a10_networks — acos_and_agalazy_management_graphical_user_interfaces
  A10 Networks ACOS and aGalaxy management Graphical User Interfaces (GUIs) have an unauthenticated Remote Code Execution (RCE) vulnerability that could be used to compromise affected ACOS systems. ACOS versions 3.2.x (including and after 3.2.2), 4.x, and 5.1.x are affected. aGalaxy versions 3.0.x, 3.2.x, and 5.0.x are affected. 2020-11-10 not yet calculated CVE-2020-24384
CONFIRM adobe — acrobat_reader
  Adobe Acrobat Reader for Android version 20.6.2 (and earlier) does not properly restrict access to directories created by the application. This could result in disclosure of sensitive information stored in databases used by the application. Exploitation requires a victim to download and run a malicious application. 2020-11-12 not yet calculated CVE-2020-24441
MISC adobe — connect Adobe Connect version 11.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. 2020-11-12 not yet calculated CVE-2020-24443
MISC adobe — connect
  Adobe Connect version 11.0 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim’s browser. 2020-11-12 not yet calculated CVE-2020-24442
MISC amd — running_average_power_limit
  A potential vulnerability in the AMD extension to Linux “hwmon” service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access. 2020-11-12 not yet calculated CVE-2020-12912
MISC amd — trusted_platform_modules
  The Trusted Platform Modules (TPM) reference software may not properly track the number of times a failed shutdown happens. This can leave the TPM in a state where confidential key material in the TPM may be able to be compromised. AMD believes that the attack requires physical access of the device because the power must be repeatedly turned on and off. This potential attack may be used to change confidential information, alter executables signed by key material in the TPM, or create a denial of service of the device. 2020-11-12 not yet calculated CVE-2020-12926
MISC amd — vbios_flash_tool
  A potential vulnerability in a dynamically loaded AMD driver in AMD VBIOS Flash Tool SDK may allow any authenticated user to escalate privileges to NT authority system. 2020-11-12 not yet calculated CVE-2020-12927
MISC apache — airflows_experimental_api
  The previous default setting for Airflow’s Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default 2020-11-10 not yet calculated CVE-2020-13927
MISC apache — batik
  Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the “xlink:href” attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. 2020-11-12 not yet calculated CVE-2019-17566
MISC apache — cxf
  By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573. 2020-11-12 not yet calculated CVE-2020-13954
MISC
MLIST
MLIST
MLIST
MLIST
MLIST arm_developer — armv8-m_processors
  In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension. 2020-11-12 not yet calculated CVE-2020-16273
CONFIRM asterisk — open_source
  A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling. 2020-11-06 not yet calculated CVE-2020-28327
MISC
MISC atlassian — gajira-create_github_action

 

The execute function in in the Atlassian gajira-comment GitHub Action before version 2.0.2 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue comment. 2020-11-09 not yet calculated CVE-2020-14189
MISC atlassian — gajira-create_github_action
  The preprocessArgs function in the Atlassian gajira-create GitHub Action before version 2.0.1 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue. 2020-11-09 not yet calculated CVE-2020-14188
MISC atlassian — resourcexpress_meeting_monitor
  SQL Injection issues in various ASPX pages of ResourceXpress Meeting Monitor 4.9 could lead to remote code execution and information disclosure. 2020-11-12 not yet calculated CVE-2020-13877
CONFIRM
MISC audi — a7_mmi_2014_vehicles
  On Audi A7 MMI 2014 vehicles, the Bluetooth stack in Audi A7 MMI Multiplayer with version (N+R_CN_AU_P0395) mishandles %x and %s format string specifiers in a device name. This may lead to memory content leaks and potentially crash the services. 2020-11-11 not yet calculated CVE-2020-27524
MISC
MISC
MISC avaya — unified_portal_client
  A Cross Site Scripting (XSS) Vulnerability on the Unified Portal Client (web client) used in Avaya Equinox Conferencing can allow an authenticated user to perform XSS attacks. The affected versions of Equinox Conferencing includes all 9.x versions before 9.1.10. 2020-11-13 not yet calculated CVE-2020-7033
CONFIRM avaya — weblm
  An XML external entity (XXE) vulnerability in Avaya WebLM admin interface allows authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. Affected versions of Avaya WebLM include: 7.0 through 7.1.3.6 and 8.0 through 8.1.2. 2020-11-13 not yet calculated CVE-2020-7032
CONFIRM azure — devops
  Azure DevOps Server and Team Foundation Services Spoofing Vulnerability 2020-11-11 not yet calculated CVE-2020-1325
MISC bab_technologie — eibport_v3
  BAB TECHNOLOGIE GmbH eibPort V3 prior to 3.8.3 devices allow denial of service (Uncontrolled Resource Consumption) via requests to the lighttpd component. 2020-11-12 not yet calculated CVE-2020-24573
MISC becton_dickinson_and_company — bd_alaris_8015_pc_unit_and_bd_alaris_systems_manager
  BD Alaris PC Unit, Model 8015, Versions 9.33.1 and earlier and BD Alaris Systems Manager, Versions 4.33 and earlier The affected products are vulnerable to a network session authentication vulnerability within the authentication process between specified versions of the BD Alaris PC Unit and the BD Alaris Systems Manager. If exploited, an attacker could perform a denial-of-service attack on the BD Alaris PC Unit by modifying the configuration headers of data in transit. A denial-of-service attack could lead to a drop in the wireless capability of the BD Alaris PC Unit, resulting in manual operation of the PC Unit. 2020-11-13 not yet calculated CVE-2020-25165
MISC bitdefender — update_server
  Insufficient validation in the Bitdefender Update Server and BEST Relay components of Bitdefender Endpoint Security Tools versions prior to 6.6.20.294 allows an unprivileged attacker to bypass the in-place mitigations and interact with hosts on the network. This issue affects: Bitdefender Update Server versions prior to 6.6.20.294. 2020-11-09 not yet calculated CVE-2020-15297
MISC brave — brave
  The implementation of Brave Desktop’s privacy-preserving analytics system (P3A) between 1.1 and 1.18.35 logged the timestamp of when the user last opened an incognito window, including Tor windows. The intended behavior was to log the timestamp for incognito windows excluding Tor windows. Note that if a user has P3A enabled, the timestamp is not sent to Brave’s server, but rather a value from:Used in last 24hUsed in last week but not 24hUsed in last 28 days but not weekEver used but not in last 28 daysNever usedThe privacy risk is low because a local attacker with disk access cannot tell if the timestamp corresponds to a Tor window or a non-Tor incognito window. 2020-11-09 not yet calculated CVE-2020-8276
MISC cacti — cacti
  A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field 2020-11-12 not yet calculated CVE-2020-25706
CONFIRM
MISC
MISC canonical — ubuntu
  An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, would perform unbounded read operations on user-controlled ~/.pam_environment files, allowing an infinite loop if /dev/zero is symlinked to this location. 2020-11-11 not yet calculated CVE-2020-16127
CONFIRM canonical — ubuntu
  An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, improperly dropped the ruid, allowing untrusted users to send signals to AccountService, thus stopping it from handling D-Bus messages in a timely fashion. 2020-11-11 not yet calculated CVE-2020-16126
CONFIRM capasystems — capainstaller
  CapaSystems CapaInstaller before 6.0.101 does not properly assign, modify, or check privileges for an actor who attempts to edit registry values, allowing an attacker to escalate privileges. 2020-11-09 not yet calculated CVE-2020-27977
CONFIRM cellinx — nvt_web_server
  Cellinx NVT Web Server 5.0.0.014b.test 2019-09-05 allows a remote user to run commands as root via SetFileContent.cgi because authentication is on the client side. 2020-11-06 not yet calculated CVE-2020-28250
MISC cisco — asr_9000_series_aggregation_services_routers
  A vulnerability in the ingress packet processing function of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when an affected device processes network traffic in software switching mode (punted). An attacker could exploit this vulnerability by sending specific streams of Layer 2 or Layer 3 protocol data units (PDUs) to an affected device. A successful exploit could cause the affected device to run out of buffer resources, which could make the device unable to process or forward traffic, resulting in a DoS condition. The device would need to be restarted to regain functionality. 2020-11-12 not yet calculated CVE-2020-26070
CISCO

cisco — webex_network_recording_player_and_webex_player

Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. 2020-11-06 not yet calculated CVE-2020-3573
CISCO
MISC

cisco — webex_network_recording_player_and_webex_player

Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. 2020-11-06 not yet calculated CVE-2020-3604
CISCO
MISC

