Show filters
433 Total Results
Displaying 81-90 of 433
Sort by:
Attacker Value
Unknown
CVE-2020-11049
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0.
0
Attacker Value
Unknown
CVE-2020-11048
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bounds read. It only allows to abort a session. No data extraction is possible. This has been fixed in 2.0.0.
0
Attacker Value
Unknown
CVE-2020-11047
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0.
0
Attacker Value
Unknown
CVE-2020-11044
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0.
0
Attacker Value
Unknown
CVE-2020-11045
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour.
0
Attacker Value
Unknown
CVE-2020-11046
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is a stream out-of-bounds seek in update_read_synchronize that could lead to a later out-of-bounds read.
0
Attacker Value
Unknown
CVE-2020-11042
Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
0
Attacker Value
Unknown
CVE-2020-1752
Disclosure Date: April 30, 2020 (last updated February 21, 2025)
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
0
Attacker Value
Unknown
CVE-2020-11884
Disclosure Date: April 29, 2020 (last updated February 21, 2025)
In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur.
0
Attacker Value
Unknown
CVE-2020-12243
Disclosure Date: April 28, 2020 (last updated February 21, 2025)
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
0