CVE-2020-9431
- EPSS 4.4%
- Veröffentlicht 27.02.2020 23:15:13
- Zuletzt bearbeitet 21.11.2024 05:40:37
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
CVE-2020-6383
- EPSS 24.92%
- Veröffentlicht 27.02.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:35:37
Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-6384
- EPSS 2.43%
- Veröffentlicht 27.02.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:35:37
Use after free in WebAudio in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-6386
- EPSS 2.53%
- Veröffentlicht 27.02.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:35:37
Use after free in speech in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-6418
- EPSS 85.05%
- Veröffentlicht 27.02.2020 23:15:12
- Zuletzt bearbeitet 24.10.2025 21:04:01
Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2020-9428
- EPSS 8.18%
- Veröffentlicht 27.02.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:40:37
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the EAP dissector could crash. This was addressed in epan/dissectors/packet-eap.c by using more careful sscanf parsing.
CVE-2020-9430
- EPSS 3.61%
- Veröffentlicht 27.02.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:40:37
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the WiMax DLMAP dissector could crash. This was addressed in plugins/epan/wimax/msg_dlmap.c by validating a length field.
CVE-2020-7041
- EPSS 0.84%
- Veröffentlicht 27.02.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 05:36:32
An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.
CVE-2020-7042
- EPSS 0.62%
- Veröffentlicht 27.02.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 05:36:32
An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (o...
CVE-2020-7043
- EPSS 0.47%
- Veröffentlicht 27.02.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 05:36:32
An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL before 1.0.2. tunnel.c mishandles certificate validation because hostname comparisons do not consider '\0' characters, as demonstrated by a good.example.com\x00evil.example.com att...