Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Unknown

CVE-2020-15568

Disclosure Date: January 30, 2021 (last updated February 22, 2025)
TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation vulnerability in include/exportUser.php, in which an attacker can trigger a call to the exec method with (for example) OS commands in the opt parameter.
Attacker Value
Unknown

CVE-2021-42809

Disclosure Date: December 20, 2021 (last updated February 23, 2025)
Improper Access Control of Dynamically-Managed Code Resources (DLL) in Thales Sentinel Protection Installer could allow the execution of arbitrary code.
Attacker Value
Unknown

CVE-2021-23259

Disclosure Date: December 01, 2021 (last updated February 23, 2025)
Authenticated users with Administrator or Developer roles may execute OS commands by Groovy Script which uses Groovy lib to render a webpage. The groovy script does not have security restrictions, which will cause attackers to execute arbitrary commands remotely(RCE).
Attacker Value
Unknown

CVE-2021-23258

Disclosure Date: December 01, 2021 (last updated February 23, 2025)
Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).
Attacker Value
Unknown

CVE-2021-23262

Disclosure Date: December 01, 2021 (last updated February 23, 2025)
Authenticated administrators may modify the main YAML configuration file and load a Java class resulting in RCE.
Attacker Value
Unknown

CVE-2021-32813

Disclosure Date: August 03, 2021 (last updated February 23, 2025)
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse. If one has a chain of Traefik middlewares, and one of them sets a request header, then sending a request with a certain Connection header will cause it to be removed before the request is sent. In this case, the backend does not see the request header. A patch is available in version 2.4.13. There are no known workarounds aside from upgrading.
Attacker Value
Unknown

CVE-2021-22387

Disclosure Date: August 02, 2021 (last updated February 23, 2025)
There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands.
Attacker Value
Unknown

CVE-2021-32563

Disclosure Date: May 11, 2021 (last updated February 22, 2025)
An issue was discovered in Thunar before 4.16.7 and 4.17.x before 4.17.2. When called with a regular file as a command-line argument, it delegates to a different program (based on the file type) without user confirmation. This could be used to achieve code execution.
Attacker Value
Unknown

CVE-2021-21413

Disclosure Date: March 30, 2021 (last updated February 22, 2025)
isolated-vm is a library for nodejs which gives you access to v8's Isolate interface. Versions of isolated-vm before v4.0.0 have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate. Reference objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a Reference instance to an attacker they would be able to use it to acquire a Reference to the nodejs context's Function object. Similar application-specific attacks could be possible by modifying the local prototype of other API objects. Access to NativeModule objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution. This is addressed in v4.0.0 through a series of related changes.
Attacker Value
Unknown

CVE-2021-26276

Disclosure Date: January 27, 2021 (last updated February 22, 2025)
scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data