Show filters
664 Total Results
Displaying 331-340 of 664
Sort by:
Attacker Value
Unknown

CVE-2021-24767

Disclosure Date: November 08, 2021 (last updated February 23, 2025)
The Redirect 404 Error Page to Homepage or Custom Page with Logs WordPress plugin before 1.7.9 does not check for CSRF when deleting logs, which could allow attacker to make a logged in admin delete them via a CSRF attack
Attacker Value
Unknown

CVE-2021-21941

Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A use-after-free vulnerability exists in the pushMuxer CreatePushThread functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted set of network packets can lead to remote code execution.
Attacker Value
Unknown

CVE-2021-21940

Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A heap-based buffer overflow vulnerability exists in the pushMuxer processRtspInfo functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted network packet can lead to a heap buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
Attacker Value
Unknown

CVE-2021-32466

Disclosure Date: September 29, 2021 (last updated February 23, 2025)
An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.
Attacker Value
Unknown

CVE-2021-41104

Disclosure Date: September 28, 2021 (last updated February 23, 2025)
ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username & password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`.
Attacker Value
Unknown

CVE-2021-36297

Disclosure Date: August 31, 2021 (last updated February 23, 2025)
SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's,
Attacker Value
Unknown

CVE-2019-14453

Disclosure Date: August 03, 2021 (last updated February 23, 2025)
An issue was discovered in Comelit "App lejos de casa (web)" 2.8.0. It allows privilege escalation via modified domus and logged fields, related to js/bridge.min.js and login.json. For example, an attacker can achieve high privileges (installer or administrator) for the graphical interface via a 1C000000000S value for domus, in conjunction with a zero value for logged.
Attacker Value
Unknown

CVE-2021-33032

Disclosure Date: July 22, 2021 (last updated February 23, 2025)
A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request.
Attacker Value
Unknown

CVE-2021-32458

Disclosure Date: May 27, 2021 (last updated February 22, 2025)
Trend Micro Home Network Security version 6.6.604 and earlier is vulnerable to an iotcl stack-based buffer overflow vulnerability which could allow an attacker to issue a specially crafted iotcl which could lead to code execution on affected devices. An attacker must first obtain the ability to execute low-privileged code on the target device in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2021-32459

Disclosure Date: May 27, 2021 (last updated February 22, 2025)
Trend Micro Home Network Security version 6.6.604 and earlier contains a hard-coded password vulnerability in the log collection server which could allow an attacker to use a specially crafted network request to lead to arbitrary authentication. An attacker must first obtain the ability to execute high-privileged code on the target device in order to exploit this vulnerability.