Total
29582 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-0157 | 1 Intel | 484 Celeron N2805, Celeron N2806, Celeron N2807 and 481 more | 2024-11-21 | 6.7 Medium |
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2021-0151 | 1 Intel | 30 Ac1550, Ac1550 Firmware, Ac 3165 and 27 more | 2024-11-21 | 7.8 High |
Improper access control in the installer for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products in Windows 10 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2021-0146 | 1 Intel | 144 Atom C3000, Atom C3000 Firmware, Atom X5-e3930 and 141 more | 2024-11-21 | 6.8 Medium |
Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | ||||
CVE-2021-0133 | 1 Intel | 219 Secl-dc, Xeon Bronze 3104, Xeon Bronze 3106 and 216 more | 2024-11-21 | 8.1 High |
Key exchange without entity authentication in the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable escalation of privilege via network access. | ||||
CVE-2021-0129 | 4 Bluez, Debian, Linux and 1 more | 4 Bluez, Debian Linux, Linux Kernel and 1 more | 2024-11-21 | 5.7 Medium |
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. | ||||
CVE-2021-0121 | 2 Intel, Microsoft | 2 Iris Xe Max Dedicated Graphics, Windows 10 | 2024-11-21 | 7.8 High |
Improper access control in the installer for some Intel(R) Iris(R) Xe MAX Dedicated Graphics Drivers for Windows 10 before version 27.20.100.9466 may allow authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2021-0110 | 1 Intel | 30 Core I3-10100y, Core I3-10110u, Core I3-10110y and 27 more | 2024-11-21 | 5.5 Medium |
Improper access control in some Intel(R) Thunderbolt(TM) Windows DCH Drivers before version 1.41.1054.0 may allow unauthenticated user to potentially enable denial of service via local access. | ||||
CVE-2021-0098 | 1 Intel | 1 Unite | 2024-11-21 | 7.8 High |
Improper access control in the Intel Unite(R) Client for Windows before version 4.2.25031 may allow an authenticated user to potentially enable an escalation of privilege via local access. | ||||
CVE-2021-0073 | 1 Intel | 1 Driver \& Support Assistant | 2024-11-21 | 7.8 High |
Insufficient control flow management in Intel(R) DSA before version 20.11.50.9 may allow an authenticated user to potentially enable escalation of privilege via local access. | ||||
CVE-2021-0067 | 1 Intel | 154 Nuc 10 Performance Kit Nuc10i3fnh, Nuc 10 Performance Kit Nuc10i3fnh Firmware, Nuc 10 Performance Kit Nuc10i3fnhf and 151 more | 2024-11-21 | 6.7 Medium |
Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. | ||||
CVE-2020-9979 | 1 Apple | 3 Ipados, Iphone Os, Tvos | 2024-11-21 | 5.5 Medium |
A trust issue was addressed by removing a legacy API. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0. An attacker may be able to misuse a trust relationship to download malicious content. | ||||
CVE-2020-9963 | 1 Apple | 3 Ipados, Iphone Os, Mac Os X | 2024-11-21 | 5.5 Medium |
The issue was addressed with improved handling of icon caches. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.0 and iPadOS 14.0. A malicious app may be able to determine the existence of files on the computer. | ||||
CVE-2020-9860 | 1 Apple | 1 Safari | 2024-11-21 | 5.4 Medium |
A custom URL scheme handling issue was addressed with improved input validation. This issue is fixed in Safari 13.0.5. Processing a maliciously crafted URL may lead to arbitrary javascript code execution. | ||||
CVE-2020-9857 | 1 Apple | 1 Mac Os X | 2024-11-21 | 4.3 Medium |
An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.5, Security Update 2020-003 Mojave, Security Update 2020-003 High Sierra. A malicious website may be able to exfiltrate autofilled data in Safari. | ||||
CVE-2020-9850 | 2 Apple, Redhat | 9 Icloud, Ipados, Iphone Os and 6 more | 2024-11-21 | 9.8 Critical |
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A remote attacker may be able to cause arbitrary code execution. | ||||
CVE-2020-9840 | 1 Apple | 1 Nioextras | 2024-11-21 | 7.5 High |
In SwiftNIO Extras before 1.4.1, a logic issue was addressed with improved restrictions. | ||||
CVE-2020-9787 | 1 Apple | 5 Ipad Os, Iphone Os, Mac Os X and 2 more | 2024-11-21 | 5.3 Medium |
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. Some websites may not have appeared in Safari Preferences. | ||||
CVE-2020-9784 | 1 Apple | 1 Safari | 2024-11-21 | 4.3 Medium |
A logic issue was addressed with improved restrictions. This issue is fixed in Safari 13.1. A malicious iframe may use another website’s download settings. | ||||
CVE-2020-9668 | 3 Adobe, Apple, Microsoft | 3 Genuine Service, Macos, Windows | 2024-11-21 | 7.8 High |
Adobe Genuine Service version 6.6 (and earlier) is affected by an Improper Access control vulnerability when handling symbolic links. An unauthenticated attacker could exploit this to elevate privileges in the context of the current user. | ||||
CVE-2020-9300 | 1 Netflix | 1 Dispatch | 2024-11-21 | 6.5 Medium |
The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user. |