WAFPlanet

CVE Database - 2021

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

8151
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2021-23147

MEDIUM
6.80 CVSS 3.1

Netgear Nighthawk R6700 version 1.0.4.120 does not have sufficient protections for the UART console. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection and execute commands as the root user without authentication.

Improper Authentication
WAF: Low

CVE-2021-20173

HIGH
8.80 CVSS 3.1

Netgear Nighthawk R6700 version 1.0.4.120 contains a command injection vulnerability in update functionality of the device. By triggering a system update check via the SOAP interface, the device is susceptible to command injection via preconfigured values.

OS Command Injection
WAF: High

CVE-2021-20168

MEDIUM
6.80 CVSS 3.1

Netgear RAX43 version 1.0.3.96 does not have sufficient protections to the UART interface. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection, login with default credentials, and execute commands as the root user. These default credentials are admin:admin.

Improper Authentication
WAF: Low

CVE-2021-20167

HIGH
8.00 CVSS 3.1

Netgear RAX43 version 1.0.3.96 contains a command injection vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter.

Command Injection
WAF: High

CVE-2021-20165

HIGH
8.80 CVSS 3.1

Trendnet AC2600 TEW-827DRU version 2.08B01 does not properly implement csrf protections. Most pages lack proper usage of CSRF protections or mitigations. Additionally, pages that do make use of CSRF tokens are trivially bypassable as the server does not appear to validate them properly (i.e. re-using an old token or finding the token thru some other method is possible).

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2021-20161

MEDIUM
6.80 CVSS 3.1

Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient protections for the UART functionality. A malicious actor with physical access to the device is able to connect to the UART port via a serial connection. No username or password is required and the user is given a root shell with full control of the device.

Improper Authentication
WAF: Low

CVE-2021-20160

HIGH
8.80 CVSS 3.1

Trendnet AC2600 TEW-827DRU version 2.08B01 contains a command injection vulnerability in the smb functionality of the device. The username parameter used when configuring smb functionality for the device is vulnerable to command injection as root.

OS Command Injection
WAF: High

CVE-2021-20159

HIGH
8.80 CVSS 3.1

Trendnet AC2600 TEW-827DRU version 2.08B01 is vulnerable to command injection. The system log functionality of the firmware allows for command injection as root by supplying a malformed parameter.

OS Command Injection
WAF: High

CVE-2021-20149

CRITICAL
9.80 CVSS 3.1

Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient access controls for the WAN interface. The default iptables ruleset for governing access to services on the device only apply to IPv4. All services running on the devices are accessible via the WAN interface via IPv6 by default.

Incorrect Authorization
WAF: Low

CVE-2021-20134

HIGH
8.40 CVSS 3.1

Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by either Quagga service (zebra or ripd). Subsequent log messages will be appended to the file, prefixed by a timestamp and some logging metadata. Remote code execution can be achieved by using this vulnerability to append to a shell script on the router's filesystem, and then awaiting or triggering the execution of that script. A remote, unauthenticated root shell can easily be obtained on the device in this fashion.

Path Traversal
WAF: High

CVE-2021-20133

MEDIUM
6.10 CVSS 3.1

Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credentials, hardcoded plaintext passwords for other services, configuration files, and private keys can be disclosed in this fashion. Improper handling of filenames that identify virtual resources, such as "/dev/urandom" allows an attacker to effect a denial of service attack against the command line interfaces of the Quagga services (zebra and ripd).

Path Traversal
WAF: High

CVE-2021-45379

HIGH
8.80 CVSS 3.1

Glewlwyd 2.0.0, fixed in 2.6.1 is affected by an incorrect access control vulnerability. One user can attempt to log in as another user without its password.

Improper Authentication
WAF: Low

CVE-2021-38876

MEDIUM
6.10 CVSS 3.1

IBM i 7.2, 7.3, and 7.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 208404.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29292

MEDIUM
6.50 CVSS 3.1

iBall WRD12EN 1.0.0 devices allow cross-site request forgery (CSRF) attacks as demonstrated by enabling DNS settings or modifying the range for IP addresses.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2021-43862

MEDIUM
5.40 CVSS 3.1

jQuery Terminal Emulator is a plugin for creating command line interpreters in your applications. Versions prior to 2.31.1 contain a low impact and limited cross-site scripting (XSS) vulnerability. The code for XSS payload is always visible, but an attacker can use other techniques to hide the code the victim sees. If the application uses the `execHash` option and executes code from URL, the attacker can use this URL to execute their code. The scope is limited because the javascript attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. This issue is fixed in version 2.31.1. As a workaround, the user can use formatting that wrap whole user input and its no op. The code for this workaround is available in the GitHub Security Advisory. The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-43861

MEDIUM
5.40 CVSS 3.1

Mermaid is a Javascript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. Prior to version 8.13.8, malicious diagrams can run javascript code at diagram readers' machines. Users should upgrade to version 8.13.8 to receive a patch. There are no known workarounds aside from upgrading.

Improper Input Validation Cross-Site Scripting (XSS)
WAF: High

CVE-2021-45815

MEDIUM
6.10 CVSS 3.1

Quectel UC20 UMTS/HSPA+ UC20 6.3.14 is affected by a Cross Site Scripting (XSS) vulnerability.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-45427

CRITICAL
9.80 CVSS 3.1

Emerson XWEB 300D EVO 3.0.7--3ee403 is affected by: unauthenticated arbitrary file deletion due to path traversal. An attacker can browse and delete files without any authentication due to incorrect access control and directory traversal.

Path Traversal
WAF: High

CVE-2021-25993

MEDIUM
5.40 CVSS 3.1

In Requarks wiki.js, versions 2.0.0-beta.147 to 2.5.255 are affected by Stored XSS vulnerability, where a low privileged (editor) user can upload a SVG file that contains malicious JavaScript while uploading assets in the page. That will send the JWT tokens to the attacker’s server and will lead to account takeover when accessed by the victim.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-23727

HIGH
7.50 CVSS 3.1

This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.

Command Injection
WAF: High

CVE-2021-4176

MEDIUM
6.10 CVSS 3.1

livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-4175

MEDIUM
5.40 CVSS 3.1

livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-36722

CRITICAL
9.80 CVSS 3.1

Emuse - eServices / eNvoice SQL injection can be used in various ways ranging from bypassing login authentication or dumping the whole database to full RCE on the affected endpoints. The SQLi caused by CWE-209: Generation of Error Message Containig Sensetive Information, showing parts of the aspx code and the webroot location , information an attacker can leverage to further compromise the host.

SQL Injection
WAF: High

CVE-2021-38688

HIGH
7.50 CVSS 3.1

An improper authentication vulnerability has been reported to affect Android App Qfile. If exploited, this vulnerability allows attackers to compromise app and access information We have already fixed this vulnerability in the following versions of Qfile: Qfile 3.0.0.1105 and later

Improper Authentication
WAF: Low

CVE-2021-38680

MEDIUM
6.10 CVSS 3.1

A cross-site scripting (XSS) vulnerability has been reported to affect QNAP device running Kazoo Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Kazoo Server: Kazoo Server 4.11.20 and later

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-25990

MEDIUM
5.40 CVSS 3.1

In “ifme”, versions v7.22.0 to v7.31.4 are vulnerable against self-stored XSS in the contacts field as it allows loading XSS payloads fetched via an iframe.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-25989

MEDIUM
5.40 CVSS 3.1

In “ifme”, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability in the markdown editor. It can be exploited by making a victim a Leader of a group which triggers the payload for them.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-25988

MEDIUM
5.40 CVSS 3.1

In “ifme”, versions 1.0.0 to v7.31.4 are vulnerable against stored XSS vulnerability (notifications section) which can be directly triggered by sending an ally request to the admin.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-44161

MEDIUM
5.80 CVSS 2.0

Changing MOTP (Mobile One Time Password) system’s specific function parameter has insufficient validation for user input. A attacker in local area network can perform SQL injection attack to read, modify or delete backend database without authentication.

SQL Injection
WAF: High

CVE-2021-44832

MEDIUM
6.60 CVSS 3.1

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

Improper Input Validation
WAF: Medium

CVE-2021-45814

CRITICAL
9.80 CVSS 3.1

Nettmp NNT 5.1 is affected by a SQL injection vulnerability. An attacker can bypass authentication and access the panel with an administrative account.

