Original release date: November 16, 2020
The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.
High Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
bbraun — onlinesuite_application_package | A relative path traversal attack in the B. Braun OnlineSuite Version AP 3.0 and earlier allows unauthenticated attackers to upload or download arbitrary files. | 2020-11-06 | 7.5 |
CVE-2020-25172 MISC |
google — android | In btm_sec_disconnected of btm_sec.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution in the Bluetooth server with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-162497143 | 2020-11-10 | 9.3 |
CVE-2020-0449 MISC |
google — android | In sbrDecoder_AssignQmfChannels2SbrChannels of sbrdecoder.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9 Android-8.0 Android-8.1Android ID: A-158762825 | 2020-11-10 | 9.3 |
CVE-2020-0451 MISC |
google — android | In Message and toBundle of Notification.java, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service requiring a device reset to fix with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-158304295 | 2020-11-10 | 7.8 |
CVE-2020-0441 MISC |
google — android | In Message and toBundle of Notification.java, there is a possible UI slowdown or crash due to improper input validation. This could lead to remote denial of service if a malicious contact file is received, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.0 Android-8.1 Android-9Android ID: A-147358092 | 2020-11-10 | 7.8 |
CVE-2020-0442 MISC |
google — android | There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168264527 | 2020-11-10 | 7.5 |
CVE-2020-0445 MISC |
google — android | There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168264528 | 2020-11-10 | 7.5 |
CVE-2020-0446 MISC |
google — android | There is a possible out of bounds write due to a missing bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-168251617 | 2020-11-10 | 7.5 |
CVE-2020-0447 MISC |
google — android | In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731 | 2020-11-10 | 7.5 |
CVE-2020-0452 FEDORA MISC |
google — android | An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), Q(10.0), and R(11.0) software. Attackers can bypass Factory Reset Protection (FRP) via Secure Folder. The Samsung ID is SVE-2020-18546 (November 2020). | 2020-11-08 | 7.5 |
CVE-2020-28340 MISC |
ibm — filenet_content_manager | IBM FileNet Content Manager 5.5.4 and 5.5.5 is potentially vulnerable to CVS Injection. A remote attacker could execute arbitrary commands on the system, caused by improper validation of csv file contents. IBM X-Force ID: 188736. | 2020-11-09 | 9.3 |
CVE-2020-4759 XF CONFIRM |
linuxfoundation — nats-server | The JWT library in NATS nats-server before 2.1.9 has Incorrect Access Control because of how expired credentials are handled. | 2020-11-06 | 7.5 |
CVE-2020-26892 MISC CONFIRM |
magento — magento | Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by an unsafe file upload vulnerability that could result in arbitrary code execution. This vulnerability could be abused by authenticated users with administrative permissions to the System/Data and Transfer/Import components. | 2020-11-09 | 9 |
CVE-2020-24407 MISC |
sap — netweaver_application_server_java | SAP NetWeaver AS JAVA, versions – 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker who is authenticated as an administrator to use the administrator console, to expose unauthenticated access to the file system and upload a malicious file. The attacker or another user can then use a separate mechanism to execute OS commands through the uploaded file leading to Privilege Escalation and completely compromise the confidentiality, integrity and availability of the server operating system and any application running on it. | 2020-11-10 | 9 |
CVE-2020-26820 MISC MISC |
Medium Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
bbraun — onlinesuite_application_package | A DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3.0 and earlier allows local attackers to execute code on the system as a high privileged user. | 2020-11-06 | 6.9 |
CVE-2020-25174 MISC |
bbraun — onlinesuite_application_package | An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export. | 2020-11-06 | 6.8 |
CVE-2020-25170 MISC |
canonical — ubuntu_linux | Ubuntu’s packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code. | 2020-11-06 | 4.6 |
CVE-2020-15708 MISC |
cisco — anyconnect_secure_mobility_client | A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to read arbitrary files on the underlying operating system of an affected device. The vulnerability is due to an exposed IPC function. An attacker could exploit this vulnerability by sending a crafted IPC message to the AnyConnect process on an affected device. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. | 2020-11-06 | 4.9 |
CVE-2020-27123 CISCO |
google — android | An issue was discovered on Samsung mobile devices with Q(10.0) (Exynos990 chipsets) software. The S3K250AF Secure Element CC EAL 5+ chip allows attackers to execute arbitrary code and obtain sensitive information via a buffer overflow. The Samsung ID is SVE-2020-18632 (November 2020). | 2020-11-08 | 4.6 |
CVE-2020-28341 MISC |
google — android | An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (China / India) software. The S Secure application allows attackers to bypass authentication for a locked Gallery application via the Reminder application. The Samsung ID is SVE-2020-18689 (November 2020). | 2020-11-08 | 6.8 |
CVE-2020-28342 MISC |
google — android | An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (Exynos 980, 9820, and 9830 chipsets) software. The NPU driver allows attackers to execute arbitrary code because of unintended write and read operations on memory. The Samsung ID is SVE-2020-18610 (November 2020). | 2020-11-08 | 4.6 |
CVE-2020-28343 MISC |
google — android | In rw_i93_sm_format of rw_i93.cc, there is a possible out of bounds read due to uninitialized data. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-157650336 | 2020-11-10 | 4.3 |
CVE-2020-0450 MISC |
google — android | In generatePackageInfo of PackageManagerService.java, there is a possible permissions bypass due to an incorrect permission check. This could lead to local escalation of privilege that allows instant apps access to permissions not allowed for instant apps, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-140256621 | 2020-11-10 | 4.6 |
CVE-2020-0439 MISC |
google — android | In the AIBinder_Class constructor of ibinder.cpp, there is a possible arbitrary code execution due to uninitialized data. This could lead to local escalation of privilege if a process were using libbinder_ndk in a vulnerable way with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-161812320 | 2020-11-10 | 4.6 |
CVE-2020-0438 MISC |
hp — oneview | There is a remote escalation of privilege possible for a malicious user that has a OneView account in OneView and Synergy Composer. HPE has provided updates to Oneview and Synergy Composer: Update to version 5.5 of OneView, Composer, or Composer2. | 2020-11-06 | 6.5 |
CVE-2020-7198 MISC |
ibm — urbancode_deploy | IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could disclose sensitive information to an authenticated user that could be used in further attacks against the system. IBM X-Force ID: 181858. | 2020-11-06 | 4 |
CVE-2020-4484 XF CONFIRM |
ibm — urbancode_deploy | IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 181857. | 2020-11-06 | 4 |
CVE-2020-4483 XF CONFIRM |
ibm — urbancode_deploy | IBM UrbanCode Deploy (UCD) 6.2.7.3, 6.2.7.4, 7.0.3.0, and 7.0.4.0 could allow an authenticated user to bypass security. A user with access to a snapshot could apply unauthorized additional statuses via direct rest calls. IBM X-Force ID: 181856. | 2020-11-06 | 4 |
CVE-2020-4482 XF CONFIRM |
joplin_project — joplin | Joplin 1.2.6 for Desktop allows XSS via a LINK element in a note. | 2020-11-06 | 4.3 |
CVE-2020-28249 MISC MISC |
lightbend — play_framework | An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service. | 2020-11-06 | 5 |
CVE-2020-27196 MISC MISC |
lightbend — play_framework | In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input. | 2020-11-06 | 5 |
CVE-2020-26882 MISC MISC |
lightbend — play_framework | In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents. | 2020-11-06 | 5 |
CVE-2020-26883 MISC MISC |
linuxfoundation — nats-server | The JWT library in NATS nats-server before 2.1.9 allows a denial of service (a nil dereference in Go code). | 2020-11-06 | 5 |
CVE-2020-26521 CONFIRM MISC |
magento — magento | Magento versions 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect authorization vulnerability. A user can still access resources provisioned under their old role after an administrator removes the role or disables the user’s account. | 2020-11-09 | 5.5 |
CVE-2020-24401 MISC |
magento — magento | Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect permissions vulnerability within the Integrations component. This vulnerability could be abused by users with permissions to the Pages resource to delete cms pages via the REST API without authorization. | 2020-11-09 | 5.5 |
CVE-2020-24404 MISC |
magento — magento | Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect permissions vulnerability in the Integrations component. This vulnerability could be abused by authenticated users with permissions to the Resource Access API to delete customer details via the REST API without authorization. | 2020-11-09 | 5.5 |
CVE-2020-24402 MISC |
magento — magento | When in maintenance mode, Magento version 2.4.0 and 2.3.4 (and earlier) are affected by an information disclosure vulnerability that could expose the installation path during build deployments. This information could be helpful to attackers if they are able to identify other exploitable vulnerabilities in the environment. | 2020-11-09 | 4.3 |
CVE-2020-24406 MISC |
magento — magento | Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect user permissions vulnerability within the Inventory component. This vulnerability could be abused by authenticated users with Inventory and Source permissions to make unauthorized changes to inventory source data via the REST API. | 2020-11-09 | 4 |
CVE-2020-24403 MISC |
magento — magento | Magento version 2.4.0 and 2.3.5p1 (and earlier) are affected by an incorrect permissions issue vulnerability in the Inventory module. This vulnerability could be abused by authenticated users to modify inventory stock data without authorization. | 2020-11-09 | 4 |
CVE-2020-24405 MISC |
magento — magento | Magento versions 2.4.0 and 2.3.5 (and earlier) are affected by an SQL Injection vulnerability that could lead to sensitive information disclosure. This vulnerability could be exploited by an authenticated user with permissions to the product listing page to read data from the database. | 2020-11-09 | 5.5 |
CVE-2020-24400 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17055. | 2020-11-11 | 6.8 |
CVE-2020-17044 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. | 2020-11-11 | 4.6 |
CVE-2020-17033 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. | 2020-11-11 | 4.6 |
CVE-2020-17034 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. | 2020-11-11 | 4.6 |
CVE-2020-17032 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044. | 2020-11-11 | 6.8 |
CVE-2020-17055 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. | 2020-11-11 | 4.6 |
CVE-2020-17031 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. | 2020-11-11 | 4.6 |
CVE-2020-17026 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. | 2020-11-11 | 4.6 |
CVE-2020-17025 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. | 2020-11-11 | 4.6 |
CVE-2020-17027 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17043, CVE-2020-17044, CVE-2020-17055. | 2020-11-11 | 4.6 |
CVE-2020-17028 MISC |
microsoft — windows_10 | Windows Remote Access Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17025, CVE-2020-17026, CVE-2020-17027, CVE-2020-17028, CVE-2020-17031, CVE-2020-17032, CVE-2020-17033, CVE-2020-17034, CVE-2020-17044, CVE-2020-17055. | 2020-11-11 | 6.8 |
CVE-2020-17043 MISC |
netapp — e-series_santricity_os_controller | SANtricity OS Controller Software versions 11.50.1 and higher are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session. | 2020-11-06 | 4.3 |
CVE-2020-8577 MISC |
netapp — e-series_santricity_os_controller | SANtricity OS Controller Software versions 11.30 and higher are susceptible to a vulnerability which allows an unauthenticated attacker with access to the system to cause a Denial of Service (DoS). | 2020-11-06 | 5 |
CVE-2020-8580 MISC |
pega — pega_platform | Pega Platform before 8.4.0 has a XSS issue via stream rule parameters used in the request header. | 2020-11-09 | 4.3 |
CVE-2020-24353 MISC MISC |
qemu — qemu | ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process. | 2020-11-06 | 4 |
CVE-2020-27616 CONFIRM MISC |
qemu — qemu | eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol. | 2020-11-06 | 4 |
CVE-2020-27617 CONFIRM MISC |
sap — solution_manager | SAP Solution Manager (JAVA stack), version – 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Legacy Ports Service, this has an impact to the integrity and availability of the service. | 2020-11-10 | 6.4 |
CVE-2020-26824 MISC MISC |
sap — solution_manager | SAP Solution Manager (JAVA stack), version – 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service. | 2020-11-10 | 6.4 |
CVE-2020-26823 MISC MISC |
