CVE-2021-32804
- EPSS 85.52%
- Veröffentlicht 03.08.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:07:46
The npm package "tar" (aka node-tar) before versions 6.1.1, 5.0.6, 4.4.14, and 3.3.2 has a arbitrary File Creation/Overwrite vulnerability due to insufficient absolute path sanitization. node-tar aims to prevent extraction of absolute file paths by t...
CVE-2021-32803
- EPSS 0.18%
- Veröffentlicht 03.08.2021 19:15:08
- Zuletzt bearbeitet 21.11.2024 06:07:46
The npm package "tar" (aka node-tar) before versions 6.1.2, 5.0.7, 4.4.15, and 3.2.3 has an arbitrary File Creation/Overwrite vulnerability via insufficient symlink protection. `node-tar` aims to guarantee that any file whose location would be modifi...
CVE-2021-22921
- EPSS 0.28%
- Veröffentlicht 12.07.2021 11:15:08
- Zuletzt bearbeitet 21.11.2024 05:50:55
Node.js before 16.4.1, 14.17.2, and 12.22.2 is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker t...
CVE-2021-22918
- EPSS 0.72%
- Veröffentlicht 12.07.2021 11:15:07
- Zuletzt bearbeitet 21.11.2024 05:50:54
Node.js before 16.4.1, 14.17.2, 12.22.2 is vulnerable to an out-of-bounds read when uv__idna_toascii() is used to convert strings to ASCII. The pointer p is read and increased without checking whether it is beyond pe, with the latter holding a pointe...
CVE-2021-20093
- EPSS 8.53%
- Veröffentlicht 16.06.2021 12:15:12
- Zuletzt bearbeitet 21.11.2024 05:45:54
A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.
CVE-2021-22901
- EPSS 0.34%
- Veröffentlicht 11.06.2021 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:50:52
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentia...
CVE-2021-22898
- EPSS 0.13%
- Veröffentlicht 11.06.2021 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:50:52
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NE...
CVE-2021-22897
- EPSS 1.08%
- Veröffentlicht 11.06.2021 16:15:10
- Zuletzt bearbeitet 21.11.2024 05:50:51
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" ...
CVE-2021-25216
- EPSS 20.5%
- Veröffentlicht 29.04.2021 01:15:08
- Zuletzt bearbeitet 21.11.2024 05:54:33
In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are v...
CVE-2021-25215
- EPSS 1.77%
- Veröffentlicht 29.04.2021 01:15:08
- Zuletzt bearbeitet 21.11.2024 05:54:33
In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable ...