Latest CVE Feed
-
8.8
HIGHCVE-2021-20143
An unauthenticated command injection vulnerability exists in the parameters of operation 48 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sen... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20142
An unauthenticated command injection vulnerability exists in the parameters of operation 41 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sen... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20141
An unauthenticated command injection vulnerability exists in the parameters of operation 32 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sen... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20140
An unauthenticated command injection vulnerability exists in the parameters of operation 10 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by sen... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20139
An unauthenticated command injection vulnerability exists in the parameters of operation 3 in the controller_server service on Gryphon Tower routers. An unauthenticated remote attacker on the same network can execute commands as root on the device by send... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20138
An unauthenticated command injection vulnerability exists in multiple parameters in the Gryphon Tower router’s web interface at /cgi-bin/luci/rc. An unauthenticated remote attacker on the same network can execute commands as root on the device by sending ... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2021-20137
A reflected cross-site scripting vulnerability exists in the url parameter of the /cgi-bin/luci/site_access/ page on the Gryphon Tower router's web interface. An attacker could exploit this issue by tricking a user into following a specially crafted link,... Read more
- Published: Dec. 09, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-20136
ManageEngine Log360 Builds < 5235 are affected by an improper access control vulnerability allowing database configuration overwrite. An unauthenticated remote attacker can send a specially crafted message to Log360 to change its backend database to an at... Read more
Affected Products : manageengine_log360- Published: Nov. 01, 2021
- Modified: Nov. 21, 2024
-
6.7
MEDIUMCVE-2021-20135
Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in ... Read more
Affected Products : nessus- Published: Nov. 03, 2021
- Modified: Nov. 21, 2024
-
8.4
HIGHCVE-2021-20134
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by eith... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2021-20133
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them ... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20132
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the ... Read more
- Published: Dec. 30, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20131
ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the Personalization interface.... Read more
Affected Products : manageengine_admanager_plus- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20130
ManageEngine ADManager Plus Build 7111 contains a post-authentication remote code execution vulnerability due to improperly validated file uploads in the PasswordExpiry interface.... Read more
Affected Products : manageengine_admanager_plus- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-20129
An information disclosure vulnerability exists in Draytek VigorConnect 1.6.0-B3, allowing an unauthenticated attacker to export system logs.... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
5.4
MEDIUMCVE-2021-20128
The Profile Name field in the floor plan (Network Menu) page in Draytek VigorConnect 1.6.0-B3 was found to be vulnerable to stored XSS, as user input is not properly sanitized.... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
8.5
HIGHCVE-2021-20127
An arbitrary file deletion vulnerability exists in the file delete functionality of the Html5Servlet endpoint of Draytek VigorConnect 1.6.0-B3. This allows an authenticated user to arbitrarily delete files in any location on the target operating system wi... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2021-20126
Draytek VigorConnect 1.6.0-B3 lacks cross-site request forgery protections and does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-20125
An arbitrary file upload and directory traversal vulnerability exists in the file upload functionality of DownloadFileServlet in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could leverage this vulnerability to upload files to any location o... Read more
Affected Products : vigorconnect- Published: Oct. 13, 2021
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2021-20122
The Telus Wi-Fi Hub (PRV65B444A-S-TS) with firmware version 3.00.20 is affected by an authenticated command injection vulnerability in multiple parameters passed to tr69_cmd.cgi. A remote attacker connected to the router's LAN and authenticated with a sup... Read more
- Published: Oct. 11, 2021
- Modified: Nov. 21, 2024