Show filters
1,213 Total Results
Displaying 231-240 of 1,213
Sort by:
Attacker Value
Unknown
CVE-2021-4189
Disclosure Date: August 24, 2022 (last updated February 24, 2025)
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.
0
Attacker Value
Unknown
CVE-2022-2938
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.
0
Attacker Value
Unknown
CVE-2021-3997
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.
0
Attacker Value
Unknown
CVE-2021-3975
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.
0
Attacker Value
Unknown
CVE-2021-3905
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
0
Attacker Value
Unknown
CVE-2021-3839
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
A flaw was found in the vhost library in DPDK. Function vhost_user_set_inflight_fd() does not validate `msg->payload.inflight.num_queues`, possibly causing out-of-bounds memory read/write. Any software using DPDK vhost library may crash as a result of this vulnerability.
0
Attacker Value
Unknown
CVE-2021-31566
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
An improper link resolution flaw can occur while extracting an archive leading to changing modes, times, access control lists, and flags of a file outside of the archive. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to gain more privileges in a system.
0
Attacker Value
Unknown
CVE-2021-23177
Disclosure Date: August 23, 2022 (last updated February 24, 2025)
An improper link resolution flaw while extracting an archive can lead to changing the access control list (ACL) of the target of the link. An attacker may provide a malicious archive to a victim user, who would trigger this flaw when trying to extract the archive. A local attacker may use this flaw to change the ACL of a file on the system and gain more privileges.
0
Attacker Value
Unknown
CVE-2022-2873
Disclosure Date: August 22, 2022 (last updated February 24, 2025)
An out-of-bounds memory access flaw was found in the Linux kernel Intel’s iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.
0
Attacker Value
Unknown
CVE-2021-3659
Disclosure Date: August 22, 2022 (last updated February 24, 2025)
A NULL pointer dereference flaw was found in the Linux kernel’s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.
0