CVE-2021-1088
https://notcve.org/view.php?id=CVE-2021-1088
NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to utilize debug mechanisms with insufficient access control, which may lead to information disclosure. La GPU NVIDIA y el hardware Tegra contienen una vulnerabilidad en el microcontrolador interno que puede permitir a un usuario con altos privilegios usar mecanismos de depuración con un control de acceso insuficiente, que puede conllevar a una divulgación de información • https://nvidia.custhelp.com/app/answers/detail/a_id/5263 •
CVE-2020-12695 – hostapd: UPnP SUBSCRIBE misbehavior in WPS AP
https://notcve.org/view.php?id=CVE-2020-12695
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue. La especificación UPnP de Open Connectivity Foundation antes del 17-04-2020 no prohíbe la aceptación de una petición de suscripción con una URL de entrega en un segmento de red diferente a la URL de suscripción de evento totalmente calificada, también se conoce como el problema de CallStranger • https://github.com/yunuscadirci/CallStranger http://packetstormsecurity.com/files/158051/CallStranger-UPnP-Vulnerability-Checker.html http://www.openwall.com/lists/oss-security/2020/06/08/2 https://corelight.blog/2020/06/10/detecting-the-new-callstranger-upnp-vulnerability-with-zeek https://github.com/corelight/callstranger-detector https://lists.debian.org/debian-lts-announce/2020/08/msg00011.html https://lists.debian.org/debian-lts-announce/2020/08/msg00013.html https://lists.debian.org/debian-l • CWE-276: Incorrect Default Permissions CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2019-5620 – ABB MicroSCADA Pro SYS600 Missing Authentication for Critical Function
https://notcve.org/view.php?id=CVE-2019-5620
ABB MicroSCADA Pro SYS600 version 9.3 suffers from an instance of CWE-306: Missing Authentication for Critical Function. ABB MicroSCADA Pro SYS600 versión 9.3, sufre de una instancia CWE-306: Falta de Autenticación para una Función Crítica. • https://www.rapid7.com/db/modules/exploit/windows/scada/abb_wserver_exec • CWE-306: Missing Authentication for Critical Function •
CVE-2020-7485
https://notcve.org/view.php?id=CVE-2020-7485
**VERSION NOT SUPPORTED WHEN ASSIGNED** A legacy support account in the TriStation software version v4.9.0 and earlier could cause improper access to the TriStation host machine. This was addressed in TriStation version v4.9.1 and v4.10.1 released on May 30, 2013.1 **VERSIÓN NO COMPATIBLE CUANDO SE ASIGNÓ** Una cuenta de soporte heredada en la versión v4.9.0 y anteriores del software TriStation podría causar un acceso inapropiado a la máquina host de TriStation. Esto fue abordado en TriStation versiones v4.9.1 y v4.10.1 publicadas en May 30, 2013.1 • https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01 https://www.se.com/ww/en/download/document/SESB-2020-105-01 •
CVE-2020-7484
https://notcve.org/view.php?id=CVE-2020-7484
**VERSION NOT SUPPORTED WHEN ASSIGNED** A vulnerability with the former 'password' feature could allow a denial of service attack if the user is not following documented guidelines pertaining to dedicated TriStation connection and key-switch protection. This vulnerability was discovered and remediated in versions v4.9.1 and v4.10.1 on May 30, 2013. This feature is not present in version v4.9.1 and v4.10.1 through current. Therefore, the vulnerability is not present in these versions. **VERSIÓN NO COMPATIBLE CUANDO SE ASIGNÓ** Una vulnerabilidad con la antigua funcionalidad "password" podría permitir un ataque de denegación de servicio si el usuario no sigue las directrices documentadas relativas a la conexión de TriStation dedicada y a la protección key-switch. • https://us-cert.cisa.gov/ics/advisories/icsa-20-205-01 https://www.se.com/ww/en/download/document/SESB-2020-105-01 •