Known Vulnerabilities for Brotli by Google

Listed below are 1 of the newest known vulnerabilities associated with "Brotli" by "Google".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2020-8927 A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "o... 6.5 - MEDIUM 2020-09-15 2022-04-22

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationGoogleBrotli1.0.9AllAllAll
ApplicationGoogleBrotli1.0.8AllAllAll
ApplicationGoogleBrotli1.0.7AllAllAll
ApplicationGoogleBrotli1.0.6AllAllAll
ApplicationGoogleBrotli1.0.5AllAllAll
ApplicationGoogleBrotli1.0.4AllAllAll
ApplicationGoogleBrotli1.0.3AllAllAll
ApplicationGoogleBrotli1.0.2AllAllAll
ApplicationGoogleBrotli1.0.1AllAllAll
ApplicationGoogleBrotli1.0.0AllAllAll
ApplicationGoogleBrotli0.6.0AllAllAll
ApplicationGoogleBrotli0.5.2AllAllAll
ApplicationGoogleBrotli0.4.0AllAllAll
ApplicationGoogleBrotli0.3.0AllAllAll
ApplicationGoogleBrotli0.2.0AllAllAll
ApplicationGoogleBrotli0.1.0AllAllAll

Popular searches for Brotli

Brotli Open-source compression software library

Brotli is a data format specification for data streams compressed with a specific combination of the general-purpose LZ77 lossless compression algorithm, Huffman coding and 2nd order context modelling. Brotli is a compression algorithm developed by Google and works best for text compression. Brotli is primarily used by web servers and content delivery networks to compress HTTP content, making internet websites load faster.

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report