CVE-2021-31573
- EPSS 2.5%
- Published 06.02.2023 22:15:09
- Last modified 26.03.2025 15:15:36
In Config Manager, there is a possible command injection due to improper input validation. This could lead to remote escalation of privilege from a proximal attacker with no additional execution privileges needed. User interaction is not needed for e...
CVE-2021-31574
- EPSS 2.5%
- Published 06.02.2023 22:15:09
- Last modified 26.03.2025 15:15:37
In Config Manager, there is a possible command injection due to improper input validation. This could lead to remote escalation of privilege from a proximal attacker with no additional execution privileges needed. User interaction is not needed for e...
CVE-2021-31575
- EPSS 2.5%
- Published 06.02.2023 22:15:09
- Last modified 26.03.2025 16:15:14
In Config Manager, there is a possible command injection due to improper input validation. This could lead to remote escalation of privilege from a proximal attacker with no additional execution privileges needed. User interaction is not needed for e...
CVE-2021-31576
- EPSS 0.53%
- Published 06.02.2023 22:15:09
- Last modified 21.11.2024 06:05:56
In Boa, there is a possible information disclosure due to a missing permission check. This could lead to remote information disclosure to a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploitat...
CVE-2021-31577
- EPSS 2.58%
- Published 06.02.2023 22:15:09
- Last modified 21.11.2024 06:05:56
In Boa, there is a possible escalation of privilege due to a missing permission check. This could lead to remote escalation of privilege from a proximal attacker with no additional execution privileges needed. User interaction is not needed for explo...
CVE-2021-31578
- EPSS 2.36%
- Published 06.02.2023 22:15:09
- Last modified 21.11.2024 06:05:56
In Boa, there is a possible escalation of privilege due to a stack buffer overflow. This could lead to remote escalation of privilege from a proximal attacker with no additional execution privileges needed. User interaction is not needed for exploita...