet calculated | CVE-2021-45548 MISC |
netgear — d7800_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7800 before 1.0.1.64, EX6200v2 before 1.0.1.86, EX6250 before 1.0.0.134, EX7700 before 1.0.0.216, EX8000 before 1.0.1.232, LBR20 before 2.6.3.50, R7800 before 1.0.2.80, R8900 before 1.0.5.26, R9000 before 1.0.5.26, RAX120 before 1.2.0.16, RBS50Y before 1.0.0.56, WNR2000v5 before 1.0.0.76, XR450 before 2.3.2.114, XR500 before 2.3.2.114, XR700 before 1.0.1.36, EX6150v2 before 1.0.1.98, EX7300 before 1.0.2.158, EX7320 before 1.0.0.134, EX6100v2 before 1.0.1.98, EX6400 before 1.0.2.158, EX7300v2 before 1.0.0.134, EX6410 before 1.0.0.134, RBR10 before 2.6.1.44, RBR20 before 2.6.2.104, RBR40 before 2.6.2.104, RBR50 before 2.7.2.102, EX6420 before 1.0.0.134, RBS10 before 2.6.1.44, RBS20 before 2.6.2.104, RBS40 before 2.6.2.104, RBS50 before 2.7.2.102, EX6400v2 before 1.0.0.134, RBK12 before 2.6.1.44, RBK20 before 2.6.2.104, RBK40 before 2.6.2.104, and RBK50 before 2.7.2.102. | 2021-12-26 | not yet calculated | CVE-2021-45618 MISC |
netgear — d7800_firmware | Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D7800 before 1.0.1.68, R6400v2 before 1.0.4.122, and R6700v3 before 1.0.4.122. | 2021-12-26 | not yet calculated | CVE-2021-45608 MISC |
netgear — d8500_firmware |
Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D8500 before 1.0.3.58, R6250 before 1.0.4.48, R7000 before 1.0.11.116, R7100LG before 1.0.0.64, R7900 before 1.0.4.38, R8300 before 1.0.2.144, R8500 before 1.0.2.144, XR300 before 1.0.3.68, R7000P before 1.3.2.132, and R6900P before 1.3.2.132. | 2021-12-26 | not yet calculated | CVE-2021-45609 MISC |
netgear — dc112a_firmware | Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects DC112A before 1.0.0.52, R6400 before 1.0.1.68, RAX200 before 1.0.3.106, WNDR3400v3 before 1.0.1.38, XR300 before 1.0.3.68, R8500 before 1.0.2.144, RAX75 before 1.0.3.106, R8300 before 1.0.2.144, and RAX80 before 1.0.3.106. | 2021-12-26 | not yet calculated | CVE-2021-45611 MISC |
netgear — eax20_firmware |
Certain NETGEAR devices are affected by stored XSS. This affects EAX20 before 1.0.0.36, EAX80 before 1.0.1.62, EX3700 before 1.0.0.90, EX3800 before 1.0.0.90, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, RBW30 before 2.6.1.4, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, and RBS40V before 2.6.1.4. | 2021-12-26 | not yet calculated | CVE-2021-45665 MISC |
netgear — eax20_firmware | Certain NETGEAR devices are affected by stored XSS. This affects EAX20 before 1.0.0.48, EAX80 before 1.0.1.64, EX3700 before 1.0.0.90, EX3800 before 1.0.0.90, EX6120 before 1.0.0.64, EX6130 before 1.0.0.44, EX7500 before 1.0.0.72, R7960P before 1.4.1.66, R7900P before 1.4.1.66, R8000P before 1.4.1.66, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX45 before 1.0.2.72, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, and RAX80 before 1.0.3.106. | 2021-12-26 | not yet calculated | CVE-2021-45668 MISC |
netgear — eax80_firmware | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects EAX80 before 1.0.1.62, EX7000 before 1.0.1.104, R6120 before 1.0.0.76, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.78, R6850 before 1.1.0.78, R6350 before 1.1.0.78, R6330 before 1.1.0.78, R6800 before 1.2.0.76, R6900v2 before 1.2.0.76, R6700v2 before 1.2.0.76, R7000 before 1.0.11.116, R6900P before 1.3.3.140, R7000P before 1.3.3.140, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, AC2600 before 1.2.0.76, R7900 before 1.0.4.38, R7960P before 1.4.1.66, R8000 before 1.0.4.68, R7900P before 1.4.1.66, R8000P before 1.4.1.66, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX45 before 1.0.2.72, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, and RAX80 before 1.0.3.106. | 2021-12-26 | not yet calculated | CVE-2021-45647 MISC |
netgear — ex6000_firmware | Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects EX6000 before 1.0.0.38, EX6120 before 1.0.0.48, EX6130 before 1.0.0.30, R6300v2 before 1.0.4.52, R6400 before 1.0.1.52, R7000 before 1.0.11.126, R7900 before 1.0.4.30, R8000 before 1.0.4.52, R7000P before 1.3.2.124, R8000P before 1.4.1.50, RAX80 before 1.0.3.88, R6900P before 1.3.2.124, R7900P before 1.4.1.50, and RAX75 before 1.0.3.88. | 2021-12-26 | not yet calculated | CVE-2021-45526 MISC |
netgear — ex6100v2_firmware |
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects EX6100v2 before 1.0.1.106, EX6150v2 before 1.0.1.106, EX6250 before 1.0.0.146, EX6400 before 1.0.2.164, EX6400v2 before 1.0.0.146, EX6410 before 1.0.0.146, EX6420 before 1.0.0.146, EX7300 before 1.0.2.164, EX7300v2 before 1.0.0.146, EX7320 before 1.0.0.146, EX7700 before 1.0.0.222, LBR1020 before 2.6.5.16, LBR20 before 2.6.5.2, RBK352 before 4.3.4.7, RBK50 before 2.7.3.22, RBR350 before 4.3.4.7, RBR50 before 2.7.3.22, and RBS350 before 4.3.4.7. | 2021-12-26 | not yet calculated | CVE-2021-45648 MISC |
netgear — ex6120_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects EX6120 before 1.0.0.66, EX6130 before 1.0.0.46, EX7000 before 1.0.1.106, EX7500 before 1.0.1.76, EX3700 before 1.0.0.94, EX3800 before 1.0.0.94, RBR850 before 4.6.3.9, RBS850 before 4.6.3.9, and RBK852 before 4.6.3.9. | 2021-12-26 | not yet calculated | CVE-2021-45533 MISC |
netgear — ex6200v2_firmware |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects EX6200v2 before 1.0.1.86, EX6250 before 1.0.0.134, EX7700 before 1.0.0.216, EX8000 before 1.0.1.232, LBR1020 before 2.6.3.58, LBR20 before 2.6.3.50, R7800 before 1.0.2.80, R8900 before 1.0.5.26, R9000 before 1.0.5.26, RBS50Y before 2.7.3.22, WNR2000v5 before 1.0.0.76, XR700 before 1.0.1.36, EX6150v2 before 1.0.1.98, EX7300 before 1.0.2.158, EX7320 before 1.0.0.134, RAX10 before 1.0.2.88, RAX120 before 1.2.0.16, RAX70 before 1.0.2.88, EX6100v2 before 1.0.1.98, EX6400 before 1.0.2.158, EX7300v2 before 1.0.0.134, R6700AX before 1.0.2.88, RAX120v2 before 1.2.0.16, RAX78 before 1.0.2.88, EX6410 before 1.0.0.134, RBR10 before 2.7.3.22, RBR20 before 2.7.3.22, RBR350 before 4.3.4.7, RBR40 before 2.7.3.22, RBR50 before 2.7.3.22, EX6420 before 1.0.0.134, RBS10 before 2.7.3.22, RBS20 before 2.7.3.22, RBS350 before 4.3.4.7, RBS40 before 2.7.3.22, RBS50 before 2.7.3.22, EX6400v2 before 1.0.0.134, RBK12 before 2.7.3.22, RBK20 before 2.7.3.22, RBK352 before 4.3.4.7, RBK40 before 2.7.3.22, and RBK50 before 2.7.3.22. | 2021-12-26 | not yet calculated | CVE-2021-45619 MISC |
netgear — ex7000_firmware | Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects EX7000 before 1.0.1.80, R6400 before 1.0.1.50, R6400v2 before 1.0.4.118, R6700 before 1.0.2.8, R6700v3 before 1.0.4.118, R6900 before 1.0.2.8, R6900P before 1.3.2.124, R7000 before 1.0.9.88, R7000P before 1.3.2.124, R7900 before 1.0.3.18, R7900P before 1.4.1.50, R8000 before 1.0.4.46, R8000P before 1.4.1.50, RAX80 before 1.0.1.56, and WNR3500Lv2 before 1.2.0.62. | 2021-12-26 | not yet calculated | CVE-2021-45525 MISC |
netgear — ex7500_firmware |
Certain NETGEAR devices are affected by denial of service. This affects EX7500 before 1.0.0.72, RBS40V before 2.6.1.4, RBW30 before 2.6.1.4, RBRE960 before 6.0.3.68, RBSE960 before 6.0.3.68, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, RBS850 before 3.2.17.12, RBK752 before 3.2.17.12, and RBK852 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45515 MISC |
netgear — gc108p_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects GC108P before 1.0.8.2, GC108PP before 1.0.8.2, GS108Tv3 before 7.0.7.2, GS110TPv3 before 7.0.7.2, GS110TPP before 7.0.7.2, GS110TUP before 1.0.5.3, GS710TUP before 1.0.5.3, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS710TUP before 1.0.5.3, GS716TP before 1.0.4.2, GS716TPP before 1.0.4.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS724TPP before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS752TPv2 before 6.0.8.2, GS752TPP before 6.0.8.2, GS750E before 1.0.1.10, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. | 2021-12-26 | not yet calculated | CVE-2021-45557 MISC |
netgear — genie_installer |
All known versions of the Netgear Genie Installer for macOS contain a local privilege escalation vulnerability. The installer of the macOS version of Netgear Genie handles certain files in an insecure way. A malicious actor who has local access to the endpoint on which the software is going to be installed may overwrite certain files to obtain privilege escalation to root. | 2021-12-30 | not yet calculated | CVE-2021-20172 MISC |
netgear — gs108tv2_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects GS108Tv2 before 5.4.2.36, GS110TPP before 7.0.7.2, GS110TPv2 before 5.4.2.36., GS110TPv3 before 7.0.7.2, GS308T before 1.0.3.2, GS310TP before 1.0.3.2, GS724TPP before 2.0.6.3, GS724TPv2 before 2.0.6.3, GS728TPPv2 before 6.0.8.2, GS728TPv2 before 6.0.8.2, GS752TPP before 6.0.8.2, GS752TPv2 before 6.0.8.2, MS510TXM before 1.0.4.2, and MS510TXUP before 1.0.4.2. | 2021-12-26 | not yet calculated | CVE-2021-45556 MISC |
netgear — gs108tv2_firmware | Certain NETGEAR devices are affected by stored XSS. This affects GS108Tv2 before 5.4.2.36 and GS110TPv2 before 5.4.2.36. | 2021-12-26 | not yet calculated | CVE-2021-45677 MISC |
netgear — lax20_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects LAX20 before 1.1.6.28, MK62 before 1.1.6.122, MR60 before 1.1.6.122, MS60 before 1.1.6.122, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.116, R7000P before 1.3.3.140, R7850 before 1.0.5.68, R7900 before 1.0.4.38, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX35v2 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX43 before 1.0.3.96, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RS400 before 1.5.1.80, and XR1000 before 1.0.0.58. | 2021-12-26 | not yet calculated | CVE-2021-45549 MISC |
netgear — lbr20_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects LBR20 before 2.6.3.50, RBS50Y before 2.7.3.22, RBR10 before 2.7.3.22, RBR20 before 2.7.3.22, RBR40 before 2.7.3.22, RBR50 before 2.7.3.22, RBS10 before 2.7.3.22, RBS20 before 2.7.3.22, RBS40 before 2.7.3.22, RBS50 before 2.7.3.22, RBK12 before 2.7.3.22, RBK20 before 2.7.3.22, RBK40 before 2.7.3.22, and RBK50 before 2.7.3.22. | 2021-12-26 | not yet calculated | CVE-2021-45595 MISC |
netgear — mediatek |
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. | 2021-12-26 | not yet calculated | CVE-2021-32469 MISC |
netgear — mediatek |
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. | 2021-12-26 | not yet calculated | CVE-2021-32468 MISC |
netgear — mediatek |
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. | 2021-12-26 | not yet calculated | CVE-2021-32467 MISC |
netgear — mediatek_microchips | MediaTek microchips, as used in NETGEAR devices through 2021-12-13 and other devices, mishandle attempts at Wi-Fi authentication flooding. | 2021-12-26 | not yet calculated | CVE-2021-41788 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37571 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37570 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. | 2021-12-26 | not yet calculated | CVE-2021-37584 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37566 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. | 2021-12-26 | not yet calculated | CVE-2021-37563 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. | 2021-12-26 | not yet calculated | CVE-2021-37562 MISC |
netgear — multiple_devices |
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37565 MISC |
netgear — multiple_devices |
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37572 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. | 2021-12-26 | not yet calculated | CVE-2021-37561 MISC |
netgear — multiple_devices |
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. | 2021-12-26 | not yet calculated | CVE-2021-35055 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37569 MISC |
netgear — multiple_devices |
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37583 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37568 MISC |
netgear — multiple_devices |
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37564 MISC |
netgear — multiple_devices | MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. | 2021-12-26 | not yet calculated | CVE-2021-37560 MISC |
netgear — multiple_devices |
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. | 2021-12-26 | not yet calculated | CVE-2021-37567 MISC |
netgear — nighthawk | Netgear Nighthawk R6700 version 1.0.4.120 makes use of a hardcoded credential. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted/obfuscated. By extracting the configuration using readily available public tools, a user can reconfigure settings not intended to be manipulated, repackage the configuration, and restore a backup causing these settings to be changed. | 2021-12-30 | not yet calculated | CVE-2021-45732 MISC |
netgear — nighthawk_r6700 | Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the web interface. By default, all communication to/from the device’s web interface is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext. | 2021-12-30 | not yet calculated | CVE-2021-20174 MISC |
netgear — nighthawk_r6700 | Netgear Nighthawk R6700 version 1.0.4.120 does not utilize secure communication methods to the SOAP interface. By default, all communication to/from the device’s SOAP Interface (port 5000) is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext | 2021-12-30 | not yet calculated | CVE-2021-20175 MISC |
netgear — nighthawk_r6700 | Netgear Nighthawk R6700 version 1.0.4.120 does not have sufficient protections for the UART console. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection and execute commands as the root user without authentication. | 2021-12-30 | not yet calculated | CVE-2021-23147 MISC |
netgear — nighthawk_r6700 | Netgear Nighthawk R6700 version 1.0.4.120 stores sensitive information in plaintext. All usernames and passwords for the device’s associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device. | 2021-12-30 | not yet calculated | CVE-2021-45077 MISC |
netgear — nighthawk_r6700 | Netgear Nighthawk R6700 version 1.0.4.120 contains a command injection vulnerability in update functionality of the device. By triggering a system update check via the SOAP interface, the device is susceptible to command injection via preconfigured values. | 2021-12-30 | not yet calculated | CVE-2021-20173 MISC |
netgear — r6120_firmware | Certain NETGEAR devices are affected by stored XSS. This affects R6120 before 1.0.0.76, R6260 before 1.1.0.78, R6850 before 1.1.0.78, R6350 before 1.1.0.78, R6330 before 1.1.0.78, R6800 before 1.2.0.76, R6700v2 before 1.2.0.76, R6900v2 before 1.2.0.76, R7200 before 1.2.0.76, R7350 before 1.2.0.76, R7400 before 1.2.0.76, R7450 before 1.2.0.76, AC2100 before 1.2.0.76, AC2400 before 1.2.0.76, and AC2600 before 1.2.0.76. | 2021-12-26 | not yet calculated | CVE-2021-45675 MISC |
netgear — r6260_firmware | Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects R6260 before 1.1.0.76, R6800 before 1.2.0.62, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, and AC2600 before 1.2.0.62. | 2021-12-26 | not yet calculated | CVE-2021-45573 MISC |
netgear — r6260_firmware | Certain NETGEAR devices are affected by a stack-based buffer overflow by an unauthenticated attacker. This affects R6260 before 1.1.0.76, R6800 before 1.2.0.62, R6700v2 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, and AC2600 before 1.2.0.62. | 2021-12-26 | not yet calculated | CVE-2021-45637 MISC |
netgear — r6300v2_firmware | Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects R6300v2 before 1.0.4.52, R6400 before 1.0.1.52, R6900 before 1.0.2.8, R7000 before 1.0.9.88, R7900 before 1.0.3.18, R8000 before 1.0.4.46, R7900P before 1.4.1.50, R8000P before 1.4.1.50, RAX75 before 1.0.3.88, RAX80 before 1.0.3.88, and WNR3500Lv2 before 1.2.0.62. | 2021-12-26 | not yet calculated | CVE-2021-45528 MISC |
netgear — r6400_firmware | Certain NETGEAR devices are affected by denial of service. This affects R6400 before 1.0.1.70, R7000 before 1.0.11.126, R6900P before 1.3.3.140, R7000P before 1.3.3.140, R8000 before 1.0.4.74, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. | 2021-12-26 | not yet calculated | CVE-2021-45516 MISC |
netgear — r6400_firmware | NETGEAR R6400 devices before 1.0.1.70 are affected by server-side injection. | 2021-12-26 | not yet calculated | CVE-2021-45655 MISC |
netgear — r6400_firmware |
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6400 before 1.0.1.70, R7000 before 1.0.11.126, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RS400 before 1.5.1.80, R6400v2 before 1.0.4.118, R7000P before 1.3.3.140, RAX80 before 1.0.4.120, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, and RAX75 before 1.0.4.120. | 2021-12-26 | not yet calculated | CVE-2021-45606 MISC |
netgear — r6400_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6400 before 1.0.1.74, R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R7000 before 1.0.11.126, R6900P before 1.3.3.140, R7000P before 1.3.3.140, and R8000 before 1.0.4.74. | 2021-12-26 | not yet calculated | CVE-2021-45554 MISC |
netgear — r6400_firmware | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6400 before 1.0.1.68, R7000 before 1.0.11.116, R6900P before 1.3.3.140, R7000P before 1.3.3.140, R7900 before 1.0.4.38, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, and XR300 before 1.0.3.50. | 2021-12-26 | not yet calculated | CVE-2021-45605 MISC |
netgear — r6400v2_firmware | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, R7000 before 1.0.11.126, R7000P before 1.3.3.140, RAX200 before 1.0.5.126, RAX75 before 1.0.5.126, and RAX80 before 1.0.5.126. | 2021-12-26 | not yet calculated | CVE-2021-45607 MISC |
netgear — r6400v2_firmware | Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects R6400v2 before 1.0.4.118, R6700v3 before 1.0.4.118, and XR1000 before 1.0.0.58. | 2021-12-26 | not yet calculated | CVE-2021-45643 MISC |
netgear — r6400v2_firmware | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R6400v2 before 1.0.4.84, R6700v3 before 1.0.4.84, R7000 before 1.0.11.126, R6900P before 1.3.2.126, and R7000P before 1.3.2.126. | 2021-12-26 | not yet calculated | CVE-2021-45649 MISC |
netgear — r6700v2_firmware | NETGEAR R6700v2 devices before 1.2.0.88 are affected by authentication bypass. | 2021-12-26 | not yet calculated | CVE-2021-45498 MISC |
netgear — r6900p_firmware |
Certain NETGEAR devices are affected by privilege escalation. This affects R6900P before 1.3.3.140, R7000 before 1.0.11.126, R7000P before 1.3.3.140, and RS400 before 1.5.1.80. | 2021-12-26 | not yet calculated | CVE-2021-45679 MISC |
netgear — r6900p_firmware |
Certain NETGEAR devices are affected by authentication bypass. This affects R6900P before 1.3.3.140, R7000P before 1.3.3.140, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000P before 1.4.2.84, RAX75 before 1.0.3.106, and RAX80 before 1.0.3.106. | 2021-12-26 | not yet calculated | CVE-2021-45499 MISC |
netgear — r7000_firmware | Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects R7000 before 1.0.11.126, R7960P before 1.4.2.84, R8000 before 1.0.4.74, RAX200 before 1.0.4.120, R8000P before 1.4.2.84, RAX20 before 1.0.2.82, RAX45 before 1.0.2.82, RAX80 before 1.0.4.120, R7900P before 1.4.2.84, RAX15 before 1.0.2.82, RAX50 before 1.0.2.82, and RAX75 before 1.0.4.120. | 2021-12-26 | not yet calculated | CVE-2021-45530 MISC |
netgear — r7000_firmware | NETGEAR R7000 devices before 1.0.11.116 are affected by disclosure of sensitive information. | 2021-12-26 | not yet calculated | CVE-2021-45646 MISC |
netgear — r7000_firmware | NETGEAR R7000 devices before 1.0.9.88 are affected by stored XSS. | 2021-12-26 | not yet calculated | CVE-2021-45662 MISC |
netgear — r7000_firmware | NETGEAR R7000 devices before 1.0.9.42 are affected by a buffer overflow by an authenticated user. | 2021-12-26 | not yet calculated | CVE-2021-45523 MISC |
netgear — r7000_firmware | NETGEAR R7000 devices before 1.0.11.126 are affected by stored XSS. | 2021-12-26 | not yet calculated | CVE-2021-45664 MISC |
netgear — r7000_firmware | NETGEAR R7000 devices before 1.0.11.126 are affected by stored XSS. | 2021-12-26 | not yet calculated | CVE-2021-45663 MISC |
netgear — r7000_firmware |
Certain NETGEAR devices are affected by stored XSS. This affects R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RAX15 before 1.0.2.82, RAX20 before 1.0.2.82, RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, and RAX80 before 1.0.3.106. | 2021-12-26 | not yet calculated | CVE-2021-45674 MISC |
netgear — r7000_firmware |
Certain NETGEAR devices are affected by stored XSS. This affects R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RAX200 before 1.0.3.106, R7000P before 1.3.3.140, RAX80 before 1.0.3.106, R6900P before 1.3.3.140, and RAX75 before 1.0.3.106. | 2021-12-26 | not yet calculated | CVE-2021-45673 MISC |
netgear — r7000_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7000 before 1.0.11.126, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.3.106, MR60 before 1.0.6.110, RAX45 before 1.0.2.66, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX50 before 1.0.2.66, and RAX75 before 1.0.3.106. | 2021-12-26 | not yet calculated | CVE-2021-45540 MISC |
netgear — r7000_firmware | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R7000 before 1.0.11.110, R7900 before 1.0.4.30, R8000 before 1.0.4.62, RS400 before 1.5.1.80, R6400v2 before 1.0.4.102, R7000P before 1.3.2.126, R6700v3 before 1.0.4.102, and R6900P before 1.3.2.126. | 2021-12-26 | not yet calculated | CVE-2021-45650 MISC |
netgear — r7000p_firmware | Certain NETGEAR devices are affected by authentication bypass. This affects R7000P before 1.3.3.140 and R8000 before 1.0.4.68. | 2021-12-26 | not yet calculated | CVE-2021-45500 MISC |
netgear — r7800_firmware | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects R7800 before 1.0.2.74, R9000 before 1.0.5.2, and XR500 before 2.3.2.66. | 2021-12-26 | not yet calculated | CVE-2021-45623 MISC |
netgear — r7850_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7850 before 1.0.5.74, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45544 MISC |
netgear — r7850_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7850 before 1.0.5.74, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45546 MISC |
netgear — r7850_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7850 before 1.0.5.74, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45545 MISC |
netgear — r7850_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7850 before 1.0.5.74, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBK852 before 3.2.17.12, RBR750 before 3.2.17.12, RBR850 before 3.2.17.12, RBS750 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45547 MISC |
netgear — r7900_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7900 before 1.0.4.38, R7900P before 1.4.2.84, R8000 before 1.0.4.68, R8000P before 1.4.2.84, RAX200 before 1.0.3.106, MR60 before 1.0.6.110, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45541 MISC |
netgear — r7900p_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.28, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.28, and RAX75 before 1.0.3.106. | 2021-12-26 | not yet calculated | CVE-2021-45539 MISC |
netgear — r7900p_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7900P before 1.4.2.84, R7960P before 1.4.2.84, and R8000P before 1.4.2.84. | 2021-12-26 | not yet calculated | CVE-2021-45555 MISC |
netgear — r8000_firmware | NETGEAR R8000 devices before 1.0.4.62 are affected by a buffer overflow by an authenticated user. | 2021-12-26 | not yet calculated | CVE-2021-45524 MISC |
netgear — r8000_firmware | NETGEAR R8000 devices before 1.0.4.76 are affected by command injection by an authenticated user. | 2021-12-26 | not yet calculated | CVE-2021-45532 MISC |
netgear — r8000_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R8000 before 1.0.4.74, RAX200 before 1.0.4.120, R8000P before 1.4.2.84, R7900P before 1.4.2.84, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and RBK852 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45543 MISC |
netgear — rax200_firmware | NETGEAR RAX200 devices before 1.0.5.132 are affected by insecure code. | 2021-12-26 | not yet calculated | CVE-2021-45678 MISC |
netgear — rax200_firmware | Certain NETGEAR devices are affected by stored XSS. This affects RAX200 before 1.0.5.126, RAX20 before 1.0.2.82, RAX80 before 1.0.5.126, RAX15 before 1.0.2.82, and RAX75 before 1.0.5.126. | 2021-12-26 | not yet calculated | CVE-2021-45676 MISC |
netgear — rax200_firmware | Certain NETGEAR devices are affected by stored XSS. This affects RAX200 before 1.0.3.106, MR60 before 1.0.6.110, RAX20 before 1.0.2.82, RAX45 before 1.0.2.72, RAX80 before 1.0.3.106, MS60 before 1.0.6.110, RAX15 before 1.0.2.82, RAX50 before 1.0.2.72, RAX75 before 1.0.3.106, RBR750 before 3.2.16.6, RBR850 before 3.2.16.6, RBS750 before 3.2.16.6, RBS850 before 3.2.16.6, RBK752 before 3.2.16.6, and RBK852 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45669 MISC |
netgear — rax200_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user . This affects RAX200 before 1.0.3.106, RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45537 MISC |
netgear — rax200_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | 2021-12-26 | not yet calculated | CVE-2021-45542 MISC |
netgear — rax200_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX200 before 1.0.3.106, RAX80 before 1.0.3.106, RAX75 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45535 MISC |
netgear — rax35_firmware | Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects RAX35 before 1.0.4.102, RAX38 before 1.0.4.102, and RAX40 before 1.0.4.102. | 2021-12-26 | not yet calculated | CVE-2021-45493 MISC |
netgear — rax43_firmware | Netgear RAX43 version 1.0.3.96 contains a command injection vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter. | 2021-12-30 | not yet calculated | CVE-2021-20167 MISC |
netgear — rax43_firmware | Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin. | 2021-12-30 | not yet calculated | CVE-2021-20168 MISC |
netgear — rax43_firmware | Netgear RAX43 version 1.0.3.96 does not utilize secure communications to the web interface. By default, all communication to/from the device is sent via HTTP, which causes potentially sensitive information (such as usernames and passwords) to be transmitted in cleartext. | 2021-12-30 | not yet calculated | CVE-2021-20169 MISC |
netgear — rax43_firmware | Netgear RAX43 version 1.0.3.96 makes use of hardcoded credentials. It does not appear that normal users are intended to be able to manipulate configuration backups due to the fact that they are encrypted. This encryption is accomplished via a password-protected zip file with a hardcoded password (RAX50w!a4udk). By unzipping the configuration using this password, a user can reconfigure settings not intended to be manipulated, re-zip the configuration, and restore a backup causing these settings to be changed. | 2021-12-30 | not yet calculated | CVE-2021-20170 MISC |
netgear — rax43_firmware | Netgear RAX43 version 1.0.3.96 stores sensitive information in plaintext. All usernames and passwords for the device’s associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device. | 2021-12-30 | not yet calculated | CVE-2021-20171 MISC |
netgear — rax43_firmware | Netgear RAX43 version 1.0.3.96 contains a buffer overrun vulnerability. The URL parsing functionality in the cgi-bin endpoint of the router containers a buffer overrun issue that can redirection control flow of the applicaiton. | 2021-12-30 | not yet calculated | CVE-2021-20166 MISC |
netgear — rax75_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45538 MISC |
netgear — rax75_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX75 before 1.0.3.106, RAX80 before 1.0.3.106, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45536 MISC |
netgear — rbk20_firmware | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK20 before 2.6.1.36, RBR20 before 2.6.1.36, RBS20 before 2.6.1.38, RBK40 before 2.6.1.36, RBR40 before 2.6.1.36, RBS40 before 2.6.1.38, RBK50 before 2.6.1.40, RBR50 before 2.6.1.40, RBS50 before 2.6.1.40, and RBS50Y before 2.6.1.40. | 2021-12-26 | not yet calculated | CVE-2021-45626 MISC |
netgear — rbk352_firmware | Certain NETGEAR devices are affected by a hardcoded password. This affects RBK352 before 4.4.0.10, RBR350 before 4.4.0.10, and RBS350 before 4.4.0.10. | 2021-12-26 | not yet calculated | CVE-2021-45521 MISC |
netgear — rbk352_firmware | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects RBK352 before 4.4.0.10, RBR350 before 4.4.0.10, and RBS350 before 4.4.0.10. | 2021-12-26 | not yet calculated | CVE-2021-45653 MISC |
netgear — rbk352_firmware | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects RBK352 before 4.4.0.10, RBR350 before 4.4.0.10, and RBS350 before 4.4.0.10. | 2021-12-26 | not yet calculated | CVE-2021-45652 MISC |
netgear — rbk352_firmware | Certain NETGEAR devices are affected by an attacker’s ability to read arbitrary files. This affects RBK352 before 4.4.0.10, RBR350 before 4.4.0.10, and RBS350 before 4.4.0.10. | 2021-12-26 | not yet calculated | CVE-2021-45494 MISC |
netgear — rbk352_firmware | Certain NETGEAR devices are affected by a hardcoded password. This affects RBK352 before 4.4.0.10, RBR350 before 4.4.0.10, and RBS350 before 4.4.0.10. | 2021-12-26 | not yet calculated | CVE-2021-45520 MISC |
netgear — rbk40_firmware | Certain NETGEAR devices are affected by server-side injection. This affects RBK40 before 2.5.1.16, RBR40 before 2.5.1.16, RBS40 before 2.5.1.16, RBK20 before 2.5.1.16, RBR20 before 2.5.1.16, RBS20 before 2.5.1.16, RBK50 before 2.5.1.16, RBR50 before 2.5.1.16, RBS50 before 2.5.1.16, and RBS50Y before 2.6.1.40. | 2021-12-26 | not yet calculated | CVE-2021-45660 MISC |
netgear — rbk40_firmware | Certain NETGEAR devices are affected by server-side injection. This affects RBK40 before 2.5.1.16, RBR40 before 2.5.1.16, RBS40 before 2.5.1.16, RBK20 before 2.5.1.16, RBR20 before 2.5.1.16, RBS20 before 2.5.1.16, RBK50 before 2.5.1.16, RBR50 before 2.5.1.16, RBS50 before 2.5.1.16, and RBS50Y before 2.6.1.40. | 2021-12-26 | not yet calculated | CVE-2021-45659 MISC |
netgear — rbk40_firmware | Certain NETGEAR devices are affected by server-side injection. This affects RBK40 before 2.5.1.16, RBR40 before 2.5.1.16, RBS40 before 2.5.1.16, RBK20 before 2.5.1.16, RBR20 before 2.5.1.16, RBS20 before 2.5.1.16, RBK50 before 2.5.1.16, RBR50 before 2.5.1.16, RBS50 before 2.5.1.16, and RBS50Y before 2.6.1.40. | 2021-12-26 | not yet calculated | CVE-2021-45661 MISC |
netgear — rbk50_firmware | Certain NETGEAR devices are affected by disclosure of sensitive information. This affects RBK50 before 2.7.3.22, RBR50 before 2.7.3.22, and RBS50 before 2.7.3.22. | 2021-12-26 | not yet calculated | CVE-2021-45651 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45569 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45588 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45574 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45570 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7000 before 1.0.11.126, R6900P before 1.3.2.126, and R7000P before 1.3.2.126. | 2021-12-26 | not yet calculated | CVE-2021-45553 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45562 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45561 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45559 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45571 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45568 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45590 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45589 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45591 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45587 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45576 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45585 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45583 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45582 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45575 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45581 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45580 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45586 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45579 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45578 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45577 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45566 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45560 MISC |
netgear — rbk752_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45565 MISC |
netgear — rbk752_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45564 MISC |
netgear — rbk752_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45563 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45572 MISC |
netgear — rbk752_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45592 MISC |
netgear — rbk752_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45567 MISC |
netgear — rbk752_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. | 2021-12-26 | not yet calculated | CVE-2021-45558 MISC |
netgear — rbr20_firmware |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBR20 before 2.7.3.22, RBR40 before 2.7.3.22, RBR50 before 2.7.2.102, RBS20 before 2.7.3.22, RBS40 before 2.7.3.22, RBR50 before 2.7.2.102, RBK20 before 2.7.3.22, RBK40 before 2.7.3.22, and RBK50 before 2.7.2.102. | 2021-12-26 | not yet calculated | CVE-2021-45593 MISC |
netgear — rbs50y_firmware | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBS50Y before 2.7.3.22, RBR20 before 2.7.3.22, RBR40 before 2.7.3.22, RBR50 before 2.7.3.22, RBS20 before 2.7.3.22, RBS40 before 2.7.3.22, RBS50 before 2.7.3.22, RBK20 before 2.7.3.22, RBK40 before 2.7.3.22, and RBK50 before 2.7.3.22. | 2021-12-26 | not yet calculated | CVE-2021-45594 MISC |
netgear — rbs50y_firmware |
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects RBS50Y before 2.7.0.122, SRK60 before 2.7.0.122, SRR60 before 2.7.0.122, SRS60 before 2.7.0.122, SXK30 before 3.2.33.108, SXR30 before 3.2.33.108, SXS30 before 3.2.33.108, and SRC60 before 2.7.0.122. | 2021-12-26 | not yet calculated | CVE-2021-45645 MISC |
netgear — xr1000_firmware | NETGEAR XR1000 devices before 1.0.0.58 are affected by denial of service. | 2021-12-26 | not yet calculated | CVE-2021-45519 MISC |
netgear — xr1000_firmware | NETGEAR XR1000 devices before 1.0.0.58 are affected by command injection by an unauthenticated attacker. | 2021-12-26 | not yet calculated | CVE-2021-45513 MISC |
netgear — xr1000_firmware | NETGEAR XR1000 devices before 1.0.0.58 are affected by disclosure of sensitive information. | 2021-12-26 | not yet calculated | CVE-2021-45654 MISC |
netgear — xr1000_firmware | NETGEAR XR1000 devices before 1.0.0.58 are affected by denial of service. | 2021-12-26 | not yet calculated | CVE-2021-45518 MISC |
netgear — xr1000_firmware | NETGEAR XR1000 devices before 1.0.0.58 are affected by authentication bypass. | 2021-12-26 | not yet calculated | CVE-2021-45510 MISC |
netgear — xr1000_firmware | NETGEAR XR1000 devices before 1.0.0.58 are affected by denial of service. | 2021-12-26 | not yet calculated | CVE-2021-45517 MISC |
netgear — xr1000_firmware | NETGEAR XR1000 devices before 1.0.0.58 are affected by command injection by an unauthenticated attacker. | 2021-12-26 | not yet calculated | CVE-2021-45514 MISC |
netgear — xr1000_firmware   |
NETGEAR XR1000 devices before 1.0.0.58 are affected by a hardcoded password. | 2021-12-26 | not yet calculated | CVE-2021-45522 MISC |
netgear — xr300_firmware | Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects XR300 before 1.0.3.68, R7000P before 1.3.3.140, and R6900P before 1.3.3.140. | 2021-12-26 | not yet calculated | CVE-2021-45625 MISC |
netgen — tags_bundle |
Netgen Tags Bundle 3.4.x before 3.4.11 and 4.0.x before 4.0.15 allows XSS in the Tags Admin interface. | 2021-12-27 | not yet calculated | CVE-2021-45895 MISC MISC |
nettmp — nettmp | Nettmp NNT 5.1 is affected by a SQL injection vulnerability. An attacker can bypass authentication and access the panel with an administrative account. | 2021-12-28 | not yet calculated | CVE-2021-45814 MISC MISC |
nokia — fastmile | Nokia FastMile 3TG00118ABAD52 devices allow privilege escalation by an authenticated user via is_ctc_admin=1 to login_web_app.cgi and use of Import Config File. | 2021-12-27 | not yet calculated | CVE-2021-45896 MISC MISC |
nuuo — network_video_recorder | NUUO Network Video Recorder NVRsolo 3.9.1 is affected by a Cross Site Scripting (XSS) vulnerability. An attacker can steal the user’s session by injecting malicious JavaScript codes which leads to session hijacking. | 2021-12-28 | not yet calculated | CVE-2021-45812 MISC |
open_asset — import_library |
Open Asset Import Library (aka assimp) 5.1.0 and 5.1.1 has a heap-based buffer overflow in _m3d_safestr (called from m3d_load and Assimp::M3DWrapper::M3DWrapper). | 2022-01-01 | not yet calculated | CVE-2021-45948 MISC MISC |
openexr — openexr |
OpenEXR 3.1.0 through 3.1.3 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). | 2022-01-01 | not yet calculated | CVE-2021-45942 MISC MISC MISC |
openwrt — openwrt | OpenWrt 21.02.1 allows XSS via the Traffic Rules Name screen. | 2021-12-27 | not yet calculated | CVE-2021-45905 MISC |
openwrt — openwrt | OpenWrt 21.02.1 allows XSS via the Port Forwards Add Name screen. | 2021-12-27 | not yet calculated | CVE-2021-45904 MISC |
openwrt — openwrt | OpenWrt 21.02.1 allows XSS via the NAT Rules Name screen. | 2021-12-27 | not yet calculated | CVE-2021-45906 MISC |
oppo — oppo | ColorOS pregrant dangerous permissions to apps which are listed in a whitelist xml named default-grant-permissions.But some apps in whitelist is not installed, attacker can disguise app with the same package name to obtain dangerous permission. | 2021-12-27 | not yet calculated | CVE-2021-23244 MISC |
parse-link-header — parse-link-header |
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function. | 2021-12-24 | not yet calculated | CVE-2021-23490 CONFIRM CONFIRM CONFIRM |
philips — patient_information_center_ix |
Patient Information Center iX (PIC iX) Versions C.02 and C.03 receives input or data, but does not validate or incorrectly validates that the input has the properties required to process the data safely and correctly. | 2021-12-27 | not yet calculated | CVE-2021-43548 MISC |
philips — patient_information_center_ix |
The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information, which affects the communications between Patient Information Center iX (PIC iX) Versions C.02 and C.03 and Efficia CM Series Revisions A.01 to C.0x and 4.0. | 2021-12-27 | not yet calculated | CVE-2021-43550 MISC |
philips — patient_information_center_ix |
The use of a hard-coded cryptographic key significantly increases the possibility encrypted data may be recovered from the Patient Information Center iX (PIC iX) Versions B.02, C.02, and C.03. | 2021-12-27 | not yet calculated | CVE-2021-43552 MISC |
pjsip — pjsip |
PJSIP is a free and open source multimedia communication library. In version 2.11.1 and prior, if incoming RTCP XR message contain block, the data field is not checked against the received packet size, potentially resulting in an out-of-bound read access. This affects all users that use PJMEDIA and RTCP XR. A malicious actor can send a RTCP XR message with an invalid packet size. | 2021-12-27 | not yet calculated | CVE-2021-43845 MISC CONFIRM MISC |
poly — poly_trio_8800 | A remote code execution issue in the ping command on Poly Trio 8800 5.7.1.4145 devices allows remote authenticated users to execute commands via unspecified vectors. | 2021-12-28 | not yet calculated | CVE-2018-17875 MISC MISC |
qibosoft — qibosoft |
A Cross-Site Request Forgery (CSRF) in /admin/index.php?lfj=member&action=editmember of Qibosoft v7 allows attackers to arbitrarily add administrator accounts. | 2021-12-27 | not yet calculated | CVE-2020-20945 MISC MISC |
qibosoft — qibosoft |
A Cross-Site Request Forgery (CSRF) in /member/post.php?job=postnew&step=post of Qibosoft v7 allows attackers to force victim users into arbitrarily publishing new articles via a crafted URL. | 2021-12-27 | not yet calculated | CVE-2020-20943 MISC |
qibosoft — qibosoft |
Qibosoft v7 contains a stored cross-site scripting (XSS) vulnerability in the component /admin/index.php?lfj=friendlink&action=add. | 2021-12-27 | not yet calculated | CVE-2020-20946 MISC MISC |
qibosoft — qibosoft |
An issue in /admin/index.php?lfj=mysql&action=del of Qibosoft v7 allows attackers to arbitrarily delete files. | 2021-12-27 | not yet calculated | CVE-2020-20944 MISC MISC |
qt_svg– qt_svg | Qt SVG in Qt 5.0.0 through 5.15.2 and 6.0.0 through 6.2.1 has an out-of-bounds write in QtPrivate::QCommonArrayOps<QPainterPath::Element>::growAppend (called from QPainterPath::addPath and QPathClipper::intersect). | 2022-01-01 | not yet calculated | CVE-2021-45930 MISC MISC MISC MISC MISC MISC |
quectel — uc20 | Quectel UC20 UMTS/HSPA+ UC20 6.3.14 is affected by a Cross Site Scripting (XSS) vulnerability. | 2021-12-30 | not yet calculated | CVE-2021-45815 MISC |
requarks — wiki.js | In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT tokens to the attacker’s server and will lead to account takeover when accessed by the victim. | 2021-12-29 | not yet calculated | CVE-2021-25993 MISC MISC |
requarks — wiki.js | Wiki.js is a wiki app built on Node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through non-image file uploads for file types that can be viewed directly inline in the browser. By creating a malicious file which can execute inline JS when viewed in the browser (e.g. XML files), a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the file is viewed directly by other users. The file must be opened directly by the user and will not trigger directly in a normal Wiki.js page. A patch in version 2.5.264 fixes this vulnerability by adding an optional (enabled by default) force download flag to all non-image file types, preventing the file from being viewed inline in the browser. As a workaround, disable file upload for all non-trusted users. — Thanks to @Haxatron for reporting this vulnerability. Initially reported via https://huntr.dev/bounties/266bff09-00d9-43ca-a4bb-bb540642811f/ | 2021-12-27 | not yet calculated | CVE-2021-43856 CONFIRM MISC MISC |
requarks — wiki.js | Wiki.js is a wiki app built on node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through a SVG file upload made via a custom request with a fake MIME type. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the SVG is viewed directly by other users. Scripts do not execute when loaded inside a page via normal `<img>` tags. The malicious SVG can only be uploaded by crafting a custom request to the server with a fake MIME type. A patch in version 2.5.264 fixes this vulnerability by adding an additional file extension verification check to the optional (enabled by default) SVG sanitization step to all file uploads that match the SVG mime type. As a workaround, disable file upload for all non-trusted users. | 2021-12-27 | not yet calculated | CVE-2021-43855 MISC CONFIRM MISC |
ruby — ruby |
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby. | 2022-01-01 | not yet calculated | CVE-2021-41819 MISC CONFIRM |
ruby — ruby |
Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1. | 2022-01-01 | not yet calculated | CVE-2021-41817 MISC CONFIRM |
rust — rust |
An issue was discovered in the binjs_io crate through 2021-01-03 for Rust. The Read method may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45683 MISC MISC |
rust — rust | An issue was discovered in the csv-sniffer crate through 2021-01-05 for Rust. preamble_skipcount may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45686 MISC MISC |
rust — rust |
An issue was discovered in the columnar crate through 2021-01-07 for Rust. ColumnarReadExt::read_typed_vec may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45685 MISC MISC |
rust — rust |
An issue was discovered in the flumedb crate through 2021-01-07 for Rust. read_entry may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45684 MISC MISC |
rust — rust | An issue was discovered in the vec-const crate before 2.0.0 for Rust. It tries to construct a Vec from a pointer to a const slice, leading to memory corruption. | 2021-12-27 | not yet calculated | CVE-2021-45680 MISC MISC |
rust — rust |
An issue was discovered in the nanorand crate before 0.6.1 for Rust. There can be multiple mutable references to the same object because the TlsWyRand Deref implementation dereferences a raw pointer. | 2021-12-27 | not yet calculated | CVE-2021-45705 MISC MISC |
rust — rust |
An issue was discovered in the bronzedb-protocol crate through 2021-01-03 for Rust. ReadKVExt may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45682 MISC MISC |
rust — rust |
An issue was discovered in the metrics-util crate before 0.7.0 for Rust. There is a data race and memory corruption because AtomicBucket<T> unconditionally implements the Send and Sync traits. | 2021-12-27 | not yet calculated | CVE-2021-45704 MISC MISC |
rust — rust |
An issue was discovered in the ckb crate before 0.40.0 for Rust. Remote attackers may be able to conduct a 51% attack against the Nervos CKB blockchain by triggering an inability to allocate memory for the misbehavior HashMap. | 2021-12-27 | not yet calculated | CVE-2021-45699 MISC MISC |
rust — rust |
An issue was discovered in the derive-com-impl crate before 0.1.2 for Rust. An invalid reference (and memory corruption) can occur because AddRef might not be called before returning a pointer. | 2021-12-27 | not yet calculated | CVE-2021-45681 MISC MISC |
rust — rust | An issue was discovered in the raw-cpuid crate before 9.1.1 for Rust. If the serialize feature is used (which is not the the default), a Deserialize operation may lack sufficient validation, leading to memory corruption or a panic. | 2021-12-27 | not yet calculated | CVE-2021-45687 MISC MISC |
rust — rust | An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45691 MISC MISC |
rust — rust | An issue was discovered in the gfx-auxil crate through 2021-01-07 for Rust. gfx_auxil::read_spirv may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45689 MISC MISC |
rust — rust |
An issue was discovered in the ckb crate before 0.40.0 for Rust. Attackers can cause a denial of service (Nervos CKB blockchain node crash) via a dead call that is used as a DepGroup. | 2021-12-27 | not yet calculated | CVE-2021-45700 MISC MISC |
rust — rust |
An issue was discovered in the abomonation crate through 2021-10-17 for Rust. Because transmute operations are insufficiently constrained, there can be an information leak or ASLR bypass. | 2021-12-27 | not yet calculated | CVE-2021-45708 MISC MISC |
rust — rust | An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_binary may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45690 MISC MISC |
rust — rust |
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_extension_others may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45692 MISC MISC |
rust — rust |
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string_primitive may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45693 MISC MISC |
rust — rust | An issue was discovered in the rdiff crate through 2021-02-03 for Rust. Window may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45694 MISC MISC |
rust — rust | An issue was discovered in the mopa crate through 2021-06-01 for Rust. It incorrectly relies on Trait memory layout, possibly leading to future occurrences of arbitrary code execution or ASLR bypass. | 2021-12-27 | not yet calculated | CVE-2021-45695 MISC MISC |
rust — rust |
An issue was discovered in the sha2 crate 0.9.7 before 0.9.8 for Rust. Hashes of long messages may be incorrect when the AVX2-accelerated backend is used. | 2021-12-27 | not yet calculated | CVE-2021-45696 MISC MISC |
rust — rust |
An issue was discovered in the molecule crate before 0.7.2 for Rust. A FixVec partial read has an incorrect result. | 2021-12-27 | not yet calculated | CVE-2021-45697 MISC MISC |
rust — rust |
An issue was discovered in the ckb crate before 0.40.0 for Rust. A get_block_template RPC call may fail in situations where it is supposed to select a Nervos CKB blockchain transaction with a higher fee rate than another transaction. | 2021-12-27 | not yet calculated | CVE-2021-45698 MISC MISC |
rust — rust |
An issue was discovered in the ash crate before 0.33.1 for Rust. util::read_spv may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45688 MISC MISC |
rust — rust |
An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. read_up_to may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2020-36513 MISC MISC |
rust — rust |
An issue was discovered in the zeroize_derive crate before 1.1.1 for Rust. Dropped memory is not zeroed out for an enum. | 2021-12-27 | not yet calculated | CVE-2021-45706 MISC MISC |
rust — rust |
An issue was discovered in the simple_asn1 crate 0.6.0 before 0.6.1 for Rust. There is a panic if UTCTime data, supplied by a remote attacker, has a second character greater than 0x7f. | 2021-12-27 | not yet calculated | CVE-2021-45711 MISC MISC |
rust — rust | An issue was discovered in the pnet crate before 0.27.2 for Rust. There is a segmentation fault (upon attempted dereference of an uninitialized descriptor) because of an erroneous IcmpTransportChannelIterator compiler optimization. | 2021-12-27 | not yet calculated | CVE-2019-25054 MISC MISC |
rust — rust | An issue was discovered in the buffoon crate through 2020-12-31 for Rust. InputStream::read_exact may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2020-36512 MISC MISC |
rust — rust |
An issue was discovered in the bite crate through 2020-12-31 for Rust. read::BiteReadExpandedExt::read_framed_max may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2020-36511 MISC MISC |
rust — rust |
An issue was discovered in the libpulse-binding crate before 2.6.0 for Rust. It mishandles a panic that crosses a Foreign Function Interface (FFI) boundary. | 2021-12-27 | not yet calculated | CVE-2019-25055 MISC MISC |
rust — rust |
An issue was discovered in the crypto2 crate through 2021-10-08 for Rust. During Chacha20 encryption and decryption, an unaligned read of a u32 may occur. | 2021-12-27 | not yet calculated | CVE-2021-45709 MISC MISC |
rust — rust |
An issue was discovered in the libpulse-binding crate before 1.2.1 for Rust. get_context can cause a use-after-free. | 2021-12-27 | not yet calculated | CVE-2018-25028 MISC MISC |
rust — rust |
An issue was discovered in the libpulse-binding crate before 1.2.1 for Rust. get_format_info can cause a use-after-free. | 2021-12-27 | not yet calculated | CVE-2018-25027 MISC MISC |
rust — rust |
An issue was discovered in the tokio crate before 1.8.4, and 1.9.x through 1.13.x before 1.13.1, for Rust. In certain circumstances involving a closed oneshot channel, there is a data race and memory corruption. | 2021-12-27 | not yet calculated | CVE-2021-45710 MISC MISC |
rust — rust | An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. fill_buf may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2020-36514 MISC MISC |
rust — rust | An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_window_function has a use-after-free. | 2021-12-26 | not yet calculated | CVE-2021-45715 MISC MISC |
rust — rust |
An issue was discovered in the nix crate before 0.20.2, 0.21.x before 0.21.2, and 0.22.x before 0.22.2 for Rust. unistd::getgrouplist has an out-of-bounds write if a user is in more than 16 /etc/groups groups. | 2021-12-27 | not yet calculated | CVE-2021-45707 MISC MISC |
rust — rust |
An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A merge operation may result in a use-after-free. | 2021-12-27 | not yet calculated | CVE-2021-45702 MISC MISC |
rust — rust | An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A patch operation may result in a use-after-free. | 2021-12-27 | not yet calculated | CVE-2021-45701 MISC MISC |
rust — rust | An issue was discovered in the lru crate before 0.7.1 for Rust. The iterators have a use-after-free, as demonstrated by an access after a pop operation. | 2021-12-26 | not yet calculated | CVE-2021-45720 MISC MISC |
rust — rust |
An issue was discovered in the tectonic_xdv crate before 0.1.12 for Rust. XdvParser::<T>::process may read from uninitialized memory locations. | 2021-12-27 | not yet calculated | CVE-2021-45703 MISC MISC |
rust — rust |
An issue was discovered in the rust-embed crate before 6.3.0 for Rust. A ../ directory traversal can sometimes occur in debug mode. | 2021-12-26 | not yet calculated | CVE-2021-45712 MISC MISC |
rust — rust |
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_scalar_function has a use-after-free. | 2021-12-26 | not yet calculated | CVE-2021-45713 MISC MISC |
rust — rust |
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_aggregate_function has a use-after-free. | 2021-12-26 | not yet calculated | CVE-2021-45714 MISC MISC |
rust — rust |
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_collation has a use-after-free. | 2021-12-26 | not yet calculated | CVE-2021-45716 MISC MISC |
rust — rust |
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. commit_hook has a use-after-free. | 2021-12-26 | not yet calculated | CVE-2021-45717 MISC MISC |
rust — rust |
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. rollback_hook has a use-after-free. | 2021-12-26 | not yet calculated | CVE-2021-45718 MISC MISC |
rust — rust |
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. update_hook has a use-after-free. | 2021-12-26 | not yet calculated | CVE-2021-45719 MISC MISC |
safari — montage |
Reflected Cross Site Scripting (XSS) in SAFARI Montage versions 8.3 and 8.5 allows remote attackers to execute JavaScript codes. | 2021-12-28 | not yet calculated | CVE-2021-45425 MISC MISC |
safari_montage — safari_montage | SAFARI Montage 8.7.32 is affected by a CRLF injection vulnerability which can lead to can lead to HTTP response splitting. | 2021-12-30 | not yet calculated | CVE-2021-45818 MISC |
servo — rust-smallvec | An issue was discovered in the smallvec crate before 0.6.13 for Rust. It can create an uninitialized value of any type, including a reference type. | 2021-12-27 | not yet calculated | CVE-2018-25023 MISC MISC |
showdoc — showdoc | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | 2021-12-26 | not yet calculated | CVE-2021-4168 CONFIRM MISC |
slican — webcti | SLICAN WebCTI 1.01 2015 is affected by a Cross Site Scripting (XSS) vulnerability. The attacker can steal the user’s session by injecting malicious JavaScript codes which leads to Session Hijacking and cause user’s credentials theft. | 2021-12-28 | not yet calculated | CVE-2021-45813 MISC |
snapdragon — qnap_devices |
A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions of Surveillance Station: QTS 5.0.0 (64 bit): Surveillance Station 5.2.0.4.2 ( 2021/10/26 ) and later QTS 5.0.0 (32 bit): Surveillance Station 5.2.0.3.2 ( 2021/10/26 ) and later QTS 4.3.6 (64 bit): Surveillance Station 5.1.5.4.6 ( 2021/10/26 ) and later QTS 4.3.6 (32 bit): Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later QTS 4.3.3: Surveillance Station 5.1.5.3.6 ( 2021/10/26 ) and later | 2021-12-29 | not yet calculated | CVE-2021-38687 CONFIRM |
snapdragon — qnap_devices |
A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Kazoo Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Kazoo Server: Kazoo Server 4.11.20 and later | 2021-12-29 | not yet calculated | CVE-2021-38680 CONFIRM |
solarwinds — web_help_desk | Hard coded credentials discovered in SolarWinds Web Help Desk product. Through these credentials, the attacker with local access to the Web Help Desk host machine allows to execute arbitrary HQL queries against the database and leverage the vulnerability to steal the password hashes of the users or insert arbitrary data into the database. | 2021-12-27 | not yet calculated | CVE-2021-35232 MISC MISC |
sourcecodester — online_enrollment_management_system |
https://www.sourcecodester.com/ Online Enrollment Management System in PHP and PayPal Free Source Code 1.0 is affected by: Incorrect Access Control. The impact is: gain privileges (remote). | 2021-12-28 | not yet calculated | CVE-2021-40579 MISC MISC |
stormshield — stormshield_network_security |
An issue was discovered in Stormshield Network Security (SNS) 4.2.2 through 4.2.7 (fixed in 4.2.8). Under a specific update-migration scenario, the first SSH password change does not properly clear the old password. | 2021-12-29 | not yet calculated | CVE-2021-45885 CONFIRM MISC |
suitecrm — suitecrm |
A persistent cross-site scripting (XSS) issue in the web interface of SuiteCRM before 7.10.35, and 7.11.x and 7.12.x before 7.12.2, allows a remote attacker to introduce arbitrary JavaScript via attachments upload, a different vulnerability than CVE-2021-39267 and CVE-2021-39268. | 2021-12-28 | not yet calculated | CVE-2021-45903 MISC MISC MISC |
superantispyware — superantispyware |
SUPERAntispyware v8.0.0.1050 was discovered to contain an issue in the component saskutil64.sys. This issue allows attackers to arbitrarily write data to the device via IOCTL 0x9C402140. | 2021-12-28 | not yet calculated | CVE-2020-22061 MISC |
tenable — d-link |
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the router (i.e., as the “admin” user, UID 0). | 2021-12-30 | not yet calculated | CVE-2021-20132 MISC |
tenable — d-link | Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the “message of the day” banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credentials, hardcoded plaintext passwords for other services, configuration files, and private keys can be disclosed in this fashion. Improper handling of filenames that identify virtual resources, such as “/dev/urandom” allows an attacker to effect a denial of service attack against the command line interfaces of the Quagga services (zebra and ripd). | 2021-12-30 | not yet calculated | CVE-2021-20133 MISC |
tenable — trendnet_ac2600 | It is possible for an unauthenticated, malicious user to force the device to reboot due to a hidden administrative command. | 2021-12-30 | not yet calculated | CVE-2021-20157 MISC |
tenable — trendnet_ac2600 | Trendnet AC2600 TEW-827DRU version 2.08B01 lacks proper authentication to the bittorrent functionality. If enabled, anyone is able to visit and modify settings and files via the Bittorent web client by visiting: http://192.168.10.1:9091/transmission/web/ | 2021-12-30 | not yet calculated | CVE-2021-20152 MISC |
tenable — trendnet_ac2600 | Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses information via redirection from the setup wizard. Authentication can be bypassed and a user may view information as Admin by manually browsing to the setup wizard and forcing it to redirect to the desired page. | 2021-12-30 | not yet calculated | CVE-2021-20150 MISC |
tenable — trendnet_ac2600 | Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient access controls for the WAN interface. The default iptables ruleset for governing access to services on the device only apply to IPv4. All services running on the devices are accessible via the WAN interface via IPv6 by default. | 2021-12-30 | not yet calculated | CVE-2021-20149 MISC |
tenable — trendnet_ac2600 | Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router’s filesystem as the log file used by either Quagga service (zebra or ripd). Subsequent log messages will be appended to the file, prefixed by a timestamp and some logging metadata. Remote code execution can be achieved by using this vulnerability to append to a shell script on the router’s filesystem, and then awaiting or triggering the execution of that script. A remote, unauthenticated root shell can easily be obtained on the device in this fashion. | 2021-12-30 | not yet calculated | CVE-2021-20134 MISC |
tenable — trendnet_ac2600 | Trendnet AC2600 TEW-827DRU version 2.08B01 does not properly implement csrf protections. Most pages lack proper usage of CSRF protections or mitigations. Additionally, pages that do make use of CSRF tokens are trivially bypassable as the server does not appear to validate them properly (i.e. re-using an old token or finding the token thru some other method is possible). | 2021-12-30 | not yet calculated | CVE-2021-20165 MISC |
tenable — trendnet_ac2600 | Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses credentials for the smb functionality of the device. Usernames and passwords for all smb users are revealed in plaintext on the smbserver.asp page. | 2021-12-30 | not yet calculated | CVE-2021-20164 MISC |
tenable — trendnet_ac2600 | Trendnet AC2600 TEW-827DRU version 2.08B01 leaks information via the ftp web page. Usernames and passwords for all ftp users are revealed in plaintext on the ftpserver.asp page. | 2021-12-30 | not yet calculated | CVE-2021-20163 MISC |
tenable — trendnet_ac2600 |
Trendnet AC2600 TEW-827DRU version 2.08B01 contains an improper access control configuration that could allow for a malicious firmware update. It is possible to manually install firmware that may be malicious in nature as there does not appear to be any signature validation done to determine if it is from a known and trusted source. This includes firmware updates that are done via the automated “check for updates” in the admin interface. If an attacker is able to masquerade as the update server, the device will not verify that the firmware updates downloaded are legitimate. | 2021-12-30 | not yet calculated | CVE-2021-20156 MISC |
tenable — trendnet_ac2600 |
Trendnet AC2600 TEW-827DRU version 2.08B01 makes use of hardcoded credentials. It is possible to backup and restore device configurations via the management web interface. These devices are encrypted using a hardcoded password of “12345678”. | 2021-12-30 | not yet calculated | CVE-2021-20155 MISC |
tenable — trendnet_ac2600 |
Trendnet AC2600 TEW-827DRU version 2.08B01 contains a command injection vulnerability in the smb functionality of the device. The username parameter used when configuring smb functionality for the device is vulnerable to command injection as root. | 2021-12-30 | not yet calculated | CVE-2021-20160 MISC |
tenable — trendnet_ac2600 | Trendnet AC2600 TEW-827DRU version 2.08B01 contains a symlink vulnerability in the bittorrent functionality. If enabled, the bittorrent functionality is vulnerable to a symlink attack that could lead to remote code execution on the device. If an end user inserts a flash drive with a malicious symlink on it that the bittorrent client can write downloads to, then a user is able to download arbitrary files to any desired location on the devices filesystem, which could lead to remote code execution. Example directories vulnerable to this include “config”, “downloads”, and “torrents”, though it should be noted that “downloads” is the only vector that allows for arbitrary files to be downloaded to arbitrary locations. | 2021-12-30 | not yet calculated | CVE-2021-20153 MISC |
tenable — trendnet_ac2600 |
Trendnet AC2600 TEW-827DRU version 2.08B01 contains an security flaw in the web interface. HTTPS is not enabled on the device by default. This results in cleartext transmission of sensitive information such as passwords. | 2021-12-30 | not yet calculated | CVE-2021-20154 MISC |
tenable — trendnet_ac2600 |
Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device. The router’s management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. This allows an attacker (whether from a different computer, different web browser on the same machine, etc.) to take over an existing session. This does require the attacker to be able to spoof or take over original IP address of the original user’s session. | 2021-12-30 | not yet calculated | CVE-2021-20151 MISC |
tenable — trendnet_ac2600 | Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device. | 2021-12-30 | not yet calculated | CVE-2021-20161 MISC |
tenable — trendnet_ac2600 |
Trendnet AC2600 TEW-827DRU version 2.08B01 contains an authentication bypass vulnerability. It is possible for an unauthenticated, malicous actor to force the change of the admin password due to a hidden administrative command. | 2021-12-30 | not yet calculated | CVE-2021-20158 MISC |
tenable — trendnet_ac2600 |
Trendnet AC2600 TEW-827DRU version 2.08B01 is vulnerable to command injection. The system log functionality of the firmware allows for command injection as root by supplying a malformed parameter. | 2021-12-30 | not yet calculated | CVE-2021-20159 MISC |
tenable — trendnet_ac2600 |
Trendnet AC2600 TEW-827DRU version 2.08B01 stores credentials in plaintext. Usernames and passwords are stored in plaintext in the config files on the device. For example, /etc/config/cameo contains the admin password in plaintext. | 2021-12-30 | not yet calculated | CVE-2021-20162 MISC |
ultrajson — ultrajson | UltraJSON (aka ujson) 4.0.2 through 5.0.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). | 2022-01-01 | not yet calculated | CVE-2021-45958 MISC MISC |
unicorn — engine |
An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager. The issue results from the faulty comparison of GVA and GPA while calling uc_mem_map_ptr to free part of a claimed memory block. An attacker can leverage this vulnerability to escape the sandbox and execute arbitrary code on the host machine. | 2021-12-26 | not yet calculated | CVE-2021-44078 MISC CONFIRM MISC MISC MISC |
uwebsockets — uwebsockets |
uWebSockets 19.0.0 through 20.8.0 has an out-of-bounds write in std::__1::pair<unsigned int, void*> uWS::HttpParser::fenceAndConsumePostPadded<0 (called from uWS::HttpParser::consumePostPadded and std::__1::__function::__func<LLVMFuzzerTestOneInput::$_0, std::__1::allocator<LL). | 2022-01-01 | not yet calculated | CVE-2021-45945 MISC MISC MISC |
vim — vim | vim is vulnerable to Use After Free | 2021-12-29 | not yet calculated | CVE-2021-4187 MISC CONFIRM |
vim — vim | vim is vulnerable to Out-of-bounds Read | 2021-12-25 | not yet calculated | CVE-2021-4166 CONFIRM MISC |
vim — vim | vim is vulnerable to Use After Free | 2021-12-31 | not yet calculated | CVE-2021-4192 CONFIRM MISC |
vim — vim | vim is vulnerable to Use After Free | 2021-12-27 | not yet calculated | CVE-2021-4173 CONFIRM MISC |
vim — vim | vim is vulnerable to Out-of-bounds Read | 2021-12-31 | not yet calculated | CVE-2021-4193 MISC CONFIRM |
wasm3 — wasm3 | Wasm3 0.5.0 has an out-of-bounds write in Runtime_Release (called from EvaluateExpression and InitDataSegments). | 2022-01-01 | not yet calculated | CVE-2021-45947 MISC MISC |
wasm3 — wasm3 | Wasm3 0.5.0 has an out-of-bounds write in CompileBlock (called from CompileElseBlock and Compile_If). | 2022-01-01 | not yet calculated | CVE-2021-45929 MISC MISC |
wasm3 — wasm3 | Wasm3 0.5.0 has an out-of-bounds write in CompileBlock (called from Compile_LoopOrBlock and CompileBlockStatements). | 2022-01-01 | not yet calculated | CVE-2021-45946 MISC MISC |
webkitgtk — webkitgtk | In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889. | 2021-12-25 | not yet calculated | CVE-2021-45483 MISC |
webkitgtk — webkitgtk | In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::ContainerNode::firstChild, a different vulnerability than CVE-2021-30889. | 2021-12-25 | not yet calculated | CVE-2021-45482 MISC |
