Количество 19
Количество 19
BDU:2021-01775
Уязвимость алгоритма сжатия данных Brotli, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
ROS-20251125-10
Уязвимость brotli
CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
CVE-2020-8927
Brotli Library Buffer Overflow Vulnerability
CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 ...
openSUSE-SU-2021:3942-1
Security update for brotli
openSUSE-SU-2020:1578-1
Security update for brotli
SUSE-SU-2024:1968-1
Security update for python-Brotli
SUSE-SU-2023:3827-1
Security update for python-brotlipy
SUSE-SU-2023:3670-1
Security update for python-brotlipy
SUSE-SU-2023:3669-1
Security update for python-brotlipy
SUSE-SU-2021:3942-1
Security update for brotli
RLSA-2021:1702
Moderate: brotli security update
GHSA-5v8v-66v8-mwm7
Integer overflow in the bundled Brotli C library
ELSA-2021-1702
ELSA-2021-1702: brotli security update (MODERATE)
ELSA-2022-0830
ELSA-2022-0830: .NET 5.0 security and bugfix update (IMPORTANT)
ELSA-2022-0827
ELSA-2022-0827: .NET Core 3.1 security and bugfix update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2021-01775 Уязвимость алгоритма сжатия данных Brotli, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
ROS-20251125-10 Уязвимость brotli | CVSS3: 6.5 | 0% Низкий | 6 дней назад | |
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | CVSS3: 5.3 | 0% Низкий | около 5 лет назад | |
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | CVSS3: 5.3 | 0% Низкий | около 5 лет назад | |
CVE-2020-8927 Brotli Library Buffer Overflow Vulnerability | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 ... | CVSS3: 5.3 | 0% Низкий | около 5 лет назад | |
openSUSE-SU-2021:3942-1 Security update for brotli | 0% Низкий | почти 4 года назад | ||
openSUSE-SU-2020:1578-1 Security update for brotli | 0% Низкий | около 5 лет назад | ||
SUSE-SU-2024:1968-1 Security update for python-Brotli | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2023:3827-1 Security update for python-brotlipy | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2023:3670-1 Security update for python-brotlipy | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2023:3669-1 Security update for python-brotlipy | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2021:3942-1 Security update for brotli | 0% Низкий | почти 4 года назад | ||
RLSA-2021:1702 Moderate: brotli security update | 0% Низкий | больше 4 лет назад | ||
GHSA-5v8v-66v8-mwm7 Integer overflow in the bundled Brotli C library | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
ELSA-2021-1702 ELSA-2021-1702: brotli security update (MODERATE) | больше 4 лет назад | |||
ELSA-2022-0830 ELSA-2022-0830: .NET 5.0 security and bugfix update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-0827 ELSA-2022-0827: .NET Core 3.1 security and bugfix update (IMPORTANT) | больше 3 лет назад |
Уязвимостей на страницу