Latest CVE Feed
-
5.9
MEDIUMCVE-2020-8891
An issue was discovered in MISP before 2.4.121. It did not canonicalize usernames when trying to block a brute-force series of invalid requests.... Read more
- Published: Feb. 12, 2020
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2020-8890
An issue was discovered in MISP before 2.4.121. It mishandled time skew (between the machine hosting the web server and the machine hosting the database) when trying to block a brute-force series of invalid requests.... Read more
- Published: Feb. 12, 2020
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2020-8884
rcdsvc in the Proofpoint Insider Threat Management Windows Agent (formerly ObserveIT Windows Agent) before 7.9 allows remote authenticated users to execute arbitrary code as SYSTEM because of improper deserialization over named pipes.... Read more
Affected Products : insider_threat_management- Published: Jan. 06, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8883
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a mal... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8882
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8881
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8880
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8879
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a mal... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8878
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8877
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a mal... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2020-8876
This vulnerability allows local attackers to disclose information on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerabi... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8875
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerabil... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2020-8874
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vul... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2020-8873
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vul... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
6.0
MEDIUMCVE-2020-8872
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.1-47117. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to explo... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2020-8871
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.0-47107 . An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vu... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8870
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Aug. 20, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8869
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Aug. 20, 2020
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2020-8868
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Quest Foglight Evolve 9.0.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the __service__ user account. The ... Read more
Affected Products : foglight_evolve- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2020-8867
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ... Read more
- Published: Apr. 22, 2020
- Modified: Nov. 21, 2024