Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In May 2021
Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The ability to enumerate users was possible without relevant permissions due to different handling depending on whether the user existed or not when attempting to use the switch users functionality. We now ensure that 403s are returned whether the user exists or not if a user cannot switch to a user or if the user does not exist. The patch for this issue is available for branch 3.4.
CVSS Score
5.3
EPSS Score
0.002
Published
2021-05-13
File Upload vulnerability exists in ArticleCMS 1.0 via the image upload feature at /admin by changing the Content-Type to image/jpeg and placing PHP code after the JPEG data, which could let a remote malicious user execute arbitrary PHP code.
CVSS Score
9.8
EPSS Score
0.004
Published
2021-05-13
Insecure permissions issue in zzcms 201910 via the reset any user password in /one/getpassword.php.
CVSS Score
7.5
EPSS Score
0.001
Published
2021-05-13
A malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common.
CVSS Score
6.5
EPSS Score
0.004
Published
2021-05-13
A flaw was found in OpenJPEG’s encoder. This flaw allows an attacker to pass specially crafted x,y offset input to OpenJPEG to use during encoding. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
CVSS Score
7.8
EPSS Score
0.0
Published
2021-05-13
A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
CVSS Score
5.5
EPSS Score
0.002
Published
2021-05-13
A file upload issue exists in all versions of ArticleCMS which allows malicious users to getshell.
CVSS Score
9.8
EPSS Score
0.004
Published
2021-05-13
SonicWall Email Security Virtual Appliance version 10.0.9 and earlier versions contain a default username and a password that is used at initial setup. An attacker could exploit this transitional/temporary user account from the trusted domain to access the Virtual Appliance remotely only when the device is freshly installed and not connected to Mysonicwall.
CVSS Score
7.8
EPSS Score
0.0
Published
2021-05-13
A flaw was found in noobaa-operator in versions before 5.7.0, where internal RPC AuthTokens between the noobaa operator and the noobaa core are leaked into log files. An attacker with access to the log files could use this AuthToken to gain additional access into noobaa deployment and can read/modify system configuration.
CVSS Score
8.8
EPSS Score
0.003
Published
2021-05-13
In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI contain user credentials.
CVSS Score
5.3
EPSS Score
0.001
Published
2021-05-13


Contact Us

Shodan ® - All rights reserved