Show filters
55 Total Results
Displaying 41-50 of 55
Sort by:
Attacker Value
Unknown

CVE-2021-41121

Disclosure Date: October 06, 2021 (last updated February 23, 2025)
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0.
Attacker Value
Unknown

CVE-2021-41122

Disclosure Date: October 05, 2021 (last updated February 23, 2025)
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0.
0
Attacker Value
Unknown

CVE-2021-29221

Disclosure Date: April 09, 2021 (last updated February 22, 2025)
A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions.
Attacker Value
Unknown

CVE-2020-35733

Disclosure Date: January 15, 2021 (last updated February 22, 2025)
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
Attacker Value
Unknown

CVE-2020-25623

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used.
Attacker Value
Unknown

CVE-2020-13802

Disclosure Date: September 02, 2020 (last updated February 22, 2025)
Rebar3 versions 3.0.0-beta.3 to 3.13.2 are vulnerable to OS command injection via URL parameter of dependency specification.
Attacker Value
Unknown

CVE-2016-1000107

Disclosure Date: December 10, 2019 (last updated November 27, 2024)
inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
Attacker Value
Unknown

CVE-2019-1000014

Disclosure Date: February 04, 2019 (last updated November 27, 2024)
Erlang/OTP Rebar3 version 3.7.0 through 3.7.5 contains a Signing oracle vulnerability in Package registry verification that can result in Package modifications not detected, allowing code execution. This attack appears to be exploitable via Victim fetches packages from malicious/compromised mirror. This vulnerability appears to have been fixed in 3.8.0.
0
Attacker Value
Unknown

CVE-2017-1000385

Disclosure Date: December 12, 2017 (last updated November 26, 2024)
The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher attack).
0
Attacker Value
Unknown

CVE-2016-10253

Disclosure Date: March 18, 2017 (last updated November 26, 2024)
An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.
0