9.8
CVSSv3

CVE-2021-29921

Published: 06/05/2021 Updated: 03/05/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Python prior to 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) allows malicious users to bypass access control that is based on IP addresses.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

python python

oracle zfs storage appliance kit 8.8

oracle graalvm 20.3.2

oracle graalvm 21.1.0

oracle communications cloud native core automated test suite 1.8.0

oracle communications cloud native core network slice selection function 1.8.0

oracle communications cloud native core binding support function 1.11.0

Vendor Advisories

Debian Bug report logs - #989195 CVE-2021-29921 Package: python39; Maintainer for python39 is Matthias Klose <doko@debianorg>; Source for python39 is src:python39 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 28 May 2021 07:45:02 UTC Severity: important Tags: fixed-upstream, ...
The CryptProtectMemory function in cngsys (aka the Cryptography Next Generation driver) in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 81, Windows Server 2012 Gold and R2, and Windows RT Gold and 81, when the CRYPTPROTECTMEMORY_SAME_LOGON o ...
No description is available for this CVE ...
A security issue was found in Python before version 395 The ipaddress module accepted leading zeros in IPv4 addresses, which are ambiguous and interpreted as octal notation by some libraries ...

Github Repositories

This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices

hackebds 🔗中文readme foreword In the process of penetration and vulnerability mining of embedded devices, many problems have been encountered One is that some devices do not have telnetd or ssh services to obtain an interactive shell,Some devices are protected by firewall and cannot be connected to it in the forward direction Reverse_shell is required, and the other