Show filters
336 Total Results
Displaying 171-180 of 336
Sort by:
Attacker Value
Unknown
CVE-2021-4184
Disclosure Date: December 30, 2021 (last updated February 23, 2025)
Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
0
Attacker Value
Unknown
CVE-2021-45257
Disclosure Date: December 22, 2021 (last updated February 23, 2025)
An infinite loop vulnerability exists in nasm 2.16rc0 via the gpaste_tokens function.
0
Attacker Value
Unknown
CVE-2021-44924
Disclosure Date: December 21, 2021 (last updated February 23, 2025)
An infinite loop vulnerability exists in gpac 1.1.0 in the gf_log function, which causes a Denial of Service.
0
Attacker Value
Unknown
CVE-2021-45297
Disclosure Date: December 21, 2021 (last updated February 23, 2025)
An infinite loop vulnerability exists in Gpac 1.0.1 in gf_get_bit_size.
0
Attacker Value
Unknown
CVE-2021-4044
Disclosure Date: December 14, 2021 (last updated February 23, 2025)
Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug …
0
Attacker Value
Unknown
CVE-2021-43545
Disclosure Date: December 08, 2021 (last updated February 23, 2025)
Using the Location API in a loop could have caused severe application hangs and crashes. This vulnerability affects Thunderbird < 91.4.0, Firefox ESR < 91.4.0, and Firefox < 95.
0
Attacker Value
Unknown
CVE-2021-20041
Disclosure Date: December 08, 2021 (last updated February 23, 2025)
An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.
0
Attacker Value
Unknown
CVE-2021-39923
Disclosure Date: November 19, 2021 (last updated February 23, 2025)
Large loop in the PNRP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
0
Attacker Value
Unknown
CVE-2021-39924
Disclosure Date: November 19, 2021 (last updated February 23, 2025)
Large loop in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
0
Attacker Value
Unknown
CVE-2021-43172
Disclosure Date: November 09, 2021 (last updated February 23, 2025)
NLnet Labs Routinator prior to 0.10.2 happily processes a chain of RRDP repositories of infinite length causing it to never finish a validation run. In RPKI, a CA can choose the RRDP repository it wishes to publish its data in. By continuously generating a new child CA that only consists of another CA using a different RRDP repository, a malicious CA can create a chain of CAs of de-facto infinite length. Routinator prior to version 0.10.2 did not contain a limit on the length of such a chain and will therefore continue to process this chain forever. As a result, the validation run will never finish, leading to Routinator continuing to serve the old data set or, if in the initial validation run directly after starting, never serve any data at all.
0