cisco — webex_network_recording_player_and_webex_player

Multiple vulnerabilities in Cisco Webex Network Recording Player for Windows and Cisco Webex Player for Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities are due to insufficient validation of certain elements of a Webex recording that is stored in the Advanced Recording Format (ARF) or Webex Recording Format (WRF). An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. 2020-11-06 not yet calculated CVE-2020-3603
CISCO
MISC ckeditor — ckeditor
  A cross-site scripting (XSS) vulnerability in the Color Dialog plugin for CKEditor 4.15.0 allows remote attackers to run arbitrary web script after persuading a user to copy and paste crafted HTML code into one of editor inputs. 2020-11-12 not yet calculated CVE-2020-27193
CONFIRM
CONFIRM
MISC cmsuno — cmsuno
  An authenticated attacker can inject malicious code into “lang” parameter in /uno/central.php file in CMSuno 1.6.2 and run this PHP code in the web page. In this way, attacker can takeover the control of the server. 2020-11-13 not yet calculated CVE-2020-25538
MISC cmsuno — cmsuno
  In CMSuno 1.6.2, an attacker can inject malicious PHP code as a “username” while changing his/her username & password. After that, when attacker logs in to the application, attacker’s code will be run. As a result of this vulnerability, authenticated user can run command on the server. 2020-11-13 not yet calculated CVE-2020-25557
MISC compass_plus — tranzware_payment_gateway
  A reflected cross-site scripting (XSS) vulnerability exists in the TranzWare Payment Gateway 3.1.12.3.2. A remote unauthenticated attacker is able to execute arbitrary HTML code via crafted url (different vector than CVE-2020-28415). 2020-11-12 not yet calculated CVE-2020-28414
MISC
MISC compass_plus — tranzware_payment_gateway
  A reflected cross-site scripting (XSS) vulnerability exists in the TranzWare Payment Gateway 3.1.12.3.2. A remote unauthenticated attacker is able to execute arbitrary HTML code via crafted url (different vector than CVE-2020-28414). 2020-11-12 not yet calculated CVE-2020-28415
MISC
MISC couchbase — couchbase_server
  Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka “magic cookie”). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0. 2020-11-12 not yet calculated CVE-2020-24719
CONFIRM debian — raptor_xml_writer.c
  raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml). 2020-11-06 not yet calculated CVE-2017-18926
MLIST
MLIST
MLIST
MISC
MLIST
DEBIAN
MISC deephas — deephas
  Prototype pollution vulnerability in ‘deephas’ versions 1.0.0 through 1.0.5 allows attacker to cause a denial of service and may lead to remote code execution. 2020-11-12 not yet calculated CVE-2020-28271
MISC
MISC dell — inspiron
  Dell Inspiron 15 7579 2-in-1 BIOS versions prior to 1.31.0 contain an Improper SMM communication buffer verification vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. 2020-11-10 not yet calculated CVE-2020-5388
MISC dependabot — dependabot
  Dependabot is a set of packages for automated dependency management for Ruby, JavaScript, Python, PHP, Elixir, Rust, Java, .NET, Elm and Go. In Dependabot-Core from version 0.119.0.beta1 before version 0.125.1, there is a remote code execution vulnerability in dependabot-common and dependabot-go_modules when a source branch name contains malicious injectable bash code. For example, if Dependabot is configured to use the following source branch name: “/$({curl,127.0.0.1})”, Dependabot will make a HTTP request to the following URL: 127.0.0.1 when cloning the source repository. The fix was applied to version 0.125.1. As a workaround, one can escape the branch name prior to passing it to the Dependabot::Source class. 2020-11-13 not yet calculated CVE-2020-26222
MISC
MISC
CONFIRM dundas_data_visualization — dundas_bi_server The server in Dundas BI through 8.0.0.1001 allows XSS via addition of a Component (e.g., a button) when events such as click, hover, etc. occur. 2020-11-10 not yet calculated CVE-2020-28409
MISC dundas_data_visualization — dundas_bi_server The server in Dundas BI through 8.0.0.1001 allows XSS via an HTML label when creating or editing a dashboard. 2020-11-10 not yet calculated CVE-2020-28408
MISC dyne — tomb
  ask_password in Tomb 2.0 through 2.7 returns a warning when pinentry-curses is used and $DISPLAY is non-empty, causing affected users’ files to be encrypted with “tomb {W] Detected DISPLAY, but only pinentry-curses is found.” as the encryption key. 2020-11-13 not yet calculated CVE-2020-28638
MISC eclipse — hono
  In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly disallows a peer to send such messages, a hand crafted AMQP 1.0 client could exploit this behavior in order to send a message of unlimited size to the adapter, eventually causing the adapter to fail with an out of memory exception. 2020-11-13 not yet calculated CVE-2020-27217
CONFIRM express-validators — express-validators
  All versions of package express-validators are vulnerable to Regular Expression Denial of Service (ReDoS) when validating specifically-crafted invalid urls. 2020-11-11 not yet calculated CVE-2020-7767
MISC fastadmin — fastadmin-tp6
  In fastadmin-tp6 v1.0, in the file app/admin/controller/Ajax.php the ‘table’ parameter passed is not filtered so a malicious parameter can be passed for SQL injection. 2020-11-13 not yet calculated CVE-2020-21667
MISC field — field
  Prototype pollution vulnerability in ‘field’ versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution. 2020-11-12 not yet calculated CVE-2020-28269
MISC
MISC find-my-way — find-my-way
  This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version’ header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack. 2020-11-08 not yet calculated CVE-2020-7764
MISC
MISC flexdotnetcms — flexdotnetcms An unrestricted file upload issue in FlexDotnetCMS before v1.5.9 allows an authenticated remote attacker to upload and execute arbitrary files by using the FileManager to upload malicious code (e.g., ASP code) in the form of a safe file type (e.g., a TXT file), and then using the FileEditor (in v1.5.8 and prior) or the FileManager’s rename function (in v1.5.7 and prior) to rename the file to an executable extension (e.g., ASP), and finally executing the file via an HTTP GET request to /<path_to_file>. 2020-11-12 not yet calculated CVE-2020-27386
MISC
MISC
MISC flexdotnetcms — flexdotnetcms
  Incorrect Access Control in the FileEditor (/Admin/Views/FileEditor/) in FlexDotnetCMS before v1.5.11 allows an authenticated remote attacker to read and write to existing files outside the web root. The files can be accessed via directory traversal, i.e., by entering a .. (dot dot) path such as ……….<file> in the input field of the FileEditor. In FlexDotnetCMS before v1.5.8, it is also possible to access files by specifying the full path (e.g., C:<file>). The files can then be edited via the FileEditor. 2020-11-12 not yet calculated CVE-2020-27385
MISC
MISC gdm3 — gdm3
  gdm3 versions before 3.36.2 or 3.38.2 would start gnome-initial-setup if gdm3 can’t contact the accountservice service via dbus in a timely manner; on Ubuntu (and potentially derivatives) this could be be chained with an additional issue that could allow a local user to create a new privileged account. 2020-11-10 not yet calculated CVE-2020-16125
MISC
MISC
MISC google — android

 

In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813 2020-11-10 not yet calculated CVE-2020-0418
MISC google — android

 

In send_vc of res_send.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-161362564 2020-11-10 not yet calculated CVE-2020-0424
MISC google — android
  Radar COVID is the official COVID-19 exposure notification app for Spain. In affected versions of Radar COVID, identification and de-anonymization of COVID-19 positive users that upload Radar COVID TEKs to the Radar COVID server is possible. This vulnerability enables the identification and de-anonymization of COVID-19 positive users when using Radar COVID. The vulnerability is caused by the fact that Radar COVID connections to the server (uploading of TEKs to the backend) are only made by COVID-19 positives. Therefore, any on-path observer with the ability to monitor traffic between the app and the server can identify which users had a positive test. Such an adversary can be the mobile network operator (MNO) if the connection is done through a mobile network, the Internet Service Provider (ISP) if the connection is done through the Internet (e.g., a home network), a VPN provider used by the user, the local network operator in the case of enterprise networks, or any eavesdropper with access to the same network (WiFi or Ethernet) as the user as could be the case of public WiFi hotspots deployed at shopping centers, airports, hotels, and coffee shops. The attacker may also de-anonymize the user. For this additional stage to succeed, the adversary needs to correlate Radar COVID traffic to other identifiable information from the victim. This could be achieved by associating the connection to a contract with the name of the victim or by associating Radar COVID traffic to other user-generated flows containing identifiers in the clear (e.g., HTTP cookies or other mobile flows sending unique identifiers like the IMEI or the AAID without encryption). The former can be executed, for instance, by the Internet Service Provider or the MNO. The latter can be executed by any on-path adversary, such as the network provider or even the cloud provider that hosts more than one service accessed by the victim. The farther the adversary is either from the victim (the client) or the end-point (the server), the less likely it may be that the adversary has access to re-identification information. The vulnerability has been mitigated with the injection of dummy traffic from the application to the backend. Dummy traffic is generated by all users independently of whether they are COVID-19 positive or not. The issue was fixed in iOS in version 1.0.8 (uniform distribution), 1.1.0 (exponential distribution), Android in version 1.0.7 (uniform distribution), 1.1.0 (exponential distribution), Backend in version 1.1.2-RELEASE. For more information see the referenced GitHub Security Advisory. 2020-11-13 not yet calculated CVE-2020-26230
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
CONFIRM
MISC google — android
  In create of FileMap.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-156997193 2020-11-10 not yet calculated CVE-2020-0409
MISC grpc — grpc The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition. 2020-11-11 not yet calculated CVE-2020-7768
MISC
MISC
MISC
MISC
MISC hazelcast — imdg_enterprise
  The LDAP authentication method in LdapLoginModule in Hazelcast IMDG Enterprise 4.x before 4.0.3, and Jet Enterprise 4.x through 4.2, doesn’t verify properly the password in some system-user-dn scenarios. As a result, users (clients/members) can be authenticated even if they provide invalid passwords. 2020-11-09 not yet calculated CVE-2020-26168
MISC
CONFIRM
CONFIRM
MISC huawei — fusioncompute
  FusionCompute versions 8.0.0 have an insecure encryption algorithm vulnerability. Attackers with high permissions can exploit this vulnerability to cause information leak. 2020-11-12 not yet calculated CVE-2020-9128
MISC huawei — mate_30_firmware
  HUAWEI Mate 30 versions earlier than 10.1.0.159(C00E159R7P2) have a vulnerability of improper buffer operation. Due to improper restrictions, local attackers with high privileges can exploit the vulnerability to cause system heap overflow. 2020-11-13 not yet calculated CVE-2020-9129
MISC huawei — multiple_products
  Some Huawei products have a command injection vulnerability. Due to insufficient input validation, an attacker with high privilege may inject some malicious codes in some files of the affected products. Successful exploit may cause command injection.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60. 2020-11-13 not yet calculated CVE-2020-9127
MISC huawei — multiple_products
  There is a denial of service vulnerability in some Huawei products. There is no protection against the attack scenario of specific protocol. A remote, unauthorized attackers can construct attack scenarios, which leads to denial of service.Affected product versions include:NIP6300 versions V500R001C30,V500R001C60;NIP6600 versions V500R001C30,V500R001C60;Secospace USG6300 versions V500R001C30,V500R001C60;Secospace USG6500 versions V500R001C30,V500R001C60;Secospace USG6600 versions V500R001C30,V500R001C60;USG9500 versions V500R001C30,V500R001C60. 2020-11-13 not yet calculated CVE-2020-1847
MISC ibm — cognos_controller
  A low level user of IBM Cognos Controller 10.3.0, 10.3.1, 10.4.0, 10.4.1, and 10.4.2 who has Administration rights to the server where the application is installed, can escalate their privilege from Low level to Super Admin and gain access to Create/Update/Delete any level of user in Cognos Controller. IBM X-Force ID: 186625. 2020-11-11 not yet calculated CVE-2020-4685
XF
CONFIRM ibm — content_navigator
  IBM Content Navigator 3.0CD is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 187189. 2020-11-10 not yet calculated CVE-2020-4704
XF
CONFIRM ibm — content_navigator
  IBM Content Navigator 3.0CD is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188737. 2020-11-10 not yet calculated CVE-2020-4760
XF
CONFIRM ibm — infosphere_information_server
  IBM InfoSphere Information Server 11.7 stores sensitive information in the browser’s history that could be obtained by a user who has access to the same system. IBM X-Force ID: 190910. 2020-11-13 not yet calculated CVE-2020-4886
XF
CONFIRM ibm — tivoli_key_lifecycle_manager
  IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157. 2020-11-10 not yet calculated CVE-2020-4568
XF
CONFIRM ilex  — international_sign&go_workstation_security_suite
  Ilex International Sign&go Workstation Security Suite 7.1 allows elevation of privileges via a symlink attack on ProgramDataIlexS&GLogs00-sngWSService1.log. 2020-11-10 not yet calculated CVE-2020-23968
MISC
MISC
MISC ilias — ilias
  An XSS issue exists in the question-pool file-upload preview feature in ILIAS 6.4. 2020-11-10 not yet calculated CVE-2020-25267
MISC ilias — ilias
  Remote Code Execution can occur via the external news feed in ILIAS 6.4 because of incorrect parameter sanitization for Magpie RSS data. 2020-11-10 not yet calculated CVE-2020-25268
MISC intel — adas_ie
  Improper input validation in the Intel(R) ADAS IE before version ADAS_IE_1.0.766 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12323
MISC intel — advisor_tools
  Improper permissions in the installer for the Intel(R) Advisor tools before version 2020 Update 2 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12334
MISC

