CVE-2021-44228 |
Apache |
Remote code execution vulnerability in Apache Log4j |
13/12/2021 |
10 |
Remote code execution vulnerability in Apache Log4j. It is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password. |
CVE-2020-1472 |
Microsoft |
Netlogon Elevation of Privilege Vulnerability |
16/09/2020 |
10 |
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'. |
CVE 2020-1350 |
Microsoft |
Windows DNS Server Remote Code Execution Vulnerability |
16/07/2020 |
10 |
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this vulnerability. To exploit the vulnerability, an unauthenticated attacker could send malicious requests to a Windows DNS server. |
CVE-2020-12388 |
Mozilla |
Firefox Default Content Process DACL Sandbox Escape |
26/06/2020 |
10 |
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR versions lower than 68.8 and Firefox versions lower than 76. |
CVE-2020-3765? |
Adobe |
Adobe After Effects Out-of-Bounds Write Vulnerability (APSB20-09)? |
21/05/2020 |
10 |
Adobe After Effects have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.? |
CVE-2020-0609 |
Microsoft |
Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability |
21/05/2020 |
10 |
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. |
CVE-2020-0796 |
Microsoft |
Microsoft Windows SMBv3 Client/Server Remote Code Execution Vulnerability |
21/05/2020 |
10 |
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client. |
CVE-2021-17095 |
Microsoft |
Hyper-V Remote Code Execution Vulnerability |
26/02/2021 |
9.9 |
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit this vulnerability, an attacker could run a specially crafted application on a Hyper-V guest that could cause the Hyper-V host operating system to execute arbitrary code when it fails to properly validate vSMB packet data. |
CVE-2021-28480 |
Microsoft |
Microsoft Exchange Server Remote Code Execution Vulnerability |
20/05/2021 |
9.8 |
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28481, CVE-2021-28482, CVE-2021-28483. |
CVE-2020-27955 |
Git/GitHub |
Git Large File Storage / Git LFS (git-lfs) - Remote Code Execution (RCE) |
09/12/2020 |
9.8 |
Git LFS 2.12.0 allows Remote Code Execution. |
CVE-2020-17051 |
Microsoft |
Windows Network File System Remote Code Execution Vulnerability |
13/11/2020 |
9.8 |
Windows Network File System Remote Code Execution Vulnerability |
CVE-2020-16898 |
Microsoft |
Windows TCP/IP Remote Code Execution Vulnerability |
23/10/2020 |
9.8 |
A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Remote Code Execution Vulnerability'. |
CVE-2019-0708 |
Microsoft |
Remote Desktop Services Remote Code Execution Vulnerability |
24/09/2020 |
9.8 |
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability |
CVE-2019-19781 |
Citrix |
Vulnerability in Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance |
24/09/2020 |
9.8 |
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal. |
CVE-2019-1181 |
Microsoft |
Remote Desktop Services Remote Code Execution Vulnerability |
24/09/2020 |
9.8 |
"A remote code execution vulnerability exists in Remote Desktop Services (formerly known as Terminal Services) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka ""Remote Desktop Services Remote Code Execution Vulnerability"". This CVE ID is unique from CVE-2019-1182, CVE-2019-1222, CVE-2019-1226." |
CVE-2019-1182 |
Microsoft |
Remote Desktop Services Remote Code Execution Vulnerability |
24/09/2020 |
9.8 |
"A remote code execution vulnerability exists in Remote Desktop Services (formerly known as Terminal Services) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka ""Remote Desktop Services Remote Code Execution Vulnerability"". This CVE ID is unique from CVE-2019-1181, CVE-2019-1222, CVE-2019-1226." |
CVE-2018-4878 |
Adobe |
Adobe Flash Player Use After Free Remote Code Execution Vulnerability |
21/05/2020 |
9.8 |
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. |
CVE-2019-0604 |
Microsoft |
Microsoft Sharepoint Remote Code Execution Vulnerability |
21/05/2020 |
9.8 |
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package |
CVE 2019-16452 |
Adobe |
Adobe User After Free Arbitrary Code Execution Vulnerability |
28/05/2020 |
9.8 |
Adobe Acrobat and Reader versions , 2019.021.20056 and earlier, 2017.011.30152 and earlier, 2017.011.30155 and earlier version, 2017.011.30152 and earlier, and 2015.006.30505 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution . |
CVE-2020-6457 |
Google |
Use after free in speech recognizer in Google Chrome |
29/01/2021 |
9.6 |
Use after free in speech recognizer in Google Chrome prior to 81.0.4044.113 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. |
CVE-2021-26855 |
Microsoft |
Microsoft Exchange Server Remote Code Execution Vulnerability |
03/03/2021 |
9.1 |
Server-side request forgery (SSRF) vulnerability in Exchange which allows the attacker to send arbitrary HTTP requests and authenticate as the Exchange server. Check for details here: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/ |
CVE-2021-30563 |
Google |
Type Confusion in V8 |
16/07/2021 |
9 |
https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html |
CVE-2020-0665 |
Microsoft |
Microsoft Active Directory Privilege Escalation Vulnerability |
21/05/2020 |
9 |
The vulnerability exists in Active Directory Forest trust due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest. The vulnerability allows a remote user to escalate privileges on the system. A remote user can gain elevated privileges on the target system.? |
CVE-2022-2294 |
Google |
Buffer overflow in WebRTC |
15/11/2022 |
8.8 |
Heap buffer overflow in WebRTC in Google Chrome prior to 103.0.5060.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
CVE-2022-3723 |
Google |
Type confusion in V8 |
15/11/2022 |
8.8 |
Type confusion in V8 in Google Chrome prior to 107.0.5304.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
CVE-2022-41040 |
Microsoft |
Server-side request forgery |
15/11/2022 |
8.8 |
Microsoft Exchange Server Elevation of Privilege Vulnerability. |
CVE-2022-41082 |
Microsoft |
Remote code execution |
15/11/2022 |
8.8 |
Microsoft Exchange Server Remote Code Execution Vulnerability. |
CVE-2022-41128 |
Microsoft |
JScript9 remote code execution |
15/11/2022 |
8.8 |
Windows Scripting Languages Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41118. |
CVE-2021-42321 |
Microsoft |
Microsoft Exchange Server Remote Code Execution Vulnerability |
19/11/2021 |
8.8 |
"Post-authentication vulnerability in Exchange 2016 and 2019. More information: |
CVE-2021-40444 |
Microsoft |
Microsoft MSHTML Remote Code Execution Vulnerability |
24/09/2021 |
8.8 |
An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
CVE-2021-34527 |
Microsoft |
Windows Print Spooler Remote Code Execution Vulnerability |
07/07/2021 |
8.8 |
"A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights." |
CVE-2021-21166 |
Google |
Heap corruption via a crafted HTML page in Google Chrome prior to 89.0.4389.72 |
04/05/2021 |
8.8 |
Data race in audio in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
CVE-2020-16898 |
Microsoft |
Windows TCP/IP Remote Code Execution Vulnerability |
04/05/2021 |
8.8 |
A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client. To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows computer. The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles ICMPv6 Router Advertisement packets. |
CVE-2021-26411 |
Microsoft |
Internet Explorer Memory Corruption Vulnerability |
17/03/2021 |
8.8 |
An attacker could host a specially crafted website designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email. |
CVE-2021-21193 |
Google |
Use after free in Blink in Google Chrome vulnerability |
17/03/2021 |
8.8 |
Use after free in Blink in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
CVE-2021-21017 |
Adobe |
Adobe Reader Heap-based buffer overflow vulnerability |
19/02/2021 |
8.8 |
"Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. |
CVE-2017-0144 |
Microsoft |
Windows SMB Remote Code Execution Vulnerability |
24/09/2020 |
8.1 |
"The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka ""Windows SMB Remote Code Execution Vulnerability."" This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0145, CVE-2017-0146, and CVE-2017-0148." |
CVE-2022-1364 |
Google |
Type confusion in the Chrome V8 JavaScript engine. |
18/04/2022 |
8.0 |
https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_14.html |
CVE-2022-1096 |
Google |
Type confusion weakness in the Chrome V8 JavaScript engine. |
28/03/2022 |
8.0 |
https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_25.html |
CVE-2022-0609 |
Google |
Use after free in Animation |
22/02/2022 |
8.0 |
