Show filters
4,186 Total Results
Displaying 181-190 of 4,186
Sort by:
Attacker Value
Unknown
CVE-2020-14345
Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
0
Attacker Value
Unknown
CVE-2020-8927
Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
0
Attacker Value
Unknown
CVE-2020-25285
Disclosure Date: September 13, 2020 (last updated February 22, 2025)
A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
0
Attacker Value
Unknown
CVE-2013-7490
Disclosure Date: September 11, 2020 (last updated February 22, 2025)
An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
0
Attacker Value
Unknown
CVE-2020-25219
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
0
Attacker Value
Unknown
CVE-2020-24379
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
WebDAV implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to XXE injection.
0
Attacker Value
Unknown
CVE-2020-24916
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS command injection.
0
Attacker Value
Unknown
CVE-2020-25212
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
0
Attacker Value
Unknown
CVE-2020-1968
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
0
Attacker Value
Unknown
CVE-2020-24659
Disclosure Date: September 04, 2020 (last updated February 22, 2025)
An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
0