webkitgtk — webkitgtk | In WebKitGTK before 2.32.4, there is incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application crash, a different vulnerability than CVE-2021-30889. | 2021-12-25 | not yet calculated | CVE-2021-45481 MISC |
wireshark — wireshark | Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-30 | not yet calculated | CVE-2021-4184 MISC CONFIRM MISC |
wireshark — wireshark | Crash in the pcapng file parser in Wireshark 3.6.0 allows denial of service via crafted capture file | 2021-12-30 | not yet calculated | CVE-2021-4183 CONFIRM MISC MISC |
wireshark — wireshark | Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-30 | not yet calculated | CVE-2021-4181 CONFIRM MISC MISC |
wireshark — wireshark | Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-30 | not yet calculated | CVE-2021-4185 MISC CONFIRM MISC |
wireshark — wireshark | Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-30 | not yet calculated | CVE-2021-4186 CONFIRM MISC MISC |
wireshark — wireshark | Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file | 2021-12-30 | not yet calculated | CVE-2021-4190 CONFIRM MISC MISC |
wireshark — wireshark | Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-30 | not yet calculated | CVE-2021-4182 MISC CONFIRM MISC |
wolfssl — wolfssl | wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttDecode_Disconnect (called from MqttClient_DecodePacket and MqttClient_WaitType). | 2022-01-01 | not yet calculated | CVE-2021-45936 MISC MISC MISC |
wolfssl — wolfssl | wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Unsubscribe). | 2022-01-01 | not yet calculated | CVE-2021-45938 MISC MISC MISC |
wolfssl — wolfssl | wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (8 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacket). | 2022-01-01 | not yet calculated | CVE-2021-45933 MISC MISC MISC |
wolfssl — wolfssl | wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_HandlePacket and MqttClient_WaitType). | 2022-01-01 | not yet calculated | CVE-2021-45934 MISC MISC MISC |
wolfssl — wolfssl | wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Connect). | 2022-01-01 | not yet calculated | CVE-2021-45937 MISC MISC MISC |
wolfssl — wolfssl | wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow (4 bytes) in MqttDecode_Publish (called from MqttClient_DecodePacket and MqttClient_HandlePacket). | 2022-01-01 | not yet calculated | CVE-2021-45932 MISC MISC MISC |
wolfssl — wolfssl | wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Subscribe). | 2022-01-01 | not yet calculated | CVE-2021-45939 MISC MISC MISC |
wordpress — wordpress | The Smart Floating / Sticky Buttons WordPress plugin before 2.5.5 does not sanitise and escape some parameter before outputting them in attributes and page, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | 2021-12-27 | not yet calculated | CVE-2021-24992 MISC |
wordpress — wordpress | The Simple JWT Login WordPress plugin before 3.3.0 can be used to create new WordPress user accounts with a randomly generated password. The password is generated using the str_shuffle PHP function that “does not generate cryptographically secure values, and should not be used for cryptographic purposes” according to PHP’s documentation. | 2021-12-27 | not yet calculated | CVE-2021-24998 MISC CONFIRM |
wordpress — wordpress | The Paid Memberships Pro WordPress plugin before 2.6.6 does not escape the s parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting | 2021-12-27 | not yet calculated | CVE-2021-24979 CONFIRM MISC |
wordpress — wordpress | The Rich Reviews by Starfish WordPress plugin before 1.9.6 does not properly validate the orderby GET parameter of the pending reviews page before using it in a SQL statement, leading to an authenticated SQL injection issue | 2021-12-27 | not yet calculated | CVE-2021-24753 MISC CONFIRM |
wordpress — wordpress | The Tickera WordPress plugin before 3.4.8.3 does not properly sanitise and escape the Name fields of booked Events before outputting them in the Orders admin dashboard, which could allow unauthenticated users to perform Cross-Site Scripting attacks against admins. | 2021-12-27 | not yet calculated | CVE-2021-24797 MISC |
wordpress — wordpress | The WordPress Download Manager WordPress plugin before 3.2.22 does not sanitise and escape Template data before outputting it in various pages (such as admin dashboard and frontend). Due to the lack of authorisation and CSRF checks in the wpdm_save_template AJAX action, any authenticated users such as subscriber is able to call it and perform Cross-Site Scripting attacks | 2021-12-27 | not yet calculated | CVE-2021-24969 MISC |
wordpress — wordpress | The Typebot | Build beautiful conversational forms WordPress plugin before 1.4.3 does not sanitise and escape the Publish ID setting, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | 2021-12-27 | not yet calculated | CVE-2021-24902 MISC |
wordpress — wordpress | The Contact Form & Lead Form Elementor Builder WordPress plugin before 1.6.4 does not sanitise and escape some lead values, which could allow unauthenticated users to perform Cross-Site Scripting attacks against logged in admin viewing the inserted Leads | 2021-12-27 | not yet calculated | CVE-2021-24967 MISC |
wordpress — wordpress | The Gwolle Guestbook WordPress plugin before 4.2.0 does not sanitise and escape the gwolle_gb_user_email parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue in an admin page | 2021-12-27 | not yet calculated | CVE-2021-24980 MISC |
wordpress — wordpress | The WP Guppy WordPress plugin before 1.3 does not have any authorisation in some of the REST API endpoints, allowing any user to call them and could lead to sensitive information disclosure, such as usernames and chats between users, as well as be able to send messages as an arbitrary user | 2021-12-27 | not yet calculated | CVE-2021-24997 MISC MISC |
wordpress — wordpress | The WPFront User Role Editor WordPress plugin before 3.2.1.11184 does not sanitise and escape the changes-saved parameter before outputting it back in the admin dashboard, leading to a Reflected Cross-Site Scripting | 2021-12-27 | not yet calculated | CVE-2021-24984 MISC |
wordpress — wordpress | The WP RSS Aggregator WordPress plugin before 4.19.3 does not sanitise and escape data before outputting it in the System Info admin dashboard, which could lead to a Stored XSS issue due to the wprss_dismiss_addon_notice AJAX action missing authorisation and CSRF checks, allowing any authenticated users, such as subscriber to call it and set a malicious payload in the addon parameter. | 2021-12-27 | not yet calculated | CVE-2021-24988 MISC |
wowsoft — printchaser_activex | Printchaser v2.2021.804.1 and earlier versions contain a vulnerability, which could allow remote attacker to download and execute remote file by setting the argument, variable in the activeX module. This can be leveraged for code execution. | 2021-12-28 | not yet calculated | CVE-2020-7883 MISC |
yappli — yappli | Yappli is an application development platform which provides the function to access a requested URL using Custom URL Scheme. When Android apps are developed with Yappli versions since v7.3.6 and prior to v9.30.0, they are vulnerable to improper authorization in Custom URL Scheme handler, and may be directed to unintended sites via a specially crafted URL. | 2021-12-28 | not yet calculated | CVE-2021-20873 MISC MISC |
zte — bigvideo_analysis | ZTE BigVideo Analysis product has a privilege escalation vulnerability. Due to improper management of the timed task modification privilege, an attacker with ordinary user permissions could exploit this vulnerability to gain unauthorized access. | 2021-12-27 | not yet calculated | CVE-2021-21750 MISC |
zte — bigvideo_analysis | ZTE BigVideo analysis product has an input verification vulnerability. Due to the inconsistency between the front and back verifications when configuring the large screen page, an attacker with high privileges could exploit this vulnerability to tamper with the URL and cause service exception. | 2021-12-27 | not yet calculated | CVE-2021-21751 MISC |
zyxel — gs1900_firmware |
A vulnerability in the ‘libsal.so’ of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call. | 2021-12-28 | not yet calculated | CVE-2021-35032 CONFIRM |
zyxel — multiple_products | A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device. | 2021-12-28 | not yet calculated | CVE-2021-35031 CONFIRM |
zyxel — nbg6604_firmware | A cleartext storage of sensitive information vulnerability in the Zyxel NBG6604 firmware could allow a remote, authenticated attacker to obtain sensitive information from the configuration file. | 2021-12-29 | not yet calculated | CVE-2021-35035 CONFIRM |
zyxel — nbg6604_firmware |
An insufficient session expiration vulnerability in the CGI program of the Zyxel NBG6604 firmware could allow a remote attacker to access the device if the correct token can be intercepted. | 2021-12-29 | not yet calculated | CVE-2021-35034 CONFIRM |
This product is provided subject to this Notification and this Privacy & Use policy.
5 Cybersecurity Trends to Watch in 2022
High Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
adobe — dimension | Adobe Dimension versions 3.4.3 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious GIF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-44179 MISC MISC |
adobe — dimension | Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file. | 2021-12-20 | 9.3 | CVE-2021-44180 MISC MISC |
adobe — dimension | Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious GIF file. | 2021-12-20 | 9.3 | CVE-2021-44181 MISC MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EXR file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-43021 MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious PNG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-43022 MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious EPS/TIFF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-43023 MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-43024 MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious SVG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-43025 MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious MXF file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-43026 MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-43028 MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-43029 MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 9.3 | CVE-2021-43747 MISC |
apache — http_server | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. | 2021-12-20 | 7.5 | CVE-2021-44790 MISC MLIST FEDORA CONFIRM |
iresturant_project — iresturant | RCE in Add Review Function in iResturant 1.0 Allows remote attacker to execute commands remotely | 2021-12-20 | 10 | CVE-2021-43439 MISC MISC |
numpy — numpy | Incomplete string comparison in the numpy.core component in NumPy1.9.x, which allows attackers to fail the APIs via constructing specific string objects. | 2021-12-17 | 7.5 | CVE-2021-34141 MISC |
tcman — gim | TCMAN GIM is vulnerable to a SQL injection vulnerability inside several available webservice methods in /PC/WebService.asmx. | 2021-12-17 | 7.5 | CVE-2021-40850 CONFIRM |
Medium Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
adobe — audition | Adobe Audition versions 14.4 (and earlier), and 22.0 (and earlier)are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious MP4 file. | 2021-12-20 | 4.3 | CVE-2021-44698 MISC MISC |
adobe — audition | Adobe Audition versions 14.4 (and earlier), and 22.0 (and earlier)are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious MP4 file. | 2021-12-20 | 4.3 | CVE-2021-44699 MISC MISC |
adobe — audition | Adobe Audition versions 14.4 (and earlier), and 22.0 (and earlier)are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious MOV file. | 2021-12-20 | 4.3 | CVE-2021-44697 MISC MISC |
adobe — dimension | Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious SVG file. | 2021-12-20 | 4.3 | CVE-2021-44182 MISC MISC |
adobe — dimension | Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file. | 2021-12-20 | 4.3 | CVE-2021-43763 MISC MISC |
adobe — dimension | Adobe Dimension versions 3.4.3 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file. | 2021-12-20 | 4.3 | CVE-2021-44183 MISC MISC |
adobe — premiere_rush | Adobe Premiere Rush versions 1.5.16 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2021-12-20 | 4.3 | CVE-2021-43748 MISC |
adobe — premiere_rush | Adobe Premiere Rush versions 1.5.16 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2021-12-20 | 4.3 | CVE-2021-43749 MISC |
adobe — premiere_rush | Adobe Premiere Rush versions 1.5.16 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | 2021-12-20 | 4.3 | CVE-2021-43750 MISC |
adobe — premiere_rush | Adobe Premiere Rush versions 1.5.16 (and earlier) allows access to an uninitialized pointer vulnerability that allows remote attackers to disclose sensitive information on affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of MP4 files. The issue results from the lack of proper initialization of memory prior to accessing it. | 2021-12-20 | 4.3 | CVE-2021-43746 MISC MISC |
adobe — premiere_rush | Adobe Premiere Rush versions 1.5.16 (and earlier) allows access to an uninitialized pointer vulnerability that allows remote attackers to disclose sensitive information on affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of MP4 files. The issue results from the lack of proper initialization of memory prior to accessing it. | 2021-12-20 | 4.3 | CVE-2021-43030 MISC MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 6.8 | CVE-2021-40784 MISC |
adobe — premiere_rush | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious WAV file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | 2021-12-20 | 6.8 | CVE-2021-40783 MISC |
advantech — r-seenet | A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘health_filter’ parameter. | 2021-12-22 | 4 | CVE-2021-21926 MISC |
apache — http_server | A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). | 2021-12-20 | 6.4 | CVE-2021-44224 MISC MLIST FEDORA CONFIRM |
apache — log4j | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0 and 2.12.3. | 2021-12-18 | 5 | CVE-2021-45105 MISC CONFIRM MLIST DEBIAN MISC CISCO CONFIRM CERT-VN CONFIRM CONFIRM MLIST FEDORA FEDORA |
ciphercoin — contact_form_7_database_addon_-_cfdb7 | Unauthenticated Stored Cross-Site Scripting (XSS) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions <= 1.2.6.1). | 2021-12-22 | 4.3 | CVE-2021-36885 CONFIRM CONFIRM |
ciphercoin — contact_form_7_database_addon_-_cfdb7 | Cross-Site Request Forgery (CSRF) vulnerability discovered in Contact Form 7 Database Addon – CFDB7 WordPress plugin (versions <= 1.2.5.9). | 2021-12-22 | 6.8 | CVE-2021-36886 CONFIRM MISC |
ftpshell — ftpshell_server | A buffer overflow vulnerability in the Virtual Path Mapping component of FTPShell v6.83 allows attackers to cause a denial of service (DoS). | 2021-12-17 | 5 | CVE-2020-18077 MISC |
google — android | In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672059. | 2021-12-17 | 4.6 | CVE-2021-0899 MISC |
google — android | In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672038. | 2021-12-17 | 4.6 | CVE-2021-0894 MISC |
google — android | In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05670549. | 2021-12-17 | 4.6 | CVE-2021-0897 MISC |
google — android | In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05671206. | 2021-12-17 | 4.6 | CVE-2021-0896 MISC |
google — android | In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672003. | 2021-12-17 | 4.6 | CVE-2021-0895 MISC |
google — android | In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672071. | 2021-12-17 | 4.6 | CVE-2021-0898 MISC |
google — android | In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05687474. | 2021-12-17 | 4.6 | CVE-2021-0893 MISC |
google — android | In apusys, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05687781. | 2021-12-17 | 4.6 | CVE-2021-0679 MISC |
google — android | In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05722511. | 2021-12-17 | 4.6 | CVE-2021-0678 MISC |
google — android | In Audio Aurisys HAL, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05977326; Issue ID: ALPS05977326. | 2021-12-17 | 4.6 | CVE-2021-0673 MISC |
google — android | In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05656488. | 2021-12-17 | 4.6 | CVE-2021-0903 MISC |
google — android | In apusys, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05664618. | 2021-12-17 | 4.6 | CVE-2021-0901 MISC |
gpac — gpac | A null pointer dereference vulnerability exists in gpac 1.1.0 via the lsr_read_anim_values_ex function, which causes a segmentation fault and application crash. | 2021-12-22 | 5 | CVE-2021-45266 MISC |
iorder_project — iorder | Multiple Stored XSS Vulnerabilities in the Source Code of iOrder 1.0 allow remote attackers to execute arbitrary code via signup form in the Name and Phone number field. | 2021-12-20 | 4.3 | CVE-2021-43440 MISC MISC |
laravel — framework | OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17. | 2021-12-20 | 6.8 | CVE-2020-19316 MISC MISC |
livehelperchat — live_helper_chat | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | 2021-12-18 | 6.8 | CVE-2021-4131 CONFIRM MISC |
mediawiki — mediawiki | An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=mcrundo followed by action=mcrrestore to replace the content of any arbitrary page (that the user doesn’t have edit rights for). This applies to any public wiki, or a private wiki that has at least one page set in $wgWhitelistRead. | 2021-12-17 | 4 | CVE-2021-44857 CONFIRM MISC |
mediawiki — mediawiki | An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. By using an action=rollback query, attackers can view private wiki contents. | 2021-12-17 | 5 | CVE-2021-45038 CONFIRM MISC |
mossle — lemon | A cross-site scripting (XSS) vulnerability in the potrtalItemName parameter in webPortalController.java of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML. | 2021-12-22 | 4.3 | CVE-2020-20597 MISC |
mossle — lemon | A cross-site scripting (XSS) vulnerability in the Editing component of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML. | 2021-12-22 | 4.3 | CVE-2020-20598 MISC |
numpy — numpy | Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. | 2021-12-17 | 5 | CVE-2021-41495 MISC |
numpy — numpy | A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. | 2021-12-17 | 5 | CVE-2021-33430 MISC |
open-emr — openemr | An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI. | 2021-12-17 | 6.8 | CVE-2021-41843 MISC MISC MISC FULLDISC |
opms_project — opms | A cross-site request forgery (CSRF) in OPMS v1.3 and below allows attackers to arbitrarily add a user account via /user/add. | 2021-12-22 | 4.3 | CVE-2020-20595 MISC |
personal_blog_cms_project — personal_blog_cms | Blog CMS v1.0 contains a cross-site scripting (XSS) vulnerability in the /controller/CommentAdminController.java component. | 2021-12-22 | 4.3 | CVE-2020-20605 MISC |
s-cms — s-cms | S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in /function/booksave.php. | 2021-12-22 | 4.3 | CVE-2020-20426 MISC MISC MISC |
s-cms — s-cms | S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in the search function. | 2021-12-22 | 4.3 | CVE-2020-20425 MISC MISC MISC |
salesagility — suitecrm | SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection. | 2021-12-19 | 6.5 | CVE-2021-45041 CONFIRM CONFIRM |
sem-cms — semcms | The checkuser function of SEMCMS 3.8 was discovered to contain a vulnerability which allows attackers to obtain the password in plaintext through a SQL query. | 2021-12-17 | 5 | CVE-2020-18081 MISC |
sem-cms — semcms | A vulnerability in /include/web_check.php of SEMCMS v3.8 allows attackers to reset the Administrator account’s password. | 2021-12-17 | 5 | CVE-2020-18078 MISC |
snipeitapp — snipe-it | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | 2021-12-18 | 6.8 | CVE-2021-4130 CONFIRM MISC |
tcman — gim | TCMAN GIM is affected by an open redirect vulnerability. This vulnerability allows the redirection of user navigation to pages controlled by the attacker. The exploitation of this vulnerability might allow a remote attacker to obtain information. | 2021-12-17 | 5.8 | CVE-2021-40852 CONFIRM |
tcman — gim | TCMAN GIM is vulnerable to a lack of authorization in all available webservice methods listed in /PC/WebService.asmx. The exploitation of this vulnerability might allow a remote attacker to obtain information. | 2021-12-17 | 5 | CVE-2021-40851 CONFIRM |
tcman — gim | TCMAN GIM does not perform an authorization check when trying to access determined resources. A remote attacker could exploit this vulnerability to access URL that require privileges without having them. The exploitation of this vulnerability might allow a remote attacker to obtain sensible information. | 2021-12-17 | 6.4 | CVE-2021-40853 CONFIRM |
vmware — workspace_one_uem_console | VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information. | 2021-12-17 | 5 | CVE-2021-22054 MISC |
wechat-php-sdk_project — wechat-php-sdk | Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php. | 2021-12-17 | 4.3 | CVE-2021-43678 MISC MISC |
wolterskluwer — teammate_audit_management | Wolters Kluwer TeamMate AM 12.4 Update 1 mishandles attachment uploads, such that an authenticated user may download and execute malicious files. | 2021-12-17 | 6.8 | CVE-2021-44035 MISC MISC |
x.org — x_server | A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcXFixesCreatePointerBarrier function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-12-17 | 4.6 | CVE-2021-4009 MISC MISC FEDORA FEDORA MISC DEBIAN |
x.org — x_server | A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SwapCreateRegister function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-12-17 | 4.6 | CVE-2021-4011 MISC MISC FEDORA FEDORA MISC DEBIAN |
x.org — x_server | A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcScreenSaverSuspend function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-12-17 | 4.6 | CVE-2021-4010 MISC MISC FEDORA FEDORA MISC DEBIAN |
x.org — x_server | A flaw was found in xorg-x11-server in versions before 21.1.2 and before 1.20.14. An out-of-bounds access can occur in the SProcRenderCompositeGlyphs function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-12-17 | 4.6 | CVE-2021-4008 MISC MISC FEDORA FEDORA MISC DEBIAN |
