Логотип exploitDog
source:"msrc"
Консоль
Логотип exploitDog

exploitDog

source:"msrc"

Количество 18 769

Количество 18 769

msrc логотип

CVE-2021-37966

больше 4 лет назад

Chromium: CVE-2021-37966 Inappropriate implementation in Compositing

EPSS: Низкий
msrc логотип

CVE-2021-37965

больше 4 лет назад

Chromium: CVE-2021-37965 Inappropriate implementation in Background Fetch API

EPSS: Низкий
msrc логотип

CVE-2021-37964

больше 4 лет назад

Chromium: CVE-2021-37964 Inappropriate implementation in ChromeOS Networking

EPSS: Низкий
msrc логотип

CVE-2021-37963

больше 4 лет назад

Chromium: CVE-2021-37963 Side-channel information leakage in DevTools

EPSS: Низкий
msrc логотип

CVE-2021-37962

больше 4 лет назад

Chromium: CVE-2021-37962 Use after free in Performance Manager

EPSS: Низкий
msrc логотип

CVE-2021-37961

больше 4 лет назад

Chromium: CVE-2021-37961 Use after free in Tab Strip

EPSS: Низкий
msrc логотип

CVE-2021-37960

больше 4 лет назад

Chromium: CVE-2021-37960 Inappropriate implementation in Blink graphics

EPSS: Низкий
msrc логотип

CVE-2021-37959

больше 4 лет назад

Chromium: CVE-2021-37959 Use after free in Task Manager

EPSS: Низкий
msrc логотип

CVE-2021-37958

больше 4 лет назад

Chromium: CVE-2021-37958 Inappropriate implementation in Navigation

EPSS: Низкий
msrc логотип

CVE-2021-37957

больше 4 лет назад

Chromium: CVE-2021-37957 Use after free in WebGPU

EPSS: Низкий
msrc логотип

CVE-2021-37956

больше 4 лет назад

Chromium: CVE-2021-37956 Use after free in Offline use

EPSS: Низкий
msrc логотип

CVE-2021-3782

больше 3 лет назад

An internal reference count is held on the buffer pool incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing a use-after-free can be constructed on the wl_shm_pool tracking structure where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
EPSS: Низкий
msrc логотип

CVE-2021-3778

больше 4 лет назад

Heap-based Buffer Overflow in vim/vim

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2021-37750

больше 4 лет назад

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2021-3773

4 месяца назад

A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2021-3772

почти 4 года назад

A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2021-37714

4 месяца назад

Crafted input may cause the jsoup HTML and XML parser to get stuck, timeout, or throw unchecked exceptions

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2021-3770

больше 4 лет назад

Heap-based Buffer Overflow in vim/vim

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2021-3764

больше 3 лет назад

A memory leak flaw was found in the Linux kernel's ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2021-37623

около 4 лет назад

CVSS3: 5.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
msrc логотип
CVE-2021-37966

Chromium: CVE-2021-37966 Inappropriate implementation in Compositing

0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37965

Chromium: CVE-2021-37965 Inappropriate implementation in Background Fetch API

0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37964

Chromium: CVE-2021-37964 Inappropriate implementation in ChromeOS Networking

0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37963

Chromium: CVE-2021-37963 Side-channel information leakage in DevTools

0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37962

Chromium: CVE-2021-37962 Use after free in Performance Manager

1%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37961

Chromium: CVE-2021-37961 Use after free in Tab Strip

1%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37960

Chromium: CVE-2021-37960 Inappropriate implementation in Blink graphics

больше 4 лет назад
msrc логотип
CVE-2021-37959

Chromium: CVE-2021-37959 Use after free in Task Manager

0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37958

Chromium: CVE-2021-37958 Inappropriate implementation in Navigation

0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37957

Chromium: CVE-2021-37957 Use after free in WebGPU

0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37956

Chromium: CVE-2021-37956 Use after free in Offline use

0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-3782

An internal reference count is held on the buffer pool incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing a use-after-free can be constructed on the wl_shm_pool tracking structure where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.

CVSS3: 6.6
0%
Низкий
больше 3 лет назад
msrc логотип
CVE-2021-3778

Heap-based Buffer Overflow in vim/vim

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-37750

The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.

CVSS3: 6.5
1%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-3773

A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.

CVSS3: 9.8
1%
Низкий
4 месяца назад
msrc логотип
CVE-2021-3772

A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.

CVSS3: 6.5
0%
Низкий
почти 4 года назад
msrc логотип
CVE-2021-37714

Crafted input may cause the jsoup HTML and XML parser to get stuck, timeout, or throw unchecked exceptions

CVSS3: 7.5
4%
Низкий
4 месяца назад
msrc логотип
CVE-2021-3770

Heap-based Buffer Overflow in vim/vim

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-3764

A memory leak flaw was found in the Linux kernel's ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
msrc логотип
CVSS3: 5.5
0%
Низкий
около 4 лет назад

Уязвимостей на страницу