Show filters
164 Total Results
Displaying 111-120 of 164
Sort by:
Attacker Value
Unknown
CVE-2021-27135
Disclosure Date: February 10, 2021 (last updated November 08, 2023)
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
0
Attacker Value
Unknown
CVE-2021-21272
Disclosure Date: January 25, 2021 (last updated February 22, 2025)
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on the host filesystem outside of the user-specified directory unexpectedly with the same permissions as the user who runs `oras pull`. Users of the affected versions are impacted if they are `oras` CLI users who runs `oras pull`, or if they are Go programs, which invoke `github.com/deislabs/oras/pkg/content.FileStore`. The problem has been fixed in version 0.9.0. For `oras` CLI users, there is no workarounds other than pulling from a truste…
0
Attacker Value
Unknown
CVE-2020-35668
Disclosure Date: December 23, 2020 (last updated February 22, 2025)
RedisGraph 2.x through 2.2.11 has a NULL Pointer Dereference that leads to a server crash because it mishandles an unquoted string, such as an alias that has not yet been introduced.
0
Attacker Value
Unknown
CVE-2020-17381
Disclosure Date: October 21, 2020 (last updated February 22, 2025)
An issue was discovered in Ghisler Total Commander 9.51. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the %SYSTEMDRIVE%\totalcmd\TOTALCMD64.EXE binary.
0
Attacker Value
Unknown
CVE-2020-14147
Disclosure Date: June 15, 2020 (last updated February 21, 2025)
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
0
Attacker Value
Unknown
CVE-2020-7105
Disclosure Date: January 16, 2020 (last updated February 21, 2025)
async.c and dict.c in libhiredis.a in hiredis through 0.14.0 allow a NULL pointer dereference because malloc return values are unchecked.
0
Attacker Value
Unknown
CVE-2013-3691
Disclosure Date: December 11, 2019 (last updated November 27, 2024)
AirLive POE-2600HD allows remote attackers to cause a denial of service (device reset) via a long URL.
0
Attacker Value
Unknown
CVE-2019-18663
Disclosure Date: November 04, 2019 (last updated November 27, 2024)
A SQL injection vulnerability in a /login/forgot1 POST request in ARP-GUARD 4.0.0-5 allows unauthenticated remote attackers to execute arbitrary SQL commands via the user_id parameter.
0
Attacker Value
Unknown
CVE-2013-0178
Disclosure Date: November 01, 2019 (last updated November 27, 2024)
Insecure temporary file vulnerability in Redis before 2.6 related to /tmp/redis-%p.vm.
0
Attacker Value
Unknown
CVE-2013-0180
Disclosure Date: November 01, 2019 (last updated November 27, 2024)
Insecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds.
0