{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:22:13.360","vulnerabilities":[{"cve":{"id":"CVE-2021-21386","sourceIdentifier":"security-advisories@github.com","published":"2021-03-24T21:15:15.177","lastModified":"2024-11-21T05:48:15.110","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"APKLeaks is an open-source project for scanning APK file for URIs, endpoints & secrets. APKLeaks prior to v2.0.3 allows remote attackers to execute arbitrary OS commands via package name inside application manifest. An attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified or could cause other unintended behavior through malicious package name. The problem is fixed in version v2.0.6-dev and above."},{"lang":"es","value":"APKLeaks es un proyecto de código abierto para escanear archivos APK en busca de unos URI, endpoints y secretos.&#xa0;APKLeaks anterior a versión v2.0.3, permite a atacantes remotos ejecutar comandos arbitrarios del sistema operativo por medio del nombre del paquete dentro del manifiesto de la aplicación.&#xa0;Un atacante podría incluir argumentos que permitan ejecutar comandos o códigos no deseados, permitir que sean leídos o modificados datos confidenciales o que puedan causar otros comportamientos no deseados mediante el nombre del paquete malicioso.&#xa0;El problema es corregido en versión v2.0.6-dev y superior"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"},{"lang":"en","value":"CWE-88"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apkleaks_project:apkleaks:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.3","matchCriteriaId":"AE92E1BE-181B-4541-96D1-24A70FE08833"}]}]}],"references":[{"url":"https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]}]}}]}