Show filters
15 Total Results
Displaying 1-10 of 15
Sort by:
Attacker Value
Very High
CVE-2021-3156 "Baron Samedit"
Disclosure Date: January 26, 2021 (last updated January 15, 2025)
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
13
Attacker Value
Unknown
CVE-2021-25215
Disclosure Date: April 28, 2021 (last updated November 08, 2023)
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.
1
Attacker Value
Unknown
CVE-2021-30640
Disclosure Date: July 12, 2021 (last updated November 28, 2024)
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
0
Attacker Value
Unknown
CVE-2021-20265
Disclosure Date: March 10, 2021 (last updated November 28, 2024)
A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
0
Attacker Value
Unknown
CVE-2021-27365
Disclosure Date: March 07, 2021 (last updated November 28, 2024)
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
0
Attacker Value
Unknown
CVE-2021-27364
Disclosure Date: March 07, 2021 (last updated November 28, 2024)
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
0
Attacker Value
Unknown
CVE-2020-29661
Disclosure Date: December 09, 2020 (last updated November 08, 2023)
A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
0
Attacker Value
Unknown
CVE-2020-12723
Disclosure Date: June 05, 2020 (last updated November 08, 2023)
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
0
Attacker Value
Unknown
CVE-2020-10878
Disclosure Date: June 05, 2020 (last updated November 08, 2023)
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
0
Attacker Value
Unknown
CVE-2020-10543
Disclosure Date: June 05, 2020 (last updated November 08, 2023)
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
0