instruction
stringlengths
55
56
inputs
stringclasses
1 value
outputs
stringlengths
86
4.06k
Please provide detailed information about CVE-2021-27140
CVE:CVE-2021-27140 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to find passwords and authentication cookies stored in cleartext in the web.log HTTP logs. published:2021-02-10T19:15:12.683
Please provide detailed information about CVE-2021-27141
CVE:CVE-2021-27141 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. Credentials in /fhconf/umconfig.txt are obfuscated via XOR with the hardcoded *j7a(L#yZ98sSd5HfSgGjMj8;Ss;d)(*&^#@$a2s0i3g key. (The webs binary has details on how XOR is used.) published:2021-02-10T19:15:12.807
Please provide detailed information about CVE-2021-27142
CVE:CVE-2021-27142 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web management is done over HTTPS, using a hardcoded private key that has 0777 permissions. published:2021-02-10T19:15:12.840
Please provide detailed information about CVE-2021-27143
CVE:CVE-2021-27143 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / user1234 credentials for an ISP. published:2021-02-10T19:15:12.887
Please provide detailed information about CVE-2021-27144
CVE:CVE-2021-27144 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded f~i!b@e#r$h%o^m*esuperadmin / s(f)u_h+g|u credentials for an ISP. published:2021-02-10T19:15:13.010
Please provide detailed information about CVE-2021-27145
CVE:CVE-2021-27145 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / lnadmin credentials for an ISP. published:2021-02-10T19:15:13.057
Please provide detailed information about CVE-2021-27146
CVE:CVE-2021-27146 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / CUadmin credentials for an ISP. published:2021-02-10T19:15:13.167
Please provide detailed information about CVE-2021-27147
CVE:CVE-2021-27147 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / admin credentials for an ISP. published:2021-02-10T19:15:13.213
Please provide detailed information about CVE-2021-27148
CVE:CVE-2021-27148 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded telecomadmin / nE7jA%5m credentials for an ISP. published:2021-02-10T19:15:13.293
Please provide detailed information about CVE-2021-27149
CVE:CVE-2021-27149 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded adminpldt / z6dUABtl270qRxt7a2uGTiw credentials for an ISP. published:2021-02-10T19:15:13.387
Please provide detailed information about CVE-2021-27150
CVE:CVE-2021-27150 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded gestiontelebucaramanga / t3l3buc4r4m4ng42013 credentials for an ISP. published:2021-02-10T19:15:13.433
Please provide detailed information about CVE-2021-27151
CVE:CVE-2021-27151 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded rootmet / m3tr0r00t credentials for an ISP. published:2021-02-10T19:15:13.557
Please provide detailed information about CVE-2021-27152
CVE:CVE-2021-27152 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded awnfibre / fibre@dm!n credentials for an ISP. published:2021-02-10T19:15:13.607
Please provide detailed information about CVE-2021-27153
CVE:CVE-2021-27153 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded trueadmin / admintrue credentials for an ISP. published:2021-02-10T19:15:13.730
Please provide detailed information about CVE-2021-27154
CVE:CVE-2021-27154 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / G0R2U1P2ag credentials for an ISP. published:2021-02-10T19:15:13.777
Please provide detailed information about CVE-2021-27155
CVE:CVE-2021-27155 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 3UJUh2VemEfUtesEchEC2d2e credentials for an ISP. published:2021-02-10T19:15:13.823
Please provide detailed information about CVE-2021-27156
CVE:CVE-2021-27156 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains credentials for an ISP that equal the last part of the MAC address of the br0 interface. published:2021-02-10T19:15:13.933
Please provide detailed information about CVE-2021-27157
CVE:CVE-2021-27157 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 888888 credentials for an ISP. published:2021-02-10T19:15:13.980
Please provide detailed information about CVE-2021-27158
CVE:CVE-2021-27158 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded L1vt1m4eng / 888888 credentials for an ISP. published:2021-02-10T19:15:14.107
Please provide detailed information about CVE-2021-27159
CVE:CVE-2021-27159 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded useradmin / 888888 credentials for an ISP. published:2021-02-10T19:15:14.153
Please provide detailed information about CVE-2021-27160
CVE:CVE-2021-27160 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / 888888 credentials for an ISP. published:2021-02-10T19:15:14.183
Please provide detailed information about CVE-2021-27161
CVE:CVE-2021-27161 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 1234 credentials for an ISP. published:2021-02-10T19:15:14.340
Please provide detailed information about CVE-2021-27162
CVE:CVE-2021-27162 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / tattoo@home credentials for an ISP. published:2021-02-10T19:15:14.463
Please provide detailed information about CVE-2021-27163
CVE:CVE-2021-27163 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / tele1234 credentials for an ISP. published:2021-02-10T19:15:14.510
Please provide detailed information about CVE-2021-27164
CVE:CVE-2021-27164 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / aisadmin credentials for an ISP. published:2021-02-10T19:15:14.557
Please provide detailed information about CVE-2021-27165
CVE:CVE-2021-27165 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials. published:2021-02-10T19:15:14.620
Please provide detailed information about CVE-2021-27166
CVE:CVE-2021-27166 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon. published:2021-02-10T19:15:14.683
Please provide detailed information about CVE-2021-27167
CVE:CVE-2021-27167 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. There is a password of four hexadecimal characters for the admin account. These characters are generated in init_3bb_password in libci_adaptation_layer.so. published:2021-02-10T19:15:14.730
Please provide detailed information about CVE-2021-27168
CVE:CVE-2021-27168 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. There is a 6GFJdY4aAuUKJjdtSn7d password for the rdsadmin account. published:2021-02-10T19:15:14.793
Please provide detailed information about CVE-2021-27169
CVE:CVE-2021-27169 Description:An issue was discovered on FiberHome AN5506-04-FA devices with firmware RP2631. There is a gepon password for the gepon account. published:2021-02-10T19:15:14.887
Please provide detailed information about CVE-2021-27170
CVE:CVE-2021-27170 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. By default, there are no firewall rules for IPv6 connectivity, exposing the internal management interfaces to the Internet. published:2021-02-10T19:15:14.950
Please provide detailed information about CVE-2021-27171
CVE:CVE-2021-27171 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to start a Linux telnetd as root on port 26/tcp by using the CLI interface commands of ddd and shell (or tshell). published:2021-02-10T19:15:15.057
Please provide detailed information about CVE-2021-27172
CVE:CVE-2021-27172 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh. published:2021-02-10T19:15:15.120
Please provide detailed information about CVE-2021-27173
CVE:CVE-2021-27173 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach the telnet server (used for the CLI). published:2021-02-10T19:15:15.183
Please provide detailed information about CVE-2021-27174
CVE:CVE-2021-27174 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. wifi_custom.cfg has cleartext passwords and 0644 permissions. published:2021-02-10T19:15:15.247
Please provide detailed information about CVE-2021-27175
CVE:CVE-2021-27175 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions. published:2021-02-10T19:15:15.307
Please provide detailed information about CVE-2021-27176
CVE:CVE-2021-27176 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_5g.cfg has cleartext passwords and 0644 permissions. published:2021-02-10T19:15:15.370
Please provide detailed information about CVE-2021-27177
CVE:CVE-2021-27177 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server. published:2021-02-10T19:15:15.450
Please provide detailed information about CVE-2021-27178
CVE:CVE-2021-27178 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. Some passwords are stored in cleartext in nvram. published:2021-02-10T19:15:15.510
Please provide detailed information about CVE-2021-27179
CVE:CVE-2021-27179 Description:An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to crash the telnet daemon by sending a certain 0a 65 6e 61 62 6c 65 0a 02 0a 1a 0a string. published:2021-02-10T19:15:15.573
Please provide detailed information about CVE-2021-21296
CVE:CVE-2021-21296 Description:Fleet is an open source osquery manager. In Fleet before version 3.7.0 a malicious actor with a valid node key can send a badly formatted request that causes the Fleet server to exit, resulting in denial of service. This is possible only while a live query is currently ongoing. We believe the impact of this vulnerability to be low given the requirement that the actor has a valid node key. There is no information disclosure, privilege escalation, or code execution. The issue is fixed in Fleet 3.7.0. published:2021-02-10T20:15:15.353
Please provide detailed information about CVE-2021-25251
CVE:CVE-2021-25251 Description:The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability. published:2021-02-10T22:15:13.703
Please provide detailed information about CVE-2021-27185
CVE:CVE-2021-27185 Description:The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec. published:2021-02-10T22:15:13.813
Please provide detailed information about CVE-2021-27186
CVE:CVE-2021-27186 Description:Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by flb_avro.c or http_server/api/v1/metrics.c. published:2021-02-10T22:15:13.877
Please provide detailed information about CVE-2021-20335
CVE:CVE-2021-20335 Description:For MongoDB Ops Manager versions prior to and including 4.2.24 with multiple OM application servers, that have SSL turned on for their MongoDB processes, the upgrade to MongoDB Ops Manager versions prior to and including 4.4.12 triggers a bug where Automation thinks SSL is being turned off, and can disable SSL temporarily for members of the cluster. This issue is temporary and eventually corrects itself after MongoDB Ops Manager instances have finished upgrading to MongoDB Ops Manager 4.4. In addition, customers must be running with clientCertificateMode=OPTIONAL / allowConnectionsWithoutCertificates=true to be impacted*.* Customers upgrading from Ops Manager 4.2.X to 4.2.24 and finally to Ops Manager 4.4.13+ are unaffected by this issue. published:2021-02-11T10:15:12.223
