CVE-2020-14382
- EPSS 0.28%
- Veröffentlicht 16.09.2020 15:15:12
- Zuletzt bearbeitet 21.11.2024 05:03:08
A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in fil...
CVE-2020-14393
- EPSS 0.04%
- Veröffentlicht 16.09.2020 14:15:12
- Zuletzt bearbeitet 21.11.2024 05:03:09
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
CVE-2020-14386
- EPSS 0.55%
- Veröffentlicht 16.09.2020 13:15:11
- Zuletzt bearbeitet 21.11.2024 05:03:09
A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.
CVE-2020-14392
- EPSS 0.1%
- Veröffentlicht 16.09.2020 13:15:11
- Zuletzt bearbeitet 21.11.2024 05:03:09
An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
CVE-2020-8927
- EPSS 0.31%
- Veröffentlicht 15.09.2020 10:15:12
- Zuletzt bearbeitet 21.11.2024 05:39:41
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 ...
CVE-2020-14363
- EPSS 0.15%
- Veröffentlicht 11.09.2020 18:15:13
- Zuletzt bearbeitet 21.11.2024 05:03:05
An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest thre...
- EPSS 20.52%
- Veröffentlicht 11.09.2020 17:15:18
- Zuletzt bearbeitet 21.11.2024 05:09:37
<p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p> <p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with th...
CVE-2020-15166
- EPSS 0.3%
- Veröffentlicht 11.09.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:04:59
In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with...
CVE-2020-15169
- EPSS 1.15%
- Veröffentlicht 11.09.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:04:59
In Action View before versions 5.2.4.4 and 6.0.3.3 there is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpe...
CVE-2020-25219
- EPSS 0.59%
- Veröffentlicht 09.09.2020 21:15:11
- Zuletzt bearbeitet 21.11.2024 05:17:41
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.