CVE-2021-32628
- EPSS 0.59%
- Published 04.10.2021 18:15:08
- Last modified 21.11.2024 06:07:24
Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnera...
CVE-2021-32672
- EPSS 0.29%
- Published 04.10.2021 18:15:08
- Last modified 21.11.2024 06:07:30
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions o...
CVE-2021-32675
- EPSS 2.53%
- Published 04.10.2021 18:15:08
- Last modified 21.11.2024 06:07:30
Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk he...
CVE-2021-32687
- EPSS 0.91%
- Published 04.10.2021 18:15:08
- Last modified 21.11.2024 06:07:31
Redis is an open source, in-memory database that persists on disk. An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap or trigger remote code exec...
CVE-2021-41103
- EPSS 0.13%
- Published 04.10.2021 17:15:08
- Last modified 21.11.2024 06:25:28
containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise u...
CVE-2021-41864
- EPSS 0.02%
- Published 02.10.2021 00:15:07
- Last modified 21.11.2024 06:26:55
prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.
CVE-2021-22946
- EPSS 0.08%
- Published 29.09.2021 20:15:08
- Last modified 21.11.2024 05:50:59
A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This ...
CVE-2021-22947
- EPSS 0.19%
- Published 29.09.2021 20:15:08
- Last modified 21.11.2024 05:50:59
When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not ...
- EPSS 0.37%
- Published 26.09.2021 19:15:07
- Last modified 21.11.2024 06:26:32
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsC...
CVE-2021-22945
- EPSS 0.35%
- Published 23.09.2021 13:15:08
- Last modified 09.06.2025 15:15:25
When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.