Show filters
4,245 Total Results
Displaying 541-550 of 4,245
Sort by:
Attacker Value
Unknown
CVE-2020-11047
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0.
0
Attacker Value
Unknown
CVE-2020-11044
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0.
0
Attacker Value
Unknown
CVE-2020-11045
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour.
0
Attacker Value
Unknown
CVE-2020-11046
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is a stream out-of-bounds seek in update_read_synchronize that could lead to a later out-of-bounds read.
0
Attacker Value
Unknown
CVE-2020-11042
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
0
Attacker Value
Unknown
CVE-2020-12691
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any authenticated user can create an EC2 credential for themselves for a project that they have a specified role on, and then perform an update to the credential user and project, allowing them to masquerade as another user. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
0
Attacker Value
Unknown
CVE-2020-12689
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authenticated within a limited scope (trust/oauth/application credential) can create an EC2 credential with an escalated permission, such as obtaining admin while the user is on a limited viewer role. This potentially allows a malicious user to act as the admin on a project another user has the admin role on, which can effectively grant that user global admin privileges.
0
Attacker Value
Unknown
CVE-2020-12692
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The EC2 API doesn't have a signature TTL check for AWS Signature V4. An attacker can sniff the Authorization header, and then use it to reissue an OpenStack token an unlimited number of times.
0
Attacker Value
Unknown
CVE-2020-12108
Disclosure Date: May 06, 2020 (last updated February 21, 2025)
/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
0
Attacker Value
Unknown
CVE-2020-12656
Disclosure Date: May 05, 2020 (last updated February 21, 2025)
gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug
0