Show filters
138 Total Results
Displaying 21-30 of 138
Sort by:
Attacker Value
Unknown

CVE-2022-0711

Disclosure Date: March 02, 2022 (last updated October 07, 2023)
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.
Attacker Value
Unknown

CVE-2021-41819

Disclosure Date: January 01, 2022 (last updated October 07, 2023)
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
Attacker Value
Unknown

CVE-2021-41817

Disclosure Date: January 01, 2022 (last updated October 07, 2023)
Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
Attacker Value
Unknown

CVE-2021-32672

Disclosure Date: October 04, 2021 (last updated November 08, 2023)
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
Attacker Value
Unknown

CVE-2021-32027

Disclosure Date: June 01, 2021 (last updated November 08, 2023)
A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Attacker Value
Unknown

CVE-2021-3426

Disclosure Date: May 20, 2021 (last updated November 08, 2023)
There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.
Attacker Value
Unknown

CVE-2021-3393

Disclosure Date: April 01, 2021 (last updated November 28, 2024)
An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
Attacker Value
Unknown

CVE-2021-20270

Disclosure Date: March 23, 2021 (last updated November 28, 2024)
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
Attacker Value
Unknown

CVE-2019-10196

Disclosure Date: March 19, 2021 (last updated November 28, 2024)
A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
Attacker Value
Unknown

CVE-2021-20229

Disclosure Date: February 23, 2021 (last updated November 28, 2024)
A flaw was found in PostgreSQL in versions before 13.2. This flaw allows a user with SELECT privilege on one column to craft a special query that returns all columns of the table. The highest threat from this vulnerability is to confidentiality.