CVE-2021-25214
- EPSS 0.71%
- Published 29.04.2021 01:15:07
- Last modified 21.11.2024 05:54:33
In BIND 9.8.5 -> 9.8.8, 9.9.3 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND 9 Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, ...
CVE-2021-22890
- EPSS 0.13%
- Published 01.04.2021 18:15:12
- Last modified 09.06.2025 15:15:24
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving fro...
CVE-2021-22876
- EPSS 0.06%
- Published 01.04.2021 18:15:12
- Last modified 09.06.2025 15:15:23
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically...
CVE-2021-3449
- EPSS 13.18%
- Published 25.03.2021 15:15:13
- Last modified 21.11.2024 06:21:33
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but incl...
CVE-2021-23362
- EPSS 0.55%
- Published 23.03.2021 17:15:14
- Last modified 21.11.2024 05:51:34
The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time comp...
CVE-2021-27290
- EPSS 2.67%
- Published 12.03.2021 22:15:14
- Last modified 21.11.2024 05:57:45
ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using...
CVE-2021-22884
- EPSS 0.27%
- Published 03.03.2021 18:15:14
- Last modified 21.11.2024 05:50:50
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over ne...
CVE-2021-22883
- EPSS 87.36%
- Published 03.03.2021 18:15:14
- Last modified 21.11.2024 05:50:49
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is con...
CVE-2020-8625
- EPSS 1.8%
- Published 17.02.2021 23:15:13
- Last modified 21.11.2024 05:39:09
BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by...
CVE-2020-8287
- EPSS 11.16%
- Published 06.01.2021 21:15:14
- Last modified 21.11.2024 05:38:39
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This c...