Search for vulnerabilities
Vulnerability details: VCID-zv7x-wujr-aaaa
Vulnerability ID VCID-zv7x-wujr-aaaa
Aliases BIT-2020-8927
BIT-brotli-2020-8927
BIT-dotnet-2020-8927
BIT-dotnet-sdk-2020-8927
CVE-2020-8927
GHSA-5v8v-66v8-mwm7
PYSEC-2020-29
RUSTSEC-2021-0131
RUSTSEC-2021-0132
Summary A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 6.5 http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html
generic_textual MODERATE http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8927.html
rhas Moderate https://access.redhat.com/errata/RHSA-2021:1702
rhas Important https://access.redhat.com/errata/RHSA-2022:0827
rhas Important https://access.redhat.com/errata/RHSA-2022:0828
rhas Important https://access.redhat.com/errata/RHSA-2022:0829
rhas Important https://access.redhat.com/errata/RHSA-2022:0830
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8927.json
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00307 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00399 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00424 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00954 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.00989 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.01388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.01388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
epss 0.01388 https://api.first.org/data/v1/epss?cve=CVE-2020-8927
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1879225
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8927
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-5v8v-66v8-mwm7
cvssv3.1 6.5 https://github.com/bitemyapp/brotli2-rs
generic_textual MODERATE https://github.com/bitemyapp/brotli2-rs
cvssv3.1 6.5 https://github.com/bitemyapp/brotli2-rs/issues/45
generic_textual MODERATE https://github.com/bitemyapp/brotli2-rs/issues/45
cvssv3.1 6.5 https://github.com/github/advisory-database/issues/785
generic_textual MODERATE https://github.com/github/advisory-database/issues/785
cvssv3.1 6.5 https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6
generic_textual MODERATE https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6
cvssv3.1 6.5 https://github.com/google/brotli/releases/tag/v1.0.8
generic_textual MODERATE https://github.com/google/brotli/releases/tag/v1.0.8
cvssv3.1 6.5 https://github.com/google/brotli/releases/tag/v1.0.9
generic_textual MODERATE https://github.com/google/brotli/releases/tag/v1.0.9
cvssv3.1 6.5 https://github.com/pypa/advisory-database/tree/main/vulns/brotli/PYSEC-2020-29.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/brotli/PYSEC-2020-29.yaml
cvssv3.1 6.5 https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH
cvssv3.1 6.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP
cvssv3.1 6.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I
cvssv3.1 6.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK
cvssv3.1 6.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG
cvssv2 6.4 https://nvd.nist.gov/vuln/detail/CVE-2020-8927
cvssv3 6.5 https://nvd.nist.gov/vuln/detail/CVE-2020-8927
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2020-8927
cvssv3.1 6.5 https://rustsec.org/advisories/RUSTSEC-2021-0131.html
generic_textual MODERATE https://rustsec.org/advisories/RUSTSEC-2021-0131.html
cvssv3.1 6.5 https://rustsec.org/advisories/RUSTSEC-2021-0132.html
generic_textual MODERATE https://rustsec.org/advisories/RUSTSEC-2021-0132.html
archlinux Medium https://security.archlinux.org/AVG-1230
archlinux Medium https://security.archlinux.org/AVG-1231
generic_textual Medium https://ubuntu.com/security/notices/USN-4568-1
cvssv3.1 6.5 https://usn.ubuntu.com/4568-1
generic_textual MODERATE https://usn.ubuntu.com/4568-1
cvssv3.1 6.5 https://www.debian.org/security/2020/dsa-4801
generic_textual MODERATE https://www.debian.org/security/2020/dsa-4801
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8927.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8927.json
https://api.first.org/data/v1/epss?cve=CVE-2020-8927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8927
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/bitemyapp/brotli2-rs
https://github.com/bitemyapp/brotli2-rs/issues/45
https://github.com/github/advisory-database/issues/785
https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6
https://github.com/google/brotli/releases/tag/v1.0.8
https://github.com/google/brotli/releases/tag/v1.0.9
https://github.com/pypa/advisory-database/tree/main/vulns/brotli/PYSEC-2020-29.yaml
https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/
https://rustsec.org/advisories/RUSTSEC-2021-0131.html
https://rustsec.org/advisories/RUSTSEC-2021-0132.html
https://ubuntu.com/security/notices/USN-4568-1
https://usn.ubuntu.com/4568-1
https://usn.ubuntu.com/4568-1/
https://www.debian.org/security/2020/dsa-4801
1879225 https://bugzilla.redhat.com/show_bug.cgi?id=1879225
ASA-202009-12 https://security.archlinux.org/ASA-202009-12
ASA-202009-13 https://security.archlinux.org/ASA-202009-13
AVG-1230 https://security.archlinux.org/AVG-1230
AVG-1231 https://security.archlinux.org/AVG-1231
cpe:2.3:a:google:brotli:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:brotli:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:powershell:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:17.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
CVE-2020-8927 https://nvd.nist.gov/vuln/detail/CVE-2020-8927
GHSA-5v8v-66v8-mwm7 https://github.com/advisories/GHSA-5v8v-66v8-mwm7
RHSA-2021:1702 https://access.redhat.com/errata/RHSA-2021:1702
RHSA-2022:0827 https://access.redhat.com/errata/RHSA-2022:0827
RHSA-2022:0828 https://access.redhat.com/errata/RHSA-2022:0828
RHSA-2022:0829 https://access.redhat.com/errata/RHSA-2022:0829
RHSA-2022:0830 https://access.redhat.com/errata/RHSA-2022:0830
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00108.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8927.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://github.com/bitemyapp/brotli2-rs
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://github.com/bitemyapp/brotli2-rs/issues/45
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://github.com/github/advisory-database/issues/785
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://github.com/google/brotli/releases/tag/v1.0.8
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://github.com/google/brotli/releases/tag/v1.0.9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://github.com/pypa/advisory-database/tree/main/vulns/brotli/PYSEC-2020-29.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://lists.debian.org/debian-lts-announce/2020/12/msg00003.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/356JOYTWW4BWSZ42SEFLV7NYHL3S3AEH
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4E265WKWKYMK2RYYSIXBEGZTDY5IQE6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4VCDOJGL6BK3HB4XRD2WETBPYX2ITF6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMBKACMLSRX7JJSKBTR35UOEP2WFR6QP
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W23CUADGMVMQQNFKHPHXVP7RPZJZNN6I
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WW62OZEY2GHJL4JCOLJRBSRETXDHMWRK
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-8927
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2020-8927
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://nvd.nist.gov/vuln/detail/CVE-2020-8927
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://rustsec.org/advisories/RUSTSEC-2021-0131.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://rustsec.org/advisories/RUSTSEC-2021-0132.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://usn.ubuntu.com/4568-1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Found at https://www.debian.org/security/2020/dsa-4801
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.5088
EPSS Score 0.00307
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.