Show filters
91 Total Results
Displaying 61-70 of 91
Sort by:
Attacker Value
Unknown
CVE-2019-17006
Disclosure Date: October 22, 2020 (last updated February 22, 2025)
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
0
Attacker Value
Unknown
CVE-2020-25645
Disclosure Date: October 13, 2020 (last updated February 22, 2025)
A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
0
Attacker Value
Unknown
CVE-2020-25221
Disclosure Date: September 10, 2020 (last updated February 22, 2025)
get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.
0
Attacker Value
Unknown
CVE-2020-15778
Disclosure Date: July 24, 2020 (last updated February 21, 2025)
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
0
Attacker Value
Unknown
CVE-2020-13817
Disclosure Date: June 04, 2020 (last updated February 21, 2025)
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.
0
Attacker Value
Unknown
CVE-2020-13631
Disclosure Date: May 27, 2020 (last updated November 08, 2023)
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
0
Attacker Value
Unknown
CVE-2020-13630
Disclosure Date: May 27, 2020 (last updated February 21, 2025)
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
0
Attacker Value
Unknown
CVE-2020-13632
Disclosure Date: May 27, 2020 (last updated February 21, 2025)
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
0
Attacker Value
Unknown
CVE-2020-12769
Disclosure Date: May 09, 2020 (last updated February 21, 2025)
An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.
0
Attacker Value
Unknown
CVE-2020-10690
Disclosure Date: May 08, 2020 (last updated February 21, 2025)
There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.
0