CVE-2021-38481
- EPSS 0.24%
- Veröffentlicht 22.10.2021 12:15:09
- Zuletzt bearbeitet 21.11.2024 06:17:12
The scheduler service running on a specific TCP port enables the user to start and stop jobs. There is no sanitation of the supplied JOB ID provided to the function. An attacker may send a malicious payload that can enable the user to execute another...
CVE-2021-38465
- EPSS 0.3%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:10
The webinstaller is a Golang web server executable that enables the generation of an Auvesy image agent. Resource consumption can be achieved by generating large amounts of installations, which are then saved without limitation in the temp folder of ...
CVE-2021-38479
- EPSS 0.17%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:12
Many API function codes receive raw pointers remotely from the user and trust these pointers as valid in-bound memory regions. An attacker can manipulate API functions by writing arbitrary data into the resolved address of a raw pointer.
CVE-2021-38477
- EPSS 0.21%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:11
There are multiple API function codes that permit reading and writing data to or from files and directories, which could lead to the manipulation and/or the deletion of files.
- EPSS 0.11%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:11
The database connection to the server is performed by calling a specific API, which could allow an unprivileged user to gain SYSDBA permissions.
CVE-2021-38473
- EPSS 0.32%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:11
The affected product’s code base doesn’t properly control arguments for specific functions, which could lead to a stack overflow.
CVE-2021-38471
- EPSS 0.22%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:11
There are multiple API function codes that permit data writing to any file, which may allow an attacker to modify existing files or create new files.
CVE-2021-38469
- EPSS 0.13%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:10
Many of the services used by the affected product do not specify full paths for the DLLs they are loading. An attacker can exploit the uncontrolled search path by implanting their own DLL near the affected product’s binaries, thus hijacking the loade...
CVE-2021-38467
- EPSS 0.16%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:10
A specific function code receives a raw pointer supplied by the user and deallocates this pointer. The user can then control what memory regions will be freed and cause use-after-free condition.
CVE-2021-38449
- EPSS 0.27%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:07
Some API functions permit by-design writing or copying data into a given buffer. Since the client controls these parameters, an attacker could rewrite the memory in any location of the affected product.