Low Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
convos — convos | A Stored Cross Site Scripting (XSS) issue exists in Convos-Chat before 6.32. | 2021-12-17 | 3.5 | CVE-2021-42584 MISC MISC MISC |
google — android | In alac decoder, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06064258; Issue ID: ALPS06064237. | 2021-12-17 | 2.1 | CVE-2021-0674 MISC |
google — android | In geniezone driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05863009; Issue ID: ALPS05863009. | 2021-12-17 | 2.1 | CVE-2021-0676 MISC |
google — android | In ccu driver, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05827154; Issue ID: ALPS05827154. | 2021-12-17 | 2.1 | CVE-2021-0677 MISC |
google — android | In apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672055. | 2021-12-17 | 2.1 | CVE-2021-0900 MISC |
google — android | In apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05656484. | 2021-12-17 | 2.1 | CVE-2021-0902 MISC |
ibm — business_automation_workflow | IBM Business Automation Workflow 18.0, 19.0, 20,0 and 21.0 and IBM Business Process Manager 8.5 and 8.6 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209165. | 2021-12-17 | 3.5 | CVE-2021-38883 CONFIRM XF |
ibm — cloud_pak_for_automation | IBM Cloud Pak for Automation 21.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 212357. | 2021-12-21 | 3.5 | CVE-2021-38966 XF CONFIRM |
iresturant_project — iresturant | Stored XSS in Signup Form in iResturant 1.0 Allows Remote Attacker to Inject Arbitrary code via NAME and ADDRESS field | 2021-12-20 | 3.5 | CVE-2021-43438 MISC MISC |
livehelperchat — live_helper_chat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-17 | 3.5 | CVE-2021-4132 CONFIRM MISC |
mattermost — mattermost_server | Mattermost 6.0 and earlier fails to sufficiently validate parameters during post creation, which allows authenticated attackers to cause a client-side crash of the web application via a maliciously crafted post. | 2021-12-17 | 3.5 | CVE-2021-37863 MISC MISC |
metinfo — metinfo | MetInfo 7.0 beta contains a stored cross-site scripting (XSS) vulnerability in the $name parameter of admin/?n=column&c=index&a=doAddColumn. | 2021-12-22 | 3.5 | CVE-2020-20600 MISC |
tarteaucitron.js_-_cookies_legislation_&_gdpr_project — tarteaucitron.js_-_cookies_legislation_&_gdpr | Multiple Stored Authenticated Cross-Site Scripting (XSS) vulnerabilities were discovered in tarteaucitron.js – Cookies legislation & GDPR WordPress plugin (versions <= 1.6). | 2021-12-20 | 3.5 | CVE-2021-36889 MISC CONFIRM |
Severity Not Yet Assigned
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
requarks — wiki.js | Wiki.js is a wiki app built on Node.js. Wiki.js versions 2.5.257 and earlier are vulnerable to stored cross-site scripting through a SVG file upload. By creating a crafted SVG file, a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the SVG is viewed directly by other users. Scripts do not execute when loaded inside a page via normal `<img>` tags. Commit 5d3e81496fba1f0fbd64eeb855f30f69a9040718 fixes this vulnerability by adding an optional (enabled by default) SVG sanitization step to all file uploads that match the SVG mime type. As a workaround, disable file upload for all non-trusted users. Wiki.js version 2.5.260 is the first production version to contain a patch. Version 2.5.258 is the first development build to contain a patch and is available only as a Docker image as requarks/wiki:canary-2.5.258. | 2021-12-20 | not yet calculated | CVE-2021-43842 MISC MISC CONFIRM |
4mosan_gcb_doctor — 4mosan_gcb_doctor |
4MOSAn GCB Doctor’s file upload function has improper user privilege control. A remote attacker can upload arbitrary files including webshell files without authentication and execute arbitrary code in order to perform arbitrary system operations or deny of service attack. | 2021-12-20 | not yet calculated | CVE-2021-44159 CONFIRM |
abode_iota — all-in-one_security_kit |
OS Command Injection vulnerability in the wirelessConnect handler of Abode iota All-In-One Security Kit allows an attacker to inject commands and gain root access. This issue affects: Abode iota All-In-One Security Kit versions prior to 1.0.2.23_6.9V_dev_t2_homekit_RF_2.0.19_s2_kvsABODE oz. | 2021-12-20 | not yet calculated | CVE-2020-8105 MISC |
acclaim — usaherds |
Acclaim USAHERDS through 7.4.0.1 uses hard-coded credentials. | 2021-12-21 | not yet calculated | CVE-2021-44207 MISC MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘mac_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21928 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘host_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21937 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘health_alt_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21936 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘host_alt_filter2’ parameter. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21935 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘imei_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21934 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘esn_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21933 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this at ‘name_filter’ parameter. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21932 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at‘ stat_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21931 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘username_filter’ parameter with the administrative account or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21922 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘prod_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21929 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter with the administrative account or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21921 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘loc_filter’ parameter. | 2021-12-22 | not yet calculated | CVE-2021-21927 MISC |
advantech — r-seenet |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21916 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘surname_filter’ parameter with the administrative account or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21920 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ord’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack. | 2021-12-22 | not yet calculated | CVE-2021-21919 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘name_filter’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack. | 2021-12-22 | not yet calculated | CVE-2021-21918 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘firm_filter’ parameter. | 2021-12-22 | not yet calculated | CVE-2021-21925 MISC |
advantech — r-seenet |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21917 MISC |
advantech — r-seenet |
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21915 MISC |
advantech — r-seenet |
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21912 MISC |
advantech — r-seenet |
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21911 MISC |
advantech — r-seenet |
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21910 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ‘company_filter’ parameter with the administrative account or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21923 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger these vulnerabilities. This can be done as any authenticated user or through cross-site request forgery at ‘desc_filter’ parameter. | 2021-12-22 | not yet calculated | CVE-2021-21924 MISC |
advantech — r-seenet |
A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests at ‘sn_filter’ parameter to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. | 2021-12-22 | not yet calculated | CVE-2021-21930 MISC |
ajax — ajax.net_professional |
Ajax.NET Professional (AjaxPro) is an AJAX framework available for Microsoft ASP.NET. Affected versions of this package are vulnerable to JavaScript object injection which may result in cross site scripting when leveraged by a malicious user. The affected core relates to JavaScript object creation when parsing json input. Releases before version 21.12.22.1 are affected. A workaround exists that replaces one of the core JavaScript files embedded in the library. See the GHSA-5q7q-qqw2-hjq7 for workaround details. | 2021-12-22 | not yet calculated | CVE-2021-43853 CONFIRM MISC MISC |
anker_eufy — homeba | An authentication bypass vulnerability exists in the process_msg() function of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted man-in-the-middle attack can lead to increased privileges. | 2021-12-22 | not yet calculated | CVE-2021-21953 MISC |
anker_eufy — homebase |
An authentication bypass vulnerability exists in the CMD_DEVICE_GET_RSA_KEY_REQUEST functionality of the home_security binary of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to increased privileges. | 2021-12-22 | not yet calculated | CVE-2021-21952 MISC |
anuko — time_tracker |
Anuko Time Tracker is an open source, web-based time tracking application written in PHP. SQL injection vulnerability exist in multiple files in Time Tracker version 1.19.33.5606 and prior due to not properly checking of the “group” and “status” parameters in POST requests. Group parameter is posted along when navigating between organizational subgroups (groups.php file). Status parameter is used in multiple files to change a status of an entity such as making a project, task, or user inactive. This issue has been patched in version 1.19.33.5607. An upgrade is highly recommended. If an upgrade is not practical, introduce ttValidStatus function as in the latest version and start using it user input check blocks wherever status field is used. For groups.php fix, introduce ttValidInteger function as in the latest version and use it in the access check block in the file. | 2021-12-22 | not yet calculated | CVE-2021-43851 CONFIRM MISC MISC |
apache — cordova |
cordova-plugin-fingerprint-aio is a plugin provides a single and simple interface for accessing fingerprint APIs on both Android 6+ and iOS. In versions prior to 5.0.1 The exported activity `de.niklasmerz.cordova.biometric.BiometricActivity` can cause the app to crash. This vulnerability occurred because the activity didn’t handle the case where it is requested with invalid or empty data which results in a crash. Any third party app can constantly call this activity with no permission. A 3rd party app/attacker using event listener can continually stop the app from working and make the victim unable to open it. Version 5.0.1 of the cordova-plugin-fingerprint-aio doesn’t export the activity anymore and is no longer vulnerable. If you want to fix older versions change the attribute android:exported in plugin.xml to false. Please upgrade to version 5.0.1 as soon as possible. | 2021-12-23 | not yet calculated | CVE-2021-43849 CONFIRM MISC MISC |
apache — parquet |
Improper Input Validation vulnerability in Parquet-MR of Apache Parquet allows an attacker to DoS by malicious Parquet files. This issue affects Apache Parquet-MR version 1.9.0 and later versions. | 2021-12-20 | not yet calculated | CVE-2021-41561 MISC MLIST |
apache — plc |
Apache PLC4X – PLC4C (Only the C language implementation was effected) was vulnerable to an unsigned integer underflow flaw inside the tcp transport. Users should update to 0.9.1, which addresses this issue. However, in order to exploit this vulnerability, a user would have to actively connect to a mallicious device which could send a response with invalid content. Currently we consider the probability of this being exploited as quite minimal, however this could change in the future, especially with the industrial networks growing more and more together. | 2021-12-19 | not yet calculated | CVE-2021-43083 MISC MLIST |
apache — solr |
An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows. | 2021-12-23 | not yet calculated | CVE-2021-44548 MISC |
apple — ios |
An issue existed in preventing the uploading of CallKit call history to iCloud. This issue was addressed through improved logic. This issue is fixed in iOS 10.2.1. Updates for CallKit call history are sent to iCloud. | 2021-12-23 | not yet calculated | CVE-2017-2375 MISC |
apple — ios_and_watchos |
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 11.2, watchOS 4.2. An application may be able to execute arbitrary code with kernel privilege. | 2021-12-23 | not yet calculated | CVE-2017-13880 MISC MISC |
apple — macos_high_sierra |
A validation issue was addressed with improved logic. This issue is fixed in macOS High Sierra 10.13.5, Security Update 2018-003 Sierra, Security Update 2018-003 El Capitan. An attacker with physical access to a device may be able to elevate privileges. | 2021-12-23 | not yet calculated | CVE-2018-4478 MISC |
apple — macos_high_sierra |
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS High Sierra 10.13. An application may be able to execute arbitrary code with elevated privileges. | 2021-12-23 | not yet calculated | CVE-2017-13835 MISC |
apple — macos_high_sierra |
An issue existed in the handling of Contact sharing. This issue was addressed with improved handling of user information. This issue is fixed in macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan. Sharing contact information may lead to unexpected data sharing. | 2021-12-23 | not yet calculated | CVE-2017-13892 MISC |
apple — macos_mojave |
CVE-2019-8643: Arun Sharma of VMWare This issue is fixed in macOS Mojave 10.14. Description: A logic issue was addressed with improved state management.. | 2021-12-23 | not yet calculated | CVE-2019-8643 MISC |
apple — multiple_products |
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra. A malicious application may be able to execute arbitrary code with kernel privileges. | 2021-12-23 | not yet calculated | CVE-2020-3886 MISC |
apple — multiple_products |
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra. A malicious application may be able to overwrite arbitrary files. | 2021-12-23 | not yet calculated | CVE-2020-3896 MISC |
apple — multiple_products |
This issue was addressed with a new entitlement. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra, iOS 12.4, tvOS 12.4. A local user may be able to read a persistent account identifier. | 2021-12-23 | not yet calculated | CVE-2019-8702 MISC MISC MISC |
apple — multiple_products |
This issue was addressed with improved entitlements. This issue is fixed in watchOS 6, tvOS 13, macOS Catalina 10.15, iOS 13. An application may be able to gain elevated privileges. | 2021-12-23 | not yet calculated | CVE-2019-8703 MISC MISC MISC MISC |
apple — multiple_products |
A null pointer dereference was addressed with improved validation. This issue is fixed in macOS High Sierra 10.13, iCloud for Windows 7.0, watchOS 4, iOS 11, iTunes 12.7 for Windows. Processing maliciously crafted XML may lead to an unexpected application termination or arbitrary code execution. | 2021-12-23 | not yet calculated | CVE-2018-4302 MISC MISC MISC MISC MISC |
apple — multiple_products |
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.6.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A local user may be able to modify protected parts of the file system. | 2021-12-23 | not yet calculated | CVE-2021-30767 MISC MISC MISC MISC MISC |
apple — remote_desktop |
A cryptographic weakness existed in the authentication protocol of Remote Desktop. This issue was addressed by implementing the Secure Remote Password authentication protocol. This issue is fixed in Apple Remote Desktop 3.9. An attacker may be able to capture cleartext passwords. | 2021-12-23 | not yet calculated | CVE-2017-2488 MISC |
apple –multiple_products |
A race condition was addressed with additional validation. This issue is fixed in tvOS 11.2, iOS 11.2, macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan, watchOS 4.2. An application may be able to gain elevated privileges. | 2021-12-23 | not yet calculated | CVE-2017-13905 MISC MISC MISC MISC |
apple — macos_high_sierra |
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan, macOS High Sierra 10.13. A malicious application may be able to elevate privileges. | 2021-12-23 | not yet calculated | CVE-2017-13906 MISC MISC |
apple — macos_high_sierra |
An issue in handling file permissions was addressed with improved validation. This issue is fixed in macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan, macOS High Sierra 10.13. A local attacker may be able to execute non-executable text files via an SMB share. | 2021-12-23 | not yet calculated | CVE-2017-13908 MISC MISC |
apple — macos_high_sierra |
An issue existed in the storage of sensitive tokens. This issue was addressed by placing the tokens in Keychain. This issue is fixed in macOS High Sierra 10.13. A local attacker may gain access to iCloud authentication tokens. | 2021-12-23 | not yet calculated | CVE-2017-13909 MISC |
apple — macos_high_sierra |
An access issue was addressed with additional sandbox restrictions on applications. This issue is fixed in macOS High Sierra 10.13. An application may be able to access restricted files. | 2021-12-23 | not yet calculated | CVE-2017-13910 MISC |
apple — macos_high_sierra |
A state management issue was addressed with improved state validation. This issue is fixed in macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitan. The screen lock may unexpectedly remain unlocked. | 2021-12-23 | not yet calculated | CVE-2017-13907 MISC |
archivy — archivy |
archivy is vulnerable to Cross-Site Request Forgery (CSRF) | 2021-12-25 | not yet calculated | CVE-2021-4162 CONFIRM MISC |
armmbed — mbed_tls |
In Mbed TLS before 3.1.0, psa_aead_generate_nonce allows policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application. | 2021-12-21 | not yet calculated | CVE-2021-45451 MISC |
armmbed — mbed_tls |
In Mbed TLS before 2.28.0 and 3.x before 3.1.0, psa_cipher_generate_iv and psa_cipher_encrypt allow policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application. | 2021-12-21 | not yet calculated | CVE-2021-45450 MISC MISC |
armmbed — mbed_tls |
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure. | 2021-12-20 | not yet calculated | CVE-2021-44732 CONFIRM MISC CONFIRM CONFIRM CONFIRM CONFIRM |
autodesk — pdftron |
A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through PDF earlier than 9.0.7 version. | 2021-12-23 | not yet calculated | CVE-2021-40161 MISC |
autodesk — pdftron |
A maliciously crafted PDF file prior to 9.0.7 may be forced to read beyond allocated boundaries when parsing the PDF file. This vulnerability can be exploited to execute arbitrary code. | 2021-12-23 | not yet calculated | CVE-2021-40160 MISC |
blackmagic_design — davinci_resolve
|
When parsing a file that is submitted to the DPDecoder service as a job, the R3D SDK will mistakenly skip over the assignment of a property containing an object referring to a UUID that was parsed from a frame within the video container. Upon destruction of the object that owns it, the uninitialized member will be dereferenced and then destroyed using the object’s virtual destructor. Due to the object property being uninitialized, this can result in dereferencing an arbitrary pointer for the object’s virtual method table, which can result in code execution under the context of the application. | 2021-12-22 | not yet calculated | CVE-2021-40418 MISC |
blackmagic_design — davinci_resolve |
When parsing a file that is submitted to the DPDecoder service as a job, the service will use the combination of decoding parameters that were submitted with the job along with fields that were parsed for the submitted video by the R3D SDK to calculate the size of a heap buffer. Due to an integer overflow with regards to this calculation, this can result in an undersized heap buffer being allocated. When this heap buffer is written to, a heap-based buffer overflow will occur. This can result in code execution under the context of the application. | 2021-12-22 | not yet calculated | CVE-2021-40417 MISC |
chain_sea_ — ai_chatbot_system |
Chain Sea ai chatbot backend has improper filtering of special characters in URL parameters, which allows a remote attacker to perform JavaScript injection for XSS (reflected Cross-site scripting) attack without authentication. | 2021-12-20 | not yet calculated | CVE-2021-44163 CONFIRM |
chain_sea_ — ai_chatbot_system |
Chain Sea ai chatbot system’s file upload function has insufficient filtering for special characters in URLs, which allows a remote attacker to by-pass file type validation, upload malicious script and execute arbitrary code without authentication, in order to take control of the system or terminate service. | 2021-12-20 | not yet calculated | CVE-2021-44164 CONFIRM |
chain_sea_ — ai_chatbot_system |
Chain Sea ai chatbot system’s specific file download function has path traversal vulnerability. The function has improper filtering of special characters in URL parameters, which allows a remote attacker to download arbitrary system files without authentication. | 2021-12-20 | not yet calculated | CVE-2021-44162 CONFIRM |
crypto-org-chain — cronos |
Cronos is a commercial implementation of a blockchain. In Cronos nodes running versions before v0.6.5, it is possible to take transaction fees from Cosmos SDK’s FeeCollector for the current block by sending a custom crafted MsgEthereumTx. This problem has been patched in Cronos v0.6.5. There are no tested workarounds. All validator node operators are recommended to upgrade to Cronos v0.6.5 at their earliest possible convenience. | 2021-12-21 | not yet calculated | CVE-2021-43839 MISC CONFIRM MISC |
cve-search — cve-search |
lib/DatabaseLayer.py in cve-search before 4.1.0 allows regular expression injection, which can lead to ReDoS (regular expression denial of service) or other impacts. | 2021-12-23 | not yet calculated | CVE-2021-45470 MISC MISC MISC |
dalmark — system_systeams |
Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Insecure design on report build via SQL query. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. The bi report module exposes direct SQL commands via POST data in order to select data for report generation. A malicious actor can use the bi report endpoint as a direct SQL prompt under the authenticated user. | 2021-12-21 | not yet calculated | CVE-2021-44874 MISC |
