Show filters
441 Total Results
Displaying 131-140 of 441
Sort by:
Attacker Value
Unknown

CVE-2021-28361

Disclosure Date: March 13, 2021 (last updated February 22, 2025)
An issue was discovered in Storage Performance Development Kit (SPDK) before 20.01.01. If a PDU is sent to the iSCSI target with a zero length (but data is expected), the iSCSI target can crash with a NULL pointer dereference.
Attacker Value
Unknown

CVE-2021-20231

Disclosure Date: March 12, 2021 (last updated February 22, 2025)
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
Attacker Value
Unknown

CVE-2021-22883

Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
Attacker Value
Unknown

CVE-2021-22884

Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
Attacker Value
Unknown

CVE-2020-4719

Disclosure Date: February 26, 2021 (last updated February 22, 2025)
The IBM Cloud APM 8.1.4 server will issue a DNS request to resolve any hostname specified in the Cloud Event Management Webhook URL configuration definition. This could enable an authenticated user with admin authorization to create DNS query strings that are not hostnames. IBM X-Force ID: 187861.
Attacker Value
Unknown

CVE-2020-4725

Disclosure Date: February 26, 2021 (last updated February 22, 2025)
IBM Monitoring (IBM Cloud APM 8.1.4 ) could allow an authenticated user to modify HTML content by sending a specially crafted HTTP request to the APM UI, which could mislead another user. IBM X-Force ID: 187974.
Attacker Value
Unknown

CVE-2020-4726

Disclosure Date: February 26, 2021 (last updated February 22, 2025)
The IBM Application Performance Monitoring UI (IBM Cloud APM 8.1.4) allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 187975.
Attacker Value
Unknown

CVE-2021-27218

Disclosure Date: February 15, 2021 (last updated February 22, 2025)
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
Attacker Value
Unknown

CVE-2021-27219

Disclosure Date: February 15, 2021 (last updated February 22, 2025)
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
Attacker Value
Unknown

SolarWinds Network Performance Monitor WriteToFile SQL Injection Privilege Esca…

Disclosure Date: February 12, 2021 (last updated February 22, 2025)
This vulnerability allows remote attackers to escalate privileges on affected installations of SolarWinds Network Performance Monitor 2020 HF1, NPM: 2020.2. Authentication is required to exploit this vulnerability. The specific flaw exists within the WriteToFile method. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to escalate privileges and reset the password for the Admin user. Was ZDI-CAN-11804.