Show filters
25 Total Results
Displaying 11-20 of 25
Sort by:
Attacker Value
Unknown
CVE-2021-28875
Disclosure Date: April 11, 2021 (last updated February 22, 2025)
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
0
Attacker Value
Unknown
CVE-2020-12372
Disclosure Date: February 17, 2021 (last updated February 22, 2025)
Unchecked return value in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.
0
Attacker Value
Unknown
CVE-2021-26955
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because xcb::xproto::GetAtomNameReply::name() calls std::str::from_utf8_unchecked() on unvalidated bytes from an X server.
0
Attacker Value
Unknown
CVE-2021-26958
Disclosure Date: February 09, 2021 (last updated February 22, 2025)
An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type.
0
Attacker Value
Unknown
CVE-2019-15523
Disclosure Date: December 30, 2020 (last updated February 22, 2025)
An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.
0
Attacker Value
Unknown
CVE-2020-17533
Disclosure Date: December 29, 2020 (last updated February 22, 2025)
Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties.
0
Attacker Value
Unknown
CVE-2020-5359
Disclosure Date: December 15, 2020 (last updated February 22, 2025)
Dell BSAFE Micro Edition Suite, versions prior to 4.5, are vulnerable to an Unchecked Return Value Vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability to modify and corrupt the encrypted data.
0
Attacker Value
Unknown
CVE-2020-27898
Disclosure Date: December 08, 2020 (last updated February 22, 2025)
A denial of service issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.0.1. An attacker may be able to bypass Managed Frame Protection.
0
Attacker Value
Unknown
CVE-1999-0199
Disclosure Date: October 06, 2020 (last updated February 22, 2025)
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.
0
Attacker Value
Unknown
CVE-2020-15191
Disclosure Date: September 25, 2020 (last updated February 22, 2025)
In Tensorflow before versions 2.2.1 and 2.3.1, if a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition. However, this `status` argument is not properly checked. Hence, code following these methods will bind references to null pointers. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. The issue is patched in commit 22e07fb204386768e5bcbea563641ea11f96ceb8 and is released in TensorFlow versions 2.2.1, or 2.3.1.
0