Show filters
376 Total Results
Displaying 151-160 of 376
Sort by:
Attacker Value
Unknown

CVE-2020-8620

Disclosure Date: August 21, 2020 (last updated February 22, 2025)
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
Attacker Value
Unknown

CVE-2020-8621

Disclosure Date: August 21, 2020 (last updated February 22, 2025)
In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.
Attacker Value
Unknown

CVE-2020-8622

Disclosure Date: August 21, 2020 (last updated February 22, 2025)
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
Attacker Value
Unknown

CVE-2020-14356

Disclosure Date: August 19, 2020 (last updated February 22, 2025)
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
Attacker Value
Unknown

CVE-2020-8233

Disclosure Date: August 17, 2020 (last updated February 21, 2025)
A command injection vulnerability exists in EdgeSwitch firmware <v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges.
Attacker Value
Unknown

CVE-2020-17498

Disclosure Date: August 13, 2020 (last updated February 21, 2025)
In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.
Attacker Value
Unknown

CVE-2020-17489

Disclosure Date: August 11, 2020 (last updated February 21, 2025)
An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible for a brief moment upon a logout. (If the password were never shown in cleartext, only the password length is revealed.)
Attacker Value
Unknown

CVE-2020-16092

Disclosure Date: August 11, 2020 (last updated February 21, 2025)
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
Attacker Value
Unknown

CVE-2020-17367

Disclosure Date: August 11, 2020 (last updated February 21, 2025)
Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.
Attacker Value
Unknown

CVE-2020-17368

Disclosure Date: August 11, 2020 (last updated February 21, 2025)
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.