Show filters
41 Total Results
Displaying 31-40 of 41
Sort by:
Attacker Value
Unknown

CVE-2021-0114

Disclosure Date: August 16, 2021 (last updated February 23, 2025)
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Attacker Value
Unknown

CVE-2021-0144

Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.
Attacker Value
Unknown

CVE-2020-16226

Disclosure Date: September 01, 2020 (last updated February 22, 2025)
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
Attacker Value
Unknown

CVE-2017-6770

Disclosure Date: August 07, 2017 (last updated November 26, 2024)
Cisco IOS 12.0 through 15.6, Adaptive Security Appliance (ASA) Software 7.0.1 through 9.7.1.2, NX-OS 4.0 through 12.0, and IOS XE 3.6 through 3.18 are affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could allow an unauthenticated, remote attacker to take full control of the OSPF Autonomous System (AS) domain routing table, allowing the attacker to intercept or black-hole traffic. The attacker could exploit this vulnerability by injecting crafted OSPF packets. Successful exploitation could cause the targeted router to flush its routing table and propagate the crafted OSPF LSA type 1 update throughout the OSPF AS domain. To exploit this vulnerability, an attacker must accurately determine certain parameters within the LSA database on the target router. This vulnerability can only be triggered by sending crafted unicast or multicast OSPF LSA type 1 packets. No other LSA type packets can…
Attacker Value
Unknown

CVE-2015-4186

Disclosure Date: June 17, 2015 (last updated October 05, 2023)
The diagnostics subsystem in the administrative web interface on Cisco Virtualization Experience (aka VXC) Client 6215 devices with firmware 11.2(27.4) allows local users to gain privileges for OS command execution via a crafted option value, aka Bug ID CSCug54412.
0
Attacker Value
Unknown

CVE-2014-2940

Disclosure Date: August 15, 2014 (last updated October 05, 2023)
Cobham Sailor 900 and 6000 satellite terminals with firmware 1.08 MFHF and 2.11 VHF have hardcoded credentials for the administrator account, which allows attackers to obtain administrative control by leveraging physical access or terminal access.
0
Attacker Value
Unknown

CVE-2013-5493

Disclosure Date: September 13, 2013 (last updated October 05, 2023)
The diagnostic module in the firmware on Cisco Virtualization Experience Client 6000 devices allows local users to bypass intended access restrictions and execute arbitrary commands via unspecified vectors, aka Bug ID CSCug68407.
0
Attacker Value
Unknown

CVE-2013-3408

Disclosure Date: July 10, 2013 (last updated October 05, 2023)
The firmware on Cisco Virtualization Experience Client 6000 devices sets incorrect operating-system permissions, which allows local users to gain privileges via an unspecified sequence of commands, aka Bug ID CSCuc31764.
0
Attacker Value
Unknown

CVE-2011-2577

Disclosure Date: August 31, 2011 (last updated October 04, 2023)
Unspecified vulnerability in Cisco TelePresence C Series Endpoints, E/EX Personal Video units, and MXP Series Codecs, when using software versions before TC 4.0.0 or F9.1, allows remote attackers to cause a denial of service (crash) via a crafted SIP packet to port 5060 or 5061, aka Bug ID CSCtq46500.
0
Attacker Value
Unknown

CVE-2005-4258

Disclosure Date: December 15, 2005 (last updated February 22, 2025)
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
0