CVE-2020-8285
- EPSS 0.59%
- Published 14.12.2020 20:15:13
- Last modified 21.11.2024 05:38:39
curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
CVE-2020-8284
- EPSS 0.1%
- Published 14.12.2020 20:15:13
- Last modified 21.11.2024 05:38:39
A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed,...
CVE-2020-25649
- EPSS 0.01%
- Published 03.12.2020 17:15:12
- Last modified 21.11.2024 05:18:20
A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.
CVE-2020-7017
- EPSS 0.92%
- Published 27.07.2020 18:15:14
- Last modified 21.11.2024 05:36:30
In Kibana versions before 6.8.11 and 7.8.1 the region map visualization in contains a stored XSS flaw. An attacker who is able to edit or create a region map visualization could obtain sensitive information or perform destructive actions on behalf of...
CVE-2020-7016
- EPSS 0.38%
- Published 27.07.2020 18:15:14
- Last modified 21.11.2024 05:36:29
Kibana versions before 6.8.11 and 7.8.1 contain a denial of service (DoS) flaw in Timelion. An attacker can construct a URL that when viewed by a Kibana user can lead to the Kibana process consuming large amounts of CPU and becoming unresponsive.
CVE-2020-8203
- EPSS 2.44%
- Published 15.07.2020 17:15:11
- Last modified 21.11.2024 05:38:29
Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
CVE-2020-12723
- EPSS 0.18%
- Published 05.06.2020 15:15:10
- Last modified 21.11.2024 05:00:08
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
CVE-2020-10543
- EPSS 3.94%
- Published 05.06.2020 14:15:10
- Last modified 21.11.2024 04:55:32
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
CVE-2020-10878
- EPSS 0.11%
- Published 05.06.2020 14:15:10
- Last modified 21.11.2024 04:56:16
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
CVE-2020-11022
- EPSS 22.55%
- Published 29.04.2020 22:15:11
- Last modified 21.11.2024 04:56:36
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This prob...