CVE-2020-8607

CVSS v3 Score
6.7
Medium
CVSS v2 Score
7.2
High

Vulnerability Description

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.

CVSS:6.7(Medium)

A vulnerability in the CLI of Cisco UCS Central Software could allow an authenticated, local attacker to gain shell access. The vulnerability is due to insufficient input validation of commands entere...

CWE-202017
CVSS:6.7(Medium)

A vulnerability in the Python scripting subsystem of Cisco NX-OS Software could allow an authenticated, local attacker to escape the Python parser and gain unauthorized access to the underlying operat...

CWE-202017
CVSS:6.7(Medium)

An untrusted search path (aka DLL Preloading) vulnerability in the Cisco Immunet antimalware installer could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a loc...

CWE-202017
CVSS:6.7(Medium)

A vulnerability in the CLI of Cisco NX-OS System Software could allow an authenticated, local attacker to perform a command injection attack. An attacker would need valid administrator credentials to ...

CWE-202017
CVSS:6.7(Medium)

PRTG Network Monitor 17.3.33.2830 allows remote authenticated administrators to execute arbitrary code by uploading a .exe file and then proceeding in spite of the error message.

CWE-202017
CVSS:6.7(Medium)

cPanel before 64.0.21 allows code execution via Rails configuration files (SEC-259).

CWE-202017