instruction
stringlengths 55
56
| inputs
stringclasses 1
value | outputs
stringlengths 86
4.06k
|
|---|---|---|
Please provide detailed information about CVE-2021-27140
|
CVE:CVE-2021-27140
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to find passwords and authentication cookies stored in cleartext in the web.log HTTP logs.
published:2021-02-10T19:15:12.683
|
|
Please provide detailed information about CVE-2021-27141
|
CVE:CVE-2021-27141
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. Credentials in /fhconf/umconfig.txt are obfuscated via XOR with the hardcoded *j7a(L#yZ98sSd5HfSgGjMj8;Ss;d)(*&^#@$a2s0i3g key. (The webs binary has details on how XOR is used.)
published:2021-02-10T19:15:12.807
|
|
Please provide detailed information about CVE-2021-27142
|
CVE:CVE-2021-27142
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web management is done over HTTPS, using a hardcoded private key that has 0777 permissions.
published:2021-02-10T19:15:12.840
|
|
Please provide detailed information about CVE-2021-27143
|
CVE:CVE-2021-27143
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / user1234 credentials for an ISP.
published:2021-02-10T19:15:12.887
|
|
Please provide detailed information about CVE-2021-27144
|
CVE:CVE-2021-27144
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded f~i!b@e#r$h%o^m*esuperadmin / s(f)u_h+g|u credentials for an ISP.
published:2021-02-10T19:15:13.010
|
|
Please provide detailed information about CVE-2021-27145
|
CVE:CVE-2021-27145
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / lnadmin credentials for an ISP.
published:2021-02-10T19:15:13.057
|
|
Please provide detailed information about CVE-2021-27146
|
CVE:CVE-2021-27146
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / CUadmin credentials for an ISP.
published:2021-02-10T19:15:13.167
|
|
Please provide detailed information about CVE-2021-27147
|
CVE:CVE-2021-27147
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / admin credentials for an ISP.
published:2021-02-10T19:15:13.213
|
|
Please provide detailed information about CVE-2021-27148
|
CVE:CVE-2021-27148
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded telecomadmin / nE7jA%5m credentials for an ISP.
published:2021-02-10T19:15:13.293
|
|
Please provide detailed information about CVE-2021-27149
|
CVE:CVE-2021-27149
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded adminpldt / z6dUABtl270qRxt7a2uGTiw credentials for an ISP.
published:2021-02-10T19:15:13.387
|
|
Please provide detailed information about CVE-2021-27150
|
CVE:CVE-2021-27150
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded gestiontelebucaramanga / t3l3buc4r4m4ng42013 credentials for an ISP.
published:2021-02-10T19:15:13.433
|
|
Please provide detailed information about CVE-2021-27151
|
CVE:CVE-2021-27151
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded rootmet / m3tr0r00t credentials for an ISP.
published:2021-02-10T19:15:13.557
|
|
Please provide detailed information about CVE-2021-27152
|
CVE:CVE-2021-27152
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded awnfibre / fibre@dm!n credentials for an ISP.
published:2021-02-10T19:15:13.607
|
|
Please provide detailed information about CVE-2021-27153
|
CVE:CVE-2021-27153
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded trueadmin / admintrue credentials for an ISP.
published:2021-02-10T19:15:13.730
|
|
Please provide detailed information about CVE-2021-27154
|
CVE:CVE-2021-27154
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / G0R2U1P2ag credentials for an ISP.
published:2021-02-10T19:15:13.777
|
|
Please provide detailed information about CVE-2021-27155
|
CVE:CVE-2021-27155
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 3UJUh2VemEfUtesEchEC2d2e credentials for an ISP.
published:2021-02-10T19:15:13.823
|
|
Please provide detailed information about CVE-2021-27156
|
CVE:CVE-2021-27156
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains credentials for an ISP that equal the last part of the MAC address of the br0 interface.
published:2021-02-10T19:15:13.933
|
|
Please provide detailed information about CVE-2021-27157
|
CVE:CVE-2021-27157
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 888888 credentials for an ISP.
published:2021-02-10T19:15:13.980
|
|
Please provide detailed information about CVE-2021-27158
|
CVE:CVE-2021-27158
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded L1vt1m4eng / 888888 credentials for an ISP.
published:2021-02-10T19:15:14.107
|
|
Please provide detailed information about CVE-2021-27159
|
CVE:CVE-2021-27159
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded useradmin / 888888 credentials for an ISP.
published:2021-02-10T19:15:14.153
|
|
Please provide detailed information about CVE-2021-27160
|
CVE:CVE-2021-27160
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / 888888 credentials for an ISP.
