Show filters
4,440 Total Results
Displaying 41-50 of 4,440
Sort by:
Attacker Value
Very Low

CVE-2020-28198

Disclosure Date: May 06, 2021 (last updated February 22, 2025)
The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Attacker Value
High

CVE-2021-1497

Disclosure Date: May 05, 2021 (last updated February 22, 2025)
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Attacker Value
Moderate

CVE-2021-29449

Disclosure Date: April 14, 2021 (last updated February 22, 2025)
Pi-hole is a Linux network-level advertisement and Internet tracker blocking application. Multiple privilege escalation vulnerabilities were discovered in version 5.2.4 of Pi-hole core. See the referenced GitHub security advisory for details.
Attacker Value
Unknown

CVE-2021-28310

Disclosure Date: April 13, 2021 (last updated February 22, 2025)
Win32k Elevation of Privilege Vulnerability
1
Attacker Value
Moderate

CVE-2021-26236

Disclosure Date: March 18, 2021 (last updated February 22, 2025)
FastStone Image Viewer v.<= 7.5 is affected by a Stack-based Buffer Overflow at 0x005BDF49, affecting the CUR file parsing functionality (BITMAPINFOHEADER Structure, 'BitCount' file format field), that will end up corrupting the Structure Exception Handler (SEH). Attackers could exploit this issue to achieve code execution when a user opens or views a malformed/specially crafted CUR file.
Attacker Value
Unknown

CVE-2020-16013

Disclosure Date: January 08, 2021 (last updated February 22, 2025)
Inappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2020-25494

Disclosure Date: December 18, 2020 (last updated February 22, 2025)
Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.
Attacker Value
Unknown

CVE-2020-16010

Disclosure Date: November 03, 2020 (last updated February 22, 2025)
Heap buffer overflow in UI in Google Chrome on Android prior to 86.0.4240.185 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Attacker Value
Very High

CVE-2020-14144

Disclosure Date: October 16, 2020 (last updated February 22, 2025)
The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states "This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides.
Attacker Value
Unknown

CVE-2020-25223

Disclosure Date: September 25, 2020 (last updated February 22, 2025)
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11