Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-25899

EPSS 73.00% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-25899

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Void Aural Rec Monitor SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Void Aural Rec Monitor是西班牙Void公司的一个应用软件。 Aural Rec Monitor 9.0.0.1 存在SQL注入漏洞,该漏洞源于svc-login.php允许未经身份验证的攻击者发送精心设计的HTTP请求来执行基于盲时间的SQL注入。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-25899

#POC DescriptionSource LinkShenlong Link
1Void Aural Rec Monitor 9.0.0.1 contains a SQL injection vulnerability in svc-login.php. An attacker can send a crafted HTTP request to perform a blind time-based SQL injection via the param1 parameter and thus possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-25899.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-25899

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-04-23 · 21 CVEs total

CVE-2021-20089purl 安全漏洞
CVE-2021-31791Sentry Hardware Sentry KM 安全漏洞
CVE-2021-31584Sipwise C5 NGCP CSC 跨站请求伪造漏洞
CVE-2021-31583Sipwise C5 NGCP CSC 跨站脚本漏洞
CVE-2021-25898Void Aural Rec Monitor 信任管理问题漏洞
CVE-2021-29158Sonatype Nexus Repository Manager 安全漏洞
CVE-2020-17542dotCMS 跨站脚本漏洞
CVE-2021-31780MISP 安全漏洞
CVE-2021-20083jquery-plugin-query-object 安全漏洞
CVE-2021-20085backbone-query-parameters 安全漏洞
CVE-2021-31607SaltStack Salt 操作系统命令注入漏洞
CVE-2021-20086jquery-bbq 安全漏洞
CVE-2021-20087jquery-deparam 安全漏洞
CVE-2021-20088mootools-more 安全漏洞
CVE-2021-20084jquery-sparkle 安全漏洞
CVE-2021-22678Horner Automation Cscape 缓冲区错误漏洞
CVE-2021-22682Horner Automation Cscape 安全漏洞
CVE-2021-22893Pulse Secure Pulse Connect Secure 资源管理错误漏洞
CVE-2021-31539Wowza Media Systems Streaming Engine 安全漏洞
CVE-2021-31540Wowza Media Systems Streaming Engine 权限许可和访问控制问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2021-25899

No comments yet


Leave a comment