OS Command Injection in celery affects versions prior to 5.2.2 by deserializing metadata from the result store, allowing stored command injection leading to system acces
Reporter | Title | Published | Views | Family All 23 |
---|---|---|---|---|
RedhatCVE | CVE-2021-23727 | 5 Jan 202220:54 | – | redhatcve |
NVD | CVE-2021-23727 | 29 Dec 202117:15 | – | nvd |
OpenVAS | Fedora: Security Advisory for python-celery (FEDORA-2022-1dae017601) | 16 Jan 202200:00 | – | openvas |
OpenVAS | Mageia: Security Advisory (MGASA-2022-0029) | 28 Jan 202200:00 | – | openvas |
OpenVAS | Fedora: Security Advisory for python-kombu (FEDORA-2022-1dae017601) | 16 Jan 202200:00 | – | openvas |
OSV | CVE-2021-23727 | 29 Dec 202117:15 | – | osv |
OSV | PYSEC-2021-858 | 29 Dec 202117:15 | – | osv |
Veracode | Stored Command Injection | 30 Dec 202102:50 | – | veracode |
Prion | Command injection | 29 Dec 202117:15 | – | prion |
FreeBSD | py39-celery -- command injection vulnerability | 9 Dec 202100:00 | – | freebsd |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo