Show filters
204 topics marked with the following tags:
Displaying 131-140 of 204
Sort by:
Attacker Value
High
CVE-2020-7357
Disclosure Date: April 06, 2020 (last updated October 07, 2023)
Cayin CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the 'NTP_Server_IP' HTTP POST parameter in system.cgi page. This issue affects several branches and versions of the CMS application, including CME-SE, CMS-60, CMS-40, CMS-20, and CMS version 8.2, 8.0, and 7.5.
0
Attacker Value
Very High
CVE-2014-0930
Disclosure Date: May 08, 2014 (last updated October 05, 2023)
The ptrace system call in IBM AIX 5.3, 6.1, and 7.1, and VIOS 2.2.x, allows local users to cause a denial of service (system crash) or obtain sensitive information from kernel memory via a crafted PT_LDINFO operation.
1
Attacker Value
High
CVE-2020-1048: Windows Print Spooler Elevation of Privilege Vulnerability
Disclosure Date: May 21, 2020 (last updated September 18, 2020)
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070.
5
Attacker Value
Very High
CVE-2022-32744
Disclosure Date: August 25, 2022 (last updated October 08, 2023)
A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.
3
Attacker Value
Very High
CVE-2022-31791
Disclosure Date: September 06, 2022 (last updated October 08, 2023)
WatchGuard Firebox and XTM appliances allow a local attacker (that has already obtained shell access) to elevate their privileges and execute code with root permissions. This is fixed in Fireware OS 12.8.1, 12.5.10, and 12.1.4.
3
Attacker Value
Very High
CVE-2014-3074
Disclosure Date: July 02, 2014 (last updated October 05, 2023)
The runtime linker in IBM AIX 6.1 and 7.1 and VIOS 2.2.x allows local users to create a mode-666 root-owned file, and consequently gain privileges, by setting crafted MALLOCOPTIONS and MALLOCBUCKETS environment-variable values and then executing a setuid program.
1
Attacker Value
Low
CVE-2022-1043
Disclosure Date: August 29, 2022 (last updated October 08, 2023)
A flaw was found in the Linux kernel’s io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges.
1
Attacker Value
Moderate
CVE-2020-1584 - Windows dnsrslvr.dll Elevation of Privilege Vulnerability
Disclosure Date: August 17, 2020 (last updated January 19, 2024)
An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability by ensuring the dnsrslvr.dll properly handles objects in memory.
1
Attacker Value
High
CVE-2021-27076
Disclosure Date: March 11, 2021 (last updated December 30, 2023)
Microsoft SharePoint Server Remote Code Execution Vulnerability
3
Attacker Value
Very High
CVE-2021-30807
Disclosure Date: October 19, 2021 (last updated October 07, 2023)
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.5.1, iOS 14.7.1 and iPadOS 14.7.1, watchOS 7.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.
3