Show filters
260 Total Results
Displaying 51-60 of 260
Sort by:
Attacker Value
Unknown

CVE-2021-3744

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.
Attacker Value
Unknown

CVE-2021-4160

Disclosure Date: January 28, 2022 (last updated November 08, 2023)
There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For…
Attacker Value
Unknown

CVE-2022-0235

Disclosure Date: January 16, 2022 (last updated February 23, 2025)
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
Attacker Value
Unknown

CVE-2021-36411

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
An issue has been found in libde265 v1.0.8 due to incorrect access control. A SEGV caused by a READ memory access in function derive_boundaryStrength of deblock.cc has occurred. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
Attacker Value
Unknown

CVE-2021-36410

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in function put_epel_hv_fallback when running program dec265.
Attacker Value
Unknown

CVE-2021-36409

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at sps.cc:925 in libde265 v1.0.8 when decoding file, which allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file or possibly have unspecified other impact.
Attacker Value
Unknown

CVE-2021-36408

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-free in intrapred.h when decoding file using dec265.
Attacker Value
Unknown

CVE-2021-35452

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
An Incorrect Access Control vulnerability exists in libde265 v1.0.8 due to a SEGV in slice.cc.
Attacker Value
Unknown

CVE-2021-45105

Disclosure Date: December 18, 2021 (last updated February 23, 2025)
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.
Attacker Value
Unknown

CVE-2020-21597

Disclosure Date: September 16, 2021 (last updated February 23, 2025)
libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma function, which can be exploited via a crafted a file.