sap — solution_manager | SAP Solution Manager (JAVA stack), version – 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Outside Discovery Configuration Service, this has an impact to the integrity and availability of the service. | 2020-11-10 | 6.4 |
CVE-2020-26822 MISC MISC |
sap — solution_manager | SAP Solution Manager (JAVA stack), version – 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the SVG Converter Service, this has an impact to the integrity and availability of the service. | 2020-11-10 | 6.4 |
CVE-2020-26821 MISC MISC |
Low Vulnerabilities
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
google — android | In CellBroadcastReceiver’s intent handlers, there is a possible denial of service due to a missing permission check. This could lead to local denial of service of emergency alerts with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-162741784 | 2020-11-10 | 2.1 |
CVE-2020-0437 MISC |
google — android | In LocaleList of LocaleList.java, there is a possible forced reboot due to an uncaught exception. This could lead to local denial of service requiring factory reset to restore with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-152410253 | 2020-11-10 | 2.1 |
CVE-2020-0443 MISC |
google — android | In getPhoneAccountsForPackage of TelecomServiceImpl.java, there is a possible way to access a tracking identifier due to a missing permission check. This could lead to local information disclosure of the identifier, which could be used to track an account across devices, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-153995334 | 2020-11-10 | 2.1 |
CVE-2020-0448 MISC |
google — android | In updateNotification of BeamTransferManager.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-8.0 Android-8.1Android ID: A-159060474 | 2020-11-10 | 2.1 |
CVE-2020-0453 MISC |
google — android | In callCallbackForRequest of ConnectivityService.java, there is a possible permission bypass due to a missing permission check. This could lead to local information disclosure of the current SSID with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-161370134 | 2020-11-10 | 2.1 |
CVE-2020-0454 MISC |
ibm — maximo_spatial_asset_management | IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 186024. | 2020-11-09 | 2.9 |
CVE-2020-4651 XF CONFIRM |
ibm — maximo_spatial_asset_management | IBM Maximo Spatial Asset Management 7.6.0.3, 7.6.0.4, 7.6.0.5, and 7.6.1.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 186023. | 2020-11-09 | 2.1 |
CVE-2020-4650 XF CONFIRM |
Severity Not Yet Assigned
Primary Vendor — Product |
Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
a10_networks — acos_and_agalazy_management_graphical_user_interfaces |
A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected. | 2020-11-10 | not yet calculated |
CVE-2020-24384 CONFIRM |
adobe — acrobat_reader |
Adobe Acrobat Reader for Android version 20.6.2 (and earlier) does not properly restrict access to directories created by the application. This could result in disclosure of sensitive information stored in databases used by the application. Exploitation requires a victim to download and run a malicious application. | 2020-11-12 | not yet calculated |
CVE-2020-24441 MISC |
adobe — connect | Adobe Connect version 11.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2020-11-12 | not yet calculated |
CVE-2020-24443 MISC |
adobe — connect |
Adobe Connect version 11.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. | 2020-11-12 | not yet calculated |
CVE-2020-24442 MISC |
amd — running_average_power_limit |
A potential vulnerability in the AMD extension to Linux “hwmon” service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access. | 2020-11-12 | not yet calculated |
CVE-2020-12912 MISC |
amd — trusted_platform_modules |
The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device. | 2020-11-12 | not yet calculated |
CVE-2020-12926 MISC |
amd — vbios_flash_tool |
A potential vulnerability in a dynamically loaded AMD driver in AMD VBIOS Flash Tool SDK may allow any authenticated user to escalate privileges to NT authority system. | 2020-11-12 | not yet calculated |
CVE-2020-12927 MISC |
apache — airflows_experimental_api |
The previous default setting for Airflow’s Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default | 2020-11-10 | not yet calculated |
CVE-2020-13927 MISC |
apache — batik |
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the “xlink:href” attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | 2020-11-12 | not yet calculated |
CVE-2019-17566 MISC |
apache — cxf |
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573. | 2020-11-12 | not yet calculated |
CVE-2020-13954 MISC MLIST MLIST MLIST MLIST MLIST |
arm_developer — armv8-m_processors |
In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension. | 2020-11-12 | not yet calculated |
CVE-2020-16273 CONFIRM |
asterisk — open_source |
A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling. | 2020-11-06 | not yet calculated |
CVE-2020-28327 MISC MISC |
atlassian — gajira-create_github_action
|
The execute function in in the Atlassian gajira-comment GitHub Action before version 2.0.2 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue comment. | 2020-11-09 | not yet calculated |
CVE-2020-14189 MISC |
atlassian — gajira-create_github_action |
The preprocessArgs function in the Atlassian gajira-create GitHub Action before version 2.0.1 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue. | 2020-11-09 | not yet calculated |
CVE-2020-14188 MISC |
atlassian — resourcexpress_meeting_monitor |
SQL Injection issues in various ASPX pages of ResourceXpress Meeting Monitor 4.9 could lead to remote code execution and information disclosure. | 2020-11-12 | not yet calculated |
CVE-2020-13877 CONFIRM MISC |
audi — a7_mmi_2014_vehicles |
On Audi A7 MMI 2014 vehicles, the Bluetooth stack in Audi A7 MMI Multiplayer with version (N+R_CN_AU_P0395) mishandles %x and %s format string specifiers in a device name. This may lead to memory content leaks and potentially crash the services. | 2020-11-11 | not yet calculated |
CVE-2020-27524 MISC MISC MISC |
avaya — unified_portal_client |
A Cross Site Scripting (XSS) Vulnerability on the Unified Portal Client (web client) used in Avaya Equinox Conferencing can allow an authenticated user to perform XSS attacks. The affected versions of Equinox Conferencing includes all 9.x versions before 9.1.10. | 2020-11-13 | not yet calculated |
CVE-2020-7033 CONFIRM |
avaya — weblm |
An XML external entity (XXE) vulnerability in Avaya WebLM admin interface allows authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. Affected versions of Avaya WebLM include: 7.0 through 7.1.3.6 and 8.0 through 8.1.2. | 2020-11-13 | not yet calculated |
CVE-2020-7032 CONFIRM |
azure — devops |
Azure DevOps Server and Team Foundation Services Spoofing Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-1325 MISC |
bab_technologie — eibport_v3 |
BAB TECHNOLOGIE GmbH eibPort V3 prior to 3.8.3 devices allow denial of service (Uncontrolled Resource Consumption) via requests to the lighttpd component. | 2020-11-12 | not yet calculated |
CVE-2020-24573 MISC |
becton_dickinson_and_company — bd_alaris_8015_pc_unit_and_bd_alaris_systems_manager |
BD Alaris PC Unit, Model 8015, Versions 9.33.1 and earlier and BD Alaris Systems Manager, Versions 4.33 and earlier The affected products are vulnerable to a network session authentication vulnerability within the authentication process between specified versions of the BD Alaris PC Unit and the BD Alaris Systems Manager. If exploited, an attacker could perform a denial-of-service attack on the BD Alaris PC Unit by modifying the configuration headers of data in transit. A denial-of-service attack could lead to a drop in the wireless capability of the BD Alaris PC Unit, resulting in manual operation of the PC Unit. | 2020-11-13 | not yet calculated |
CVE-2020-25165 MISC |
bitdefender — update_server |
Insufficient validation in the Bitdefender Update Server and BEST Relay components of Bitdefender Endpoint Security Tools versions prior to 6.6.20.294 allows an unprivileged attacker to bypass the in-place mitigations and interact with hosts on the network. This issue affects: Bitdefender Update Server versions prior to 6.6.20.294. | 2020-11-09 | not yet calculated |
CVE-2020-15297 MISC |
brave — brave |
The implementation of Brave Desktop’s privacy-preserving analytics system (P3A) between 1.1 and 1.18.35 logged the timestamp of when the user last opened an incognito window, including Tor windows. The intended behavior was to log the timestamp for incognito windows excluding Tor windows. Note that if a user has P3A enabled, the timestamp is not sent to Brave’s server, but rather a value from:Used in last 24hUsed in last week but not 24hUsed in last 28 days but not weekEver used but not in last 28 daysNever usedThe privacy risk is low because a local attacker with disk access cannot tell if the timestamp corresponds to a Tor window or a non-Tor incognito window. | 2020-11-09 | not yet calculated |
CVE-2020-8276 MISC |
cacti — cacti |
A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field | 2020-11-12 | not yet calculated |
CVE-2020-25706 CONFIRM MISC MISC |
canonical — ubuntu |
An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, would perform unbounded read operations on user-controlled ~/.pam_environment files, allowing an infinite loop if /dev/zero is symlinked to this location. | 2020-11-11 | not yet calculated |
CVE-2020-16127 CONFIRM |
canonical — ubuntu |
An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, improperly dropped the ruid, allowing untrusted users to send signals to AccountService, thus stopping it from handling D-Bus messages in a timely fashion. | 2020-11-11 | not yet calculated |
CVE-2020-16126 CONFIRM |
capasystems — capainstaller |
CapaSystems CapaInstaller before 6.0.101 does not properly assign, modify, or check privileges for an actor who attempts to edit registry values, allowing an attacker to escalate privileges. | 2020-11-09 | not yet calculated |
CVE-2020-27977 CONFIRM |
cellinx — nvt_web_server |
Cellinx NVT Web Server 5.0.0.014b.test 2019-09-05 allows a remote user to run commands as root via SetFileContent.cgi because authentication is on the client side. | 2020-11-06 | not yet calculated |
CVE-2020-28250 MISC |
cisco — asr_9000_series_aggregation_services_routers |
A vulnerability in the ingress packet processing function of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when an affected device processes network traffic in software switching mode (punted). An attacker could exploit this vulnerability by sending specific streams of Layer 2 or Layer 3 protocol data units (PDUs) to an affected device. A successful exploit could cause the affected device to run out of buffer resources, which could make the device unable to process or forward traffic, resulting in a DoS condition. The device would need to be restarted to regain functionality. | 2020-11-12 | not yet calculated |
CVE-2020-26070 CISCO |
cisco — webex_network_recording_player_and_webex_player |
Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. | 2020-11-06 | not yet calculated |
CVE-2020-3573 CISCO MISC |
cisco — webex_network_recording_player_and_webex_player |
Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. | 2020-11-06 | not yet calculated |
CVE-2020-3604 CISCO MISC |
cisco — webex_network_recording_player_and_webex_player |
Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. | 2020-11-06 | not yet calculated |
CVE-2020-3603 CISCO MISC |
ckeditor — ckeditor |
A cross-site scripting (XSS) vulnerability in the Color Dialog plugin for CKEditor 4.15.0 allows remote attackers to run arbitrary web script after persuading a user to copy and paste crafted HTML code into one of editor inputs. | 2020-11-12 | not yet calculated |
CVE-2020-27193 CONFIRM CONFIRM MISC |
cmsuno — cmsuno |
An authenticated attacker can inject malicious code into “lang” parameter in /uno/central.php file in CMSuno 1.6.2 and run this PHP code in the web page. In this way, attacker can takeover the control of the server. | 2020-11-13 | not yet calculated |
CVE-2020-25538 MISC |
cmsuno — cmsuno |
In CMSuno 1.6.2, an attacker can inject malicious PHP code as a “username” while changing his/her username & password. After that, when attacker logs in to the application, attacker’s code will be run. As a result of this vulnerability, authenticated user can run command on the server. | 2020-11-13 | not yet calculated |
CVE-2020-25557 MISC |
compass_plus — tranzware_payment_gateway |
A reflected cross-site scripting (XSS) vulnerability exists in the TranzWare Payment Gateway 3.1.12.3.2. A remote unauthenticated attacker is able to execute arbitrary HTML code via crafted url (different vector than CVE-2020-28415). | 2020-11-12 | not yet calculated |
CVE-2020-28414 MISC MISC |
compass_plus — tranzware_payment_gateway |
A reflected cross-site scripting (XSS) vulnerability exists in the TranzWare Payment Gateway 3.1.12.3.2. A remote unauthenticated attacker is able to execute arbitrary HTML code via crafted url (different vector than CVE-2020-28414). | 2020-11-12 | not yet calculated |
CVE-2020-28415 MISC MISC |
couchbase — couchbase_server |
Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka “magic cookie”). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0. | 2020-11-12 | not yet calculated |
CVE-2020-24719 CONFIRM |
debian — raptor_xml_writer.c |
raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml). | 2020-11-06 | not yet calculated |
CVE-2017-18926 MLIST MLIST MLIST MISC MLIST DEBIAN MISC |
deephas — deephas |
