CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Improper initialization in some Intel(R) Power Gadget software for Windwos all versions may allow an authenticated user to potentially enable denial of service via local access. |
Insecure inherited permissions in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access. |
Use after free in Intel(R) Power Gadget software for Windows all versions may allow an authenticated user to potentially enable escalation of privilege via local access. |
IBM Security Verify Bridge Directory Sync 1.0.1 through 1.0.12, IBM Security Verify Gateway for Windows Login 1.0.1 through 1.0.10, and IBM Security Verify Gateway for Radius 1.0.1 through 1.0.11 stores user credentials in configuration files which can be read by a local user. |
IBM OpenPages 9.0 could allow an authenticated user to obtain sensitive information such as configurations that should only be available to privileged users. |
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. |
.NET and Visual Studio Denial of Service Vulnerability |
Windows Remote Access Connection Manager Information Disclosure Vulnerability |
Win32k Elevation of Privilege Vulnerability |
Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Windows Cryptographic Services Remote Code Execution Vulnerability |
Windows Kernel Elevation of Privilege Vulnerability |
Windows Hyper-V Denial of Service Vulnerability |
Improper input validation in Microsoft Dynamics allows an unauthorized attacker to disclose information over a network. |
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.
If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.
The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with. |
Microsoft Defender for IoT Elevation of Privilege Vulnerability |
Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft Office OneNote Remote Code Execution Vulnerability |
Windows Contacts Remote Code Execution Vulnerability |
Windows COM+ Event System Service Elevation of Privilege Vulnerability |