intel — amt

Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8757
CONFIRM
MISC intel — amt
  Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12356
CONFIRM
MISC intel — amt
  Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-8746
CONFIRM
MISC intel — amt
  Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. 2020-11-12 not yet calculated CVE-2020-8749
CONFIRM
MISC intel — amt
  Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access. 2020-11-12 not yet calculated CVE-2020-8747
CONFIRM
MISC intel — amt
  Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8760
CONFIRM
MISC intel — amt_and_ism
  Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access. 2020-11-12 not yet calculated CVE-2020-8752
CONFIRM
MISC intel — amt_and_ism
  Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-8753
CONFIRM
MISC intel — amt_sdk
  Incorrect default permissions in Windows(R) installer in Intel(R) AMT SDK versions before 14.0.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12354
CONFIRM
MISC intel — batter_life_diagnostic_tool Improper permissions in the installer for the Intel(R) Battery Life Diagnostic Tool before version 1.0.7 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12346
MISC intel — board_id_tool
  Incorrect default permissions in the Intel(R) Board ID Tool version v.1.01 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-24456
MISC intel — client_ssds_and_data_center_ssds
  Insufficient control flow managementin firmware in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-12310
MISC intel — client_ssds_and_data_center_ssds
  Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-12309
MISC intel — client_ssds_and_data_center_ssds
  Insufficient control flow managementin firmware in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-12311
MISC intel — computing_improvement_program
  Improper access control for the Intel(R) Computing Improvement Program before version 2.4.5982 may allow an unprivileged user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-12308
MISC intel — cs12_host_controller
  Out of bounds read in the Intel CSI2 Host Controller driver may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-0573
MISC intel — csme
  Insecure default initialization of resource in Intel(R) Boot Guard in Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 3.1.80 and 4.0.30, Intel(R) SPS versions before E5_04.01.04.400, E3_04.01.04.200, SoC-X_04.00.04.200 and SoC-A_04.00.04.300 may allow an unauthenticated user to potentially enable escalation of privileges via physical access. 2020-11-12 not yet calculated CVE-2020-8705
CONFIRM
CONFIRM
CONFIRM
MISC intel — csme
  Inadequate encryption strength in subsystem for Intel(R) CSME versions before 13.0.40 and 13.30.10 may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-8761
CONFIRM
MISC intel — csme
  Improper input validation in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8756
CONFIRM
MISC intel — csme_and_sps
  Race condition in subsystem for Intel(R) CSME versions before 12.0.70 and 14.0.45, Intel(R) SPS versions before E5_04.01.04.400 and E3_05.01.04.200 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2020-11-12 not yet calculated CVE-2020-8755
CONFIRM
CONFIRM
MISC intel — csme_and_txe Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, Intel(R) TXE versions before 3.1.80 may allow an unauthenticated user to potentially enable information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-8751
CONFIRM
CONFIRM
MISC intel — csme_and_txe Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2020-11-12 not yet calculated CVE-2020-8745
CONFIRM
CONFIRM
MISC intel — csme_and_txe
  Improper initialization in subsystem for Intel(R) CSME versions before12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE versions before 4.0.30 Intel(R) SPS versions before E3_05.01.04.200 may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8744
CONFIRM
CONFIRM
CONFIRM
MISC intel — csme_driver
  Improper access control in Installer for Intel(R) CSME Driver for Windows versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access. 2020-11-12 not yet calculated CVE-2020-12297
CONFIRM
CONFIRM
MISC intel — csme_driver_and_txe
  Use after free in DAL subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25, Intel(R) TXE 3.1.80, 4.0.30 may allow an authenticated user to potentially enable escalation of privileges via local access. 2020-11-12 not yet calculated CVE-2020-12303
CONFIRM
CONFIRM
MISC intel — dal_sdk
  Improper access control in Installer for Intel(R) DAL SDK before version 2.1 for Windows may allow an authenticated user to potentially enable escalation of privileges via local access. 2020-11-12 not yet calculated CVE-2020-12304
MISC intel — data_center_manager_console
  Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-12349
MISC intel — data_center_manager_console
  Improper permissions in the installer for the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12345
MISC intel — data_center_manager_console
  Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable escalation of privilege via network access. 2020-11-12 not yet calculated CVE-2020-12347
MISC intel — data_center_manager_console
  Improper permissions in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable denial of service via network access. 2020-11-12 not yet calculated CVE-2020-12353
MISC intel — data_center_manager_console
  Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-8669
MISC intel — dsa
  Incorrect default permissions in the Intel(R) DSA before version 20.8.30.6 may allow an authenticated user to potentially enable denial of service via local access. 2020-11-12 not yet calculated CVE-2020-24460
MISC intel — ema Insufficiently protected credentials in the Intel(R) EMA before version 1.3.3 may allow an authorized user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12316
MISC intel — ema
  Path traversal in the Intel(R) EMA before version 1.3.3 may allow an unauthenticated user to potentially enable escalation of privilege via network access. 2020-11-12 not yet calculated CVE-2020-12315
MISC intel — ethernet_700_series_controllers
  A logic issue in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8691
MISC intel — ethernet_700_series_controllers
  Protection mechanism failure in Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8690
MISC intel — ethernet_700_series_controllers
  Insufficient access control in the firmware of the Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8692
MISC intel — ethernet_700_series_controllers
  Improper buffer restrictions in the firmware of the Intel(R) Ethernet 700 Series Controllers may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8693
MISC intel — falcon_8+_uas_asctec_thermal_viewer
  Improper permissions in the installer for the Intel(R) Falcon 8+ UAS AscTec Thermal Viewer, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12330
MISC intel — hid_event_filter_driver
  Improper permissions in the installer for the Intel(R) HID Event Filter Driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12332
MISC intel — high_definition_audio_drivers
  Improper permissions in some Intel(R) High Definition Audio drivers before version 9.21.00.4561 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12307
MISC intel — media_sdk
  Improper file permissions in the installer for the Intel(R) Media SDK for Windows before version 2019 R1 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2019-11121
MISC intel — multiple_processors
  Improper access control in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8764
MISC intel — multiple_products Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-8754
CONFIRM
MISC intel — multiple_products
  Buffer overflow in firmware for Intel(R) SSD DC P4800X and P4801X Series, Intel(R) Optane(TM) SSD 900P and 905P Series may allow an unauthenticated user to potentially enable a denial of service via local access. 2020-11-12 not yet calculated CVE-2020-0584
MISC intel — nuc
  Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12337
MISC intel — nuc
  Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12336
MISC intel — nuc
  Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-24525
FULLDISC
MISC intel — open_webrtc
  Insufficient control flow management in the Open WebRTC Toolkit before version 4.3.1 may allow an unauthenticated user to potentially enable escalation of privilege via network access. 2020-11-13 not yet calculated CVE-2020-12338
MISC intel — processor_identification_utility
  Improper permissions in the installer for the Intel(R) Processor Identification Utility before version 6.4.0603 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12335
MISC intel — processors
  Improper input validation in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0590
CONFIRM
MISC intel — processors
  Out of bounds write in Intel BIOS platform sample code for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8740
MISC intel — processors
  Out of bounds write in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access. 2020-11-12 not yet calculated CVE-2020-0592
CONFIRM
MISC intel — processors
  Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0591
CONFIRM
MISC intel — processors
  Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0588
CONFIRM
MISC intel — processors
  Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-8695
MISC intel — processors
  Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0587
CONFIRM
MISC intel — processors
  Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-8694
MISC intel — processors
  Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-13 not yet calculated CVE-2020-0599
MISC intel — processors
  Improper buffer restrictions in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0593
CONFIRM
MISC intel — processors
  Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-8696
CONFIRM
MISC intel — processors
  Use of potentially dangerous function in Intel BIOS platform sample code for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8739
MISC intel — processors
  Improper conditions check in Intel BIOS platform sample code for some Intel(R) Processors before may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8738
MISC intel — processors
  Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-8698
CONFIRM
MISC intel — proset/wireless_wifi_products Improper buffer restriction in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-12317
MISC intel — proset/wireless_wifi_products Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-12319
MISC intel — proset/wireless_wifi_products
  Improper input validation in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-12314
MISC intel — proset/wireless_wifi_products
  Insufficient control flow management in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. 2020-11-13 not yet calculated CVE-2020-12313
MISC intel — proset/wireless_wifi_products
  Protection mechanism failure in some Intel(R) PROSet/Wireless WiFi products before version 21.110 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12318
MISC intel — qat
  Insufficiently protected credentials in the Intel(R) QAT for Linux before version 1.7.l.4.10.0 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12333
MISC intel — quartus_prime
  Uncaught exception in the Intel(R) 50GbE IP Core for Intel(R) Quartus Prime before version 20.2 may allow an authenticated user to potentially enable denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8767
MISC intel — quartus_prime_pro_edition
  Improper Restriction of XML External Entity Reference in subsystem forIntel(R) Quartus(R) Prime Pro Edition before version 20.3 and Intel(R) Quartus(R) Prime Standard Edition before version 20.2 may allow unauthenticated user to potentially enable information disclosure via network access. 2020-11-12 not yet calculated CVE-2020-24454
MISC intel — realsense_d400_series_dynamic_calibration_tool
  Incorrect default permissions in the Intel(R) RealSense(TM) D400 Series Dynamic Calibration Tool before version 2.11, may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12306
MISC intel — scs_add-on_for_microsoft_sccm
  Uncontrolled search path in Intel(R) SCS Add-on for Microsoft* SCCM before version 2.1.10 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12320
MISC intel — server_board_2600st_and_s2600wf
  Improper input validation in the firmware for Intel(R) Server Board S2600ST and S2600WF families may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-0572
MISC intel — sgx_dcap
  Improper conditions check in the Intel(R) SGX DCAP software before version 1.6 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-8766
MISC intel — stratix_10_fpga_firmware
  Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.2 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2020-11-12 not yet calculated CVE-2020-12312
MISC intel — stratix_10_fpga_firmware
  Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.1 may allow an unauthenticated user to potentially enable escalation of privilege and/or information disclosure via physical access. 2020-11-12 not yet calculated CVE-2020-8737
MISC intel — thunderbolt_dch_drivers Insecure default variable initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12327
MISC intel — thunderbolt_dch_drivers
  Improper buffer restrictions in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12325
