Show filters
1,411 Total Results
Displaying 21-30 of 1,411
Sort by:
Attacker Value
Unknown
CVE-2020-8620
Disclosure Date: August 21, 2020 (last updated November 28, 2024)
In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.
0
Attacker Value
Unknown
CVE-2020-8622
Disclosure Date: August 21, 2020 (last updated November 08, 2023)
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
0
Attacker Value
Unknown
CVE-2020-15861
Disclosure Date: August 20, 2020 (last updated November 28, 2024)
Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.
0
Attacker Value
Unknown
CVE-2020-15862
Disclosure Date: August 20, 2020 (last updated November 22, 2023)
Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
0
Attacker Value
Unknown
CVE-2020-14344
Disclosure Date: August 05, 2020 (last updated November 08, 2023)
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
0
Attacker Value
Unknown
CVE-2020-3481
Disclosure Date: July 20, 2020 (last updated November 08, 2023)
A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
0
Attacker Value
Unknown
CVE-2019-20907
Disclosure Date: July 13, 2020 (last updated November 08, 2023)
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
0
Attacker Value
Unknown
CVE-2020-14303
Disclosure Date: July 06, 2020 (last updated November 08, 2023)
A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.
0
Attacker Value
Unknown
CVE-2020-14954
Disclosure Date: June 21, 2020 (last updated November 08, 2023)
Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
0
Attacker Value
Unknown
CVE-2020-3350
Disclosure Date: June 17, 2020 (last updated November 08, 2023)
A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.
0