Prototype pollution vulnerability in ‘deephas’ versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution. | 2020-11-12 | not yet calculated |
CVE-2020-28271 MISC MISC |
dell — inspiron |
Dell Inspiron 15 7579 2-in-1 BIOS versions prior to 1.31.0 contain an Improper SMM communication buffer verification vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | 2020-11-10 | not yet calculated |
CVE-2020-5388 MISC |
dependabot — dependabot |
Dependabot is a set of packages for automated dependency management for Ruby, JavaScript, Python, PHP, Elixir, Rust, Java, .NET, Elm and Go. In Dependabot-Core from version 0.119.0.beta1 before version 0.125.1, there is a remote code execution vulnerability in dependabot-common and dependabot-go_modules when a source branch name contains malicious injectable bash code. For example, if Dependabot is configured to use the following source branch name: “/$({curl,127.0.0.1})”, Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository. The fix was applied to version 0.125.1. As a workaround, one can escape the branch name prior to passing it to the Dependabot::Source class. | 2020-11-13 | not yet calculated |
CVE-2020-26222 MISC MISC CONFIRM |
dundas_data_visualization — dundas_bi_server | The server in Dundas BI through 8.0.0.1001 allows XSS via addition of a Component (e.g., a button) when events such as click, hover, etc. occur. | 2020-11-10 | not yet calculated |
CVE-2020-28409 MISC |
dundas_data_visualization — dundas_bi_server | The server in Dundas BI through 8.0.0.1001 allows XSS via an HTML label when creating or editing a dashboard. | 2020-11-10 | not yet calculated |
CVE-2020-28408 MISC |
dyne — tomb |
ask_password in Tomb 2.0 through 2.7 returns a warning when pinentry-curses is used and $DISPLAY is non-empty, causing affected users’ files to be encrypted with “tomb {W] Detected DISPLAY, but only pinentry-curses is found.” as the encryption key. | 2020-11-13 | not yet calculated |
CVE-2020-28638 MISC |
eclipse — hono |
In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception. | 2020-11-13 | not yet calculated |
CVE-2020-27217 CONFIRM |
express-validators — express-validators |
All versions of package express-validators are vulnerable to Regular Expression Denial of Service (ReDoS) when validating specifically-crafted invalid urls. | 2020-11-11 | not yet calculated |
CVE-2020-7767 MISC |
fastadmin — fastadmin-tp6 |
In fastadmin-tp6 v1.0, in the file app/admin/controller/Ajax.php the ‘table’ parameter passed is not filtered so a malicious parameter can be passed for SQL injection. | 2020-11-13 | not yet calculated |
CVE-2020-21667 MISC |
field — field |
Prototype pollution vulnerability in ‘field’ versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution. | 2020-11-12 | not yet calculated |
CVE-2020-28269 MISC MISC |
find-my-way — find-my-way |
This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version’ header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack. | 2020-11-08 | not yet calculated |
CVE-2020-7764 MISC MISC |
flexdotnetcms — flexdotnetcms | An unrestricted file upload issue in FlexDotnetCMS before v1.5.9 allows an authenticated remote attacker to upload and execute arbitrary files by using the FileManager to upload malicious code (e.g., ASP code) in the form of a safe file type (e.g., a TXT file), and then using the FileEditor (in v1.5.8 and prior) or the FileManager’s rename function (in v1.5.7 and prior) to rename the file to an executable extension (e.g., ASP), and finally executing the file via an HTTP GET request to /<path_to_file>. | 2020-11-12 | not yet calculated |
CVE-2020-27386 MISC MISC MISC |
flexdotnetcms — flexdotnetcms |
Incorrect Access Control in the FileEditor (/Admin/Views/FileEditor/) in FlexDotnetCMS before v1.5.11 allows an authenticated remote attacker to read and write to existing files outside the web root. The files can be accessed via directory traversal, i.e., by entering a .. (dot dot) path such as ……….<file> in the input field of the FileEditor. In FlexDotnetCMS before v1.5.8, it is also possible to access files by specifying the full path (e.g., C:<file>). The files can then be edited via the FileEditor. | 2020-11-12 | not yet calculated |
CVE-2020-27385 MISC MISC |
gdm3 — gdm3 |
gdm3 versions before 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can’t contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to create a new privileged account. | 2020-11-10 | not yet calculated |
CVE-2020-16125 MISC MISC MISC |
google — android
|
In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813 | 2020-11-10 | not yet calculated |
CVE-2020-0418 MISC |
google — android
|
In send_vc of res_send.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-161362564 | 2020-11-10 | not yet calculated |
CVE-2020-0424 MISC |
google — android |
Radar COVID is the official COVID-19 exposure notification app for Spain. In affected versions of Radar COVID, identification and de-anonymization of COVID-19 positive users that upload Radar COVID TEKs to the Radar COVID server is possible. This vulnerability enables the identification and de-anonymization of COVID-19 positive users when using Radar COVID. The vulnerability is caused by the fact that Radar COVID connections to the server (uploading of TEKs to the backend) are only made by COVID-19 positives. Therefore, any on-path observer with the ability to monitor traffic between the app and the server can identify which users had a positive test. Such an adversary can be the mobile network operator (MNO) if the connection is done through a mobile network, the Internet Service Provider (ISP) if the connection is done through the Internet (e.g., a home network), a VPN provider used by the user, the local network operator in the case of enterprise networks, or any eavesdropper with access to the same network (WiFi or Ethernet) as the user as could be the case of public WiFi hotspots deployed at shopping centers, airports, hotels, and coffee shops. The attacker may also de-anonymize the user. For this additional stage to succeed, the adversary needs to correlate Radar COVID traffic to other identifiable information from the victim. This could be achieved by associating the connection to a contract with the name of the victim or by associating Radar COVID traffic to other user-generated flows containing identifiers in the clear (e.g., HTTP cookies or other mobile flows sending unique identifiers like the IMEI or the AAID without encryption). The former can be executed, for instance, by the Internet Service Provider or the MNO. The latter can be executed by any on-path adversary, such as the network provider or even the cloud provider that hosts more than one service accessed by the victim. The farther the adversary is either from the victim (the client) or the end-point (the server), the less likely it may be that the adversary has access to re-identification information. The vulnerability has been mitigated with the injection of dummy traffic from the application to the backend. Dummy traffic is generated by all users independently of whether they are COVID-19 positive or not. The issue was fixed in iOS in version 1.0.8 (uniform distribution), 1.1.0 (exponential distribution), Android in version 1.0.7 (uniform distribution), 1.1.0 (exponential distribution), Backend in version 1.1.2-RELEASE. For more information see the referenced GitHub Security Advisory. | 2020-11-13 | not yet calculated |
CVE-2020-26230 MISC MISC MISC MISC MISC MISC MISC MISC MISC MISC CONFIRM MISC |
google — android |
In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193 | 2020-11-10 | not yet calculated |
CVE-2020-0409 MISC |
grpc — grpc | The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition. | 2020-11-11 | not yet calculated |
CVE-2020-7768 MISC MISC MISC MISC MISC |
hazelcast — imdg_enterprise |
The LDAP authentication method in LdapLoginModule in Hazelcast IMDG Enterprise 4.x before 4.0.3, and Jet Enterprise 4.x through 4.2, doesn’t verify properly the password in some system-user-dn scenarios. As a result, users (clients/members) can be authenticated even if they provide invalid passwords. | 2020-11-09 | not yet calculated |
CVE-2020-26168 MISC CONFIRM CONFIRM MISC |
huawei — fusioncompute |
FusionCompute versions 8.0.0 have an insecure encryption algorithm vulnerability. Attackers with high permissions can exploit this vulnerability to cause information leak. | 2020-11-12 | not yet calculated |
CVE-2020-9128 MISC |
huawei — mate_30_firmware |
HUAWEI Mate 30 versions earlier than 10.1.0.159(C00E159R7P2) have a vulnerability of improper buffer operation. Due to improper restrictions, local attackers with high privileges can exploit the vulnerability to cause system heap overflow. | 2020-11-13 | not yet calculated |
CVE-2020-9129 MISC |
huawei — multiple_products |
Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60. | 2020-11-13 | not yet calculated |
CVE-2020-9127 MISC |
huawei — multiple_products |
There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60. | 2020-11-13 | not yet calculated |
CVE-2020-1847 MISC |
ibm — cognos_controller |
A low level user of IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, 10.4.1, and 10.4.2 who has Administration rights to the server where the application is installed, can escalate their privilege from Low level to Super Admin and gain access to Create/Update/Delete any level of user in Cognos Controller. IBM X-Force ID: 186625. | 2020-11-11 | not yet calculated |
CVE-2020-4685 XF CONFIRM |
ibm — content_navigator |
IBM Content Navigator 3.0CD is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187189. | 2020-11-10 | not yet calculated |
CVE-2020-4704 XF CONFIRM |
ibm — content_navigator |
IBM Content Navigator 3.0CD is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188737. | 2020-11-10 | not yet calculated |
CVE-2020-4760 XF CONFIRM |
ibm — infosphere_information_server |
IBM InfoSphere Information Server 11.7 stores sensitive information in the browser’s history that could be obtained by a user who has access to the same system. IBM X-Force ID: 190910. | 2020-11-13 | not yet calculated |
CVE-2020-4886 XF CONFIRM |
ibm — tivoli_key_lifecycle_manager |
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157. | 2020-11-10 | not yet calculated |
CVE-2020-4568 XF CONFIRM |
ilex — international_sign&go_workstation_security_suite |
Ilex International Sign&go Workstation Security Suite 7.1 allows elevation of privileges via a symlink attack on ProgramDataIlexS&GLogs 00-sngWSService1.log. | 2020-11-10 | not yet calculated |
CVE-2020-23968 MISC MISC MISC |
ilias — ilias |
An XSS issue exists in the question-pool file-upload preview feature in ILIAS 6.4. | 2020-11-10 | not yet calculated |
CVE-2020-25267 MISC |
ilias — ilias |
Remote Code Execution can occur via the external news feed in ILIAS 6.4 because of incorrect parameter sanitization for Magpie RSS data. | 2020-11-10 | not yet calculated |
CVE-2020-25268 MISC |
intel — adas_ie |
Improper input validation in the Intel(R) ADAS IE before version ADAS_IE_1.0.766 may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12323 MISC |
intel — advisor_tools |
Improper permissions in the installer for the Intel(R) Advisor tools before version 2020 Update 2 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12334 MISC |
intel — amt |
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8757 CONFIRM MISC |
intel — amt |
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12356 CONFIRM MISC |
intel — amt |
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | 2020-11-12 | not yet calculated |
CVE-2020-8746 CONFIRM MISC |
intel — amt |
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | 2020-11-12 | not yet calculated |
CVE-2020-8749 CONFIRM MISC |
intel — amt |
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access. | 2020-11-12 | not yet calculated |
CVE-2020-8747 CONFIRM MISC |
intel — amt |
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8760 CONFIRM MISC |
intel — amt_and_ism |
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access. | 2020-11-12 | not yet calculated |
CVE-2020-8752 CONFIRM MISC |
intel — amt_and_ism |
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access. | 2020-11-12 | not yet calculated |
CVE-2020-8753 CONFIRM MISC |
intel — amt_sdk |
Incorrect default permissions in Windows(R) installer in Intel(R) AMT SDK versions before 14.0.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12354 CONFIRM MISC |
intel — batter_life_diagnostic_tool | Improper permissions in the installer for the Intel(R) Battery Life Diagnostic Tool before version 1.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12346 MISC |
intel — board_id_tool |
Incorrect default permissions in the Intel(R) Board ID Tool version v.1.01 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-24456 MISC |
intel — client_ssds_and_data_center_ssds |
Insufficient control flow managementin firmware in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-12310 MISC |
intel — client_ssds_and_data_center_ssds |
Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-12309 MISC |
intel — client_ssds_and_data_center_ssds |
Insufficient control flow managementin firmware in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-12311 MISC |
intel — computing_improvement_program |
Improper access control for the Intel(R) Computing Improvement Program before version 2.4.5982 may allow an unprivileged user to potentially enable information disclosure via network access. | 2020-11-12 | not yet calculated |
CVE-2020-12308 MISC |
intel — cs12_host_controller |
Out of bounds read in the Intel CSI2 Host Controller driver may allow an authenticated user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0573 MISC |
