Show filters
35,618 Total Results
Displaying 41-50 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
High
CVE-2021-36955
Disclosure Date: September 15, 2021 (last updated December 29, 2023)
Windows Common Log File System Driver Elevation of Privilege Vulnerability
4
Attacker Value
Moderate
CVE-2021-31201
Disclosure Date: June 08, 2021 (last updated October 07, 2023)
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
3
Attacker Value
Moderate
CVE-2021-31199
Disclosure Date: June 08, 2021 (last updated October 07, 2023)
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
3
Attacker Value
Low
CVE-2020-17382
Disclosure Date: October 02, 2020 (last updated October 07, 2023)
The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).
3
Attacker Value
Low
ADV200006 - Type 1 Font Parsing Remote Code Execution Vulnerability in Windows
Disclosure Date: April 15, 2020 (last updated October 06, 2023)
A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Adobe Font Manager Library Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1020.
1
Attacker Value
Moderate
CVE-2020-0787 Windows BITS Privesc
Disclosure Date: March 12, 2020 (last updated October 06, 2023)
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
1
Attacker Value
Low
CVE-2019-18634
Disclosure Date: January 29, 2020 (last updated November 08, 2023)
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
0
Attacker Value
Moderate
CVE-2019-2215
Disclosure Date: October 11, 2019 (last updated October 06, 2023)
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
1
Attacker Value
Unknown
CVE-2023-20867
Disclosure Date: June 13, 2023 (last updated October 08, 2023)
A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.
4
Attacker Value
Moderate
CVE-2023-20178
Disclosure Date: June 07, 2023 (last updated January 25, 2024)
A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established.
This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
3