Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-31827

EPSS 0.07% · P22
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-31827

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In Progress MOVEit Transfer before 2021.0 (13.0), a SQL injection vulnerability has been found in the MOVEit Transfer web app that could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or destroy database elements. This is in MOVEit.DMZ.WebApp in SILHuman.vb.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Progress Software MOVEit Transfer SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Progress Software MOVEit Transfer是美国Progress Software公司的一套文件传输软件。 Progress MOVEit Transfer 2021.0之前版本存在SQL注入漏洞,该漏洞允许经过认证的攻击者可利用该漏洞获得对MOVEit Transfer数据库的非授权访问。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-31827

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-31827

登录查看更多情报信息。

Same Patch Batch · n/a · 2021-05-18 · 39 CVEs total

CVE-2020-23851ffjpeg 缓冲区错误漏洞
CVE-2021-3200libsolv 缓冲区错误漏洞
CVE-2021-32305websvn 操作系统命令注入漏洞
CVE-2020-20951Pluck 命令注入漏洞
CVE-2020-24740Pluck 跨站请求伪造漏洞
CVE-2020-23861GNU LibreDWG 缓冲区错误漏洞
CVE-2021-32238Epic Games Rocket League 缓冲区错误漏洞
CVE-2020-23856GNU cflow 资源管理错误漏洞
CVE-2020-24026TinyShop 跨站脚本漏洞
CVE-2020-23852ffjpeg 缓冲区错误漏洞
CVE-2020-18178HongCMS 路径遍历漏洞
CVE-2020-20254Mikrotik RouterOs 代码问题漏洞
CVE-2020-20253MikroTik RouterOS 数字错误漏洞
CVE-2021-30145node-mpv 格式化字符串错误漏洞
CVE-2021-22117Pivotal Software RabbitMQ 代码注入漏洞
CVE-2020-25709OpenLDAP 安全漏洞
CVE-2002-2438TCP 授权问题漏洞
CVE-2021-3518libxml2 资源管理错误漏洞
CVE-2021-3531Red Hat Ceph 输入验证错误漏洞
CVE-2020-19924BoostIO Boostnote 跨站脚本漏洞

Showing top 20 of 39 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-31827

No comments yet


Leave a comment