Количество 34
Количество 34
RLSA-2022:0830
Important: .NET 5.0 security and bugfix update
RLSA-2022:0827
Important: .NET Core 3.1 security and bugfix update
ELSA-2022-0830
ELSA-2022-0830: .NET 5.0 security and bugfix update (IMPORTANT)
ELSA-2022-0827
ELSA-2022-0827: .NET Core 3.1 security and bugfix update (IMPORTANT)
RLSA-2022:826
Important: .NET 6.0 security and bugfix update
RLSA-2022:0826
Important: .NET 6.0 security and bugfix update
ELSA-2022-0826
ELSA-2022-0826: .NET 6.0 security and bugfix update (IMPORTANT)
CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
CVE-2020-8927
Brotli Library Buffer Overflow Vulnerability
CVE-2020-8927
A buffer overflow exists in the Brotli library versions prior to 1.0.8 ...
openSUSE-SU-2021:3942-1
Security update for brotli
openSUSE-SU-2020:1578-1
Security update for brotli
SUSE-SU-2024:1968-1
Security update for python-Brotli
SUSE-SU-2023:3827-1
Security update for python-brotlipy
SUSE-SU-2023:3670-1
Security update for python-brotlipy
SUSE-SU-2023:3669-1
Security update for python-brotlipy
SUSE-SU-2021:3942-1
Security update for brotli
RLSA-2021:1702
Moderate: brotli security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2022:0830 Important: .NET 5.0 security and bugfix update | почти 4 года назад | |||
RLSA-2022:0827 Important: .NET Core 3.1 security and bugfix update | почти 4 года назад | |||
ELSA-2022-0830 ELSA-2022-0830: .NET 5.0 security and bugfix update (IMPORTANT) | почти 4 года назад | |||
ELSA-2022-0827 ELSA-2022-0827: .NET Core 3.1 security and bugfix update (IMPORTANT) | почти 4 года назад | |||
RLSA-2022:826 Important: .NET 6.0 security and bugfix update | почти 4 года назад | |||
RLSA-2022:0826 Important: .NET 6.0 security and bugfix update | почти 4 года назад | |||
ELSA-2022-0826 ELSA-2022-0826: .NET 6.0 security and bugfix update (IMPORTANT) | почти 4 года назад | |||
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | CVSS3: 5.3 | 0% Низкий | около 5 лет назад | |
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | CVSS3: 6.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. | CVSS3: 5.3 | 0% Низкий | около 5 лет назад | |
CVE-2020-8927 Brotli Library Buffer Overflow Vulnerability | CVSS3: 6.5 | 0% Низкий | почти 4 года назад | |
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 ... | CVSS3: 5.3 | 0% Низкий | около 5 лет назад | |
openSUSE-SU-2021:3942-1 Security update for brotli | 0% Низкий | около 4 лет назад | ||
openSUSE-SU-2020:1578-1 Security update for brotli | 0% Низкий | около 5 лет назад | ||
SUSE-SU-2024:1968-1 Security update for python-Brotli | 0% Низкий | больше 1 года назад | ||
SUSE-SU-2023:3827-1 Security update for python-brotlipy | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2023:3670-1 Security update for python-brotlipy | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2023:3669-1 Security update for python-brotlipy | 0% Низкий | около 2 лет назад | ||
SUSE-SU-2021:3942-1 Security update for brotli | 0% Низкий | около 4 лет назад | ||
RLSA-2021:1702 Moderate: brotli security update | 0% Низкий | больше 4 лет назад |
Уязвимостей на страницу