Search Results (23485 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-16992 1 Microsoft 1 Azure Sphere 2024-11-21 7.5 High
Azure Sphere Elevation of Privilege Vulnerability
CVE-2020-16991 1 Microsoft 1 Azure Sphere 2024-11-21 7.3 High
Azure Sphere Unsigned Code Execution Vulnerability
CVE-2020-16990 1 Microsoft 1 Azure Sphere 2024-11-21 6.2 Medium
Azure Sphere Information Disclosure Vulnerability
CVE-2020-16989 1 Microsoft 1 Azure Sphere 2024-11-21 5.4 Medium
Azure Sphere Elevation of Privilege Vulnerability
CVE-2020-16988 1 Microsoft 1 Azure Sphere 2024-11-21 6.9 Medium
Azure Sphere Elevation of Privilege Vulnerability
CVE-2020-16987 1 Microsoft 1 Azure Sphere 2024-11-21 7.3 High
Azure Sphere Unsigned Code Execution Vulnerability
CVE-2020-16986 1 Microsoft 1 Azure Sphere 2024-11-21 6.2 Medium
Azure Sphere Denial of Service Vulnerability
CVE-2020-16985 1 Microsoft 1 Azure Sphere 2024-11-21 6.2 Medium
Azure Sphere Information Disclosure Vulnerability
CVE-2020-16984 1 Microsoft 1 Azure Sphere 2024-11-21 7.3 High
Azure Sphere Unsigned Code Execution Vulnerability
CVE-2020-16983 1 Microsoft 1 Azure Sphere 2024-11-21 5.7 Medium
Azure Sphere Tampering Vulnerability
CVE-2020-16982 1 Microsoft 1 Azure Sphere 2024-11-21 6.1 Medium
Azure Sphere Unsigned Code Execution Vulnerability
CVE-2020-16981 1 Microsoft 1 Azure Sphere 2024-11-21 6.1 Medium
Azure Sphere Elevation of Privilege Vulnerability
CVE-2020-16979 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 5.3 Medium
Microsoft SharePoint Information Disclosure Vulnerability
CVE-2020-16970 1 Microsoft 1 Azure Sphere 2024-11-21 8.1 High
Azure Sphere Unsigned Code Execution Vulnerability
CVE-2020-16087 2 Microsoft, Vng 2 Windows, Zalo Desktop 2024-11-21 8.6 High
An issue was discovered in Zalo.exe in VNG Zalo Desktop 19.8.1.0. An attacker can run arbitrary commands on a remote Windows machine running the Zalo client by sending the user of the device a crafted file.
CVE-2020-16022 4 Apple, Google, Linux and 1 more 7 Macos, Android, Chrome and 4 more 2024-11-21 8.8 High
Insufficient policy enforcement in networking in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially bypass firewall controls via a crafted HTML page.
CVE-2020-16011 4 Debian, Google, Microsoft and 1 more 5 Debian Linux, Chrome, Windows and 2 more 2024-11-21 9.6 Critical
Heap buffer overflow in UI in Google Chrome on Windows prior to 86.0.4240.183 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
CVE-2020-15988 6 Debian, Fedoraproject, Google and 3 more 6 Debian Linux, Fedora, Chrome and 3 more 2024-11-21 6.3 Medium
Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 86.0.4240.75 allowed a remote attacker who convinced the user to open files to execute arbitrary code via a crafted HTML page.
CVE-2020-15801 3 Microsoft, Netapp, Python 3 Windows, Max Data, Python 2024-11-21 9.8 Critical
In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The <executable-name>._pth file (e.g., the python._pth file) is not affected.
CVE-2020-15707 8 Canonical, Debian, Gnu and 5 more 19 Ubuntu Linux, Debian Linux, Grub2 and 16 more 2024-11-21 5.7 Medium
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.