Starwindsoftware

Starwind Virtual San

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Exploit
  • EPSS 84.05%
  • Veröffentlicht 28.01.2022 20:15:12
  • Zuletzt bearbeitet 06.11.2025 14:50:26

A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pk...

  • EPSS 5.24%
  • Veröffentlicht 08.12.2021 22:15:09
  • Zuletzt bearbeitet 21.11.2024 06:29:21

NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \...

Exploit
  • EPSS 25.54%
  • Veröffentlicht 01.11.2021 04:15:07
  • Zuletzt bearbeitet 21.11.2024 06:27:50

An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used to craft source code that renders different logic than the logic...

  • EPSS 0.04%
  • Veröffentlicht 20.10.2021 07:15:09
  • Zuletzt bearbeitet 21.11.2024 06:28:04

The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.

  • EPSS 0.37%
  • Veröffentlicht 26.09.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 06:26:32

sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsC...

  • EPSS 0.72%
  • Veröffentlicht 23.08.2021 05:15:08
  • Zuletzt bearbeitet 21.11.2024 06:15:52

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.

  • EPSS 0.07%
  • Veröffentlicht 07.06.2021 12:15:08
  • Zuletzt bearbeitet 21.11.2024 05:29:22

An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.

  • EPSS 0.03%
  • Veröffentlicht 14.04.2021 06:15:12
  • Zuletzt bearbeitet 21.11.2024 05:29:16

An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulne...

  • EPSS 0.15%
  • Veröffentlicht 26.03.2021 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:46:15

A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corrupti...

  • EPSS 0.12%
  • Veröffentlicht 19.01.2021 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:03:12

SDL (Simple DirectMedia Layer) through 2.0.12 has an Integer Overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP file.