The affected product’s OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value.
                
            References
                    | Link | Resource | 
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | Patch Third Party Advisory US Government Resource | 
| https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 | Patch Third Party Advisory US Government Resource | 
Configurations
                    History
                    21 Nov 2024, 06:17
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 4.0
         v3 : 7.3  | 
| References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - Patch, Third Party Advisory, US Government Resource | 
27 Oct 2021, 16:50
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:auvesy:versiondog:*:*:*:*:*:*:*:* | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 4.0
         v3 : 6.5  | 
| References | (CONFIRM) https://us-cert.cisa.gov/ics/advisories/icsa-21-292-01 - Patch, Third Party Advisory, US Government Resource | 
22 Oct 2021, 12:43
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-10-22 12:15
Updated : 2024-11-21 06:17
NVD link : CVE-2021-38455
Mitre link : CVE-2021-38455
CVE.ORG link : CVE-2021-38455
JSON object : View
Products Affected
                auvesy
- versiondog
 
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