dalmark — system_systeams |
Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to User enumeration. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. This issue occurs during the password recovery procedure for a given user, where a difference in messages could allow an attacker to determine if the given user is valid or not, enabling a brute force attack with valid users. | 2021-12-21 | not yet calculated | CVE-2021-44875 MISC |
dalmark — system_systeams |
Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to User enumeration. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. This issue occurs during the identification of the correct tenant for a given user, where a difference in messages could allow an attacker to determine if the given user is valid or not, enabling a brute force attack with valid users. | 2021-12-21 | not yet calculated | CVE-2021-44876 MISC |
dalmark — system_systeams |
Dalmark Systems Systeam 2.22.8 build 1724 is vulnerable to Incorrect Access Control. The Systeam application is an ERP system that uses a mixed architecture based on SaaS tenant and user management, and on-premise database and web application counterparts. A broken access control vulnerability has been found while using a temporary generated token in order to consume api resources. The vulnerability allows an unauthenticated attacker to use an api endpoint to generate a temporary JWT token that is designed to reference the correct tenant prior to authentication, to request system configuration parameters using direct api requests. The correct exploitation of this vulnerability causes sensitive information exposure. In case the tenant has an smtp credential set, the full credential information is disclosed. | 2021-12-21 | not yet calculated | CVE-2021-44877 MISC |
dell — emc_avamar_server |
Dell EMC Avamar Server versions 18.2, 19.1, 19.2, 19.3, and 19.4 contain an improper privilege management vulnerability in AUI. A malicious user with high privileges could potentially exploit this vulnerability, leading to the disclosure of the AUI info and performing some unauthorized operation on the AUI. | 2021-12-21 | not yet calculated | CVE-2021-36316 CONFIRM |
dell — emc_avamar_server |
Dell EMC Avamar Server version 19.4 contains a plain-text password storage vulnerability in AvInstaller. A local attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account. | 2021-12-21 | not yet calculated | CVE-2021-36317 CONFIRM |
dell — emc_avamar_server |
Dell EMC Avamar versions 18.2,19.1,19.2,19.3,19.4 contain a plain-text password storage vulnerability. A high privileged user could potentially exploit this vulnerability, leading to a complete outage. | 2021-12-21 | not yet calculated | CVE-2021-36318 CONFIRM |
dell — powerpath_management_applicance |
Dell PowerPath Management Appliance, versions 3.2, 3.1, 3.0 P01, 3.0, and 2.6, use hard-coded cryptographic key. A local high-privileged malicious user may potentially exploit this vulnerability to gain access to secrets and elevate to gain higher privileges. | 2021-12-21 | not yet calculated | CVE-2021-43587 CONFIRM |
dell — powerscale_onefs |
Dell PowerScale OneFS, versions 8.2.2-9.3.0.x, contain an authentication bypass by primary weakness in one of the authentication factors. A remote unauthenticated attacker may potentially exploit this vulnerability and bypass one of the factors of authentication. | 2021-12-21 | not yet calculated | CVE-2021-36350 CONFIRM |
dell — wyse_device_agent |
Dell Wyse Device Agent version 14.5.4.1 and below contain a sensitive data exposure vulnerability. A local authenticated user with low privileges could potentially exploit this vulnerability in order to access sensitive information. | 2021-12-21 | not yet calculated | CVE-2021-36341 CONFIRM |
dell — wyse_management_suite | Dell Wyse Management Suite version 3.3.1 and prior support insecure Transport Security Protocols TLS 1.0 and TLS 1.1 which are susceptible to Man-In-The-Middle attacks thereby compromising Confidentiality and Integrity of data. | 2021-12-21 | not yet calculated | CVE-2021-36337 CONFIRM |
dell — wyse_management_suite |
Wyse Management Suite 3.3.1 and below versions contain a deserialization vulnerability that could allow an unauthenticated attacker to execute code on the affected system. | 2021-12-21 | not yet calculated | CVE-2021-36336 CONFIRM |
delta_electronics — diaenergie |
DIAEnergie Version 1.7.5 and prior is vulnerable to multiple cross-site scripting vulnerabilities when arbitrary code is injected into the parameter “name” of the script “HandlerEnergyType.ashx”. | 2021-12-22 | not yet calculated | CVE-2021-44544 MISC |
delta_electronics — diaenergie |
DIAEnergie Version 1.7.5 and prior is vulnerable to stored cross-site scripting when an unauthenticated user injects arbitrary code into the parameter “descr” of the script “DIAE_hierarchyHandler.ashx”. | 2021-12-22 | not yet calculated | CVE-2021-31558 MISC |
delta_electronics — diaenergie |
DIAEnergie Version 1.7.5 and prior is vulnerable to stored cross-site scripting when an unauthenticated user injects arbitrary code into the parameter “name” of the script “DIAE_HandlerAlarmGroup.ashx”. | 2021-12-22 | not yet calculated | CVE-2021-44471 MISC |
delta_electronics — diaenergie |
DIAEnergie Version 1.7.5 and prior is vulnerable to a reflected cross-site scripting attack through error pages that are returned by “.NET Request.QueryString”. | 2021-12-22 | not yet calculated | CVE-2021-23228 MISC |
e2guardian — e2guardian |
e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to, and thus was itself vulnerable to MITM attacks. | 2021-12-23 | not yet calculated | CVE-2021-44273 MISC MISC MLIST |
eap — eap |
The HornetQ component of Artemis in EAP 7 was not updated with the fix for CVE-2016-4978. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using a JMS ObjectMessage. | 2021-12-23 | not yet calculated | CVE-2021-20318 MISC |
elgg — elgg |
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-24 | not yet calculated | CVE-2021-4072 MISC CONFIRM |
enc_security — deltavault |
ENC DataVault 7.1.1W and VaultAPI v67, which is currently being used in various other applications, mishandles key derivation, making it easier for attackers to determine the passwords of all DataVault users (across USB drives sold under multiple brand names). | 2021-12-22 | not yet calculated | CVE-2021-36750 MISC MISC |
f-secure — antivirus_engine |
A vulnerability affecting F-Secure antivirus engine was discovered whereby scanning MS outlook .pst files can lead to denial-of-service. The vulnerability can be exploited remotely by an attacker. A successful attack will result in denial-of-service of the antivirus engine. | 2021-12-22 | not yet calculated | CVE-2021-40836 MISC |
freepbx — freepbx |
FreePBX, when restapps (aka Rest Phone Apps) 15.0.19.87, 15.0.19.88, 16.0.18.40, or 16.0.18.41 is installed, allows remote attackers to execute arbitrary code, as exploited in the wild in December 2021. The fixed versions are 15.0.20 and 16.0.19. | 2021-12-22 | not yet calculated | CVE-2021-45461 CONFIRM CONFIRM MISC |
fuji_electric — v-server_lite_and_tellus_lite_v-simulator |
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an access of uninitialized pointer, which may allow an attacker read from or write to unexpected memory locations, leading to a denial-of-service. | 2021-12-20 | not yet calculated | CVE-2021-38409 MISC |
fuji_electric — v-server_lite_and_tellus_lite_v-simulator |
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to a stack-based buffer overflow, which may allow an attacker to achieve code execution. | 2021-12-20 | not yet calculated | CVE-2021-38413 MISC |
fuji_electric — v-server_lite_and_tellus_lite_v-simulator |
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an untrusted pointer dereference, which may allow an attacker to execute arbitrary code and cause the application to crash. | 2021-12-20 | not yet calculated | CVE-2021-38401 MISC |
fuji_electric — v-server_lite_and_tellus_lite_v-simulator |
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable a heap-based buffer overflow when parsing a specially crafted project file, which may allow an attacker to execute arbitrary code. | 2021-12-20 | not yet calculated | CVE-2021-38415 MISC |
fuji_electric — v-server_lite_and_tellus_lite_v-simulator |
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an out-of-bounds write, which can result in data corruption, a system crash, or code execution. | 2021-12-20 | not yet calculated | CVE-2021-38419 MISC |
fuji_electric — v-server_lite_and_tellus_lite_v-simulator |
Fuji Electric V-Server Lite and Tellus Lite V-Simulator prior to v4.0.12.0 is vulnerable to an out-of-bounds read, which may allow an attacker to read sensitive information from other memory locations or cause a crash. | 2021-12-20 | not yet calculated | CVE-2021-38421 MISC |
garrett — metal_detectors |
Specially-crafted command line arguments can lead to arbitrary file deletion. The handle_delete function does not attempt to sanitize or otherwise validate the contents of the [file] parameter (passed to the function as argv[1]), allowing an authenticated attacker to supply directory traversal primitives and delete semi-arbitrary files. | 2021-12-22 | not yet calculated | CVE-2021-21908 MISC |
garrett — metal_detectors |
Specially-crafted command line arguments can lead to arbitrary file deletion in the del .cnt|.log file delete command. An attacker can provide malicious inputs to trigger this vulnerability | 2021-12-22 | not yet calculated | CVE-2021-21909 MISC |
garrett — metal_detectors |
A directory traversal vulnerability exists in the CMA CLI getenv command functionality of Garrett Metal Detectors’ iC Module CMA Version 5.0. A specially-crafted command line argument can lead to local file inclusion. An attacker can provide malicious input to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21907 MISC |
garrett — metal_detectors |
Stack-based buffer overflow vulnerability exists in how the CMA readfile function of Garrett Metal Detectors iC Module CMA Version 5.0 is used at various locations. The Garrett iC Module exposes an authenticated CLI over TCP port 6877. This interface is used by a secondary GUI client, called “CMA Connect”, to interact with the iC Module on behalf of the user. Every time a user submits a password to the CLI password prompt, the buffer containing their input is passed as the password parameter to the checkPassword function. | 2021-12-22 | not yet calculated | CVE-2021-21906 MISC |
garrett — metal_detectors |
Stack-based buffer overflow vulnerability exists in how the CMA readfile function of Garrett Metal Detectors iC Module CMA Version 5.0 is used at various locations. The Garrett iC Module exposes an authenticated CLI over TCP port 6877. This interface is used by a secondary GUI client, called “CMA Connect”, to interact with the iC Module on behalf of the user. After a client successfully authenticates, they can send plaintext commands to manipulate the device. | 2021-12-22 | not yet calculated | CVE-2021-21905 MISC |
garrett — metal_detectors |
A directory traversal vulnerability exists in the CMA CLI setenv command of Garrett Metal Detectors’ iC Module CMA Version 5.0. An attacker can provide malicious input to trigger this vulnerability | 2021-12-22 | not yet calculated | CVE-2021-21904 MISC |
garrett — metal_detectors |
A stack-based buffer overflow vulnerability exists in the CMA check_udp_crc function of Garrett Metal Detectors’ iC Module CMA Version 5.0. A specially-crafted packet can lead to a stack-based buffer overflow during a call to strcpy. An attacker can send a malicious packet to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21903 MISC |
garrett — metal_detectors |
An authentication bypass vulnerability exists in the CMA run_server_6877 functionality of Garrett Metal Detectors iC Module CMA Version 5.0. A properly-timed network connection can lead to authentication bypass via session hijacking. An attacker can send a sequence of requests to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21902 MISC |
garrett — metal_detectors |
A stack-based buffer overflow vulnerability exists in the CMA check_udp_crc function of Garrett Metal Detectors’ iC Module CMA Version 5.0. A specially-crafted packet can lead to a stack-based buffer overflow during a call to memcpy. An attacker can send a malicious packet to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21901 MISC |
gerbv_project — gerbv |
An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-40394 MISC |
gerbv_project — gerbv |
An out-of-bounds write vulnerability exists in the RS-274X aperture macro variables handling functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit 71493260). A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-40393 MISC |
gnome — gimp |
GEGL before 0.4.34, as used (for example) in GIMP before 2.10.30, allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. | 2021-12-23 | not yet calculated | CVE-2021-45463 MISC MISC MISC MISC |
gnu — gnu |
An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service. | 2021-12-22 | not yet calculated | CVE-2021-45261 MISC |
gnuplot — gnuplot |
A Divide by Zero vulnerability exists in gnuplot 5.4 in the boundary3d function in graph3d.c, which could cause a Arithmetic exception and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44917 MISC |
go — gocd_server |
Adding a new pipeline in GoCD server version 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a Server Side Request Forgery (SSRF) | 2021-12-22 | not yet calculated | CVE-2021-44659 MISC MISC MISC MISC |
google — chrome |
Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38019 MISC MISC |
google — chrome |
Insufficient policy enforcement in contacts picker in Google Chrome on Android prior to 96.0.4664.45 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38020 MISC MISC |
google — chrome |
Inappropriate implementation in navigation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38018 MISC MISC |
google — chrome |
Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38022 MISC MISC |
google — chrome |
Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38017 MISC MISC |
google — chrome |
Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38016 MISC MISC |
google — chrome |
Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. | 2021-12-23 | not yet calculated | CVE-2021-38015 MISC MISC |
google — chrome |
Out of bounds write in Swiftshader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38014 MISC MISC |
google — chrome |
Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38021 MISC MISC |
google — chrome |
Insufficient data validation in new tab page in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4068 MISC MISC |
google — chrome |
Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38011 MISC MISC |
google — chrome |
Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4061 MISC MISC |
google — chrome |
Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4067 MISC MISC |
google — chrome |
Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4066 MISC MISC |
google — chrome |
Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4065 MISC MISC |
google — chrome |
Use after free in screen capture in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4064 MISC MISC |
google — chrome |
Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4063 MISC MISC |
google — chrome |
Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4062 MISC MISC |
google — chrome |
Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4078 MISC MISC |
google — chrome |
Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4059 MISC MISC |
google — chrome |
Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets. | 2021-12-23 | not yet calculated | CVE-2021-4079 MISC MISC |
google — chrome |
Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4058 MISC MISC |
google — chrome |
Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4057 MISC MISC |
google — chrome |
Type confusion in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4056 MISC MISC |
google — chrome |
Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. | 2021-12-23 | not yet calculated | CVE-2021-4055 MISC MISC |
google — chrome |
Incorrect security UI in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4054 MISC MISC |
google — chrome |
Use after free in UI in Google Chrome on Linux prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-4053 MISC MISC |
google — chrome |
Use after free in web apps in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. | 2021-12-23 | not yet calculated | CVE-2021-4052 MISC MISC |
google — chrome |
Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38012 MISC MISC |
google — chrome |
Heap buffer overflow in fingerprint recognition in Google Chrome on ChromeOS prior to 96.0.4664.45 allowed a remote attacker who had compromised a WebUI renderer process to potentially perform a sandbox escape via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38013 MISC MISC |
google — chrome |
Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38010 MISC MISC |
google — chrome |
Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38006 MISC MISC |
google — chrome |
Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38005 MISC MISC |
google — chrome |
Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38009 MISC MISC |
google — chrome |
Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38007 MISC MISC |
google — chrome |
Use after free in media in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 2021-12-23 | not yet calculated | CVE-2021-38008 MISC MISC |
gpac — gpac |
An infinite loop vulnerability exists in gpac 1.1.0 in the gf_log function, which causes a Denial of Service. | 2021-12-21 | not yet calculated | CVE-2021-44924 MISC |
gpac — gpac |
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_svg_get_attribute_name function, which causes a segmentation fault and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44925 MISC |
gpac — gpac |
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_internal function, which causes a segmentation fault and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44921 MISC |
gpac — gpac |
A null pointer dereference vulnerability exists in gpac 1.1.0 in the lsr_read_id.part function, which causes a segmentation fault and application crash. | 2021-12-22 | not yet calculated | CVE-2021-45260 MISC |
gpac — gpac |
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_sg_vrml_mf_append function, which causes a segmentation fault and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44927 MISC |
gpac — gpac |
An infinite loop vulnerability exists in Gpac 1.0.1 in gf_get_bit_size. | 2021-12-21 | not yet calculated | CVE-2021-45297 MISC |
gpac — gpac |
The gf_isom_hint_rtp_read function in GPAC 1.0.1 allows attackers to cause a denial of service (Invalid memory address dereference) via a crafted file in the MP4Box command. | 2021-12-21 | not yet calculated | CVE-2021-45292 MISC |
gpac — gpac |
The gf_dump_setup function in GPAC 1.0.1 allows malicoius users to cause a denial of service (Invalid memory address dereference) via a crafted file in the MP4Box command. | 2021-12-21 | not yet calculated | CVE-2021-45291 MISC |
gpac — gpac |
An invalid free vulnerability exists in gpac 1.1.0 via the gf_sg_command_del function, which causes a segmentation fault and application crash. | 2021-12-22 | not yet calculated | CVE-2021-45262 MISC |
gpac — gpac |
A vulnerability exists in GPAC 1.0.1 due to an omission of security-relevant Information, which could cause a Denial of Service. The program terminates with signal SIGKILL. | 2021-12-21 | not yet calculated | CVE-2021-45289 MISC |
gpac — gpac |
A Double Free vulnerability exists in filedump.c in GPAC 1.0.1, which could cause a Denail of Service via a crafted file in the MP4Box command. | 2021-12-21 | not yet calculated | CVE-2021-45288 MISC |
gpac — gpac |
A null pointer dereference vulnerability exists in the gpac in the gf_node_get_tag function, which causes a segmentation fault and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44926 MISC |
gpac — gpac |
An invalid memory address dereference vulnerability exists in gpac 1.1.0 in the dump_od_to_saf.isra function, which causes a segmentation fault and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44920 MISC |
gpac — gpac |
A null pointer dereference vulnerability exists in gpac 1.1.0 in the BD_CheckSFTimeOffset function, which causes a segmentation fault and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44922 MISC |
gpac — gpac |
A Null Pointer Dereference vulnerability exists in the gf_sg_vrml_mf_alloc function, which causes a segmentation fault and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44919 MISC |
gpac — gpac |
A Null Pointer Dereference vulnerability exists in gpac 1.1.0 in the gf_node_get_field function, which can cause a segmentation fault and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44918 MISC |
gpac — gpac |
An Invalid pointer reference vulnerability exists in gpac 1.1.0 via the gf_svg_node_del function, which causes a segmentation fault and application crash. | 2021-12-22 | not yet calculated | CVE-2021-45259 MISC |
gpac — gpac |
An invalid free vulnerability exists in gpac 1.1.0 via the gf_svg_delete_attribute_value function, which causes a segmentation fault and application crash. | 2021-12-22 | not yet calculated | CVE-2021-45263 MISC |
gpac — gpac |
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_dump_vrml_dyn_field.isra function, which causes a segmentation fault and application crash. | 2021-12-21 | not yet calculated | CVE-2021-44923 MISC |
gpac — gpac |
A stack overflow vulnerability exists in gpac 1.1.0 via the gf_bifs_dec_proto_list function, which causes a segmentation fault and application crash. | 2021-12-22 | not yet calculated | CVE-2021-45258 MISC |
gpac — gpac |
An invalid memory address dereference vulnerability exists in gpac 1.1.0 via the svg_node_start function, which causes a segmentation fault and application crash. | 2021-12-22 | not yet calculated | CVE-2021-45267 MISC |
groupsession — multiple_products |
Incorrect permission assignment for critical resource vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to access arbitrary files on the server and obtain sensitive information via unspecified vectors. | 2021-12-24 | not yet calculated | CVE-2021-20874 MISC MISC |