Please provide detailed information about CVE-2021-23334
CVE:CVE-2021-23334 Description:Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none published:2021-02-11T12:15:12.173
Please provide detailed information about CVE-2021-23335
CVE:CVE-2021-23335 Description:All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure. published:2021-02-11T12:15:12.437
Please provide detailed information about CVE-2021-20402
CVE:CVE-2021-20402 Description:IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196076. published:2021-02-11T17:15:13.123
Please provide detailed information about CVE-2021-20403
CVE:CVE-2021-20403 Description:IBM Security Verify Information Queue 1.0.6 and 1.0.7 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. published:2021-02-11T17:15:13.217
Please provide detailed information about CVE-2021-20404
CVE:CVE-2021-20404 Description:IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a user on the network to cause a denial of service due to an invalid cookie value that could prevent future logins. IBM X-Force ID: 196078. published:2021-02-11T17:15:13.327
Please provide detailed information about CVE-2021-20405
CVE:CVE-2021-20405 Description:IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a user to perform unauthorized activities due to improper encoding of output. IBM X-Force ID: 196183. published:2021-02-11T17:15:13.420
Please provide detailed information about CVE-2021-20188
CVE:CVE-2021-20188 Description:A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security features are disabled when running the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. published:2021-02-11T18:15:16.177
Please provide detailed information about CVE-2021-21299
CVE:CVE-2021-21299 Description:hyper is an open-source HTTP library for Rust (crates.io). In hyper from version 0.12.0 and before versions 0.13.10 and 0.14.3 there is a vulnerability that can enable a request smuggling attack. The HTTP server code had a flaw that incorrectly understands some requests with multiple transfer-encoding headers to have a chunked payload, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that understands the request payload boundary differently can result in "request smuggling" or "desync attacks". To determine if vulnerable, all these things must be true: 1) Using hyper as an HTTP server (the client is not affected), 2) Using HTTP/1.1 (HTTP/2 does not use transfer-encoding), 3) Using a vulnerable HTTP proxy upstream to hyper. If an upstream proxy correctly rejects the illegal transfer-encoding headers, the desync attack cannot succeed. If there is no proxy upstream of hyper, hyper cannot start the desync attack, as the client will repair the headers before forwarding. This is fixed in versions 0.14.3 and 0.13.10. As a workaround one can take the following options: 1) Reject requests that contain a `transfer-encoding` header, 2) Ensure any upstream proxy handles `transfer-encoding` correctly. published:2021-02-11T18:15:16.800
Please provide detailed information about CVE-2021-21301
CVE:CVE-2021-21301 Description:Wire is an open-source collaboration platform. In Wire for iOS (iPhone and iPad) before version 3.75 there is a vulnerability where the video capture isn't stopped in a scenario where a user first has their camera enabled and then disables it. It's a privacy issue because video is streamed to the call when the user believes it is disabled. It impacts all users in video calls. This is fixed in version 3.75. published:2021-02-11T18:15:16.910
Please provide detailed information about CVE-2021-22652
CVE:CVE-2021-22652 Description:Access to the Advantech iView versions prior to v5.7.03.6112 configuration are missing authentication, which may allow an unauthorized attacker to change the configuration and obtain code execution. published:2021-02-11T18:15:17.003
Please provide detailed information about CVE-2021-22654
CVE:CVE-2021-22654 Description:Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information. published:2021-02-11T18:15:17.113
Please provide detailed information about CVE-2021-22656
CVE:CVE-2021-22656 Description:Advantech iView versions prior to v5.7.03.6112 are vulnerable to directory traversal, which may allow an attacker to read sensitive files. published:2021-02-11T18:15:17.190
Please provide detailed information about CVE-2021-22658
CVE:CVE-2021-22658 Description:Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an attacker to escalate privileges to 'Administrator'. published:2021-02-11T18:15:17.270
Please provide detailed information about CVE-2021-22880
CVE:CVE-2021-22880 Description:The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input. published:2021-02-11T18:15:17.333
Please provide detailed information about CVE-2021-22881
CVE:CVE-2021-22881 Description:The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website. published:2021-02-11T18:15:17.460
Please provide detailed information about CVE-2021-25688
CVE:CVE-2021-25688 Description:Under certain conditions, Teradici PCoIP Agents for Windows prior to version 20.10.0 and Teradici PCoIP Agents for Linux prior to version 21.01.0 may log parts of a user's password in the application logs. published:2021-02-11T18:15:17.770
Please provide detailed information about CVE-2021-25689
CVE:CVE-2021-25689 Description:An out of bounds write in Teradici PCoIP soft client versions prior to version 20.10.1 could allow an attacker to remotely execute code. published:2021-02-11T18:15:17.817
Please provide detailed information about CVE-2021-25690
CVE:CVE-2021-25690 Description:A null pointer dereference in Teradici PCoIP Soft Client versions prior to 20.07.3 could allow an attacker to crash the software. published:2021-02-11T18:15:17.877
Please provide detailed information about CVE-2021-27184
CVE:CVE-2021-27184 Description:Pelco Digital Sentry Server 7.18.72.11464 has an XML External Entity vulnerability (exploitable via the DTD parameter entities technique), resulting in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the ControlPointCacheShare.xml file (in a %APPDATA%\Pelco directory) when DSControlPoint.exe is executed. published:2021-02-11T18:15:18.177
Please provide detailed information about CVE-2021-27191
CVE:CVE-2021-27191 Description:The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. published:2021-02-11T18:15:18.347
Please provide detailed information about CVE-2021-21307
CVE:CVE-2021-21307 Description:Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator. published:2021-02-11T19:15:13.313
Please provide detailed information about CVE-2021-21015
CVE:CVE-2021-21015 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an OS command injection via the customer attribute save controller. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation. published:2021-02-11T20:15:13.827
Please provide detailed information about CVE-2021-21016
CVE:CVE-2021-21016 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to OS command injection via the WebAPI. Successful exploitation could lead to remote code execution by an authenticated attacker. Access to the admin console is required for successful exploitation. published:2021-02-11T20:15:13.920
Please provide detailed information about CVE-2021-21017
CVE:CVE-2021-21017 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:13.997
Please provide detailed information about CVE-2021-21018
CVE:CVE-2021-21018 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to OS command injection via the scheduled operation module. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation. published:2021-02-11T20:15:14.077
Please provide detailed information about CVE-2021-21019
CVE:CVE-2021-21019 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the Widgets module. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation. published:2021-02-11T20:15:14.123
Please provide detailed information about CVE-2021-21020
CVE:CVE-2021-21020 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an access control bypass vulnerability in the Login as Customer module. Successful exploitation could lead to unauthorized access to restricted resources. published:2021-02-11T20:15:14.187
Please provide detailed information about CVE-2021-21021
CVE:CVE-2021-21021 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:14.263
Please provide detailed information about CVE-2021-21022
CVE:CVE-2021-21022 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an insecure direct object reference (IDOR) in the product module. Successful exploitation could lead to unauthorized access to restricted resources. published:2021-02-11T20:15:14.327
Please provide detailed information about CVE-2021-21023
CVE:CVE-2021-21023 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a stored cross-site scripting vulnerability in the admin console. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Access to the admin console is required for successful exploitation. published:2021-02-11T20:15:14.387
Please provide detailed information about CVE-2021-21024
CVE:CVE-2021-21024 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a blind SQL injection vulnerability in the Search module. Successful exploitation could lead to unauthorized access to restricted resources by an unauthenticated attacker. Access to the admin console is required for successful exploitation. published:2021-02-11T20:15:14.450
Please provide detailed information about CVE-2021-21025
CVE:CVE-2021-21025 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the product layout updates. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation. published:2021-02-11T20:15:14.513
Please provide detailed information about CVE-2021-21026
CVE:CVE-2021-21026 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by an improper authorization vulnerability in the integrations module. Successful exploitation could lead to unauthorized access to restricted resources by an unauthenticated attacker. Access to the admin console is required for successful exploitation. published:2021-02-11T20:15:14.560
Please provide detailed information about CVE-2021-21027
CVE:CVE-2021-21027 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a cross-site request forgery (CSRF) vulnerability via the GraphQL API. Successful exploitation could lead to unauthorized modification of customer metadata by an unauthenticated attacker. Access to the admin console is not required for successful exploitation. published:2021-02-11T20:15:14.623
