Search Results (9570 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2021-43944 1 Atlassian 2 Jira Data Center, Jira Server 2024-11-21 7.2 High
This issue exists to document that a security improvement in the way that Jira Server and Data Center use templates has been implemented. Affected versions of Atlassian Jira Server and Data Center allowed remote attackers with system administrator permissions to execute arbitrary code via Template Injection leading to Remote Code Execution (RCE) in the Email Templates feature. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3.
CVE-2021-43907 1 Microsoft 1 Windows Subsystem For Linux 2024-11-21 9.8 Critical
Visual Studio Code WSL Extension Remote Code Execution Vulnerability
CVE-2021-43899 1 Microsoft 2 Wireless Display Adapter, Wireless Display Adapter Firmware 2024-11-21 9.8 Critical
Microsoft 4K Wireless Display Adapter Remote Code Execution Vulnerability
CVE-2021-43891 1 Microsoft 1 Visual Studio Code 2024-11-21 7.8 High
Visual Studio Code Remote Code Execution Vulnerability
CVE-2021-43889 1 Microsoft 1 Defender For Iot 2024-11-21 7.2 High
Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-43882 1 Microsoft 1 Defender For Iot 2024-11-21 9 Critical
Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-43875 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2024-11-21 7.8 High
Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2021-43857 1 Gerapy 1 Gerapy 2024-11-21 9.8 Critical
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
CVE-2021-43844 1 Msedgeredirect Project 1 Msedgeredirect 2024-11-21 8.8 High
MSEdgeRedirect is a tool to redirect news, search, widgets, weather, and more to a user's default browser. MSEdgeRedirect versions before 0.5.0.1 are vulnerable to Remote Code Execution via specifically crafted URLs. This vulnerability requires user interaction and the acceptance of a prompt. With how MSEdgeRedirect is coded, parameters are impossible to pass to any launched file. However, there are two possible scenarios in which an attacker can do more than a minor annoyance. In Scenario 1 (confirmed), a user visits an attacker controlled webpage; the user is prompted with, and downloads, an executable payload; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and RCE executes the payload the user previously downloaded, if the download path is successfully guessed. In Scenario 2 (not yet confirmed), a user visits an attacked controlled webpage; the user is prompted with, and accepts, the aforementioned crafted URL prompt; and a payload on a remote, attacker controlled, SMB server is executed. The issue was found in the _DecodeAndRun() function, in which I incorrectly assumed _WinAPI_UrlIs() would only accept web resources. Unfortunately, file:/// passes the default _WinAPI_UrlIs check(). File paths are now directly checked for and must fail. There is no currently known exploitation of this vulnerability in the wild. A patched version, 0.5.0.1, has been released that checks for and denies these crafted URLs. There are no workarounds for this issue. Users are advised not to accept any unexpected prompts from web pages.
CVE-2021-43837 1 Vault-cli Project 1 Vault-cli 2024-11-21 8.4 High
vault-cli is a configurable command-line interface tool (and python library) to interact with Hashicorp Vault. In versions before 3.0.0 vault-cli features the ability for rendering templated values. When a secret starts with the prefix `!template!`, vault-cli interprets the rest of the contents of the secret as a Jinja2 template. Jinja2 is a powerful templating engine and is not designed to safely render arbitrary templates. An attacker controlling a jinja2 template rendered on a machine can trigger arbitrary code, making this a Remote Code Execution (RCE) risk. If the content of the vault can be completely trusted, then this is not a problem. Otherwise, if your threat model includes cases where an attacker can manipulate a secret value read from the vault using vault-cli, then this vulnerability may impact you. In 3.0.0, the code related to interpreting vault templated secrets has been removed entirely. Users are advised to upgrade as soon as possible. For users unable to upgrade a workaround does exist. Using the environment variable `VAULT_CLI_RENDER=false` or the flag `--no-render` (placed between `vault-cli` and the subcommand, e.g. `vault-cli --no-render get-all`) or adding `render: false` to the vault-cli configuration yaml file disables rendering and removes the vulnerability. Using the python library, you can use: `vault_cli.get_client(render=False)` when creating your client to get a client that will not render templated secrets and thus operates securely.
CVE-2021-43836 1 Sulu 1 Sulu 2024-11-21 8.5 High
Sulu is an open-source PHP content management system based on the Symfony framework. In affected versions an attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution. The problem is patched with the Versions 1.6.44, 2.2.18, 2.3.8, 2.4.0. For users unable to upgrade overwrite the service `sulu_route.generator.expression_token_provider` and wrap the translator before passing it to the expression language.
CVE-2021-43741 1 Cmsimple 1 Cmsimple 2024-11-21 9.8 Critical
CMSimple 5.4 is vulnerable to Directory Traversal. The vulnerability exists when a user changes the file name to malicious file on config.php leading to remote code execution.
CVE-2021-43736 1 Cmswing 1 Cmswing 2024-11-21 9.8 Critical
CmsWing CMS 1.3.7 is affected by a Remote Code Execution (RCE) vulnerability via parameter: log rule
CVE-2021-43721 1 Leanote 1 Leanote 2024-11-21 6.1 Medium
Leanote 2.7.0 is vulnerable to Cross Site Scripting (XSS) in the markdown type note. This leads to remote code execution with payload : <video src=x onerror=(function(){require('child_process').exec('calc');})();>
CVE-2021-43630 1 Projectworlds 1 Hospital Management System In Php 2024-11-21 8.8 High
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server.
CVE-2021-43609 1 Spiceworks 1 Help Desk Server 2024-11-21 9.9 Critical
An issue was discovered in Spiceworks Help Desk Server before 1.3.3. A Blind Boolean SQL injection vulnerability within the order_by_for_ticket function in app/models/reporting/database_query.rb allows an authenticated attacker to execute arbitrary SQL commands via the sort parameter. This can be leveraged to leak local files from the host system, leading to remote code execution (RCE) through deserialization of malicious data.
CVE-2021-43579 2 Debian, Htmldoc Project 2 Debian Linux, Htmldoc 2024-11-21 7.8 High
A stack-based buffer overflow in image_load_bmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
CVE-2021-43562 1 Pixxio 1 Pixx.io 2024-11-21 8.8 High
An issue was discovered in the pixxio (aka pixx.io integration or DAM) extension before 1.0.6 for TYPO3. The extension fails to restrict the image download to the configured pixx.io DAM URL, resulting in SSRF. As a result, an attacker can download various content from a remote location and save it to a user-controlled filename, which may result in Remote Code Execution. A TYPO3 backend user account is required to exploit this.
CVE-2021-43555 1 Myscada 1 Mydesigner 2024-11-21 7.3 High
mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution.
CVE-2021-43484 1 Simple Client Management System Project 1 Simple Client Management System 2024-11-21 9.8 Critical
A Remote Code Execution (RCE) vulnerability exists in Simple Client Management System 1.0 in create.php due to the failure to validate the extension of the file being sent in a request.