Show filters
734 Total Results
Displaying 171-180 of 734
Sort by:
Attacker Value
Unknown
A potential vulnerability in some Lenovo ThinkPads may allow an attacker to exe…
Disclosure Date: November 12, 2019 (last updated November 27, 2024)
A potential vulnerability in the SMI callback function used in the Legacy USB driver using boot services structure in runtime phase in some Lenovo ThinkPad models may allow arbitrary code execution.
0
Attacker Value
Unknown
ThinkPad T460p and T470p BIOS Tamper Mechanism
Disclosure Date: November 12, 2019 (last updated November 27, 2024)
The BIOS tamper detection mechanism was not triggered in Lenovo ThinkPad T460p, BIOS versions up to R07ET90W, and T470p, BIOS versions up to R0FET50W, which may allow for unauthorized access.
0
Attacker Value
Unknown
A potential vulnerability in the SMI callback function in some Lenovo ThinkPad …
Disclosure Date: November 12, 2019 (last updated November 27, 2024)
A potential vulnerability in the SMI callback function used in Legacy USB driver using passed parameter without sufficient checking in some Lenovo ThinkPad models may allow arbitrary code execution.
0
Attacker Value
Unknown
CVE-2019-13739
Disclosure Date: November 12, 2019 (last updated November 08, 2023)
Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
0
Attacker Value
Unknown
CVE-2019-13749
Disclosure Date: November 12, 2019 (last updated November 08, 2023)
Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
0
Attacker Value
Unknown
CVE-2011-3618
Disclosure Date: November 12, 2019 (last updated November 27, 2024)
atop: symlink attack possible due to insecure tempfile handling
0
Attacker Value
Unknown
CVE-2017-5332
Disclosure Date: November 04, 2019 (last updated November 27, 2024)
The extract_group_icon_cursor_resource in wrestool/extract.c in icoutils before 0.31.1 can access unallocated memory, which allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable.
0
Attacker Value
Unknown
CVE-2017-5333
Disclosure Date: November 04, 2019 (last updated November 27, 2024)
Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.
0
Attacker Value
Unknown
CVE-2019-2999
Disclosure Date: October 16, 2019 (last updated November 27, 2024)
Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to J…
0
Attacker Value
Unknown
CVE-2019-2945
Disclosure Date: October 16, 2019 (last updated November 27, 2024)
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code…
0