Report Name: CVE2021 report
Generated: 2022-02-09 00:33:45

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLComment
SCOM0.93System Center Operations Manager
Windows Kernel0.9114Windows Kernel
APT0.817A free-software user interface that works with core libraries to handle the installation and removal of software on Debian
RPC0.81Remote Procedure Call Runtime
Zoom0.813Zoom is the leader in modern enterprise video communications
Cisco Small Business Router0.72Network Device
Curl0.71Curl is a command-line tool for transferring data specified with URL syntax
Envira Gallery Lite WordPress plugin0.61WordPress plugin
Internet Explorer0.61Internet Explorer is a discontinued series of graphical web browsers developed by Microsoft
Microsoft SQL0.61Microsoft SQL
MyBB0.6221MyBB, formerly MyBBoard and originally MyBulletinBoard, is a free and open-source forum software developed by the MyBB Group
Office0.6111MS Office product
WP Google Map Plugin WordPress plugin0.61WordPress plugin
b2evolution0.6112b2evolution is a content and community management system
Azure0.41Azure
Azure Virtual Machine0.41Azure Virtual Machine
Git0.41157Git
Unknown Product04102321068Unknown Product


Vulnerability Types

Vulnerability TypeCriticalityUCHMLComment
Remote Code Execution1.031485Remote Code Execution
Code Injection0.97556Code Injection
Command Injection0.971222Command Injection
XXE Injection0.973XXE Injection
Authentication Bypass0.9520Authentication Bypass
Denial of Service0.718Denial of Service
Memory Corruption0.611Memory Corruption
Open Redirect0.68Open Redirect
Elevation of Privilege0.51912Elevation of Privilege
Cross Site Scripting0.49332Cross Site Scripting
Information Disclosure0.435Information Disclosure
Path Traversal0.4114Path Traversal
Spoofing0.411Spoofing
Tampering0.33Tampering
Unknown Vulnerability Type0136713Unknown Vulnerability Type


Vulnerabilities

Urgent (4)

1. Remote Code Execution - Unknown Product (CVE-2021-22502) - Urgent [810]

Description: {'vulners_cve_data_all': 'Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Micro Focus Operations Bridge Reporter Unauthenticated Command Injection, Micro Focus Operations Bridge Reporter Unauthenticated Command Injection Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-22502 is not detected by Nessus and OpenVAS

2. Remote Code Execution - Unknown Product (CVE-2021-27850) - Urgent [810]

Description: {'vulners_cve_data_all': 'A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.1, upgrade to 5.6.2 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Deserialization of Untrusted Data in Apache Tapestry, Exploit for Deserialization of Untrusted Data in Apache Tapestry, Exploit for Deserialization of Untrusted Data in Apache Tapestry)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-27850 is detected by OpenVAS

3. Remote Code Execution - Unknown Product (CVE-2021-41653) - Urgent [810]

Description: {'vulners_cve_data_all': 'The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Code Injection in Tp-Link Tl-Wr840N Firmware)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-41653 is not detected by Nessus and OpenVAS

4. Command Injection - Unknown Product (CVE-2021-42071) - Urgent [804]

Description: {'vulners_cve_data_all': 'In Visual Tools DVR VX16 4.2.28.0, an unauthenticated attacker can achieve remote command execution via shell metacharacters in the cgi-bin/slogin/login.py User-Agent HTTP header.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Visual Tools DVR VX16 4.2.28.0 - OS Command Injection (Unauthenticated))
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-42071 is not detected by Nessus and OpenVAS

Critical (23)

5. Command Injection - Unknown Product (CVE-2021-36260) - Critical [791]

Description: {'vulners_cve_data_all': 'A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Command Injection in Hikvision Ds-2Td6266T-50H2L Firmware, Exploit for Command Injection in Hikvision Ds-2Td6266T-50H2L Firmware, Exploit for Command Injection in Hikvision Ds-2Td6266T-50H2L Firmware, Exploit for Command Injection in Hikvision Ds-2Td6266T-50H2L Firmware, Hikvision Web Server Build 210702 - Command Injection Exploit, Hikvision Web Server Build 210702 Command Injection, Hikvision Web Server Build 210702 - Command Injection)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.3. Based on Vulners data

Status: CVE-2021-36260 is not detected by Nessus and OpenVAS

6. Remote Code Execution - Unknown Product (CVE-2020-25506) - Critical [783]

Description: {'vulners_cve_data_all': 'D-Link DNS-320 FW v2.06B01 Revision Ax is affected by command injection in the system_mgr.cgi component, which can lead to remote arbitrary code execution.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (D-Link DNS-320 命令注入漏洞(CVE-2020-25506))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2020-25506 is detected by OpenVAS

7. Remote Code Execution - Unknown Product (CVE-2021-24370) - Critical [783]

Description: {'vulners_cve_data_all': 'The Fancy Product Designer WordPress plugin before 4.6.9 allows unauthenticated attackers to upload arbitrary files, resulting in remote code execution.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Fancy Product Designer < 4.6.9 - Unauthenticated Arbitrary File Upload and RCE)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24370 is not detected by Nessus and OpenVAS

8. Remote Code Execution - Unknown Product (CVE-2021-29003) - Critical [783]

Description: {'vulners_cve_data_all': 'Genexis PLATINUM 4410 2.1 P4410-V2-1.28 devices allow remote attackers to execute arbitrary code via shell metacharacters to sys_config_valid.xgi, as demonstrated by the sys_config_valid.xgi?exeshell=%60telnetd%20%26%60 URI.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Genexis PLATINUM 4410 2.1 P4410-V2-1.28 Remote Command Execution, Exploit for Vulnerability in Genexis Platinum 4410 Firmware, Genexis PLATINUM 4410 2.1 P4410-V2-1.28 - Remote Code Execution Vulnerability, Genexis PLATINUM 4410 2.1 P4410-V2-1.28 - RCE)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-29003 is not detected by Nessus and OpenVAS

9. Remote Code Execution - Unknown Product (CVE-2021-3129) - Critical [783]

Description: {'vulners_cve_data_all': 'Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Vulnerability in Facade Ignition, Exploit for Improper Authentication in Th-Wildau Covid-19 Contact Tracing, Ignition 2.5.1 Remote Code Execution Exploit, Ignition 2.5.1 Remote Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-3129 is not detected by Nessus and OpenVAS

10. Remote Code Execution - Unknown Product (CVE-2021-40870) - Critical [783]

Description: {'vulners_cve_data_all': 'An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Unrestricted Upload of File with Dangerous Type in Aviatrix Controller, Exploit for Unrestricted Upload of File with Dangerous Type in Aviatrix Controller, Aviatrix Controller 6.x Path Traversal / Code Execution, Aviatrix Controller 6.x Path Traversal / Code Execution Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-40870 is not detected by Nessus and OpenVAS

11. Remote Code Execution - Unknown Product (CVE-2021-26919) - Critical [770]

Description: {'vulners_cve_data_all': 'Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Apache Druid远程代码执行漏洞(CVE-2021-26919))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2021-26919 is not detected by Nessus and OpenVAS

12. Command Injection - Unknown Product (CVE-2021-21315) - Critical [737]

Description: {'vulners_cve_data_all': 'The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for OS Command Injection in Systeminformation, Exploit for OS Command Injection in Systeminformation, Exploit for OS Command Injection in Systeminformation, Exploit for OS Command Injection in Systeminformation)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 4.6. Based on Vulners data

Status: CVE-2021-21315 is not detected by Nessus and OpenVAS

13. Remote Code Execution - Windows Kernel (CVE-2021-27198) - Critical [737]

Description: An issue was discovered in Visualware MyConnection Server before v11.1a. Unauthenticated Remote Code Execution can occur via Arbitrary File Upload in the web service when using a myspeed/sf?filename= URI. This application is written in Java and is thus cross-platform. The Windows installation runs as SYSTEM, which means that exploitation gives one Administrator privileges on the target system.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (VisualWare MyConnection Server 11.x Remote Code Execution Vulnerability, VisualWare MyConnection Server 11.x Remote Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-27198 is not detected by Nessus and OpenVAS

14. Remote Code Execution - Cisco Small Business Router (CVE-2021-34730) - Critical [700]

Description: A vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of incoming UPnP traffic. An attacker could exploit this vulnerability by sending a crafted UPnP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition. Cisco has not released software updates that address this vulnerability.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Improper Input Validation in Cisco Application Extension Platform)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Network Device
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-34730 is not detected by Nessus and OpenVAS

15. Elevation of Privilege - Unknown Product (CVE-2021-28663) - Critical [695]

Description: {'vulners_cve_data_all': 'The Arm Mali GPU kernel driver allows privilege escalation or information disclosure because GPU memory operations are mishandled, leading to a use-after-free. This affects Bifrost r0p0 through r28p0 before r29p0, Valhall r19p0 through r28p0 before r29p0, and Midgard r4p0 through r30p0.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Use After Free in Arm Midguard Gpu Kernel Driver)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-28663 is not detected by Nessus and OpenVAS

16. Remote Code Execution - Zoom (CVE-2021-34423) - Critical [691]

Description: A buffer overflow vulnerability was discovered in Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.8.4, Zoom Client for Meetings for Blackberry (for Android and iOS) before version 5.8.1, Zoom Client for Meetings for intune (for Android and iOS) before version 5.8.4, Zoom Client for Meetings for Chrome OS before version 5.0.1, Zoom Rooms for Conference Room (for Android, AndroidBali, macOS, and Windows) before version 5.8.3, Controllers for Zoom Rooms (for Android, iOS, and Windows) before version 5.8.3, Zoom VDI Windows Meeting Client before version 5.8.4, Zoom VDI Azure Virtual Desktop Plugins (for Windows x86 or x64, IGEL x64, Ubuntu x64, HP ThinPro OS x64) before version 5.8.4.21112, Zoom VDI Citrix Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom VDI VMware Plugins (for Windows x86 or x64, Mac Universal Installer & Uninstaller, IGEL x64, eLux RP6 x64, HP ThinPro OS x64, Ubuntu x64, CentOS x 64, Dell ThinOS) before version 5.8.4.21112, Zoom Meeting SDK for Android before version 5.7.6.1922, Zoom Meeting SDK for iOS before version 5.7.6.1082, Zoom Meeting SDK for macOS before version 5.7.6.1340, Zoom Meeting SDK for Windows before version 5.7.6.1081, Zoom Video SDK (for Android, iOS, macOS, and Windows) before version 1.1.2, Zoom On-Premise Meeting Connector Controller before version 4.8.12.20211115, Zoom On-Premise Meeting Connector MMR before version 4.8.12.20211115, Zoom On-Premise Recording Connector before version 5.1.0.65.20211116, Zoom On-Premise Virtual Room Connector before version 4.4.7266.20211117, Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5692.20211117, Zoom Hybrid Zproxy before version 1.0.1058.20211116, and Zoom Hybrid MMR before version 4.6.20211116.131_x86-64. This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Vulnerability in Microsoft)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814Zoom is the leader in modern enterprise video communications
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-34423 is detected by OpenVAS

17. Remote Code Execution - Cisco Small Business Router (CVE-2021-1167) - Critical [686]

Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Cisco RV110W 1.2.1.7 - 'vpn_account' Denial of Service (PoC), Cisco RV110W 1.2.1.7 Denial Of Service, Cisco RV110W 1.2.1.7 - (vpn_account) Denial of Service Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.714Network Device
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-1167 is not detected by Nessus and OpenVAS

18. Remote Code Execution - APT (CVE-2021-26943) - Critical [678]

Description: The UX360CA BIOS through 303 on ASUS laptops allow an attacker (with the ring 0 privilege) to overwrite nearly arbitrary physical memory locations, including SMRAM, and execute arbitrary code in the SMM (issue 3 of 3).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Vulnerability in Asus Ux360Ca Bios)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814A free-software user interface that works with core libraries to handle the installation and removal of software on Debian
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.2. Based on Vulners data

Status: CVE-2021-26943 is not detected by Nessus and OpenVAS

19. Code Injection - RPC (CVE-2021-24629) - Critical [672]

Description: The Post Content XMLRPC WordPress plugin through 1.0 does not sanitise or escape multiple GET/POST parameters before using them in SQL statements in the admin dashboard, leading to an authenticated SQL Injections

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Post Content XMLRPC <= 1.0 - Admin+ SQL Injections)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.814Remote Procedure Call Runtime
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2021-24629 is not detected by Nessus and OpenVAS

20. Remote Code Execution - Office (CVE-2020-13451) - Critical [654]

Description: An incomplete-cleanup vulnerability in the Office rendering engine of Gotenberg through 6.2.1 allows an attacker to overwrite LibreOffice configuration files and execute arbitrary code via macros.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Gotenberg 6.2.0 Traversal / Code Execution / Insecure Permissions)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614MS Office product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2020-13451 is not detected by Nessus and OpenVAS

21. Code Injection - MyBB (CVE-2021-27890) - Critical [634]

Description: SQL Injection vulnerablity in MyBB before 1.8.26 via theme properties included in theme XML files.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (MyBB 未授权RCE漏洞(CVE-2021-27889 CVE-2021-27890), Exploit for Cross-site Scripting in Mybb, MyBB 1.8.25 - Chained Remote Command Execution Exploit, MyBB 1.8.25 Remote Command Execution, MyBB 1.8.25 - Chained Remote Command Execution)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614MyBB, formerly MyBBoard and originally MyBulletinBoard, is a free and open-source forum software developed by the MyBB Group
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.8. Based on Vulners data

Status: CVE-2021-27890 is detected by OpenVAS

22. Code Injection - MyBB (CVE-2021-27946) - Critical [634]

Description: SQL Injection vulnerability in MyBB before 1.8.26 via poll vote count. (issue 1 of 3).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (MyBB SQL注入漏洞(CVE-2021-27946), MyBB 1.8.25 - Poll Vote Count SQL Injection Vulnerability, MyBB 1.8.25 SQL Injection, MyBB 1.8.25 - Poll Vote Count SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614MyBB, formerly MyBBoard and originally MyBulletinBoard, is a free and open-source forum software developed by the MyBB Group
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2021-27946 is detected by OpenVAS

23. Code Injection - WP Google Map Plugin WordPress plugin (CVE-2021-24130) - Critical [634]

Description: Unvalidated input in the WP Google Map Plugin WordPress plugin, versions before 4.1.5, in the Manage Locations page within the plugin settings was vulnerable to SQL Injection through a high privileged user (admin+).

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (WP Google Map Plugin < 4.1.5 - Authenticated SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614WordPress plugin
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2021-24130 is detected by OpenVAS

24. Code Injection - b2evolution (CVE-2021-28242) - Critical [634]

Description: SQL Injection in the "evoadm.php" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the "cf_name" parameter when creating a new filter under the "Collections" tab.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (b2evolution 7-2-2 - (cf_name) SQL Injection Exploit, b2evolution 7-2-2 SQL Injection, b2evolution 7-2-2 - 'cf_name' SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614b2evolution is a content and community management system
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2021-28242 is detected by OpenVAS

25. Remote Code Execution - Azure (CVE-2021-40371) - Critical [616]

Description: Gridpro Request Management for Windows Azure Pack before 2.0.7912 allows Directory Traversal for remote code execution, as demonstrated by ..\\ in a scriptName JSON value to ServiceManagerTenant/GetVisibilityMap.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (GridPro Request Management For Windows Azure Pack 2.0.7905 Directory Traversal Vulnerability, GridPro Request Management For Windows Azure Pack 2.0.7905 Directory Traversal)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.414Azure
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-40371 is not detected by Nessus and OpenVAS

26. Unknown Vulnerability Type - Unknown Product (CVE-2021-32305) - Critical [608]

Description: {'vulners_cve_data_all': 'WebSVN before 2.6.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the search parameter.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (WebSVN search command execution, WebSVN search command execution, WebSVN search command execution, Websvn 2.6.0 - Remote Code Execution (Unauthenticated) Exploit, Websvn 2.6.0 Remote Code Execution, Websvn 2.6.0 - Remote Code Execution (Unauthenticated))
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-32305 is not detected by Nessus and OpenVAS

27. Remote Code Execution - Git (CVE-2021-22192) - Critical [602]

Description: An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.2 allowing unauthorized authenticated users to execute arbitrary code on the server.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (GitLab 未授权RCE漏洞(CVE-2021-22192), Exploit for Vulnerability in Gitlab, Exploit for Vulnerability in Gitlab)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.414Git
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2021-22192 is not detected by Nessus and OpenVAS

High (282)

28. Denial of Service - Windows Kernel (CVE-2020-35488) - High [595]

Description: The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allows remote attackers to cause a denial of service (daemon crash) via a crafted Syslog payload to the Syslog service. This attack requires a specific configuration. Also, the name of the directory created must use a Syslog field. (For example, on Linux it is not possible to create a .. directory. On Windows, it is not possible to create a CON directory.)

