Show filters
433 Total Results
Displaying 11-20 of 433
Sort by:
Attacker Value
Unknown

CVE-2020-1472

Disclosure Date: August 17, 2020 (last updated November 28, 2024)
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers…
1
Attacker Value
Low

CVE-2020-0543 CROSSTALK

Disclosure Date: June 15, 2020 (last updated November 28, 2024)
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2022-28658

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing
Attacker Value
Unknown

CVE-2022-28657

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
Apport does not disable python crash handler before entering chroot
Attacker Value
Unknown

CVE-2022-28656

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to consume RAM in the Apport process
Attacker Value
Unknown

CVE-2022-28655

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to create arbitrary tcp dbus connections
Attacker Value
Unknown

CVE-2022-28654

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
is_closing_session() allows users to fill up apport.log
Attacker Value
Unknown

CVE-2022-28652

Disclosure Date: June 04, 2024 (last updated June 12, 2024)
~/.config/apport/settings parsing is vulnerable to "billion laughs" attack
Attacker Value
Unknown

CVE-2022-3328

Disclosure Date: January 08, 2024 (last updated January 13, 2024)
Race condition in snap-confine's must_mkdir_and_open_with_perms()
Attacker Value
Unknown

CVE-2022-2602

Disclosure Date: January 08, 2024 (last updated January 13, 2024)
io_uring UAF, Unix SCM garbage collection