intel — csme |
Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-8705 CONFIRM CONFIRM CONFIRM MISC |
intel — csme |
Inadequate encryption strength in subsystem for Intel(R) CSME versions before 13.0.40 and 13.30.10 may allow an unauthenticated user to potentially enable information disclosure via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-8761 CONFIRM MISC |
intel — csme |
Improper input validation in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8756 CONFIRM MISC |
intel — csme_and_sps |
Race condition in subsystem for Intel(R) CSME versions before 12.0.70 and 14.0.45, Intel(R) SPS versions before E5_04.01.04.400 and E3_05.01.04.200 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-8755 CONFIRM CONFIRM MISC |
intel — csme_and_txe | Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, Intel(R) TXE versions before 3.1.80 may allow an unauthenticated user to potentially enable information disclosure via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-8751 CONFIRM CONFIRM MISC |
intel — csme_and_txe | Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-8745 CONFIRM CONFIRM MISC |
intel — csme_and_txe |
Improper initialization in subsystem for Intel(R) CSME versions before12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 4.0.30 Intel(R) SPS versions before E3_05.01.04.200 may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8744 CONFIRM CONFIRM CONFIRM MISC |
intel — csme_driver |
Improper access control in Installer for Intel(R) CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12297 CONFIRM CONFIRM MISC |
intel — csme_driver_and_txe |
Use after free in DAL subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12303 CONFIRM CONFIRM MISC |
intel — dal_sdk |
Improper access control in Installer for Intel(R) DAL SDK before version 2.1 for Windows may allow an authenticated user to potentially enable escalation of privileges via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12304 MISC |
intel — data_center_manager_console |
Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. | 2020-11-12 | not yet calculated |
CVE-2020-12349 MISC |
intel — data_center_manager_console |
Improper permissions in the installer for the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12345 MISC |
intel — data_center_manager_console |
Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable escalation of privilege via network access. | 2020-11-12 | not yet calculated |
CVE-2020-12347 MISC |
intel — data_center_manager_console |
Improper permissions in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable denial of service via network access. | 2020-11-12 | not yet calculated |
CVE-2020-12353 MISC |
intel — data_center_manager_console |
Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. | 2020-11-12 | not yet calculated |
CVE-2020-8669 MISC |
intel — dsa |
Incorrect default permissions in the Intel(R) DSA before version 20.8.30.6 may allow an authenticated user to potentially enable denial of service via local access. | 2020-11-12 | not yet calculated |
CVE-2020-24460 MISC |
intel — ema | Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12316 MISC |
intel — ema |
Path traversal in the Intel(R) EMA before version 1.3.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | 2020-11-12 | not yet calculated |
CVE-2020-12315 MISC |
intel — ethernet_700_series_controllers |
A logic issue in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8691 MISC |
intel — ethernet_700_series_controllers |
Protection mechanism failure in Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8690 MISC |
intel — ethernet_700_series_controllers |
Insufficient access control in the firmware of the Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8692 MISC |
intel — ethernet_700_series_controllers |
Improper buffer restrictions in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8693 MISC |
intel — falcon_8+_uas_asctec_thermal_viewer |
Improper permissions in the installer for the Intel(R) Falcon 8+ UAS AscTec Thermal Viewer, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12330 MISC |
intel — hid_event_filter_driver |
Improper permissions in the installer for the Intel(R) HID Event Filter Driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12332 MISC |
intel — high_definition_audio_drivers |
Improper permissions in some Intel(R) High Definition Audio drivers before version 9.21.00.4561 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12307 MISC |
intel — media_sdk |
Improper file permissions in the installer for the Intel(R) Media SDK for Windows before version 2019 R1 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2019-11121 MISC |
intel — multiple_processors |
Improper access control in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8764 MISC |
intel — multiple_products | Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access. | 2020-11-12 | not yet calculated |
CVE-2020-8754 CONFIRM MISC |
intel — multiple_products |
Buffer overflow in firmware for Intel(R) SSD DC P4800X and P4801X Series, Intel(R) Optane(TM) SSD 900P and 905P Series may allow an unauthenticated user to potentially enable a denial of service via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0584 MISC |
intel — nuc |
Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12337 MISC |
intel — nuc |
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12336 MISC |
intel — nuc |
Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-24525 FULLDISC MISC |
intel — open_webrtc |
Insufficient control flow management in the Open WebRTC Toolkit before version 4.3.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access. | 2020-11-13 | not yet calculated |
CVE-2020-12338 MISC |
intel — processor_identification_utility |
Improper permissions in the installer for the Intel(R) Processor Identification Utility before version 6.4.0603 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12335 MISC |
intel — processors |
Improper input validation in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0590 CONFIRM MISC |
intel — processors |
Out of bounds write in Intel BIOS platform sample code for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8740 MISC |
intel — processors |
Out of bounds write in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0592 CONFIRM MISC |
intel — processors |
Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0591 CONFIRM MISC |
intel — processors |
Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0588 CONFIRM MISC |
intel — processors |
Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8695 MISC |
intel — processors |
Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0587 CONFIRM MISC |
intel — processors |
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8694 MISC |
intel — processors |
Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-13 | not yet calculated |
CVE-2020-0599 MISC |
intel — processors |
Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0593 CONFIRM MISC |
intel — processors |
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8696 CONFIRM MISC |
intel — processors |
Use of potentially dangerous function in Intel BIOS platform sample code for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8739 MISC |
intel — processors |
Improper conditions check in Intel BIOS platform sample code for some Intel(R) Processors before may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8738 MISC |
intel — processors |
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8698 CONFIRM MISC |
intel — proset/wireless_wifi_products | Improper buffer restriction in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | 2020-11-12 | not yet calculated |
CVE-2020-12317 MISC |
intel — proset/wireless_wifi_products | Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | 2020-11-12 | not yet calculated |
CVE-2020-12319 MISC |
intel — proset/wireless_wifi_products |
Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | 2020-11-12 | not yet calculated |
CVE-2020-12314 MISC |
intel — proset/wireless_wifi_products |
Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | 2020-11-13 | not yet calculated |
CVE-2020-12313 MISC |
intel — proset/wireless_wifi_products |
Protection mechanism failure in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12318 MISC |
intel — qat |
Insufficiently protected credentials in the Intel(R) QAT for Linux before version 1.7.l.4.10.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12333 MISC |
intel — quartus_prime |
Uncaught exception in the Intel(R) 50GbE IP Core for Intel(R) Quartus Prime before version 20.2 may allow an authenticated user to potentially enable denial of service via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8767 MISC |
intel — quartus_prime_pro_edition |
Improper Restriction of XML External Entity Reference in subsystem forIntel(R) Quartus(R) Prime Pro Edition before version 20.3 and Intel(R) Quartus(R) Prime Standard Edition before version 20.2 may allow unauthenticated user to potentially enable information disclosure via network access. | 2020-11-12 | not yet calculated |
CVE-2020-24454 MISC |
intel — realsense_d400_series_dynamic_calibration_tool |
Incorrect default permissions in the Intel(R) RealSense(TM) D400 Series Dynamic Calibration Tool before version 2.11, may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12306 MISC |
intel — scs_add-on_for_microsoft_sccm |
Uncontrolled search path in Intel(R) SCS Add-on for Microsoft* SCCM before version 2.1.10 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12320 MISC |
intel — server_board_2600st_and_s2600wf |
Improper input validation in the firmware for Intel(R) Server Board S2600ST and S2600WF families may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0572 MISC |
intel — sgx_dcap |
Improper conditions check in the Intel(R) SGX DCAP software before version 1.6 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | 2020-11-12 | not yet calculated |
CVE-2020-8766 MISC |
intel — stratix_10_fpga_firmware |
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.2 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-12312 MISC |
intel — stratix_10_fpga_firmware |
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.1 may allow an unauthenticated user to potentially enable escalation of privilege and/or information disclosure via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-8737 MISC |
intel — thunderbolt_dch_drivers | Insecure default variable initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12327 MISC |
intel — thunderbolt_dch_drivers |
Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12325 MISC |
intel — thunderbolt_dch_drivers |
Improper initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12326 MISC |
intel — thunderbolt_dch_drivers |
Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12328 MISC |
intel — thunderbolt_dch_drivers |
Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12324 MISC |
intel — txe |
Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. | 2020-11-12 | not yet calculated |
CVE-2020-12355 CONFIRM MISC |
intel — txe |
Use after free in Kernel Mode Driver for Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8750 CONFIRM MISC |
intel — unite_client |
Improper buffer restrictions in the Intel(R) Unite Client for Windows* before version 4.2.13064 may allow an authenticated user to potentially enable information disclosure via local access. | 2020-11-12 | not yet calculated |
CVE-2020-0575 MISC |
intel — unite_cloud_service_client |
Improper access controls in Intel Unite(R) Cloud Service client before version 4.2.12212 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12331 MISC |
intel — visual_compute_accelerator |
Improper access control in the Intel(R) Visual Compute Accelerator 2, all versions, may allow a privileged user to potentially enable denial of service via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8677 MISC |
intel — visual_compute_accelerator |
Improper access control in the Intel(R) Visual Compute Accelerator 2, all versions, may allow a privileged user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-8676 MISC |
intel — vtune_profiler |
Uncontrolled search path in the Intel(R) VTune(TM) Profiler before version 2020 Update 1 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12329 MISC |
intel — wireless_bluetooth_products |
Improper input validation in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | 2020-11-12 | not yet calculated |
CVE-2020-12322 MISC |
intel — wireless_bluetooth_products |
Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | 2020-11-12 | not yet calculated |
CVE-2020-12321 MISC |
intel — xtu |
Improper access control in the Intel(R) XTU before version 6.5.1.360 may allow an authenticated user to potentially enable escalation of privilege via local access. | 2020-11-12 | not yet calculated |
CVE-2020-12350 MISC |
intelliants — subrion_cms | Subrion CMS 4.2.1 has CSRF in panel/modules/plugins/. The attacker can remotely activate/deactivate the plugins. | 2020-11-10 | not yet calculated |
CVE-2019-7357 MISC MISC |
ivanti — endpoint_manager | An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server. | 2020-11-12 | not yet calculated |
CVE-2020-13774 MISC |
ivanti — endpoint_manager |
Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITYSYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITYNETWORK SERVICE’). | 2020-11-12 | not yet calculated |
CVE-2020-13770 MISC |
ivanti — endpoint_manager |
Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITYSYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe. | 2020-11-12 | not yet calculated |
