Show filters
4,245 Total Results
Displaying 681-690 of 4,245
Sort by:
Attacker Value
Unknown

CVE-2019-19921

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
Attacker Value
Unknown

CVE-2018-14553

Disclosure Date: February 11, 2020 (last updated February 21, 2025)
gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).
Attacker Value
Unknown

CVE-2020-5529

Disclosure Date: February 11, 2020 (last updated February 21, 2025)
HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way, hence a malicious JavaScript code can execute arbitrary Java code on the application.
Attacker Value
Unknown

CVE-2020-1700

Disclosure Date: February 07, 2020 (last updated February 21, 2025)
A flaw was found in the way the Ceph RGW Beast front-end handles unexpected disconnects. An authenticated attacker can abuse this flaw by making multiple disconnect attempts resulting in a permanent leak of a socket connection by radosgw. This flaw could lead to a denial of service condition by pile up of CLOSE_WAIT sockets, eventually leading to the exhaustion of available resources, preventing legitimate users from connecting to the system.
Attacker Value
Unknown

CVE-2014-1958

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
Buffer overflow in the DecodePSDPixels function in coders/psd.c in ImageMagick before 6.8.8-5 might allow remote attackers to execute arbitrary code via a crafted PSD image, involving the L%06ld string, a different vulnerability than CVE-2014-2030.
Attacker Value
Unknown

CVE-2014-2030

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
Stack-based buffer overflow in the WritePSDImage function in coders/psd.c in ImageMagick, possibly 6.8.8-5, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PSD image, involving the L%06ld string, a different vulnerability than CVE-2014-1947.
Attacker Value
Unknown

CVE-2016-9928

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
MCabber before 1.0.4 is vulnerable to roster push attacks, which allows remote attackers to intercept communications, or add themselves as an entity on a 3rd party's roster as another user, which will also garner associated privileges, via crafted XMPP packets.
Attacker Value
Unknown

CVE-2020-8648

Disclosure Date: February 06, 2020 (last updated February 21, 2025)
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
Attacker Value
Unknown

CVE-2020-3123

Disclosure Date: February 05, 2020 (last updated February 21, 2025)
A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
Attacker Value
Unknown

CVE-2020-8632

Disclosure Date: February 05, 2020 (last updated February 21, 2025)
In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.