Show filters
164 Total Results
Displaying 131-140 of 164
Sort by:
Attacker Value
Unknown

CVE-2020-5376

Disclosure Date: September 01, 2020 (last updated February 22, 2025)
Dell Inspiron 7347 BIOS versions prior to A13 contain a UEFI BIOS Boot Services overwrite vulnerability. A local attacker with access to system memory may exploit this vulnerability by overwriting the EFI_BOOT_SERVICES structure to execute arbitrary code in System Management Mode (SMM).
Attacker Value
Unknown

CVE-2020-17474

Disclosure Date: August 14, 2020 (last updated February 21, 2025)
A token-reuse vulnerability in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to create arbitrary new users, elevate users to administrators, delete users, and download user faces from the database.
Attacker Value
Unknown

CVE-2020-17473

Disclosure Date: August 14, 2020 (last updated February 21, 2025)
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.
Attacker Value
Unknown

CVE-2020-15050

Disclosure Date: July 13, 2020 (last updated February 21, 2025)
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
Attacker Value
Unknown

CVE-2020-15046

Disclosure Date: June 24, 2020 (last updated February 21, 2025)
The web interface on Supermicro X10DRH-iT motherboards with BIOS 2.0a and IPMI firmware 03.40 allows remote attackers to exploit a cgi/config_user.cgi CSRF issue to add new admin users. The fixed versions are BIOS 3.2 and firmware 03.88.
Attacker Value
Unknown

CVE-2019-1736

Disclosure Date: February 19, 2020 (last updated February 22, 2025)
A vulnerability in the firmware of the Cisco UCS C-Series Rack Servers could allow an authenticated, physical attacker to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot validation checks and load a compromised software image on an affected device. The vulnerability is due to improper validation of the server firmware upgrade images. An attacker could exploit this vulnerability by installing a server firmware version that would allow the attacker to disable UEFI Secure Boot. A successful exploit could allow the attacker to bypass the signature validation checks that are done by UEFI Secure Boot technology and load a compromised software image on the affected device. A compromised software image is any software image that has not been digitally signed by Cisco.
Attacker Value
Unknown

CVE-2020-6973

Disclosure Date: February 13, 2020 (last updated February 21, 2025)
Digi International ConnectPort LTS 32 MEI, Firmware Version 1.4.3 (82002228_K 08/09/2018), bios Version 1.2. Multiple cross-site scripting vulnerabilities exist that could allow an attacker to cause a denial-of-service condition.
Attacker Value
Unknown

CVE-2020-6975

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
Digi International ConnectPort LTS 32 MEI, Firmware Version 1.4.3 (82002228_K 08/09/2018), bios Version 1.2. Successful exploitation of this vulnerability could allow an attacker to upload a malicious file to the application.
Attacker Value
Unknown

CVE-2014-3979

Disclosure Date: January 27, 2020 (last updated November 28, 2024)
Bytemark Symbiosis allows remote attackers to cause a denial of service via a crafted username, which triggers the firewall to blacklist the IP.
Attacker Value
Unknown

CVE-2019-19642

Disclosure Date: December 08, 2019 (last updated November 27, 2024)
On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS 02.68, the Virtual Media feature allows OS Command Injection by authenticated attackers who can send HTTP requests to the IPMI IP address. This requires a POST to /rpc/setvmdrive.asp with shell metacharacters in ShareHost or ShareName. The attacker can achieve a persistent backdoor.