4.6
CVSSv2

CVE-2021-21315

Published: 16/02/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 414
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

systeminformation systeminformation

apache cordova 10.0.0

Github Repositories

Who am I Yoshino-s 百度基础安全部 Blog: blogyoshino-sonline/ 🔨 What did I did? 🐞 CVEs CVE-2018-5771 Tenda AC6 Remote Command Execution CVE-2021-21315 systeminformation Command Injection CVE-2021-32736 thinkjs Prototype Pollution CVE-2021-3918 json-schema Prototype Pollution 🚩 Status 🙌 广告位和友链招租

CVE-2021-21315-systeminformation This is Proof of Concept for CVE-2021-21315 which affects The System Information Library for NodeJS (npm package "systeminformation") npmjscom/systeminformation "be sure to check or sanitize service parameters that are passed to siinetLatency(), siinetChecksite(), siservices(), siprocessLoad() do only allow strings, rej

The COVID graphene-based injections are their weapons for global assimilation and eventual replacement of the human race

It's a Global Takeover by the Pro-Eugenics Elite! Unknown materials found in COVID vaccines: Are they altering human DNA? The COVID graphene-based injections are their weapons for global assimilation and eventual replacement of the human race Not only toxic graphene oxide was found in Pfizer vials but probably biological agents are also lurking waiting to change you

The U.S. generals have to be completely idiot to treat their service members as guinea pigs by injecting them with poison unless some of them are also collaborators

Two questions about the US Military “vaccinating” their service members against COVID-19: Why would you “vaccinate” your service members without first checking what is really in the vials? You have Military doctors and scientists that at least know how to use a light microscope and they probably have access to electron microscopes No military shou

systeminformation

CVE-2021-21315 Exploit Des: My python Script to exploit system Information Library for NodeJS (npm package "systeminformation") npmjscom/systeminformation I thought this POC will not show real world impact, But it'll be cool in CTF's

exploits CVE DESCRIPTION LINK CVE-2021-27582 MITREid-Connect-mass-assignment(autobinding) githubcom/FB-Sec/Translation/blob/main/OAuth%E9%9A%90%E8%97%8F%E6%94%BB%E5%87%BB%E9%9D%A2%E5%88%86%E6%9E%90/OAuth%E9%9A%90%E8%97%8F%E6%94%BB%E5%87%BB%E9%9D%A2%E5%88%86%E6%9E%90md CVE-2021-26715 MITREid-Connect-SSRF githubcom/FB-Sec/Translation/blob/main/OAuth%E9

systeminformation

CVE-2021-21315 Exploit Des: My python Script to exploit system Information Library for NodeJS (npm package "systeminformation") npmjscom/systeminformation I thought this POC will not show real world impact, But it'll be cool in CTF's

CVE 2021-21315 PoC

CVE-2021-21315-systeminformation This is Proof of Concept for CVE-2021-21315 which affects The System Information Library for NodeJS (npm package "systeminformation") npmjscom/systeminformation "be sure to check or sanitize service parameters that are passed to siinetLatency(), siinetChecksite(), siservices(), siprocessLoad() do only allow strings, rej

Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)

Optimize Your Experience with Containers Make Your Containers Better, Smaller, More Secure and Do Less to Get There (free and open source!) Note that DockerSlim is now just Slim (SlimToolkit is the full name, so it's easier to find it online) to show its growing support for additional container tools and runtimes in the cloud native ecosystem Slim is now a CNCF Sandbox p

This repository is dedicated to implementing various vulnerabilities (or CVEs) as a CS547 course project CVE-2021-4034 CVE-2021-21315 MD5 Collisions with Chosen Prefix attacks

Scenario 1 - CVE-2021-21315

rust noob tried write easy exploit code with rust lang

the CVE-2021-21315's exploit code wrote with Rust lang I'm rust noob so this code was my part of RustLang practices Yes!!Let's Get the reverse shell!!!!!!!!!! [!]for education or researching only Build cargo build Usage /exploit <targetURL/path/of/api> <LHOST> <LPORT> /exploit h

minT(oolkit): Awesome, secure and production ready containers just the way you need them! Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)

Optimize Your Experience with Containers Make Your Containers Better, Smaller, More Secure and Do Less to Get There (free and open source!) Note that DockerSlim is now MinToolkit or just Mint (it was temparily called SlimToolkit, but that name was too similar to a commercial company name and using a different name was a CNCF requirement for the project) It's not limited

I will be learning and updating documentation consistently on Network Security and Database Vulnerabilities

30 days of Network security and Database vulnerabilities I will be learning Network security and Database vulnerabilities for 30 days and I will be updating daily about my progress and understanding Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day 7 Day 8 Day 9 Day 10 Day 11 Day 12 Day 13 Day 14 Day 15 Day 16 Day 17 Day 18 Day 19 Day 20 Day 21 Day 22 Day 23 Day 24 Day 25 Day 26 Day 27