Show filters
1,081 Total Results
Displaying 221-230 of 1,081
Sort by:
Attacker Value
Unknown

CVE-2020-28472

Disclosure Date: January 19, 2021 (last updated November 28, 2024)
This affects the package @aws-sdk/shared-ini-file-loader before 1.0.0-rc.9; the package aws-sdk before 2.814.0. If an attacker submits a malicious INI file to an application that parses it with loadSharedConfigFiles , they will pollute the prototype on the application. This can be exploited further depending on the context.
Attacker Value
Unknown

CVE-2020-16971

Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Azure SDK for Java Security Feature Bypass Vulnerability
0
Attacker Value
Unknown

CVE-2020-17002

Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Azure SDK for C Security Feature Bypass Vulnerability
0
Attacker Value
Unknown

CVE-2020-8897

Disclosure Date: November 16, 2020 (last updated February 22, 2025)
A weak robustness vulnerability exists in the AWS Encryption SDKs for Java, Python, C and Javalcript prior to versions 2.0.0. Due to the non-committing property of AES-GCM (and other AEAD ciphers such as AES-GCM-SIV or (X)ChaCha20Poly1305) used by the SDKs to encrypt messages, an attacker can craft a unique cyphertext which will decrypt to multiple different results, and becomes especially relevant in a multi-recipient setting. We recommend users update their SDK to 2.0.0 or later.
Attacker Value
Unknown

CVE-2019-11121

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Improper file permissions in the installer for the Intel(R) Media SDK for Windows before version 2019 R1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2020-7745

Disclosure Date: October 19, 2020 (last updated February 22, 2025)
This affects the package MintegralAdSDK before 6.6.0.0. The SDK distributed by the company contains malicious functionality that acts as a backdoor. Mintegral and their partners (advertisers) can remotely execute arbitrary code on a user device.
0
Attacker Value
Unknown

CVE-2020-7744

Disclosure Date: October 15, 2020 (last updated February 22, 2025)
This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk downloads, either organic or not. Mintegral listens to download events in Android's download manager and detects if the downloaded file's url contains: a. google.com or comes from a Google app (the com.android.vending package) b. Ends with .apk for apk downloads In both cases, the module sends the captured data back to Mintegral's servers. Note that the malicious functionality keeps running even if the app is currently not in focus (running in the background).
0
Attacker Value
Unknown

CVE-2020-16602

Disclosure Date: September 02, 2020 (last updated February 22, 2025)
Razer Chroma SDK Rest Server through 3.12.17 allows remote attackers to execute arbitrary programs because there is a race condition in which a file created under "%PROGRAMDATA%\Razer Chroma\SDK\Apps" can be replaced before it is executed by the server. The attacker must have access to port 54236 for a registration step.
Attacker Value
Unknown

CVE-2020-7705

Disclosure Date: August 24, 2020 (last updated February 22, 2025)
This affects the package MintegralAdSDK from 0.0.0. The SDK distributed by the company contains malicious functionality that tracks any URL opened by the app and reports it back to the company, along with performing advertisement attribution fraud. Mintegral can remotely activate hooks on the UIApplication, openURL, SKStoreProductViewController, loadProductWithParameters and NSURLProtocol methods along with anti-debug and proxy detection protection. If those hooks are active MintegralAdSDK sends obfuscated data about every opened URL in an application to their servers. Note that the malicious functionality is enabled even if the SDK was not enabled to serve ads.
Attacker Value
Unknown

CVE-2020-8912

Disclosure Date: August 11, 2020 (last updated February 21, 2025)
A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. An attacker with write access to the targeted bucket can change the encryption algorithm of an object in the bucket, which can then allow them to change AES-GCM to AES-CTR. Using this in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation. It is recommended to update your SDK to V2 or later, and re-encrypt your files.