Show filters
433 Total Results
Displaying 31-40 of 433
Sort by:
Attacker Value
Unknown

CVE-2020-14954

Disclosure Date: June 21, 2020 (last updated February 21, 2025)
Mutt before 1.14.4 and NeoMutt before 2020-06-19 have a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a man-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
Attacker Value
Unknown

CVE-2020-14154

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.
Attacker Value
Unknown

CVE-2020-14093

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
Attacker Value
Unknown

CVE-2020-0198

Disclosure Date: June 11, 2020 (last updated February 21, 2025)
In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941
Attacker Value
Unknown

CVE-2020-12049

Disclosure Date: June 08, 2020 (last updated February 21, 2025)
An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.
Attacker Value
Unknown

CVE-2020-13777

Disclosure Date: June 04, 2020 (last updated February 21, 2025)
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.
Attacker Value
Unknown

CVE-2020-13254

Disclosure Date: June 03, 2020 (last updated February 21, 2025)
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
Attacker Value
Unknown

CVE-2020-13596

Disclosure Date: June 03, 2020 (last updated February 21, 2025)
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
Attacker Value
Unknown

CVE-2020-13645

Disclosure Date: May 28, 2020 (last updated February 21, 2025)
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
Attacker Value
Unknown

CVE-2020-13631

Disclosure Date: May 27, 2020 (last updated November 08, 2023)
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.