Show filters
2,153 Total Results
Displaying 31-40 of 2,153
Sort by:
Attacker Value
High

CVE-2022-21919

Disclosure Date: January 11, 2022 (last updated November 28, 2024)
Windows User Profile Service Elevation of Privilege Vulnerability
4
Attacker Value
Moderate

CVE-2021-31201

Disclosure Date: June 08, 2021 (last updated November 28, 2024)
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
3
Attacker Value
Moderate

CVE-2021-31199

Disclosure Date: June 08, 2021 (last updated November 28, 2024)
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
3
Attacker Value
Moderate

OpenSSL TLS Server Crash (NULL pointer dereference) — CVE-2021-3449

Disclosure Date: March 25, 2021 (last updated February 22, 2025)
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
Attacker Value
Moderate

CVE-2020-1938

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, alo…
Attacker Value
Moderate

CVE-2020-0668

Disclosure Date: February 11, 2020 (last updated February 21, 2025)
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672.
Attacker Value
Moderate

CVE-2019-17571

Disclosure Date: December 20, 2019 (last updated November 08, 2023)
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
Attacker Value
Very High

CVE-2022-21906

Disclosure Date: January 11, 2022 (last updated November 28, 2024)
Windows Defender Application Control Security Feature Bypass Vulnerability
3
Attacker Value
Unknown

CVE-2021-38666

Disclosure Date: November 10, 2021 (last updated November 28, 2024)
Remote Desktop Client Remote Code Execution Vulnerability
3
Attacker Value
High

CVE-2021-34448

Disclosure Date: July 16, 2021 (last updated February 23, 2025)
Scripting Engine Memory Corruption Vulnerability
3