CVE, Title, Vendor |
Description |
CVSS v3.1 Base Score |
Date Created |
Date Updated |
CVE-2020-1300
Microsoft Windows Remote Code Execution Vulnerability
Microsoft
|
A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files. To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver. |
CVSSv3BaseScore:7.8(AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) |
06/09/2020 |
06/16/2020 |
CVE-2020-1206
Microsoft Windows SMBv3 Client/Server Remote Code Execution Vulnerability
Microsoft
|
An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system. To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a target. |
CVSSv3BaseScore:8.6(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) |
06/09/2020 |
06/12/2020 |
CVE-2020-1054
Microsoft Win32k Elevation of Privilege Vulnerability
Microsoft
|
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. |
CVSSv3BaseScore:7.0(AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) |
05/21/2020 |
05/27/2020 |
CVE-2020-5410
Spring Cloud Config Directory Traversal Vulnerability
VMWare
|
Spring Cloud Config allows applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack. |
CVSSv3BaseScore:7.5(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) |
06/02/2020 |
06/04/2020 |
CVE-2020-1301
Microsoft Windows SMB Authenticated Remote Code Execution Vulnerability
Microsoft
|
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit the vulnerability an authenticated attacker could send a specially crafted packet to a targeted SMBv1 server. |
CVSSv3BaseScore:7.5(AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) |
06/09/2020 |
06/15/2020 |
CVE-2020-1181
Microsoft SharePoint Server Remote Code Execution Vulnerability
Microsoft
|
A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.Net web controls. An authenticated attacker who successfully exploited the vulnerability could use a specially crafted page to perform actions in the security context of the SharePoint application pool process. To exploit the vulnerability, an authenticated user must create and invoke a specially crafted page on an affected version of Microsoft SharePoint Server. |
CVSSv3BaseScore:8.8(AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) |
06/09/2020 |
06/12/2020 |
CVE-2020-0796
Microsoft Windows SMBv3 Client/Server Remote Code Execution Vulnerability
Microsoft
|
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client. To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 server. |
CVSSv3BaseScore:10.0(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) |
03/12/2020 |
06/11/2020 |
CVE-2020-13160
AnyDesk UDP Discovery Remote Code Execution Vulnerability
AnyDesk
|
A format string vulnerability exists in AnyDesk that can be exploited for remote code execution. By sending a single UDP packet to the target machine, an attacker can successfully exploit the discovered format string vulnerability to gain Remote Code Execution. |
CVSSv3BaseScore:9.8(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) |
06/09/2020 |
06/11/2020 |
CVE-2018-13379
Fortinet FortiOS Directory Traversal Vulnerability
Fortinet
|
Fortinet FortiOS is exposed to a directory traversal vulnerability because it fails to properly sanitize user supplied input. A path traversal vulnerability in the FortiOS SSL VPN web portal may allow an unauthenticated attacker to download FortiOS system files through specially crafted HTTP resource requests. |
CVSSv3BaseScore:9.8(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) |
06/04/2019 |
01/22/2020 |