Show filters
174 Total Results
Displaying 11-20 of 174
Sort by:
Attacker Value
Unknown

CVE-2020-15707

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
Attacker Value
Unknown

CVE-2020-15705

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
Attacker Value
Unknown

CVE-2020-6427

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2020-6424

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
Use after free in media in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2020-6449

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2020-6426

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
Inappropriate implementation in V8 in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2020-6428

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2020-6422

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
Use after free in WebGL in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2020-6429

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
Use after free in audio in Google Chrome prior to 80.0.3987.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2019-15624

Disclosure Date: February 04, 2020 (last updated February 21, 2025)
Improper Input Validation in Nextcloud Server 15.0.7 allows group admins to create users with IDs of system folders.