Show filters
433 Total Results
Displaying 81-90 of 433
Sort by:
Attacker Value
Unknown

CVE-2020-11049

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bound read of client memory that is then passed on to the protocol parser. This has been patched in 2.0.0.
Attacker Value
Unknown

CVE-2020-11048

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bounds read. It only allows to abort a session. No data extraction is possible. This has been fixed in 2.0.0.
Attacker Value
Unknown

CVE-2020-11047

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.1 and before 2.0.0, there is an out-of-bounds read in autodetect_recv_bandwidth_measure_results. A malicious server can extract up to 8 bytes of client memory with a manipulated message by providing a short input and reading the measurement result data. This has been patched in 2.0.0.
Attacker Value
Unknown

CVE-2020-11044

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP greater than 1.2 and before 2.0.0, a double free in update_read_cache_bitmap_v3_order crashes the client application if corrupted data from a manipulated server is parsed. This has been patched in 2.0.0.
Attacker Value
Unknown

CVE-2020-11045

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is an out-of-bound read in in update_read_bitmap_data that allows client memory to be read to an image buffer. The result displayed on screen as colour.
Attacker Value
Unknown

CVE-2020-11046

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP after 1.0 and before 2.0.0, there is a stream out-of-bounds seek in update_read_synchronize that could lead to a later out-of-bounds read.
Attacker Value
Unknown

CVE-2020-11042

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2.0.0.
Attacker Value
Unknown

CVE-2020-1752

Disclosure Date: April 30, 2020 (last updated February 21, 2025)
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
Attacker Value
Unknown

CVE-2020-11884

Disclosure Date: April 29, 2020 (last updated February 21, 2025)
In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur.
Attacker Value
Unknown

CVE-2020-12243

Disclosure Date: April 28, 2020 (last updated February 21, 2025)
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).