MISC intel — thunderbolt_dch_drivers
  Improper initialization in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12326
MISC intel — thunderbolt_dch_drivers
  Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow a privileged user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-12328
MISC intel — thunderbolt_dch_drivers
  Protection mechanism failure in some Intel(R) Thunderbolt(TM) DCH drivers for Windows* before version 72 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12324
MISC intel — txe
  Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. 2020-11-12 not yet calculated CVE-2020-12355
CONFIRM
MISC intel — txe
  Use after free in Kernel Mode Driver for Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8750
CONFIRM
MISC intel — unite_client
  Improper buffer restrictions in the Intel(R) Unite Client for Windows* before version 4.2.13064 may allow an authenticated user to potentially enable information disclosure via local access. 2020-11-12 not yet calculated CVE-2020-0575
MISC intel — unite_cloud_service_client
  Improper access controls in Intel Unite(R) Cloud Service client before version 4.2.12212 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12331
MISC intel — visual_compute_accelerator
  Improper access control in the Intel(R) Visual Compute Accelerator 2, all versions, may allow a privileged user to potentially enable denial of service via local access. 2020-11-12 not yet calculated CVE-2020-8677
MISC intel — visual_compute_accelerator
  Improper access control in the Intel(R) Visual Compute Accelerator 2, all versions, may allow a privileged user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-8676
MISC intel — vtune_profiler
  Uncontrolled search path in the Intel(R) VTune(TM) Profiler before version 2020 Update 1 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12329
MISC intel — wireless_bluetooth_products
  Improper input validation in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable denial of service via adjacent access. 2020-11-12 not yet calculated CVE-2020-12322
MISC intel — wireless_bluetooth_products
  Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. 2020-11-12 not yet calculated CVE-2020-12321
MISC intel — xtu
  Improper access control in the Intel(R) XTU before version 6.5.1.360 may allow an authenticated user to potentially enable escalation of privilege via local access. 2020-11-12 not yet calculated CVE-2020-12350
MISC intelliants — subrion_cms Subrion CMS 4.2.1 has CSRF in panel/modules/plugins/. The attacker can remotely activate/deactivate the plugins. 2020-11-10 not yet calculated CVE-2019-7357
MISC
MISC ivanti — endpoint_manager An unrestricted file-upload issue in EditLaunchPadDialog.aspx in Ivanti Endpoint Manager 2019.1 and 2020.1 allows an authenticated attacker to gain remote code execution by uploading a malicious aspx file. The issue is caused by insufficient file extension validation and insecure file operations on the uploaded image, which upon failure will leave the temporarily created files in an accessible location on the server. 2020-11-12 not yet calculated CVE-2020-13774
MISC ivanti — endpoint_manager
  Several services are accessing named pipes in Ivanti Endpoint Manager through 2020.1.1 with default or overly permissive security attributes; as these services run as user ‘NT AUTHORITYSYSTEM’, the issue can be used to escalate privileges from a local standard or service account having SeImpersonatePrivilege (eg. user ‘NT AUTHORITYNETWORK SERVICE’). 2020-11-12 not yet calculated CVE-2020-13770
MISC ivanti — endpoint_manager
  Various components in Ivanti Endpoint Manager through 2020.1.1 rely on Windows search order when loading a (nonexistent) library file, allowing (under certain conditions) one to gain code execution (and elevation of privileges to the level of privilege held by the vulnerable component such as NT AUTHORITYSYSTEM) via DLL hijacking. This affects ldiscn32.exe, IpmiRedirectionService.exe, LDAPWhoAmI.exe, and ldprofile.exe. 2020-11-12 not yet calculated CVE-2020-13771
MISC json-ptr — json-ptr
  This affects all versions of package json-ptr. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution. 2020-11-10 not yet calculated CVE-2020-7766
MISC
MISC
MISC json8 — json8
  This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution. 2020-11-12 not yet calculated CVE-2020-7770
MISC
MISC json8-merge_patch — json8-merge_patch Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor. 2020-11-09 not yet calculated CVE-2020-8268
MISC lenovo — desktop
  Prior to August 10, 2020, some Lenovo Desktop and Workstation systems were shipped with the Embedded Host Based Configuration (EHBC) feature of Intel AMT enabled. This could allow an administrative user with local access to configure Intel AMT. 2020-11-11 not yet calculated CVE-2020-8353
MISC lenovo — desktop
  In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes. 2020-11-11 not yet calculated CVE-2020-8352
MISC lenovo — multiple_notebooks
  A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution. 2020-11-11 not yet calculated CVE-2020-8354
MISC lettre_library — lettre_library
  The lettre library through 0.10.0-alpha for Rust allows arbitrary sendmail option injection via transport/sendmail/mod.rs. 2020-11-12 not yet calculated CVE-2020-28247
MISC
MISC lg — multiple_mobile_devices An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9.0, and 10 software. System services may crash because of the lack of a NULL parameter check. The LG ID is LVE-SMP-200024 (November 2020). 2020-11-08 not yet calculated CVE-2020-28344
MISC lg — multiple_mobile_devices
  An issue was discovered on LG mobile devices with Android OS 10 software. The Wi-Fi subsystem may crash because of the lack of a NULL parameter check. The LG ID is LVE-SMP-200025 (November 2020). 2020-11-08 not yet calculated CVE-2020-28345
MISC libmaxminddb — libmaxminddb
  libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c. 2020-11-06 not yet calculated CVE-2020-28241
MISC
MISC
MISC
MLIST
GENTOO locust — locust
  A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3.2, if the installation violates the usage expectations by exposing this UI to outside users. 2020-11-09 not yet calculated CVE-2020-28364
MISC managedclusterview_api — managedclusterview_api An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions. Views created for an admin user would be made available for a short time to users with only view permission. In this short time window the user with view permission could read cluster secrets that should only be disclosed to admin users. 2020-11-09 not yet calculated CVE-2020-25655
CONFIRM mcafee — endpoint_security Unquoted service executable path in McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files. 2020-11-12 not yet calculated CVE-2020-7331
CONFIRM mcafee — endpoint_security
  Cross site scripting vulnerability in the firewall ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows administrators to inject arbitrary web script or HTML via the configuration wizard. 2020-11-12 not yet calculated CVE-2020-7333
CONFIRM mcafee — endpoint_security
  Cross Site Request Forgery vulnerability in the firewall ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows an attacker to execute arbitrary HTML code due to incorrect security configuration. 2020-11-12 not yet calculated CVE-2020-7332
CONFIRM mcafee — mvision_endpoint
  Server-side request forgery vulnerability in the ePO extension in McAfee MVISION Endpoint prior to 20.11 allows remote attackers trigger server-side DNS requests to arbitrary domains via carefully constructed XML files loaded by an ePO administrator. 2020-11-11 not yet calculated CVE-2020-7329
CONFIRM mcafee — mvision_endpoint
  External entity attack vulnerability in the ePO extension in McAfee MVISION Endpoint prior to 20.11 allows remote attackers to gain control of a resource or trigger arbitrary code execution via improper input validation of an HTTP request, where the content for the attack has been loaded into ePO by an ePO administrator. 2020-11-11 not yet calculated CVE-2020-7328
CONFIRM mersive — solstice-pod
  Solstice-Pod up to 5.0.2 WEBRTC server mishandles the format-string specifiers %x; %p; %c and %s in the screen_key, display_name, browser_name, and operation_system parameter during the authentication process. This may crash the server and force Solstice-Pod to reboot, which leads to a denial of service. 2020-11-11 not yet calculated CVE-2020-27523
MISC
MISC
MISC
MISC microsoft — av1_video_extension
  AV1 Video Extension Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17105
MISC microsoft — azure_sphere Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16985. 2020-11-11 not yet calculated CVE-2020-16990
MISC
MISC microsoft — azure_sphere Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16989, CVE-2020-16992, CVE-2020-16993. 2020-11-11 not yet calculated CVE-2020-16988
MISC microsoft — azure_sphere Azure Sphere Denial of Service Vulnerability 2020-11-11 not yet calculated CVE-2020-16986
MISC
MISC microsoft — azure_sphere
  Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16988, CVE-2020-16989, CVE-2020-16992. 2020-11-11 not yet calculated CVE-2020-16993
MISC
MISC microsoft — azure_sphere
  Azure Sphere Tampering Vulnerability 2020-11-11 not yet calculated CVE-2020-16983
MISC microsoft — azure_sphere
  Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16987, CVE-2020-16991, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16984
MISC
MISC microsoft — azure_sphere
  Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16990. 2020-11-11 not yet calculated CVE-2020-16985
MISC
MISC microsoft — azure_sphere
  Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16984, CVE-2020-16991, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16987
MISC
MISC microsoft — azure_sphere
  Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16984, CVE-2020-16987, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16991
MISC
MISC microsoft — azure_sphere
  Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16988, CVE-2020-16989, CVE-2020-16993. 2020-11-11 not yet calculated CVE-2020-16992
MISC
MISC microsoft — azure_sphere
  Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16982, CVE-2020-16984, CVE-2020-16987, CVE-2020-16991. 2020-11-11 not yet calculated CVE-2020-16994
MISC
MISC microsoft — azure_sphere
  Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16988, CVE-2020-16989, CVE-2020-16992, CVE-2020-16993. 2020-11-11 not yet calculated CVE-2020-16981
MISC microsoft — azure_sphere
  Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16982, CVE-2020-16984, CVE-2020-16987, CVE-2020-16991, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16970
MISC
MISC microsoft — azure_sphere
  Azure Sphere Unsigned Code Execution Vulnerability This CVE ID is unique from CVE-2020-16970, CVE-2020-16984, CVE-2020-16987, CVE-2020-16991, CVE-2020-16994. 2020-11-11 not yet calculated CVE-2020-16982
MISC
MISC
MISC microsoft — azure_sphere
  Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16988, CVE-2020-16992, CVE-2020-16993. 2020-11-11 not yet calculated CVE-2020-16989
MISC microsoft — defender
  Microsoft Defender for Endpoint Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17090
MISC microsoft — dynamics_365 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17006, CVE-2020-17021. 2020-11-11 not yet calculated CVE-2020-17018
MISC microsoft — dynamics_365 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17018, CVE-2020-17021. 2020-11-11 not yet calculated CVE-2020-17006
MISC microsoft — dynamics_365
  Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17005, CVE-2020-17006, CVE-2020-17018. 2020-11-11 not yet calculated CVE-2020-17021
MISC microsoft — dynamics_365
  Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability This CVE ID is unique from CVE-2020-17006, CVE-2020-17018, CVE-2020-17021. 2020-11-11 not yet calculated CVE-2020-17005
MISC microsoft — edge
  Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048. 2020-11-11 not yet calculated CVE-2020-17054
MISC microsoft — edge
  Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054. 2020-11-11 not yet calculated CVE-2020-17048
MISC microsoft — edge_and_internet_explorer
  Scripting Engine Memory Corruption Vulnerability 2020-11-11 not yet calculated CVE-2020-17052
MISC microsoft — excel
  Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17019, CVE-2020-17064, CVE-2020-17066. 2020-11-11 not yet calculated CVE-2020-17065
MISC microsoft — excel
  Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17019, CVE-2020-17065, CVE-2020-17066. 2020-11-11 not yet calculated CVE-2020-17064
MISC microsoft — excel
  Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17064, CVE-2020-17065, CVE-2020-17066. 2020-11-11 not yet calculated CVE-2020-17019
MISC microsoft — excel
  Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17019, CVE-2020-17064, CVE-2020-17065. 2020-11-11 not yet calculated CVE-2020-17066
MISC microsoft — excel
  Microsoft Excel Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17067
MISC microsoft — exchange_server Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17083. 2020-11-11 not yet calculated CVE-2020-17084
MISC microsoft — exchange_server
  Microsoft Exchange Server Denial of Service Vulnerability 2020-11-11 not yet calculated CVE-2020-17085
