The Portable SDK for UPnP Devices is vulnerable to DNS rebinding attacks due to lack of `Host` header validation
Reporter | Title | Published | Views | Family All 13 |
---|---|---|---|---|
![]() | CVE-2021-29462 | 20 Apr 202121:15 | – | debiancve |
![]() | CVE-2021-29462 | 20 Apr 202100:00 | – | ubuntucve |
![]() | CVE-2021-29462 | 20 Apr 202121:15 | – | nvd |
![]() | CVE-2021-29462 | 20 Apr 202121:15 | – | osv |
![]() | Updated libupnp packages fix a security vulnerability | 9 Jul 202101:43 | – | mageia |
![]() | Linux Distros Unpatched Vulnerability : CVE-2021-29462 | 4 Mar 202500:00 | – | nessus |
![]() | lipupnp < 1.14.6 DNS Rebind Vulnerability (GHSA-6hqq-w3jq-9fhg) | 22 Apr 202100:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2021-0319) | 28 Jan 202200:00 | – | openvas |
![]() | Spoofing | 20 Apr 202121:15 | – | prion |
![]() | [ASA-202104-8] libupnp: content spoofing | 29 Apr 202100:00 | – | archlinux |
[
{
"product": "pupnp",
"vendor": "pupnp",
"versions": [
{
"status": "affected",
"version": "< 1.14.6"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo