Show filters
181 Total Results
Displaying 21-30 of 181
Sort by:
Attacker Value
Unknown

CVE-2021-22564

Disclosure Date: October 14, 2021 (last updated February 23, 2025)
For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775
Attacker Value
Unknown

CVE-2021-31384

Disclosure Date: October 13, 2021 (last updated February 23, 2025)
Due to a Missing Authorization weakness and Insufficient Granularity of Access Control in a specific device configuration, a vulnerability exists in Juniper Networks Junos OS on SRX Series whereby an attacker who attempts to access J-Web administrative interfaces can successfully do so from any device interface regardless of the web-management configuration and filter rules which may otherwise protect access to J-Web. This issue affects: Juniper Networks Junos OS SRX Series 20.4 version 20.4R1 and later versions prior to 20.4R2-S1, 20.4R3; 21.1 versions prior to 21.1R1-S1, 21.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1.
Attacker Value
Unknown

CVE-2021-33023

Disclosure Date: October 12, 2021 (last updated February 23, 2025)
Advantech WebAccess versions 9.02 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute code.
Attacker Value
Unknown

CVE-2021-21940

Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A heap-based buffer overflow vulnerability exists in the pushMuxer processRtspInfo functionality of Anker Eufy Homebase 2 2.1.6.9h. A specially-crafted network packet can lead to a heap buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
Attacker Value
Unknown

CVE-2021-37199

Disclosure Date: October 12, 2021 (last updated February 23, 2025)
A vulnerability has been identified in SINUMERIK 808D (All versions), SINUMERIK 828D (All versions < V4.95). Affected devices don't process correctly certain special crafted packets sent to port 102/tcp, which could allow an attacker to cause a denial-of-service in the device.
Attacker Value
Unknown

CVE-2021-25475

Disclosure Date: October 06, 2021 (last updated February 23, 2025)
A possible heap-based buffer overflow vulnerability in DSP kernel driver prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution.
Attacker Value
Unknown

CVE-2021-25479

Disclosure Date: October 06, 2021 (last updated February 23, 2025)
A possible heap-based buffer overflow vulnerability in Exynos CP Chipset prior to SMR Oct-2021 Release 1 allows arbitrary memory write and code execution.
Attacker Value
Unknown

CVE-2021-25495

Disclosure Date: October 06, 2021 (last updated February 23, 2025)
A possible heap buffer overflow vulnerability in libSPenBase library of Samsung Notes prior to Samsung Note version 4.3.02.61 allows arbitrary code execution.
Attacker Value
Unknown

CVE-2021-31986

Disclosure Date: October 05, 2021 (last updated February 23, 2025)
User controlled parameters related to SMTP notifications are not correctly validated. This can lead to a buffer overflow resulting in crashes and data leakage.
Attacker Value
Unknown

CVE-2021-32626

Disclosure Date: October 04, 2021 (last updated February 23, 2025)
Redis is an open source, in-memory database that persists on disk. In affected versions specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result with heap corruption and potentially remote code execution. This problem exists in all versions of Redis with Lua scripting support, starting from 2.6. The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14. For users unable to update an additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.