CVE-2021-22876
- EPSS 0.06%
- Veröffentlicht 01.04.2021 18:15:12
- Zuletzt bearbeitet 09.06.2025 15:15:23
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically...
CVE-2020-1971
- EPSS 0.34%
- Veröffentlicht 08.12.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:11:45
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they...
- EPSS 0.08%
- Veröffentlicht 28.11.2020 07:15:11
- Zuletzt bearbeitet 21.11.2024 05:23:55
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
- EPSS 0.45%
- Veröffentlicht 22.10.2020 21:15:12
- Zuletzt bearbeitet 21.11.2024 04:31:31
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer ove...
CVE-2020-25221
- EPSS 0.19%
- Veröffentlicht 10.09.2020 14:15:17
- Zuletzt bearbeitet 21.11.2024 05:17:41
get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount...
CVE-2020-15778
- EPSS 61.48%
- Veröffentlicht 24.07.2020 14:15:12
- Zuletzt bearbeitet 28.07.2025 18:12:45
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous arg...
CVE-2020-14145
- EPSS 1.25%
- Veröffentlicht 29.06.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 05:02:44
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has ...
CVE-2020-10690
- EPSS 0.02%
- Veröffentlicht 08.05.2020 15:15:11
- Zuletzt bearbeitet 21.11.2024 04:55:51
There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes ...
CVE-2020-12465
- EPSS 0.17%
- Veröffentlicht 29.04.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 04:59:45
An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.
CVE-2020-12464
- EPSS 0.08%
- Veröffentlicht 29.04.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 04:59:45
usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.