MISC microsoft — exchange_server
  Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17084. 2020-11-11 not yet calculated CVE-2020-17083
MISC microsoft — heif_image_extension
  HEIF Image Extensions Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17101
MISC microsoft — hevc_video_extension HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17107, CVE-2020-17109, CVE-2020-17110. 2020-11-11 not yet calculated CVE-2020-17108
MISC microsoft — hevc_video_extension
  HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17108, CVE-2020-17109, CVE-2020-17110. 2020-11-11 not yet calculated CVE-2020-17107
MISC microsoft — hevc_video_extension
  HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17107, CVE-2020-17108, CVE-2020-17109. 2020-11-11 not yet calculated CVE-2020-17110
MISC microsoft — hevc_video_extension
  HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17106, CVE-2020-17107, CVE-2020-17108, CVE-2020-17110. 2020-11-11 not yet calculated CVE-2020-17109
MISC microsoft — hevc_video_extension
  HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17107, CVE-2020-17108, CVE-2020-17109, CVE-2020-17110. 2020-11-11 not yet calculated CVE-2020-17106
MISC microsoft — internet_explorer
  Internet Explorer Memory Corruption Vulnerability 2020-11-11 not yet calculated CVE-2020-17053
MISC microsoft — office
  Microsoft Office Online Spoofing Vulnerability 2020-11-11 not yet calculated CVE-2020-17063
MISC microsoft — office
  Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17062
MISC microsoft — raw_image_extension Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17078, CVE-2020-17079, CVE-2020-17086. 2020-11-11 not yet calculated CVE-2020-17082
MISC microsoft — raw_image_extension
  Microsoft Raw Image Extension Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17081
MISC microsoft — raw_image_extension
  Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17078, CVE-2020-17082, CVE-2020-17086. 2020-11-11 not yet calculated CVE-2020-17079
MISC microsoft — raw_image_extension
  Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17078, CVE-2020-17079, CVE-2020-17082. 2020-11-11 not yet calculated CVE-2020-17086
MISC microsoft — raw_image_extension
  Raw Image Extension Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17079, CVE-2020-17082, CVE-2020-17086. 2020-11-11 not yet calculated CVE-2020-17078
MISC microsoft — sharepoint
  Microsoft SharePoint Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16979. 2020-11-11 not yet calculated CVE-2020-17017
MISC microsoft — sharepoint
  Microsoft SharePoint Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17061
MISC microsoft — sharepoint
  Microsoft SharePoint Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-17017. 2020-11-11 not yet calculated CVE-2020-16979
MISC microsoft — sharepoint
  Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2020-17016, CVE-2020-17060. 2020-11-11 not yet calculated CVE-2020-17015
MISC microsoft — sharepoint
  Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2020-17015, CVE-2020-17016. 2020-11-11 not yet calculated CVE-2020-17060
MISC microsoft — sharepoint
  Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2020-17015, CVE-2020-17060. 2020-11-11 not yet calculated CVE-2020-17016
MISC microsoft — teams
  Microsoft Teams Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17091
MISC microsoft — visual_studio
  Visual Studio Tampering Vulnerability 2020-11-11 not yet calculated CVE-2020-17100
MISC microsoft — visual_studio_code
  Visual Studio Code JSHint Extension Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17104
MISC microsoft — webp_image_extension
  WebP Image Extensions Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17102
MISC microsoft — windows
  Windows Spoofing Vulnerability 2020-11-11 not yet calculated CVE-2020-1599
MISC microsoft — windows_10 Windows Port Class Library Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17011
MISC microsoft — windows_10 Windows GDI+ Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17068
MISC microsoft — windows_10 Windows Bind Filter Driver Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17012
MISC microsoft — windows_10 Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17038. 2020-11-11 not yet calculated CVE-2020-17010
MISC microsoft — windows_10 Windows Win32k Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17057
MISC microsoft — windows_10 Windows Graphics Component Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17004
MISC microsoft — windows_10 Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001. 2020-11-11 not yet calculated CVE-2020-17014
MISC microsoft — windows_10 Windows NDIS Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17069
MISC microsoft — windows_10 Windows Canonical Display Driver Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17029
MISC microsoft — windows_10 Windows Delivery Optimization Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17071
MISC microsoft — windows_10 Windows Update Orchestrator Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17074, CVE-2020-17076. 2020-11-11 not yet calculated CVE-2020-17073
MISC microsoft — windows_10 Windows MSCTF Server Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17030
MISC microsoft — windows_10
  Windows Print Configuration Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17041
MISC microsoft — windows_10
  Windows WalletService Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17037
MISC microsoft — windows_10
  Windows WalletService Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-16999
MISC microsoft — windows_10
  Win32k Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17013
MISC microsoft — windows_10
  Windows Hyper-V Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17040
MISC microsoft — windows_10
  Windows Function Discovery SSDP Provider Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17036
MISC microsoft — windows_10
  Incorrect file permissions in BlueStacks 4 through 4.230 on Windows allow a local attacker to escalate privileges by modifying a file that is later executed by a higher-privileged user. 2020-11-10 not yet calculated CVE-2020-24367
CONFIRM microsoft — windows_10
  Windows Client Side Rendering Print Provider Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17024
MISC microsoft — windows_10
  Windows Kernel Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17035
MISC microsoft — windows_10
  Windows Network File System Denial of Service Vulnerability 2020-11-11 not yet calculated CVE-2020-17047
MISC microsoft — windows_10
  Windows Update Orchestrator Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17073, CVE-2020-17074. 2020-11-11 not yet calculated CVE-2020-17076
MISC microsoft — windows_10
  Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17010. 2020-11-11 not yet calculated CVE-2020-17038
MISC microsoft — windows_10
  Windows Camera Codec Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17113
MISC
MISC microsoft — windows_10
  Windows Error Reporting Denial of Service Vulnerability 2020-11-11 not yet calculated CVE-2020-17046
MISC microsoft — windows_10
  Remote Desktop Protocol Server Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-16997
MISC microsoft — windows_10
  Windows Error Reporting Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17007
MISC microsoft — windows_10
  Microsoft Browser Memory Corruption Vulnerability 2020-11-11 not yet calculated CVE-2020-17058
MISC microsoft — windows_10
  Windows USO Core Worker Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17075
MISC microsoft — windows_10
  Windows Update Medic Service Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17070
MISC microsoft — windows_10
  Windows Network File System Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17051
MISC microsoft — windows_10
  Windows Common Log File System Driver Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17088
MISC microsoft — windows_10
  Windows Kernel Local Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17087
MISC microsoft — windows_10
  Windows Print Spooler Remote Code Execution Vulnerability 2020-11-11 not yet calculated CVE-2020-17042
MISC microsoft — windows_10
  Windows Update Stack Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-17077
MISC microsoft — windows_10
  Windows Network File System Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17056
MISC microsoft — windows_10
  Windows Update Orchestrator Service Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17073, CVE-2020-17076. 2020-11-11 not yet calculated CVE-2020-17074
MISC microsoft — windows_10
  Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014. 2020-11-11 not yet calculated CVE-2020-17001
MISC microsoft — windows_10
  Windows KernelStream Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17045
MISC microsoft — windows_10
  DirectX Elevation of Privilege Vulnerability 2020-11-11 not yet calculated CVE-2020-16998
MISC microsoft — windows_10
  Remote Desktop Protocol Client Information Disclosure Vulnerability 2020-11-11 not yet calculated CVE-2020-17000
MISC microsoft — windows_server
  Kerberos Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17049
MISC microsoft — word
  Microsoft Word Security Feature Bypass Vulnerability 2020-11-11 not yet calculated CVE-2020-17020
MISC microweber — microweber
  Microweber v1.1.18 is affected by no session expiry after log-out. 2020-11-09 not yet calculated CVE-2020-23136
MISC
MISC microweber — microweber
  Microweber 1.1.18 is affected by broken authentication and session management. Local session hijacking may occur, which could result in unauthorized access to system data or functionality, or a complete system compromise. 2020-11-09 not yet calculated CVE-2020-23139
MISC microweber — microweber
  An unrestricted file upload vulnerability was discovered in the Microweber 1.1.18 admin account page. An attacker can upload PHP code or any extension (eg- .exe) to the web server by providing image data and the image/jpeg content type with a .php extension. 2020-11-09 not yet calculated CVE-2020-23138
MISC
MISC microweber — microweber
  Microweber 1.1.18 is affected by insufficient session expiration. When changing passwords, both sessions for when a user changes email and old sessions in any other browser or device, the session does not expire and remains active. 2020-11-09 not yet calculated CVE-2020-23140
MISC mit — kerberos_5
  MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit. 2020-11-06 not yet calculated CVE-2020-28196
CONFIRM
MLIST
FEDORA
FEDORA
GENTOO mitel — shoretel_19.46.1802.0_devices
  The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page. 2020-11-09 not yet calculated CVE-2020-28351
MISC
MISC
MISC mitsubishi_electric — gt14_model_of_got1000_series
  Resource management error vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5649
MISC
MISC
MISC
MISC mitsubishi_electric — gt14_model_of_got1000_series
  Improper neutralization of argument delimiters in a command (‘Argument Injection’) vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows unauthenticated attackers on adjacent network to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5648
MISC
MISC
MISC
MISC mitsubishi_electric — gt14_model_of_got1000_series
  Session fixation vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5645
MISC
MISC
MISC
MISC mitsubishi_electric — gt14_model_of_got1000_series
  Buffer overflow vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5644
MISC
MISC
MISC
MISC mitsubishi_electric — gt14_model_of_got1000_series
  NULL pointer dereferences vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QMBDE CoreOS version “05.65.00.BD” and earlier, GT1450-QLBDE CoreOS version “05.65.00.BD” and earlier, GT1455HS-QTBDE CoreOS version “05.65.00.BD” and earlier, and GT1450HS-QMBDE CoreOS version “05.65.00.BD” and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. 2020-11-06 not yet calculated CVE-2020-5646
MISC
MISC
MISC
MISC moinmoin — moinmoin
  MoinMoin is a wiki engine. In MoinMoin before version 1.9.11, an attacker with write permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user’s browser when the user is viewing that SVG file on the wiki. Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. 2020-11-11 not yet calculated CVE-2020-15275
MISC
MISC
CONFIRM moinmoin — moinmoin
  The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution. 2020-11-10 not yet calculated CVE-2020-25074
MISC
MISC
MLIST
DEBIAN nagios — nagios_xi
  Improper preservation of permissions in Nagios XI 5.7.4 allows a local, low-privileged, authenticated user to weaken the permissions of files, resulting in low-privileged users being able to write to and execute arbitrary PHP code with root privileges. 2020-11-13 not yet calculated CVE-2020-5796
MISC netapp — element_software_and_hci
  Element Software versions prior to 12.2 and HCI versions prior to 1.8P1 are susceptible to a vulnerability which could allow an authenticated user to view sensitive information. 2020-11-13 not yet calculated CVE-2020-8582
MISC netapp — element_software_and_hci
  Element Software versions prior to 12.2 and HCI versions prior to 1.8P1 are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session. 2020-11-13 not yet calculated CVE-2020-8583
MISC netflix — dispatch
