Latest CVE Feed
-
8.4
HIGHCVE-2021-20134
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by eith... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-20133
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them ... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20132
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the ... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20131
ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the Personalization interface.... Read more
Affected Products : manageengine_admanager_plus- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20130
ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the PasswordExpiry interface.... Read more
Affected Products : manageengine_admanager_plus- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-20129
An information disclosure vulnerability exists in Draytek VigorConnect 1.6.0-B3, allowing an unauthenticated attacker to export system logs.... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-20128
The Profile Name field in the floor plan (Network Menu) page in Draytek VigorConnect 1.6.0-B3 was found to be vulnerable to stored XSS, as user input is not properly sanitized.... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
8.5
HIGHCVE-2021-20127
An arbitrary file deletion vulnerability exists in the file delete functionality of the Html5Servlet endpoint of Draytek VigorConnect 1.6.0-B3. This allows an authenticated user to arbitrarily delete files in any location on the target operating system wi... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20126
Draytek VigorConnect 1.6.0-B3 lacks cross-site request forgery protections and does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-20125
An arbitrary file upload and directory traversal vulnerability exists in the file upload functionality of DownloadFileServlet in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could leverage this vulnerability to upload files to any location o... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-20122
The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is affected by an authenticated command injection vulnerability in multiple parameters passed to tr69_cmd.cgi. A remote attacker connected to the router's LAN and authenticated with a sup... Read more
- Published: Oct. 11, 2021
- Modified: Nov. 21, 2024
-
4.0
MEDIUMCVE-2021-20121
The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is vulnerable to an authenticated arbitrary file read. An authenticated user with physical access to the device can read arbitrary files from the device by preparing and connecting a spec... Read more
- Published: Oct. 11, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20120
The administration web interface for the Arris Surfboard SB8200 lacks any protections against cross-site request forgery attacks. This means that an attacker could make configuration changes (such as changing the administrative password) without the conse... Read more
- Published: Oct. 21, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-20119
The password change utility for the Arris SurfBoard SB8200 can have safety measures bypassed that allow any logged-in user to change the administrator password.... Read more
- Published: Nov. 09, 2021
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2021-20118
Nessus Agent 8.3.0 and earlier was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20117.... Read more
Affected Products : nessus_agent- Published: Sep. 09, 2021
- Modified: Nov. 21, 2024
-
7.2
HIGHCVE-2021-20117
Nessus Agent 8.3.0 and earlier was found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. This is different than CVE-2021-20118.... Read more
Affected Products : nessus_agent- Published: Sep. 09, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-20116
A reflected cross-site scripting vulnerability exists in TCExam <= 14.8.4. The paths provided in the f, d, and dir parameters in tce_select_mediafile.php were not properly validated and could cause reflected XSS via the unsanitized output of the path supp... Read more
Affected Products : tcexam- Published: Aug. 05, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-20115
A reflected cross-site scripting vulnerability exists in TCExam <= 14.8.3. The paths provided in the f, d, and dir parameters in tce_filemanager.php were not properly validated and could cause reflected XSS via the unsanitized output of the path supplied.... Read more
Affected Products : tcexam- Published: Aug. 05, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-20114
When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which included sensitive database backup files.... Read more
Affected Products : tcexam- Published: Jul. 30, 2021
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2021-20113
An exposure of sensitive information vulnerability exists in TCExam <= 14.8.1. If a password reset request was made for an email address that was not registered with a user then we would be presented with an ‘unknown email’ error. If an email is given tha... Read more
Affected Products : tcexam- Published: Jul. 30, 2021
- Modified: Nov. 21, 2024