CVE-2021-22876
- EPSS 0.06%
- Published 01.04.2021 18:15:12
- Last modified 09.06.2025 15:15:23
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically...
CVE-2020-1971
- EPSS 0.34%
- Published 08.12.2020 16:15:11
- Last modified 21.11.2024 05:11:45
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they...
- EPSS 0.08%
- Published 28.11.2020 07:15:11
- Last modified 21.11.2024 05:23:55
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
- EPSS 0.45%
- Published 22.10.2020 21:15:12
- Last modified 21.11.2024 04:31:31
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer ove...
CVE-2020-25221
- EPSS 0.19%
- Published 10.09.2020 14:15:17
- Last modified 21.11.2024 05:17:41
get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount...
CVE-2020-15778
- EPSS 61.48%
- Published 24.07.2020 14:15:12
- Last modified 28.07.2025 18:12:45
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous arg...
CVE-2020-14145
- EPSS 1.25%
- Published 29.06.2020 18:15:11
- Last modified 21.11.2024 05:02:44
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has ...
CVE-2020-10690
- EPSS 0.02%
- Published 08.05.2020 15:15:11
- Last modified 21.11.2024 04:55:51
There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes ...
CVE-2020-12465
- EPSS 0.17%
- Published 29.04.2020 19:15:12
- Last modified 21.11.2024 04:59:45
An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.
CVE-2020-12464
- EPSS 0.08%
- Published 29.04.2020 18:15:13
- Last modified 21.11.2024 04:59:45
usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.