CVE-2020-13771 MISC |
json-ptr — json-ptr |
This affects all versions of package json-ptr. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution. | 2020-11-10 | not yet calculated |
CVE-2020-7766 MISC MISC MISC |
json8 — json8 |
This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution. | 2020-11-12 | not yet calculated |
CVE-2020-7770 MISC MISC |
json8-merge_patch — json8-merge_patch | Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor. | 2020-11-09 | not yet calculated |
CVE-2020-8268 MISC |
lenovo — desktop |
Prior to August 10, 2020, some Lenovo Desktop and Workstation systems were shipped with the Embedded Host Based Configuration (EHBC) feature of Intel AMT enabled. This could allow an administrative user with local access to configure Intel AMT. | 2020-11-11 | not yet calculated |
CVE-2020-8353 MISC |
lenovo — desktop |
In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes. | 2020-11-11 | not yet calculated |
CVE-2020-8352 MISC |
lenovo — multiple_notebooks |
A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution. | 2020-11-11 | not yet calculated |
CVE-2020-8354 MISC |
lettre_library — lettre_library |
The lettre library through 0.10.0-alpha for Rust allows arbitrary sendmail option injection via transport/sendmail/mod.rs. | 2020-11-12 | not yet calculated |
CVE-2020-28247 MISC MISC |
lg — multiple_mobile_devices | An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. System services may crash because of the lack of a NULL parameter check. The LG ID is LVE-SMP-200024 (November 2020). | 2020-11-08 | not yet calculated |
CVE-2020-28344 MISC |
lg — multiple_mobile_devices |
An issue was discovered on LG mobile devices with Android OS 10 software. The Wi-Fi subsystem may crash because of the lack of a NULL parameter check. The LG ID is LVE-SMP-200025 (November 2020). | 2020-11-08 | not yet calculated |
CVE-2020-28345 MISC |
libmaxminddb — libmaxminddb |
libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c. | 2020-11-06 | not yet calculated |
CVE-2020-28241 MISC MISC MISC MLIST GENTOO |
locust — locust |
A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3.2, if the installation violates the usage expectations by exposing this UI to outside users. | 2020-11-09 | not yet calculated |
CVE-2020-28364 MISC |
managedclusterview_api — managedclusterview_api | An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions. Views created for an admin user would be made available for a short time to users with only view permission. In this short time window the user with view permission could read cluster secrets that should only be disclosed to admin users. | 2020-11-09 | not yet calculated |
CVE-2020-25655 CONFIRM |
mcafee — endpoint_security | Unquoted service executable path in McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files. | 2020-11-12 | not yet calculated |
CVE-2020-7331 CONFIRM |
mcafee — endpoint_security |
Cross site scripting vulnerability in the firewall ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows administrators to inject arbitrary web script or HTML via the configuration wizard. | 2020-11-12 | not yet calculated |
CVE-2020-7333 CONFIRM |
mcafee — endpoint_security |
Cross Site Request Forgery vulnerability in the firewall ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows an attacker to execute arbitrary HTML code due to incorrect security configuration. | 2020-11-12 | not yet calculated |
CVE-2020-7332 CONFIRM |
mcafee — mvision_endpoint |
Server-side request forgery vulnerability in the ePO extension in McAfee MVISION Endpoint prior to 20.11 allows remote attackers trigger server-side DNS requests to arbitrary domains via carefully constructed XML files loaded by an ePO administrator. | 2020-11-11 | not yet calculated |
CVE-2020-7329 CONFIRM |
mcafee — mvision_endpoint |
External entity attack vulnerability in the ePO extension in McAfee MVISION Endpoint prior to 20.11 allows remote attackers to gain control of a resource or trigger arbitrary code execution via improper input validation of an HTTP request, where the content for the attack has been loaded into ePO by an ePO administrator. | 2020-11-11 | not yet calculated |
CVE-2020-7328 CONFIRM |
mersive — solstice-pod |
Solstice-Pod up to 5.0.2 WEBRTC server mishandles the format-string specifiers %x; %p; %c and %s in the screen_key, display_name, browser_name, and operation_system parameter during the authentication process. This may crash the server and force Solstice-Pod to reboot, which leads to a denial of service. | 2020-11-11 | not yet calculated |
CVE-2020-27523 MISC MISC MISC MISC |
microsoft — av1_video_extension |
AV1 Video Extension Remote Code Execution Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17105 MISC |
microsoft — azure_sphere | Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16985. | 2020-11-11 | not yet calculated |
CVE-2020-16990 MISC MISC |
microsoft — azure_sphere | Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16989, CVE-2020-16992, CVE-2020-16993. | 2020-11-11 | not yet calculated |
CVE-2020-16988 MISC |
microsoft — azure_sphere | Azure Sphere Denial of Service Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-16986 MISC MISC |
microsoft — azure_sphere |
Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16988, CVE-2020-16989, CVE-2020-16992. | 2020-11-11 | not yet calculated |
CVE-2020-16993 MISC MISC |
microsoft — azure_sphere |
Azure Sphere Tampering Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-16983 MISC |
microsoft — azure_sphere |
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16987, CVE-2020-16991, CVE-2020-16994. | 2020-11-11 | not yet calculated |
CVE-2020-16984 MISC MISC |
microsoft — azure_sphere |
Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16990. | 2020-11-11 | not yet calculated |
CVE-2020-16985 MISC MISC |
microsoft — azure_sphere |
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16984, CVE-2020-16991, CVE-2020-16994. | 2020-11-11 | not yet calculated |
CVE-2020-16987 MISC MISC |
microsoft — azure_sphere |
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16984, CVE-2020-16987, CVE-2020-16994. | 2020-11-11 | not yet calculated |
CVE-2020-16991 MISC MISC |
microsoft — azure_sphere |
Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16988, CVE-2020-16989, CVE-2020-16993. | 2020-11-11 | not yet calculated |
CVE-2020-16992 MISC MISC |
microsoft — azure_sphere |
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16984, CVE-2020-16987, CVE-2020-16991. | 2020-11-11 | not yet calculated |
CVE-2020-16994 MISC MISC |
microsoft — azure_sphere |
Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16988, CVE-2020-16989, CVE-2020-16992, CVE-2020-16993. | 2020-11-11 | not yet calculated |
CVE-2020-16981 MISC |
microsoft — azure_sphere |
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16982, CVE-2020-16984, CVE-2020-16987, CVE-2020-16991, CVE-2020-16994. | 2020-11-11 | not yet calculated |
CVE-2020-16970 MISC MISC |
microsoft — azure_sphere |
Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16984, CVE-2020-16987, CVE-2020-16991, CVE-2020-16994. | 2020-11-11 | not yet calculated |
CVE-2020-16982 MISC MISC MISC |
microsoft — azure_sphere |
Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16988, CVE-2020-16992, CVE-2020-16993. | 2020-11-11 | not yet calculated |
CVE-2020-16989 MISC |
microsoft — defender |
Microsoft Defender for Endpoint Security Feature Bypass Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17090 MISC |
microsoft — dynamics_365 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17006, CVE-2020-17021. | 2020-11-11 | not yet calculated |
CVE-2020-17018 MISC |
microsoft — dynamics_365 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17018, CVE-2020-17021. | 2020-11-11 | not yet calculated |
CVE-2020-17006 MISC |
microsoft — dynamics_365 |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17006, CVE-2020-17018. | 2020-11-11 | not yet calculated |
CVE-2020-17021 MISC |
microsoft — dynamics_365 |
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17006, CVE-2020-17018, CVE-2020-17021. | 2020-11-11 | not yet calculated |
CVE-2020-17005 MISC |
microsoft — edge |
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048. | 2020-11-11 | not yet calculated |
CVE-2020-17054 MISC |
microsoft — edge |
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054. | 2020-11-11 | not yet calculated |
CVE-2020-17048 MISC |
microsoft — edge_and_internet_explorer |
Scripting Engine Memory Corruption Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17052 MISC |
microsoft — excel |
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17019, CVE-2020-17064, CVE-2020-17066. | 2020-11-11 | not yet calculated |
CVE-2020-17065 MISC |
microsoft — excel |
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17019, CVE-2020-17065, CVE-2020-17066. | 2020-11-11 | not yet calculated |
CVE-2020-17064 MISC |
microsoft — excel |
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17064, CVE-2020-17065, CVE-2020-17066. | 2020-11-11 | not yet calculated |
CVE-2020-17019 MISC |
microsoft — excel |
Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17019, CVE-2020-17064, CVE-2020-17065. | 2020-11-11 | not yet calculated |
CVE-2020-17066 MISC |
microsoft — excel |
Microsoft Excel Security Feature Bypass Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17067 MISC |
microsoft — exchange_server | Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17083. | 2020-11-11 | not yet calculated |
CVE-2020-17084 MISC |
microsoft — exchange_server |
Microsoft Exchange Server Denial of Service Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17085 MISC |
microsoft — exchange_server |
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17084. | 2020-11-11 | not yet calculated |
CVE-2020-17083 MISC |
microsoft — heif_image_extension |
HEIF Image Extensions Remote Code Execution Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17101 MISC |
microsoft — hevc_video_extension | HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17107, CVE-2020-17109, CVE-2020-17110. | 2020-11-11 | not yet calculated |
CVE-2020-17108 MISC |
microsoft — hevc_video_extension |
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17108, CVE-2020-17109, CVE-2020-17110. | 2020-11-11 | not yet calculated |
CVE-2020-17107 MISC |
microsoft — hevc_video_extension |
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17107, CVE-2020-17108, CVE-2020-17109. | 2020-11-11 | not yet calculated |
CVE-2020-17110 MISC |
microsoft — hevc_video_extension |
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17107, CVE-2020-17108, CVE-2020-17110. | 2020-11-11 | not yet calculated |
CVE-2020-17109 MISC |
microsoft — hevc_video_extension |
HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17107, CVE-2020-17108, CVE-2020-17109, CVE-2020-17110. | 2020-11-11 | not yet calculated |
CVE-2020-17106 MISC |
microsoft — internet_explorer |
Internet Explorer Memory Corruption Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17053 MISC |
microsoft — office |
Microsoft Office Online Spoofing Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17063 MISC |
microsoft — office |
Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17062 MISC |
microsoft — raw_image_extension | Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17078, CVE-2020-17079, CVE-2020-17086. | 2020-11-11 | not yet calculated |
CVE-2020-17082 MISC |
microsoft — raw_image_extension |
Microsoft Raw Image Extension Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17081 MISC |
microsoft — raw_image_extension |
Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17078, CVE-2020-17082, CVE-2020-17086. | 2020-11-11 | not yet calculated |
CVE-2020-17079 MISC |
microsoft — raw_image_extension |
Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17078, CVE-2020-17079, CVE-2020-17082. | 2020-11-11 | not yet calculated |
CVE-2020-17086 MISC |
microsoft — raw_image_extension |
Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17079, CVE-2020-17082, CVE-2020-17086. | 2020-11-11 | not yet calculated |
CVE-2020-17078 MISC |
microsoft — sharepoint |
Microsoft SharePoint Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16979. | 2020-11-11 | not yet calculated |
CVE-2020-17017 MISC |
microsoft — sharepoint |
Microsoft SharePoint Remote Code Execution Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17061 MISC |
microsoft — sharepoint |
Microsoft SharePoint Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-17017. | 2020-11-11 | not yet calculated |
CVE-2020-16979 MISC |
microsoft — sharepoint |
Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2020-17016, CVE-2020-17060. | 2020-11-11 | not yet calculated |
CVE-2020-17015 MISC |
microsoft — sharepoint |
Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2020-17015, CVE-2020-17016. | 2020-11-11 | not yet calculated |
CVE-2020-17060 MISC |
microsoft — sharepoint |
Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2020-17015, CVE-2020-17060. | 2020-11-11 | not yet calculated |
CVE-2020-17016 MISC |
microsoft — teams |
Microsoft Teams Remote Code Execution Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17091 MISC |
microsoft — visual_studio |
Visual Studio Tampering Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17100 MISC |
microsoft — visual_studio_code |
Visual Studio Code JSHint Extension Remote Code Execution Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17104 MISC |
microsoft — webp_image_extension |
WebP Image Extensions Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17102 MISC |
microsoft — windows |
Windows Spoofing Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-1599 MISC |
