CVE-2021-45105
- EPSS 65.66%
- Veröffentlicht 18.12.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:31:58
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service wh...
CVE-2021-42550
- EPSS 4.29%
- Veröffentlicht 16.12.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:27:47
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
- EPSS 94.36%
- Veröffentlicht 10.12.2021 10:15:09
- Zuletzt bearbeitet 08.08.2025 18:52:00
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An atta...
CVE-2021-27002
- EPSS 0.75%
- Veröffentlicht 11.10.2021 17:15:07
- Zuletzt bearbeitet 21.11.2024 05:57:10
NetApp Cloud Manager versions prior to 3.9.10 are susceptible to a vulnerability which could allow a remote unauthenticated attacker to retrieve sensitive data via the web proxy.
CVE-2021-26999
- EPSS 0.23%
- Veröffentlicht 06.08.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 05:57:10
NetApp Cloud Manager versions prior to 3.9.9 log sensitive information when an Active Directory connection fails. The logged information is available only to authenticated users. Customers with auto-upgrade enabled should already be on a fixed versio...
CVE-2021-26998
- EPSS 0.23%
- Veröffentlicht 06.08.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 05:57:10
NetApp Cloud Manager versions prior to 3.9.9 log sensitive information that is available only to authenticated users. Customers with auto-upgrade enabled should already be on a fixed version while customers using on-prem connectors with auto-upgrade ...
CVE-2021-31807
- EPSS 44.29%
- Veröffentlicht 08.06.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 06:06:15
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. An integer overflow problem allows a remote server to achieve Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header that can be expected to...
CVE-2021-31808
- EPSS 0.46%
- Veröffentlicht 27.05.2021 14:15:07
- Zuletzt bearbeitet 21.11.2024 06:06:16
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to an input-validation bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy). A client sends an HTTP Range request to trigger this.
CVE-2021-31806
- EPSS 85.78%
- Veröffentlicht 27.05.2021 13:15:08
- Zuletzt bearbeitet 21.11.2024 06:06:15
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a memory-management bug, it is vulnerable to a Denial of Service attack (against all clients using the proxy) via HTTP Range request processing.
CVE-2021-28651
- EPSS 6.32%
- Veröffentlicht 27.05.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:00:01
An issue was discovered in Squid before 4.15 and 5.x before 5.0.6. Due to a buffer-management bug, it allows a denial of service. When resolving a request with the urn: scheme, the parser leaks a small amount of memory. However, there is an unspecifi...