Show filters
57 Total Results
Displaying 41-50 of 57
Sort by:
Attacker Value
Unknown

CVE-2022-1361

Disclosure Date: May 12, 2022 (last updated October 07, 2023)
The affected On-Premise cnMaestro is vulnerable to a pre-auth data exfiltration through improper neutralization of special elements used in an SQL command. This could allow an attacker to exfiltrate data about other user’s accounts and devices.
Attacker Value
Unknown

CVE-2021-46384

Disclosure Date: March 04, 2022 (last updated October 07, 2023)
https://gitee.com/mingSoft/MCMS MCMS <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successful attacks of this vulnerability can result in takeover of MCMS.
Attacker Value
Unknown

CVE-2021-42638

Disclosure Date: February 01, 2022 (last updated October 07, 2023)
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below do not sanitize user input resulting in pre-auth remote code execution.
Attacker Value
Unknown

CVE-2021-42635

Disclosure Date: January 31, 2022 (last updated October 07, 2023)
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below use a hardcoded APP_KEY value, leading to pre-auth remote code execution.
Attacker Value
Unknown

CVE-2021-42631

Disclosure Date: January 31, 2022 (last updated October 07, 2023)
PrinterLogic Web Stack versions 19.1.1.13 SP9 and below deserializes attacker controlled leading to pre-auth remote code execution.
Attacker Value
Unknown

CVE-2021-40865

Disclosure Date: October 25, 2021 (last updated November 28, 2024)
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4
Attacker Value
Unknown

CVE-2021-32836

Disclosure Date: September 09, 2021 (last updated November 28, 2024)
ZStack is open source IaaS(infrastructure as a service) software. In ZStack before versions 3.10.12 and 4.1.6 there is a pre-auth unsafe deserialization vulnerability in the REST API. An attacker in control of the request body will be able to provide both the class name and the data to be deserialized and therefore will be able to instantiate an arbitrary type and assign arbitrary values to its fields. This issue may lead to a Denial Of Service. If a suitable gadget is available, then an attacker may also be able to exploit this vulnerability to gain pre-auth remote code execution. For additional details see the referenced GHSL-2021-087.
Attacker Value
Unknown

CVE-2021-21242

Disclosure Date: January 15, 2021 (last updated November 28, 2024)
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or authorization checks. This issue may lead to pre-auth remote code execution. This issue was fixed in 4.0.3 by removing AttachmentUploadServlet and not using deserialization
Attacker Value
Unknown

CVE-2021-21243

Disclosure Date: January 15, 2021 (last updated November 28, 2024)
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, a Kubernetes REST endpoint exposes two methods that deserialize untrusted data from the request body. These endpoints do not enforce any authentication or authorization checks. This issue may lead to pre-auth RCE. This issue was fixed in 4.0.3 by not using deserialization at KubernetesResource side.
Attacker Value
Unknown

CVE-2021-21244

Disclosure Date: January 15, 2021 (last updated November 28, 2024)
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, There is a vulnerability that enabled pre-auth server side template injection via Bean validation message tampering. Full details in the reference GHSA. This issue was fixed in 4.0.3 by disabling validation interpolation completely.