Latest CVE Feed
-
4.3
MEDIUMCVE-2021-32472
Teachers exporting a forum in CSV format could receive a CSV of forums from all courses in some circumstances. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6 and 3.8 to 3.8.8 are affected.... Read more
Affected Products : moodle- Published: Mar. 11, 2022
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-32471
Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input ... Read more
Affected Products : universal_turing_machine- Published: May. 10, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-32470
Craft CMS before 3.6.13 has an XSS vulnerability.... Read more
Affected Products : craft_cms- Published: May. 07, 2021
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2021-32469
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915 Affected Software ... Read more
Affected Products : mt7613_firmware mt7615_firmware mt7622_firmware mt7628_firmware mt7629_firmware mt7915_firmware mt7603e_firmware mt7612_firmware mt7620_firmware mt7610_firmware +10 more products- Published: Dec. 26, 2021
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2021-32468
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software... Read more
Affected Products : mt7613_firmware mt7615_firmware mt7622_firmware mt7628_firmware mt7629_firmware mt7915_firmware mt7603e_firmware mt7612_firmware mt7620_firmware mt7610_firmware +10 more products- Published: Dec. 26, 2021
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2021-32467
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software... Read more
Affected Products : mt7613_firmware mt7615_firmware mt7622_firmware mt7628_firmware mt7629_firmware mt7915_firmware mt7603e_firmware mt7612_firmware mt7620_firmware mt7603e +8 more products- Published: Dec. 26, 2021
- Modified: Nov. 21, 2024
-
7.0
HIGHCVE-2021-32466
An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a ... Read more
- Published: Sep. 29, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-32465
An incorrect permission preservation vulnerability in Trend Micro Apex One, Apex One as a Service and OfficeScan XG SP1 could allow a remote user to perform an attack and bypass authentication on affected installations. Please note: an attacker must first... Read more
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-32464
An incorrect permission assignment privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security Services could allow an attacker to modify a specific script before it is executed. Please note: an attac... Read more
- Published: Aug. 04, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-32463
An incorrect permission assignment denial-of-service vulnerability in Trend Micro Apex One, Apex One as a Service (SaaS), Worry-Free Business Security 10.0 SP1 and Worry-Free Servgices could allow a local attacker to escalate privileges and delete files w... Read more
- Published: Jul. 20, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-32462
Trend Micro Password Manager (Consumer) version 5.0.0.1217 and below is vulnerable to an Exposed Hazardous Function Remote Code Execution vulnerability which could allow an unprivileged client to manipulate the registry and escalate privileges to SYSTEM o... Read more
- Published: Jul. 08, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-32461
Trend Micro Password Manager (Consumer) version 5.0.0.1217 and below is vulnerable to an Integer Truncation Privilege Escalation vulnerability which could allow a local attacker to trigger a buffer overflow and escalate privileges on affected installation... Read more
- Published: Jul. 08, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-32460
The Trend Micro Maximum Security 2021 (v17) consumer product is vulnerable to an improper access control vulnerability in the installer which could allow a local attacker to escalate privileges on a target machine. Please note than an attacker must alread... Read more
- Published: Jun. 03, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-32459
Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attack... Read more
Affected Products : home_network_security- Published: May. 27, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-32458
Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl which could lead to code execution on affected devices. An a... Read more
Affected Products : home_network_security- Published: May. 27, 2021
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2021-32457
Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl to escalate privileges on affected devices. An attacker must... Read more
Affected Products : home_network_security- Published: May. 26, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-32456
SITEL CAP/PRX firmware version 5.2.01 allows an attacker with access to the local network of the device to obtain the authentication passwords by analysing the network traffic.... Read more
- Published: May. 17, 2021
- Modified: Nov. 21, 2024
-
6.8
MEDIUMCVE-2021-32455
SITEL CAP/PRX firmware version 5.2.01, allows an attacker with access to the device´s network to cause a denial of service condition on the device. An attacker could exploit this vulnerability by sending HTTP requests massively.... Read more
- Published: May. 17, 2021
- Modified: Nov. 21, 2024
-
9.6
CRITICALCVE-2021-32454
SITEL CAP/PRX firmware version 5.2.01 makes use of a hardcoded password. An attacker with access to the device could modify these credentials, leaving the administrators of the device without access.... Read more
- Published: May. 17, 2021
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2021-32453
SITEL CAP/PRX firmware version 5.2.01 allows an attacker with access to the local network, to access via HTTP to the internal configuration database of the device without any authentication. An attacker could exploit this vulnerability in order to obtain ... Read more
- Published: May. 17, 2021
- Modified: Nov. 21, 2024