Show filters
433 Total Results
Displaying 11-20 of 433
Sort by:
Attacker Value
Unknown
CVE-2020-1472
Disclosure Date: August 17, 2020 (last updated November 28, 2024)
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.
To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.
Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels.
For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020).
When the second phase of Windows updates become available in Q1 2021, customers…
1
Attacker Value
Low
CVE-2020-0543 CROSSTALK
Disclosure Date: June 15, 2020 (last updated November 28, 2024)
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
1
Attacker Value
Unknown
CVE-2022-28658
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
0
Attacker Value
Unknown
CVE-2022-28657
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport does not disable python crash handler before entering chroot
0
Attacker Value
Unknown
CVE-2022-28656
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to consume RAM in the Apport process
0
Attacker Value
Unknown
CVE-2022-28655
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to create arbitrary tcp dbus connections
0
Attacker Value
Unknown
CVE-2022-28654
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to fill up apport.log
0
Attacker Value
Unknown
CVE-2022-28652
Disclosure Date: June 04, 2024 (last updated June 12, 2024)
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
0
Attacker Value
Unknown
CVE-2022-3328
Disclosure Date: January 08, 2024 (last updated January 13, 2024)
Race condition in snap-confine's must_mkdir_and_open_with_perms()
0
Attacker Value
Unknown
CVE-2022-2602
Disclosure Date: January 08, 2024 (last updated January 13, 2024)
io_uring UAF, Unix SCM garbage collection
0