Show filters
453 Total Results
Displaying 31-40 of 453
Sort by:
Attacker Value
Unknown
CVE-2021-43784
Disclosure Date: December 06, 2021 (last updated February 23, 2025)
runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted confi…
0
Attacker Value
Unknown
CVE-2021-26615
Disclosure Date: November 26, 2021 (last updated February 23, 2025)
ARK library allows attackers to execute remote code via the parameter(path value) of Ark_NormalizeAndDupPAthNameW function because of an integer overflow.
0
Attacker Value
Unknown
CVE-2020-7881
Disclosure Date: November 26, 2021 (last updated February 23, 2025)
The vulnerability function is enabled when the streamer service related to the AfreecaTV communicated through web socket using 21201 port. A stack-based buffer overflow leading to remote code execution was discovered in strcpy() operate by "FanTicket" field. It is because of stored data without validation of length.
0
Attacker Value
Unknown
CVE-2021-0623
Disclosure Date: November 18, 2021 (last updated February 23, 2025)
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05585817.
0
Attacker Value
Unknown
CVE-2021-0621
Disclosure Date: November 18, 2021 (last updated February 23, 2025)
In asf extractor, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561383.
0
Attacker Value
Unknown
CVE-2021-33106
Disclosure Date: November 17, 2021 (last updated February 23, 2025)
Integer overflow in the Safestring library maintained by Intel(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2021-43618
Disclosure Date: November 15, 2021 (last updated February 23, 2025)
GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
0
Attacker Value
Unknown
CVE-2021-1912
Disclosure Date: November 12, 2021 (last updated February 23, 2025)
Possible integer overflow can occur due to improper length check while calculating count and grace period in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
0
Attacker Value
Unknown
CVE-2021-26329
Disclosure Date: November 09, 2021 (last updated February 23, 2025)
AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources.
0
Attacker Value
Unknown
CVE-2021-41203
Disclosure Date: November 05, 2021 (last updated February 23, 2025)
TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow. This is because the checkpoints loading infrastructure is missing validation for invalid file formats. The fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
0