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Deserialization of Untrusted Data in Nxlog, Nxlog Community Edition 2.10.2150 - DoS (Poc))
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.410Vulnerability Severity Rating based on CVSS Base Score is 4.3. Based on Vulners data

Status: CVE-2020-35488 is not detected by Nessus and OpenVAS

29. Elevation of Privilege - Windows Kernel (CVE-2021-35523) - High [595]

Description: Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under "%APPDATA%\Securepoint SSL VPN" and add a external script file that is executed as privileged user.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Securepoint SSL VPN Client 2.0.30 Local Privilege Escalation Vulnerability, Securepoint SSL VPN Client 2.0.30 Local Privilege Escalation)
Criticality of Vulnerability Type0.515Elevation of Privilege
Vulnerable Product is Common0.914Windows Kernel
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 7.2. Based on Vulners data

Status: CVE-2021-35523 is not detected by Nessus and OpenVAS

30. Unknown Vulnerability Type - Unknown Product (CVE-2021-27860) - High [594]

Description: {'vulners_cve_data_all': 'A vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p92 and 10.2.2r44p1 allows a remote, unauthenticated attacker to upload a file to any location on the filesystem. The FatPipe advisory identifier for this vulnerability is FPSA006.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (FatPipe Networks WARP/IPVPN/MPVPN 10.2.2 CSRF Add Admin Exploit)
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.3. Based on Vulners data

Status: CVE-2021-27860 is not detected by Nessus and OpenVAS

31. Unknown Vulnerability Type - Unknown Product (CVE-2021-21307) - High [581]

Description: {'vulners_cve_data_all': 'Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Lucee Server 未授权RCE漏洞(CVE-2021-21307), Lucee Administrator imgProcess.cfm Arbitrary File Write Exploit, Lucee Administrator imgProcess.cfm Arbitrary File Write)
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-21307 is detected by OpenVAS

32. Unknown Vulnerability Type - Unknown Product (CVE-2021-24175) - High [581]

Description: {'vulners_cve_data_all': 'The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.7 was being actively exploited to by malicious actors to bypass authentication, allowing unauthenticated users to log in as any user (including admin) by just providing the related username, as well as create accounts with arbitrary roles, such as admin. These issues can be exploited even if registration is disabled, and the Login widget is not active.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (WordPress The Plus Addons for Elementor插件身份验证绕过漏洞(CVE-2021-24175), The Plus Addons for Elementor Page Builder < 4.1.7 - Authentication Bypass)
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24175 is not detected by Nessus and OpenVAS

33. Unknown Vulnerability Type - Unknown Product (CVE-2021-24499) - High [581]

Description: {'vulners_cve_data_all': 'The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Workreap < 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution, Exploit for Unrestricted Upload of File with Dangerous Type in Amentotech Workreap)
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24499 is not detected by Nessus and OpenVAS

34. Remote Code Execution - Git (CVE-2021-37678) - High [575]

Description: TensorFlow is an end-to-end open source platform for machine learning. In affected versions TensorFlow and Keras can be tricked to perform arbitrary code execution when deserializing a Keras model from YAML format. The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/python/keras/saving/model_config.py#L66-L104) uses `yaml.unsafe_load` which can perform arbitrary code execution on the input. Given that YAML format support requires a significant amount of work, we have removed it for now. We have patched the issue in GitHub commit 23d6383eb6c14084a8fc3bdf164043b974818012. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Deserialization of Untrusted Data in Google Tensorflow)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.414Git
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 4.6. Based on Vulners data

Status: CVE-2021-37678 is not detected by Nessus and OpenVAS

35. Remote Code Execution - Unknown Product (CVE-2020-21224) - High [567]

Description: {'vulners_cve_data_all': 'A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.0. A remote attacker can send a malicious login packet to the control server', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Argument Injection in Inspur Clusterengine)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2020-21224 is not detected by Nessus and OpenVAS

36. Remote Code Execution - Unknown Product (CVE-2021-31474) - High [567]

Description: {'vulners_cve_data_all': 'This vulnerability allows remote attackers to execute arbitrary code on affected installations of SolarWinds Network Performance Monitor 2020.2.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SolarWinds.Serialization library. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12213.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (SolarWinds Orion 远程代码执行漏洞(CVE-2021-31474), Exploit for Deserialization of Untrusted Data in Solarwinds Orion Platform)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-31474 is not detected by Nessus and OpenVAS

37. Remote Code Execution - Unknown Product (CVE-2021-39274) - High [567]

Description: {'vulners_cve_data_all': 'In XeroSecurity Sn1per 9.0 (free version), insecure directory permissions (0777) are set during installation, allowing an unprivileged user to modify the main application and the application configuration file. This results in arbitrary code execution with root privileges.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Incorrect Default Permissions in Xerosecurity Sn1Per)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-39274 is not detected by Nessus and OpenVAS

38. Remote Code Execution - Unknown Product (CVE-2021-41290) - High [567]

Description: {'vulners_cve_data_all': 'ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (ECOA Building Automation System Path Traversal Arbitrary File Upload)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-41290 is not detected by Nessus and OpenVAS

39. Remote Code Execution - Unknown Product (CVE-2021-43936) - High [567]

Description: {'vulners_cve_data_all': "The software allows the attacker to upload or transfer files of dangerous types to the WebHMI portal, that may be automatically processed within the product's environment or lead to arbitrary code execution.", 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (WebHMI 4.0 - Remote Code Execution Exploit, WebHMI 4.0 Remote Code Execution, Exploit for Unrestricted Upload of File with Dangerous Type in Webhmi Webhmi Firmware, WebHMI 4.0 - Remote Code Execution (RCE) (Authenticated))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-43936 is not detected by Nessus and OpenVAS

40. Command Injection - Unknown Product (CVE-2019-25024) - High [561]

Description: {'vulners_cve_data_all': 'OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for OS Command Injection in Alleghenycreative Openrepeater)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2019-25024 is not detected by Nessus and OpenVAS

41. Command Injection - Unknown Product (CVE-2021-33514) - High [561]

Description: {'vulners_cve_data_all': "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3.", 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (NETGEAR GS110TPV3未认证命令注入漏洞(CVE-2021-33514))
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-33514 is detected by OpenVAS

42. Authentication Bypass - Unknown Product (CVE-2021-24148) - High [557]

Description: {'vulners_cve_data_all': 'A business logic issue in the MStore API WordPress plugin, versions before 3.2.0, had an authentication bypass with Sign In With Apple allowing unauthenticated users to recover an authentication cookie with only an email address.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (MStore API < 3.2.0 - Authentication Bypass With Sign In With Apple)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-24148 is not detected by Nessus and OpenVAS

43. Authentication Bypass - Unknown Product (CVE-2021-33044) - High [557]

Description: {'vulners_cve_data_all': 'The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Improper Authentication in Dahuasecurity Tpc-Bf1241 Firmware, Exploit for Improper Authentication in Dahuasecurity Tpc-Bf1241 Firmware, Dahua Authentication Bypass Vulnerability, Dahua Authentication Bypass)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-33044 is detected by OpenVAS

44. Authentication Bypass - Unknown Product (CVE-2021-33045) - High [557]

Description: {'vulners_cve_data_all': 'The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Improper Authentication in Dahuasecurity Xvr-5X16 Firmware, Exploit for Improper Authentication in Dahuasecurity Tpc-Bf1241 Firmware, Dahua Authentication Bypass Vulnerability, Dahua Authentication Bypass)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-33045 is detected by OpenVAS

45. Authentication Bypass - Unknown Product (CVE-2021-35973) - High [557]

Description: {'vulners_cve_data_all': 'NETGEAR WAC104 devices before 1.0.4.15 are affected by an authentication bypass vulnerability in /usr/sbin/mini_httpd, allowing an unauthenticated attacker to invoke any action by adding the ¤tsetting.htm substring to the HTTP query, a related issue to CVE-2020-27866. This directly allows the attacker to change the web UI password, and eventually to enable debug mode (telnetd) and gain a shell on the device as the admin limited-user account (however, escalation to root is simple because of weak permissions on the /etc/ directory).', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (NETGEAR WAC104身份验证绕过漏洞(CVE-2021-35973))
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-35973 is not detected by Nessus and OpenVAS

46. Authentication Bypass - Unknown Product (CVE-2021-41301) - High [557]

Description: {'vulners_cve_data_all': 'ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated attacker to remotely disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (ECOA Building Automation System Configuration Download Information Disclosure)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score1.010Vulnerability Severity Rating based on CVSS Base Score is 10.0. Based on Vulners data

Status: CVE-2021-41301 is not detected by Nessus and OpenVAS

47. Cross Site Scripting - APT (CVE-2021-24565) - High [556]

Description: The Contact Form 7 Captcha WordPress plugin before 0.0.9 does not have any CSRF check in place when saving its settings, allowing attacker to make a logged in user with the manage_options change them. Furthermore, the settings are not escaped when output in attributes, leading to a Stored Cross-Site Scripting issue.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Contact Form 7 Captcha < 0.0.9 - CSRF to Stored XSS)
Criticality of Vulnerability Type0.415Cross Site Scripting
Vulnerable Product is Common0.814A free-software user interface that works with core libraries to handle the installation and removal of software on Debian
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.8. Based on Vulners data

Status: CVE-2021-24565 is detected by OpenVAS

48. Remote Code Execution - Unknown Product (CVE-2020-35576) - High [554]

Description: {'vulners_cve_data_all': 'A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions prior to 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (TP-Link TL-WR841N - Command Injection)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2020-35576 is not detected by Nessus and OpenVAS

