Show filters
3,546 Total Results
Displaying 351-360 of 3,546
Sort by:
Attacker Value
Unknown
CVE-2022-25252
Disclosure Date: March 08, 2022 (last updated February 23, 2025)
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) when receiving certain input throws an exception. Services using said function do not handle the exception. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to crash the affected product.
0
Attacker Value
Unknown
CVE-2022-25250
Disclosure Date: March 08, 2022 (last updated February 23, 2025)
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send a certain command to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to shut down a specific service.
0
Attacker Value
Unknown
CVE-2022-25246
Disclosure Date: March 08, 2022 (last updated February 23, 2025)
Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) uses hard-coded credentials for its UltraVNC installation. Successful exploitation of this vulnerability could allow a remote authenticated attacker to take full remote control of the host operating system.
0
Attacker Value
Unknown
CVE-2022-25249
Disclosure Date: March 08, 2022 (last updated February 23, 2025)
When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) (disregarding Axeda agent v6.9.2 and v6.9.3) is vulnerable to directory traversal, which could allow a remote unauthenticated attacker to obtain file system read access via web server..
0
Attacker Value
Unknown
CVE-2022-25247
Disclosure Date: March 08, 2022 (last updated February 23, 2025)
Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send certain commands to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to obtain full file-system access and remote code execution.
0
Attacker Value
Unknown
CVE-2021-3656
Disclosure Date: March 04, 2022 (last updated February 23, 2025)
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
0
Attacker Value
Unknown
CVE-2022-25031
Disclosure Date: March 03, 2022 (last updated February 23, 2025)
Remote Desktop Commander Suite Agent before v4.8 contains an unquoted service path which allows attackers to escalate privileges to the system level.
0
Attacker Value
Unknown
CVE-2022-23779
Disclosure Date: March 02, 2022 (last updated February 23, 2025)
Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.
0
Attacker Value
Unknown
CVE-2021-4091
Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A double-free was found in the way 389-ds-base handles virtual attributes context in persistent searches. An attacker could send a series of search requests, forcing the server to behave unexpectedly, and crash.
0
Attacker Value
Unknown
CVE-2020-25719
Disclosure Date: February 18, 2022 (last updated February 23, 2025)
A flaw was found in the way Samba, as an Active Directory Domain Controller, implemented Kerberos name-based authentication. The Samba AD DC, could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise.
0