9.8
CVSSv3

CVE-2021-21783

Published: 25/03/2021 Updated: 21/07/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

genivia gsoap 2.8.107

oracle communications lsms 13.1

oracle communications diameter signaling router

oracle tekelec virtual operating environment

oracle communications lsms 13.2

oracle communications lsms 13.3

oracle communications lsms 13.4

oracle communications eagle lnp application processor 46.7

oracle communications eagle lnp application processor 46.8

oracle communications eagle lnp application processor 46.9

oracle communications eagle application processor

Vendor Advisories

Debian Bug report logs - #987273 CVE-2021-21783 Package: libgsoap-28104; Maintainer for libgsoap-28104 is Mattias Ellert <mattiasellert@physicsuuse>; Source for libgsoap-28104 is src:gsoap (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 20 Apr 2021 18:33:03 UTC Severity: im ...