Show filters
59 Total Results
Displaying 1-10 of 59
Sort by:
Attacker Value
Unknown
CVE-2020-16268
Disclosure Date: December 29, 2020 (last updated February 22, 2025)
The MSI installer in 1E Client 4.1.0.267 and 5.0.0.745 allows remote authenticated users and local users to gain elevated privileges via the repair option. This applies to installations that have a TRANSFORM (MST) with the option to disable the installation of the Nomad module. An attacker may craft a .reg file in a specific location that will be able to write to any registry key as an elevated user.
0
Attacker Value
Unknown
CVE-2020-26261
Disclosure Date: December 09, 2020 (last updated February 22, 2025)
jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using systemd. In jupyterhub-systemdspawner before version 0.15 user API tokens issued to single-user servers are specified in the environment of systemd units. These tokens are incorrectly accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. This is patched in jupyterhub-systemdspawner v0.15
0
Attacker Value
Unknown
CVE-2015-9550
Disclosure Date: November 24, 2020 (last updated February 22, 2025)
An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. By sending a specific hel,xasf packet to the WAN interface, it is possible to open the web management interface on the WAN interface.
0
Attacker Value
Unknown
CVE-2020-8698
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2020-26086
Disclosure Date: November 04, 2020 (last updated February 22, 2025)
A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper storage of sensitive information on an affected device. An attacker could exploit this vulnerability by accessing information that should not be accessible to users with low privileges. A successful exploit could allow the attacker to gain access to sensitive information.
0
Attacker Value
Unknown
CVE-2020-26084
Disclosure Date: November 04, 2020 (last updated February 22, 2025)
A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device. The vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
0
Attacker Value
Unknown
CVE-2020-16263
Disclosure Date: October 28, 2020 (last updated February 22, 2025)
Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins.
0
Attacker Value
Unknown
CVE-2020-26650
Disclosure Date: October 22, 2020 (last updated February 22, 2025)
AtomXCMS 2.0 is affected by Arbitrary File Read via admin/dump.php
0
Attacker Value
Unknown
CVE-2020-15264
Disclosure Date: October 20, 2020 (last updated February 22, 2025)
The Boxstarter installer before version 2.13.0 configures C:\ProgramData\Boxstarter to be in the system-wide PATH environment variable. However, this directory is writable by normal, unprivileged users. To exploit the vulnerability, place a DLL in this directory that a privileged service is looking for. For example, WptsExtensions.dll When Windows starts, it'll execute the code in DllMain() with SYSTEM privileges. Any unprivileged user can execute code with SYSTEM privileges. The issue is fixed in version 3.13.0
0
Attacker Value
Unknown
CVE-2020-26868
Disclosure Date: October 12, 2020 (last updated February 22, 2025)
ARC Informatique PcVue prior to version 12.0.17 is vulnerable to a denial-of-service attack due to the ability of an unauthorized user to modify information used to validate messages sent by legitimate web clients. This issue also affects third-party systems based on the Web Services Toolkit.
0