Show filters
16 Total Results
Displaying 1-10 of 16
Sort by:
Attacker Value
Very High

CVE-2020-14500

Disclosure Date: August 25, 2020 (last updated February 22, 2025)
Secomea GateManager all versions prior to 9.2c, An attacker can send a negative value and overwrite arbitrary data.
Attacker Value
Unknown

CVE-2022-21646

Disclosure Date: January 11, 2022 (last updated February 23, 2025)
SpiceDB is a database system for managing security-critical application permissions. Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as "accessible" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side of the exclusion. In `v1.3.0`, the wildcard is ignored entirely in lookup's dispatch, resulting in the `banned` wildcard being ignored in the exclusion. Version 1.4.0 contains a patch for this issue. As a workaround, don't make use of wildcards on the right side of intersections or within exclusions.
Attacker Value
Unknown

CVE-2021-42375

Disclosure Date: November 15, 2021 (last updated February 23, 2025)
An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditions of filtered command input.
Attacker Value
Unknown

CVE-2021-21707

Disclosure Date: November 15, 2021 (last updated February 23, 2025)
In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.
Attacker Value
Unknown

CVE-2021-31338

Disclosure Date: August 19, 2021 (last updated February 23, 2025)
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.0 SP1). Affected devices allow to modify configuration settings over an unauthenticated channel. This could allow a local attacker to escalate privileges and execute own code on the device.
Attacker Value
Unknown

CVE-2021-38453

Disclosure Date: August 19, 2021 (last updated February 23, 2025)
Some API functions allow interaction with the registry, which includes reading values as well as data modification.
Attacker Value
Unknown

CVE-2021-3707

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to unauthorized configuration modification. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3708, to execute any OS commands on the vulnerable device.
Attacker Value
Unknown

CVE-2021-25743

Disclosure Date: May 02, 2021 (last updated February 23, 2025)
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.
Attacker Value
Unknown

CVE-2020-29022

Disclosure Date: February 16, 2021 (last updated February 22, 2025)
Failure to Sanitize host header value on output in the GateManager Web server could allow an attacker to conduct web cache poisoning attacks. This issue affects Secomea GateManager all versions prior to 9.3
Attacker Value
Unknown

CVE-2021-25310

Disclosure Date: February 02, 2021 (last updated February 22, 2025)
The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 devices allows remote authenticated attackers to execute system commands with root privileges via shell metacharacters in the ui_language POST parameter to the apply.cgi form endpoint. This occurs in do_upgrade_post in mini_httpd. NOTE: This vulnerability only affects products that are no longer supported by the maintaine