49. Remote Code Execution - Unknown Product (CVE-2021-24307) - High [554]

Description: {'vulners_cve_data_all': 'The All in One SEO – Best WordPress SEO Plugin – Easily Improve Your SEO Rankings before 4.1.0.2 enables authenticated users with "aioseo_tools_settings" privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin\'s configuration by uploading a backup .ini file in the section "Tool > Import/Export". However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Code Injection in Aioseo All In One Seo, All in One SEO Pack < 4.1.0.2 - Admin RCE via unserialize)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-24307 is detected by OpenVAS

50. Remote Code Execution - Unknown Product (CVE-2021-24453) - High [554]

Description: {'vulners_cve_data_all': 'The Include Me WordPress plugin through 1.2.1 is vulnerable to path traversal / local file inclusion, which can lead to Remote Code Execution (RCE) of the system due to log poisoning and therefore potentially a full compromise of the underlying structure', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Include Me <= 1.2.1 - Authenticated Remote Code Execution (RCE) via LFI log poisoning)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-24453 is not detected by Nessus and OpenVAS

51. Remote Code Execution - Unknown Product (CVE-2021-26912) - High [554]

Description: {'vulners_cve_data_all': 'NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in SupportRpcServlet.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (SRC-2021-0005 : NetMotion Mobility Server SupportRpcServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.3. Based on Vulners data

Status: CVE-2021-26912 is not detected by Nessus and OpenVAS

52. Remote Code Execution - Unknown Product (CVE-2021-26913) - High [554]

Description: {'vulners_cve_data_all': 'NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in RpcServlet.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (SRC-2021-0006 : NetMotion Mobility Server RpcServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.3. Based on Vulners data

Status: CVE-2021-26913 is not detected by Nessus and OpenVAS

53. Remote Code Execution - Unknown Product (CVE-2021-26914) - High [554]

Description: {'vulners_cve_data_all': 'NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in MvcUtil valueStringToObject.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (NetMotion Mobility Server MvcUtil Java Deserialization Exploit, NetMotion Mobility Server MvcUtil Java Deserialization, SRC-2021-0007 : NetMotion Mobility Server MvcUtil valueStringToObject Deserialization of Untrusted Data Remote Code Execution Vulnerability)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.3. Based on Vulners data

Status: CVE-2021-26914 is not detected by Nessus and OpenVAS

54. Remote Code Execution - Unknown Product (CVE-2021-26915) - High [554]

Description: {'vulners_cve_data_all': 'NetMotion Mobility before 11.73 and 12.x before 12.02 allows unauthenticated remote attackers to execute arbitrary code as SYSTEM because of Java deserialization in webrepdb StatusServlet.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (SRC-2021-0008 : NetMotion Mobility Server webrepdb StatusServlet Deserialization of Untrusted Data Remote Code Execution Vulnerability)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.3. Based on Vulners data

Status: CVE-2021-26915 is not detected by Nessus and OpenVAS

55. Remote Code Execution - Unknown Product (CVE-2021-32708) - High [554]

Description: {'vulners_cve_data_all': 'Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely. The conditions are: A user is allowed to supply the path or filename of an uploaded file, the supplied path or filename is not checked against unicode chars, the supplied pathname checked against an extension deny-list, not an allow-list, the supplied path or filename contains a unicode whitespace char in the extension, the uploaded file is stored in a directory that allows PHP code to be executed. Given these conditions are met a user can upload and execute arbitrary code on the system under attack. The unicode whitespace removal has been replaced with a rejection (exception). For 1.x users, upgrade to 1.1.4. For 2.x users, upgrade to 2.1.1.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (SRC-2021-0021 : League flysystem removeFunkyWhiteSpace Time-Of-Check Time-Of-Use File Write Remote Code Execution Vulnerability)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.3. Based on Vulners data

Status: CVE-2021-32708 is detected by OpenVAS

56. Remote Code Execution - Unknown Product (CVE-2021-37748) - High [554]

Description: {'vulners_cve_data_all': 'Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Out-of-bounds Write in Grandstream Ht801 Firmware)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-37748 is not detected by Nessus and OpenVAS

57. Remote Code Execution - Unknown Product (CVE-2021-39273) - High [554]

Description: {'vulners_cve_data_all': 'In XeroSecurity Sn1per 9.0 (free version), insecure permissions (0777) are set upon application execution, allowing an unprivileged user to modify the application, modules, and configuration files. This leads to arbitrary code execution with root privileges.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Incorrect Default Permissions in Xerosecurity Sn1Per)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-39273 is not detected by Nessus and OpenVAS

58. Remote Code Execution - Unknown Product (CVE-2021-39608) - High [554]

Description: {'vulners_cve_data_all': 'Remote Code Execution (RCE) vulnerabilty exists in FlatCore-CMS 2.0.7 via the upload addon plugin, which could let a remote malicious user exeuct arbitrary php code.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (FlatCore CMS 2.0.7 Remote Code Execution, FlatCore CMS 2.0.7 - Remote Code Execution (Authenticated) Vulnerability, FlatCore CMS 2.0.7 - Remote Code Execution (RCE) (Authenticated))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-39608 is not detected by Nessus and OpenVAS

59. Remote Code Execution - Unknown Product (CVE-2021-40222) - High [554]

Description: {'vulners_cve_data_all': 'Rittal CMC PU III Web management Version affected: V3.11.00_2. Version fixed: V3.17.10 is affected by a remote code execution vulnerablity. It is possible to introduce shell code to create a reverse shell in the PU-Hostname field of the TCP/IP Configuration dialog. Web application fails to sanitize user input on Network TCP/IP configuration page. This allows the attacker to inject commands as root on the device which will be executed once the data is received.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for OS Command Injection in Rittal Cmc Pu Iii 7030.000 Firmware)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-40222 is not detected by Nessus and OpenVAS

60. Remote Code Execution - Unknown Product (CVE-2021-42840) - High [554]

Description: {'vulners_cve_data_all': 'SuiteCRM before 7.11.19 allows remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled PHP file under the web root, because only the all-lowercase PHP file extensions were blocked. NOTE: this issue exists because of an incomplete fix for CVE-2020-28328.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (SuiteCRM 7.11.18 - Remote Code Execution Exploit, SuiteCRM 7.11.18 Remote Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-42840 is not detected by Nessus and OpenVAS

61. Unknown Vulnerability Type - Unknown Product (CVE-2021-32648) - High [554]

Description: {'vulners_cve_data_all': 'octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Weak Password Recovery Mechanism for Forgotten Password in Octobercms October)
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 6.4. Based on Vulners data

Status: CVE-2021-32648 is not detected by Nessus and OpenVAS

62. Information Disclosure - SCOM (CVE-2020-23162) - High [548]

Description: Sensitive information disclosure and weak encryption in Pyrescom Termod4 time management devices before 10.04k allows remote attackers to read a session-file and obtain plain-text user credentials.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Vulnerability in Pyres Termod4 Firmware)
Criticality of Vulnerability Type0.415Information Disclosure
Vulnerable Product is Common0.914System Center Operations Manager
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 5.0. Based on Vulners data

Status: CVE-2020-23162 is not detected by Nessus and OpenVAS

63. Code Injection - Unknown Product (CVE-2021-43408) - High [547]

Description: {'vulners_cve_data_all': 'The "Duplicate Post" WordPress plugin up to and including version 1.1.9 is vulnerable to SQL Injection. SQL injection vulnerabilities occur when client supplied data is included within an SQL Query insecurely. SQL Injection can typically be exploited to read, modify and delete SQL table data. In many cases it also possible to exploit features of SQL server to execute system commands and/or access the local file system. This particular vulnerability can be exploited by any authenticated user who has been granted access to use the Duplicate Post plugin. By default, this is limited to Administrators, however the plugin presents the option to permit access to the Editor, Author, Contributor and Subscriber roles.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Duplicate Post < 1.2.0 - Authenticated SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-43408 is not detected by Nessus and OpenVAS

64. Command Injection - Unknown Product (CVE-2020-12513) - High [547]

Description: {'vulners_cve_data_all': 'Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Pepperl+Fuchs IO-Link Master Series 1.36 CSRF / XSS / Command Injection)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2020-12513 is not detected by Nessus and OpenVAS

65. Command Injection - Unknown Product (CVE-2020-21992) - High [547]

Description: {'vulners_cve_data_all': "Inim Electronics SmartLiving SmartLAN/G/SI <=6.x suffers from an authenticated remote command injection vulnerability. The issue exist due to the 'par' POST parameter not being sanitized when called with the 'testemail' module through web.cgi binary. The vulnerable CGI binary (ELF 32-bit LSB executable, ARM) is calling the 'sh' executable via the system() function to issue a command using the mailx service and its vulnerable string format parameter allowing for OS command injection with root privileges. An attacker can remotely execute system commands as the root user using default credentials and bypass access controls in place.", 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Inim Electronics SmartLiving SmartLAN/G/SI <=6.x Root Remote Command Execution)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2020-21992 is not detected by Nessus and OpenVAS

66. Command Injection - Unknown Product (CVE-2020-21999) - High [547]

Description: {'vulners_cve_data_all': "iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.", 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (FaceSentry Access Control System 6.4.8 Remote Root Exploit)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2020-21999 is not detected by Nessus and OpenVAS

67. Command Injection - Unknown Product (CVE-2021-20026) - High [547]

Description: {'vulners_cve_data_all': 'A vulnerability in the SonicWall NSM On-Prem product allows an authenticated attacker to perform OS command injection using a crafted HTTP request. This vulnerability affects NSM On-Prem 2.2.0-R10 and earlier versions.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (SonicWall NSM On-Prem命令执行漏洞(CVE-2021-20026))
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-20026 is not detected by Nessus and OpenVAS

68. Command Injection - Unknown Product (CVE-2021-20991) - High [547]

Description: {'vulners_cve_data_all': 'In Fibaro Home Center 2 and Lite devices with firmware version 4.540 and older an authenticated user can run commands as root user using a command injection vulnerability.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Fibaro Home Center MITM / Missing Authentication / Code Execution Vulnerabilities, Fibaro Home Center MITM / Missing Authentication / Code Execution)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-20991 is not detected by Nessus and OpenVAS

69. Command Injection - Unknown Product (CVE-2021-22123) - High [547]

Description: {'vulners_cve_data_all': "An OS command injection vulnerability in FortiWeb's management interface 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x may allow a remote authenticated attacker to execute arbitrary commands on the system via the SAML server configuration page.", 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Fortinet FortiWeb 授权命令注入漏洞(CVE-2021-22123), Exploit for OS Command Injection in Fortinet Fortiweb)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-22123 is not detected by Nessus and OpenVAS

70. Command Injection - Unknown Product (CVE-2021-23024) - High [547]

Description: {'vulners_cve_data_all': 'On version 8.0.x before 8.0.0.1, and all 6.x and 7.x versions, the BIG-IQ Configuration utility has an authenticated remote command execution vulnerability in undisclosed pages. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (F5 BIG-IQ VE 8.0.0-2923215 Remote Root Vulnerability, F5 BIG-IQ VE 8.0.0-2923215 Remote Root)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-23024 is not detected by Nessus and OpenVAS

71. Command Injection - Unknown Product (CVE-2021-24684) - High [547]

Description: {'vulners_cve_data_all': 'The WordPress PDF Light Viewer Plugin WordPress plugin before 1.4.12 allows users with Author roles to execute arbitrary OS command on the server via OS Command Injection when invoking Ghostscript.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (PDF Light Viewer < 1.4.12 - Authenticated Command Injection)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-24684 is not detected by Nessus and OpenVAS

72. Command Injection - Unknown Product (CVE-2021-28113) - High [547]

Description: {'vulners_cve_data_all': 'A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Okta Access Gateway 2020.5.5 Authenticated Remote Root Vulnerability, Okta Access Gateway 2020.5.5 Authenticated Remote Root)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 8.7. Based on Vulners data

Status: CVE-2021-28113 is not detected by Nessus and OpenVAS

73. Command Injection - Unknown Product (CVE-2021-28144) - High [547]

Description: {'vulners_cve_data_all': 'prog.cgi on D-Link DIR-3060 devices before 1.11b04 HF2 allows remote authenticated users to inject arbitrary commands in an admin or root context because SetVirtualServerSettings calls CheckArpTables, which calls popen unsafely.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (D-Link DIR-3060 授权RCE漏洞(CVE-2021-28144), D-Link DIR-3060 1.11b04 Command Injection, D-Link DIR-3060 1.11b04 Command Injection Vulnerability)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-28144 is not detected by Nessus and OpenVAS

74. Command Injection - Unknown Product (CVE-2021-39244) - High [547]

Description: {'vulners_cve_data_all': 'Authenticated Semi-Blind Command Injection (via Parameter Injection) exists on Altus Nexto, Nexto Xpress, and Hadron Xtorm devices via the getlogs.cgi tcpdump feature. This affects Nexto NX3003 1.8.11.0, Nexto NX3004 1.8.11.0, Nexto NX3005 1.8.11.0, Nexto NX3010 1.8.3.0, Nexto NX3020 1.8.3.0, Nexto NX3030 1.8.3.0, Nexto NX5100 1.8.11.0, Nexto NX5101 1.8.11.0, Nexto NX5110 1.1.2.8, Nexto NX5210 1.1.2.8, Nexto Xpress XP300 1.8.11.0, Nexto Xpress XP315 1.8.11.0, Nexto Xpress XP325 1.8.11.0, Nexto Xpress XP340 1.8.11.0, and Hadron Xtorm HX3040 1.7.58.0.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Altus Sistemas de Automacao Products CSRF / Command Injection / Hardcoded Credentials, Altus Sistemas de Automacao Products CSRF / Command Injection / Hardcoded Credentials Vulnerability)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-39244 is not detected by Nessus and OpenVAS

75. Command Injection - Unknown Product (CVE-2021-39279) - High [547]

Description: {'vulners_cve_data_all': 'Certain MOXA devices allow Authenticated Command Injection via /forms/web_importTFTP. This affects WAC-2004 1.7, WAC-1001 2.1, WAC-1001-T 2.1, OnCell G3470A-LTE-EU 1.7, OnCell G3470A-LTE-EU-T 1.7, TAP-323-EU-CT-T 1.3, TAP-323-US-CT-T 1.3, TAP-323-JP-CT-T 1.3, WDR-3124A-EU 2.3, WDR-3124A-EU-T 2.3, WDR-3124A-US 2.3, and WDR-3124A-US-T 2.3.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Moxa Command Injection / Cross Site Scripting Vulnerabilities, Moxa Command Injection / Cross Site Scripting / Vulnerable Software)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2021-39279 is not detected by Nessus and OpenVAS

76. Open Redirect - b2evolution (CVE-2020-22840) - High [545]

Description: Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (b2evolution 6.11.6 - 'redirect_to' Open Redirect, b2evolution CMS 6.11.6 Open Redirection)
Criticality of Vulnerability Type0.615Open Redirect
Vulnerable Product is Common0.614b2evolution is a content and community management system
CVSS Base Score0.610Vulnerability Severity Rating based on CVSS Base Score is 5.8. Based on Vulners data

Status: CVE-2020-22840 is detected by OpenVAS

77. Authentication Bypass - Unknown Product (CVE-2020-17523) - High [543]

Description: {'vulners_cve_data_all': 'Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Improper Authentication in Apache Shiro)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.910Vulnerability Severity Rating based on CVSS Base Score is 9.0. Based on Vulners data

Status: CVE-2020-17523 is not detected by Nessus and OpenVAS

78. Denial of Service - Git (CVE-2021-25328) - High [541]

Description: Skyworth Digital Technology RN510 V.3.1.0.4 RN510 V.3.1.0.4 contains a buffer overflow vulnerability in /cgi-bin/app-staticIP.asp. An authenticated attacker can send a specially crafted request to endpoint which can lead to a denial of service (DoS) or possible code execution on the device.

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Shenzhen Skyworth RN510 Buffer Overflow Vulnerability, Shenzhen Skyworth RN510 Buffer Overflow)
Criticality of Vulnerability Type0.715Denial of Service
Vulnerable Product is Common0.414Git
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2021-25328 is not detected by Nessus and OpenVAS

79. Remote Code Execution - Unknown Product (CVE-2019-18643) - High [540]

Description: {'vulners_cve_data_all': 'Rock RMS versions before 8.10 and versions 9.0 through 9.3 fails to properly validate files uploaded in the application. The only protection mechanism is a file-extension blacklist that can be bypassed by adding multiple spaces and periods after the file name. This could allow an attacker to upload ASPX code and gain remote code execution on the application. The application typically runs as LocalSystem as mandated in the installation guide. Patched in versions 8.10 and 9.4.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Rock RMS File Upload / Account Takeover / Information Disclosure)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2019-18643 is not detected by Nessus and OpenVAS

80. Remote Code Execution - Unknown Product (CVE-2020-28695) - High [540]

Description: {'vulners_cve_data_all': 'Askey Fiber Router RTF3505VW-N1 BR_SV_g000_R3505VWN1001_s32_7 devices allow Remote Code Execution and retrieval of admin credentials to log into the Dashboard or login via SSH, leading to code execution as root.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Askey RTF3505VW RCE漏洞(CVE-2020–28695))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.3. Based on Vulners data

Status: CVE-2020-28695 is not detected by Nessus and OpenVAS

81. Remote Code Execution - Unknown Product (CVE-2020-28871) - High [540]

Description: {'vulners_cve_data_all': 'Remote code execution in Monitorr v1.7.6m in upload.php allows an unauthorized person to execute arbitrary code on the server-side via an insecure file upload.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Monitorr 1.7.6m Bypass / Information Disclosure / Shell Upload Exploit, Monitorr 1.7.6m Bypass / Information Disclosure / Shell Upload)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2020-28871 is not detected by Nessus and OpenVAS