  The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user. 2020-11-09 not yet calculated CVE-2020-9300
MISC
MISC netflix — dispatch
  There were XSS vulnerabilities discovered and reported in the Dispatch application, affecting name and description parameters of Incident Priority, Incident Type, Tag Type, and Incident Filter. This vulnerability can be exploited by an authenticated user. 2020-11-09 not yet calculated CVE-2020-9299
MISC
MISC netgear — multiple_devices
  upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitrary code via a stack-based buffer overflow. This affects R6400v2 V1.0.4.102_10.0.75, R6400 V1.0.1.62_1.0.41, R7000P V1.3.2.126_10.1.66, XR300 V1.0.3.50_10.3.36, R8000 V1.0.4.62, R8300 V1.0.2.136, R8500 V1.0.2.136, R7300DST V1.0.0.74, R7850 V1.0.5.64, R7900 V1.0.4.30, RAX20 V1.0.2.64, RAX80 V1.0.3.102, and R6250 V1.0.4.44. 2020-11-09 not yet calculated CVE-2020-28373
MISC nexcom — nio_50
  The affected product does not properly validate input, which may allow an attacker to execute a denial-of-service attack on the NIO 50 (all versions). 2020-11-13 not yet calculated CVE-2020-25151
MISC nexcom — nio_50
  The affected product transmits unencrypted sensitive information, which may allow an attacker to access this information on the NIO 50 (all versions). 2020-11-13 not yet calculated CVE-2020-25155
MISC nextcloud — nextcloud_server
  A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files. 2020-11-09 not yet calculated CVE-2020-8150
MISC
MISC nextcloud — nextcloud_server
  A wrong generation of the passphrase for the encrypted block in Nextcloud Server 19.0.1 allowed an attacker to overwrite blocks in a file. 2020-11-09 not yet calculated CVE-2020-8133
MISC
MISC nodemailer — nodemailer
  This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails. 2020-11-12 not yet calculated CVE-2020-7769
MISC
MISC
MISC
MISC nvidia — geforce_now
  NVIDIA GeForce NOW application software on Windows, all versions prior to 2.0.25.119, contains a vulnerability in its open-source software dependency in which the OpenSSL library is vulnerable to binary planting attacks by a local user, which may lead to code execution or escalation of privileges. 2020-11-11 not yet calculated CVE-2020-5992
CONFIRM object-hierarchy-access — object-hierarchy-access
  Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution. 2020-11-12 not yet calculated CVE-2020-28270
MISC
MISC one_identity_password_manager — one_identity_password_manager
  An issue was discovered in One Identity Password Manager 5.8. An attacker could enumerate valid answers for a user. It is possible for an attacker to detect a valid answer based on the HTTP response content, and reuse this answer later for a password reset on a chosen password. The enumeration is possible because, within the HTTP response content, WRONG ID is only returned when the answer is incorrect. 2020-11-13 not yet calculated CVE-2020-7962
MISC opera — opera_touch_for_ios
  Opera Touch for iOS before version 2.4.5 is vulnerable to an address bar spoofing attack. The vulnerability allows a malicious page to trick the browser into showing an address of a different page. This may allow the malicious page to impersonate another page and trick a user into providing sensitive data. 2020-11-13 not yet calculated CVE-2020-6157
MISC packagekit — packagekit
  PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own. 2020-11-07 not yet calculated CVE-2020-16121
CONFIRM
MISC packagekit — packagekit
  PackageKit’s apt backend mistakenly treated all local debs as trusted. The apt security model is based on repository trust and not on the contents of individual files. On sites with configured PolicyKit rules this may allow users to install malicious packages. 2020-11-07 not yet calculated CVE-2020-16122
CONFIRM palo_alto_network — pan-os An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo Alto Networks PAN-OS software. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.2. 2020-11-12 not yet calculated CVE-2020-2048
CONFIRM palo_alto_network — pan-os
  An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.4; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. 2020-11-12 not yet calculated CVE-2020-2000
CONFIRM palo_alto_network — pan-os
  An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication. Impacted features that use SSL VPN with client certificate verification are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN In configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. 2020-11-12 not yet calculated CVE-2020-2050
CONFIRM palo_alto_network — pan-os
  A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an attacker to communicate with devices in the network in a way that is not analyzed for threats by sending data through specifically crafted TCP packets. This technique evades signature-based threat detection. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.17; PAN-OS 9.0 versions earlier than 9.0.11; PAN-OS 9.1 versions earlier than 9.1.5; All versions of PAN-OS 7.1 and PAN-OS 8.0. 2020-11-12 not yet calculated CVE-2020-1999
CONFIRM palo_alto_network — pan-os
  An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator’s session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerability allows an attacker to gain privileged access to the Panorama web interface. An attacker requires some knowledge of managed firewalls to exploit this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5. 2020-11-12 not yet calculated CVE-2020-2022
CONFIRM passmark — mulitple_products
  An issue was discovered in PassMark BurnInTest v9.1 Build 1008, OSForensics v7.1 Build 1012, and PerformanceTest v10.0 Build 1008. The kernel driver exposes IOCTL functionality that allows low-privilege users to map arbitrary physical memory into the address space of the calling process. This could lead to arbitrary Ring-0 code execution and escalation of privileges. This affects DirectIo32.sys and DirectIo64.sys drivers. This issue is fixed in BurnInTest v9.2, PerformanceTest v10.0 Build 1009, OSForensics v8.0. 2020-11-13 not yet calculated CVE-2020-15481
MISC
MISC percona — percona_server
  An issue was discovered in the MongoDB Simple LDAP plugin through 2020-10-02 for Percona Server when using the SimpleLDAP authentication in conjunction with Microsoft’s Active Directory, Percona has discovered a flaw that would allow authentication to complete when passing a blank value for the account password, leading to access against the service integrated with which Active Directory is deployed at the level granted to the authenticating account. 2020-11-09 not yet calculated CVE-2020-26542
MISC
MISC
CONFIRM
CONFIRM pixar — openusd
  A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 while parsing compressed value rep arrays in binary USD files. A specially crafted malformed file can trigger a heap overflow, which can result in remote code execution. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. 2020-11-13 not yet calculated CVE-2020-6155
MISC pixar — openusd
  A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. This instance exists in the USDC file format FIELDS section decompression heap overflow. 2020-11-13 not yet calculated CVE-2020-6147
FULLDISC
MISC pixar — openusd
  A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance in USDC file format PATHS section. 2020-11-13 not yet calculated CVE-2020-6149
MISC pixar — openusd
  A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file in an instance USDC file format path element token index. 2020-11-13 not yet calculated CVE-2020-6156
MISC pixar — openusd
  A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. An instance exists in USDC file format FIELDSETS section decompression heap overflow. 2020-11-13 not yet calculated CVE-2020-6148
MISC pixar — openusd
  A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software USDC file format SPECS section decompression heap overflow. 2020-11-13 not yet calculated CVE-2020-6150
MISC python-rsa — python-rsa
  It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA. 2020-11-12 not yet calculated CVE-2020-25658
CONFIRM
MISC qualcomm — multiple_snapdragon_products u’Arbitrary access to DSP memory due to improper check in loaded library for data received from CPU side’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA845, SDM640, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P 2020-11-12 not yet calculated CVE-2020-11201
CONFIRM qualcomm — multiple_snapdragon_products u’Buffer over read can happen while parsing mkv clip due to improper typecasting of data returned from atomsize’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM9206, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA429W, SDA640, SDA660, SDA670, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11193
CONFIRM qualcomm — multiple_snapdragon_products u’Out of Bound issue in DSP services while processing received arguments due to improper validation of length received as an argument’ in SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439 2020-11-12 not yet calculated CVE-2020-11208
CONFIRM qualcomm — multiple_snapdragon_products u’Possible buffer overflow in WMA message processing due to integer overflow occurs when processing command received from user space’ in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8009, APQ8053, APQ8096AU, MDM9206, MDM9250, MDM9628, MDM9640, MDM9650, MSM8996AU, QCS405, SDA845, SDX20, SDX20M, WCD9330 2020-11-12 not yet calculated CVE-2020-11131
CONFIRM qualcomm — multiple_snapdragon_products u’Use after free issue in Bluetooth transport driver when a method in the object is accessed after the object has been deleted due to improper timer handling.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009W, MSM8909W, QCS605, QM215, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6350, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11175
CONFIRM qualcomm — multiple_snapdragon_products
  u’Integer overflow can cause a buffer overflow due to lack of table length check in the extensible boot Loader during the validation of security metadata while processing objects to be loaded’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in MDM9205, QCM4290, QCS405, QCS410, QCS4290, QCS610, QSM8250, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA640, SDA845, SDA855, SDM1000, SDM640, SDM830, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11127
CONFIRM qualcomm — multiple_snapdragon_products
  u’Improper authorization in DSP process could allow unauthorized users to downgrade the library versions in SD820, SD821, SD820, QCS603, QCS605, SDA855, SA6155P, SA6145P, SA6155, SA6155P, SD855, SD 675, SD660, SD429, SD439 2020-11-12 not yet calculated CVE-2020-11209
CONFIRM qualcomm — multiple_snapdragon_products
  u’Possible buffer overflow in Fastrpc while handling received parameters due to lack of validation on input parameters’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8098, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11206
CONFIRM qualcomm — multiple_snapdragon_products
  u’information disclosure in gatekeeper trustzone implementation as the throttling mechanism to prevent brute force attempts at getting user`s lock-screen password can be bypassed by performing the standard gatekeeper operations.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QM215, QSM8250, QSM8350, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDW2500, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11123
CONFIRM qualcomm — multiple_snapdragon_products
  u’Integer overflow to buffer overflow occurs while playback of ASF clip having unexpected number of codec entries’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8009W, APQ8017, APQ8037, APQ8053, APQ8064AU, APQ8096, APQ8096AU, APQ8096SG, APQ8098, MDM9206, MDM9650, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996, MSM8996AU, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SDA429W, SDA640, SDA660, SDA670, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11196
CONFIRM qualcomm — multiple_snapdragon_products
  u’Incorrect validation of ring context fetched from host memory can lead to memory overflow’ in Snapdragon Compute, Snapdragon Mobile in QSM8350, SC7180, SDX55, SDX55M, SM6150, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-3632
CONFIRM qualcomm — multiple_snapdragon_products
  u’Buffer overflow in LibFastCV library due to improper size checks with respect to buffer length’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8052, APQ8056, APQ8076, APQ8096, APQ8096SG, APQ8098, MDM9655, MSM8952, MSM8956, MSM8976, MSM8976SG, MSM8996, MSM8996SG, MSM8998, QCM4290, QCM6125, QCS410, QCS4290, QCS610, QCS6125, QSM8250, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SDA640, SDA660, SDA845, SDA855, SDM640, SDM660, SDM830, SDM845, SDM850, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11207
CONFIRM qualcomm — multiple_snapdragon_products
  u’Possible buffer overflow in WIFI hal process due to copying data without checking the buffer length’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11130
CONFIRM qualcomm — multiple_snapdragon_products
  u’Possible integer overflow to heap overflow while processing command due to lack of check of packet length received’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Mobile in QSM8350, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155P, SA8195P, SDX55M, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11205
