Show filters
36 Total Results
Displaying 21-30 of 36
Sort by:
Attacker Value
Unknown
CVE-2021-27218
Disclosure Date: February 15, 2021 (last updated February 22, 2025)
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
0
Attacker Value
Unknown
CVE-2021-27219
Disclosure Date: February 15, 2021 (last updated February 22, 2025)
An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
0
Attacker Value
Unknown
CVE-2020-13545
Disclosure Date: January 06, 2021 (last updated February 22, 2025)
An exploitable signed conversion vulnerability exists in the TextMaker document parsing functionality of SoftMaker Office 2021’s TextMaker application. A specially crafted document can cause the document parser to miscalculate a length used to allocate a buffer, later upon usage of this buffer the application will write outside its bounds resulting in a heap-based memory corruption. An attacker can entice the victim to open a document to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2020-13544
Disclosure Date: January 06, 2021 (last updated February 22, 2025)
An exploitable sign extension vulnerability exists in the TextMaker document parsing functionality of SoftMaker Office 2021’s TextMaker application. A specially crafted document can cause the document parser to sign-extend a length used to terminate a loop, which can later result in the loop’s index being used to write outside the bounds of a heap buffer during the reading of file data. An attacker can entice the victim to open a document to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2020-35926
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the nanorand crate before 0.5.1 for Rust. It caused any random number generator (even ChaCha) to return all zeroes because integer truncation was mishandled.
0
Attacker Value
Unknown
CVE-2020-13985
Disclosure Date: December 11, 2020 (last updated February 22, 2025)
An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.
0
Attacker Value
Unknown
CVE-2019-14563
Disclosure Date: November 23, 2020 (last updated February 22, 2025)
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-27194
Disclosure Date: October 16, 2020 (last updated February 22, 2025)
An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a.
0
Attacker Value
Unknown
CVE-2020-1913
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
0
Attacker Value
Unknown
CVE-2020-12417
Disclosure Date: July 09, 2020 (last updated February 21, 2025)
Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. *Note: this issue only affects Firefox on ARM64 platforms.* This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0.
0