Show filters
229 Total Results
Displaying 31-40 of 229
Sort by:
Attacker Value
Unknown
CVE-2021-21014
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a file upload restriction bypass. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
0
Attacker Value
Unknown
CVE-2021-21029
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a Reflected Cross-site Scripting vulnerability via 'file' parameter. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Access to the admin console is required for successful exploitation.
0
Attacker Value
Unknown
CVE-2021-21015
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an OS command injection via the customer attribute save controller. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
0
Attacker Value
Unknown
CVE-2021-21020
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to an access control bypass vulnerability in the Login as Customer module. Successful exploitation could lead to unauthorized access to restricted resources.
0
Attacker Value
Unknown
CVE-2021-21019
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to XML injection in the Widgets module. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
0
Attacker Value
Unknown
CVE-2021-21018
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to OS command injection via the scheduled operation module. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
0
Attacker Value
Unknown
CVE-2021-21032
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) do not adequately invalidate user sessions. Successful exploitation of this issue could lead to unauthorized access to restricted resources. Access to the admin console is not required for successful exploitation.
0
Attacker Value
Unknown
CVE-2020-24407
Disclosure Date: October 15, 2020 (last updated February 22, 2025)
Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by an unsafe file upload vulnerability that could result in arbitrary code execution. This vulnerability could be abused by authenticated users with administrative permissions to the System/Data and Transfer/Import components.
0
Attacker Value
Unknown
CVE-2020-24408
Disclosure Date: October 15, 2020 (last updated February 22, 2025)
Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by a persistent XSS vulnerability that allows users to upload malicious JavaScript via the file upload component. This vulnerability could be abused by an unauthenticated attacker to execute XSS attacks against other Magento users. This vulnerability requires a victim to browse to the uploaded file.
0
Attacker Value
Unknown
CVE-2020-24406
Disclosure Date: October 15, 2020 (last updated February 22, 2025)
When in maintenance mode, Magento version 2.4.0 and 2.3.4 (and earlier) are affected by an information disclosure vulnerability that could expose the installation path during build deployments. This information could be helpful to attackers if they are able to identify other exploitable vulnerabilities in the environment.
0