Show filters
664 Total Results
Displaying 381-390 of 664
Sort by:
Attacker Value
Unknown
CVE-2020-12834
Disclosure Date: May 15, 2020 (last updated February 21, 2025)
eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset).
0
Attacker Value
Unknown
CVE-2020-10947
Disclosure Date: April 17, 2020 (last updated February 21, 2025)
Mac Endpoint for Sophos Central before 9.9.6 and Mac Endpoint for Sophos Home before 2.2.6 allow Privilege Escalation.
0
Attacker Value
Unknown
CVE-2020-10951
Disclosure Date: April 15, 2020 (last updated February 21, 2025)
Western Digital My Cloud Home and ibi devices before 2.2.0 allow clickjacking on sign-in pages.
0
Attacker Value
Unknown
CVE-2020-0551
Disclosure Date: March 12, 2020 (last updated November 27, 2024)
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html
0
Attacker Value
Unknown
CVE-2020-0530
Disclosure Date: March 12, 2020 (last updated February 21, 2025)
Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
0
Attacker Value
Unknown
CVE-2020-0526
Disclosure Date: March 12, 2020 (last updated February 21, 2025)
Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
0
Attacker Value
Unknown
CVE-2020-9550
Disclosure Date: March 04, 2020 (last updated February 21, 2025)
Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an attacker to sniff and spoof beacon requests remotely.
0
Attacker Value
Unknown
CVE-2020-9362
Disclosure Date: February 24, 2020 (last updated February 21, 2025)
The Quick Heal AV parsing engine (November 2019) allows virus-detection bypass via a crafted GPFLAG in a ZIP archive. This affects Total Security, Home Security, Total Security Multi-Device, Internet Security, Total Security for Mac, AntiVirus Pro, AntiVirus for Server, and Total Security for Android.
0
Attacker Value
Unknown
CVE-2020-8990
Disclosure Date: February 20, 2020 (last updated February 21, 2025)
Western Digital My Cloud Home before 3.6.0 and ibi before 3.6.0 allow Session Fixation.
0
Attacker Value
Unknown
CVE-2020-5316
Disclosure Date: February 06, 2020 (last updated February 23, 2025)
Dell SupportAssist for Business PCs versions 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3 and Dell SupportAssist for Home PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4 contain an uncontrolled search path vulnerability. A locally authenticated low privileged user could exploit this vulnerability to cause the loading of arbitrary DLLs by the SupportAssist binaries, resulting in the privileged execution of arbitrary code.
0