CVE-2021-25646

Public exploit
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
Max CVSS
9.0
EPSS Score
97.34%
Published
2021-01-29
Updated
2022-07-12
OpenCATS through 0.9.5-3 unsafely deserializes index.php?m=activity requests, leading to remote code execution. This occurs because lib/DataGrid.php calls unserialize for the parametersactivity:ActivityDataGrid parameter. The PHP object injection exploit chain can leverage an __destruct magic method in guzzlehttp.
Max CVSS
10.0
EPSS Score
14.91%
Published
2021-01-18
Updated
2021-01-26
A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists in the EcoStruxure Power Build - Rapsody software (V2.1.13 and prior) that could allow a stack-based buffer overflow to occur which could result in remote code execution when a malicious SSD file is uploaded and improperly parsed.
Max CVSS
7.8
EPSS Score
0.79%
Published
2021-01-26
Updated
2022-01-31
A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists in the EcoStruxure Power Build - Rapsody software (V2.1.13 and prior) that could allow a use-after-free condition which could result in remote code execution when a malicious SSD file is uploaded and improperly parsed.
Max CVSS
7.8
EPSS Score
0.88%
Published
2021-01-26
Updated
2022-01-31
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.
Max CVSS
8.8
EPSS Score
0.05%
Published
2021-01-14
Updated
2021-01-27
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is an issue involving YAML parsing which can lead to post-auth remote code execution. In order to parse and process YAML files, OneDev uses SnakeYaml which by default (when not using `SafeConstructor`) allows the instantiation of arbitrary classes. We can leverage that to run arbitrary code by instantiating classes such as `javax.script.ScriptEngineManager` and using `URLClassLoader` to load the script engine provider, resulting in the instantiation of a user controlled class. For a full example refer to the referenced GHSA. This issue was addressed in 4.0.3 by only allowing certain known classes to be deserialized
Max CVSS
9.6
EPSS Score
0.29%
Published
2021-01-15
Updated
2022-04-26
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or authorization checks. This issue may lead to pre-auth remote code execution. This issue was fixed in 4.0.3 by removing AttachmentUploadServlet and not using deserialization
Max CVSS
10.0
EPSS Score
63.71%
Published
2021-01-15
Updated
2021-01-21
Git LFS is a command line extension for managing large files with Git. On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This is the result of an incomplete fix for CVE-2020-27955. This issue occurs because on Windows, Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator. Other than avoiding untrusted repositories or using a different operating system, there is no workaround. This is fixed in v2.13.2.
Max CVSS
7.8
EPSS Score
0.05%
Published
2021-01-15
Updated
2021-01-29
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-01-29
Updated
2021-03-15
Directory traversal with remote code execution can occur in /upload in ONLYOFFICE Document Server before 5.6.3, when JWT is used, via a /.. sequence in an image upload parameter.
Max CVSS
9.8
EPSS Score
2.82%
Published
2021-01-26
Updated
2022-04-15
Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Max CVSS
9.8
EPSS Score
4.04%
Published
2021-01-19
Updated
2023-05-24
ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file via a POST request to resources.php.
Max CVSS
8.8
EPSS Score
0.34%
Published
2021-01-26
Updated
2021-02-02
Deserialization of untrusted data in the login page of ASSUWEB 359.3 build 1 subcomponent of ACA ASSUREX RENTES product allows a remote attacker to inject unsecure serialized Java object using a specially crafted HTTP request, resulting in an unauthenticated remote code execution on the server.
Max CVSS
9.8
EPSS Score
0.60%
Published
2021-01-28
Updated
2021-02-04

CVE-2021-3129

Known exploited
Public exploit
Used for ransomware
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
Max CVSS
9.8
EPSS Score
97.45%
Published
2021-01-12
Updated
2022-02-22
CISA KEV Added
2023-09-18
Go before 1.14.14 and 1.15.x before 1.15.7 on Windows is vulnerable to Command Injection and remote code execution when using the "go get" command to fetch modules that make use of cgo (for example, cgo can execute a gcc program from an untrusted download).
Max CVSS
7.5
EPSS Score
1.72%
Published
2021-01-26
Updated
2022-09-14
Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized
Max CVSS
9.8
EPSS Score
4.37%
Published
2021-01-04
Updated
2024-04-11
Microsoft Word Remote Code Execution Vulnerability
Max CVSS
9.3
EPSS Score
13.30%
Published
2021-01-12
Updated
2023-12-29
Microsoft Word Remote Code Execution Vulnerability
Max CVSS
9.3
EPSS Score
1.51%
Published
2021-01-12
Updated
2023-12-29
Microsoft Excel Remote Code Execution Vulnerability
Max CVSS
7.8
EPSS Score
13.30%
Published
2021-01-12
Updated
2023-12-29
Microsoft Excel Remote Code Execution Vulnerability
Max CVSS
7.8
EPSS Score
2.32%
Published
2021-01-12
Updated
2023-12-29
Microsoft Office Remote Code Execution Vulnerability
Max CVSS
9.3
EPSS Score
13.30%
Published
2021-01-12
Updated
2023-12-29
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Max CVSS
7.8
EPSS Score
13.30%
Published
2021-01-12
Updated
2023-12-29
Microsoft SharePoint Server Remote Code Execution Vulnerability
Max CVSS
9.0
EPSS Score
1.66%
Published
2021-01-12
Updated
2023-12-29
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Max CVSS
9.0
EPSS Score
1.66%
Published
2021-01-12
Updated
2023-12-29
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Max CVSS
9.0
EPSS Score
1.66%
Published
2021-01-12
Updated
2023-12-29
189 vulnerabilities found
1 2 3 4 5 6 7 8
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!