CVE-2021-38463
- EPSS 0.21%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:09
The affected product does not properly control the allocation of resources. A user may be able to allocate unlimited memory buffers using API functions.
CVE-2021-38461
- EPSS 0.08%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:09
The affected product uses a hard-coded blowfish key for encryption/decryption processes. The key can be easily extracted from binaries.
CVE-2021-38459
- EPSS 0.22%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:09
The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the S...
CVE-2021-38457
- EPSS 0.27%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:08
The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.
CVE-2021-38455
- EPSS 0.2%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:08
The affected product’s OS Service does not verify any given parameter. A user can supply any type of parameter that will be passed to inner calls without checking the type of the parameter or the value.
CVE-2021-38453
- EPSS 0.25%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:08
Some API functions allow interaction with the registry, which includes reading values as well as data modification.
CVE-2021-38451
- EPSS 0.17%
- Veröffentlicht 22.10.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:17:07
The affected product’s proprietary protocol CSC allows for calling numerous function codes. In order to call those function codes, the user must supply parameters. There is no sanitation on the value of the offset, which allows the client to specify ...