Show filters
223 Total Results
Displaying 71-80 of 223
Sort by:
Attacker Value
Unknown
CVE-2018-9333
Disclosure Date: January 11, 2021 (last updated February 22, 2025)
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
0
Attacker Value
Unknown
CVE-2018-8724
Disclosure Date: January 11, 2021 (last updated February 22, 2025)
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe.
0
Attacker Value
Unknown
CVE-2018-11010
Disclosure Date: January 11, 2021 (last updated February 22, 2025)
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
0
Attacker Value
Unknown
CVE-2020-25648
Disclosure Date: October 20, 2020 (last updated February 22, 2025)
A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
0
Attacker Value
Unknown
CVE-2020-1968
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
0
Attacker Value
Unknown
CVE-2020-5385
Disclosure Date: August 18, 2020 (last updated February 22, 2025)
Dell Encryption versions prior to 10.8 and Dell Endpoint Security Suite versions prior to 2.8 contain a privilege escalation vulnerability because of an incomplete fix for CVE-2020-5358. A local malicious user with low privileges could potentially exploit this vulnerability to gain elevated privilege on the affected system with the help of a symbolic link.
0
Attacker Value
Unknown
CVE-2020-14483
Disclosure Date: August 13, 2020 (last updated February 21, 2025)
A timeout during a TLS handshake can result in the connection failing to terminate. This can result in a Niagara thread hanging and requires a manual restart of Niagara (Versions 4.6.96.28, 4.7.109.20, 4.7.110.32, 4.8.0.110) and Niagara Enterprise Security (Versions 2.4.31, 2.4.45, 4.8.0.35) to correct.
0
Attacker Value
Unknown
CVE-2020-9522
Disclosure Date: June 16, 2020 (last updated February 21, 2025)
Cross Site Scripting (XSS) vulnerability in Micro Focus ArcSight Enterprise Security Manager (ESM) product, Affecting versions 7.0.x, 7.2 and 7.2.1 . The vulnerabilities could be remotely exploited resulting in Cross-Site Scripting (XSS) or information disclosure.
0
Attacker Value
Unknown
CVE-2020-5358
Disclosure Date: June 11, 2020 (last updated February 21, 2025)
Dell Encryption versions prior to 10.7 and Dell Endpoint Security Suite versions prior to 2.7 contain a privilege escalation vulnerability due to incorrect permissions. A local malicious user with low privileges could potentially exploit this vulnerability to gain elevated privilege on the affected system with the help of a symbolic link.
0
Attacker Value
Unknown
CVE-2020-9488
Disclosure Date: April 27, 2020 (last updated February 21, 2025)
Improper validation of certificate with host mismatch in Apache Log4j SMTP appender. This could allow an SMTPS connection to be intercepted by a man-in-the-middle attack which could leak any log messages sent through that appender. Fixed in Apache Log4j 2.12.3 and 2.13.1
0