microsoft — windows_10 | Windows Port Class Library Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17011 MISC |
microsoft — windows_10 | Windows GDI+ Remote Code Execution Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17068 MISC |
microsoft — windows_10 | Windows Bind Filter Driver Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17012 MISC |
microsoft — windows_10 | Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17038. | 2020-11-11 | not yet calculated |
CVE-2020-17010 MISC |
microsoft — windows_10 | Windows Win32k Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17057 MISC |
microsoft — windows_10 | Windows Graphics Component Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17004 MISC |
microsoft — windows_10 | Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001. | 2020-11-11 | not yet calculated |
CVE-2020-17014 MISC |
microsoft — windows_10 | Windows NDIS Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17069 MISC |
microsoft — windows_10 | Windows Canonical Display Driver Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17029 MISC |
microsoft — windows_10 | Windows Delivery Optimization Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17071 MISC |
microsoft — windows_10 | Windows Update Orchestrator Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17074, CVE-2020-17076. | 2020-11-11 | not yet calculated |
CVE-2020-17073 MISC |
microsoft — windows_10 | Windows MSCTF Server Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17030 MISC |
microsoft — windows_10 |
Windows Print Configuration Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17041 MISC |
microsoft — windows_10 |
Windows WalletService Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17037 MISC |
microsoft — windows_10 |
Windows WalletService Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-16999 MISC |
microsoft — windows_10 |
Win32k Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17013 MISC |
microsoft — windows_10 |
Windows Hyper-V Security Feature Bypass Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17040 MISC |
microsoft — windows_10 |
Windows Function Discovery SSDP Provider Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17036 MISC |
microsoft — windows_10 |
Incorrect file permissions in BlueStacks 4 through 4.230 on Windows allow a local attacker to escalate privileges by modifying a file that is later executed by a higher-privileged user. | 2020-11-10 | not yet calculated |
CVE-2020-24367 CONFIRM |
microsoft — windows_10 |
Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17024 MISC |
microsoft — windows_10 |
Windows Kernel Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17035 MISC |
microsoft — windows_10 |
Windows Network File System Denial of Service Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17047 MISC |
microsoft — windows_10 |
Windows Update Orchestrator Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17073, CVE-2020-17074. | 2020-11-11 | not yet calculated |
CVE-2020-17076 MISC |
microsoft — windows_10 |
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. | 2020-11-11 | not yet calculated |
CVE-2020-17038 MISC |
microsoft — windows_10 |
Windows Camera Codec Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17113 MISC MISC |
microsoft — windows_10 |
Windows Error Reporting Denial of Service Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17046 MISC |
microsoft — windows_10 |
Remote Desktop Protocol Server Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-16997 MISC |
microsoft — windows_10 |
Windows Error Reporting Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17007 MISC |
microsoft — windows_10 |
Microsoft Browser Memory Corruption Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17058 MISC |
microsoft — windows_10 |
Windows USO Core Worker Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17075 MISC |
microsoft — windows_10 |
Windows Update Medic Service Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17070 MISC |
microsoft — windows_10 |
Windows Network File System Remote Code Execution Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17051 MISC |
microsoft — windows_10 |
Windows Common Log File System Driver Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17088 MISC |
microsoft — windows_10 |
Windows Kernel Local Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17087 MISC |
microsoft — windows_10 |
Windows Print Spooler Remote Code Execution Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17042 MISC |
microsoft — windows_10 |
Windows Update Stack Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17077 MISC |
microsoft — windows_10 |
Windows Network File System Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17056 MISC |
microsoft — windows_10 |
Windows Update Orchestrator Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17073, CVE-2020-17076. | 2020-11-11 | not yet calculated |
CVE-2020-17074 MISC |
microsoft — windows_10 |
Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014. | 2020-11-11 | not yet calculated |
CVE-2020-17001 MISC |
microsoft — windows_10 |
Windows KernelStream Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17045 MISC |
microsoft — windows_10 |
DirectX Elevation of Privilege Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-16998 MISC |
microsoft — windows_10 |
Remote Desktop Protocol Client Information Disclosure Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17000 MISC |
microsoft — windows_server |
Kerberos Security Feature Bypass Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17049 MISC |
microsoft — word |
Microsoft Word Security Feature Bypass Vulnerability | 2020-11-11 | not yet calculated |
CVE-2020-17020 MISC |
microweber — microweber |
Microweber v1.1.18 is affected by no session expiry after log-out. | 2020-11-09 | not yet calculated |
CVE-2020-23136 MISC MISC |
microweber — microweber |
Microweber 1.1.18 is affected by broken authentication and session management. Local session hijacking may occur, which could result in unauthorized access to system data or functionality, or a complete system compromise. | 2020-11-09 | not yet calculated |
CVE-2020-23139 MISC |
microweber — microweber |
An unrestricted file upload vulnerability was discovered in the Microweber 1.1.18 admin account page. An attacker can upload PHP code or any extension (eg- .exe) to the web server by providing image data and the image/jpeg content type with a .php extension. | 2020-11-09 | not yet calculated |
CVE-2020-23138 MISC MISC |
microweber — microweber |
Microweber 1.1.18 is affected by insufficient session expiration. When changing passwords, both sessions for when a user changes email and old sessions in any other browser or device, the session does not expire and remains active. | 2020-11-09 | not yet calculated |
CVE-2020-23140 MISC |
mit — kerberos_5 |
MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit. | 2020-11-06 | not yet calculated |
CVE-2020-28196 CONFIRM MLIST FEDORA FEDORA GENTOO |
mitel — shoretel_19.46.1802.0_devices |
The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page. | 2020-11-09 | not yet calculated |
CVE-2020-28351 MISC MISC MISC |
mitsubishi_electric — gt14_model_of_got1000_series |
Resource management error vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. | 2020-11-06 | not yet calculated |
CVE-2020-5649 MISC MISC MISC MISC |
mitsubishi_electric — gt14_model_of_got1000_series |
Improper neutralization of argument delimiters in a command (‘Argument Injection’) vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet. | 2020-11-06 | not yet calculated |
CVE-2020-5648 MISC MISC MISC MISC |
mitsubishi_electric — gt14_model_of_got1000_series |
Session fixation vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. | 2020-11-06 | not yet calculated |
CVE-2020-5645 MISC MISC MISC MISC |
mitsubishi_electric — gt14_model_of_got1000_series |
Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. | 2020-11-06 | not yet calculated |
CVE-2020-5644 MISC MISC MISC MISC |
mitsubishi_electric — gt14_model_of_got1000_series |
NULL pointer dereferences vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. | 2020-11-06 | not yet calculated |
CVE-2020-5646 MISC MISC MISC MISC |
moinmoin — moinmoin |
MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user’s browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. | 2020-11-11 | not yet calculated |
CVE-2020-15275 MISC MISC CONFIRM |
moinmoin — moinmoin |
The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution. | 2020-11-10 | not yet calculated |
CVE-2020-25074 MISC MISC MLIST DEBIAN |
nagios — nagios_xi |
Improper preservation of permissions in Nagios XI 5.7.4 allows a local, low-privileged, authenticated user to weaken the permissions of files, resulting in low-privileged users being able to write to and execute arbitrary PHP code with root privileges. | 2020-11-13 | not yet calculated |
CVE-2020-5796 MISC |
netapp — element_software_and_hci |
Element Software versions prior to 12.2 and HCI versions prior to 1.8P1 are susceptible to a vulnerability which could allow an authenticated user to view sensitive information. | 2020-11-13 | not yet calculated |
CVE-2020-8582 MISC |
netapp — element_software_and_hci |
Element Software versions prior to 12.2 and HCI versions prior to 1.8P1 are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session. | 2020-11-13 | not yet calculated |
CVE-2020-8583 MISC |
netflix — dispatch |
The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user. | 2020-11-09 | not yet calculated |
CVE-2020-9300 MISC MISC |
netflix — dispatch |
There were XSS vulnerabilities discovered and reported in the Dispatch application, affecting name and description parameters of Incident Priority, Incident Type, Tag Type, and Incident Filter. This vulnerability can be exploited by an authenticated user. | 2020-11-09 | not yet calculated |
CVE-2020-9299 MISC MISC |
netgear — multiple_devices |
upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitrary code via a stack-based buffer overflow. This affects R6400v2 V1.0.4.102_10.0.75, R6400 V1.0.1.62_1.0.41, R7000P V1.3.2.126_10.1.66, XR300 V1.0.3.50_10.3.36, R8000 V1.0.4.62, R8300 V1.0.2.136, R8500 V1.0.2.136, R7300DST V1.0.0.74, R7850 V1.0.5.64, R7900 V1.0.4.30, RAX20 V1.0.2.64, RAX80 V1.0.3.102, and R6250 V1.0.4.44. | 2020-11-09 | not yet calculated |
CVE-2020-28373 MISC |
nexcom — nio_50 |
The affected product does not properly validate input, which may allow an attacker to execute a denial-of-service attack on the NIO 50 (all versions). | 2020-11-13 | not yet calculated |
CVE-2020-25151 MISC |
nexcom — nio_50 |
The affected product transmits unencrypted sensitive information, which may allow an attacker to access this information on the NIO 50 (all versions). | 2020-11-13 | not yet calculated |
CVE-2020-25155 MISC |
nextcloud — nextcloud_server |
A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files. | 2020-11-09 | not yet calculated |
CVE-2020-8150 MISC MISC |
nextcloud — nextcloud_server |
A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file. | 2020-11-09 | not yet calculated |
CVE-2020-8133 MISC MISC |
nodemailer — nodemailer |
This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails. | 2020-11-12 | not yet calculated |
CVE-2020-7769 MISC MISC MISC MISC |
nvidia — geforce_now |
NVIDIA GeForce NOW application software on Windows, all versions prior to 2.0.25.119, contains a vulnerability in its open-source software dependency in which the OpenSSL library is vulnerable to binary planting attacks by a local user, which may lead to code execution or escalation of privileges. | 2020-11-11 | not yet calculated |
CVE-2020-5992 CONFIRM |
object-hierarchy-access — object-hierarchy-access |
Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution. | 2020-11-12 | not yet calculated |
CVE-2020-28270 MISC MISC |
one_identity_password_manager — one_identity_password_manager |
An issue was discovered in One Identity Password Manager 5.8. An attacker could enumerate valid answers for a user. It is possible for an attacker to detect a valid answer based on the HTTP response content, and reuse this answer later for a password reset on a chosen password. The enumeration is possible because, within the HTTP response content, WRONG ID is only returned when the answer is incorrect. | 2020-11-13 | not yet calculated |
CVE-2020-7962 MISC |
opera — opera_touch_for_ios |
Opera Touch for iOS before version 2.4.5 is vulnerable to an address bar spoofing attack. The vulnerability allows a malicious page to trick the browser into showing an address of a different page. This may allow the malicious page to impersonate another page and trick a user into providing sensitive data. | 2020-11-13 | not yet calculated |
CVE-2020-6157 MISC |
packagekit — packagekit |
PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own. | 2020-11-07 | not yet calculated |
CVE-2020-16121 CONFIRM MISC |
packagekit — packagekit |
PackageKit’s apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages. | 2020-11-07 | not yet calculated |
CVE-2020-16122 CONFIRM |
palo_alto_network — pan-os | An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo Alto Networks PAN-OS software. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.2. | 2020-11-12 | not yet calculated |
CVE-2020-2048 CONFIRM |
palo_alto_network — pan-os |
An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.4; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. | 2020-11-12 | not yet calculated |
CVE-2020-2000 CONFIRM |
palo_alto_network — pan-os |
