Vulnerabilities > Canonical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-05-22 | CVE-2020-12397 | Origin Validation Error vulnerability in multiple products By encoding Unicode whitespace characters within the From email header, an attacker can spoof the sender email address that Thunderbird displays. | 4.3 |
2020-05-22 | CVE-2020-13398 | Out-of-bounds Write vulnerability in multiple products An issue was discovered in FreeRDP before 2.1.1. | 8.3 |
2020-05-22 | CVE-2020-13397 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in FreeRDP before 2.1.1. | 5.5 |
2020-05-22 | CVE-2020-13396 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in FreeRDP before 2.1.1. | 7.1 |
2020-05-22 | CVE-2020-10711 | NULL Pointer Dereference vulnerability in multiple products A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. | 5.9 |
2020-05-21 | CVE-2020-13113 | Use of Uninitialized Resource vulnerability in multiple products An issue was discovered in libexif before 0.6.22. | 6.4 |
2020-05-21 | CVE-2020-13114 | Allocation of Resources Without Limits or Throttling vulnerability in multiple products An issue was discovered in libexif before 0.6.22. | 5.0 |
2020-05-21 | CVE-2020-13112 | Out-of-bounds Read vulnerability in multiple products An issue was discovered in libexif before 0.6.22. | 9.1 |
2020-05-21 | CVE-2020-6463 | Use After Free vulnerability in multiple products Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | 8.8 |
2020-05-20 | CVE-2020-9484 | Deserialization of Untrusted Data vulnerability in multiple products When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. | 7.0 |