Show filters
332 Total Results
Displaying 1-10 of 332
Sort by:
Attacker Value
Unknown

CVE-2020-17049

Disclosure Date: November 11, 2020 (last updated February 22, 2025)
A security feature bypass vulnerability exists in the way Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD). To exploit the vulnerability, a compromised service that is configured to use KCD could tamper with a service ticket that is not valid for delegation to force the KDC to accept it. The update addresses this vulnerability by changing how the KDC validates service tickets used with KCD.
4
Attacker Value
High

CVE-2021-3493

Disclosure Date: April 15, 2021 (last updated February 22, 2025)
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
Attacker Value
Low

CVE-2020-28872

Disclosure Date: April 12, 2021 (last updated February 22, 2025)
An authorization bypass vulnerability in Monitorr v1.7.6m in Monitorr/assets/config/_installation/_register.php allows an unauthorized person to create valid credentials.
Attacker Value
Moderate

CVE-2020-15251

Disclosure Date: October 13, 2020 (last updated February 22, 2025)
In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.
Attacker Value
Unknown

CVE-2021-0472

Disclosure Date: June 11, 2021 (last updated February 22, 2025)
In shouldLockKeyguard of LockTaskController.java, there is a possible way to exit App Pinning without a PIN due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-176801033
Attacker Value
Unknown

CVE-2021-25410

Disclosure Date: June 11, 2021 (last updated February 22, 2025)
Improper access control of a component in CallBGProvider prior to SMR JUN-2021 Release 1 allows local attackers to access arbitrary files with an escalated privilege.
Attacker Value
Unknown

CVE-2021-25418

Disclosure Date: June 11, 2021 (last updated February 22, 2025)
Improper component protection vulnerability in Samsung Internet prior to version 14.0.1.62 allows untrusted applications to execute arbitrary activity in specific condition.
Attacker Value
Unknown

CVE-2021-25406

Disclosure Date: June 11, 2021 (last updated February 22, 2025)
Information exposure vulnerability in Gear S Plugin prior to version 2.2.05.20122441 allows unstrusted applications to access connected BT device information.
Attacker Value
Unknown

CVE-2021-21664

Disclosure Date: June 10, 2021 (last updated February 22, 2025)
An incorrect permission check in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers with Generic Create permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.
Attacker Value
Unknown

CVE-2021-30537

Disclosure Date: June 07, 2021 (last updated February 22, 2025)
Insufficient policy enforcement in cookies in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass cookie policy via a crafted HTML page.