Latest CVE Feed
-
10.0
CRITICALCVE-2021-20151
Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device. The router's management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. This allows an attacker... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-20150
Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses information via redirection from the setup wizard. Authentication can be bypassed and a user may view information as Admin by manually browsing to the setup wizard and forcing it to redirect ... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-20149
Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient access controls for the WAN interface. The default iptables ruleset for governing access to services on the device only apply to IPv4. All services running on the devices are accessible v... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2021-20148
ManageEngine ADSelfService Plus below build 6116 stores the password policy file for each domain under the html/ web root with a predictable filename based on the domain name. When ADSSP is configured with multiple Windows domains, a user from one domain ... Read more
Affected Products : manageengine_adselfservice_plus- Published: Jan. 03, 2022
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-20147
ManageEngine ADSelfService Plus below build 6116 contains an observable response discrepancy in the UMCP operation of the ChangePasswordAPI. This allows an unauthenticated remote attacker to determine whether a Windows domain user exists.... Read more
Affected Products : manageengine_adselfservice_plus- Published: Jan. 03, 2022
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-20146
An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development s... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-20145
Gryphon Tower routers contain an unprotected openvpn configuration file which can grant attackers access to the Gryphon homebound VPN network which exposes the LAN interfaces of other users' devices connected to the same service. An attacker could leverag... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20144
An unauthenticated command injection vulnerability exists in the parameters of operation 49 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sen... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20143
An unauthenticated command injection vulnerability exists in the parameters of operation 48 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sen... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20142
An unauthenticated command injection vulnerability exists in the parameters of operation 41 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sen... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20141
An unauthenticated command injection vulnerability exists in the parameters of operation 32 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sen... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20140
An unauthenticated command injection vulnerability exists in the parameters of operation 10 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sen... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20139
An unauthenticated command injection vulnerability exists in the parameters of operation 3 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by send... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20138
An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower router’s web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending ... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-20137
A reflected cross-site scripting vulnerability exists in the url parameter of the /cgi-bin/luci/site_access/ page on the Gryphon Tower router's web interface. An attacker could exploit this issue by tricking a user into following a specially crafted link,... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-20136
ManageEngine Log360 Builds < 5235 are affected by an improper access control vulnerability allowing database configuration overwrite. An unauthenticated remote attacker can send a specially crafted message to Log360 to change its backend database to an at... Read more
Affected Products : manageengine_log360- Published: Nov. 01, 2021
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2021-20135
Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in ... Read more
Affected Products : nessus- Published: Nov. 03, 2021
- Modified: Nov. 21, 2024
-
8.4
HIGHCVE-2021-20134
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by eith... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-20133
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them ... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20132
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the ... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024