CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In April 2021

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
801 CVE-2021-24155 434 2021-04-05 2021-12-03
6.5
None Remote Low ??? Partial Partial Partial
The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.
802 CVE-2021-24154 552 2021-04-05 2021-04-19
4.0
None Remote Low ??? Partial None None
The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd
803 CVE-2021-24153 79 XSS Bypass 2021-04-05 2021-04-09
3.5
None Remote Medium ??? None Partial None
A Stored Cross-Site Scripting vulnerability was discovered in the Yoast SEO WordPress plugin before 3.4.1, which had built-in blacklist filters which were blacklisting Parenthesis as well as several functions such as alert but bypasses were found.
804 CVE-2021-24152 79 XSS 2021-04-05 2021-04-08
4.3
None Remote Medium Not required None Partial None
The "All Subscribers" setting page of Popup Builder was vulnerable to reflected Cross-Site Scripting.
805 CVE-2021-24150 918 2021-04-05 2021-04-13
5.0
None Remote Low Not required Partial None None
The LikeBtn WordPress Like Button Rating ♥ LikeBtn WordPress plugin before 2.6.32 was vulnerable to Unauthenticated Full-Read Server-Side Request Forgery (SSRF).
806 CVE-2021-24028 763 Exec Code 2021-04-14 2021-04-21
7.5
None Remote Low Not required Partial Partial Partial
An invalid free in Thrift's table-based serialization can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2021.02.22.00.
807 CVE-2021-24027 668 2021-04-06 2021-04-15
5.0
None Remote Low Not required Partial None None
A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device’s external storage to read cached TLS material.
808 CVE-2021-24026 787 2021-04-06 2021-04-15
10.0
None Remote Low Not required Complete Complete Complete
A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write.
809 CVE-2021-24024 532 2021-04-12 2021-04-16
4.0
None Remote Low ??? Partial None None
A clear text storage of sensitive information into log file vulnerability in FortiADCManager 5.3.0 and below, 5.2.1 and below and FortiADC 5.3.7 and below may allow a remote authenticated attacker to read other local users' password in log files.
810 CVE-2021-23925 79 XSS 2021-04-01 2021-04-06
4.3
None Remote Medium Not required None Partial None
An issue was discovered in Devolutions Server before 2020.3. There is a cross-site scripting (XSS) vulnerability in entries of type Document.
811 CVE-2021-23924 532 2021-04-01 2021-04-06
5.0
None Remote Low Not required Partial None None
An issue was discovered in Devolutions Server before 2020.3. There is an exposure of sensitive information in diagnostic files.
812 CVE-2021-23923 287 2021-04-01 2021-04-06
4.9
None Remote Medium ??? Partial Partial None
An issue was discovered in Devolutions Server before 2020.3. There is Broken Authentication with Windows domain users.
813 CVE-2021-23922 79 XSS 2021-04-01 2021-04-06
3.5
None Remote Medium ??? None Partial None
An issue was discovered in Devolutions Remote Desktop Manager before 2020.2.12. There is a cross-site scripting (XSS) vulnerability in webviews.
814 CVE-2021-23921 2021-04-01 2021-04-06
6.4
None Remote Low Not required Partial Partial None
An issue was discovered in Devolutions Server before 2020.3. There is broken access control on Password List entry elements.
815 CVE-2021-23887 269 2021-04-15 2021-04-27
7.2
None Local Low Not required Complete Complete Complete
Privilege Escalation vulnerability in McAfee Data Loss Prevention (DLP) Endpoint for Windows prior to 11.6.100 allows a local, low privileged, attacker to write to arbitrary controlled kernel addresses. This is achieved by launching applications, suspending them, modifying the memory and restarting them when they are monitored by McAfee DLP through the hdlphook driver.
816 CVE-2021-23886 755 DoS 2021-04-15 2021-04-21
4.9
None Local Low Not required None None Complete
Denial of Service vulnerability in McAfee Data Loss Prevention (DLP) Endpoint for Windows prior to 11.6.100 allows a local, low privileged, attacker to cause a BSoD through suspending a process, modifying the processes memory and restarting it. This is triggered by the hdlphook driver reading invalid memory.
817 CVE-2021-23884 319 2021-04-15 2021-04-21
2.7
None Local Network Low ??? Partial None None
Cleartext Transmission of Sensitive Information vulnerability in the ePO Extension of McAfee Content Security Reporter (CSR) prior to 2.8.0 allows an ePO administrator to view the unencrypted password of the McAfee Web Gateway (MWG) or the password of the McAfee Web Gateway Cloud Server (MWGCS) read only user used to retrieve log files for analysis in CSR.
818 CVE-2021-23382 DoS 2021-04-26 2021-07-08
5.0
None Remote Low Not required None None Partial
The package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
819 CVE-2021-23381 77 Exec Code 2021-04-18 2021-04-23
7.5
None Remote Low Not required Partial Partial Partial
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
820 CVE-2021-23380 77 Exec Code 2021-04-18 2021-04-23
7.5
None Remote Low Not required Partial Partial Partial
This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
821 CVE-2021-23379 77 Exec Code 2021-04-18 2021-04-23
7.5
None Remote Low Not required Partial Partial Partial
This affects all versions of package portkiller. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
822 CVE-2021-23378 77 Exec Code 2021-04-18 2021-04-22
7.5
None Remote Low Not required Partial Partial Partial
This affects all versions of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
823 CVE-2021-23377 77 Exec Code 2021-04-18 2021-04-22
7.5
None Remote Low Not required Partial Partial Partial
This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
824 CVE-2021-23376 77 Exec Code 2021-04-18 2021-04-22
7.5
None Remote Low Not required Partial Partial Partial
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
825 CVE-2021-23375 77 Exec Code 2021-04-18 2021-04-22
7.5
None Remote Low Not required Partial Partial Partial
This affects all versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
826 CVE-2021-23374 77 Exec Code 2021-04-18 2021-04-22
7.5
None Remote Low Not required Partial Partial Partial
This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
827 CVE-2021-23372 754 DoS 2021-04-13 2021-04-19
5.0
None Remote Low Not required None None Partial
All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash.
828 CVE-2021-23371 2021-04-12 2021-04-20
5.0
None Remote Low Not required None None Partial
This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.
829 CVE-2021-23370 2021-04-12 2021-04-20
7.5
None Remote Low Not required Partial Partial Partial
This affects the package swiper before 6.5.1.
830 CVE-2021-23369 Exec Code 2021-04-12 2021-06-08
7.5
None Remote Low Not required Partial Partial Partial
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
831 CVE-2021-23368 DoS 2021-04-12 2021-06-11
5.0
None Remote Low Not required None None Partial
The package postcss from 7.0.0 and before 8.2.10 are vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.
832 CVE-2021-23365 287 Bypass 2021-04-26 2021-05-19
5.5
None Remote Low ??? Partial Partial None
The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).
833 CVE-2021-23364 DoS 2021-04-28 2021-04-28
0.0
None ??? ??? ??? ??? ??? ???
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
834 CVE-2021-23281 94 Exec Code 2021-04-13 2021-04-20
7.5
None Remote Low Not required Partial Partial Partial
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to rouge SNMP server and execute attacker-controlled code.
835 CVE-2021-23280 434 Exec Code 2021-04-13 2021-04-21
6.5
None Remote Low ??? Partial Partial Partial
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability.
836 CVE-2021-23279 20 2021-04-13 2021-04-21
6.4
None Remote Low Not required None Partial Partial
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
837 CVE-2021-23278 2021-04-13 2021-04-21
5.5
None Remote Low ??? None Partial Partial
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file delete vulnerability induced due to improper input validation at server/maps_srv.js with action removeBackground and server/node_upgrade_srv.js with action removeFirmware. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
838 CVE-2021-23277 Exec Code 2021-04-13 2021-04-21
7.5
None Remote Low Not required Partial Partial Partial
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated eval injection vulnerability. The software does not neutralize code syntax from users before using in the dynamic evaluation call in loadUserFile function under scripts/libs/utils.js. Successful exploitation can allow attackers to control the input to the function and execute attacker controlled commands.
839 CVE-2021-23276 89 Sql 2021-04-13 2021-04-21
6.5
None Remote Low ??? Partial Partial Partial
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated SQL injection. A malicious user can send a specially crafted packet to exploit the vulnerability. Successful exploitation of this vulnerability can allow attackers to add users in the data base.
840 CVE-2021-23270 834 2021-04-12 2021-04-27
4.3
None Remote Medium Not required None None Partial
In Gargoyle OS 1.12.0, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.
841 CVE-2021-23133 362 2021-04-22 2021-06-23
6.9
None Local Medium Not required Complete Complete Complete
A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)->sctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.
842 CVE-2021-22893 287 Exec Code Bypass 2021-04-23 2021-04-28
7.5
None Remote Low Not required Partial Partial Partial
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.
843 CVE-2021-22890 290 2021-04-01 2021-07-20
4.3
None Remote Medium Not required None Partial None
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
844 CVE-2021-22879 74 Exec Code 2021-04-14 2021-05-27
6.8
None Remote Medium Not required Partial Partial Partial
Nextcloud Desktop Client prior to 3.1.3 is vulnerable to resource injection by way of missing validation of URLs, allowing a malicious server to execute remote commands. User interaction is needed for exploitation.
845 CVE-2021-22876 200 +Info 2021-04-01 2021-07-20
5.0
None Remote Low Not required Partial None None
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
846 CVE-2021-22865 863 2021-04-02 2021-04-08
4.3
None Remote Medium Not required Partial None None
An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's web authentication flow to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. The private repository metadata returned would be limited to repositories owned by the user the token identifies. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in versions 3.0.4, 2.22.10, 2.21.18. This vulnerability was reported via the GitHub Bug Bounty program.
847 CVE-2021-22720 22 Exec Code Dir. Trav. 2021-04-13 2021-11-30
6.5
None Remote Low ??? Partial Partial Partial
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when restoring a project.
848 CVE-2021-22719 22 Exec Code Dir. Trav. 2021-04-13 2021-06-02
6.5
None Remote Low ??? Partial Partial Partial
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when a file is uploaded.
849 CVE-2021-22718 22 Exec Code Dir. Trav. 2021-04-13 2021-06-02
6.8
None Remote Medium Not required Partial Partial Partial
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when restoring project files.
850 CVE-2021-22717 22 Exec Code Dir. Trav. 2021-04-13 2021-06-02
6.5
None Remote Low ??? Partial Partial Partial
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists in C-Bus Toolkit (V1.15.7 and prior) that could allow a remote code execution when processing config files.
Total number of vulnerabilities : 1821   Page : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 (This Page)18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.