Show filters
416 Total Results
Displaying 61-70 of 416
Sort by:
Attacker Value
Unknown
CVE-2020-7069
Disclosure Date: September 29, 2020 (last updated February 22, 2025)
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.
0
Attacker Value
Unknown
CVE-2020-26116
Disclosure Date: September 27, 2020 (last updated February 22, 2025)
http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
0
Attacker Value
Unknown
CVE-2019-20919
Disclosure Date: September 17, 2020 (last updated February 22, 2025)
An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
0
Attacker Value
Unknown
CVE-2020-14392
Disclosure Date: September 16, 2020 (last updated February 22, 2025)
An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
0
Attacker Value
Unknown
CVE-2020-8622
Disclosure Date: August 21, 2020 (last updated February 22, 2025)
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
0
Attacker Value
Unknown
CVE-2020-12674
Disclosure Date: August 12, 2020 (last updated February 21, 2025)
In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.
0
Attacker Value
Unknown
CVE-2020-12673
Disclosure Date: August 12, 2020 (last updated February 21, 2025)
In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2020-12100
Disclosure Date: August 12, 2020 (last updated February 21, 2025)
In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.
0
Attacker Value
Unknown
CVE-2020-14344
Disclosure Date: August 05, 2020 (last updated February 21, 2025)
An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
0
Attacker Value
Unknown
CVE-2020-16166
Disclosure Date: July 30, 2020 (last updated February 21, 2025)
The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.
0