Please provide detailed information about CVE-2021-21028
CVE:CVE-2021-21028 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:14.700
Please provide detailed information about CVE-2021-21029
CVE:CVE-2021-21029 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a Reflected Cross-site Scripting vulnerability via 'file' parameter. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Access to the admin console is required for successful exploitation. published:2021-02-11T20:15:14.763
Please provide detailed information about CVE-2021-21030
CVE:CVE-2021-21030 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a stored cross-site scripting (XSS) in the customer address upload feature. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Exploitation of this issue requires user interaction. published:2021-02-11T20:15:14.827
Please provide detailed information about CVE-2021-21031
CVE:CVE-2021-21031 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) do not adequately invalidate user sessions. Successful exploitation could lead to unauthorized access to restricted resources. Access to the admin console is not required for successful exploitation. published:2021-02-11T20:15:14.887
Please provide detailed information about CVE-2021-21032
CVE:CVE-2021-21032 Description:Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) do not adequately invalidate user sessions. Successful exploitation of this issue could lead to unauthorized access to restricted resources. Access to the admin console is not required for successful exploitation. published:2021-02-11T20:15:14.950
Please provide detailed information about CVE-2021-21033
CVE:CVE-2021-21033 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:14.997
Please provide detailed information about CVE-2021-21034
CVE:CVE-2021-21034 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Read vulnerability. An unauthenticated attacker could leverage this vulnerability to locally elevate privileges in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.060
Please provide detailed information about CVE-2021-21035
CVE:CVE-2021-21035 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.137
Please provide detailed information about CVE-2021-21036
CVE:CVE-2021-21036 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Integer Overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.200
Please provide detailed information about CVE-2021-21037
CVE:CVE-2021-21037 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Path Traversal vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.247
Please provide detailed information about CVE-2021-21038
CVE:CVE-2021-21038 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a crafted jpeg file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.310
Please provide detailed information about CVE-2021-21039
CVE:CVE-2021-21039 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.387
Please provide detailed information about CVE-2021-21040
CVE:CVE-2021-21040 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use After Free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.450
Please provide detailed information about CVE-2021-21041
CVE:CVE-2021-21041 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a use-after-free vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.513
Please provide detailed information about CVE-2021-21042
CVE:CVE-2021-21042 Description:Acrobat Reader DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Read vulnerability that could lead to arbitrary disclosure of information in the memory stack. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.590
Please provide detailed information about CVE-2021-21044
CVE:CVE-2021-21044 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a crafted jpeg file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.653
Please provide detailed information about CVE-2021-21045
CVE:CVE-2021-21045 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an improper access control vulnerability. An unauthenticated attacker could leverage this vulnerability to elevate privileges in the context of the current user. published:2021-02-11T20:15:15.717
Please provide detailed information about CVE-2021-21046
CVE:CVE-2021-21046 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to cause an application denial-of-service. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.797
Please provide detailed information about CVE-2021-21057
CVE:CVE-2021-21057 Description:Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a null pointer dereference vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve denial of service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.873
Please provide detailed information about CVE-2021-21060
CVE:CVE-2021-21060 Description:Adobe Acrobat Pro DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an improper input validation vulnerability. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.950
Please provide detailed information about CVE-2021-21061
CVE:CVE-2021-21061 Description:Acrobat Pro DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Use-after-free vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to disclose sensitive information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. published:2021-02-11T20:15:15.997