Show filters
60 Total Results
Displaying 41-50 of 60
Sort by:
Attacker Value
Unknown
CVE-2019-5798
Disclosure Date: May 23, 2019 (last updated November 08, 2023)
Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
0
Attacker Value
Unknown
CVE-2019-11338
Disclosure Date: April 19, 2019 (last updated November 27, 2024)
libavcodec/hevcdec.c in FFmpeg 3.4 and 4.1.2 mishandles detection of duplicate first slices, which allows remote attackers to cause a denial of service (NULL pointer dereference and out-of-array access) or possibly have unspecified other impact via crafted HEVC data.
0
Attacker Value
Unknown
CVE-2019-7317
Disclosure Date: February 04, 2019 (last updated October 22, 2024)
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
0
Attacker Value
Unknown
CVE-2018-16876
Disclosure Date: January 03, 2019 (last updated November 27, 2024)
ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.
0
Attacker Value
Unknown
CVE-2018-16837
Disclosure Date: October 23, 2018 (last updated November 27, 2024)
Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.
0
Attacker Value
Unknown
CVE-2018-10875
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2017-8932
Disclosure Date: July 06, 2017 (last updated November 08, 2023)
A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.
0
Attacker Value
Unknown
CVE-2016-4303
Disclosure Date: September 26, 2016 (last updated January 16, 2025)
The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2016-1704
Disclosure Date: July 03, 2016 (last updated November 08, 2023)
Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.103 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
0
Attacker Value
Unknown
CVE-2016-2818
Disclosure Date: June 13, 2016 (last updated October 23, 2024)
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
0