Show filters
688 topics marked with the following tags:
Displaying 101-110 of 688
Sort by:
Attacker Value
Very Low
CVE-2020-8862
Disclosure Date: February 22, 2020 (last updated October 06, 2023)
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the lack of proper password checking. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-10082.
0
Attacker Value
Moderate
CVE-2020-25736
Disclosure Date: July 15, 2021 (last updated October 07, 2023)
Acronis True Image 2019 update 1 through 2021 update 1 on macOS allows local privilege escalation due to an insecure XPC service configuration.
1
Attacker Value
Very Low
CVE-2020-1094
Disclosure Date: April 15, 2020 (last updated October 06, 2023)
An elevation of privilege vulnerability exists when the Windows Work Folder Service improperly handles file operations, aka 'Windows Work Folder Service Elevation of Privilege Vulnerability'.
0
Attacker Value
Very High
CVE-2021-3723
Disclosure Date: November 12, 2021 (last updated October 07, 2023)
A command injection vulnerability was reported in the Integrated Management Module (IMM) of legacy IBM System x 3550 M3 and IBM System x 3650 M3 servers that could allow the execution of operating system commands over an authenticated SSH or Telnet session.
1
Attacker Value
Moderate
CVE-2023-38146
Disclosure Date: September 12, 2023 (last updated October 08, 2023)
Windows Themes Remote Code Execution Vulnerability
3
Attacker Value
Very High
CVE-2024-38063
Disclosure Date: August 13, 2024 (last updated September 10, 2024)
Windows TCP/IP Remote Code Execution Vulnerability
9
Attacker Value
High
CVE-2022-21874
Disclosure Date: January 11, 2022 (last updated December 21, 2023)
Windows Security Center API Remote Code Execution Vulnerability
1
Attacker Value
Very Low
CVE-2022-0778
Disclosure Date: March 15, 2022 (last updated November 08, 2023)
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities p…
4
Attacker Value
Moderate
CVE-2023-25950
Disclosure Date: April 11, 2023 (last updated October 08, 2023)
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
2
Attacker Value
Low
CVE-2022-32230
Last updated June 21, 2022
Windows SMB Denial of Service Vulnerability.
1