Show filters
4,245 Total Results
Displaying 541-550 of 4,245
Sort by:
Attacker Value
Unknown

CVE-2020-11047

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0.
Attacker Value
Unknown

CVE-2020-11044

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0.
Attacker Value
Unknown

CVE-2020-11045

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour.
Attacker Value
Unknown

CVE-2020-11046

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is a stream out-of-bounds seek in update_read_synchronize that could lead to a later out-of-bounds read.
Attacker Value
Unknown

CVE-2020-11042

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
Attacker Value
Unknown

CVE-2020-12691

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
Attacker Value
Unknown

CVE-2020-12689

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
Attacker Value
Unknown

CVE-2020-12692

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
Attacker Value
Unknown

CVE-2020-12108

Disclosure Date: May 06, 2020 (last updated February 21, 2025)
/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
Attacker Value
Unknown

CVE-2020-12656

Disclosure Date: May 05, 2020 (last updated February 21, 2025)
gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug