Show filters
2,221 Total Results
Displaying 101-110 of 2,221
Sort by:
Attacker Value
Unknown

CVE-2021-20292

Disclosure Date: May 28, 2021 (last updated February 22, 2025)
There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.
Attacker Value
Unknown

CVE-2020-36329

Disclosure Date: May 21, 2021 (last updated February 22, 2025)
A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Attacker Value
Unknown

CVE-2020-36328

Disclosure Date: May 21, 2021 (last updated February 22, 2025)
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Attacker Value
Unknown

CVE-2021-3504

Disclosure Date: May 11, 2021 (last updated February 22, 2025)
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-31916

Disclosure Date: May 06, 2021 (last updated February 22, 2025)
An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2021-20254

Disclosure Date: May 05, 2021 (last updated February 22, 2025)
A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
Attacker Value
Unknown

CVE-2021-3472

Disclosure Date: April 26, 2021 (last updated February 22, 2025)
A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Attacker Value
Unknown

CVE-2021-3497

Disclosure Date: April 19, 2021 (last updated February 22, 2025)
GStreamer before 1.18.4 might access already-freed memory in error code paths when demuxing certain malformed Matroska files.
Attacker Value
Unknown

CVE-2021-3498

Disclosure Date: April 19, 2021 (last updated February 22, 2025)
GStreamer before 1.18.4 might cause heap corruption when parsing certain malformed Matroska files.
Attacker Value
Unknown

CVE-2021-20305

Disclosure Date: April 05, 2021 (last updated February 22, 2025)
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.