Show filters
189 Total Results
Displaying 31-40 of 189
Sort by:
Attacker Value
Unknown
CVE-2020-8489
Disclosure Date: April 29, 2020 (last updated February 21, 2025)
Insufficient protection of the inter-process communication functions in ABB System 800xA Information Management (all published versions) enables an attacker authenticated on the local system to inject data, affecting the runtime values to be stored in the archive, or making Information Management history services unavailable.
0
Attacker Value
Unknown
CVE-2020-8486
Disclosure Date: April 29, 2020 (last updated February 21, 2025)
Insufficient protection of the inter-process communication functions in ABB System 800xA RNRP (all published versions) enables an attacker authenticated on the local system to inject data, affect node redundancy handling.
0
Attacker Value
Unknown
CVE-2020-8488
Disclosure Date: April 29, 2020 (last updated February 21, 2025)
Insufficient protection of the inter-process communication functions in ABB System 800xA Batch Management (all published versions) enables an attacker authenticated on the local system to inject data, affecting User Interface update during batch execution and/or compare/printing functionalities.
0
Attacker Value
Unknown
CVE-2020-8478
Disclosure Date: April 29, 2020 (last updated February 21, 2025)
Insufficient protection of the inter-process communication functions in ABB System 800xA products OPC Server for AC 800M, MMS Server for AC 800M and Base Software for SoftControl (all published versions) enables an attacker authenticated on the local system to inject data, affecting the online view of runtime data shown in Control Builder.
0
Attacker Value
Unknown
CVE-2020-8484
Disclosure Date: April 29, 2020 (last updated February 21, 2025)
Insufficient protection of the inter-process communication functions in ABB System 800xA for DCI (all published versions) enables an attacker authenticated on the local system to inject data, allowing reads and writes to the controllers or cause windows processes to crash.
0
Attacker Value
Unknown
CVE-2020-8487
Disclosure Date: April 29, 2020 (last updated February 21, 2025)
Insufficient protection of the inter-process communication functions in ABB System 800xA Base (all published versions) enables an attacker authenticated on the local system to inject data, affect node redundancy handling.
0
Attacker Value
Unknown
CVE-2020-7352
Disclosure Date: April 28, 2020 (last updated February 21, 2025)
The GalaxyClientService component of GOG Galaxy runs with elevated SYSTEM privileges in a Windows environment. Due to the software shipping with embedded, static RSA private key, an attacker with this key material and local user permissions can effectively send any operating system command to the service for execution in this elevated context. The service listens for such commands on a locally-bound network port, localhost:9978. A Metasploit module has been published which exploits this vulnerability. This issue affects the 2.0.x branch of the software (2.0.12 and earlier) as well as the 1.2.x branch (1.2.64 and earlier). A fix was issued for the 2.0.x branch of the affected software.
0
Attacker Value
Unknown
CVE-2019-19107
Disclosure Date: April 22, 2020 (last updated February 21, 2025)
The Configuration pages in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway for user profiles and services transfer the password in plaintext (although hidden when displayed).
0
Attacker Value
Unknown
CVE-2019-19106
Disclosure Date: April 22, 2020 (last updated February 21, 2025)
Improper implementation of Access Control in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway allows an unauthorized user to access data marked as restricted, such as viewing or editing user profiles and application settings.
0
Attacker Value
Unknown
CVE-2020-7255
Disclosure Date: April 14, 2020 (last updated February 21, 2025)
Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration.
0