Show filters
664 Total Results
Displaying 331-340 of 664
Sort by:
Attacker Value
Unknown
CVE-2021-24767
Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The Redirect 404 Error Page to Homepage or Custom Page with Logs WordPress plugin before 1.7.9 does not check for CSRF when deleting logs, which could allow attacker to make a logged in admin delete them via a CSRF attack
0
Attacker Value
Unknown
CVE-2021-21941
Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A use-after-free vulnerability exists in the pushMuxer CreatePushThread functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to remote code execution.
0
Attacker Value
Unknown
CVE-2021-21940
Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A heap-based buffer overflow vulnerability exists in the pushMuxer processRtspInfo functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted network packet can lead to a heap buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2021-32466
Disclosure Date: September 29, 2021 (last updated February 23, 2025)
An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2021-41104
Disclosure Date: September 28, 2021 (last updated February 23, 2025)
ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username & password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`.
0
Attacker Value
Unknown
CVE-2021-36297
Disclosure Date: August 31, 2021 (last updated February 23, 2025)
SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's,
0
Attacker Value
Unknown
CVE-2019-14453
Disclosure Date: August 03, 2021 (last updated February 23, 2025)
An issue was discovered in Comelit "App lejos de casa (web)" 2.8.0. It allows privilege escalation via modified domus and logged fields, related to js/bridge.min.js and login.json. For example, an attacker can achieve high privileges (installer or administrator) for the graphical interface via a 1C000000000S value for domus, in conjunction with a zero value for logged.
0
Attacker Value
Unknown
CVE-2021-33032
Disclosure Date: July 22, 2021 (last updated February 23, 2025)
A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request.
0
Attacker Value
Unknown
CVE-2021-32458
Disclosure Date: May 27, 2021 (last updated February 22, 2025)
Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl which could lead to code execution on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2021-32459
Disclosure Date: May 27, 2021 (last updated February 22, 2025)
Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attacker must first obtain the ability to execute high-privileged code on the target device in order to exploit this vulnerability.
0