Show filters
61 Total Results
Displaying 21-30 of 61
Sort by:
Attacker Value
Unknown
CVE-2021-22897
Disclosure Date: June 11, 2021 (last updated March 28, 2024)
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.
0
Attacker Value
Unknown
CVE-2020-12358
Disclosure Date: June 09, 2021 (last updated November 28, 2024)
Out of bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.
0
Attacker Value
Unknown
CVE-2020-12360
Disclosure Date: June 09, 2021 (last updated November 28, 2024)
Out of bounds read in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-12357
Disclosure Date: June 09, 2021 (last updated November 28, 2024)
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-8670
Disclosure Date: June 09, 2021 (last updated November 28, 2024)
Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-24486
Disclosure Date: June 09, 2021 (last updated November 28, 2024)
Improper input validation in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access.
0
Attacker Value
Unknown
CVE-2021-28041
Disclosure Date: March 05, 2021 (last updated November 08, 2023)
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
0
Attacker Value
Unknown
CVE-2021-26932
Disclosure Date: February 17, 2021 (last updated November 08, 2023)
An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.
0
Attacker Value
Unknown
CVE-2020-35507
Disclosure Date: January 04, 2021 (last updated November 28, 2024)
There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.
0
Attacker Value
Unknown
CVE-2020-35493
Disclosure Date: January 04, 2021 (last updated November 08, 2023)
A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34.
0