Логотип exploitDog
source:"msrc"
Консоль
Логотип exploitDog

exploitDog

source:"msrc"

Количество 18 769

Количество 18 769

msrc логотип

CVE-2021-36373

больше 4 лет назад

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2021-36370

больше 4 лет назад

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2021-3636

почти 2 года назад

CVSS3: 4.6
EPSS: Низкий
msrc логотип

CVE-2021-36368

почти 4 года назад

An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose and an attacker has silently modified the server to support the None authentication option then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass since nothing is being bypassed.

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2021-3634

4 месяца назад

A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2021-3631

почти 4 года назад

A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.

CVSS3: 6.3
EPSS: Низкий
msrc логотип

CVE-2021-36230

почти 4 года назад

CVSS3: 8.8
EPSS: Низкий
msrc логотип

CVE-2021-3622

около 4 лет назад

CVSS3: 4.3
EPSS: Низкий
msrc логотип

CVE-2021-36222

больше 4 лет назад

ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2021-36221

больше 4 лет назад

Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2021-3620

почти 4 года назад

A flaw was found in Ansible Engine's ansible-connection module where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2021-3618

почти 4 года назад

ALPACA is an application layer protocol content confusion attack exploiting TLS servers implementing different protocols but using compatible certificates such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

CVSS3: 7.4
EPSS: Низкий
msrc логотип

CVE-2021-36160

больше 4 лет назад

mod_proxy_uwsgi out of bound read

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2021-3611

больше 1 года назад

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2021-3609

почти 4 года назад

.A flaw was found in the CAN BCM networking protocol in the Linux kernel where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2021-3608

почти 4 года назад

CVSS3: 6
EPSS: Низкий
msrc логотип

CVE-2021-3607

почти 4 года назад

CVSS3: 6
EPSS: Низкий
msrc логотип

CVE-2021-3602

почти 2 года назад

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2021-35942

больше 4 лет назад

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted crafted pattern potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

CVSS3: 9.1
EPSS: Низкий
msrc логотип

CVE-2021-35939

больше 3 лет назад

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
msrc логотип
CVSS3: 5.5
0%
Низкий
больше 4 лет назад
msrc логотип
CVSS3: 7.5
1%
Низкий
больше 4 лет назад
msrc логотип
CVSS3: 4.6
0%
Низкий
почти 2 года назад
msrc логотип
CVE-2021-36368

An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose and an attacker has silently modified the server to support the None authentication option then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass since nothing is being bypassed.

CVSS3: 3.7
0%
Низкий
почти 4 года назад
msrc логотип
CVE-2021-3634

A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.

CVSS3: 6.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2021-3631

A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.

CVSS3: 6.3
0%
Низкий
почти 4 года назад
msrc логотип
CVSS3: 8.8
1%
Низкий
почти 4 года назад
msrc логотип
CVSS3: 4.3
1%
Низкий
около 4 лет назад
msrc логотип
CVE-2021-36222

ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.

CVSS3: 7.5
8%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-36221

Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.

CVSS3: 5.9
0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-3620

A flaw was found in Ansible Engine's ansible-connection module where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality.

CVSS3: 5.5
0%
Низкий
почти 4 года назад
msrc логотип
CVE-2021-3618

ALPACA is an application layer protocol content confusion attack exploiting TLS servers implementing different protocols but using compatible certificates such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.

CVSS3: 7.4
1%
Низкий
почти 4 года назад
msrc логотип
CVE-2021-36160

mod_proxy_uwsgi out of bound read

CVSS3: 7.5
5%
Низкий
больше 4 лет назад
msrc логотип
CVSS3: 6.5
0%
Низкий
больше 1 года назад
msrc логотип
CVE-2021-3609

.A flaw was found in the CAN BCM networking protocol in the Linux kernel where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.

CVSS3: 7
0%
Низкий
почти 4 года назад
msrc логотип
CVSS3: 6
0%
Низкий
почти 4 года назад
msrc логотип
CVSS3: 6
0%
Низкий
почти 4 года назад
msrc логотип
CVSS3: 5.5
0%
Низкий
почти 2 года назад
msrc логотип
CVE-2021-35942

The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted crafted pattern potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.

CVSS3: 9.1
1%
Низкий
больше 4 лет назад
msrc логотип
CVSS3: 6.7
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу