Show filters
42 Total Results
Displaying 11-20 of 42
Sort by:
Attacker Value
Unknown
CVE-2023-34642
Disclosure Date: June 19, 2023 (last updated October 08, 2023)
KioWare for Windows through v8.33 was discovered to contain an incomplete blacklist filter for blocked dialog boxes on Windows 10. This issue can allow attackers to open a file dialog box via the function showDirectoryPicker() which can then be used to open an unprivileged command prompt.
0
Attacker Value
Unknown
CVE-2023-34641
Disclosure Date: June 19, 2023 (last updated October 08, 2023)
KioWare for Windows through v8.33 was discovered to contain an incomplete blacklist filter for blocked dialog boxes on Windows 10. This issue can allow attackers to open a file dialog box via the function window.print() which can then be used to open an unprivileged command prompt.
0
Attacker Value
Unknown
CVE-2022-44875
Disclosure Date: March 06, 2023 (last updated October 08, 2023)
KioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code.
0
Attacker Value
Unknown
CVE-2023-22466
Disclosure Date: January 04, 2023 (last updated October 08, 2023)
Tokio is a runtime for writing applications with Rust. Starting with version 1.7.0 and prior to versions 1.18.4, 1.20.3, and 1.23.1, when configuring a Windows named pipe server, setting `pipe_mode` will reset `reject_remote_clients` to `false`. If the application has previously configured `reject_remote_clients` to `true`, this effectively undoes the configuration. Remote clients may only access the named pipe if the named pipe's associated path is accessible via a publicly shared folder (SMB). Versions 1.23.1, 1.20.3, and 1.18.4 have been patched. The fix will also be present in all releases starting from version 1.24.0. Named pipes were introduced to Tokio in version 1.7.0, so releases older than 1.7.0 are not affected. As a workaround, ensure that `pipe_mode` is set first after initializing a `ServerOptions`.
0
Attacker Value
Unknown
CVE-2022-37415
Disclosure Date: August 05, 2022 (last updated October 08, 2023)
The Uniwill SparkIO.sys driver 1.0 is vulnerable to a stack-based buffer overflow via IOCTL 0x40002008.
0
Attacker Value
Unknown
CVE-2022-28223
Disclosure Date: March 30, 2022 (last updated October 07, 2023)
Tekon KIO devices through 2022-03-30 allow an authenticated admin user to escalate privileges to root by uploading a malicious Lua plugin.
0
Attacker Value
Unknown
CVE-2021-45710
Disclosure Date: December 27, 2021 (last updated February 23, 2025)
An issue was discovered in the tokio crate before 1.8.4, and 1.9.x through 1.13.x before 1.13.1, for Rust. In certain circumstances involving a closed oneshot channel, there is a data race and memory corruption.
0
Attacker Value
Unknown
CVE-2021-38191
Disclosure Date: August 08, 2021 (last updated February 23, 2025)
An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.
0
Attacker Value
Unknown
CVE-2020-35875
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the tokio-rustls crate before 0.13.1 for Rust. Excessive memory usage may occur when data arrives quickly.
0
Attacker Value
Unknown
CVE-2020-12755
Disclosure Date: May 09, 2020 (last updated November 27, 2024)
fishProtocol::establishConnection in fish/fish.cpp in KDE kio-extras through 20.04.0 makes a cacheAuthentication call even if the user had not set the keepPassword option. This may lead to unintended KWallet storage of a password.
0