Show filters
179 Total Results
Displaying 31-40 of 179
Sort by:
Attacker Value
Unknown
CVE-2021-35492
Disclosure Date: October 05, 2021 (last updated February 23, 2025)
Wowza Streaming Engine through 4.8.11+5 could allow an authenticated, remote attacker to exhaust filesystem resources via the /enginemanager/server/vhost/historical.jsdata vhost parameter. This is due to the insufficient management of available filesystem resources. An attacker could exploit this vulnerability through the Virtual Host Monitoring section by requesting random virtual-host historical data and exhausting available filesystem resources. A successful exploit could allow the attacker to cause database errors and cause the device to become unresponsive to web-based management. (Manual intervention is required to free filesystem resources and return the application to an operational state.)
0
Attacker Value
Unknown
CVE-2021-32675
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). An attacker delivering specially crafted requests over multiple connections can cause the server to allocate significant amount of memory. Because the same parsing mechanism is used to handle authentication requests, this vulnerability can also be exploited by unauthenticated users. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways: Using network access control tools like firewalls, iptables, security groups, etc. or Enabling TLS and requiring users to authenticate usi…
0
Attacker Value
Unknown
CVE-2021-41591
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
ACINQ Eclair before 0.6.3 allows loss of funds because of dust HTLC exposure.
0
Attacker Value
Unknown
CVE-2021-41593
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure.
0
Attacker Value
Unknown
CVE-2021-41592
Disclosure Date: October 04, 2021 (last updated February 23, 2025)
Blockstream c-lightning through 0.10.1 allows loss of funds because of dust HTLC exposure.
0
Attacker Value
Unknown
CVE-2021-34415
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
The Zone Controller service in the Zoom On-Premise Meeting Connector Controller before version 4.6.358.20210205 does not verify the cnt field sent in incoming network packets, which leads to exhaustion of resources and system crash.
0
Attacker Value
Unknown
CVE-2021-0422
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.
0
Attacker Value
Unknown
CVE-2021-29763
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 under very specific conditions, could allow a local user to keep running a procedure that could cause the system to run out of memory.and cause a denial of service. IBM X-Force ID: 202267.
0
Attacker Value
Unknown
CVE-2021-23053
Disclosure Date: September 14, 2021 (last updated February 23, 2025)
On version 15.1.x before 15.1.3, 14.1.x before 14.1.3.1, and 13.1.x before 13.1.3.6, when the brute force protection feature of BIG-IP Advanced WAF or BIG-IP ASM is enabled on a virtual server and the virtual server is under brute force attack, the MySQL database may run out of disk space due to lack of row limit on undisclosed tables in the MYSQL database. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2021-33011
Disclosure Date: September 10, 2021 (last updated February 23, 2025)
All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus Series,TOYOPUC-PC3J/PC2J Series, TOYOPUC-Nano Series products may not be able to properly process an ICMP flood, which may allow an attacker to deny Ethernet communications between affected devices.
0