Show filters
74 Total Results
Displaying 11-20 of 74
Sort by:
Attacker Value
Unknown

CVE-2020-25241

Disclosure Date: March 15, 2021 (last updated February 22, 2025)
A vulnerability has been identified in SIMATIC MV400 family (All Versions < V7.0.6). The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions.
Attacker Value
Unknown

CVE-2020-35628

Disclosure Date: March 04, 2021 (last updated February 22, 2025)
A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide malicious input to trigger this vulnerability.
Attacker Value
Unknown

CVE-2020-28636

Disclosure Date: March 04, 2021 (last updated February 22, 2025)
A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious input to trigger this vulnerability.
Attacker Value
Unknown

CVE-2020-35636

Disclosure Date: March 04, 2021 (last updated February 22, 2025)
A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1 in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sface() sfh->volume() OOB read. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger this vulnerability.
Attacker Value
Unknown

CVE-2020-28601

Disclosure Date: March 04, 2021 (last updated February 22, 2025)
A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide malicious input to trigger this vulnerability.
Attacker Value
Unknown

CVE-2020-11163

Disclosure Date: February 22, 2021 (last updated February 22, 2025)
Possible buffer overflow while updating ikev2 parameters due to lack of check of input validation for certain parameters received from the ePDG server in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
Attacker Value
Unknown

CVE-2020-11187

Disclosure Date: February 22, 2021 (last updated February 22, 2025)
Possible memory corruption in BSI module due to improper validation of parameter count in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Mobile
Attacker Value
Unknown

CVE-2020-11271

Disclosure Date: February 22, 2021 (last updated February 22, 2025)
Possible out of bounds while accessing global control elements due to race condition in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
Attacker Value
Unknown

CVE-2020-11146

Disclosure Date: January 21, 2021 (last updated February 22, 2025)
Out of bound write while copying data using IOCTL due to lack of check of array index received from user in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
Attacker Value
Unknown

CVE-2021-3121

Disclosure Date: January 11, 2021 (last updated February 22, 2025)
An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.