Latest CVE Feed
-
6.1
MEDIUMCVE-2021-20137
A reflected cross-site scripting vulnerability exists in the url parameter of the /cgi-bin/luci/site_access/ page on the Gryphon Tower router's web interface. An attacker could exploit this issue by tricking a user into following a specially crafted link,... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-20136
ManageEngine Log360 Builds < 5235 are affected by an improper access control vulnerability allowing database configuration overwrite. An unauthenticated remote attacker can send a specially crafted message to Log360 to change its backend database to an at... Read more
Affected Products : manageengine_log360- Published: Nov. 01, 2021
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2021-20135
Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in ... Read more
Affected Products : nessus- Published: Nov. 03, 2021
- Modified: Nov. 21, 2024
-
8.4
HIGHCVE-2021-20134
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by eith... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-20133
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them ... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20132
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the ... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20131
ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the Personalization interface.... Read more
Affected Products : manageengine_admanager_plus- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20130
ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the PasswordExpiry interface.... Read more
Affected Products : manageengine_admanager_plus- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-20129
An information disclosure vulnerability exists in Draytek VigorConnect 1.6.0-B3, allowing an unauthenticated attacker to export system logs.... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-20128
The Profile Name field in the floor plan (Network Menu) page in Draytek VigorConnect 1.6.0-B3 was found to be vulnerable to stored XSS, as user input is not properly sanitized.... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
8.5
HIGHCVE-2021-20127
An arbitrary file deletion vulnerability exists in the file delete functionality of the Html5Servlet endpoint of Draytek VigorConnect 1.6.0-B3. This allows an authenticated user to arbitrarily delete files in any location on the target operating system wi... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20126
Draytek VigorConnect 1.6.0-B3 lacks cross-site request forgery protections and does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-20125
An arbitrary file upload and directory traversal vulnerability exists in the file upload functionality of DownloadFileServlet in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could leverage this vulnerability to upload files to any location o... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-20122
The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is affected by an authenticated command injection vulnerability in multiple parameters passed to tr69_cmd.cgi. A remote attacker connected to the router's LAN and authenticated with a sup... Read more
- Published: Oct. 11, 2021
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2021-20121
The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is vulnerable to an authenticated arbitrary file read. An authenticated user with physical access to the device can read arbitrary files from the device by preparing and connecting a spec... Read more
- Published: Oct. 11, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20120
The administration web interface for the Arris Surfboard SB8200 lacks any protections against cross-site request forgery attacks. This means that an attacker could make configuration changes (such as changing the administrative password) without the conse... Read more
- Published: Oct. 21, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-20119
The password change utility for the Arris SurfBoard SB8200 can have safety measures bypassed that allow any logged-in user to change the administrator password.... Read more
- Published: Nov. 09, 2021
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2021-20118
Nessus Agent 8.3.0 and earlier was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20117.... Read more
Affected Products : nessus_agent- Published: Sep. 09, 2021
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2021-20117
Nessus Agent 8.3.0 and earlier was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20118.... Read more
Affected Products : nessus_agent- Published: Sep. 09, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-20116
A reflected cross-site scripting vulnerability exists in TCExam <= 14.8.4. The paths provided in the f, d, and dir parameters in tce_select_mediafile.php were not properly validated and could cause reflected XSS via the unsanitized output of the path supp... Read more
Affected Products : tcexam- Published: Aug. 05, 2021
- Modified: Nov. 21, 2024