Show filters
1,988 Total Results
Displaying 841-850 of 1,988
Sort by:
Attacker Value
Unknown
CVE-2020-12723
Disclosure Date: June 05, 2020 (last updated February 21, 2025)
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
0
Attacker Value
Unknown
CVE-2020-10543
Disclosure Date: June 05, 2020 (last updated February 21, 2025)
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
0
Attacker Value
Unknown
CVE-2020-1059
Disclosure Date: May 21, 2020 (last updated February 21, 2025)
A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content, aka 'Microsoft Edge Spoofing Vulnerability'.
0
Attacker Value
Unknown
CVE-2020-1096
Disclosure Date: May 21, 2020 (last updated November 27, 2024)
A remote code execution vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory, aka 'Microsoft Edge PDF Remote Code Execution Vulnerability'.
0
Attacker Value
Unknown
CVE-2020-1065
Disclosure Date: May 21, 2020 (last updated February 21, 2025)
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'.
0
Attacker Value
Unknown
CVE-2020-1195
Disclosure Date: May 21, 2020 (last updated February 21, 2025)
An elevation of privilege vulnerability exists in Microsoft Edge (Chromium-based) when the Feedback extension improperly validates input, aka 'Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability'.
0
Attacker Value
Unknown
CVE-2020-1037
Disclosure Date: May 21, 2020 (last updated February 21, 2025)
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based), aka 'Chakra Scripting Engine Memory Corruption Vulnerability'.
0
Attacker Value
Unknown
CVE-2020-1056
Disclosure Date: May 21, 2020 (last updated November 27, 2024)
An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain.In a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability, aka 'Microsoft Edge Elevation of Privilege Vulnerability'.
0
Attacker Value
Unknown
CVE-2020-12771
Disclosure Date: May 09, 2020 (last updated February 21, 2025)
An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
0
Attacker Value
Unknown
CVE-2020-12144
Disclosure Date: May 05, 2020 (last updated February 21, 2025)
The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated. This makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted portal.
0