Vulnerability Details CVE-2021-34539
An issue was discovered in CubeCoders AMP before 2.1.1.8. A lack of validation of the Java Version setting means that an unintended executable path can be set. The result is that high-privileged users can trigger code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.009
EPSS Ranking 74.7%
CVSS Severity
CVSS v3 Score 7.2
CVSS v2 Score 6.5
Products affected by CVE-2021-34539
-
cpe:2.3:a:cubecoders:amp:-
-
cpe:2.3:a:cubecoders:amp:1.4.7.0
-
cpe:2.3:a:cubecoders:amp:1.4.7.2
-
cpe:2.3:a:cubecoders:amp:1.4.8.0
-
cpe:2.3:a:cubecoders:amp:1.4.8.2
-
cpe:2.3:a:cubecoders:amp:1.5.0.0
-
cpe:2.3:a:cubecoders:amp:1.5.2.0
-
cpe:2.3:a:cubecoders:amp:1.6.0.0
-
cpe:2.3:a:cubecoders:amp:1.6.10.0
-
cpe:2.3:a:cubecoders:amp:1.6.10.4
-
cpe:2.3:a:cubecoders:amp:1.6.10.6
-
cpe:2.3:a:cubecoders:amp:1.6.10.8
-
cpe:2.3:a:cubecoders:amp:1.6.12.2
-
cpe:2.3:a:cubecoders:amp:1.6.8.0
-
cpe:2.3:a:cubecoders:amp:1.6.9.0
-
cpe:2.3:a:cubecoders:amp:1.6.9.2
-
cpe:2.3:a:cubecoders:amp:1.7.0.0
-
cpe:2.3:a:cubecoders:amp:1.7.1.0
-
cpe:2.3:a:cubecoders:amp:1.7.2.4
-
cpe:2.3:a:cubecoders:amp:1.7.2.6
-
cpe:2.3:a:cubecoders:amp:1.7.3.0
-
cpe:2.3:a:cubecoders:amp:1.7.3.2
-
cpe:2.3:a:cubecoders:amp:1.7.4.0
-
cpe:2.3:a:cubecoders:amp:1.7.4.1
-
cpe:2.3:a:cubecoders:amp:1.7.4.4
-
cpe:2.3:a:cubecoders:amp:1.7.5.0
-
cpe:2.3:a:cubecoders:amp:1.8
-
cpe:2.3:a:cubecoders:amp:1.8.0.2
-
cpe:2.3:a:cubecoders:amp:1.8.1.0
-
cpe:2.3:a:cubecoders:amp:1.8.1.2
-
cpe:2.3:a:cubecoders:amp:1.8.1.4
-
cpe:2.3:a:cubecoders:amp:1.8.2.0
-
cpe:2.3:a:cubecoders:amp:1.8.2.2
-
cpe:2.3:a:cubecoders:amp:1.8.3.0
-
cpe:2.3:a:cubecoders:amp:1.8.3.2
-
cpe:2.3:a:cubecoders:amp:1.8.3.4
-
cpe:2.3:a:cubecoders:amp:1.8.5.0
-
cpe:2.3:a:cubecoders:amp:1.8.5.2
-
cpe:2.3:a:cubecoders:amp:1.8.5.4
-
cpe:2.3:a:cubecoders:amp:1.8.6.0
-
cpe:2.3:a:cubecoders:amp:1.8.7.0
-
cpe:2.3:a:cubecoders:amp:1.8.8.0
-
cpe:2.3:a:cubecoders:amp:1.9.0.6
-
cpe:2.3:a:cubecoders:amp:1.9.1.2
-
cpe:2.3:a:cubecoders:amp:1.9.2.2
-
cpe:2.3:a:cubecoders:amp:1.9.3.0
-
cpe:2.3:a:cubecoders:amp:1.9.5.6
-
cpe:2.3:a:cubecoders:amp:1.9.6.0
-
cpe:2.3:a:cubecoders:amp:1.9.6.4
-
cpe:2.3:a:cubecoders:amp:1.9.8.2
-
cpe:2.3:a:cubecoders:amp:1.9.8.6
-
cpe:2.3:a:cubecoders:amp:1.9.9.0
-
cpe:2.3:a:cubecoders:amp:1.9.9.10
-
cpe:2.3:a:cubecoders:amp:1.9.9.2
-
cpe:2.3:a:cubecoders:amp:1.9.9.4
-
cpe:2.3:a:cubecoders:amp:1.9.9.6
-
cpe:2.3:a:cubecoders:amp:1.9.9.8
-
cpe:2.3:a:cubecoders:amp:2.0.0.0
-
cpe:2.3:a:cubecoders:amp:2.0.2.0
-
cpe:2.3:a:cubecoders:amp:2.0.3.0
-
cpe:2.3:a:cubecoders:amp:2.0.4.0
-
cpe:2.3:a:cubecoders:amp:2.0.5
-
cpe:2.3:a:cubecoders:amp:2.0.6
-
cpe:2.3:a:cubecoders:amp:2.0.6.2
-
cpe:2.3:a:cubecoders:amp:2.0.6.4
-
cpe:2.3:a:cubecoders:amp:2.0.6.6
-
cpe:2.3:a:cubecoders:amp:2.0.6.8
-
cpe:2.3:a:cubecoders:amp:2.0.7
-
cpe:2.3:a:cubecoders:amp:2.0.8
-
cpe:2.3:a:cubecoders:amp:2.0.8.10
-
cpe:2.3:a:cubecoders:amp:2.0.8.2
-
cpe:2.3:a:cubecoders:amp:2.0.8.6
-
cpe:2.3:a:cubecoders:amp:2.0.8.8
-
cpe:2.3:a:cubecoders:amp:2.0.9.0
-
cpe:2.3:a:cubecoders:amp:2.1.0
-
cpe:2.3:a:cubecoders:amp:2.1.0.10
-
cpe:2.3:a:cubecoders:amp:2.1.0.12
-
cpe:2.3:a:cubecoders:amp:2.1.0.14
-
cpe:2.3:a:cubecoders:amp:2.1.0.2
-
cpe:2.3:a:cubecoders:amp:2.1.0.4
-
cpe:2.3:a:cubecoders:amp:2.1.0.6
-
cpe:2.3:a:cubecoders:amp:2.1.0.8
-
cpe:2.3:a:cubecoders:amp:2.1.1.0
-
cpe:2.3:a:cubecoders:amp:2.1.1.2
-
cpe:2.3:a:cubecoders:amp:2.1.1.4
-
cpe:2.3:a:cubecoders:amp:2.1.1.6