cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-20050,https://securityvulnerability.io/vulnerability/CVE-2021-20050,,"An Improper Access Control Vulnerability in the SMA100 series leads to multiple restricted management APIs being accessible without a user login, potentially exposing configuration meta-data.",Sonicwall,Sonicwall Sma100,7.5,HIGH,0.0016799999866634607,false,false,false,false,,false,false,2021-12-23T01:20:11.000Z,0 CVE-2021-20049,https://securityvulnerability.io/vulnerability/CVE-2021-20049,,"A vulnerability in SonicWall SMA100 password change API allows a remote unauthenticated attacker to perform SMA100 username enumeration based on the server responses. This vulnerability impacts 10.2.1.2-24sv, 10.2.0.8-37sv and earlier 10.x versions.",Sonicwall,Sonicwall Sma100,7.5,HIGH,0.0027199999894946814,false,false,false,false,,false,false,2021-12-23T01:20:09.000Z,0 CVE-2021-20045,https://securityvulnerability.io/vulnerability/CVE-2021-20045,,"A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,9.8,CRITICAL,0.004989999812096357,false,false,false,false,,false,false,2021-12-08T09:55:29.000Z,0 CVE-2021-20044,https://securityvulnerability.io/vulnerability/CVE-2021-20044,,"A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,8.8,HIGH,0.001560000004246831,false,false,false,false,,false,false,2021-12-08T09:55:28.000Z,0 CVE-2021-20043,https://securityvulnerability.io/vulnerability/CVE-2021-20043,,"A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,8.8,HIGH,0.002050000010058284,false,false,false,false,,false,false,2021-12-08T09:55:27.000Z,0 CVE-2021-20042,https://securityvulnerability.io/vulnerability/CVE-2021-20042,,"An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,9.8,CRITICAL,0.005640000104904175,false,false,false,false,,false,false,2021-12-08T09:55:25.000Z,0 CVE-2021-20041,https://securityvulnerability.io/vulnerability/CVE-2021-20041,,"An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,7.5,HIGH,0.0030400000978261232,false,false,false,false,,false,false,2021-12-08T09:55:24.000Z,0 CVE-2021-20040,https://securityvulnerability.io/vulnerability/CVE-2021-20040,,"A relative path traversal vulnerability in the SMA100 upload funtion allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,7.5,HIGH,0.002090000081807375,false,false,false,false,,false,false,2021-12-08T09:55:23.000Z,0 CVE-2021-20039,https://securityvulnerability.io/vulnerability/CVE-2021-20039,,"Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.",Sonicwall,Sonicwall Sma100,8.8,HIGH,0.8003600239753723,false,false,false,false,,false,false,2021-12-08T09:55:21.000Z,0 CVE-2021-20038,https://securityvulnerability.io/vulnerability/CVE-2021-20038,,"A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances firmware 10.2.0.8-37sv, 10.2.1.1-19sv, 10.2.1.2-24sv and earlier versions.",Sonicwall,Sonicwall Sma100,9.8,CRITICAL,0.9672200083732605,true,false,true,true,true,false,false,2021-12-08T09:55:20.000Z,0 CVE-2021-20016,https://securityvulnerability.io/vulnerability/CVE-2021-20016,,A SQL-Injection vulnerability in the SonicWall SSLVPN SMA100 product allows a remote unauthenticated attacker to perform SQL query to access username password and other session related information. This vulnerability impacts SMA100 build version 10.x.,Sonicwall,Sonicwall Sma100,9.8,CRITICAL,0.026809999719262123,true,false,true,true,,false,false,2021-02-04T06:15:00.000Z,0