SQL Injection
WAF: High

CVE-2021-45813

MEDIUM
6.10 CVSS 3.1

SLICAN WebCTI 1.01 2015 is affected by a Cross Site Scripting (XSS) vulnerability. The attacker can steal the user's session by injecting malicious JavaScript codes which leads to Session Hijacking and cause user's credentials theft.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-45812

MEDIUM
6.10 CVSS 3.1

NUUO Network Video Recorder NVRsolo 3.9.1 is affected by a Cross Site Scripting (XSS) vulnerability. An attacker can steal the user's session by injecting malicious JavaScript codes which leads to session hijacking.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-45903

MEDIUM
6.10 CVSS 3.1

A persistent cross-site scripting (XSS) issue in the web interface of SuiteCRM before 7.10.35, and 7.11.x and 7.12.x before 7.12.2, allows a remote attacker to introduce arbitrary JavaScript via attachments upload, a different vulnerability than CVE-2021-39267 and CVE-2021-39268.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-45425

MEDIUM
6.10 CVSS 3.1

Reflected Cross Site Scripting (XSS) in SAFARI Montage versions 8.3 and 8.5 allows remote attackers to execute JavaScript codes.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-35032

HIGH
7.80 CVSS 3.1

A vulnerability in the 'libsal.so' of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call.

OS Command Injection
WAF: High

CVE-2021-35031

HIGH
8.00 CVSS 3.1

A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device.

OS Command Injection
WAF: High

CVE-2021-4179

MEDIUM
5.40 CVSS 3.1

livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-20873

HIGH
8.10 CVSS 3.1

Yappli is an application development platform which provides the function to access a requested URL using Custom URL Scheme. When Android apps are developed with Yappli versions since v7.3.6 and prior to v9.30.0, they are vulnerable to improper authorization in Custom URL Scheme handler, and may be directed to unintended sites via a specially crafted URL.

Missing Authorization
WAF: Low

CVE-2021-45906

MEDIUM
5.40 CVSS 3.1

OpenWrt 21.02.1 allows XSS via the NAT Rules Name screen.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-45905

MEDIUM
5.40 CVSS 3.1

OpenWrt 21.02.1 allows XSS via the Traffic Rules Name screen.

Cross-Site Scripting (XSS)
WAF: High

CVE-2021-45904

MEDIUM
5.40 CVSS 3.1

OpenWrt 21.02.1 allows XSS via the Port Forwards Add Name screen.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-21236

HIGH
8.80 CVSS 3.1

A vulnerability in /damicms-master/admin.php?s=/Article/doedit of DamiCMS v6.0 allows attackers to compromise and impersonate user accounts via obtaining a user's session cookie.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2021-43858

MEDIUM
6.50 CVSS 2.0

MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.

Improper Privilege Management Incorrect Authorization
WAF: Low

CVE-2021-45895

MEDIUM
6.10 CVSS 3.1

Netgen Tags Bundle 3.4.x before 3.4.11 and 4.0.x before 4.0.15 allows XSS in the Tags Admin interface.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-20946

MEDIUM
5.40 CVSS 3.1

Qibosoft v7 contains a stored cross-site scripting (XSS) vulnerability in the component /admin/index.php?lfj=friendlink&action=add.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-20945

HIGH
8.80 CVSS 3.1

A Cross-Site Request Forgery (CSRF) in /admin/index.php?lfj=member&action=editmember of Qibosoft v7 allows attackers to arbitrarily add administrator accounts.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-20944

CRITICAL
9.10 CVSS 3.1

An issue in /admin/index.php?lfj=mysql&action=del of Qibosoft v7 allows attackers to arbitrarily delete files.

Path Traversal
WAF: High

CVE-2020-20943

MEDIUM
4.30 CVSS 3.1

A Cross-Site Request Forgery (CSRF) in /member/post.php?job=postnew&step=post of Qibosoft v7 allows attackers to force victim users into arbitrarily publishing new articles via a crafted URL.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2021-45890

CRITICAL
9.80 CVSS 3.1

basic/BasicAuthProvider.java in AuthGuard before 0.9.0 allows authentication via an inactive identifier.

Improper Authentication
WAF: Low
Page 1 of 164 (8151 CVEs)