Количество 18
Количество 18

CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVE-2020-8927
Brotli Library Buffer Overflow Vulnerability
CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 ...

openSUSE-SU-2021:3942-1
Security update for brotli

openSUSE-SU-2020:1578-1
Security update for brotli

SUSE-SU-2024:1968-1
Security update for python-Brotli

SUSE-SU-2023:3827-1
Security update for python-brotlipy

SUSE-SU-2023:3670-1
Security update for python-brotlipy

SUSE-SU-2023:3669-1
Security update for python-brotlipy

SUSE-SU-2021:3942-1
Security update for brotli

RLSA-2021:1702
Moderate: brotli security update
GHSA-5v8v-66v8-mwm7
Integer overflow in the bundled Brotli C library
ELSA-2021-1702
ELSA-2021-1702: brotli security update (MODERATE)

BDU:2021-01775
Уязвимость алгоритма сжатия данных Brotli, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
ELSA-2022-0830
ELSA-2022-0830: .NET 5.0 security and bugfix update (IMPORTANT)
ELSA-2022-0827
ELSA-2022-0827: .NET Core 3.1 security and bugfix update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | CVSS3: 5.3 | 0% Низкий | почти 5 лет назад |
![]() | CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | CVSS3: 6.5 | 0% Низкий | почти 5 лет назад |
![]() | CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | CVSS3: 5.3 | 0% Низкий | почти 5 лет назад |
![]() | CVE-2020-8927 Brotli Library Buffer Overflow Vulnerability | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад |
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 ... | CVSS3: 5.3 | 0% Низкий | почти 5 лет назад | |
![]() | openSUSE-SU-2021:3942-1 Security update for brotli | 0% Низкий | больше 3 лет назад | |
![]() | openSUSE-SU-2020:1578-1 Security update for brotli | 0% Низкий | больше 4 лет назад | |
![]() | SUSE-SU-2024:1968-1 Security update for python-Brotli | 0% Низкий | около 1 года назад | |
![]() | SUSE-SU-2023:3827-1 Security update for python-brotlipy | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:3670-1 Security update for python-brotlipy | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3669-1 Security update for python-brotlipy | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2021:3942-1 Security update for brotli | 0% Низкий | больше 3 лет назад | |
![]() | RLSA-2021:1702 Moderate: brotli security update | 0% Низкий | около 4 лет назад | |
GHSA-5v8v-66v8-mwm7 Integer overflow in the bundled Brotli C library | CVSS3: 6.5 | 0% Низкий | около 3 лет назад | |
ELSA-2021-1702 ELSA-2021-1702: brotli security update (MODERATE) | около 4 лет назад | |||
![]() | BDU:2021-01775 Уязвимость алгоритма сжатия данных Brotli, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | почти 5 лет назад |
ELSA-2022-0830 ELSA-2022-0830: .NET 5.0 security and bugfix update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-0827 ELSA-2022-0827: .NET Core 3.1 security and bugfix update (IMPORTANT) | больше 3 лет назад |
Уязвимостей на страницу