Show filters
223 Total Results
Displaying 71-80 of 223
Sort by:
Attacker Value
Unknown

CVE-2018-9333

Disclosure Date: January 11, 2021 (last updated February 22, 2025)
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
Attacker Value
Unknown

CVE-2018-8724

Disclosure Date: January 11, 2021 (last updated February 22, 2025)
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe.
Attacker Value
Unknown

CVE-2018-11010

Disclosure Date: January 11, 2021 (last updated February 22, 2025)
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Attacker Value
Unknown

CVE-2020-25648

Disclosure Date: October 20, 2020 (last updated February 22, 2025)
A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
Attacker Value
Unknown

CVE-2020-1968

Disclosure Date: September 09, 2020 (last updated February 22, 2025)
The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
Attacker Value
Unknown

CVE-2020-5385

Disclosure Date: August 18, 2020 (last updated February 22, 2025)
Dell Encryption versions prior to 10.8 and Dell Endpoint Security Suite versions prior to 2.8 contain a privilege escalation vulnerability because of an incomplete fix for CVE-2020-5358. A local malicious user with low privileges could potentially exploit this vulnerability to gain elevated privilege on the affected system with the help of a symbolic link.
Attacker Value
Unknown

CVE-2020-14483

Disclosure Date: August 13, 2020 (last updated February 21, 2025)
A timeout during a TLS handshake can result in the connection failing to terminate. This can result in a Niagara thread hanging and requires a manual restart of Niagara (Versions 4.6.96.28, 4.7.109.20, 4.7.110.32, 4.8.0.110) and Niagara Enterprise Security (Versions 2.4.31, 2.4.45, 4.8.0.35) to correct.
Attacker Value
Unknown

CVE-2020-9522

Disclosure Date: June 16, 2020 (last updated February 21, 2025)
Cross Site Scripting (XSS) vulnerability in Micro Focus ArcSight Enterprise Security Manager (ESM) product, Affecting versions 7.0.x, 7.2 and 7.2.1 . The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS) or information disclosure.
Attacker Value
Unknown

CVE-2020-5358

Disclosure Date: June 11, 2020 (last updated February 21, 2025)
Dell Encryption versions prior to 10.7 and Dell Endpoint Security Suite versions prior to 2.7 contain a privilege escalation vulnerability due to incorrect permissions. A local malicious user with low privileges could potentially exploit this vulnerability to gain elevated privilege on the affected system with the help of a symbolic link.
Attacker Value
Unknown

CVE-2020-9488

Disclosure Date: April 27, 2020 (last updated February 21, 2025)
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1