Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
outside in technology vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2020-27845
There's a flaw in src/lib/openjp2/pi.c of openjpeg in versions before 2.4.0. If an attacker is able to provide untrusted input to openjpeg's conversion/encoding functionality, they could cause an out-of-bounds read. The highest impact of this flaw is to application avai...
Uclouvain Openjpeg
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Oracle Outside In Technology 8.5.5
4.3
CVSSv2
CVE-2020-27841
There's a flaw in openjpeg in versions before 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by the openjpeg encoder, this could cause an out-of-bounds read. The greatest impact from this flaw is to application availability.
Uclouvain Openjpeg
Fedoraproject Fedora 32
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Oracle Outside In Technology 8.5.5
8.3
CVSSv2
CVE-2020-27844
A flaw was found in openjpeg's src/lib/openjp2/t2.c in versions before 2.4.0. This flaw allows an malicious user to provide crafted input to openjpeg during conversion and encoding, causing an out-of-bounds write. The highest threat from this vulnerability is to confidential...
Uclouvain Openjpeg
Debian Debian Linux 9.0
Oracle Outside In Technology 8.5.5
5.8
CVSSv2
CVE-2020-15389
jp2/opj_decompress.c in OpenJPEG up to and including 2.3.1 has a use-after-free that can be triggered if there is a mix of valid and invalid files in a directory operated on by the decompressor. Triggering a double-free may also be possible. This is related to calling opj_image_d...
Uclouvain Openjpeg
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Oracle Outside In Technology 8.5.4
Oracle Outside In Technology 8.5.5
2.1
CVSSv2
CVE-2020-15358
In SQLite prior to 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
Sqlite Sqlite
Canonical Ubuntu Linux 20.04
Apple Iphone Os
Apple Watchos
Apple Icloud
Apple Tvos
Apple Ipados
Apple Macos
Oracle Outside In Technology 8.5.4
Oracle Outside In Technology 8.5.5
Oracle Hyperion Infrastructure Technology 11.1.2.4
Oracle Enterprise Manager Ops Center 12.4.0.0
Oracle Communications Network Charging And Control 12.0.2
Oracle Mysql
Oracle Communications Network Charging And Control 6.0.1
Oracle Communications Messaging Server 8.1
Oracle Communications Cloud Native Core Policy 1.14.0
Siemens Sinec Infrastructure Network Services
4.4
CVSSv2
CVE-2020-13630
ext/fts3/fts3.c in SQLite prior to 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
Sqlite Sqlite
Fedoraproject Fedora 32
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Netapp Cloud Backup -
Netapp Solidfire\\, Enterprise Sds \\& Hci Storage Node -
Brocade Fabric Operating System -
Netapp Hci Compute Node Firmware -
Debian Debian Linux 9.0
Siemens Sinec Infrastructure Network Services
Apple Iphone Os
Apple Watchos
Apple Tvos
Apple Ipados
Apple Icloud
Apple Itunes
Apple Macos
Oracle Outside In Technology 8.5.4
Oracle Outside In Technology 8.5.5
Oracle Communications Network Charging And Control 6.0.1
2.1
CVSSv2
CVE-2020-13631
SQLite prior to 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
Sqlite Sqlite
Fedoraproject Fedora 32
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Netapp Cloud Backup -
Netapp Solidfire\\, Enterprise Sds \\& Hci Storage Node -
Brocade Fabric Operating System -
Netapp Hci Compute Node Firmware -
Siemens Sinec Infrastructure Network Services
Apple Iphone Os
Apple Watchos
Apple Tvos
Apple Ipados
Apple Icloud
Apple Itunes
Apple Macos
Oracle Outside In Technology 8.5.4
Oracle Outside In Technology 8.5.5
Oracle Communications Network Charging And Control 6.0.1
Oracle Communications Network Charging And Control
1 Github repository
2.1
CVSSv2
CVE-2020-13632
ext/fts3/fts3_snippet.c in SQLite prior to 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
Sqlite Sqlite
Fedoraproject Fedora 32
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Netapp Cloud Backup -
Netapp Solidfire\\, Enterprise Sds \\& Hci Storage Node -
Brocade Fabric Operating System -
Netapp Hci Compute Node Firmware -
Debian Debian Linux 9.0
Siemens Sinec Infrastructure Network Services
Oracle Outside In Technology 8.5.4
Oracle Outside In Technology 8.5.5
Oracle Communications Network Charging And Control 6.0.1
Oracle Communications Network Charging And Control
Oracle Zfs Storage Appliance Kit 8.8
2.1
CVSSv2
CVE-2020-13434
SQLite up to and including 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
Sqlite Sqlite
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Fedoraproject Fedora 32
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 12.0
Freebsd Freebsd 12.1
Freebsd Freebsd 11.4
Freebsd Freebsd
Oracle Outside In Technology 8.5.5
Oracle Communications Network Charging And Control 6.0.1
Oracle Communications Network Charging And Control
Oracle Communications Cloud Native Core Policy 1.14.0
Apple Iphone Os
Apple Watchos
Apple Tvos
Apple Ipados
Apple Icloud
Apple Itunes
2 Github repositories
7.5
CVSSv2
CVE-2020-2786
Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Outside In Filters). Supported versions that is affected is 8.5.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle ...
Oracle Outside In Technology 8.5.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »