Show filters
155 Total Results
Displaying 131-140 of 155
Sort by:
Attacker Value
Unknown

CVE-2020-0586

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Improper initialization in subsystem for Intel(R) SPS versions before SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0 may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access.
Attacker Value
Unknown

CVE-2020-0529

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Improper initialization in BIOS firmware for 8th, 9th and 10th Generation Intel(R) Core(TM) Processor families may allow an unauthenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2020-9833

Disclosure Date: June 09, 2020 (last updated February 21, 2025)
A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.5. A local user may be able to read kernel memory.
Attacker Value
Unknown

CVE-2020-10725

Disclosure Date: May 20, 2020 (last updated February 21, 2025)
A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
Attacker Value
Unknown

CVE-2020-3811

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
qmail-verify as used in netqmail 1.06 is prone to a mail-address verification bypass vulnerability.
Attacker Value
Unknown

CVE-2020-11655

Disclosure Date: April 09, 2020 (last updated February 21, 2025)
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
Attacker Value
Unknown

CVE-2020-1617

Disclosure Date: April 08, 2020 (last updated February 21, 2025)
This issue occurs on Juniper Networks Junos OS devices which do not support Advanced Forwarding Interface (AFI) / Advanced Forwarding Toolkit (AFT). Devices using AFI and AFT are not exploitable to this issue. An improper initialization of memory in the packet forwarding architecture in Juniper Networks Junos OS non-AFI/AFT platforms which may lead to a Denial of Service (DoS) vulnerability being exploited when a genuine packet is received and inspected by non-AFT/AFI sFlow and when the device is also configured with firewall policers. This first genuine packet received and inspected by sampled flow (sFlow) through a specific firewall policer will cause the device to reboot. After the reboot has completed, if the device receives and sFlow inspects another genuine packet seen through a specific firewall policer, the device will generate a core file and reboot. Continued inspection of these genuine packets will create an extended Denial of Service (DoS) condition. Depending on the metho…
Attacker Value
Unknown

CVE-2020-9775

Disclosure Date: April 01, 2020 (last updated February 21, 2025)
An issue existed in the handling of tabs displaying picture in picture video. The issue was corrected with improved state handling. This issue is fixed in iOS 13.4 and iPadOS 13.4. A user's private browsing activity may be unexpectedly saved in Screen Time.
Attacker Value
Unknown

CVE-2020-3919

Disclosure Date: April 01, 2020 (last updated February 21, 2025)
A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. A malicious application may be able to execute arbitrary code with kernel privileges.
Attacker Value
Unknown

CVE-2019-7630

Disclosure Date: March 25, 2020 (last updated February 21, 2025)
An issue was discovered in gdrv.sys in Gigabyte APP Center before 19.0227.1. The vulnerable driver exposes a wrmsr instruction via IOCTL 0xC3502580 and does not properly filter the target Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.