cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-53703,https://securityvulnerability.io/vulnerability/CVE-2024-53703,SonicWall SMA100 SSLVPN Firmware Vulnerability Could Lead to Code Execution,A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions mod_httprp library loaded by the Apache web server allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.,Sonicwall,Sma100,,,0.0004299999854993075,false,false,false,false,,false,false,2024-12-05T13:59:35.490Z,0 CVE-2024-53702,https://securityvulnerability.io/vulnerability/CVE-2024-53702,Predictable Pseudo-Random Number Generator Vulnerability in SonicWall SMA100 SSLVPN,"Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret.",Sonicwall,Sma100,,,0.0004299999854993075,false,false,false,false,,false,false,2024-12-05T13:53:37.282Z,0 CVE-2024-45319,https://securityvulnerability.io/vulnerability/CVE-2024-45319,Certificate Requirement Circumvention Vulnerability in SonicWall SMA100 SSLVPN Firmware,"A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions allows a remote authenticated attacker can circumvent the certificate requirement during authentication.",Sonicwall,Sma100,,,0.0004299999854993075,false,false,false,false,,false,false,2024-12-05T13:50:28.768Z,0 CVE-2024-45318,https://securityvulnerability.io/vulnerability/CVE-2024-45318,Buffer Overflow Vulnerability in SonicWall SMA100 SSLVPN Could Lead to Code Execution,A vulnerability in the SonicWall SMA100 SSLVPN web management interface allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.,Sonicwall,Sma100,,,0.0004299999854993075,false,false,false,false,,false,false,2024-12-05T13:43:31.716Z,0 CVE-2024-40763,https://securityvulnerability.io/vulnerability/CVE-2024-40763,Heap-based Buffer Overflow Vulnerability in SonicWall SMA100 SSLVPN,Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.,Sonicwall,Sma100,,,0.0004299999854993075,false,false,false,false,,false,false,2024-12-05T13:39:19.644Z,0 CVE-2023-5970,https://securityvulnerability.io/vulnerability/CVE-2023-5970,,"Improper authentication in the SMA100 SSL-VPN virtual office portal allows a remote authenticated attacker to create an identical external domain user using accent characters, resulting in an MFA bypass.",SonicWall,SMA100,8.8,HIGH,0.0014100000262260437,false,false,false,false,,false,false,2023-12-05T21:15:00.000Z,0 CVE-2023-44221,https://securityvulnerability.io/vulnerability/CVE-2023-44221,,"Improper neutralization of special elements in the SMA100 SSL-VPN management interface allows a remote authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user, potentially leading to OS Command Injection Vulnerability.",Sonicwall,Sma100,7.2,HIGH,0.0014199999859556556,false,false,false,false,,false,false,2023-12-05T21:15:00.000Z,0 CVE-2022-2915,https://securityvulnerability.io/vulnerability/CVE-2022-2915,,A Heap-based Buffer Overflow vulnerability in the SonicWall SMA100 appliance allows a remote authenticated attacker to cause Denial of Service (DoS) on the appliance or potentially lead to code execution. This vulnerability impacts 10.2.1.5-34sv and earlier versions.,Sonicwall,Sma100,8.8,HIGH,0.003160000080242753,false,false,false,false,,false,false,2022-08-26T20:30:15.000Z,0 CVE-2022-1703,https://securityvulnerability.io/vulnerability/CVE-2022-1703,,Improper neutralization of special elements in the SonicWall SSL-VPN SMA100 series management interface allows a remote authenticated attacker to inject OS Commands which potentially leads to remote command execution vulnerability or denial of service (DoS) attack.,Sonicwall,Sma100,8.8,HIGH,0.0017000000225380063,false,false,false,false,,false,false,2022-06-03T21:10:10.000Z,0 CVE-2021-20050,https://securityvulnerability.io/vulnerability/CVE-2021-20050,,"An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data.",Sonicwall,Sonicwall Sma100,7.5,HIGH,0.0016799999866634607,false,false,false,false,,false,false,2021-12-23T01:20:11.000Z,0 