Show filters
171 Total Results
Displaying 81-90 of 171
Sort by:
Attacker Value
Unknown

CVE-2016-20012

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
Attacker Value
Unknown

CVE-2021-3796

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
vim is vulnerable to Use After Free
Attacker Value
Unknown

CVE-2021-3778

Disclosure Date: September 15, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
Attacker Value
Unknown

CVE-2020-19144

Disclosure Date: September 09, 2021 (last updated February 23, 2025)
Buffer Overflow in LibTiff v4.0.10 allows attackers to cause a denial of service via the 'in _TIFFmemcpy' funtion in the component 'tif_unix.c'.
Attacker Value
Unknown

CVE-2021-3770

Disclosure Date: September 06, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
Attacker Value
Unknown

CVE-2021-3580

Disclosure Date: August 05, 2021 (last updated February 23, 2025)
A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
Attacker Value
Unknown

CVE-2021-37600

Disclosure Date: July 30, 2021 (last updated February 23, 2025)
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
Attacker Value
Unknown

CVE-2021-35942

Disclosure Date: July 22, 2021 (last updated February 23, 2025)
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
Attacker Value
Unknown

CVE-2021-3541

Disclosure Date: July 09, 2021 (last updated February 23, 2025)
A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
Attacker Value
Unknown

CVE-2021-3530

Disclosure Date: June 02, 2021 (last updated February 22, 2025)
A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.