Show filters
4,245 Total Results
Displaying 501-510 of 4,245
Sort by:
Attacker Value
Unknown

CVE-2020-13114

Disclosure Date: May 21, 2020 (last updated February 21, 2025)
An issue was discovered in libexif before 0.6.22. An unrestricted size in handling Canon EXIF MakerNote data could lead to consumption of large amounts of compute time for decoding EXIF data.
Attacker Value
Unknown

CVE-2020-13112

Disclosure Date: May 21, 2020 (last updated February 21, 2025)
An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093.
Attacker Value
Unknown

CVE-2020-6463

Disclosure Date: May 21, 2020 (last updated February 21, 2025)
Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2020-10723

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
Attacker Value
Unknown

CVE-2020-10724

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
A vulnerability was found in DPDK versions 18.11 and above. The vhost-crypto library code is missing validations for user-supplied values, potentially allowing an information leak through an out-of-bounds memory read.
Attacker Value
Unknown

CVE-2020-10722

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.
Attacker Value
Unknown

CVE-2020-11933

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.
Attacker Value
Unknown

CVE-2020-12663

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers.
Attacker Value
Unknown

CVE-2020-12662

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
Unbound before 1.10.1 has Insufficient Control of Network Message Volume, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.
Attacker Value
Unknown

CVE-2020-8617

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session key even on servers whose configuration does not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and deliberately exits. Prior to the introduction of the check the server would continue operating in an inconsistent state, with potentially harmful results.