CVE-2021-20049,https://securityvulnerability.io/vulnerability/CVE-2021-20049,,"A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions.",Sonicwall,Sonicwall Sma100,7.5,HIGH,0.0027199999894946814,false,false,false,false,,false,false,2021-12-23T01:20:09.000Z,0 CVE-2021-20045,https://securityvulnerability.io/vulnerability/CVE-2021-20045,,"A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,9.8,CRITICAL,0.004989999812096357,false,false,false,false,,false,false,2021-12-08T09:55:29.000Z,0 CVE-2021-20044,https://securityvulnerability.io/vulnerability/CVE-2021-20044,,"A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,8.8,HIGH,0.001560000004246831,false,false,false,false,,false,false,2021-12-08T09:55:28.000Z,0 CVE-2021-20043,https://securityvulnerability.io/vulnerability/CVE-2021-20043,,"A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,8.8,HIGH,0.002050000010058284,false,false,false,false,,false,false,2021-12-08T09:55:27.000Z,0 CVE-2021-20042,https://securityvulnerability.io/vulnerability/CVE-2021-20042,,"An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,9.8,CRITICAL,0.005640000104904175,false,false,false,false,,false,false,2021-12-08T09:55:25.000Z,0 CVE-2021-20041,https://securityvulnerability.io/vulnerability/CVE-2021-20041,,"An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,7.5,HIGH,0.0030400000978261232,false,false,false,false,,false,false,2021-12-08T09:55:24.000Z,0 CVE-2021-20040,https://securityvulnerability.io/vulnerability/CVE-2021-20040,,"A relative path traversal vulnerability in the SMA100 upload funtion allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,7.5,HIGH,0.002090000081807375,false,false,false,false,,false,false,2021-12-08T09:55:23.000Z,0 CVE-2021-20039,https://securityvulnerability.io/vulnerability/CVE-2021-20039,,"Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,8.8,HIGH,0.8003600239753723,false,false,false,false,,false,false,2021-12-08T09:55:21.000Z,0 CVE-2021-20038,https://securityvulnerability.io/vulnerability/CVE-2021-20038,,"A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.",Sonicwall,Sonicwall Sma100,9.8,CRITICAL,0.9672200083732605,true,false,true,true,true,false,false,2021-12-08T09:55:20.000Z,0 CVE-2021-20035,https://securityvulnerability.io/vulnerability/CVE-2021-20035,,Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS.,Sonicwall,Sma100,6.5,MEDIUM,0.0012499999720603228,false,false,false,false,,false,false,2021-09-27T17:20:12.000Z,0 CVE-2021-20034,https://securityvulnerability.io/vulnerability/CVE-2021-20034,,An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.,Sonicwall,Sma100,9.1,CRITICAL,0.2694999873638153,false,false,false,false,,false,false,2021-09-27T17:20:10.000Z,0 CVE-2021-20018,https://securityvulnerability.io/vulnerability/CVE-2021-20018,,A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier.,Sonicwall,Sma100,4.9,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2021-03-13T02:10:15.000Z,0 CVE-2021-20017,https://securityvulnerability.io/vulnerability/CVE-2021-20017,,A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier.,Sonicwall,Sma100,8.8,HIGH,0.0031399999279528856,false,false,false,false,,false,false,2021-03-13T02:10:14.000Z,0 CVE-2021-20016,https://securityvulnerability.io/vulnerability/CVE-2021-20016,,A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x.,Sonicwall,Sonicwall Sma100,9.8,CRITICAL,0.026809999719262123,true,false,true,true,,false,false,2021-02-04T06:15:00.000Z,0 CVE-2020-5146,https://securityvulnerability.io/vulnerability/CVE-2020-5146,,A vulnerability in SonicWall SMA100 appliance allow an authenticated management-user to perform OS command injection using HTTP POST parameters. This vulnerability affected SMA100 Appliance version 10.2.0.2-20sv and earlier.,Sonicwall,Sma100,7.2,HIGH,0.002839999971911311,false,false,false,false,,false,false,2021-01-09T00:15:14.000Z,0