Show filters
1,191 Total Results
Displaying 201-210 of 1,191
Sort by:
Attacker Value
Unknown

CVE-2021-39523

Disclosure Date: September 20, 2021 (last updated February 23, 2025)
An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function check_POLYLINE_handles() located in decode.c. It allows an attacker to cause Denial of Service.
Attacker Value
Unknown

CVE-2021-39530

Disclosure Date: September 20, 2021 (last updated February 23, 2025)
An issue was discovered in libredwg through v0.10.1.3751. bit_wcs2nlen() in bits.c has a heap-based buffer overflow.
Attacker Value
Unknown

CVE-2021-39537

Disclosure Date: September 20, 2021 (last updated February 23, 2025)
An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.
Attacker Value
Unknown

CVE-2021-38354

Disclosure Date: September 09, 2021 (last updated February 23, 2025)
The GNU-Mailman Integration WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the gm_error parameter found in the ~/includes/admin/mailing-lists-page.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.0.6.
Attacker Value
Unknown

CVE-2021-40528

Disclosure Date: September 06, 2021 (last updated February 23, 2025)
The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
Attacker Value
Unknown

CVE-2021-40491

Disclosure Date: September 03, 2021 (last updated February 23, 2025)
The ftp client in GNU Inetutils before 2.2 does not validate addresses returned by PASV/LSPV responses to make sure they match the server address. This is similar to CVE-2020-8284 for curl.
Attacker Value
Unknown

CVE-2021-38604

Disclosure Date: August 12, 2021 (last updated February 23, 2025)
In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.
Attacker Value
Unknown

CVE-2021-38185

Disclosure Date: August 08, 2021 (last updated February 23, 2025)
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
Attacker Value
Unknown

CVE-2021-35942

Disclosure Date: July 22, 2021 (last updated February 23, 2025)
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
Attacker Value
Unknown

CVE-2019-25051

Disclosure Date: July 20, 2021 (last updated February 23, 2025)
objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).