Show filters
117 Total Results
Displaying 51-60 of 117
Sort by:
Attacker Value
Unknown

CVE-2022-28944

Disclosure Date: May 23, 2022 (last updated February 23, 2025)
Certain EMCO Software products are affected by: CWE-494: Download of Code Without Integrity Check. This affects MSI Package Builder for Windows 9.1.4 and Remote Installer for Windows 6.0.13 and Ping Monitor for Windows 8.0.18 and Remote Shutdown for Windows 7.2.2 and WakeOnLan 2.0.8 and Network Inventory for Windows 5.8.22 and Network Software Scanner for Windows 2.0.8 and UnLock IT for Windows 6.1.1. The impact is: execute arbitrary code (remote). The component is: Updater. The attack vector is: To exploit this vulnerability, a user must trigger an update of an affected installation of EMCO Software. ¶¶ Multiple products from EMCO Software are affected by a remote code execution vulnerability during the update process.
Attacker Value
Unknown

CVE-2022-0636

Disclosure Date: April 22, 2022 (last updated February 23, 2025)
A denial of service vulnerability was reported in Lenovo Thin Installer prior to version 1.3.0039 that could trigger a system crash.
Attacker Value
Unknown

CVE-2022-28779

Disclosure Date: April 11, 2022 (last updated February 23, 2025)
Uncontrolled search path element vulnerability in Samsung Android USB Driver windows installer program prior to version 1.7.50 allows attacker to execute arbitrary code.
Attacker Value
Unknown

CVE-2021-20319

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
An improper signature verification vulnerability was found in coreos-installer. A specially crafted gzip installation image can bypass the image signature verification and as a consequence can lead to the installation of unsigned content. An attacker able to modify the original installation image can write arbitrary data, and achieve full access to the node being installed.
Attacker Value
Unknown

CVE-2021-20172

Disclosure Date: December 30, 2021 (last updated February 23, 2025)
All known versions of the Netgear Genie Installer for macOS contain a local privilege escalation vulnerability. The installer of the macOS version of Netgear Genie handles certain files in an insecure way. A malicious actor who has local access to the endpoint on which the software is going to be installed may overwrite certain files to obtain privilege escalation to root.
Attacker Value
Unknown

CVE-2021-42809

Disclosure Date: December 20, 2021 (last updated February 23, 2025)
Improper Access Control of Dynamically-Managed Code Resources (DLL) in Thales Sentinel Protection Installer could allow the execution of arbitrary code.
Attacker Value
Unknown

CVE-2021-42808

Disclosure Date: December 20, 2021 (last updated February 23, 2025)
Improper Access Control in Thales Sentinel Protection Installer could allow a local user to escalate privileges.
Attacker Value
Unknown

CVE-2021-35493

Disclosure Date: September 14, 2021 (last updated February 23, 2025)
The WebFOCUS Reporting Server and WebFOCUS Client components of TIBCO Software Inc.'s TIBCO WebFOCUS Client, TIBCO WebFOCUS Installer, and TIBCO WebFOCUS Reporting Server contain easily exploitable Stored and Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker to social engineer a legitimate user with network access to execute scripts targeting the affected system or the victim's local system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO WebFOCUS Client: versions 8207.27.0 and below, TIBCO WebFOCUS Installer: versions 8207.27.0 and below, and TIBCO WebFOCUS Reporting Server: versions 8207.27.0 and below.
Attacker Value
Unknown

CVE-2021-20198

Disclosure Date: February 23, 2021 (last updated February 22, 2025)
A flaw was found in the OpenShift Installer before version v0.9.0-master.0.20210125200451-95101da940b0. During installation of OpenShift Container Platform 4 clusters, bootstrap nodes are provisioned with anonymous authentication enabled on kubelet port 10250. A remote attacker able to reach this port during installation can make unauthenticated `/exec` requests to execute arbitrary commands within running containers. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Attacker Value
Unknown

CVE-2020-5674

Disclosure Date: November 24, 2020 (last updated February 22, 2025)
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.