Latest CVE Feed
-
7.5
HIGHCVE-2020-8893
An issue was discovered in MISP before 2.4.121. The Galaxy view contained an incorrectly sanitized search string in app/View/Galaxies/view.ctp.... Read more
- Published: Feb. 12, 2020
- Modified: Nov. 21, 2024
-
8.1
HIGHCVE-2020-8892
An issue was discovered in MISP before 2.4.121. It did not consider the HTTP PUT method when trying to block a brute-force series of invalid requests.... Read more
- Published: Feb. 12, 2020
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2020-8891
An issue was discovered in MISP before 2.4.121. It did not canonicalize usernames when trying to block a brute-force series of invalid requests.... Read more
- Published: Feb. 12, 2020
- Modified: Nov. 21, 2024
-
5.9
MEDIUMCVE-2020-8890
An issue was discovered in MISP before 2.4.121. It mishandled time skew (between the machine hosting the web server and the machine hosting the database) when trying to block a brute-force series of invalid requests.... Read more
- Published: Feb. 12, 2020
- Modified: Nov. 21, 2024
-
9.0
HIGHCVE-2020-8884
rcdsvc in the Proofpoint Insider Threat Management Windows Agent (formerly ObserveIT Windows Agent) before 7.9 allows remote authenticated users to execute arbitrary code as SYSTEM because of improper deserialization over named pipes.... Read more
Affected Products : insider_threat_management- Published: Jan. 06, 2021
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8883
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a mal... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8882
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8881
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8880
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8879
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a mal... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8878
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2020-8877
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a mal... Read more
- Published: Mar. 20, 2020
- Modified: Nov. 21, 2024
-
6.5
MEDIUMCVE-2020-8876
This vulnerability allows local attackers to disclose information on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerabi... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.8
HIGHCVE-2020-8875
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerabil... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2020-8874
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vul... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2020-8873
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.2-47123. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vul... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
6.0
MEDIUMCVE-2020-8872
This vulnerability allows local attackers to disclose sensitive information on affected installations of Parallels Desktop 15.1.1-47117. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to explo... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
8.2
HIGHCVE-2020-8871
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 15.1.0-47107 . An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vu... Read more
Affected Products : parallels_desktop- Published: Mar. 23, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8870
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Aug. 20, 2020
- Modified: Nov. 21, 2024
-
7.8
HIGHCVE-2020-8869
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious f... Read more
- Published: Aug. 20, 2020
- Modified: Nov. 21, 2024