CONFIRM qualcomm — multiple_snapdragon_products
  u’Possible buffer overflow in WIFI hal process due to usage of memcpy without checking length of destination buffer’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SC8180X, SC8180XP, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11121
CONFIRM qualcomm — multiple_snapdragon_products
  u’Buffer overflow/underflow occurs when typecasting the buffer passed by CPU internally in the library which is not aligned with the actual size of the structure’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in QCM6125, QCS410, QCS603, QCS605, QCS610, QCS6125, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDA640, SDA670, SDA845, SDM640, SDM670, SDM710, SDM830, SDM845, SDX50M, SDX55, SDX55M, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM8150, SM8150P 2020-11-12 not yet calculated CVE-2020-11202
CONFIRM qualcomm — multiple_snapdragon_products
  u’Buffer over read in boot due to size check ignored before copying GUID attribute from request to response’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in APQ8009, APQ8096AU, APQ8098, MDM8207, MDM9150, MDM9205, MDM9206, MDM9207, MDM9250, MDM9607, MDM9628, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8998, QCM4290, QCS405, QCS410, QCS4290, QCS603, QCS605, QCS610, QSM8250, SA415M, SA515M, SA6145P, SA6150P, SA6155, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA640, SDA670, SDA845, SDA855, SDM1000, SDM640, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM6350, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SXR1120, SXR1130, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11132
CONFIRM qualcomm — multiple_snapdragon_products
  u’Possible buffer overflow will occur in video while parsing mp4 clip with crafted esds atom size.’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile in QCM4290, QCS4290, QM215, QSM8350, SA6145P, SA6155, SA6155P, SA8155, SA8155P, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P 2020-11-12 not yet calculated CVE-2020-11184
CONFIRM qualcomm — multiple_snapdragon_products
  u’Null-pointer dereference can occur while accessing data buffer beyond its size that leads to access the buffer beyond its range’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8009W, APQ8017, APQ8053, APQ8064AU, APQ8096AU, APQ8098, MDM9206, MDM9650, MSM8909W, MSM8953, MSM8996AU, QCM4290, QCS405, QCS4290, QCS603, QCS605, QM215, QSM8350, SA6155, SA6155P, SA8155, SA8155P, SDA429W, SDA640, SDA660, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM450, SDM632, SDM640, SDM830, SDM845, SDW2500, SDX20, SDX20M, SDX50M, SDX55, SDX55M, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6250, SM6350, SM7125, SM7225, SM7250, SM7250P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SXR2130, SXR2130P, WCD9330 2020-11-12 not yet calculated CVE-2020-11168
CONFIRM qualcomm — multiple_snapdragon_products
  u’When a non standard SIP sigcomp message is received from the network, then there may be chances of using more UDVM cycle or memory overflow’ in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8017, APQ8037, APQ8053, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCM4290, QCM6125, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA415M, SA6145P, SA6150P, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8350, SM8350P, SXR1120, SXR1130 2020-11-12 not yet calculated CVE-2020-3639
CONFIRM rconfig — rconfig
  lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7. 2020-11-13 not yet calculated CVE-2020-13638
MISC readytalk — avian
  ** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0 before 2020-10-27. The FileOutputStream.write() method in FileOutputStream.java has a boundary check to prevent out-of-bounds memory read/write operations. However, an integer overflow leads to bypassing this check and achieving the out-of-bounds access. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2020-11-09 not yet calculated CVE-2020-28371
MISC
MISC red_hat — jboss_keycloak A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw 2020-11-09 not yet calculated CVE-2020-14366
CONFIRM saltstack — salt
  An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. 2020-11-06 not yet calculated CVE-2020-16846
SUSE
MISC
MISC
FEDORA
GENTOO
CONFIRM saltstack — salt
  The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions. 2020-11-06 not yet calculated CVE-2020-17490
SUSE
MISC
FEDORA
GENTOO
CONFIRM saltstack — salt
  In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH. 2020-11-06 not yet calculated CVE-2020-25592
SUSE
MISC
MISC
FEDORA
GENTOO
CONFIRM sap — 3d_visual_enterprise_viewer
  SAP 3D Visual Enterprise Viewer, version – 9, allows an user to open manipulated HPGL file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. 2020-11-10 not yet calculated CVE-2020-26817
MISC
MISC
MISC sap — as_abap
  SAP AS ABAP(DMIS), versions – 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA(DMIS), versions – 101, 102, 103, 104, 105, allows an authenticated attacker to inject arbitrary code into function module leading to code injection that can be executed in the application which affects the confidentiality, availability and integrity of the application. 2020-11-10 not yet calculated CVE-2020-26808
MISC
MISC sap — commerce_cloud SAP Commerce Cloud (Accelerator Payment Mock), versions – 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability. 2020-11-10 not yet calculated CVE-2020-26811
MISC
MISC sap — commerce_cloud
  SAP Commerce Cloud (Accelerator Payment Mock), versions – 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request can render the SAP Commerce service itself unavailable leading to Denial of Service with no impact on confidentiality or integrity. 2020-11-10 not yet calculated CVE-2020-26810
MISC
MISC sap — commerce_cloud
  SAP Commerce Cloud, versions- 1808,1811,1905,2005, allows an attacker to bypass existing authentication and permission checks via the ‘/medias’ endpoint hence gaining access to Secure Media folders. This folder could contain sensitive files that results in disclosure of sensitive information and impact system configuration confidentiality. 2020-11-10 not yet calculated CVE-2020-26809
MISC
MISC sap — erp_and_s/4_hana
  SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check. 2020-11-10 not yet calculated CVE-2020-6316
MISC
MISC sap — erp_client
  SAP ERP Client for E-Bilanz, version – 1.0, installation sets Incorrect default filesystem permissions are set in its installation folder which allows anyone to modify the files in the folder. 2020-11-10 not yet calculated CVE-2020-26807
MISC
MISC sap — fiori_launchpad
  SAP Fiori Launchpad (News tile Application), versions – 750,751,752,753,754,755, allows an unauthorized attacker to send a crafted request to a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network to retrieve sensitive / confidential resources which are otherwise restricted for internal usage only, resulting in a Server-Side Request Forgery vulnerability. 2020-11-10 not yet calculated CVE-2020-26815
MISC
MISC sap — fiori_launchpad
  SAP Fiori Launchpad (News tile Application), versions – 750,751,752,753,754,755, allows an unauthorized attacker to use SAP Fiori Launchpad News tile Application to send malicious code, to a different end user (victim), because News tile does not sufficiently encode user controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability. Information maintained in the victim’s web browser can be read, modified, and sent to the attacker. The malicious code cannot significantly impact the victim’s browser and the victim can easily close the browser tab to terminate it. 2020-11-13 not yet calculated CVE-2020-26825
MISC
MISC sap — netweaver_as_abap
  SAP NetWeaver AS ABAP (Web Dynpro), versions – 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, that allows them to read and delete database logfiles because of Improper Access Control. 2020-11-10 not yet calculated CVE-2020-26819
MISC
MISC sap — netweaver_as_abap
  SAP NetWeaver AS ABAP (Web Dynpro), versions – 731, 740, 750, 751, 752, 753, 754, 755, 782, allows an authenticated user to access Web Dynpro components, which reveals sensitive system information that would otherwise be restricted to highly privileged users because of missing authorization, resulting in Information Disclosure. 2020-11-10 not yet calculated CVE-2020-26818
MISC
MISC sap — process_integration
  SAP Process Integration (PGP Module – Business-to-Business Add On), version – 1.0, allows an attacker to read PGP Keys under certain conditions in the PGP Module of Business-to-Business Add-On, these keys can then be used to read messages processed by the module leading to Information Disclosure. 2020-11-10 not yet calculated CVE-2020-26814
MISC
MISC sentrifugo — sentrifugo In Sentrifugo 3.2, users can share an announcement under “Organization -> Announcements” tab. Also, in this page, users can upload attachments with the shared announcements. This “Upload Attachment” functionality is suffered from “Unrestricted File Upload” vulnerability so attacker can upload malicious files using this functionality and control the server. 2020-11-12 not yet calculated CVE-2020-26804
MISC sentrifugo — sentrifugo In Sentrifugo 3.2, admin can edit employee’s informations via this endpoint –> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, “employeeNumId” parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database. 2020-11-12 not yet calculated CVE-2020-26805
MISC sentrifugo — sentrifugo
  In Sentrifugo 3.2, users can upload an image under “Assets -> Add” tab. This “Upload Images” functionality is suffered from “Unrestricted File Upload” vulnerability so attacker can upload malicious files using this functionality and control the server. 2020-11-12 not yet calculated CVE-2020-26803
MISC set — set Prototype pollution vulnerability in ‘@strikeentco/set’ version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution. 2020-11-10 not yet calculated CVE-2020-28267
MISC
MISC siemens — simatic_s7-300_cpu_family
  A vulnerability has been identified in SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions), SINUMERIK 840D sl (All versions). Sending multiple specially crafted packets to the affected devices could cause a Denial-of-Service on port 102. A cold restart is required to recover the service. 2020-11-12 not yet calculated CVE-2020-15783
MISC spree — spree Spree is a complete open source e-commerce solution built with Ruby on Rails. In Spree from version 3.7 and before versions 3.7.13, 4.0.5, and 4.1.12, there is an authorization bypass vulnerability. The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token. This is patched in versions 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected. 2020-11-13 not yet calculated CVE-2020-26223
MISC
CONFIRM
MISC sugarcrm — sugarcrm
  An authorization bypass and PHP local-file-include vulnerability in the installation component of SugarCRM before 8.0, 8.0 before 8.0.7, 9.0 before 9.0.4, and 10.0 before 10.0.0 allows for unauthenticated remote code execution against a configured SugarCRM instance via crafted HTTP requests. (This is exploitable even after installation is completed.). 2020-11-12 not yet calculated CVE-2020-7472
MISC
CONFIRM suitecrm — suitecrm
  SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system settings Log File Name setting. In certain circumstances involving admin account takeover, logger_file_name can refer to an attacker-controlled .php file under the web root. 2020-11-06 not yet calculated CVE-2020-28328
MISC
MISC
MISC synopsys — synopsys
  Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 – 0.0.52 does not validate SSL certificates in certain cases. 2020-11-06 not yet calculated CVE-2020-27589
CONFIRM
MISC
MISC
MISC
MISC tcl — android_smart_tvs
  A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows an attacker on the adjacent network to arbitrarily browse and download sensitive files over an insecure web server running on port 7989 that lists all files & directories. An unprivileged remote attacker on the adjacent network, can download most system files, leading to serious critical information disclosure. 2020-11-10 not yet calculated CVE-2020-27403
MISC
MISC
MISC
MISC tcl — android_smart_tvs
  A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade, and /var/TerminalManager directories within the TV file system. An attacker, such as a malicious APK or local unprivileged user could perform fake system upgrades by writing to the /data/vendor/upgrage folder. 2020-11-10 not yet calculated CVE-2020-28055
MISC
MISC
MISC
MISC
MISC tibco — tibco_iprocess_workspace
  The Core component of TIBCO Software Inc.’s TIBCO iProcess Workspace (Browser) contains a vulnerability that theoretically allows an unauthenticated attacker with network access to execute a Cross Site Request Forgery (CSRF) attack on the affected system. A successful attack using this vulnerability requires human interaction from an authenticated user other than the attacker. Affected releases are TIBCO Software Inc.’s TIBCO iProcess Workspace (Browser): versions 11.6.0 and below. 2020-11-10 not yet calculated CVE-2020-27146
CONFIRM
CONFIRM tmux — tmux
  The function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output. 2020-11-06 not yet calculated CVE-2020-27347
MISC
GENTOO
MISC touchbase.ai — touchbase.ai