An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication. Impacted features that use SSL VPN with client certificate verification are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN In configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. | 2020-11-12 | not yet calculated |
CVE-2020-2050 CONFIRM |
palo_alto_network — pan-os |
A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an attacker to communicate with devices in the network in a way that is not analyzed for threats by sending data through specifically crafted TCP packets. This technique evades signature-based threat detection. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.17; PAN-OS 9.0 versions earlier than 9.0.11; PAN-OS 9.1 versions earlier than 9.1.5; All versions of PAN-OS 7.1 and PAN-OS 8.0. | 2020-11-12 | not yet calculated |
CVE-2020-1999 CONFIRM |
palo_alto_network — pan-os |
An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator’s session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerability allows an attacker to gain privileged access to the Panorama web interface. An attacker requires some knowledge of managed firewalls to exploit this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5. | 2020-11-12 | not yet calculated |
CVE-2020-2022 CONFIRM |
passmark — mulitple_products |
An issue was discovered in PassMark BurnInTest v9.1 Build 1008, OSForensics v7.1 Build 1012, and PerformanceTest v10.0 Build 1008. The kernel driver exposes IOCTL functionality that allows low-privilege users to map arbitrary physical memory into the address space of the calling process. This could lead to arbitrary Ring-0 code execution and escalation of privileges. This affects DirectIo32.sys and DirectIo64.sys drivers. This issue is fixed in BurnInTest v9.2, PerformanceTest v10.0 Build 1009, OSForensics v8.0. | 2020-11-13 | not yet calculated |
CVE-2020-15481 MISC MISC |
percona — percona_server |
An issue was discovered in the MongoDB Simple LDAP plugin through 2020-10-02 for Percona Server when using the SimpleLDAP authentication in conjunction with Microsoft’s Active Directory, Percona has discovered a flaw that would allow authentication to complete when passing a blank value for the account password, leading to access against the service integrated with which Active Directory is deployed at the level granted to the authenticating account. | 2020-11-09 | not yet calculated |
CVE-2020-26542 MISC MISC CONFIRM CONFIRM |
pixar — openusd |
A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 while parsing compressed value rep arrays in binary USD files. A specially crafted malformed file can trigger a heap overflow, which can result in remote code execution. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. | 2020-11-13 | not yet calculated |
CVE-2020-6155 MISC |
pixar — openusd |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. This instance exists in the USDC file format FIELDS section decompression heap overflow. | 2020-11-13 | not yet calculated |
CVE-2020-6147 FULLDISC MISC |
pixar — openusd |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section. | 2020-11-13 | not yet calculated |
CVE-2020-6149 MISC |
pixar — openusd |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance USDC file format path element token index. | 2020-11-13 | not yet calculated |
CVE-2020-6156 MISC |
pixar — openusd |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. An instance exists in USDC file format FIELDSETS section decompression heap overflow. | 2020-11-13 | not yet calculated |
CVE-2020-6148 MISC |
pixar — openusd |
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software USDC file format SPECS section decompression heap overflow. | 2020-11-13 | not yet calculated |
CVE-2020-6150 MISC |
python-rsa — python-rsa |
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA. | 2020-11-12 | not yet calculated |
CVE-2020-25658 CONFIRM MISC |
qualcomm — multiple_snapdragon_products | u’Arbitrary access to DSP memory due to improper check in loaded library for data received from CPU side’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA845, SDM640, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P | 2020-11-12 | not yet calculated |
CVE-2020-11201 CONFIRM |
qualcomm — multiple_snapdragon_products | u’Buffer over read can happen while parsing mkv clip due to improper typecasting of data returned from atomsize’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM9206, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA429W, SDA640, SDA660, SDA670, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 | 2020-11-12 | not yet calculated |
CVE-2020-11193 CONFIRM |
qualcomm — multiple_snapdragon_products | u’Out of Bound issue in DSP services while processing received arguments due to improper validation of length received as an argument’ in SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439 | 2020-11-12 | not yet calculated |
CVE-2020-11208 CONFIRM |
qualcomm — multiple_snapdragon_products | u’Possible buffer overflow in WMA message processing due to integer overflow occurs when processing command received from user space’ in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8053, APQ8096AU, MDM9206, MDM9250, MDM9628, MDM9640, MDM9650, MSM8996AU, QCS405, SDA845, SDX20, SDX20M, WCD9330 | 2020-11-12 | not yet calculated |
CVE-2020-11131 CONFIRM |
qualcomm — multiple_snapdragon_products | u’Use after free issue in Bluetooth transport driver when a method in the object is accessed after the object has been deleted due to improper timer handling.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009W, MSM8909W, QCS605, QM215, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6350, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P | 2020-11-12 | not yet calculated |
CVE-2020-11175 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Integer overflow can cause a buffer overflow due to lack of table length check in the extensible boot Loader during the validation of security metadata while processing objects to be loaded’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in MDM9205, QCM4290, QCS405, QCS410, QCS4290, QCS610, QSM8250, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA640, SDA845, SDA855, SDM1000, SDM640, SDM830, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P | 2020-11-12 | not yet calculated |
CVE-2020-11127 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Improper authorization in DSP process could allow unauthorized users to downgrade the library versions in SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439 | 2020-11-12 | not yet calculated |
CVE-2020-11209 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Possible buffer overflow in Fastrpc while handling received parameters due to lack of validation on input parameters’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8098, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P | 2020-11-12 | not yet calculated |
CVE-2020-11206 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’information disclosure in gatekeeper trustzone implementation as the throttling mechanism to prevent brute force attempts at getting user`s lock-screen password can be bypassed by performing the standard gatekeeper operations.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QM215, QSM8250, QSM8350, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDW2500, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 | 2020-11-12 | not yet calculated |
CVE-2020-11123 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Integer overflow to buffer overflow occurs while playback of ASF clip having unexpected number of codec entries’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM9206, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SDA429W, SDA640, SDA660, SDA670, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 | 2020-11-12 | not yet calculated |
CVE-2020-11196 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Incorrect validation of ring context fetched from host memory can lead to memory overflow’ in Snapdragon Compute, Snapdragon Mobile in QSM8350, SC7180, SDX55, SDX55M, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P | 2020-11-12 | not yet calculated |
CVE-2020-3632 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Buffer overflow in LibFastCV library due to improper size checks with respect to buffer length’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8052, APQ8056, APQ8076, APQ8096, APQ8096SG, APQ8098, MDM9655, MSM8952, MSM8956, MSM8976, MSM8976SG, MSM8996, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P | 2020-11-12 | not yet calculated |
CVE-2020-11207 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Possible buffer overflow in WIFI hal process due to copying data without checking the buffer length’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P | 2020-11-12 | not yet calculated |
CVE-2020-11130 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Possible integer overflow to heap overflow while processing command due to lack of check of packet length received’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile in QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155P, SA8195P, SDX55M, SM8250, SM8350, SM8350P, SXR2130, SXR2130P | 2020-11-12 | not yet calculated |
CVE-2020-11205 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Possible buffer overflow in WIFI hal process due to usage of memcpy without checking length of destination buffer’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P | 2020-11-12 | not yet calculated |
CVE-2020-11121 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Buffer overflow/underflow occurs when typecasting the buffer passed by CPU internally in the library which is not aligned with the actual size of the structure’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA845, SDM640, SDM670, SDM710, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P | 2020-11-12 | not yet calculated |
CVE-2020-11202 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Buffer over read in boot due to size check ignored before copying GUID attribute from request to response’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8096AU, APQ8098, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8998, QCM4290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QSM8250, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA640, SDA670, SDA845, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 | 2020-11-12 | not yet calculated |
CVE-2020-11132 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Possible buffer overflow will occur in video while parsing mp4 clip with crafted esds atom size.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P | 2020-11-12 | not yet calculated |
CVE-2020-11184 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’Null-pointer dereference can occur while accessing data buffer beyond its size that leads to access the buffer beyond its range’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8009W, APQ8017, APQ8053, APQ8064AU, APQ8096AU, APQ8098, MDM9206, MDM9650, MSM8909W, MSM8953, MSM8996AU, QCM4290, QCS405, QCS4290, QCS603, QCS605, QM215, QSM8350, SA6155, SA6155P, SA8155, SA8155P, SDA429W, SDA640, SDA660, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM450, SDM632, SDM640, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P, WCD9330 | 2020-11-12 | not yet calculated |
CVE-2020-11168 CONFIRM |
qualcomm — multiple_snapdragon_products |
u’When a non standard SIP sigcomp message is received from the network, then there may be chances of using more UDVM cycle or memory overflow’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8017, APQ8037, APQ8053, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCM4290, QCM6125, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA415M, SA6145P, SA6150P, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8350, SM8350P, SXR1120, SXR1130 | 2020-11-12 | not yet calculated |
CVE-2020-3639 CONFIRM |
rconfig — rconfig |
lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7. | 2020-11-13 | not yet calculated |
CVE-2020-13638 MISC |
readytalk — avian |
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0 before 2020-10-27. The FileOutputStream.write() method in FileOutputStream.java has a boundary check to prevent out-of-bounds memory read/write operations. However, an integer overflow leads to bypassing this check and achieving the out-of-bounds access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | 2020-11-09 | not yet calculated |
CVE-2020-28371 MISC MISC |
red_hat — jboss_keycloak | A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw | 2020-11-09 | not yet calculated |
CVE-2020-14366 CONFIRM |
saltstack — salt |
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. | 2020-11-06 | not yet calculated |
CVE-2020-16846 SUSE MISC MISC FEDORA GENTOO CONFIRM |
saltstack — salt |
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. | 2020-11-06 | not yet calculated |
CVE-2020-17490 SUSE MISC FEDORA GENTOO CONFIRM |
saltstack — salt |
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. | 2020-11-06 | not yet calculated |
CVE-2020-25592 SUSE MISC MISC FEDORA GENTOO CONFIRM |
sap — 3d_visual_enterprise_viewer |
SAP 3D Visual Enterprise Viewer, version – 9, allows an user to open manipulated HPGL file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. | 2020-11-10 | not yet calculated |
CVE-2020-26817 MISC MISC MISC |
sap — as_abap |
SAP AS ABAP(DMIS), versions – 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA(DMIS), versions – 101, 102, 103, 104, 105, allows an authenticated attacker to inject arbitrary code into function module leading to code injection that can be executed in the application which affects the confidentiality, availability and integrity of the application. | 2020-11-10 | not yet calculated |