groupsession — multiple_products |
Path traversal vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows an attacker with an administrative privilege to obtain sensitive information stored in the hierarchy above the directory on the published site’s server via unspecified vectors. | 2021-12-24 | not yet calculated | CVE-2021-20876 MISC MISC |
groupsession — multiple_products |
Open redirect vulnerability in GroupSession Free edition ver5.1.1 and earlier, GroupSession byCloud ver5.1.1 and earlier, and GroupSession ZION ver5.1.1 and earlier allows a remote unauthenticated attacker to redirect users to arbitrary web sites and conduct phishing attacks by having a user to access a specially crafted URL. | 2021-12-24 | not yet calculated | CVE-2021-20875 MISC MISC |
gurock — testrail |
Gurock TestRail before 7.2.4 mishandles HTML escaping. | 2021-12-20 | not yet calculated | CVE-2021-44263 CONFIRM |
hivex — hivex |
A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability. | 2021-12-23 | not yet calculated | CVE-2021-3622 MISC FEDORA FEDORA MISC MISC |
humhub — humhub |
HumHub is an open-source social network kit written in PHP. Prior to HumHub version 1.10.3 or 1.9.3, it could be possible for registered users to become unauthorized members of private Spaces. Versions 1.10.3 and 1.9.3 contain a patch for this issue. | 2021-12-20 | not yet calculated | CVE-2021-43847 MISC MISC MISC MISC CONFIRM |
ibm — business_process_manager |
IBM Business Process Manager 8.5 and 8.6 and IBM Business Automation Workflow 18.0, 19.0, 20.0 and 21.0 are vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 209512. | 2021-12-21 | not yet calculated | CVE-2021-38893 XF CONFIRM CONFIRM |
ibm — business_process_manager |
IBM Business Process Manager 8.5 and 8.6 and IBM Business Automation Workflow 18.0, 19.0, 20.0 and 21.0 could allow a privileged user to obtain highly sensitive information due to improper access controls. IBM X-Force ID: 209607. | 2021-12-21 | not yet calculated | CVE-2021-38900 CONFIRM CONFIRM XF |
ibm — cloud_pak_for_security |
IBM Cloud Pak for Security (CP4S) 1.7.2.0, 1.7.1.0, and 1.7.0.0 could allow an authenticated user to obtain sensitive information in HTTP responses that could be used in further attacks against the system. IBM X-Force ID: 213651. | 2021-12-22 | not yet calculated | CVE-2021-39013 XF CONFIRM |
idec_plcs — idec_plcs |
Plaintext storage of a password vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the attacker may access the PLC Web server and hijack the PLC, and manipulation of the PLC output and/or suspension of the PLC may be conducted. | 2021-12-24 | not yet calculated | CVE-2021-20827 MISC MISC |
idec_plcs — idec_plcs |
Unprotected transport of credentials vulnerability in IDEC PLCs (FC6A Series MICROSmart All-in-One CPU module v2.32 and earlier, FC6A Series MICROSmart Plus CPU module v1.91 and earlier, WindLDR v8.19.1 and earlier, WindEDIT Lite v1.3.1 and earlier, and Data File Manager v2.12.1 and earlier) allows an attacker to obtain the PLC Web server user credentials from the communication between the PLC and the software. As a result, the complete access privileges to the PLC Web server may be obtained, and manipulation of the PLC output and/or suspension of the PLC may be conducted. | 2021-12-24 | not yet calculated | CVE-2021-20826 MISC MISC |
invoiceninja — invoiceninja |
invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-24 | not yet calculated | CVE-2021-3977 MISC CONFIRM |
jfrog_artifactory — jfrog_artifactory |
JFrog Artifactory before 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query. | 2021-12-20 | not yet calculated | CVE-2021-3860 MISC |
js-data — js-data |
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655). | 2021-12-24 | not yet calculated | CVE-2021-23574 CONFIRM CONFIRM CONFIRM CONFIRM CONFIRM CONFIRM |
jsx-slack — jsx-slack |
jsx-slack is a package for building JSON objects for Slack block kit surfaces from JSX. The maintainers found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient tfor protection from a Regular Expression Denial of Service (ReDoS) attack. If an attacker can put a lot of JSX elements into `<blockquote>` tag _with including multibyte characters_, an internal regular expression for escaping characters may consume an excessive amount of computing resources. v4.5.1 passes the test against ASCII characters but misses the case of multibyte characters. jsx-slack v4.5.2 has updated regular expressions for escaping blockquote characters to prevent catastrophic backtracking. It is also including an updated test case to confirm rendering multiple tags in `<blockquote>` with multibyte characters. | 2021-12-20 | not yet calculated | CVE-2021-43843 CONFIRM MISC MISC MISC |
kataras — iris |
This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder. | 2021-12-24 | not yet calculated | CVE-2021-23772 CONFIRM CONFIRM CONFIRM |
lantronix — premierwave |
A specially-crafted HTTP request can lead to arbitrary command execution in EC keypasswd parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21875 MISC |
lantronix — premierwave |
An OS command injection vulnerability exists in the Web Manager Diagnostics: Traceroute functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21872 MISC |
lantronix — premierwave |
Specially-crafted HTTP requests can lead to arbitrary command execution in PUT requests. An attacker can make authenticated HTTP requests to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21876 MISC |
lantronix — premierwave |
Specially-crafted HTTP requests can lead to arbitrary command execution in “GET” requests. An attacker can make authenticated HTTP requests to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21877 MISC |
lantronix — premierwave |
A specially-crafted HTTP request can lead to arbitrary command execution in DSA keypasswd parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21874 MISC |
lantronix — premierwave |
A specially-crafted HTTP request can lead to arbitrary command execution in RSA keypasswd parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21873 MISC |
lantronix — premierwave |
An OS command injection vulnerability exists in the Web Manager Wireless Network Scanner functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21881 MISC |
lantronix — premierwave |
A stack-based buffer overflow vulnerability exists in the Web Manager SslGenerateCSR functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21887 MISC |
lantronix — premierwave |
An OS command injection vulnerability exists in the Web Manager SslGenerateCSR functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21884 MISC |
lantronix — premierwave |
A stack-based buffer overflow vulnerability exists in the Web Manager FsUnmount functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21892 MISC |
lantronix — premierwave |
An OS command injection vulnerability exists in the Web Manager SslGenerateCertificate functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21888 MISC |
lantronix — premierwave |
A stack-based buffer overflow vulnerability exists in the Web Manager FsBrowseClean functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution in the vulnerable portion of the branch (deletefile). An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21891 MISC |
lantronix — premierwave |
A local file inclusion vulnerability exists in the Web Manager Applications and FsBrowse functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted series of HTTP requests can lead to local file inclusion. An attacker can make a series of authenticated HTTP requests to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21878 MISC |
lantronix — premierwave |
A directory traversal vulnerability exists in the Web Manager FsMove functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially crafted HTTP request can lead to local file inclusion. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21885 MISC |
lantronix — premierwave |
A directory traversal vulnerability exists in the Web Manager FSBrowsePage functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially crafted HTTP request can lead to information disclosure. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21886 MISC |
lantronix — premierwave |
A stack-based buffer overflow vulnerability exists in the Web Manager Ping functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21889 MISC |
lantronix — premierwave |
An OS command injection vulnerability exists in the Web Manager Diagnostics: Ping functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21883 MISC |
lantronix — premierwave |
A stack-based buffer overflow vulnerability exists in the Web Manager FsBrowseClean functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution in the vulnerable portion of the branch (deletedir). An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21890 MISC |
lantronix — premierwave |
A directory traversal vulnerability exists in the Web Manager FsTFtp functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to arbitrary file overwrite FsTFtp file disclosure. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21894 MISC |
lantronix — premierwave |
An OS command injection vulnerability exists in the Web Manager FsUnmount functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21882 MISC |
lantronix — premierwave |
A directory traversal vulnerability exists in the Web Manager FsTFtp functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to FsTFtp file overwrite. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21895 MISC |
lantronix — premierwave |
A directory traversal vulnerability exists in the Web Manager FsCopyFile functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to local file inclusion. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21880 MISC |
lantronix — premierwave |
A directory traversal vulnerability exists in the Web Manager FsBrowseClean functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to arbitrary file deletion. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21896 MISC |
lantronix — premierwave |
A directory traversal vulnerability exists in the Web Manager File Upload functionality of Lantronix PremierWave 2050 8.9.0.0R4. A specially-crafted HTTP request can lead to arbitrary file overwrite. An attacker can make an authenticated HTTP request to trigger this vulnerability. | 2021-12-22 | not yet calculated | CVE-2021-21879 MISC |
lib/cmd.js — lib/cmd.js |
lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter. | 2021-12-22 | not yet calculated | CVE-2021-45459 MISC MISC |
linux — linux_kernel |
In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small. | 2021-12-25 | not yet calculated | CVE-2021-45486 MISC MISC MISC |
linux — linux_kernel |
A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object. | 2021-12-22 | not yet calculated | CVE-2021-44733 MISC MISC |
linux — linux_kernel |
In __f2fs_setxattr in fs/f2fs/xattr.c in the Linux kernel through 5.15.11, there is an out-of-bounds memory access when an inode has an invalid last xattr entry. | 2021-12-23 | not yet calculated | CVE-2021-45469 MISC MISC MLIST |
linux — linux_kernel |
In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn’t properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses. | 2021-12-25 | not yet calculated | CVE-2021-45485 MISC MISC MISC |
linux — linux_kernel |
An issue was discovered in the Linux kernel before 5.15.11. There is a memory leak in the __rds_conn_create() function in net/rds/connection.c in a certain combination of circumstances. | 2021-12-24 | not yet calculated | CVE-2021-45480 MISC MISC |
mart_developers_inc — iorder |
An HTML Injection Vulnerability in iOrder 1.0 allows the remote attacker to execute Malicious HTML codes via the signup form | 2021-12-20 | not yet calculated | CVE-2021-43441 MISC MISC |
mediawiki — mediawiki |
In MediaWiki through 1.37, XSS can occur in Wikibase because an external identifier property can have a URL format that includes a $1 formatter substitution marker, and the javascript: URL scheme (among others) can be used. | 2021-12-24 | not yet calculated | CVE-2021-45472 MISC MISC |
mediawiki — mediawiki |
In MediaWiki through 1.37, the Special:ImportFile URI (aka FileImporter) allows XSS, as demonstrated by the clientUrl parameter. | 2021-12-24 | not yet calculated | CVE-2021-45474 MISC MISC |
mediawiki — mediawiki |
In MediaWiki through 1.37, Wikibase item descriptions allow XSS, which is triggered upon a visit to an action=info URL (aka a page-information sidebar). | 2021-12-24 | not yet calculated | CVE-2021-45473 MISC MISC |
mediawiki — mediawiki |
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=edit&undo= followed by action=mcrundo and action=mcrrestore to view private pages on a private wiki that has at least one page set in $wgWhitelistRead. | 2021-12-20 | not yet calculated | CVE-2021-44858 CONFIRM MISC |
mediawiki — mediawiki |
In MediaWiki through 1.37, blocked IP addresses are allowed to edit EntitySchema items. | 2021-12-24 | not yet calculated | CVE-2021-45471 MISC MISC MISC |
mesa_labs — amegaview |
Mesa Labs AmegaView Versions 3.0 uses default cookies that could be set to bypass authentication to the web application, which may allow an attacker to gain access. | 2021-12-21 | not yet calculated | CVE-2021-27453 CONFIRM |
mesa_labs — amegaview |
Mesa Labs AmegaView Versions 3.0 and prior’s passcode is generated by an easily reversible algorithm, which may allow an attacker to gain access to the device. | 2021-12-21 | not yet calculated | CVE-2021-27451 CONFIRM |
mesa_labs — amegaview |
Mesa Labs AmegaView version 3.0 is vulnerable to a command injection, which may allow an attacker to remotely execute arbitrary code. | 2021-12-21 | not yet calculated | CVE-2021-27447 MISC |
mesa_labs — amegaview |
Mesa Labs AmegaView Versions 3.0 and prior has insecure file permissions that could be exploited to escalate privileges on the device. | 2021-12-21 | not yet calculated | CVE-2021-27445 CONFIRM |
mesa_labs — amegaview |
Mesa Labs AmegaView Versions 3.0 and prior has a command injection vulnerability that can be exploited to execute commands in the web server. | 2021-12-21 | not yet calculated | CVE-2021-27449 CONFIRM |
msedgeredirect — msedgeredirect |
MSEdgeRedirect is a tool to redirect news, search, widgets, weather, and more to a user’s default browser. MSEdgeRedirect versions before 0.5.0.1 are vulnerable to Remote Code Execution via specifically crafted URLs. This vulnerability requires user interaction and the acceptance of a prompt. With how MSEdgeRedirect is coded, parameters are impossible to pass to any launched file. However, there are two possible scenarios in which an attacker can do more than a minor annoyance. In Scenario 1 (confirmed), a user visits an attacker controlled webpage; the user is prompted with, and downloads, an executable payload; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and RCE executes the payload the user previously downloaded, if the download path is successfully guessed. In Scenario 2 (not yet confirmed), a user visits an attacked controlled webpage; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and a payload on a remote, attacker controlled, SMB server is executed. The issue was found in the _DecodeAndRun() function, in which I incorrectly assumed _WinAPI_UrlIs() would only accept web resources. Unfortunately, file:/// passes the default _WinAPI_UrlIs check(). File paths are now directly checked for and must fail. There is no currently known exploitation of this vulnerability in the wild. A patched version, 0.5.0.1, has been released that checks for and denies these crafted URLs. There are no workarounds for this issue. Users are advised not to accept any unexpected prompts from web pages. | 2021-12-20 | not yet calculated | CVE-2021-43844 CONFIRM MISC |
myscada — mypro | mySCADA myPRO: Versions 8.20.0 and prior has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter. | 2021-12-23 | not yet calculated | CVE-2021-23198 MISC |
myscada — mypro |
An additional, nondocumented administrative account exists in mySCADA myPRO Versions 8.20.0 and prior that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface. | 2021-12-23 | not yet calculated | CVE-2021-43987 MISC |
myscada — mypro |
mySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands. | 2021-12-23 | not yet calculated | CVE-2021-44453 MISC |
myscada — mypro |
mySCADA myPRO Versions 8.20.0 and prior stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes. | 2021-12-23 | not yet calculated | CVE-2021-43989 MISC |
myscada — mypro |
mySCADA myPRO: Versions 8.20.0 and prior has a feature to send emails, which may allow an attacker to inject arbitrary operating system commands through a specific parameter. | 2021-12-23 | not yet calculated | CVE-2021-43981 MISC |
myscada — mypro |
An unauthenticated remote attacker can access mySCADA myPRO Versions 8.20.0 and prior without any form of authentication or authorization. | 2021-12-23 | not yet calculated | CVE-2021-43985 MISC |
myscada — mypro |
mySCADA myPRO: Versions 8.20.0 and prior has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter. | 2021-12-23 | not yet calculated | CVE-2021-43984 MISC |
myscada — mypro |
mySCADA myPRO: Versions 8.20.0 and prior has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter. | 2021-12-23 | not yet calculated | CVE-2021-22657 MISC |
nasm — nasm |
A Null Pointer Dereference vulnerability existfs in nasm 2.16rc0 via asm/preproc.c. | 2021-12-22 | not yet calculated | CVE-2021-45256 MISC |
nasm — nasm |
An infinite loop vulnerability exists in nasm 2.16rc0 via the gpaste_tokens function. | 2021-12-22 | not yet calculated | CVE-2021-45257 MISC |
netapp — storagegrid |
StorageGRID (formerly StorageGRID Webscale) versions 11.5 prior to 11.5.0.5 are susceptible to a vulnerability which may allow an administrative user to escalate their privileges and modify settings in SANtricity System Manager. | 2021-12-23 | not yet calculated | CVE-2021-27006 MISC |
netapp — virtual_desktop_service |
NetApp Virtual Desktop Service (VDS) when used with an HTML5 gateway is susceptible to a vulnerability which when successfully exploited could allow an unauthenticated attacker to takeover a Remote Desktop Session. | 2021-12-23 | not yet calculated | CVE-2021-27007 MISC |
netbsd — netbsd |
In NetBSD through 9.2, the IPv4 ID generation algorithm does not use appropriate cryptographic measures. | 2021-12-25 | not yet calculated | CVE-2021-45487 MISC MISC |
netbsd — netbsd |
In NetBSD through 9.2, the IPv6 Flow Label generation algorithm employs a weak cryptographic PRNG. | 2021-12-25 | not yet calculated | CVE-2021-45489 MISC MISC |
netbsd — netbsd |
In NetBSD through 9.2, there is an information leak in the TCP ISN (ISS) generation algorithm. | 2021-12-25 | not yet calculated | CVE-2021-45488 MISC MISC |
netbsd — netbsd |
In NetBSD through 9.2, the IPv6 fragment ID generation algorithm employs a weak cryptographic PRNG. | 2021-12-25 | not yet calculated | CVE-2021-45484 MISC MISC |
nltk — nltk |
NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. Versions prior to 3.6.5 are vulnerable to regular expression denial of service (ReDoS) attacks. The vulnerability is present in PunktSentenceTokenizer, sent_tokenize and word_tokenize. Any users of this class, or these two functions, are vulnerable to the ReDoS attack. In short, a specifically crafted long input to any of these vulnerable functions will cause them to take a significant amount of execution time. If your program relies on any of the vulnerable functions for tokenizing unpredictable user input, then we would strongly recommend upgrading to a version of NLTK without the vulnerability. For users unable to upgrade the execution time can be bounded by limiting the maximum length of an input to any of the vulnerable functions. Our recommendation is to implement such a limit. | 2021-12-23 | not yet calculated | CVE-2021-43854 MISC MISC CONFIRM MISC |
nvidia — geforce |
NVIDIA GeForce Experience contains a vulnerability in user authorization, where GameStream does not correctly apply individual user access controls for users on the same device, which, with user intervention, may lead to escalation of privileges, information disclosure, data tampering, and denial of service, affecting other resources beyond the intended security authority of GameStream. | 2021-12-23 | not yet calculated | CVE-2021-23175 CONFIRM |
online_enrollment_management_system — online_enrollment_management_system |
The id parameter from Online Enrollment Management System 1.0 system appears to be vulnerable to SQL injection attacks. A crafted payload injects a SQL sub-query that calls MySQL’s load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve sensitive information for all users of this system. | 2021-12-23 | not yet calculated | CVE-2021-44599 MISC |
open5gs — open5gs |
In Open5GS 2.4.0, a crafted packet from UE can crash SGW-U/UPF. | 2021-12-23 | not yet calculated | CVE-2021-45462 MISC |
open_design_alliance — drawings_explorer |
An out-of-bounds read vulnerability exists when reading a BMP file using Open Design Alliance (ODA) Drawings Explorer before 2022.12. The specific issue exists after loading BMP files. Unchecked input data from a crafted BMP file leads to an out-of-bounds read. An attacker can leverage this vulnerability to execute code in the context of the current process. | 2021-12-21 | not yet calculated | CVE-2021-44423 MISC |
open_design_alliance — drawings_sdk |
An Improper Input Validation Vulnerability exists when reading a BMP file using Open Design Alliance Drawings SDK before 2022.12. Crafted data in a BMP file can trigger a write operation past the end of an allocated buffer, or lead to a heap-based buffer overflow. An attacker can leverage this vulnerability to execute code in the context of the current process. | 2021-12-21 | not yet calculated | CVE-2021-44422 MISC |
opendesign — drawings_sdk |
An out-of-bounds read vulnerability exists when reading a TGA file using Open Design Alliance Drawings SDK before 2022.12. The specific issue exists after loading TGA files. An unchecked input data from a crafted TGA file leads to an out-of-bounds read. An attacker can leverage this vulnerability to execute code in the context of the current process. | 2021-12-21 | not yet calculated | CVE-2021-44859 MISC |