82. Remote Code Execution - Unknown Product (CVE-2020-29047) - High [540]

Description: {'vulners_cve_data_all': 'The wp-hotel-booking plugin through 1.10.2 for WordPress allows remote attackers to execute arbitrary code because of an unserialize operation on the thimpress_hotel_booking_1 cookie in load in includes/class-wphb-sessions.php.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (WP Hotel Booking <= 1.10.3 - Unauthenticated PHP Object Injection)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2020-29047 is not detected by Nessus and OpenVAS

83. Remote Code Execution - Unknown Product (CVE-2020-35313) - High [540]

Description: {'vulners_cve_data_all': 'A server-side request forgery (SSRF) vulnerability in the addCustomThemePluginRepository function in index.php in WonderCMS 3.1.3 allows remote attackers to execute arbitrary code via a crafted URL to the theme/plugin installer.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (WonderCMS 3.1.3 - Authenticated SSRF to Remote Remote Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2020-35313 is not detected by Nessus and OpenVAS

84. Remote Code Execution - Unknown Product (CVE-2020-35314) - High [540]

Description: {'vulners_cve_data_all': 'A remote code execution vulnerability in the installUpdateThemePluginAction function in index.php in WonderCMS 3.1.3, allows remote attackers to upload a custom plugin which can contain arbitrary code and obtain a webshell via the theme/plugin installer.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (WonderCMS 3.1.3 - Authenticated Remote Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2020-35314 is not detected by Nessus and OpenVAS

85. Remote Code Execution - Unknown Product (CVE-2021-21978) - High [540]

Description: {'vulners_cve_data_all': 'VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (VMware View Planner 4.6 Remote Code Execution Exploit, Exploit for Unrestricted Upload of File with Dangerous Type in Vmware View Planner, Exploit for Unrestricted Upload of File with Dangerous Type in Vmware View Planner, Exploit for Unrestricted Upload of File with Dangerous Type in Vmware View Planner, Exploit for Vulnerability in Microsoft, Exploit for Vulnerability in Microsoft, VMware View Planner 4.6 Remote Code Execution)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-21978 is not detected by Nessus and OpenVAS

86. Remote Code Execution - Unknown Product (CVE-2021-23758) - High [540]

Description: {'vulners_cve_data_all': 'All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Deserialization of Untrusted Data in Ajaxpro.2 Project Ajaxpro.2)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-23758 is not detected by Nessus and OpenVAS

87. Remote Code Execution - Unknown Product (CVE-2021-24040) - High [540]

Description: {'vulners_cve_data_all': 'Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Facebook ParlAI 1.0.0 - Deserialization of Untrusted Data in parlai Vulnerability, Facebook ParlAI 1.0.0 Code Execution / Deserialization, Facebook ParlAI 1.0.0 - Deserialization of Untrusted Data in parlai)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24040 is not detected by Nessus and OpenVAS

88. Remote Code Execution - Unknown Product (CVE-2021-24240) - High [540]

Description: {'vulners_cve_data_all': 'The Business Hours Pro WordPress plugin through 5.5.0 allows a remote attacker to upload arbitrary files using its manual update functionality, leading to an unauthenticated remote code execution vulnerability.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Business Hours Pro <= 5.5.0 - Unauthenticated Arbitrary File Upload to RCE)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24240 is not detected by Nessus and OpenVAS

89. Remote Code Execution - Unknown Product (CVE-2021-24376) - High [540]

Description: {'vulners_cve_data_all': 'The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Autoptimize < 2.7.8 - Arbitrary File Upload via "Import Settings")
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24376 is not detected by Nessus and OpenVAS

90. Remote Code Execution - Unknown Product (CVE-2021-27246) - High [540]

Description: {'vulners_cve_data_all': 'This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 1.0.15 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of MAC addresses by the tdpServer endpoint. A crafted TCP message can write stack pointers to the stack. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-12306.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Stack-based Buffer Overflow in Tp-Link Ac1750 Firmware)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.9. Based on Vulners data

Status: CVE-2021-27246 is not detected by Nessus and OpenVAS

91. Remote Code Execution - Unknown Product (CVE-2021-30461) - High [540]

Description: {'vulners_cve_data_all': 'A remote code execution issue was discovered in the web UI of VoIPmonitor before 24.61. When the recheck option is used, the user-supplied SPOOLDIR value (which might contain PHP code) is injected into config/configuration.php.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (VoIPMonitor未授权远程代码执行漏洞(CVE-2021-30461), Exploit for Code Injection in Voipmonitor, Exploit for Code Injection in Voipmonitor, Exploit for Code Injection in Voipmonitor)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-30461 is not detected by Nessus and OpenVAS

92. Remote Code Execution - Unknown Product (CVE-2021-32172) - High [540]

Description: {'vulners_cve_data_all': 'Maian Cart v3.8 contains a preauthorization remote code execution (RCE) exploit via a broken access control issue in the Elfinder plugin.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Maian-Cart 3.8 Remote Code Execution, Maian-Cart 3.8 - Remote Code Execution (Unauthenticated) Exploit, Maian-Cart 3.8 - Remote Code Execution (RCE) (Unauthenticated))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-32172 is not detected by Nessus and OpenVAS

93. Remote Code Execution - Unknown Product (CVE-2021-32682) - High [540]

Description: {'vulners_cve_data_all': 'elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (elFinder Archive Command Injection Exploit, elFinder Archive Command Injection)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-32682 is detected by OpenVAS

94. Remote Code Execution - Unknown Product (CVE-2021-3287) - High [540]

Description: {'vulners_cve_data_all': 'Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (ManageEngine OpManager SumPDU Java Deserialization, ManageEngine OpManager SumPDU Java Deserialization Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-3287 is not detected by Nessus and OpenVAS

95. Remote Code Execution - Unknown Product (CVE-2021-33026) - High [540]

Description: {'vulners_cve_data_all': 'The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Improper Privilege Management in Flask-Caching Project Flask-Caching)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-33026 is not detected by Nessus and OpenVAS

96. Remote Code Execution - Unknown Product (CVE-2021-34371) - High [540]

Description: {'vulners_cve_data_all': 'Neo4j through 3.4.18 (with the shell server enabled) exposes an RMI service that arbitrarily deserializes Java objects, e.g., through setSessionVariable. An attacker can abuse this for remote code execution because there are dependencies with exploitable gadget chains.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Deserialization of Untrusted Data in Neo4J)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-34371 is not detected by Nessus and OpenVAS

97. Remote Code Execution - Unknown Product (CVE-2021-38294) - High [540]

Description: {'vulners_cve_data_all': 'A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Apache Storm Nimbus 2.2.0 Command Execution, Apache Storm Nimbus 2.2.0 Command Execution Exploit)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-38294 is not detected by Nessus and OpenVAS

98. Remote Code Execution - Unknown Product (CVE-2021-40531) - High [540]

Description: {'vulners_cve_data_all': 'Sketch before 75 allows library feeds to be used to bypass file quarantine. Files are automatically downloaded and opened, without the com.apple.quarantine extended attribute. This results in remote code execution, as demonstrated by CommandString in a terminal profile to Terminal.app.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Vulnerability in Sketch)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-40531 is not detected by Nessus and OpenVAS

99. Remote Code Execution - Unknown Product (CVE-2021-40865) - High [540]

Description: {'vulners_cve_data_all': 'An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Deserialization of Untrusted Data in Apache Storm)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-40865 is not detected by Nessus and OpenVAS

100. Remote Code Execution - Unknown Product (CVE-2021-42550) - High [540]

Description: {'vulners_cve_data_all': 'In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Deserialization of Untrusted Data in Apache Log4J, Exploit for Deserialization of Untrusted Data in Apache Log4J, Exploit for Deserialization of Untrusted Data in Oracle Policy Automation, Exploit for Deserialization of Untrusted Data in Apache Log4J)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 8.5. Based on Vulners data

Status: CVE-2021-42550 is not detected by Nessus and OpenVAS

101. Remote Code Execution - Unknown Product (CVE-2021-42667) - High [540]

Description: {'vulners_cve_data_all': 'A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Online Event Booking And Reservation System Project Online Event Booking And Reservation System)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-42667 is not detected by Nessus and OpenVAS

102. Remote Code Execution - Unknown Product (CVE-2021-42668) - High [540]

Description: {'vulners_cve_data_all': 'A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Engineers Online Portal Project Engineers Online Portal)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-42668 is not detected by Nessus and OpenVAS

103. Remote Code Execution - Unknown Product (CVE-2021-42670) - High [540]

Description: {'vulners_cve_data_all': 'A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to the announcements_student.php web page. As a result a malicious user can extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Engineers Online Portal Project Engineers Online Portal)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-42670 is not detected by Nessus and OpenVAS

104. Unknown Vulnerability Type - Unknown Product (CVE-2021-36798) - High [540]

Description: {'vulners_cve_data_all': "A Denial-of-Service (DoS) vulnerability was discovered in Team Server in HelpSystems Cobalt Strike 4.2 and 4.3. It allows remote attackers to crash the C2 server thread and block beacons' communication with it.", 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned at Vulners (AttackerKB object)
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Allocation of Resources Without Limits or Throttling in Helpsystems Cobalt Strike, Exploit for Allocation of Resources Without Limits or Throttling in Helpsystems Cobalt Strike)
Criticality of Vulnerability Type015Unknown Vulnerability Type
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.510Vulnerability Severity Rating based on CVSS Base Score is 5.0. Based on Vulners data

Status: CVE-2021-36798 is not detected by Nessus and OpenVAS

105. Code Injection - Unknown Product (CVE-2021-24285) - High [534]

Description: {'vulners_cve_data_all': 'The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Car Seller - Auto Classifieds Script <= 2.1.0 - Unauthenticated SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24285 is not detected by Nessus and OpenVAS

106. Code Injection - Unknown Product (CVE-2021-24321) - High [534]

Description: {'vulners_cve_data_all': 'The Bello - Directory & Listing WordPress theme before 1.6.0 did not sanitise the bt_bb_listing_field_price_range_to, bt_bb_listing_field_now_open, bt_bb_listing_field_my_lng, listing_list_view and bt_bb_listing_field_my_lat parameters before using them in a SQL statement, leading to SQL Injection issues', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Bello < 1.6.0 - Unauthenticated Blind SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24321 is not detected by Nessus and OpenVAS

107. Code Injection - Unknown Product (CVE-2021-24361) - High [534]

Description: {'vulners_cve_data_all': 'In the Location Manager WordPress plugin before 2.1.0.10, the AJAX action gd_popular_location_list did not properly sanitise or validate some of its POST parameters, which are then used in a SQL statement, leading to unauthenticated SQL Injection issues.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (GeoDirectory Location Manager < 2.1.0.10 - Multiple Unauthenticated SQL Injections)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24361 is not detected by Nessus and OpenVAS

108. Code Injection - Unknown Product (CVE-2021-24442) - High [534]

Description: {'vulners_cve_data_all': 'The Poll, Survey, Questionnaire and Voting system WordPress plugin before 1.5.3 did not sanitise, escape or validate the date_answers[] POST parameter before using it in a SQL statement when sending a Poll result, allowing unauthenticated users to perform SQL Injection attacks', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Poll, Survey, Questionnaire and Voting system < 1.5.3 - Unauthenticated Blind SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24442 is not detected by Nessus and OpenVAS

109. Code Injection - Unknown Product (CVE-2021-24507) - High [534]

Description: {'vulners_cve_data_all': 'The Astra Pro Addon WordPress plugin before 3.5.2 did not properly sanitise or escape some of the POST parameters from the astra_pagination_infinite and astra_shop_pagination_infinite AJAX action (available to both unauthenticated and authenticated user) before using them in SQL statement, leading to an SQL Injection issues', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Astra Pro Addon < 3.5.2 - Unauthenticated SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24507 is not detected by Nessus and OpenVAS

110. Code Injection - Unknown Product (CVE-2021-24951) - High [534]

Description: {'vulners_cve_data_all': 'The LearnPress WordPress plugin before 4.1.4 does not sanitise, validate and escape the id parameter before using it in SQL statements when duplicating course/lesson/quiz/question, leading to SQL Injections issues', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (LearnPress < 4.1.4 - Admin+ SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-24951 is not detected by Nessus and OpenVAS

111. Code Injection - Unknown Product (CVE-2021-26904) - High [534]

Description: {'vulners_cve_data_all': 'LMA ISIDA Retriever 5.2 allows SQL Injection.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Isida Retriever)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-26904 is not detected by Nessus and OpenVAS

112. Code Injection - Unknown Product (CVE-2021-31856) - High [534]

Description: {'vulners_cve_data_all': 'A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Layer5 Meshery)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-31856 is not detected by Nessus and OpenVAS

113. Code Injection - Unknown Product (CVE-2021-33470) - High [534]

Description: {'vulners_cve_data_all': 'COVID19 Testing Management System 1.0 is vulnerable to SQL Injection via the admin panel.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (COVID-19 Testing Management System 1.0 SQL Injection Exploit, COVID-19 Testing Management System 1.0 SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-33470 is not detected by Nessus and OpenVAS

114. Code Injection - Unknown Product (CVE-2021-36880) - High [534]

Description: {'vulners_cve_data_all': 'Unauthenticated SQL Injection (SQLi) vulnerability in WordPress uListing plugin (versions <= 2.0.3), vulnerable parameter: custom.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (uListing < 2.0.4 - Unauthenticated SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-36880 is not detected by Nessus and OpenVAS

115. Code Injection - Unknown Product (CVE-2021-39377) - High [534]

Description: {'vulners_cve_data_all': 'A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the index.php username parameter.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Os4Ed Opensis)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-39377 is not detected by Nessus and OpenVAS

116. Code Injection - Unknown Product (CVE-2021-39378) - High [534]

Description: {'vulners_cve_data_all': 'A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the NamesList.php str parameter.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Os4Ed Opensis)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-39378 is not detected by Nessus and OpenVAS

117. Code Injection - Unknown Product (CVE-2021-39379) - High [534]

Description: {'vulners_cve_data_all': 'A SQL Injection vulnerability exists in openSIS 8.0 when MySQL (MariaDB) is being used as the application database. A malicious attacker can issue SQL commands to the MySQL (MariaDB) database through the ResetUserInfo.php password_stn_id parameter.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Os4Ed Opensis)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-39379 is not detected by Nessus and OpenVAS

118. Code Injection - Unknown Product (CVE-2021-41649) - High [534]

Description: {'vulners_cve_data_all': 'An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Online-Shopping-System-Advanced Project Online-Shopping-System-Advanced)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-41649 is not detected by Nessus and OpenVAS

119. Code Injection - Unknown Product (CVE-2021-42224) - High [534]

Description: {'vulners_cve_data_all': 'SQL Injection vulnerability exists in IFSC Code Finder Project 1.0 via the searchifsccode POST parameter in /search.php.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (IFSC Code Finder Project 1.0 SQL Injection Vulnerability, IFSC Code Finder Project 1.0 SQL Injection)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-42224 is not detected by Nessus and OpenVAS

120. Code Injection - Unknown Product (CVE-2021-42665) - High [534]

Description: {'vulners_cve_data_all': 'An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for SQL Injection in Engineers Online Portal Project Engineers Online Portal)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-42665 is not detected by Nessus and OpenVAS

121. Code Injection - Unknown Product (CVE-2021-43140) - High [534]

Description: {'vulners_cve_data_all': 'SQL Injection vulnerability exists in Sourcecodester. Simple Subscription Website 1.0. via the login.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Simple Subscription Website 1.0 - SQL injection Authentication Bypass Vulnerability, Simple Subscription Website 1.0 SQL Injection, Simple Subscription Website 1.0 - SQLi Authentication Bypass)
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-43140 is not detected by Nessus and OpenVAS

122. Command Injection - Unknown Product (CVE-2021-27886) - High [534]

Description: {'vulners_cve_data_all': 'rakibtg Docker Dashboard before 2021-02-28 allows command injection in backend/utilities/terminal.js via shell metacharacters in the command parameter of an API request. NOTE: this is NOT a Docker, Inc. product.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Docker Dashboard Remote Command Execution)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-27886 is not detected by Nessus and OpenVAS

123. Command Injection - Unknown Product (CVE-2021-31605) - High [534]

Description: {'vulners_cve_data_all': 'furlongm openvpn-monitor through 1.1.3 allows %0a command injection via the OpenVPN management interface socket. This can shut down the server via signal%20SIGTERM.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (OpenVPN Monitor 1.1.3 Command Injection Vulnerability, OpenVPN Monitor 1.1.3 Command Injection)
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.8. Based on Vulners data

Status: CVE-2021-31605 is not detected by Nessus and OpenVAS

124. Command Injection - Unknown Product (CVE-2021-42580) - High [534]

Description: {'vulners_cve_data_all': 'Sourcecodester Online Learning System 2.0 is vunlerable to sql injection authentication bypass in admin login file (/admin/login.php) and authenticated file upload in (Master.php) file , we can craft these two vunlerablities to get unauthenticated remote command execution.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Online Learning System 2.0 - Remote Code Execution Exploit, Online Learning System 2.0 Remote Code Execution, Online Learning System 2.0 - Remote Code Execution (RCE))
Criticality of Vulnerability Type0.9715Command Injection
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-42580 is not detected by Nessus and OpenVAS

