Show filters
97 Total Results
Displaying 21-30 of 97
Sort by:
Attacker Value
Unknown
CVE-2022-40806
Disclosure Date: September 19, 2022 (last updated February 24, 2025)
The d8s-uuids for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.1.0
0
Attacker Value
Unknown
CVE-2022-1737
Disclosure Date: July 12, 2022 (last updated February 24, 2025)
Pyramid Solutions' affected products, the Developer and DLL kits for EtherNet/IP Adapter and EtherNet/IP Scanner, are vulnerable to an out-of-bounds write, which may allow an unauthorized attacker to send a specially crafted packet that may result in a denial-of-service condition.
0
Attacker Value
Unknown
CVE-2021-35526
Disclosure Date: August 31, 2021 (last updated February 23, 2025)
Backup file without encryption vulnerability is found in Hitachi ABB Power Grids System Data Manager – SDM600 allows attacker to gain access to sensitive information. This issue affects: Hitachi ABB Power Grids System Data Manager – SDM600 1.2 versions prior to FP2 HF6 (Build Nr. 1.2.14002.257).
0
Attacker Value
Unknown
CVE-2021-21417
Disclosure Date: April 29, 2021 (last updated February 22, 2025)
fluidsynth is a software synthesizer based on the SoundFont 2 specifications. A use after free violation was discovered in fluidsynth, that can be triggered when loading an invalid SoundFont file.
0
Attacker Value
Unknown
CVE-2021-27887
Disclosure Date: March 29, 2021 (last updated February 22, 2025)
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids Ellipse APM 5.3 version 5.3.0.1 and prior versions; 5.2 version 5.2.0.3 and prior versions; 5.1 version 5.1.0.6 and prior versions.
0
Attacker Value
Unknown
CVE-2020-23359
Disclosure Date: January 27, 2021 (last updated February 22, 2025)
WeBid 1.2.2 admin/newuser.php has an issue with password rechecking during registration because it uses a loose comparison to check the identicalness of two passwords. Two non-identical passwords can still bypass the check.
0
Attacker Value
Unknown
CVE-2020-22722
Disclosure Date: August 14, 2020 (last updated February 21, 2025)
Rapid Software LLC Rapid SCADA 5.8.0 is affected by a local privilege escalation vulnerability in the ScadaAgentSvc.exe executable file. An attacker can obtain admin privileges by placing a malicious .exe file in the application and renaming it ScadaAgentSvc.exe, which would result in executing the binary as NT AUTHORITY\SYSTEM in a Windows operating system. For example, an attacker can plant a reverse shell from a low privileged user account and by restarting the computer, the malicious service will be started as NT AUTHORITY\SYSTEM by giving the attacker full system access to the remote PC.
0
Attacker Value
Unknown
CVE-2020-15007
Disclosure Date: June 24, 2020 (last updated February 21, 2025)
A buffer overflow in the M_LoadDefaults function in m_misc.c in id Tech 1 (aka Doom engine) allows arbitrary code execution via an unsafe usage of fscanf, because it does not limit the number of characters to be read in a format argument.
0
Attacker Value
Unknown
CVE-2020-11613
Disclosure Date: June 11, 2020 (last updated February 21, 2025)
Mids' Reborn Hero Designer 2.6.0.7 has an elevation of privilege vulnerability due to default and insecure permissions being set for the installation folder. By default, the Authenticated Users group has Modify permissions to the installation folder. Because of this, any user on the system can replace binaries or plant malicious DLLs to obtain elevated, or different, privileges, depending on the context of the user that runs the application.
0
Attacker Value
Unknown
CVE-2020-11614
Disclosure Date: June 11, 2020 (last updated February 21, 2025)
Mids' Reborn Hero Designer 2.6.0.7 downloads the update manifest, as well as update files, over cleartext HTTP. Additionally, the application does not perform file integrity validation for files after download. An attacker can perform a man-in-the-middle attack against this connection and replace executable files with malicious versions, which the operating system then executes under the context of the user running Hero Designer.
0