opendesign — drawings_sdk |
An out-of-bounds read vulnerability exists when reading a TIF file using Open Design Alliance Drawings SDK before 2022.12. The specific issue exists after loading TIF files. An unchecked input data from a crafted TIF file leads to an out-of-bounds read. An attacker can leverage this vulnerability to execute code in the context of the current process. | 2021-12-21 | not yet calculated | CVE-2021-44860 MISC |
opmantak — open-audit |
An issue was discovered in Opmantek Open-AudIT after 3.5.0. Without authentication, a vulnerability in code_igniter/application/controllers/util.php allows an attacker perform command execution without echoes. | 2021-12-22 | not yet calculated | CVE-2021-40612 MISC MISC |
opmantek — open-auditit_community |
Opmantek Open-AudIT Community 4.2.0 (Fixed in 4.3.0) is affected by a Cross Site Scripting (XSS) vulnerability. If a bad value is passed to the routine via a URL, malicious JavaScript code can be executed in the victim’s browser. | 2021-12-20 | not yet calculated | CVE-2021-44916 MISC MISC MISC |
parse-link-header — parse-link-header |
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function. | 2021-12-24 | not yet calculated | CVE-2021-23490 CONFIRM CONFIRM CONFIRM |
pimcore — pimcore |
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) | 2021-12-21 | not yet calculated | CVE-2021-4139 MISC CONFIRM |
pjsip — pjsip |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming RTCP BYE message contains a reason’s length, this declared length is not checked against the actual received packet size, potentially resulting in an out-of-bound read access. This issue affects all users that use PJMEDIA and RTCP. A malicious actor can send a RTCP BYE message with an invalid reason length. Users are advised to upgrade as soon as possible. There are no known workarounds. | 2021-12-22 | not yet calculated | CVE-2021-43804 CONFIRM MISC |
pjsip –pjsip |
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds. | 2021-12-22 | not yet calculated | CVE-2021-37706 CONFIRM MISC |
podman — podman |
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host’s firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host’s services by forwarding all ports to the VM. | 2021-12-23 | not yet calculated | CVE-2021-4024 MISC MISC |
prestashop — prestashop |
PrestaShop before 1.5.2 allows XSS via the “<object data=’data:text/html” substring in the message field. | 2021-12-21 | not yet calculated | CVE-2012-20001 MISC |
privoxy — privoxy |
An XSS vulnerability was found in Privoxy which was fixed in cgi_error_no_template() by encode the template name when Privoxy is configured to servce the user-manual itself. | 2021-12-23 | not yet calculated | CVE-2021-44543 MISC MISC |
privoxy — privoxy |
A memory leak vulnerability was found in Privoxy when handling errors. | 2021-12-23 | not yet calculated | CVE-2021-44542 MISC MISC |
privoxy — privoxy |
A vulnerability was found in Privoxy which was fixed in process_encrypted_request_headers() by freeing header memory when failing to get the request destination. | 2021-12-23 | not yet calculated | CVE-2021-44541 MISC MISC |
privoxy — privoxy |
A vulnerability was found in Privoxy which was fixed in get_url_spec_param() by freeing memory of compiled pattern spec before bailing. | 2021-12-23 | not yet calculated | CVE-2021-44540 MISC MISC |
projectworlds — hospital_management_system |
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in admin_home.php. | 2021-12-22 | not yet calculated | CVE-2021-43629 MISC MISC |
projectworlds — hospital_management_system |
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the appointment_no parameter in payment.php. | 2021-12-22 | not yet calculated | CVE-2021-43631 MISC MISC |
projectworlds — hospital_management_system |
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the email parameter in hms-staff.php. | 2021-12-22 | not yet calculated | CVE-2021-43628 MISC MISC |
projectworlds — hospital_management_system |
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server. | 2021-12-22 | not yet calculated | CVE-2021-43630 MISC MISC |
projectworlds — online_book_store |
In ProjectWorlds Online Book Store PHP 1.0 a CSRF vulnerability in admin_delete.php allows a remote attacker to delete any book. | 2021-12-22 | not yet calculated | CVE-2021-43156 MISC |
projectworlds — online_book_store |
Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php. | 2021-12-22 | not yet calculated | CVE-2021-43157 MISC MISC |
projectworlds — online_book_store |
Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the “bookisbn” parameter in cart.php. | 2021-12-22 | not yet calculated | CVE-2021-43155 MISC |
projectworlds — online_book_store |
In ProjectWorlds Online Shopping System PHP 1.0, a CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer’s cart. | 2021-12-22 | not yet calculated | CVE-2021-43158 MISC MISC |
pytorch_lightning — pytorch_lightning |
pytorch-lightning is vulnerable to Deserialization of Untrusted Data | 2021-12-23 | not yet calculated | CVE-2021-4118 MISC CONFIRM |
quest — kace_desktop_authority | Quest KACE Desktop Authority before 11.2 allows XSS because it does not prevent untrusted HTML from reaching the jQuery.htmlPrefilter method of jQuery. | 2021-12-22 | not yet calculated | CVE-2021-44030 CONFIRM |
quest — kace_desktop_authority |
An issue was discovered in Quest KACE Desktop Authority before 11.2. /dacomponentui/profiles/profileitems/outlooksettings/Insertimage.aspx contains a vulnerability that could allow pre-authentication remote code execution. An attacker could upload a .ASP file to reside at /images/{GUID}/{filename}. | 2021-12-22 | not yet calculated | CVE-2021-44031 MISC |
quest — kace_desktop_authority |
An issue was discovered in Quest KACE Desktop Authority before 11.2. This vulnerability allows attackers to execute remote code through a deserialization exploitation in the RadAsyncUpload function of ASP.NET AJAX. An attacker can leverage this vulnerability when the encryption keys are known (due to the presence of CVE-2017-11317, CVE-2017-11357, or other means). A default setting for the type whitelisting feature in more current versions of ASP.NET AJAX prevents exploitation. | 2021-12-22 | not yet calculated | CVE-2021-44029 MISC |
quest — kace_desktop_authority |
XXE can occur in Quest KACE Desktop Authority before 11.2 because the log4net configuration file might be controlled by an attacker, a related issue to CVE-2018-1285. | 2021-12-22 | not yet calculated | CVE-2021-44028 MISC |
realtek — rtl8195am_device |
A stack buffer overflow was discovered on Realtek RTL8195AM device before 2.0.10, it exists in the client code when an attacker sends a big size Authentication challenge text in WEP security. | 2021-12-22 | not yet calculated | CVE-2021-39306 MISC MISC |
rockoa — rockoa |
A cross-site request forgery (CSRF) in Rockoa v1.9.8 allows an authenticated attacker to arbitrarily add an administrator account. | 2021-12-22 | not yet calculated | CVE-2020-20593 MISC MISC |
samsung — printers |
The SyncThru Web Service on Samsung SCX-6x55X printers allows an attacker to gain access to a list of SMB users and cleartext passwords by reading the HTML source code. Authentication is not required. | 2021-12-20 | not yet calculated | CVE-2021-42913 MISC MISC |
simple — cold_storage_management_system |
The id parameter in view_storage.php from Simple Cold Storage Management System 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL’s load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. | 2021-12-21 | not yet calculated | CVE-2021-45253 MISC |
simple — forum_discussion_system |
Multiple SQL injection vulnerabilities are found on Simple Forum-Discussion System 1.0 For example on three applications which are manage_topic.php, manage_user.php, and ajax.php. The attacker can be retrieving all information from the database of this system by using this vulnerability. | 2021-12-21 | not yet calculated | CVE-2021-45252 MISC |
simple_online_mens_salon_management_system — simple_online_mens_salon_management_system |
The password parameter on Simple Online Mens Salon Management System (MSMS) 1.0 appears to be vulnerable to SQL injection attacks through the password parameter. The predictive tests of this application interacted with that domain, indicating that the injected SQL query was executed. The attacker can retrieve all authentication and information about the users of this system. | 2021-12-23 | not yet calculated | CVE-2021-44600 MISC |
solarwinds — orion |
It has been reported that any Orion user, e.g. guest accounts can query the Orion.UserSettings entity and enumerate users and their basic settings. | 2021-12-20 | not yet calculated | CVE-2021-35248 MISC MISC MISC |
solarwinds — orion |
The “Log alert to a file” action within action management enables any Orion Platform user with Orion alert management rights to write to any file. An attacker with Orion alert management rights could use this vulnerability to perform an unrestricted file upload causing a remote code execution. | 2021-12-20 | not yet calculated | CVE-2021-35244 MISC MISC MISC |
solarwinds — orion |
Numerous exposed dangerous functions within Orion Core has allows for read-only SQL injection leading to privileged escalation. An attacker with low-user privileges may steal password hashes and password salt information. | 2021-12-20 | not yet calculated | CVE-2021-35234 MISC MISC MISC MISC MISC MISC MISC MISC MISC MISC MISC MISC |
solarwinds — web_help_desk |
The HTTP PUT and DELETE methods were enabled in the Web Help Desk web server (12.7.6 and earlier), allowing users to execute dangerous HTTP requests. The HTTP PUT method is normally used to upload data that is saved on the server with a user-supplied URL. While the DELETE method requests that the origin server removes the association between the target resource and its current functionality. Improper use of these methods may lead to a loss of integrity. | 2021-12-23 | not yet calculated | CVE-2021-35243 MISC |
solidusio — solidus |
`solidus_frontend` is the cart and storefront for the Solidus e-commerce project. Versions of `solidus_frontend` prior to 3.1.5, 3.0.5, and 2.11.14 contain a cross-site request forgery (CSRF) vulnerability that allows a malicious site to add an item to the user’s cart without their knowledge. Versions 3.1.5, 3.0.5, and 2.11.14 contain a patch for this issue. The patch adds CSRF token verification to the “Add to cart” action. Adding forgery protection to a form that missed it can have some side effects. Other CSRF protection strategies as well as a workaround involving modifcation to config/application.rb` are available. More details on these mitigations are available in the GitHub Security Advisory. | 2021-12-20 | not yet calculated | CVE-2021-43846 MISC MISC CONFIRM |
sonicwall — sma100_series |
A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions. | 2021-12-23 | not yet calculated | CVE-2021-20049 CONFIRM |
sonicwall — sma100_series |
An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data. | 2021-12-23 | not yet calculated | CVE-2021-20050 CONFIRM |
sourcecodetester — engineers_online_portal |
In sourcecodetester Engineers Online Portal as of 10-21-21, an attacker can manipulate the Host header as seen by the web application and cause the application to behave in unexpected ways. Very often multiple websites are hosted on the same IP address. This is where the Host Header comes in. This header specifies which website should process the HTTP request. The web server uses the value of this header to dispatch the request to the specified website. Each website hosted on the same IP address is called a virtual host. And It’s possible to send requests with arbitrary Host Headers to the first virtual host. | 2021-12-20 | not yet calculated | CVE-2021-43437 MISC MISC |
sssd — sssd |
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | 2021-12-23 | not yet calculated | CVE-2021-3621 MISC MISC |
starcharge — multiple_products | Certain Starcharge products are affected by Improper Input Validation. The affected products include: Nova 360 Cabinet <= 1.3.0.0.7b102 – Fixed: Beta1.3.0.1.0 and Titan 180 Premium <= 1.3.0.0.6 – Fixed: 1.3.0.0.9. | 2021-12-22 | not yet calculated | CVE-2021-45419 MISC MISC MISC |
starcharge — multiple_products |
Certain Starcharge products are vulnerable to Directory Traversal via main.cgi. The affected products include: Nova 360 Cabinet <=1.3.0.0.6 – Fixed: 1.3.0.0.9 and Titan 180 Premium <=1.3.0.0.7b102 – Fixed: Beta1.3.0.1.0. | 2021-12-22 | not yet calculated | CVE-2021-45418 MISC MISC MISC |
stormshield — stormshield_endpoint_security |
Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control. | 2021-12-21 | not yet calculated | CVE-2021-45091 MISC |
stormshield — stormshield_endpoint_security |
Stormshield Endpoint Security before 2.1.2 allows remote code execution. | 2021-12-21 | not yet calculated | CVE-2021-45090 MISC |
stormshield — stormshield_endpoint_security |
Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control. | 2021-12-21 | not yet calculated | CVE-2021-45089 MISC |
thales — safenet_agent |
A user of a machine protected by SafeNet Agent for Windows Logon may leverage weak entropy to access the encrypted credentials of any or all the users on that machine. | 2021-12-20 | not yet calculated | CVE-2021-42138 MISC MISC MISC |
thales — sentinel_protection_installer |
Improper Access Control in Thales Sentinel Protection Installer could allow a local user to escalate privileges. | 2021-12-20 | not yet calculated | CVE-2021-42808 MISC |
thales — sentinel_protection_installer |
Improper Access Control of Dynamically-Managed Code Resources (DLL) in Thales Sentinel Protection Installer could allow the execution of arbitrary code. | 2021-12-20 | not yet calculated | CVE-2021-42809 MISC |
theforeman — foreman |
A server side remote code execution vulnerability was found in Foreman project. A authenticated attacker could use Sendmail configuration options to overwrite the defaults and perform command injection. The highest threat from this vulnerability is to confidentiality, integrity and availability of system. Fixed releases are 2.4.1, 2.5.1, 3.0.0. | 2021-12-23 | not yet calculated | CVE-2021-3584 MISC MISC MISC |
thinfinity — virtualui |
Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate users registered in the OS (Windows) through the /changePassword URI. By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt. | 2021-12-20 | not yet calculated | CVE-2021-44554 MISC |
thinkcmf — thinkcmf |
An issue in ThinkCMF X2.2.2 and below allows attackers to execute arbitrary code via a crafted packet. | 2021-12-22 | not yet calculated | CVE-2020-20601 MISC |
tp-link — ax10v1 |
A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading into a cache poisoning attack. | 2021-12-17 | not yet calculated | CVE-2021-41451 MISC MISC MISC |
tp-link — wifi_router |
TP-Link wifi router TL-WR802N V4(JP), with firmware version prior to 211202, is vulnerable to OS command injection. | 2021-12-23 | not yet calculated | CVE-2021-4144 JVN CONFIRM |
uti_mutual_fund_android_application — uti_mutual_fund_android_application |
An issue was discovered in UTI Mutual fund Android application 5.4.18 and prior, allows attackers to brute force enumeration of usernames determined by the error message returned after invalid credentials are attempted. | 2021-12-23 | not yet calculated | CVE-2020-35398 MISC MISC |
video_sharing_website — video_sharing_website |
The email parameter from ajax.php of Video Sharing Website 1.0 appears to be vulnerable to SQL injection attacks. A payload injects a SQL sub-query that calls MySQL’s load_file function with a UNC file path that references a URL on an external domain. The application interacted with that domain, indicating that the injected SQL query was executed. | 2021-12-21 | not yet calculated | CVE-2021-45255 MISC |
vim — vim |
vim is vulnerable to Heap-based Buffer Overflow | 2021-12-19 | not yet calculated | CVE-2021-4136 CONFIRM MISC |
vim — vim |
vim is vulnerable to Out-of-bounds Read | 2021-12-25 | not yet calculated | CVE-2021-4166 CONFIRM MISC |
vmware — workspace_one_access |
VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 and Identity Manager 3.3.5, 3.3.4, and 3.3.3 contain an SSRF vulnerability. A malicious actor with network access may be able to make HTTP requests to arbitrary origins and read the full response. | 2021-12-20 | not yet calculated | CVE-2021-22056 MISC |
vmware — workspace_one_access |
VMware Workspace ONE Access 21.08, 20.10.0.1, and 20.10 contain an authentication bypass vulnerability. A malicious actor, who has successfully provided first-factor authentication, may be able to obtain second-factor authentication provided by VMware Verify. | 2021-12-20 | not yet calculated | CVE-2021-22057 MISC |
webassembly — binaryen |
A Denial of Service vulnerability exits in Binaryen 103 due to an assertion abort in wasm::handle_unreachable. | 2021-12-21 | not yet calculated | CVE-2021-45290 MISC |
webassembly — binaryen |
A Denial of Service vulnerability exists in Binaryen 103 due to an Invalid memory address dereference in wasm::WasmBinaryBuilder::visitLet. | 2021-12-21 | not yet calculated | CVE-2021-45293 MISC |
webkitgtk — webkitgtk |
In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889. | 2021-12-25 | not yet calculated | CVE-2021-45483 MISC |
webkitgtk — webkitgtk |
In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::ContainerNode::firstChild, a different vulnerability than CVE-2021-30889. | 2021-12-25 | not yet calculated | CVE-2021-45482 MISC |
webkitgtk — webkitgtk |
In WebKitGTK before 2.32.4, there is incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application crash, a different vulnerability than CVE-2021-30889. | 2021-12-25 | not yet calculated | CVE-2021-45481 MISC |
wordpress — directorist |
The Directorist WordPress plugin before 7.0.6.2 was vulnerable to Cross-Site Request Forgery to Remote File Upload leading to arbitrary PHP shell uploads in the wp-content/plugins directory. | 2021-12-21 | not yet calculated | CVE-2021-24981 MISC MISC |
wordpress — logo_carousel |
The Logo Carousel WordPress plugin before 3.4.2 allows users with a role as low as Contributor to duplicate and view arbitrary private posts made by other users via the Carousel Duplication feature | 2021-12-21 | not yet calculated | CVE-2021-24739 MISC |
wordpress — logo_carousel |
The Logo Carousel WordPress plugin before 3.4.2 does not validate and escape the “Logo Margin” carousel option, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks | 2021-12-21 | not yet calculated | CVE-2021-24738 MISC |
wordpress — sportspress |
The SportsPress WordPress plugin before 2.7.9 does not sanitise and escape its match_day parameter before outputting back in the Events backend page, leading to a Reflected Cross-Site Scripting issue | 2021-12-21 | not yet calculated | CVE-2021-24578 MISC |
wordpress — wcfm_marketplace |
The wcfm_ajax_controller AJAX action of the WCFM Marketplace WordPress plugin before 3.4.12, available to unauthenticated and authenticated user, does not properly sanitise multiple parameters before using them in SQL statements, leading to SQL injections | 2021-12-21 | not yet calculated | CVE-2021-24849 MISC |
wordpress — wordpress |
The get_query() function of the Ni WooCommerce Custom Order Status WordPress plugin before 1.9.7, used by the niwoocos_ajax AJAX action, available to all authenticated users, does not properly sanitise the sort parameter before using it in a SQL statement, leading to an SQL injection, exploitable by any authenticated users, such as subscriber | 2021-12-21 | not yet calculated | CVE-2021-24846 MISC |
wordpress — wordpress |
The Contact Form, Drag and Drop Form Builder for WordPress plugin before 1.8.0 does not escape the status parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue | 2021-12-21 | not yet calculated | CVE-2021-24907 MISC |
wordpress — wordpress |
The Popups, Welcome Bar, Optins and Lead Generation Plugin WordPress plugin before 2.0.5 does not sanitise and escape the message_id parameter of the get_message_action_row AJAX action before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue | 2021-12-21 | not yet calculated | CVE-2021-24941 MISC |
wordpress — wordpress |
The Blog2Social: Social Media Auto Post & Scheduler WordPress plugin before 6.8.7 does not sanitise and escape the b2sShowByDate parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting issue | 2021-12-21 | not yet calculated | CVE-2021-24956 MISC |
wordpress — wordpress |
Cross-Site Request Forgery (CSRF) vulnerability leading to Cross-Site Scripting (XSS) discovered in tarteaucitron.js – Cookies legislation & GDPR WordPress plugin (versions <= 1.5.4), vulnerable parameters “tarteaucitronEmail” and “tarteaucitronPass”. | 2021-12-20 | not yet calculated | CVE-2021-36887 CONFIRM MISC |
wordpress wp_visitor_statistics |
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks | 2021-12-21 | not yet calculated | CVE-2021-24750 MISC CONFIRM |
wuzhi_cms — wuzhi_cms |
A cross-site scripting (XSS) vulnerability in the system bulletin component of WUZHI CMS v4.1.0 allows attackers to steal the admin’s cookie. | 2021-12-21 | not yet calculated | CVE-2020-19770 MISC |
zohocorp — manageengine_log360 |
Zoho ManageEngine ServiceDesk Plus before 12003 allows authentication bypass in certain admin configurations. | 2021-12-23 | not yet calculated | CVE-2021-44526 MISC |
zohocorp — manageengine_log360 | Zoho ManageEngine Access Manager Plus before 4203 allows anyone to view a few data elements (e.g., access control details) and modify a few aspects of the application state. | 2021-12-20 | not yet calculated | CVE-2021-44676 CONFIRM MISC |
zohocorp — manageengine_log360 | Zoho ManageEngine ServiceDesk Plus MSP before 10.5 Build 10534 is vulnerable to unauthenticated remote code execution due to a filter bypass in which authentication is not required. | 2021-12-20 | not yet calculated | CVE-2021-44675 CONFIRM |
zohocorp — manageengine_log360 |
Zoho ManageEngine PAM360 before build 5303 allows attackers to modify a few aspects of application state because of a filter bypass in which authentication is not required. | 2021-12-20 | not yet calculated | CVE-2021-44525 CONFIRM |
This product is provided subject to this Notification and this Privacy & Use policy.