https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html |
CVE-2021-38000 |
Google |
Insufficient validation of untrusted input in Intents |
29/10/2021 |
8.0 |
An insufficient validation of untrusted input security issue has been found in the Intents component of the Chromium browser engine before version 95.0.4638.69. |
CVE-2021-21148 |
Google |
Heap buffer overflow in V8 |
10/02/2021 |
8.0 |
"Heap buffer overflow vulnerability in V8, Google Chrome?s open-source JavaScript and WebAssembly engine. Fixed by Google with an update to the Stable channel to version 88.0.4324.150. NOTE: no CVSS score has been assigned yet for this vulnerability, although Google has labeled it as ""high severity"". We have provisionally set a score of 8.0 to simplify prioritization. " |
CVE-2022-22047 |
Microsoft |
CSRSS Elevation of Privilege |
|
7.8 |
Windows CSRSS Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22026, CVE-2022-22049. |
CVE-2022-41033 |
Microsoft |
COM+ event system service elevation of privilege |
|
7.8 |
Windows COM+ Event System Service Elevation of Privilege Vulnerability. |
CVE-2022-41125 |
Microsoft |
CNG Key Isolation Service elevation of privilege |
|
7.8 |
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability. |
CVE-2022-30190 |
Microsoft |
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability |
06/06/2022 |
7.8 |
A remote code execution vulnerability exists when MSDT is called using the URL protocol from a calling application such as Word. An attacker who successfully exploits this vulnerability can run arbitrary code with the privileges of the calling application. The attacker can then install programs, view, change, or delete data, or create new accounts in the context allowed by the user?s rights. |
CVE-2021-42292 |
Microsoft |
Microsoft Excel Security Feature Bypass Vulnerability |
19/11/2021 |
7.8 |
"More information on: |
CVE-2021-40449 |
Microsoft |
Win32k Elevation of Privilege Vulnerability |
13/10/2021 |
7.8 |
Win32k Elevation of Privilege Vulnerability. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40449 |
CVE-2021-33771 |
Microsoft |
Windows Kernel Elevation of Privilege Vulnerability |
16/07/2021 |
7.8 |
Windows Kernel Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31979, CVE-2021-34514. |
CVE-2021-26868 |
Microsoft |
Windows Graphics Component Elevation of Privilege Vulnerability |
07/07/2021 |
7.8 |
Windows Graphics Component Elevation of Privilege Vulnerability |
CVE-2021-31956 |
Microsoft |
Windows NTFS Elevation of Privilege Vulnerability |
09/06/2021 |
7.8 |
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. |
CVE-2021-31167 |
Microsoft |
Windows Container Manager Service Elevation of Privilege Vulnerability |
20/05/2021 |
7.8 |
Windows Container Manager Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-31165, CVE-2021-31168, CVE-2021-31169, CVE-2021-31208. |
CVE-2021-28310 |
Microsoft |
Win32k Elevation of Privilege Vulnerability |
04/05/2021 |
7.8 |
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-27072. |
CVE-2021-1732 |
Microsoft |
Windows Win32k Elevation of Privilege Vulnerability |
12/02/2021 |
7.8 |
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1732. For a technical analysis, you can visit https://attackerkb.com/topics/7eGGM4Xknz/cve-2021-1732 |
CVE-2021-26857 |
Microsoft |
Microsoft Exchange Server Remote Code Execution Vulnerability |
03/03/2021 |
7.8 |
Insecure deserialization vulnerability in the Unified Messaging service. Insecure deserialization is where untrusted user-controllable data is deserialized by a program. Exploiting this vulnerability gives attackers the ability to run code as SYSTEM on the Exchange server. This requires administrator permission or another vulnerability to exploit. For details check here: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/ |
CVE-2021-26858 |
Microsoft |
Microsoft Exchange Server Remote Code Execution Vulnerability |
03/03/2021 |
7.8 |
Post-authentication arbitrary file write vulnerability in Exchange. If attackers can authenticate with the Exchange server then they can use this vulnerability to write a file to any path on the server. They can authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin?s credentials. For details check here: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/ |
CVE-2021-27065 |
Microsoft |
