Show filters
91 Total Results
Displaying 61-70 of 91
Sort by:
Attacker Value
Unknown
CVE-2021-0118
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Out-of-bounds read in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2021-0117
Disclosure Date: February 09, 2022 (last updated October 07, 2023)
Pointer issues in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2021-0116
Disclosure Date: February 09, 2022 (last updated February 23, 2025)
Out-of-bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2021-24046
Disclosure Date: January 14, 2022 (last updated February 23, 2025)
A logic flaw in Ray-Ban® Stories device software allowed some parameters like video capture duration limit to be modified through the Facebook View application. This issue affected versions of device software before 2107460.6810.0.
0
Attacker Value
Unknown
CVE-2021-44564
Disclosure Date: January 06, 2022 (last updated October 07, 2023)
A security vulnerability originally reported in the SYNC2101 product, and applicable to specific sub-families of SYNC devices, allows an attacker to download the configuration file used in the device and apply a modified configuration file back to the device. The attack requires network access to the SYNC device and knowledge of its IP address. The attack exploits the unsecured communication channel used between the administration tool Easyconnect and the SYNC device (in the affected family of SYNC products).
0
Attacker Value
Unknown
CVE-2021-1397
Disclosure Date: May 05, 2021 (last updated February 22, 2025)
A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. This vulnerability is due to improper input validation of the parameters in an HTTP request. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability is known as an open redirect attack, which is used in phishing attacks to get users to visit malicious sites without their knowledge.
0
Attacker Value
Unknown
CVE-2020-8694
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2020-8695
Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2020-5589
Disclosure Date: June 09, 2020 (last updated February 21, 2025)
SONY Wireless Headphones WF-1000X, WF-SP700N, WH-1000XM2, WH-1000XM3, WH-CH700N, WH-H900N, WH-XB700, WH-XB900N, WI-1000X, WI-C600N and WI-SP600N with firmware versions prior to 4.5.2 have vulnerability that someone within the Bluetooth range can make the Bluetooth pairing and operate such as changing volume of the product.
0
Attacker Value
Unknown
CVE-2020-10136 — IP-in-IP protocol routes arbitrary traffic by default
Disclosure Date: June 01, 2020 (last updated February 21, 2025)
IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
0