 

toucbase.ai before version 2.0 leaks information by not stripping exif data from images. Anyone with access to the uploaded image of other users could obtain its geolocation, device, and software version data etc (if present. The issue is fixed in version 2.0. 2020-11-11 not yet calculated CVE-2020-26220
MISC
CONFIRM touchbase.ai — touchbase.ai

 

touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user’s cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action. The issue is patched in version 2.0. 2020-11-11 not yet calculated CVE-2020-26221
CONFIRM touchbase.ai — touchbase.ai
  touchbase.ai before version 2.0 is vulnerable to Open Redirect. Impacts can be many, and vary from theft of information and credentials, to the redirection to malicious websites containing attacker-controlled content, which in some cases even cause XSS attacks. So even though an open redirection might sound harmless at first, the impacts of it can be severe should it be exploitable. The issue is fixed in version 2.0. 2020-11-11 not yet calculated CVE-2020-26219
CONFIRM touchbase.ai — touchbase.ai
  touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting. The vulnerability allows an attacker to inject HTML payloads which could result in defacement, user redirection to a malicious webpage/website etc. The issue is patched in version 2.0. 2020-11-11 not yet calculated CVE-2020-26218
CONFIRM tp-link — archer_a7_ac1750_devices
  tdpServer on TP-Link Archer A7 AC1750 devices before 201029 allows remote attackers to execute arbitrary code via the slave_mac parameter. NOTE: this issue exists because of an incomplete fix for CVE-2020-10882 in which shell quotes are mishandled. 2020-11-08 not yet calculated CVE-2020-28347
MISC
MISC
MISC
MISC
MISC trend_micro — interscan_messaging_security_virtual_appliance
  Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a server side request forgery vulnerability which could allow an authenticated attacker to abuse the product’s web server and grant access to web resources or parts of local files. An attacker must already have obtained authenticated privileges on the product to exploit this vulnerability. 2020-11-09 not yet calculated CVE-2020-27018
N/A
N/A trend_micro — interscan_messaging_security_virtual_appliance
  Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an information disclosure vulnerability which could allow an attacker to access a specific database and key. 2020-11-09 not yet calculated CVE-2020-27019
N/A
N/A trend_micro — interscan_messaging_security_virtual_appliance
  Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 has updated a specific critical library that may vulnerable to attack. 2020-11-09 not yet calculated CVE-2020-27694
N/A
N/A trend_micro — interscan_messaging_security_virtual_appliance
  Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a cross-site request forgery (CSRF) vulnerability which could allow an attacker to modify policy rules by tricking an authenticated administrator into accessing an attacker-controlled web page. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability. 2020-11-09 not yet calculated CVE-2020-27016
N/A
N/A trend_micro — interscan_messaging_security_virtual_appliance
  Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an XML External Entity Processing (XXE) vulnerability which could allow an authenticated administrator to read arbitrary local files. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability. 2020-11-09 not yet calculated CVE-2020-27017
N/A
N/A trend_micro — interscan_messaging_security_virtual_appliance
  Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 stores administrative passwords using a hash that is considered outdated. 2020-11-09 not yet calculated CVE-2020-27693
N/A
N/A untangle — firewall_ng Untangle Firewall NG before 16.0 uses MD5 for passwords. 2020-11-12 not yet calculated CVE-2020-17494
MISC
MISC
MISC
MISC valve — game_networking_sockets Valve’s Game Networking Sockets prior to version v1.2.0 improperly handles inlined statistics messages in function CConnectionTransportUDPBase::Received_Data(), leading to an exception thrown from libprotobuf and resulting in a crash. 2020-11-13 not yet calculated CVE-2020-6019
MISC vivo — fame_touch_module
  The frame touch module does not make validity judgments on parameter lengths when processing specific parameters,which caused out of the boundary when memory access.The vulnerability eventually leads to a local DOS on the device. 2020-11-10 not yet calculated CVE-2020-12485
CONFIRM vmware — tanzu_tas
  Scheduler for TAS prior to version 1.4.0 was permitting plaintext transmission of UAA client token by sending it over a non-TLS connection. This also depended on the configuration of the MySQL server which is used to cache a UAA client token used by the service. If intercepted the token can give an attacker admin level access in the cloud controller. 2020-11-11 not yet calculated CVE-2020-5426
CONFIRM wordpress — wordpress
  The Canto plugin 1.3.0 for WordPress allows includes/lib/download.php?subdomain= SSRF. 2020-11-10 not yet calculated CVE-2020-24063
MISC
MISC
MISC
MISC wordpress — wordpress
  An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of “wp_ajax_nopriv” call in WordPress, which allows any unauthenticated user to get access to the function “gdlr_lms_cancel_booking” where POST Parameter “id” was sent straight into SQL query without sanitization. 2020-11-12 not yet calculated CVE-2020-27481
MISC wordpress — wordpress
  The usc-e-shop (aka Collne Welcart e-Commerce) plugin before 1.9.36 for WordPress allows Object Injection because of usces_unserialize. There is not a complete POP chain. 2020-11-07 not yet calculated CVE-2020-28339
MISC
MISC xen — xen Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a “Platypus” attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen. 2020-11-10 not yet calculated CVE-2020-28368
MISC
MISC
MISC



Source link

Author: Editor
Editor represents multiple online news sites, including STL.News, RSSNews.Press and more. As a media company offering website hosting, design and SEO we create the news sites in part to illustrate our "search engine friendly" web hosting and design services. In addition, we believe that our "direct source news" concept helps provide accurate information to the public without bias.