Show filters
1,191 Total Results
Displaying 241-250 of 1,191
Sort by:
Attacker Value
Unknown
CVE-2021-29369
Disclosure Date: May 03, 2021 (last updated February 22, 2025)
The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
0
Attacker Value
Unknown
CVE-2021-20294
Disclosure Date: April 29, 2021 (last updated February 22, 2025)
A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow, out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2021-31879
Disclosure Date: April 29, 2021 (last updated February 22, 2025)
GNU Wget through 1.21.1 does not omit the Authorization header upon a redirect to a different origin, a related issue to CVE-2018-1000007.
0
Attacker Value
Unknown
CVE-2021-30184
Disclosure Date: April 07, 2021 (last updated February 22, 2025)
GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
0
Attacker Value
Unknown
CVE-2021-20193
Disclosure Date: March 26, 2021 (last updated February 22, 2025)
A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-20284
Disclosure Date: March 26, 2021 (last updated February 22, 2025)
A flaw was found in GNU Binutils 2.35.1, where there is a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c due to the number of symbols not calculated correctly. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-20197
Disclosure Date: March 26, 2021 (last updated February 22, 2025)
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
0
Attacker Value
Unknown
CVE-2021-3466
Disclosure Date: March 25, 2021 (last updated February 22, 2025)
A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable.
0
Attacker Value
Unknown
CVE-2021-28968
Disclosure Date: March 22, 2021 (last updated February 22, 2025)
An issue was discovered in PunBB before 1.4.6. An XSS vulnerability in the [email] BBcode tag allows (with authentication) injecting arbitrary JavaScript into any forum message.
0
Attacker Value
Unknown
CVE-2021-27851
Disclosure Date: March 18, 2021 (last updated February 22, 2025)
A security vulnerability that can lead to local privilege escalation has been found in ’guix-daemon’. It affects multi-user setups in which ’guix-daemon’ runs locally. The attack consists in having an unprivileged user spawn a build process, for instance with `guix build`, that makes its build directory world-writable. The user then creates a hardlink to a root-owned file such as /etc/shadow in that build directory. If the user passed the --keep-failed option and the build eventually fails, the daemon changes ownership of the whole build tree, including the hardlink, to the user. At that point, the user has write access to the target file. Versions after and including v0.11.0-3298-g2608e40988, and versions prior to v1.2.0-75109-g94f0312546 are vulnerable.
0