Show filters
109 Total Results
Displaying 11-20 of 109
Sort by:
Attacker Value
Unknown

CVE-2021-21518

Disclosure Date: March 10, 2021 (last updated February 22, 2025)
Dell SupportAssist Client for Consumer PCs versions 3.7.x, 3.6.x, 3.4.x, 3.3.x, Dell SupportAssist Client for Business PCs versions 2.0.x, 2.1.x, 2.2.x, and Dell SupportAssist Client ProManage 1.x contain a DLL injection vulnerability in the Costura Fody plugin. A local user with low privileges could potentially exploit this vulnerability, leading to the execution of arbitrary executable on the operating system with SYSTEM privileges.
Attacker Value
Unknown

CVE-2020-14297

Disclosure Date: July 24, 2020 (last updated February 21, 2025)
A flaw was discovered in Wildfly's EJB Client as shipped with Red Hat JBoss EAP 7, where some specific EJB transaction objects may get accumulated over the time and can cause services to slow down and eventaully unavailable. An attacker can take advantage and cause denial of service attack and make services unavailable.
Attacker Value
Unknown

Client for OES Elevation of Privilege via Buffer Overflow

Disclosure Date: May 21, 2018 (last updated November 08, 2023)
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.
0
Attacker Value
Unknown

CVE-2017-0905

Disclosure Date: November 13, 2017 (last updated November 26, 2024)
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
0
Attacker Value
Unknown

CVE-2017-2685

Disclosure Date: March 01, 2017 (last updated November 26, 2024)
Siemens SINUMERIK Integrate Operate Clients between 2.0.3.00.016 (including) and 2.0.6 (excluding) and between 3.0.4.00.032 (including) and 3.0.6 (excluding) contain a vulnerability that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack.
0
Attacker Value
Unknown

CVE-2016-6369

Disclosure Date: August 25, 2016 (last updated November 25, 2024)
Cisco AnyConnect Secure Mobility Client before 4.2.05015 and 4.3.x before 4.3.02039 mishandles pathnames, which allows local users to gain privileges via a crafted INF file, aka Bug ID CSCuz92464.
0
Attacker Value
Unknown

CVE-2015-6322

Disclosure Date: October 12, 2015 (last updated October 05, 2023)
The IPC channel in Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1(8) allows local users to bypass intended access restrictions and move arbitrary files by leveraging the lack of source-path validation, aka Bug ID CSCuv48563.
0
Attacker Value
Unknown

CVE-2015-6305

Disclosure Date: September 26, 2015 (last updated October 05, 2023)
Untrusted search path vulnerability in the CMainThread::launchDownloader function in vpndownloader.exe in Cisco AnyConnect Secure Mobility Client 2.0 through 4.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by dbghelp.dll, aka Bug ID CSCuv01279. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4211.
0
Attacker Value
Unknown

CVE-2013-5559

Disclosure Date: November 04, 2013 (last updated October 05, 2023)
Buffer overflow in the Active Template Library (ATL) framework in the VPNAPI COM module in Cisco AnyConnect Secure Mobility Client 2.x allows user-assisted remote attackers to execute arbitrary code via a crafted HTML document, aka Bug ID CSCuj58139.
0
Attacker Value
Unknown

CVE-2013-3956

Disclosure Date: July 31, 2013 (last updated October 05, 2023)
The NICM.SYS kernel driver 3.1.11.0 in Novell Client 4.91 SP5 on Windows XP and Windows Server 2003; Novell Client 2 SP2 on Windows Vista and Windows Server 2008; and Novell Client 2 SP3 on Windows Server 2008 R2, Windows 7, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted 0x143B6B IOCTL call.
0