Show filters
724 Total Results
Displaying 31-40 of 724
Sort by:
Attacker Value
Unknown

CVE-2021-28714

Disclosure Date: January 06, 2022 (last updated February 23, 2025)
Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)
Attacker Value
Unknown

CVE-2021-44591

Disclosure Date: January 06, 2022 (last updated February 23, 2025)
In libming 0.4.8, the parseSWF_DEFINELOSSLESS2 function in util/parser.c lacks a boundary check that would lead to denial-of-service attacks via a crafted SWF file.
Attacker Value
Unknown

CVE-2021-44590

Disclosure Date: January 06, 2022 (last updated February 23, 2025)
In libming 0.4.8, a memory exhaustion vulnerability exist in the function cws2fws in util/main.c. Remote attackers could launch denial of service attacks by submitting a crafted SWF file that exploits this vulnerability.
Attacker Value
Unknown

CVE-2021-45456

Disclosure Date: January 06, 2022 (last updated February 23, 2025)
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.
Attacker Value
Unknown

CVE-2022-20023

Disclosure Date: January 04, 2022 (last updated February 23, 2025)
In Bluetooth, there is a possible application crash due to bluetooth flooding a device with LMP_AU_rand packet. This could lead to remote denial of service of bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198608; Issue ID: ALPS06198608.
Attacker Value
Unknown

CVE-2021-43711

Disclosure Date: January 04, 2022 (last updated February 23, 2025)
The downloadFlile.cgi binary file in TOTOLINK EX200 V4.0.3c.7646_B20201211 has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution.
Attacker Value
Unknown

CVE-2021-38542

Disclosure Date: January 04, 2022 (last updated February 23, 2025)
Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.
Attacker Value
Unknown

CVE-2021-37111

Disclosure Date: January 03, 2022 (last updated February 23, 2025)
There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion.
Attacker Value
Unknown

CVE-2021-20167

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Netgear RAX43 version 1.0.3.96 contains a command injection vulnerability. The readycloud cgi application is vulnerable to command injection in the name parameter.
Attacker Value
Unknown

CVE-2021-23727

Disclosure Date: December 29, 2021 (last updated February 23, 2025)
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.