Show filters
171 Total Results
Displaying 81-90 of 171
Sort by:
Attacker Value
Unknown
CVE-2016-20012
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
0
Attacker Value
Unknown
CVE-2021-3796
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
vim is vulnerable to Use After Free
0
Attacker Value
Unknown
CVE-2021-3778
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
0
Attacker Value
Unknown
CVE-2020-19144
Disclosure Date: September 09, 2021 (last updated February 23, 2025)
Buffer Overflow in LibTiff v4.0.10 allows attackers to cause a denial of service via the 'in _TIFFmemcpy' funtion in the component 'tif_unix.c'.
0
Attacker Value
Unknown
CVE-2021-3770
Disclosure Date: September 06, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
0
Attacker Value
Unknown
CVE-2021-3580
Disclosure Date: August 05, 2021 (last updated February 23, 2025)
A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
0
Attacker Value
Unknown
CVE-2021-37600
Disclosure Date: July 30, 2021 (last updated February 23, 2025)
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
0
Attacker Value
Unknown
CVE-2021-35942
Disclosure Date: July 22, 2021 (last updated February 23, 2025)
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
0
Attacker Value
Unknown
CVE-2021-3541
Disclosure Date: July 09, 2021 (last updated February 23, 2025)
A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
0
Attacker Value
Unknown
CVE-2021-3530
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
A flaw was discovered in GNU libiberty within demangle_path() in rust-demangle.c, as distributed in GNU Binutils version 2.36. A crafted symbol can cause stack memory to be exhausted leading to a crash.
0