Show filters
188 Total Results
Displaying 131-140 of 188
Sort by:
Attacker Value
Unknown
CVE-2021-25905
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
An issue was discovered in the bra crate before 0.1.1 for Rust. It lacks soundness because it can read uninitialized memory.
0
Attacker Value
Unknown
CVE-2020-36210
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
An issue was discovered in the autorand crate before 0.2.3 for Rust. Because of impl Random on arrays, uninitialized memory can be dropped when a panic occurs, leading to memory corruption.
0
Attacker Value
Unknown
CVE-2020-16042
Disclosure Date: January 08, 2021 (last updated February 22, 2025)
Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
0
Attacker Value
Unknown
CVE-2020-35494
Disclosure Date: January 04, 2021 (last updated February 22, 2025)
There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who is able to submit a crafted input file to be processed by binutils could cause usage of uninitialized memory. The highest threat is to application availability with a lower threat to data confidentiality. This flaw affects binutils versions prior to 2.34.
0
Attacker Value
Unknown
CVE-2020-35888
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the arr crate through 2020-08-25 for Rust. Uninitialized memory is dropped by Array::new_from_template.
0
Attacker Value
Unknown
CVE-2020-35893
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the simple-slab crate before 0.3.3 for Rust. remove() has an off-by-one error, causing memory leakage and a drop of uninitialized memory.
0
Attacker Value
Unknown
CVE-2020-35878
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the ozone crate through 2020-07-04 for Rust. Memory safety is violated because of the dropping of uninitialized memory.
0
Attacker Value
Unknown
CVE-2020-26266
Disclosure Date: December 10, 2020 (last updated February 22, 2025)
In affected versions of TensorFlow under certain cases a saved model can trigger use of uninitialized values during code execution. This is caused by having tensor buffers be filled with the default value of the type but forgetting to default initialize the quantized floating point types in Eigen. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
0
Attacker Value
Unknown
CVE-2020-26271
Disclosure Date: December 10, 2020 (last updated February 22, 2025)
In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The MakeEdge function creates an edge between one output tensor of the src node (given by output_index) and the input slot of the dst node (given by input_index). This is only possible if the types of the tensors on both sides coincide, so the function begins by obtaining the corresponding DataType values and comparing these for equality. However, there is no check that the indices point to inside of the arrays they index into. Thus, this can result in accessing data out of bounds of the corresponding heap allocated arrays. In most scenarios, this can manifest as unitialized data access, but if the index points far away from the boundaries of the arrays this can be used to leak addresses from the library. This is fixed in versions 1.15.5, 2.0.4, 2.1.3, 2.2.2, 2.3.2, and 2.4.0.
0
Attacker Value
Unknown
CVE-2020-29371
Disclosure Date: November 28, 2020 (last updated February 22, 2025)
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.
0