Showing topics marked with the following tags:

(10 of 29)

Sort by:
Attacker Value
Very Low

Unknown iOS Mail.App RCE ZecOps

Last updated May 13, 2020
To quote the Reuters report: "To execute the hack, Avraham said victims would be sent an apparently blank email message through the Mail app forcing a crash and reset. The crash opened the door for hackers to steal other data on the device, such as photos and contact details." So, it sounds like a font or other kind of render thing in Mail.App. No clicks required other than opening the email.
Utility Class: RCE
2
Attacker Value
Very Low

CVE-2018-19131

Disclosure Date: November 09, 2018 (last updated March 10, 2020)
Squid before 4.4 has XSS via a crafted X.509 certificate during HTTP(S) error page generation for certificate errors.
Attack Vector: Network
0
Attacker Value
Very High

CVE-2020-6418

Disclosure Date: February 27, 2020 (last updated June 02, 2020)
Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attack Vector: Network
0
Attacker Value
Very Low

CVE-2018-13383

Disclosure Date: May 29, 2019 (last updated March 10, 2020)
A heap buffer overflow in Fortinet FortiOS all versions below 6.0.5 in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages.
Attack Vector: Network
0
Attacker Value
Moderate

CVE-2020-0787

Disclosure Date: March 12, 2020 (last updated March 17, 2020)
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
Attack Vector: Local
0
Attacker Value
High

CVE-2019-7244

Disclosure Date: March 25, 2020 (last updated April 02, 2020)
An issue was discovered in kerneld.sys in AIDA64 before 5.99. The vulnerable driver exposes a wrmsr instruction via IOCTL 0x80112084 and does not properly filter the Model Specific Register (MSR). Allowing arbitrary MSR writes can lead to Ring-0 code execution and escalation of privileges.
Attack Vector: Network
0
Attacker Value
Very High

CVE-2012-0002

Disclosure Date: March 13, 2012 (last updated June 02, 2020)
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability."
0
Attacker Value
Low

CVE-2020-0791

Disclosure Date: March 12, 2020 (last updated March 18, 2020)
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0898.
Attack Vector: Local
0
Attacker Value
Low

CVE-2020-1015

Disclosure Date: April 15, 2020 (last updated April 22, 2020)
An elevation of privilege vulnerability exists in the way that the User-Mode Power Service (UMPS) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0934, CVE-2020-0983, CVE-2020-1009, CVE-2020-1011.
Attack Vector: Local
0
Attacker Value
High

CVE-2020-0796 - SMBGhost

Last updated April 21, 2020
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in Microsoft SMB Servers. The vulnerability is due to an error when the vulnerable software handles a maliciously crafted compressed data packet. A remote, unauthenticated attacker can exploit this to execute arbitrary code within the context of the application.
Utility Class: RCE
1