CVE-2021-42375
- EPSS 0.06%
- Veröffentlicht 15.11.2021 21:15:07
- Zuletzt bearbeitet 23.04.2025 20:15:33
An incorrect handling of a special element in Busybox's ash applet leads to denial of service when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters. This may be used for DoS under rare conditi...
CVE-2021-42376
- EPSS 0.05%
- Veröffentlicht 15.11.2021 21:15:07
- Zuletzt bearbeitet 21.11.2024 06:27:41
A NULL pointer dereference in Busybox's hush applet leads to denial of service when processing a crafted shell command, due to missing validation after a \x03 delimiter character. This may be used for DoS under very rare conditions of filtered comman...
CVE-2021-42377
- EPSS 1.86%
- Veröffentlicht 15.11.2021 21:15:07
- Zuletzt bearbeitet 21.11.2024 06:27:41
An attacker-controlled pointer free in Busybox's hush applet leads to denial of service and possible code execution when processing a crafted shell command, due to the shell mishandling the &&& string. This may be used for remote code execution under...
CVE-2021-43618
- EPSS 0.5%
- Veröffentlicht 15.11.2021 04:15:06
- Zuletzt bearbeitet 21.11.2024 06:29:31
GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
CVE-2021-43267
- EPSS 72.62%
- Veröffentlicht 02.11.2021 23:15:07
- Zuletzt bearbeitet 21.11.2024 06:28:57
An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO mes...
CVE-2017-5123
- EPSS 1.98%
- Veröffentlicht 02.11.2021 22:15:08
- Zuletzt bearbeitet 21.11.2024 03:27:06
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
CVE-2021-43057
- EPSS 0.16%
- Veröffentlicht 28.10.2021 04:15:08
- Zuletzt bearbeitet 21.11.2024 06:28:37
An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac...
CVE-2021-25219
- EPSS 0.71%
- Veröffentlicht 27.10.2021 21:15:07
- Zuletzt bearbeitet 21.11.2024 05:54:34
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken ...
CVE-2021-41182
- EPSS 19.26%
- Veröffentlicht 26.10.2021 15:15:10
- Zuletzt bearbeitet 21.11.2024 06:25:41
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any str...
CVE-2021-41183
- EPSS 2.87%
- Veröffentlicht 26.10.2021 15:15:10
- Zuletzt bearbeitet 21.11.2024 06:25:42
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The v...