Show filters
1,815 Total Results
Displaying 111-120 of 1,815
Sort by:
Attacker Value
Unknown

CVE-2020-26088

Disclosure Date: September 24, 2020 (last updated February 22, 2025)
A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
Attacker Value
Unknown

CVE-2020-25739

Disclosure Date: September 23, 2020 (last updated February 22, 2025)
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
Attacker Value
Unknown

CVE-2019-20919

Disclosure Date: September 17, 2020 (last updated February 22, 2025)
An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
Attacker Value
Unknown

CVE-2020-14392

Disclosure Date: September 16, 2020 (last updated February 22, 2025)
An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
Attacker Value
Unknown

CVE-2020-14385

Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2020-14314

Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2020-14345

Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Attacker Value
Unknown

CVE-2020-8927

Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
Attacker Value
Unknown

CVE-2020-25285

Disclosure Date: September 13, 2020 (last updated February 22, 2025)
A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
Attacker Value
Unknown

CVE-2020-25219

Disclosure Date: September 09, 2020 (last updated February 22, 2025)
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.