Security Vulnerabilities Published In May 2021
The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
Max Base Score | 9.8 |
Published | 2021-05-31 |
Updated | 2021-06-11 |
EPSS | 2.08% |
The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
Max Base Score | 7.5 |
Published | 2021-05-28 |
Updated | 2023-03-01 |
EPSS | 0.12% |
Squid before 4.15 and 5.x before 5.0.6 allows remote servers to cause a denial of service (affecting availability to all clients) via an HTTP response. The issue trigger is a header that can be expected to exist in HTTP traffic without any malicious intent by the server.
Max Base Score | 6.5 |
Published | 2021-05-28 |
Updated | 2022-06-03 |
EPSS | 28.87% |
An exposed remote debugging port in Naver Comic Viewer prior to 1.0.15.0 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
Max Base Score | 8.8 |
Published | 2021-05-28 |
Updated | 2021-06-03 |
EPSS | 0.41% |
GattLib 0.3-rc1 has a stack-based buffer over-read in get_device_path_from_mac in dbus/gattlib.c.
Max Base Score | 9.8 |
Published | 2021-05-27 |
Updated | 2022-05-03 |
EPSS | 0.39% |
The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.
Max Base Score | 7.5 |
Published | 2021-05-28 |
Updated | 2023-03-03 |
EPSS | 0.11% |
InspIRCd 3.8.0 through 3.9.x before 3.10.0 allows any user (able to connect to the server) to access recently deallocated memory, aka the "malformed PONG" issue.
Max Base Score | 4.3 |
Published | 2021-05-27 |
Updated | 2022-06-03 |
EPSS | 0.06% |
The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing.
Max Base Score | 9.8 |
Published | 2021-05-25 |
Updated | 2021-06-01 |
EPSS | 0.56% |
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.
Max Base Score | 9.8 |
Published | 2021-05-25 |
Updated | 2022-11-08 |
EPSS | 0.28% |
Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections.
Max Base Score | 5.4 |
Published | 2021-05-25 |
Updated | 2022-06-03 |
EPSS | 0.51% |
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
Max Base Score | 9.8 |
Published | 2021-05-29 |
Updated | 2021-06-10 |
EPSS | 8.00% |
Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had a valid username. This might make brute-force attacks easier.
Max Base Score | 7.5 |
Published | 2021-05-24 |
Updated | 2021-06-03 |
EPSS | 0.15% |
A reflected cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the ref parameter to a page about an arbitrary product, e.g., a product/insert-product-name-here.html/ref= URL.
Max Base Score | 4.8 |
Published | 2021-05-24 |
Updated | 2021-05-27 |
EPSS | 0.16% |
A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from the backend, e.g., in admin/customers/list.html.
Max Base Score | 4.8 |
Published | 2021-05-24 |
Updated | 2021-05-27 |
EPSS | 0.16% |
** DISPUTED ** Boa 0.94.13 allows remote attackers to obtain sensitive information via a misconfiguration involving backup.html, preview.html, js/log.js, log.html, email.html, online-users.html, and config.js. NOTE: multiple third parties report that this is a site-specific issue because those files are not part of Boa.
Max Base Score | 7.5 |
Published | 2021-05-27 |
Updated | 2023-02-23 |
EPSS | 0.21% |
EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell.
Max Base Score | 9.0 |
Published | 2021-05-24 |
Updated | 2021-05-27 |
EPSS | 0.25% |
An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.
Max Base Score | 8.1 |
Published | 2021-05-24 |
Updated | 2021-05-28 |
EPSS | 0.16% |
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3.
Max Base Score | 10.0 |
Published | 2021-05-21 |
Updated | 2022-01-04 |
EPSS | 1.36% |
Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool.
Max Base Score | 5.4 |
Published | 2021-05-21 |
Updated | 2021-05-24 |
EPSS | 0.05% |
Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document.
Max Base Score | 5.4 |
Published | 2021-05-21 |
Updated | 2021-05-24 |
EPSS | 0.05% |
Plone though 5.2.4 allows SSRF via the lxml parser. This affects Diazo themes, Dexterity TTW schemas, and modeleditors in plone.app.theming, plone.app.dexterity, and plone.supermodel.
Max Base Score | 7.5 |
Published | 2021-05-21 |
Updated | 2021-05-24 |
EPSS | 0.16% |
Plone through 5.2.4 allows remote authenticated managers to conduct SSRF attacks via an event ical URL, to read one line of a file.
Max Base Score | 4.3 |
Published | 2021-05-21 |
Updated | 2021-05-24 |
EPSS | 0.08% |
Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script.
Max Base Score | 9.9 |
Published | 2021-05-21 |
Updated | 2021-05-24 |
EPSS | 0.23% |
Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item.
Max Base Score | 5.4 |
Published | 2021-05-21 |
Updated | 2021-05-24 |
EPSS | 0.05% |
Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as used in Plone through 5.2.4 and other products, allow Reflected XSS.
Max Base Score | 6.1 |
Published | 2021-05-21 |
Updated | 2021-05-27 |
EPSS | 0.08% |