Show filters
859 Total Results
Displaying 261-270 of 859
Sort by:
Attacker Value
Unknown
CVE-2020-36222
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.
0
Attacker Value
Unknown
CVE-2020-36228
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.
0
Attacker Value
Unknown
CVE-2020-36227
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.
0
Attacker Value
Unknown
CVE-2020-36221
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).
0
Attacker Value
Unknown
CVE-2020-36225
Disclosure Date: January 26, 2021 (last updated February 22, 2025)
A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
0
Attacker Value
Unknown
CVE-2020-25684
Disclosure Date: January 20, 2021 (last updated February 22, 2025)
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
0
Attacker Value
Unknown
CVE-2020-29569
Disclosure Date: December 15, 2020 (last updated February 22, 2025)
An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.
0
Attacker Value
Unknown
CVE-2020-8286
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
0
Attacker Value
Unknown
CVE-2020-8285
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
0
Attacker Value
Unknown
CVE-2020-8284
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
0