Show filters
561 Total Results
Displaying 181-190 of 561
Sort by:
Attacker Value
Unknown
CVE-2021-3635
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands.
0
Attacker Value
Unknown
CVE-2021-36740
Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
0
Attacker Value
Unknown
CVE-2021-3570
Disclosure Date: July 09, 2021 (last updated February 23, 2025)
A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.
0
Attacker Value
Unknown
CVE-2021-3516
Disclosure Date: June 01, 2021 (last updated February 22, 2025)
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2021-20239
Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2020-25710
Disclosure Date: May 28, 2021 (last updated February 22, 2025)
A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-20292
Disclosure Date: May 28, 2021 (last updated February 22, 2025)
There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.
0
Attacker Value
Unknown
CVE-2020-26555
Disclosure Date: May 24, 2021 (last updated February 22, 2025)
Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
0
Attacker Value
Unknown
CVE-2020-27769
Disclosure Date: May 14, 2021 (last updated February 22, 2025)
In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type 'float' at MagickCore/quantize.c.
0
Attacker Value
Unknown
CVE-2021-3504
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.
0