Show filters
681 Total Results
Displaying 1-10 of 681
Sort by:
Attacker Value
Unknown

CVE-2020-8794

Disclosure Date: February 25, 2020 (last updated February 21, 2025)
OpenSMTPD before 6.6.4 allows remote code execution because of an out-of-bounds read in mta_io in mta_session.c for multi-line replies. Although this vulnerability affects the client side of OpenSMTPD, it is possible to attack a server because the server code launches the client code during bounce handling.
Attacker Value
High

CVE-2020-8835

Disclosure Date: March 30, 2020 (last updated February 21, 2025)
In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the introducing commit was backported to that branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue is aka ZDI-CAN-10780)
Attacker Value
Unknown

CVE-2020-16947

Disclosure Date: October 16, 2020 (last updated February 22, 2025)
<p>A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the targeted user. If the targeted user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Outlook software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, a…
1
Attacker Value
Unknown

CVE-2020-11901

Disclosure Date: June 17, 2020 (last updated February 21, 2025)
The Treck TCP/IP stack before 6.0.1.66 allows Remote Code execution via a single invalid DNS response.
Attacker Value
Unknown

CVE-2020-11899

Disclosure Date: June 17, 2020 (last updated February 21, 2025)
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
Attacker Value
Unknown

CVE-2020-35890

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the ordnung crate through 2020-09-03 for Rust. compact::Vec violates memory safety via out-of-bounds access for large capacity.
Attacker Value
Unknown

CVE-2020-35892

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the simple-slab crate before 0.3.3 for Rust. index() allows an out-of-bounds read.
Attacker Value
Unknown

CVE-2020-35859

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the lucet-runtime-internals crate before 0.5.1 for Rust. It mishandles sigstack allocation. Guest programs may be able to obtain sensitive information, or guest programs can experience memory corruption.
Attacker Value
Unknown

CVE-2020-35861

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the bumpalo crate before 3.2.1 for Rust. The realloc feature allows the reading of unknown memory. Attackers can potentially read cryptographic keys.
Attacker Value
Unknown

CVE-2019-20808

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.