published:2021-02-10T19:15:14.183
|
|
Please provide detailed information about CVE-2021-27161
|
CVE:CVE-2021-27161
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 1234 credentials for an ISP.
published:2021-02-10T19:15:14.340
|
|
Please provide detailed information about CVE-2021-27162
|
CVE:CVE-2021-27162
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / tattoo@home credentials for an ISP.
published:2021-02-10T19:15:14.463
|
|
Please provide detailed information about CVE-2021-27163
|
CVE:CVE-2021-27163
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / tele1234 credentials for an ISP.
published:2021-02-10T19:15:14.510
|
|
Please provide detailed information about CVE-2021-27164
|
CVE:CVE-2021-27164
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / aisadmin credentials for an ISP.
published:2021-02-10T19:15:14.557
|
|
Please provide detailed information about CVE-2021-27165
|
CVE:CVE-2021-27165
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials.
published:2021-02-10T19:15:14.620
|
|
Please provide detailed information about CVE-2021-27166
|
CVE:CVE-2021-27166
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon.
published:2021-02-10T19:15:14.683
|
|
Please provide detailed information about CVE-2021-27167
|
CVE:CVE-2021-27167
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. There is a password of four hexadecimal characters for the admin account. These characters are generated in init_3bb_password in libci_adaptation_layer.so.
published:2021-02-10T19:15:14.730
|
|
Please provide detailed information about CVE-2021-27168
|
CVE:CVE-2021-27168
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. There is a 6GFJdY4aAuUKJjdtSn7d password for the rdsadmin account.
published:2021-02-10T19:15:14.793
|
|
Please provide detailed information about CVE-2021-27169
|
CVE:CVE-2021-27169
Description:An issue was discovered on FiberHome AN5506-04-FA devices with firmware RP2631. There is a gepon password for the gepon account.
published:2021-02-10T19:15:14.887
|
|
Please provide detailed information about CVE-2021-27170
|
CVE:CVE-2021-27170
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. By default, there are no firewall rules for IPv6 connectivity, exposing the internal management interfaces to the Internet.
published:2021-02-10T19:15:14.950
|
|
Please provide detailed information about CVE-2021-27171
|
CVE:CVE-2021-27171
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to start a Linux telnetd as root on port 26/tcp by using the CLI interface commands of ddd and shell (or tshell).
published:2021-02-10T19:15:15.057
|
|
Please provide detailed information about CVE-2021-27172
|
CVE:CVE-2021-27172
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh.
published:2021-02-10T19:15:15.120
|
|
Please provide detailed information about CVE-2021-27173
|
CVE:CVE-2021-27173
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach the telnet server (used for the CLI).
published:2021-02-10T19:15:15.183
|
|
Please provide detailed information about CVE-2021-27174
|
CVE:CVE-2021-27174
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. wifi_custom.cfg has cleartext passwords and 0644 permissions.
published:2021-02-10T19:15:15.247
|
|
Please provide detailed information about CVE-2021-27175
|
CVE:CVE-2021-27175
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions.
published:2021-02-10T19:15:15.307
|
|
Please provide detailed information about CVE-2021-27176
|
CVE:CVE-2021-27176
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_5g.cfg has cleartext passwords and 0644 permissions.
published:2021-02-10T19:15:15.370
|
|
Please provide detailed information about CVE-2021-27177
|
CVE:CVE-2021-27177
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server.
published:2021-02-10T19:15:15.450
|
|
Please provide detailed information about CVE-2021-27178
|
CVE:CVE-2021-27178
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. Some passwords are stored in cleartext in nvram.
published:2021-02-10T19:15:15.510
|
|
Please provide detailed information about CVE-2021-27179
|
CVE:CVE-2021-27179
Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to crash the telnet daemon by sending a certain 0a 65 6e 61 62 6c 65 0a 02 0a 1a 0a string.
published:2021-02-10T19:15:15.573
|
|
Please provide detailed information about CVE-2021-21296
|
CVE:CVE-2021-21296
Description:Fleet is an open source osquery manager. In Fleet before version 3.7.0 a malicious actor with a valid node key can send a badly formatted request that causes the Fleet server to exit, resulting in denial of service. This is possible only while a live query is currently ongoing. We believe the impact of this vulnerability to be low given the requirement that the actor has a valid node key. There is no information disclosure, privilege escalation, or code execution. The issue is fixed in Fleet 3.7.0.
published:2021-02-10T20:15:15.353
|
|
Please provide detailed information about CVE-2021-25251
|
CVE:CVE-2021-25251
Description:The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability.
published:2021-02-10T22:15:13.703
|
|
Please provide detailed information about CVE-2021-27185
|
CVE:CVE-2021-27185
Description:The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.
published:2021-02-10T22:15:13.813
|
|
Please provide detailed information about CVE-2021-27186
|
CVE:CVE-2021-27186
Description:Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by flb_avro.c or http_server/api/v1/metrics.c.
published:2021-02-10T22:15:13.877
|
|
Please provide detailed information about CVE-2021-20335
|
CVE:CVE-2021-20335
Description:For MongoDB Ops Manager versions prior to and including 4.2.24 with multiple OM application servers, that have SSL turned on for their MongoDB processes, the upgrade to MongoDB Ops Manager versions prior to and including 4.4.12 triggers a bug where Automation thinks SSL is being turned off, and can disable SSL temporarily for members of the cluster. This issue is temporary and eventually corrects itself after MongoDB Ops Manager instances have finished upgrading to MongoDB Ops Manager 4.4. In addition, customers must be running with clientCertificateMode=OPTIONAL / allowConnectionsWithoutCertificates=true to be impacted*.* Customers upgrading from Ops Manager 4.2.X to 4.2.24 and finally to Ops Manager 4.4.13+ are unaffected by this issue.
published:2021-02-11T10:15:12.223
|
|
Please provide detailed information about CVE-2021-23334
|
CVE:CVE-2021-23334
Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
published:2021-02-11T12:15:12.173
|
|
Please provide detailed information about CVE-2021-23335
|
CVE:CVE-2021-23335
Description:All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure.
published:2021-02-11T12:15:12.437
|
|
Please provide detailed information about CVE-2021-20402
|
CVE:CVE-2021-20402
Description:IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196076.
published:2021-02-11T17:15:13.123
|
|
Please provide detailed information about CVE-2021-20403
|
CVE:CVE-2021-20403
Description:IBM Security Verify Information Queue 1.0.6 and 1.0.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
published:2021-02-11T17:15:13.217
|
|
Please provide detailed information about CVE-2021-20404
|
CVE:CVE-2021-20404
Description:IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a user on the network to cause a denial of service due to an invalid cookie value that could prevent future logins. IBM X-Force ID: 196078.
published:2021-02-11T17:15:13.327
|
|
Please provide detailed information about CVE-2021-20405
|
CVE:CVE-2021-20405
Description:IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a user to perform unauthorized activities due to improper encoding of output. IBM X-Force ID: 196183.
published:2021-02-11T17:15:13.420
|
|
Please provide detailed information about CVE-2021-20188
|
CVE:CVE-2021-20188
Description:A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security features are disabled when running the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
published:2021-02-11T18:15:16.177
|
|
Please provide detailed information about CVE-2021-21299
|
CVE:CVE-2021-21299
Description:hyper is an open-source HTTP library for Rust (crates.io). In hyper from version 0.12.0 and before versions 0.13.10 and 0.14.3 there is a vulnerability that can enable a request smuggling attack. The HTTP server code had a flaw that incorrectly understands some requests with multiple transfer-encoding headers to have a chunked payload, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that understands the request payload boundary differently can result in "request smuggling" or "desync attacks". To determine if vulnerable, all these things must be true: 1) Using hyper as an HTTP server (the client is not affected), 2) Using HTTP/1.1 (HTTP/2 does not use transfer-encoding), 3) Using a vulnerable HTTP proxy upstream to hyper. If an upstream proxy correctly rejects the illegal transfer-encoding headers, the desync attack cannot succeed. If there is no proxy upstream of hyper, hyper cannot start the desync attack, as the client will repair the headers before forwarding. This is fixed in versions 0.14.3 and 0.13.10. As a workaround one can take the following options: 1) Reject requests that contain a `transfer-encoding` header, 2) Ensure any upstream proxy handles `transfer-encoding` correctly.
published:2021-02-11T18:15:16.800
|
|
Please provide detailed information about CVE-2021-21301
|
CVE:CVE-2021-21301
Description:Wire is an open-source collaboration platform. In Wire for iOS (iPhone and iPad) before version 3.75 there is a vulnerability where the video capture isn't stopped in a scenario where a user first has their camera enabled and then disables it. It's a privacy issue because video is streamed to the call when the user believes it is disabled. It impacts all users in video calls. This is fixed in version 3.75.
published:2021-02-11T18:15:16.910
|
|
Please provide detailed information about CVE-2021-22652
|
CVE:CVE-2021-22652
Description:Access to the Advantech iView versions prior to v5.7.03.6112 configuration are missing authentication, which may allow an unauthorized attacker to change the configuration and obtain code execution.
