Selection:
XSS CSRF Privilege Buffer Remote Stack
CVE ID Name Status References
CVE-2021-3603

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

Assigned (20210615)

CONFIRM:https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/ | URL:https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/ | FEDORA:FEDORA-2021-bfc34b3d5c | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJYSOFCUBS67J3TKR74SD3C454N7VTYM/ | FEDORA:FEDORA-2021-ef548cb234 | URL:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YRMWGA4VTMXFB22KICMB7YMFZNFV3EJ/ | MISC:https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3 | URL:https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3

CVE-2021-36030

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability during the checkout process. An unauthenticated attacker can leverage this vulnerability to alter the price of items.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html

CVE-2021-36031

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by a Path Traversal vulnerability via the `theme[preview_image]` parameter. An attacker with admin privileges could leverage this vulnerability to achieve remote code execution.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html

CVE-2021-36032

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability. An authenticated attacker can trigger an insecure direct object reference in the `V1/customers/me` endpoint to achieve information exposure and privilege escalation.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html

CVE-2021-36033

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability in the Widgets Module. An attacker with admin privileges can trigger a specially crafted script to achieve remote code execution.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html

CVE-2021-36034

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability. An attacker with admin privileges can upload a specially crafted file to achieve remote code execution.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html

CVE-2021-36035

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability. An attacker with admin privileges could make a crafted request to the Adobe Stock API to achieve remote code execution.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html

CVE-2021-36036

Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper access control vulnerability within Magento's Media Gallery Upload workflow. By storing a specially crafted file in the website gallery, an authenticated attacker with administrative privilege can gain access to delete the .htaccess file. This could result in the attacker achieving remote code execution.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html

CVE-2021-36037

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper improper authorization vulnerability. An authenticated attacker could leverage this vulnerability to achieve sensitive information disclosure.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html

CVE-2021-36038

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability in the Multishipping Module. An authenticated attacker could leverage this vulnerability to achieve sensitive information disclosure.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html

CVE-2021-36039

Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability via the `quoteId` parameter. An attacker can abuse this vulnerability to disclose sensitive information.

Assigned (20210630)

MISC:https://helpx.adobe.com/security/products/magento/apsb21-64.html | URL:https://helpx.adobe.com/security/products/magento/apsb21-64.html


Page created:

CVE year by year statistics.

CVE year statistics by common vulnerability domain.

Latest data from: 2024-04-25