Microsoft Exchange Server Remote Code Execution Vulnerability |
03/03/2021 |
7.8 |
Post-authentication arbitrary file write vulnerability in Exchange. If attackers can authenticate with the Exchange server then they can use this vulnerability to write a file to any path on the server. They can authenticate by exploiting the CVE-2021-26855 SSRF vulnerability or by compromising a legitimate admin?s credentials. For details check here: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/ |
CVE-2020-1170 |
Microsoft |
Cloud Filter Arbitrary File Creation / Privilege Escalation |
29/01/2021 |
7.8 |
An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1163. |
CVE-2020-17136 |
Microsoft |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
29/01/2021 |
7.8 |
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
CVE-2021-1647 |
Microsoft |
Microsoft Defender Remote Code Execution Vulnerability |
14/01/2021 |
7.8 |
Remote code execution (RCE) bug that allows threat actors to execute code on vulnerable devices where Defender is installed, without user interaction. |
CVE-2020-1054 |
Microsoft |
Win32k Elevation of Privilege Vulnerability |
28/09/2020 |
7.8 |
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143. |
CVE-2019-0808 |
Microsoft |
Win32k Elevation of Privilege Vulnerability |
28/09/2020 |
7.8 |
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797. |
CVE-2020-0986 |
Microsoft |
Windows Kernel Elevation of Privilege Vulnerability |
11/09/2020 |
7.8 |
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. |
CVE-2020-17087 |
Microsoft |
Windows Kernel Local Elevation of Privilege Vulnerability |
13/11/2020 |
7.8 |
Windows Kernel Local Elevation of Privilege Vulnerability |
CVE-2020-0642 |
Microsoft |
Microsoft Windows Win32k Privilege Escalation |
04/08/2020 |
7.8 |
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. |
CVE-2020-1048 |
Microsoft |
Windows Print Spooler Elevation of Privilege Vulnerability |
26/06/2020 |
7.8 |
"An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application." |
?CVE-2020-0787 |
Microsoft |
Microsoft Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability |
21/05/2020 |
7.8 |
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. |
CVE-2021-33742 |
Microsoft |
Windows MSHTML Platform Remote Code Execution Vulnerability |
09/06/2021 |
7.5 |
Windows MSHTML Platform Remote Code Execution Vulnerability |
CVE-2020-1206 |
Microsoft |
Microsoft Windows SMBv3 Client/Server Remote Code Execution Vulnerability |
26/06/2020 |
7.5 |
An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user?s system. To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 server. To exploit the vulnerability against a client, an unauthenticated attacker would need to configure a malicious SMBv3 server and convince a user to connect to it. |
CVE-2021-26411 |
Microsoft |
Internet Explorer Memory Corruption Vulnerability |
04/05/2021 |
7.5 |
An attacker could host a specially crafted website designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email. |
?CVE-2020-0674 |
Microsoft |
Microsoft Scripting Engine Memory Corruption Vulnerability |
21/05/2020 |
7.5 |
"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. An attacker could then install programs; view, change, or delete data or create new accounts with full user rights." |
?CVE-2020-3941 |
VMWare |
VMWare Privilege Escalation Vulnerability |
21/05/2020 |
7.2 |
A vulnerability exists in VMware Tools for windows, which may allow for privilege escalation in the Virtual Machine where Tools is installed. A malicious actor on the guest VM might exploit the race condition and escalate their privileges on a Windows VM.? |
CVE-2020-15999 |
Google |
Heap buffer overflow in Freetype in Google Chrome Vulnerability |
13/11/2020 |
6.5 |
"Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. NOTE: This vulnerability has been added, despite having a ""Medium"" score, due to is active exploitation in the wild, in conjunction with Vulnerability CVE-2020-17087." |
CVE-2020-15999 |
Google |
Heap buffer overflow in Freetype in Google Chrome Vulnerability |
13/11/2020 |
6.5 |
"Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. NOTE: This vulnerability has been added, despite having a ""Medium"" score, due to is active exploitation in the wild, in conjunction with Vulnerability CVE-2020-17087." |