Show filters
142 Total Results
Displaying 91-100 of 142
Sort by:
Attacker Value
Unknown

CVE-2021-26313

Disclosure Date: June 08, 2021 (last updated February 22, 2025)
Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.
Attacker Value
Unknown

CVE-2020-26145

Disclosure Date: May 11, 2021 (last updated February 22, 2025)
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
Attacker Value
Unknown

CVE-2020-26146

Disclosure Date: May 11, 2021 (last updated February 22, 2025)
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.
Attacker Value
Unknown

CVE-2020-26144

Disclosure Date: May 11, 2021 (last updated February 22, 2025)
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
Attacker Value
Unknown

CVE-2021-1227

Disclosure Date: February 24, 2021 (last updated February 22, 2025)
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the NX-API on an affected device. An attacker could exploit this vulnerability by persuading a user of the NX-API to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. The attacker could view and modify the device configuration. Note: The NX-API feature is disabled by default.
Attacker Value
Unknown

CVE-2020-7548

Disclosure Date: December 01, 2020 (last updated February 22, 2025)
A CWE-330 - Use of Insufficiently Random Values vulnerability exists in Smartlink, PowerTag, and Wiser Series Gateways (see security notification for version information) that could allow unauthorized users to login.
Attacker Value
Unknown

CVE-2020-8694

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2020-8695

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2020-24457

Disclosure Date: September 14, 2020 (last updated November 28, 2024)
Logic error in BIOS firmware for 8th, 9th and 10th Generation Intel(R) Core(TM) Processors may allow an unauthenticated user to potentially enable escalation of privilege, denial of service and/or information disclosure via physical access.
Attacker Value
Unknown

CVE-2020-0529

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Improper initialization in BIOS firmware for 8th, 9th and 10th Generation Intel(R) Core(TM) Processor families may allow an unauthenticated user to potentially enable escalation of privilege via local access.