Show filters
4,245 Total Results
Displaying 561-570 of 4,245
Sort by:
Attacker Value
Unknown

CVE-2019-20788

Disclosure Date: April 23, 2020 (last updated February 21, 2025)
libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.
Attacker Value
Unknown

CVE-2020-11945

Disclosure Date: April 23, 2020 (last updated February 21, 2025)
An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials).
Attacker Value
Unknown

CVE-2020-1760

Disclosure Date: April 23, 2020 (last updated February 21, 2025)
A flaw was found in the Ceph Object Gateway, where it supports request sent by an anonymous user in Amazon S3. This flaw could lead to potential XSS attacks due to the lack of proper neutralization of untrusted input.
Attacker Value
Unknown

CVE-2020-12066

Disclosure Date: April 22, 2020 (last updated February 21, 2025)
CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.
Attacker Value
Unknown

CVE-2020-12059

Disclosure Date: April 22, 2020 (last updated February 21, 2025)
An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exception.
Attacker Value
Unknown

CVE-2020-11008

Disclosure Date: April 21, 2020 (last updated February 21, 2025)
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. This bug is similar to CVE-2020-5260(GHSA-qm7j-c969-7j4q). The fix for that bug still left the door open for an exploit where _some_ credential is leaked (but the attacker cannot control which one). Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that are considered illegal as of the recently published Git versions can cause Git to send a "blank" pattern to helpers, missing hostname and protocol fields. Many helpers will interpret this as matching _any_ URL, and will return some unspecified stored password, leaking the password to an attacker's server. The vulnerability can be triggered by feeding a malicious URL to `git clone`. However, the affected URLs look rather suspicious; the likely vector would be through syst…
Attacker Value
Unknown

CVE-2020-11958

Disclosure Date: April 21, 2020 (last updated February 21, 2025)
re2c 1.3 has a heap-based buffer overflow in Scanner::fill in parse/scanner.cc via a long lexeme.
Attacker Value
Unknown

CVE-2020-1983

Disclosure Date: April 20, 2020 (last updated February 21, 2025)
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
Attacker Value
Unknown

CVE-2020-0067

Disclosure Date: April 17, 2020 (last updated February 21, 2025)
In f2fs_xattr_generic_list of xattr.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: Android. Versions: Android kernel. Android ID: A-120551147.
Attacker Value
Unknown

CVE-2020-1751

Disclosure Date: April 17, 2020 (last updated February 21, 2025)
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.