Show filters
356 Total Results
Displaying 151-160 of 356
Sort by:
Attacker Value
Unknown

CVE-2020-35871

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via an Auxdata API data race.
Attacker Value
Unknown

CVE-2020-35872

Disclosure Date: December 31, 2020 (last updated November 28, 2024)
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via the repr(Rust) type.
Attacker Value
Unknown

CVE-2020-35867

Disclosure Date: December 31, 2020 (last updated November 28, 2024)
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via create_module.
Attacker Value
Unknown

CVE-2020-35868

Disclosure Date: December 31, 2020 (last updated November 28, 2024)
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via UnlockNotification.
Attacker Value
Unknown

CVE-2020-35869

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated because rusqlite::trace::log mishandles format strings.
Attacker Value
Unknown

CVE-2020-35866

Disclosure Date: December 31, 2020 (last updated November 28, 2024)
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via VTab / VTabCursor.
Attacker Value
Unknown

CVE-2020-35873

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated because sessions.rs has a use-after-free.
Attacker Value
Unknown

CVE-2020-29172

Disclosure Date: December 26, 2020 (last updated February 22, 2025)
A cross-site scripting (XSS) vulnerability in the LiteSpeed Cache plugin before 3.6.1 for WordPress can be exploited via the Server IP setting.
Attacker Value
Unknown

CVE-2020-26263

Disclosure Date: December 21, 2020 (last updated February 22, 2025)
tlslite-ng is an open source python library that implements SSL and TLS cryptographic protocols. In tlslite-ng before versions 0.7.6 and 0.8.0-alpha39, the code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependant. In particular, the code has multiple ways in which it leaks information about the decrypted ciphertext. It aborts as soon as the plaintext doesn't start with 0x00, 0x02. All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable. This is patched in versions 0.7.6 and 0.8.0-alpha39. Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not the case (see reference). As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the security policy of tlslite-ng.
Attacker Value
Unknown

CVE-2018-17145

Disclosure Date: September 10, 2020 (last updated February 22, 2025)
Bitcoin Core 0.16.x before 0.16.2 and Bitcoin Knots 0.16.x before 0.16.2 allow remote denial of service via a flood of multiple transaction inv messages with random hashes, aka INVDoS. NOTE: this can also affect other cryptocurrencies, e.g., if they were forked from Bitcoin Core after 2017-11-15.