Show filters
811 Total Results
Displaying 101-110 of 811
Sort by:
Attacker Value
Unknown

CVE-2020-14954

Disclosure Date: June 21, 2020 (last updated February 21, 2025)
Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
Attacker Value
Unknown

CVE-2020-14399

Disclosure Date: June 17, 2020 (last updated February 21, 2025)
An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly "no trust boundary crossed.
Attacker Value
Unknown

CVE-2020-14400

Disclosure Date: June 17, 2020 (last updated February 21, 2025)
An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary
Attacker Value
Unknown

CVE-2020-14093

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
Attacker Value
Unknown

CVE-2020-10732

Disclosure Date: June 12, 2020 (last updated February 21, 2025)
A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.
Attacker Value
Unknown

CVE-2020-8619

Disclosure Date: June 10, 2020 (last updated February 21, 2025)
In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone contains an empty non-terminal entry containing an asterisk ("*") character, this defect cannot be encountered. A would-be attacker who is allowed to change zone content could theoretically introduce such a record in order to exploit this condition to cause denial of service, though we consider the use of this vector unlikely because any such attack would require a significant privilege level and be easily traceable.
Attacker Value
Unknown

CVE-2020-8618

Disclosure Date: June 10, 2020 (last updated February 21, 2025)
An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.
Attacker Value
Unknown

CVE-2020-10757

Disclosure Date: June 09, 2020 (last updated February 21, 2025)
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
Attacker Value
Unknown

CVE-2020-13696

Disclosure Date: June 08, 2020 (last updated February 21, 2025)
An issue was discovered in LinuxTV xawtv before 3.107. The function dev_open() in v4l-conf.c does not perform sufficient checks to prevent an unprivileged caller of the program from opening unintended filesystem paths. This allows a local attacker with access to the v4l-conf setuid-root program to test for the existence of arbitrary files and to trigger an open on arbitrary files with mode O_RDWR. To achieve this, relative path components need to be added to the device path, as demonstrated by a v4l-conf -c /dev/../root/.bash_history command.
Attacker Value
Unknown

CVE-2019-20810

Disclosure Date: June 03, 2020 (last updated February 21, 2025)
go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.