Логотип exploitDog
bind:"CVE-2020-8927" OR bind:"CVE-2022-24464" OR bind:"CVE-2022-24512"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-8927" OR bind:"CVE-2022-24464" OR bind:"CVE-2022-24512"

Количество 34

Количество 34

rocky логотип

RLSA-2022:0830

почти 4 года назад

Important: .NET 5.0 security and bugfix update

EPSS: Низкий
rocky логотип

RLSA-2022:0827

почти 4 года назад

Important: .NET Core 3.1 security and bugfix update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-0830

почти 4 года назад

ELSA-2022-0830: .NET 5.0 security and bugfix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-0827

почти 4 года назад

ELSA-2022-0827: .NET Core 3.1 security and bugfix update (IMPORTANT)

EPSS: Низкий
rocky логотип

RLSA-2022:826

почти 4 года назад

Important: .NET 6.0 security and bugfix update

EPSS: Низкий
rocky логотип

RLSA-2022:0826

почти 4 года назад

Important: .NET 6.0 security and bugfix update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-0826

почти 4 года назад

ELSA-2022-0826: .NET 6.0 security and bugfix update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2020-8927

около 5 лет назад

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2020-8927

больше 5 лет назад

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2020-8927

около 5 лет назад

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2020-8927

почти 4 года назад

Brotli Library Buffer Overflow Vulnerability

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2020-8927

около 5 лет назад

A buffer overflow exists in the Brotli library versions prior to 1.0.8 ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3942-1

около 4 лет назад

Security update for brotli

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1578-1

около 5 лет назад

Security update for brotli

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1968-1

больше 1 года назад

Security update for python-Brotli

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3827-1

около 2 лет назад

Security update for python-brotlipy

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3670-1

около 2 лет назад

Security update for python-brotlipy

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3669-1

около 2 лет назад

Security update for python-brotlipy

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3942-1

около 4 лет назад

Security update for brotli

EPSS: Низкий
rocky логотип

RLSA-2021:1702

больше 4 лет назад

Moderate: brotli security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2022:0830

Important: .NET 5.0 security and bugfix update

почти 4 года назад
rocky логотип
RLSA-2022:0827

Important: .NET Core 3.1 security and bugfix update

почти 4 года назад
oracle-oval логотип
ELSA-2022-0830

ELSA-2022-0830: .NET 5.0 security and bugfix update (IMPORTANT)

почти 4 года назад
oracle-oval логотип
ELSA-2022-0827

ELSA-2022-0827: .NET Core 3.1 security and bugfix update (IMPORTANT)

почти 4 года назад
rocky логотип
RLSA-2022:826

Important: .NET 6.0 security and bugfix update

почти 4 года назад
rocky логотип
RLSA-2022:0826

Important: .NET 6.0 security and bugfix update

почти 4 года назад
oracle-oval логотип
ELSA-2022-0826

ELSA-2022-0826: .NET 6.0 security and bugfix update (IMPORTANT)

почти 4 года назад
ubuntu логотип
CVE-2020-8927

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVSS3: 5.3
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-8927

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVSS3: 6.5
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-8927

A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.

CVSS3: 5.3
0%
Низкий
около 5 лет назад
msrc логотип
CVE-2020-8927

Brotli Library Buffer Overflow Vulnerability

CVSS3: 6.5
0%
Низкий
почти 4 года назад
debian логотип
CVE-2020-8927

A buffer overflow exists in the Brotli library versions prior to 1.0.8 ...

CVSS3: 5.3
0%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2021:3942-1

Security update for brotli

0%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1578-1

Security update for brotli

0%
Низкий
около 5 лет назад
suse-cvrf логотип
SUSE-SU-2024:1968-1

Security update for python-Brotli

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3827-1

Security update for python-brotlipy

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3670-1

Security update for python-brotlipy

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3669-1

Security update for python-brotlipy

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2021:3942-1

Security update for brotli

0%
Низкий
около 4 лет назад
rocky логотип
RLSA-2021:1702

Moderate: brotli security update

0%
Низкий
больше 4 лет назад

Уязвимостей на страницу