published:2021-02-11T18:15:17.003
|
|
Please provide detailed information about CVE-2021-22654
|
CVE:CVE-2021-22654
Description:Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information.
published:2021-02-11T18:15:17.113
|
|
Please provide detailed information about CVE-2021-22656
|
CVE:CVE-2021-22656
Description:Advantech iView versions prior to v5.7.03.6112 are vulnerable to directory traversal, which may allow an attacker to read sensitive files.
published:2021-02-11T18:15:17.190
|
|
Please provide detailed information about CVE-2021-22658
|
CVE:CVE-2021-22658
Description:Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an attacker to escalate privileges to 'Administrator'.
published:2021-02-11T18:15:17.270
|
|
Please provide detailed information about CVE-2021-22880
|
CVE:CVE-2021-22880
Description:The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
published:2021-02-11T18:15:17.333
|
|
Please provide detailed information about CVE-2021-22881
|
CVE:CVE-2021-22881
Description:The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
published:2021-02-11T18:15:17.460
|
|
Please provide detailed information about CVE-2021-25688
|
CVE:CVE-2021-25688
Description:Under certain conditions, Teradici PCoIP Agents for Windows prior to version 20.10.0 and Teradici PCoIP Agents for Linux prior to version 21.01.0 may log parts of a user's password in the application logs.
published:2021-02-11T18:15:17.770
|
|
Please provide detailed information about CVE-2021-25689
|
CVE:CVE-2021-25689
Description:An out of bounds write in Teradici PCoIP soft client versions prior to version 20.10.1 could allow an attacker to remotely execute code.
published:2021-02-11T18:15:17.817
|
|
Please provide detailed information about CVE-2021-25690
|
CVE:CVE-2021-25690
Description:A null pointer dereference in Teradici PCoIP Soft Client versions prior to 20.07.3 could allow an attacker to crash the software.
published:2021-02-11T18:15:17.877
|
|
Please provide detailed information about CVE-2021-27184
|
CVE:CVE-2021-27184
Description:Pelco Digital Sentry Server 7.18.72.11464 has an XML External Entity vulnerability (exploitable via the DTD parameter entities technique), resulting in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the ControlPointCacheShare.xml file (in a %APPDATA%\Pelco directory) when DSControlPoint.exe is executed.
published:2021-02-11T18:15:18.177
|
|
Please provide detailed information about CVE-2021-27191
|
CVE:CVE-2021-27191
Description:The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion.
published:2021-02-11T18:15:18.347
|
|
Please provide detailed information about CVE-2021-21307
|
CVE:CVE-2021-21307
Description:Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator.
published:2021-02-11T19:15:13.313
|
|
Please provide detailed information about CVE-2021-21015
|
CVE:CVE-2021-21015
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an OS command injection via the customer attribute save controller. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
published:2021-02-11T20:15:13.827
|
|
Please provide detailed information about CVE-2021-21016
|
CVE:CVE-2021-21016
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to OS command injection via the WebAPI. Successful exploitation could lead to remote code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
published:2021-02-11T20:15:13.920
|
|
Please provide detailed information about CVE-2021-21017
|
CVE:CVE-2021-21017
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:13.997
|
|
Please provide detailed information about CVE-2021-21018
|
CVE:CVE-2021-21018
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to OS command injection via the scheduled operation module. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
published:2021-02-11T20:15:14.077
|
|
Please provide detailed information about CVE-2021-21019
|
CVE:CVE-2021-21019
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the Widgets module. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
published:2021-02-11T20:15:14.123
|
|
Please provide detailed information about CVE-2021-21020
|
CVE:CVE-2021-21020
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an access control bypass vulnerability in the Login as Customer module. Successful exploitation could lead to unauthorized access to restricted resources.
published:2021-02-11T20:15:14.187
|
|
Please provide detailed information about CVE-2021-21021
|
CVE:CVE-2021-21021
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:14.263
|
|
Please provide detailed information about CVE-2021-21022
|
CVE:CVE-2021-21022
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an insecure direct object reference (IDOR) in the product module. Successful exploitation could lead to unauthorized access to restricted resources.
published:2021-02-11T20:15:14.327
|
|
Please provide detailed information about CVE-2021-21023
|
CVE:CVE-2021-21023
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a stored cross-site scripting vulnerability in the admin console. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Access to the admin console is required for successful exploitation.
published:2021-02-11T20:15:14.387
|
|
Please provide detailed information about CVE-2021-21024
|
CVE:CVE-2021-21024
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a blind SQL injection vulnerability in the Search module. Successful exploitation could lead to unauthorized access to restricted resources by an unauthenticated attacker. Access to the admin console is required for successful exploitation.