125. Authentication Bypass - Unknown Product (CVE-2020-21991) - High [530]

Description: {'vulners_cve_data_all': 'AVE DOMINAplus <=1.10.x suffers from an authentication bypass vulnerability due to missing control check when directly calling the autologin GET parameter in changeparams.php script. Setting the autologin value to 1 allows an unauthenticated attacker to permanently disable the authentication security control and access the management interface with admin privileges without providing credentials.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (AVE DOMINAplus <=1.10.x Authentication Bypass Exploit)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2020-21991 is not detected by Nessus and OpenVAS

126. Authentication Bypass - Unknown Product (CVE-2020-21994) - High [530]

Description: {'vulners_cve_data_all': "AVE DOMINAplus <=1.10.x suffers from clear-text credentials disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file '/xml/authClients.xml' and obtain administrative login information that allows for a successful authentication bypass attack.", 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (AVE DOMINAplus <=1.10.x Credentials Disclosure Exploit)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2020-21994 is not detected by Nessus and OpenVAS

127. Authentication Bypass - Unknown Product (CVE-2020-22001) - High [530]

Description: {'vulners_cve_data_all': 'HomeAutomation 3.3.2 suffers from an authentication bypass vulnerability when spoofing client IP address using the X-Forwarded-For header with the local (loopback) IP address value allowing remote control of the smart home solution.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (HomeAutomation v3.3.2 Authentication Bypass Exploit)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2020-22001 is not detected by Nessus and OpenVAS

128. Authentication Bypass - Unknown Product (CVE-2021-2302) - High [530]

Description: {'vulners_cve_data_all': 'Vulnerability in the Oracle Platform Security for Java product of Oracle Fusion Middleware (component: OPSS). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Platform Security for Java. Successful attacks of this vulnerability can result in takeover of Oracle Platform Security for Java. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Vulnerability in Oracle Platform Security For Java)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-2302 is not detected by Nessus and OpenVAS

Status: CVE-2021-23020 is not detected by Nessus and OpenVAS

Status: CVE-2021-23021 is not detected by Nessus and OpenVAS

Status: CVE-2021-23024 is not detected by Nessus and OpenVAS

Status: CVE-2021-23026 is not detected by Nessus and OpenVAS

Status: CVE-2021-23027 is not detected by Nessus and OpenVAS

Status: CVE-2021-23028 is not detected by Nessus and OpenVAS

129. Authentication Bypass - Unknown Product (CVE-2021-26201) - High [530]

Description: {'vulners_cve_data_all': 'The Login Panel of CASAP Automated Enrollment System 1.0 is vulnerable to SQL injection authentication bypass. An attacker can obtain access to the admin panel by injecting a SQL query in the username field of the login page.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (CASAP Automated Enrollment System 1.1 SQL Injection Exploit, CASAP Automated Enrollment System 1.1 SQL Injection)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-26201 is not detected by Nessus and OpenVAS

130. Authentication Bypass - Unknown Product (CVE-2021-31251) - High [530]

Description: {'vulners_cve_data_all': 'An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (CHIYU IoT services Authentication bypass in telnet server(CVE-2021-31251), CHIYU IoT Telnet Authentication Bypass, CHIYU IoT Devices - (Telnet) Authentication Bypass Exploit, CHIYU IoT Devices - 'Telnet' Authentication Bypass)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-31251 is not detected by Nessus and OpenVAS

131. Authentication Bypass - Unknown Product (CVE-2021-3278) - High [530]

Description: {'vulners_cve_data_all': 'Local Service Search Engine Management System 1.0 has a vulnerability through authentication bypass using SQL injection . Using this vulnerability, an attacker can bypass the login page.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Local Service Search Engine Management System 1.0 SQL Injection, Local Service Search Engine Management System 1.0 - SQLi Authentication Bypass)
Criticality of Vulnerability Type0.9515Authentication Bypass
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.810Vulnerability Severity Rating based on CVSS Base Score is 7.5. Based on Vulners data

Status: CVE-2021-3278 is not detected by Nessus and OpenVAS

Status: CVE-2021-32782 is not detected by Nessus and OpenVAS

Status: CVE-2021-32783 is not detected by Nessus and OpenVAS

Status: CVE-2021-32787 is not detected by Nessus and OpenVAS

Status: CVE-2021-32788 is detected by OpenVAS

Status: CVE-2021-32789 is detected by OpenVAS

132. Remote Code Execution - Unknown Product (CVE-2020-26806) - High [527]

Description: {'vulners_cve_data_all': 'admin/file.do in ObjectPlanet Opinio before 7.15 allows Unrestricted File Upload of executable JSP files, resulting in remote code execution, because filePath can have directory traversal and fileContent can be valid JSP code.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (ObjectPlanet Opinio 7.13 Shell Upload Vulnerability, ObjectPlanet Opinio 7.13 Shell Upload)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2020-26806 is not detected by Nessus and OpenVAS

133. Remote Code Execution - Unknown Product (CVE-2020-28337) - High [527]

Description: {'vulners_cve_data_all': 'A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Microweber CMS 1.1.20 Remote Code Execution, Microweber CMS 1.1.20 - Remote Code Execution (Authenticated) Exploit, Microweber CMS 1.1.20 - Remote Code Execution (Authenticated))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2020-28337 is not detected by Nessus and OpenVAS

134. Remote Code Execution - Unknown Product (CVE-2020-35734) - High [527]

Description: {'vulners_cve_data_all': "** UNSUPPORTED WHEN ASSIGNED ** Sruu.pl in Batflat 1.3.6 allows an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Users tab. To exploit this, one must login to the administration panel and edit an arbitrary user's data (username, displayed name, etc.). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.", 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Batflat CMS 1.3.6 - Remote Code Execution (Authenticated) Exploit, Batflat CMS 1.3.6 Remote Code Execution, Batflat CMS 1.3.6 - Remote Code Execution (Authenticated))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2020-35734 is not detected by Nessus and OpenVAS

135. Remote Code Execution - Unknown Product (CVE-2020-35754) - High [527]

Description: {'vulners_cve_data_all': 'OpenSolution Quick.CMS < 6.7 and Quick.Cart < 6.7 allow an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Language tab.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Quick.CMS 6.7 Remote Code Execution, Quick.CMS 6.7 - Remote Code Execution (Authenticated))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2020-35754 is not detected by Nessus and OpenVAS

136. Remote Code Execution - Unknown Product (CVE-2020-35948) - High [527]

Description: {'vulners_cve_data_all': 'An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (XCloner Backup and Restore 4.2.1 - 4.2.12 - Unprotected AJAX Action, WordPress XCloner 4.2.12 Remote Code Execution, Wordpress XCloner 4.2.12 Plugin - Remote Code Execution (Authenticated) Exploit, Wordpress Plugin XCloner 4.2.12 - Remote Code Execution (Authenticated))
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2020-35948 is not detected by Nessus and OpenVAS

137. Remote Code Execution - Unknown Product (CVE-2020-36079) - High [527]

Description: {'vulners_cve_data_all': '** DISPUTED ** Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server\'s uploaded/ directory. NOTE: the vendor disputes this because exploitation can only be performed by an admin who has "lots of other possibilities to harm a site."', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Zenphoto CMS 1.5.7 Shell Upload Vulnerability, Zenphoto CMS 1.5.7 Shell Upload)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2020-36079 is not detected by Nessus and OpenVAS

138. Remote Code Execution - Unknown Product (CVE-2021-21014) - High [527]

Description: {'vulners_cve_data_all': 'Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a file upload restriction bypass. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Exploit for Unrestricted Upload of File with Dangerous Type in Magento)
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2021-21014 is not detected by Nessus and OpenVAS

139. Remote Code Execution - Unknown Product (CVE-2021-24160) - High [527]

Description: {'vulners_cve_data_all': 'In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Responsive Menu 4.0.0 - 4.0.3 - Authenticated Arbitrary File Upload )
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.5. Based on Vulners data

Status: CVE-2021-24160 is not detected by Nessus and OpenVAS

140. Remote Code Execution - Unknown Product (CVE-2021-24161) - High [527]

Description: {'vulners_cve_data_all': 'In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into uploading a zip archive containing malicious PHP files. The attacker could then access those files to achieve remote code execution and further infect the targeted site.', 'combined_cve_data_all': ''}

ComponentValueWeightComment
Exploited in the Wild018Exploitation in the wild is NOT found at Vulners, Microsoft and AttackerKB websites
Public Exploit Exists1.017Public exploit is found at Vulners (Responsive Menu < 4.0.4 - CSRF to Arbitrary File Upload )
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common014Unknown Product
CVSS Base Score0.710Vulnerability Severity Rating based on CVSS Base Score is 6.8. Based on Vulners data

Status: CVE-2021-24161 is not detected by Nessus and OpenVAS

141. Remote Code Execution - Unknown Product (CVE-2021-24884) - High [527]

Description: {'vulners_cve_data_all': 'The Formidable Form Builder WordPress plugin before 4.09.05 allows to inject certain HTML Tags like