cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
An issue was discovered in Prosody before 0.11.9. It does not use a constant-time algorithm for comparing certain secret strings when running under Lua 5.2 or later. This can potentially be used in a timing attack to reveal the contents of secret strings to an attacker.
Source: MITRE
Max CVSS
5.9
EPSS Score
0.51%
Published
2021-05-13
Updated
2022-05-16
Prosody before 0.11.9 allows Uncontrolled CPU Consumption via a flood of SSL/TLS renegotiation requests.
Source: MITRE
Max CVSS
7.8
EPSS Score
0.74%
Published
2021-05-13
Updated
2022-07-12
An issue was discovered in Prosody before 0.11.9. The undocumented dialback_without_dialback option in mod_dialback enables an experimental feature for server-to-server authentication. It does not correctly authenticate remote server certificates, allowing a remote server to impersonate another server (when this option is enabled).
Source: MITRE
Max CVSS
7.5
EPSS Score
0.27%
Published
2021-05-13
Updated
2021-05-26
An issue was discovered in Prosody before 0.11.9. Default settings are susceptible to remote unauthenticated denial-of-service (DoS) attacks via memory exhaustion when running under Lua 5.2 or Lua 5.3.
Source: MITRE
Max CVSS
7.5
EPSS Score
1.34%
Published
2021-05-13
Updated
2021-05-26
An issue was discovered in Prosody before 0.11.9. The proxy65 component allows open access by default, even if neither of the users has an XMPP account on the local server, allowing unrestricted use of the server's bandwidth.
Source: MITRE
Max CVSS
5.3
EPSS Score
0.71%
Published
2021-05-13
Updated
2021-06-17
In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
Source: MITRE
Max CVSS
7.8
EPSS Score
0.05%
Published
2021-05-11
Updated
2024-03-25
kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a. The specific concern is not protecting the BPF stack area against speculative loads. Also, the BPF stack can contain uninitialized data that might represent sensitive information previously operated on by the kernel.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2021-05-06
Updated
2022-01-01
Multiple path traversal vulnerabilities exist in smbserver.py in Impacket through 0.9.22. An attacker that connects to a running smbserver instance can list and write to arbitrary files via ../ directory traversal. This could potentially be abused to achieve arbitrary code execution by replacing /etc/shadow or an SSH authorized key.
Source: MITRE
Max CVSS
9.8
EPSS Score
1.41%
Published
2021-05-05
Updated
2021-05-26
.NET and Visual Studio Elevation of Privilege Vulnerability
Source: Microsoft Corporation
Max CVSS
7.8
EPSS Score
0.16%
Published
2021-05-11
Updated
2023-12-29
In the standard library in Rust before 1.52.0, a double free can occur in the Vec::from_iter function if freeing the element panics.
Source: MITRE
Max CVSS
9.8
EPSS Score
1.69%
Published
2021-04-14
Updated
2022-11-03
GNU Chess 6.2.7 allows attackers to execute arbitrary code via crafted PGN (Portable Game Notation) data. This is related to a buffer overflow in the use of a .tmp.epd temporary file in the cmd_pgnload and cmd_pgnreplay functions in frontend/cmd.cc.
Source: MITRE
Max CVSS
7.8
EPSS Score
0.32%
Published
2021-04-07
Updated
2022-05-16
An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.04%
Published
2021-04-07
Updated
2021-06-04
An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2021-03-30
Updated
2022-05-16
An issue was discovered in the Linux kernel before 5.11.11. The user mode driver (UMD) has a copy_process() memory leak, related to a lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c, aka CID-f60a85cad677.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2021-03-30
Updated
2021-04-05
An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or check_btf_info in kernel/bpf/verifier.c), aka CID-350a5c4dd245.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2021-03-30
Updated
2021-04-05
An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2021-03-30
Updated
2022-07-12
An issue was discovered in the Linux kernel before 5.11.11. tipc_nl_retrieve_key in net/tipc/node.c does not properly validate certain data sizes, aka CID-0217ed2848e8.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2021-03-30
Updated
2021-04-05
The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.35%
Published
2021-04-06
Updated
2021-06-08
models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.13%
Published
2021-04-01
Updated
2022-12-03
An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2021-04-20
Updated
2024-03-25
In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination, aka CID-cc7a0bb058b8.
Source: MITRE
Max CVSS
7.2
EPSS Score
0.05%
Published
2021-03-22
Updated
2023-10-05
In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2021-03-22
Updated
2022-07-12
A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.
Source: MITRE
Max CVSS
4.7
EPSS Score
0.05%
Published
2021-03-22
Updated
2022-06-30
An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)
Source: MITRE
Max CVSS
7.8
EPSS Score
0.05%
Published
2021-03-20
Updated
2022-05-12
An issue was discovered in fs/io_uring.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (deadlock) because exit may be waiting to park a SQPOLL thread, but concurrently that SQPOLL thread is waiting for a signal to start, aka CID-3ebba796fa25.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2021-03-20
Updated
2022-05-12
972 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!