Show filters
252 Total Results
Displaying 11-20 of 252
Sort by:
Attacker Value
Unknown

CVE-2020-25219

Disclosure Date: September 09, 2020 (last updated November 08, 2023)
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
Attacker Value
Unknown

CVE-2020-25032

Disclosure Date: August 31, 2020 (last updated November 28, 2024)
An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
Attacker Value
Unknown

CVE-2020-24972

Disclosure Date: August 29, 2020 (last updated November 08, 2023)
The Kleopatra component before 3.1.12 (and before 20.07.80) for GnuPG allows remote attackers to execute arbitrary code because openpgp4fpr: URLs are supported without safe handling of command-line options. The Qt platformpluginpath command-line option can be used to load an arbitrary DLL.
Attacker Value
Unknown

CVE-2020-17367

Disclosure Date: August 11, 2020 (last updated November 08, 2023)
Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.
Attacker Value
Unknown

CVE-2020-17368

Disclosure Date: August 11, 2020 (last updated November 08, 2023)
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
Attacker Value
Unknown

CVE-2020-10756

Disclosure Date: July 09, 2020 (last updated November 08, 2023)
An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
Attacker Value
Unknown

CVE-2020-15396

Disclosure Date: June 30, 2020 (last updated November 08, 2023)
In HylaFAX+ through 7.0.2 and HylaFAX Enterprise, the faxsetup utility calls chown on files in user-owned directories. By winning a race, a local attacker could use this to escalate his privileges to root.
Attacker Value
Unknown

CVE-2017-18922

Disclosure Date: June 30, 2020 (last updated November 08, 2023)
It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow.
Attacker Value
Unknown

CVE-2020-4067

Disclosure Date: June 29, 2020 (last updated November 08, 2023)
In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.
Attacker Value
Unknown

CVE-2020-12865

Disclosure Date: June 24, 2020 (last updated November 28, 2024)
A heap buffer overflow in SANE Backends before 1.0.30 may allow a malicious device connected to the same local network as the victim to execute arbitrary code, aka GHSL-2020-084.