published:2021-02-11T20:15:14.450
|
|
Please provide detailed information about CVE-2021-21025
|
CVE:CVE-2021-21025
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the product layout updates. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
published:2021-02-11T20:15:14.513
|
|
Please provide detailed information about CVE-2021-21026
|
CVE:CVE-2021-21026
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by an improper authorization vulnerability in the integrations module. Successful exploitation could lead to unauthorized access to restricted resources by an unauthenticated attacker. Access to the admin console is required for successful exploitation.
published:2021-02-11T20:15:14.560
|
|
Please provide detailed information about CVE-2021-21027
|
CVE:CVE-2021-21027
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a cross-site request forgery (CSRF) vulnerability via the GraphQL API. Successful exploitation could lead to unauthorized modification of customer metadata by an unauthenticated attacker. Access to the admin console is not required for successful exploitation.
published:2021-02-11T20:15:14.623
|
|
Please provide detailed information about CVE-2021-21028
|
CVE:CVE-2021-21028
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:14.700
|
|
Please provide detailed information about CVE-2021-21029
|
CVE:CVE-2021-21029
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a Reflected Cross-site Scripting vulnerability via 'file' parameter. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Access to the admin console is required for successful exploitation.
published:2021-02-11T20:15:14.763
|
|
Please provide detailed information about CVE-2021-21030
|
CVE:CVE-2021-21030
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a stored cross-site scripting (XSS) in the customer address upload feature. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Exploitation of this issue requires user interaction.
published:2021-02-11T20:15:14.827
|
|
Please provide detailed information about CVE-2021-21031
|
CVE:CVE-2021-21031
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) do not adequately invalidate user sessions. Successful exploitation could lead to unauthorized access to restricted resources. Access to the admin console is not required for successful exploitation.
published:2021-02-11T20:15:14.887
|
|
Please provide detailed information about CVE-2021-21032
|
CVE:CVE-2021-21032
Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) do not adequately invalidate user sessions. Successful exploitation of this issue could lead to unauthorized access to restricted resources. Access to the admin console is not required for successful exploitation.
published:2021-02-11T20:15:14.950
|
|
Please provide detailed information about CVE-2021-21033
|
CVE:CVE-2021-21033
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:14.997
|
|
Please provide detailed information about CVE-2021-21034
|
CVE:CVE-2021-21034
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to locally elevate privileges in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.060
|
|
Please provide detailed information about CVE-2021-21035
|
CVE:CVE-2021-21035
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.137
|
|
Please provide detailed information about CVE-2021-21036
|
CVE:CVE-2021-21036
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Integer Overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.200
|
|
Please provide detailed information about CVE-2021-21037
|
CVE:CVE-2021-21037
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Path Traversal vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.247
|
|
Please provide detailed information about CVE-2021-21038
|
CVE:CVE-2021-21038
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a crafted jpeg file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.310
|
|
Please provide detailed information about CVE-2021-21039
|
CVE:CVE-2021-21039
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.387
|
|
Please provide detailed information about CVE-2021-21040
|
CVE:CVE-2021-21040
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.450
|
|
Please provide detailed information about CVE-2021-21041
|
CVE:CVE-2021-21041
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a use-after-free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.513
|
|
Please provide detailed information about CVE-2021-21042
|
CVE:CVE-2021-21042
Description:Acrobat Reader DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Read vulnerability that could lead to arbitrary disclosure of information in the memory stack. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.590
|
|
Please provide detailed information about CVE-2021-21044
|
CVE:CVE-2021-21044
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a crafted jpeg file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.653
|
|
Please provide detailed information about CVE-2021-21045
|
CVE:CVE-2021-21045
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an improper access control vulnerability. An unauthenticated attacker could leverage this vulnerability to elevate privileges in the context of the current user.
published:2021-02-11T20:15:15.717
|
|
Please provide detailed information about CVE-2021-21046
|
CVE:CVE-2021-21046
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to cause an application denial-of-service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.797
|
|
Please provide detailed information about CVE-2021-21057
|
CVE:CVE-2021-21057
Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a null pointer dereference vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.873
|
|
Please provide detailed information about CVE-2021-21060
|
CVE:CVE-2021-21060
Description:Adobe Acrobat Pro DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an improper input validation vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.950
|
|
Please provide detailed information about CVE-2021-21061
|
CVE:CVE-2021-21061
Description:Acrobat Pro DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use-after-free vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
published:2021-02-11T20:15:15.997
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.