Show filters
376 Total Results
Displaying 161-170 of 376
Sort by:
Attacker Value
Unknown
CVE-2020-15656
Disclosure Date: August 10, 2020 (last updated February 21, 2025)
JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
0
Attacker Value
Unknown
CVE-2020-15655
Disclosure Date: August 10, 2020 (last updated November 28, 2024)
A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
0
Attacker Value
Unknown
CVE-2020-15659
Disclosure Date: August 10, 2020 (last updated February 21, 2025)
Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.
0
Attacker Value
Unknown
CVE-2020-11993
Disclosure Date: August 07, 2020 (last updated February 21, 2025)
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
0
Attacker Value
Unknown
CVE-2020-8026
Disclosure Date: August 07, 2020 (last updated February 21, 2025)
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.
0
Attacker Value
Unknown
CVE-2020-16845
Disclosure Date: August 06, 2020 (last updated February 21, 2025)
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
0
Attacker Value
Unknown
CVE-2020-17353
Disclosure Date: August 05, 2020 (last updated November 08, 2023)
scm/define-stencil-commands.scm in LilyPond through 2.20.0, and 2.21.x through 2.21.4, when -dsafe is used, lacks restrictions on embedded-ps and embedded-svg, as demonstrated by including dangerous PostScript code.
0
Attacker Value
Unknown
CVE-2020-14344
Disclosure Date: August 05, 2020 (last updated February 21, 2025)
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
0
Attacker Value
Unknown
CVE-2020-16116
Disclosure Date: August 03, 2020 (last updated February 21, 2025)
In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.
0
Attacker Value
Unknown
CVE-2020-14310
Disclosure Date: July 31, 2020 (last updated February 21, 2025)
There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.
0