Show filters
4,171 Total Results
Displaying 201-210 of 4,171
Sort by:
Attacker Value
Unknown

CVE-2020-7069

Disclosure Date: September 29, 2020 (last updated February 22, 2025)
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.
Attacker Value
Unknown

CVE-2020-26116

Disclosure Date: September 27, 2020 (last updated February 22, 2025)
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
Attacker Value
Unknown

CVE-2020-26088

Disclosure Date: September 24, 2020 (last updated February 22, 2025)
A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
Attacker Value
Unknown

CVE-2020-16121

Disclosure Date: September 24, 2020 (last updated February 22, 2025)
PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own.
Attacker Value
Unknown

CVE-2020-25739

Disclosure Date: September 23, 2020 (last updated February 22, 2025)
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
Attacker Value
Unknown

CVE-2019-20919

Disclosure Date: September 17, 2020 (last updated February 22, 2025)
An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
Attacker Value
Unknown

CVE-2020-14382

Disclosure Date: September 16, 2020 (last updated February 22, 2025)
A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in file 'lib/luks2/luks2_json_metadata.c' in function hdr_validate_segments(struct crypt_device *cd, json_object *hdr_jobj) where the code does not check for possible overflow on memory allocation used for intervals array (see statement "intervals = malloc(first_backup * sizeof(*intervals));"). Due to the bug, library can be *tricked* to expect such allocation was successful but for far less memory then originally expected. Later it may read data FROM image crafted by an attacker and actually write such data BEYOND allocated memory.
Attacker Value
Unknown

CVE-2020-14392

Disclosure Date: September 16, 2020 (last updated February 22, 2025)
An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
Attacker Value
Unknown

CVE-2020-14385

Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.
Attacker Value
Unknown

CVE-2020-14314

Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.