CVE-2020-26808 MISC MISC |
sap — commerce_cloud | SAP Commerce Cloud (Accelerator Payment Mock), versions – 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability. | 2020-11-10 | not yet calculated |
CVE-2020-26811 MISC MISC |
sap — commerce_cloud |
SAP Commerce Cloud (Accelerator Payment Mock), versions – 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request can render the SAP Commerce service itself unavailable leading to Denial of Service with no impact on confidentiality or integrity. | 2020-11-10 | not yet calculated |
CVE-2020-26810 MISC MISC |
sap — commerce_cloud |
SAP Commerce Cloud, versions- 1808,1811,1905,2005, allows an attacker to bypass existing authentication and permission checks via the ‘/medias’ endpoint hence gaining access to Secure Media folders. This folder could contain sensitive files that results in disclosure of sensitive information and impact system configuration confidentiality. | 2020-11-10 | not yet calculated |
CVE-2020-26809 MISC MISC |
sap — erp_and_s/4_hana |
SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check. | 2020-11-10 | not yet calculated |
CVE-2020-6316 MISC MISC |
sap — erp_client |
SAP ERP Client for E-Bilanz, version – 1.0, installation sets Incorrect default filesystem permissions are set in its installation folder which allows anyone to modify the files in the folder. | 2020-11-10 | not yet calculated |
CVE-2020-26807 MISC MISC |
sap — fiori_launchpad |
SAP Fiori Launchpad (News tile Application), versions – 750,751,752,753,754,755, allows an unauthorized attacker to send a crafted request to a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network to retrieve sensitive / confidential resources which are otherwise restricted for internal usage only, resulting in a Server-Side Request Forgery vulnerability. | 2020-11-10 | not yet calculated |
CVE-2020-26815 MISC MISC |
sap — fiori_launchpad |
SAP Fiori Launchpad (News tile Application), versions – 750,751,752,753,754,755, allows an unauthorized attacker to use SAP Fiori Launchpad News tile Application to send malicious code, to a different end user (victim), because News tile does not sufficiently encode user controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability. Information maintained in the victim’s web browser can be read, modified, and sent to the attacker. The malicious code cannot significantly impact the victim’s browser and the victim can easily close the browser tab to terminate it. | 2020-11-13 | not yet calculated |
CVE-2020-26825 MISC MISC |
sap — netweaver_as_abap |
SAP NetWeaver AS ABAP (Web Dynpro), versions – 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, that allows them to read and delete database logfiles because of Improper Access Control. | 2020-11-10 | not yet calculated |
CVE-2020-26819 MISC MISC |
sap — netweaver_as_abap |
SAP NetWeaver AS ABAP (Web Dynpro), versions – 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, which reveals sensitive system information that would otherwise be restricted to highly privileged users because of missing authorization, resulting in Information Disclosure. | 2020-11-10 | not yet calculated |
CVE-2020-26818 MISC MISC |
sap — process_integration |
SAP Process Integration (PGP Module – Business-to-Business Add On), version – 1.0, allows an attacker to read PGP Keys under certain conditions in the PGP Module of Business-to-Business Add-On, these keys can then be used to read messages processed by the module leading to Information Disclosure. | 2020-11-10 | not yet calculated |
CVE-2020-26814 MISC MISC |
sentrifugo — sentrifugo | In Sentrifugo 3.2, users can share an announcement under “Organization -> Announcements” tab. Also, in this page, users can upload attachments with the shared announcements. This “Upload Attachment” functionality is suffered from “Unrestricted File Upload” vulnerability so attacker can upload malicious files using this functionality and control the server. | 2020-11-12 | not yet calculated |
CVE-2020-26804 MISC |
sentrifugo — sentrifugo | In Sentrifugo 3.2, admin can edit employee’s informations via this endpoint –> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, “employeeNumId” parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database. | 2020-11-12 | not yet calculated |
CVE-2020-26805 MISC |
sentrifugo — sentrifugo |
In Sentrifugo 3.2, users can upload an image under “Assets -> Add” tab. This “Upload Images” functionality is suffered from “Unrestricted File Upload” vulnerability so attacker can upload malicious files using this functionality and control the server. | 2020-11-12 | not yet calculated |
CVE-2020-26803 MISC |
set — set | Prototype pollution vulnerability in ‘@strikeentco/set’ version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution. | 2020-11-10 | not yet calculated |
CVE-2020-28267 MISC MISC |
siemens — simatic_s7-300_cpu_family |
A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SINUMERIK 840D sl (All versions). Sending multiple specially crafted packets to the affected devices could cause a Denial-of-Service on port 102. A cold restart is required to recover the service. | 2020-11-12 | not yet calculated |
CVE-2020-15783 MISC |
spree — spree | Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched in versions 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected. | 2020-11-13 | not yet calculated |
CVE-2020-26223 MISC CONFIRM MISC |
sugarcrm — sugarcrm |
An authorization bypass and PHP local-file-include vulnerability in the installation component of SugarCRM before 8.0, 8.0 before 8.0.7, 9.0 before 9.0.4, and 10.0 before 10.0.0 allows for unauthenticated remote code execution against a configured SugarCRM instance via crafted HTTP requests. (This is exploitable even after installation is completed.). | 2020-11-12 | not yet calculated |
CVE-2020-7472 MISC CONFIRM |
suitecrm — suitecrm |
SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled .php file under the web root. | 2020-11-06 | not yet calculated |
CVE-2020-28328 MISC MISC MISC |
synopsys — synopsys |
Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 – 0.0.52 does not validate SSL certificates in certain cases. | 2020-11-06 | not yet calculated |
CVE-2020-27589 CONFIRM MISC MISC MISC MISC |
tcl — android_smart_tvs |
A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows an attacker on the adjacent network to arbitrarily browse and download sensitive files over an insecure web server running on port 7989 that lists all files & directories. An unprivileged remote attacker on the adjacent network, can download most system files, leading to serious critical information disclosure. | 2020-11-10 | not yet calculated |
CVE-2020-27403 MISC MISC MISC MISC |
tcl — android_smart_tvs |
A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade, and /var/TerminalManager directories within the TV file system. An attacker, such as a malicious APK or local unprivileged user could perform fake system upgrades by writing to the /data/vendor/upgrage folder. | 2020-11-10 | not yet calculated |
CVE-2020-28055 MISC MISC MISC MISC MISC |
tibco — tibco_iprocess_workspace |
The Core component of TIBCO Software Inc.’s TIBCO iProcess Workspace (Browser) contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a Cross Site Request Forgery (CSRF) attack on the affected system. A successful attack using this vulnerability requires human interaction from an authenticated user other than the attacker. Affected releases are TIBCO Software Inc.’s TIBCO iProcess Workspace (Browser): versions 11.6.0 and below. | 2020-11-10 | not yet calculated |
CVE-2020-27146 CONFIRM CONFIRM |
tmux — tmux |
The function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output. | 2020-11-06 | not yet calculated |
CVE-2020-27347 MISC GENTOO MISC |
touchbase.ai — touchbase.ai
|
toucbase.ai before version 2.0 leaks information by not stripping exif data from images. Anyone with access to the uploaded image of other users could obtain its geolocation, device, and software version data etc (if present. The issue is fixed in version 2.0. | 2020-11-11 | not yet calculated |
CVE-2020-26220 MISC CONFIRM |
touchbase.ai — touchbase.ai
|
touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action. The issue is patched in version 2.0. | 2020-11-11 | not yet calculated |
CVE-2020-26221 CONFIRM |
touchbase.ai — touchbase.ai |
touchbase.ai before version 2.0 is vulnerable to Open Redirect. Impacts can be many, and vary from theft of information and credentials, to the redirection to malicious websites containing attacker-controlled content, which in some cases even cause XSS attacks. So even though an open redirection might sound harmless at first, the impacts of it can be severe should it be exploitable. The issue is fixed in version 2.0. | 2020-11-11 | not yet calculated |
CVE-2020-26219 CONFIRM |
touchbase.ai — touchbase.ai |
touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting. The vulnerability allows an attacker to inject HTML payloads which could result in defacement, user redirection to a malicious webpage/website etc. The issue is patched in version 2.0. | 2020-11-11 | not yet calculated |
CVE-2020-26218 CONFIRM |
tp-link — archer_a7_ac1750_devices |
tdpServer on TP-Link Archer A7 AC1750 devices before 201029 allows remote attackers to execute arbitrary code via the slave_mac parameter. NOTE: this issue exists because of an incomplete fix for CVE-2020-10882 in which shell quotes are mishandled. | 2020-11-08 | not yet calculated |
CVE-2020-28347 MISC MISC MISC MISC MISC |
trend_micro — interscan_messaging_security_virtual_appliance |
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a server side request forgery vulnerability which could allow an authenticated attacker to abuse the product’s web server and grant access to web resources or parts of local files. An attacker must already have obtained authenticated privileges on the product to exploit this vulnerability. | 2020-11-09 | not yet calculated |
CVE-2020-27018 N/A N/A |
trend_micro — interscan_messaging_security_virtual_appliance |
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an information disclosure vulnerability which could allow an attacker to access a specific database and key. | 2020-11-09 | not yet calculated |
CVE-2020-27019 N/A N/A |
trend_micro — interscan_messaging_security_virtual_appliance |
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 has updated a specific critical library that may vulnerable to attack. | 2020-11-09 | not yet calculated |
CVE-2020-27694 N/A N/A |
trend_micro — interscan_messaging_security_virtual_appliance |
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a cross-site request forgery (CSRF) vulnerability which could allow an attacker to modify policy rules by tricking an authenticated administrator into accessing an attacker-controlled web page. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability. | 2020-11-09 | not yet calculated |
CVE-2020-27016 N/A N/A |
trend_micro — interscan_messaging_security_virtual_appliance |
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an XML External Entity Processing (XXE) vulnerability which could allow an authenticated administrator to read arbitrary local files. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability. | 2020-11-09 | not yet calculated |
CVE-2020-27017 N/A N/A |
trend_micro — interscan_messaging_security_virtual_appliance |
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 stores administrative passwords using a hash that is considered outdated. | 2020-11-09 | not yet calculated |
CVE-2020-27693 N/A N/A |
untangle — firewall_ng | Untangle Firewall NG before 16.0 uses MD5 for passwords. | 2020-11-12 | not yet calculated |
CVE-2020-17494 MISC MISC MISC MISC |
valve — game_networking_sockets | Valve’s Game Networking Sockets prior to version v1.2.0 improperly handles inlined statistics messages in function CConnectionTransportUDPBase::Received_Data(), leading to an exception thrown from libprotobuf and resulting in a crash. | 2020-11-13 | not yet calculated |
CVE-2020-6019 MISC |
vivo — fame_touch_module |
The frame touch module does not make validity judgments on parameter lengths when processing specific parameters,which caused out of the boundary when memory access.The vulnerability eventually leads to a local DOS on the device. | 2020-11-10 | not yet calculated |
CVE-2020-12485 CONFIRM |
vmware — tanzu_tas |
Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller. | 2020-11-11 | not yet calculated |
CVE-2020-5426 CONFIRM |
wordpress — wordpress |
The Canto plugin 1.3.0 for WordPress allows includes/lib/download.php?subdomain= SSRF. | 2020-11-10 | not yet calculated |
CVE-2020-24063 MISC MISC MISC MISC |
wordpress — wordpress |
An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of “wp_ajax_nopriv” call in WordPress, which allows any unauthenticated user to get access to the function “gdlr_lms_cancel_booking” where POST Parameter “id” was sent straight into SQL query without sanitization. | 2020-11-12 | not yet calculated |
CVE-2020-27481 MISC |
wordpress — wordpress |
The usc-e-shop (aka Collne Welcart e-Commerce) plugin before 1.9.36 for WordPress allows Object Injection because of usces_unserialize. There is not a complete POP chain. | 2020-11-07 | not yet calculated |
CVE-2020-28339 MISC MISC |
xen — xen | Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a “Platypus” attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen. | 2020-11-10 | not yet calculated |
CVE-2020-28368 MISC MISC MISC |
This product is provided subject to this Notification and this Privacy & Use policy.