Show filters
1,326 Total Results
Displaying 261-270 of 1,326
Sort by:
Attacker Value
Unknown
CVE-2021-38967
Disclosure Date: November 29, 2021 (last updated February 23, 2025)
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local privileged user to inject and execute malicious code. IBM X-Force ID: 212441.
0
Attacker Value
Unknown
CVE-2021-38958
Disclosure Date: November 29, 2021 (last updated October 07, 2023)
IBM MQ Appliance 9.2 CD and 9.2 LTS is affected by a denial of service attack caused by a concurrency issue. IBM X-Force ID: 212042
0
Attacker Value
Unknown
CVE-2021-39000
Disclosure Date: November 29, 2021 (last updated February 23, 2025)
IBM MQ Appliance 9.2 CD and 9.2 LTS could allow a local attacker to obtain sensitive information by inclusion of sensitive data within diagnostics. IBM X-Force ID: 213215.
0
Attacker Value
Unknown
CVE-2021-38999
Disclosure Date: November 29, 2021 (last updated February 23, 2025)
IBM MQ Appliance could allow a local attacker to obtain sensitive information by inclusion of sensitive data within trace.
0
Attacker Value
Unknown
CVE-2021-36317
Disclosure Date: November 09, 2021 (last updated February 23, 2025)
Dell EMC Avamar Server version 19.4 contains a plain-text password storage vulnerability in AvInstaller. A local attacker could potentially exploit this vulnerability, leading to the disclosure of certain user credentials. The attacker may be able to use the exposed credentials to access the vulnerable application with privileges of the compromised account.
0
Attacker Value
Unknown
CVE-2021-29843
Disclosure Date: November 05, 2021 (last updated November 28, 2024)
IBM MQ 9.1 LTS, 9.1 CD, 9.2 LTS, and 9.2CD is vulnerable to a denial of service attack caused by an issue processing message properties. IBM X-Force ID: 205203.
0
Attacker Value
Unknown
CVE-2021-25219
Disclosure Date: October 27, 2021 (last updated November 08, 2023)
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.
0
Attacker Value
Unknown
CVE-2021-1573
Disclosure Date: October 27, 2021 (last updated February 23, 2025)
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
0
Attacker Value
Unknown
CVE-2021-34704
Disclosure Date: October 27, 2021 (last updated February 23, 2025)
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
0
Attacker Value
Unknown
CVE-2021-34792
Disclosure Date: October 27, 2021 (last updated February 23, 2025)
A vulnerability in the memory management of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper resource management when connection rates are high. An attacker could exploit this vulnerability by opening a significant number of connections on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
0