Show filters
813 Total Results
Displaying 381-390 of 813
Sort by:
Attacker Value
Unknown
CVE-2019-16281
Disclosure Date: December 30, 2020 (last updated February 22, 2025)
Ptarmigan before 0.2.3 lacks API token validation, e.g., an "if (token === apiToken) {return true;} return false;" code block.
0
Attacker Value
Unknown
CVE-2020-29601
Disclosure Date: December 08, 2020 (last updated February 22, 2025)
The official notary docker images before signer-0.6.1-1 contain a blank password for a root user. System using the notary docker container deployed by affected versions of the docker image may allow an remote attacker to achieve root access with a blank password.
0
Attacker Value
Unknown
CVE-2020-25656
Disclosure Date: December 02, 2020 (last updated February 22, 2025)
A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
0
Attacker Value
Unknown
CVE-2020-25704
Disclosure Date: December 02, 2020 (last updated February 22, 2025)
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
0
Attacker Value
Unknown
CVE-2020-5674
Disclosure Date: November 24, 2020 (last updated February 22, 2025)
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
0
Attacker Value
Unknown
CVE-2020-15264
Disclosure Date: October 20, 2020 (last updated February 22, 2025)
The Boxstarter installer before version 2.13.0 configures C:\ProgramData\Boxstarter to be in the system-wide PATH environment variable. However, this directory is writable by normal, unprivileged users. To exploit the vulnerability, place a DLL in this directory that a privileged service is looking for. For example, WptsExtensions.dll When Windows starts, it'll execute the code in DllMain() with SYSTEM privileges. Any unprivileged user can execute code with SYSTEM privileges. The issue is fixed in version 3.13.0
0
Attacker Value
Unknown
CVE-2020-27157
Disclosure Date: October 15, 2020 (last updated February 22, 2025)
Veritas APTARE versions prior to 10.5 included code that bypassed the normal login process when specific authentication credentials were provided to the server. An unauthenticated user could login to the application and gain access to the data and functionality accessible to the targeted user account.
0
Attacker Value
Unknown
CVE-2020-27156
Disclosure Date: October 15, 2020 (last updated February 22, 2025)
Veritas APTARE versions prior to 10.5 did not perform adequate authorization checks. This vulnerability could allow for remote code execution by an unauthenticated user.
0
Attacker Value
Unknown
CVE-2020-3601
Disclosure Date: October 07, 2020 (last updated February 22, 2025)
A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user. To exploit this vulnerability, an attacker would need to have valid administrative credentials on an affected device.
0
Attacker Value
Unknown
CVE-2020-3602
Disclosure Date: October 07, 2020 (last updated February 22, 2025)
A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user on the affected device. To exploit this vulnerability, an attacker would need to have valid credentials on an affected device and know the password for the cli test-commands command.
0