Latest CVE Feed
-
5.5
MEDIUMCVE-2020-8943
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvfrom whose return size was not validated against the requested size. The parameter size is unchecked allowing the attacke... Read more
Affected Products : asylo- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2020-8942
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker t... Read more
Affected Products : asylo- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2020-8941
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to... Read more
Affected Products : asylo- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2020-8940
An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read memory l... Read more
Affected Products : asylo- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2020-8939
An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result size that is used by memcpy() to read memory from within the enclave heap. We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4... Read more
Affected Products : asylo- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2020-8938
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an attacker to write memory values from within the... Read more
Affected Products : asylo- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
5.3
MEDIUMCVE-2020-8937
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to enc_untrusted_create_wait_queue that uses a pointer queue that relies on UntrustedLocalMemcpy, which fails to validate where the pointer is... Read more
Affected Products : asylo- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2020-8936
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an add... Read more
Affected Products : asylo- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8935
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allow an attacker to make an Ecall_restore function call to reallocate untrusted code and overwrite sections of the Enclave memory address. We recommend updating your library.... Read more
Affected Products : asylo- Published: Dec. 15, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8934
The Site Kit by Google plugin for WordPress is vulnerable to Sensitive Information Disclosure in versions up to, and including, 1.8.0 This is due to the lack of capability checks on the admin_enqueue_scripts action which displays the connection key. This ... Read more
Affected Products : site_kit- Published: Jul. 07, 2023
- Modified: Nov. 21, 2024
-
9.3
CRITICALCVE-2020-8933
A vulnerability in Google Cloud Platform's guest-oslogin versions between 20190304 and 20200507 allows a user that is only granted the role "roles/compute.osLogin" to escalate privileges to root. Using the membership to the "lxd" group, an attacker can at... Read more
- Published: Jun. 22, 2020
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. ... Read more
Affected Products : ubuntu_linux fedora debian_linux leap .net_core visual_studio_2019 .net powershell visual_studio_2022 brotli- Published: Sep. 15, 2020
- Modified: Nov. 21, 2024
-
6.1
MEDIUMCVE-2020-8923
An improper HTML sanitization in Dart versions up to and including 2.7.1 and dev versions 2.8.0-dev.16.0, allows an attacker leveraging DOM Clobbering techniques to skip the sanitization and inject custom html/javascript (XSS). Mitigation: update your Dar... Read more
Affected Products : dart_software_development_kit- Published: Mar. 26, 2020
- Modified: Nov. 21, 2024
-
3.5
LOWCVE-2020-8920
An information leak vulnerability exists in Gerrit versions prior to 2.14.22, 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where an overoptimization with the FilteredRepository wrapper skips the verification of access on All-Users repositories, allowing an att... Read more
Affected Products : gerrit- Published: Dec. 10, 2020
- Modified: Nov. 21, 2024
-
3.5
LOWCVE-2020-8919
An information leak vulnerability exists in Gerrit versions prior to 2.15.21, 2.16.25, 3.0.15, 3.1.10, 3.2.5 where a missing access check on the branch REST API allows an attacker with only the default set of priviledges to read all other user's personal ... Read more
Affected Products : gerrit- Published: Dec. 10, 2020
- Modified: Nov. 21, 2024
-
7.1
HIGHCVE-2020-8918
An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can colle... Read more
Affected Products : go-tpm- Published: Aug. 11, 2020
- Modified: Nov. 21, 2024
-
5.5
MEDIUMCVE-2020-8916
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the se... Read more
Affected Products : wpantund- Published: Jul. 07, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8913
A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to insta... Read more
Affected Products : play_core_library- Published: Aug. 12, 2020
- Modified: Nov. 21, 2024
-
2.5
LOWCVE-2020-8912
A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. An attacker with write access to the targeted bucket can change the encryption algorithm of an object in the bucket, which can then allow them ... Read more
Affected Products : aws_s3_crypto_sdk- Published: Aug. 11, 2020
- Modified: Nov. 21, 2024
-
5.6
MEDIUMCVE-2020-8911
A padding oracle vulnerability exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. The SDK allows users to encrypt files with AES-CBC without computing a Message Authentication Code (MAC), which then allows an attacker who has write access to... Read more
Affected Products : aws_s3_crypto_sdk- Published: Aug. 11, 2020
- Modified: Nov. 21, 2024