Show filters
60 Total Results
Displaying 41-50 of 60
Sort by:
Attacker Value
Unknown

CVE-2019-5798

Disclosure Date: May 23, 2019 (last updated November 08, 2023)
Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Attacker Value
Unknown

CVE-2019-11338

Disclosure Date: April 19, 2019 (last updated November 27, 2024)
libavcodec/hevcdec.c in FFmpeg 3.4 and 4.1.2 mishandles detection of duplicate first slices, which allows remote attackers to cause a denial of service (NULL pointer dereference and out-of-array access) or possibly have unspecified other impact via crafted HEVC data.
Attacker Value
Unknown

CVE-2019-7317

Disclosure Date: February 04, 2019 (last updated October 22, 2024)
png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
Attacker Value
Unknown

CVE-2018-16876

Disclosure Date: January 03, 2019 (last updated November 27, 2024)
ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.
Attacker Value
Unknown

CVE-2018-16837

Disclosure Date: October 23, 2018 (last updated November 27, 2024)
Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. This could lean in undesirable situations such as passphrases credentials passed as a parameter for the ssh-keygen executable. Showing those credentials in clear text form for every user which have access just to the process list.
0
Attacker Value
Unknown

CVE-2018-10875

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.
Attacker Value
Unknown

CVE-2017-8932

Disclosure Date: July 06, 2017 (last updated November 08, 2023)
A bug in the standard library ScalarMult implementation of curve P-256 for amd64 architectures in Go before 1.7.6 and 1.8.x before 1.8.2 causes incorrect results to be generated for specific input points. An adaptive attack can be mounted to progressively extract the scalar input to ScalarMult by submitting crafted points and observing failures to the derive correct output. This leads to a full key recovery attack against static ECDH, as used in popular JWT libraries.
0
Attacker Value
Unknown

CVE-2016-4303

Disclosure Date: September 26, 2016 (last updated January 16, 2025)
The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow.
Attacker Value
Unknown

CVE-2016-1704

Disclosure Date: July 03, 2016 (last updated November 08, 2023)
Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.103 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
0
Attacker Value
Unknown

CVE-2016-2818

Disclosure Date: June 13, 2016 (last updated October 23, 2024)
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
0