Show filters
664 Total Results
Displaying 381-390 of 664
Sort by:
Attacker Value
Unknown

CVE-2020-12834

Disclosure Date: May 15, 2020 (last updated February 21, 2025)
eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset).
Attacker Value
Unknown

CVE-2020-10947

Disclosure Date: April 17, 2020 (last updated February 21, 2025)
Mac Endpoint for Sophos Central before 9.9.6 and Mac Endpoint for Sophos Home before 2.2.6 allow Privilege Escalation.
Attacker Value
Unknown

CVE-2020-10951

Disclosure Date: April 15, 2020 (last updated February 21, 2025)
Western Digital My Cloud Home and ibi devices before 2.2.0 allow clickjacking on sign-in pages.
Attacker Value
Unknown

CVE-2020-0551

Disclosure Date: March 12, 2020 (last updated November 27, 2024)
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
Attacker Value
Unknown

CVE-2020-0530

Disclosure Date: March 12, 2020 (last updated February 21, 2025)
Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
Attacker Value
Unknown

CVE-2020-0526

Disclosure Date: March 12, 2020 (last updated February 21, 2025)
Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
Attacker Value
Unknown

CVE-2020-9550

Disclosure Date: March 04, 2020 (last updated February 21, 2025)
Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an attacker to sniff and spoof beacon requests remotely.
Attacker Value
Unknown

CVE-2020-9362

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
The Quick Heal AV parsing engine (November 2019) allows virus-detection bypass via a crafted GPFLAG in a ZIP archive. This affects Total Security, Home Security, Total Security Multi-Device, Internet Security, Total Security for Mac, AntiVirus Pro, AntiVirus for Server, and Total Security for Android.
Attacker Value
Unknown

CVE-2020-8990

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
Western Digital My Cloud Home before 3.6.0 and ibi before 3.6.0 allow Session Fixation.
Attacker Value
Unknown

CVE-2020-5316

Disclosure Date: February 06, 2020 (last updated February 23, 2025)
Dell SupportAssist for Business PCs versions 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3 and Dell SupportAssist for Home PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4 contain an uncontrolled search path vulnerability. A locally authenticated low privileged user could exploit this vulnerability to cause the loading of arbitrary DLLs by the SupportAssist binaries, resulting in the privileged execution of arbitrary code.