Show filters
139 Total Results
Displaying 91-100 of 139
Sort by:
Attacker Value
Unknown
CVE-2020-0522
Disclosure Date: February 17, 2021 (last updated February 22, 2025)
Improper initialization in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters before version 3.30 may allow a privileged user to potentially enable denial of service via local access.
0
Attacker Value
Unknown
CVE-2021-1661
Disclosure Date: January 12, 2021 (last updated February 22, 2025)
Windows Installer Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2020-10143
Disclosure Date: December 09, 2020 (last updated February 22, 2025)
Macrium Reflect includes an OpenSSL component that specifies an OPENSSLDIR variable as C:\openssl\. Macrium Reflect contains a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.
0
Attacker Value
Unknown
CVE-2020-26957
Disclosure Date: December 09, 2020 (last updated February 22, 2025)
OneCRL was non-functional in the new Firefox for Android due to a missing service initialization. This could result in a failure to enforce some certificate revocations. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83.
0
Attacker Value
Unknown
CVE-2020-26933
Disclosure Date: November 18, 2020 (last updated February 22, 2025)
Trusted Computing Group (TCG) Trusted Platform Module Library Family 2.0 Library Specification Revisions 1.38 through 1.59 has Incorrect Access Control during a non-orderly TPM shut-down that uses USE_DA_USED. Improper initialization of this shut-down may result in susceptibility to a dictionary attack.
0
Attacker Value
Unknown
CVE-2020-12326
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Improper initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2020-8744
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Improper initialization in subsystem for Intel(R) CSME versions before12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 4.0.30 Intel(R) SPS versions before E3_05.01.04.200 may allow a privileged user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2020-0450
Disclosure Date: November 10, 2020 (last updated February 22, 2025)
In rw_i93_sm_format of rw_i93.cc, there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-157650336
0
Attacker Value
Unknown
CVE-2020-25662
Disclosure Date: November 05, 2020 (last updated February 22, 2025)
A Red Hat only CVE-2020-12352 regression issue was found in the way the Linux kernel's Bluetooth stack implementation handled the initialization of stack memory when handling certain AMP packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.
0
Attacker Value
Unknown
CVE-2020-3573
Disclosure Date: November 04, 2020 (last updated February 22, 2025)
Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user.
0