Show filters
529 Total Results
Displaying 261-270 of 529
Sort by:
Attacker Value
Unknown

CVE-2021-31348

Disclosure Date: April 16, 2021 (last updated February 22, 2025)
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_parse_str() performs incorrect memory handling while parsing crafted XML files (out-of-bounds read after a certain strcspn failure).
Attacker Value
Unknown

CVE-2021-31229

Disclosure Date: April 15, 2021 (last updated February 22, 2025)
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd() performs incorrect memory handling while parsing crafted XML files, which leads to an out-of-bounds write of a one byte constant.
Attacker Value
Unknown

CVE-2021-30485

Disclosure Date: April 11, 2021 (last updated February 22, 2025)
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd(), while parsing a crafted XML file, performs incorrect memory handling, leading to a NULL pointer dereference while running strcmp() on a NULL pointer.
Attacker Value
Unknown

CVE-2021-26222

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
The ezxml_new function in ezXML 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.
Attacker Value
Unknown

CVE-2021-26221

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
The ezxml_new function in ezXML 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.
Attacker Value
Unknown

CVE-2021-26220

Disclosure Date: February 08, 2021 (last updated February 22, 2025)
The ezxml_toxml function in ezxml 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.
Attacker Value
Unknown

CVE-2020-24490

Disclosure Date: February 02, 2021 (last updated November 28, 2024)
Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
Attacker Value
Unknown

CVE-2020-27153

Disclosure Date: October 15, 2020 (last updated February 22, 2025)
In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.
Attacker Value
Unknown

CVE-2020-6579

Disclosure Date: April 30, 2020 (last updated February 21, 2025)
Cross-site scripting (XSS) vulnerability in mailhive/cloudbeez/cloudloader.php and mailhive/cloudbeez/cloudloader_core.php in the MailBeez plugin for ZenCart before 3.9.22 allows remote attackers to inject arbitrary web script or HTML via the cloudloader_mode parameter.
Attacker Value
Unknown

CVE-2020-12270

Disclosure Date: April 27, 2020 (last updated February 21, 2025)
React Native Bluetooth Scan in Bluezone 1.0.0 uses six-character alphanumeric IDs, which might make it easier for remote attackers to interfere with COVID-19 contact tracing by using many IDs. NOTE: the vendor disputes the relevance of this report because the recipient of an F1 alert will know it was a false alert if contact-history comparison fails (i.e., an F0 is not actually part of the contact history obtained from the device of this recipient, or this recipient is not actually part of the contact history obtained from the device of an F0)