Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-1870 1 Huawei 4 Cloudengine 12800, Cloudengine 12800 Firmware, Cloudengine 6800 and 1 more 2020-11-18 5.0 MEDIUM 7.5 HIGH
There is a denial of service vulnerability in some Huawei products. Due to improper memory management, memory leakage may occur in some special cases. Attackers can perform a series of operations to exploit this vulnerability. Successful exploit may cause a denial of service. Affected product versions include: CloudEngine 12800 versions V200R019C00SPC800; CloudEngine 5800 versions V200R019C00SPC800; CloudEngine 6800 versions V200R005C20SPC800, V200R019C00SPC800; CloudEngine 7800 versions V200R019C00SPC800; NE40E versions V800R011C00SPC200, V800R011C00SPC300, V800R011C10SPC100; NE40E-F versions V800R011C00SPC200, V800R011C10SPC100; NE40E-M versions V800R011C00SPC200, V800R011C10SPC100.
CVE-2020-15259 1 Auth0 1 Ad\/ldap Connector 2020-11-18 6.8 MEDIUM 8.8 HIGH
ad-ldap-connector's admin panel before version 5.0.13 does not provide csrf protection, which when exploited may result in remote code execution or confidential data loss. CSRF exploits may occur if the user visits a malicious page containing CSRF payload on the same machine that has access to the ad-ldap-connector admin console via a browser. You may be affected if you use the admin console included with ad-ldap-connector versions <=5.0.12. If you do not have ad-ldap-connector admin console enabled or do not visit any other public URL while on the machine it is installed on, you are not affected. The issue is fixed in version 5.0.13.
CVE-2020-26168 1 Hazelcast 2 Hazelcast, Jet 2020-11-18 7.5 HIGH 9.8 CRITICAL
The LDAP authentication method in LdapLoginModule in Hazelcast IMDG Enterprise 4.x before 4.0.3, and Jet Enterprise 4.x through 4.2, doesn't verify properly the password in some system-user-dn scenarios. As a result, users (clients/members) can be authenticated even if they provide invalid passwords.
CVE-2020-14189 1 Atlassian 1 Jira Comment 2020-11-18 7.5 HIGH 9.8 CRITICAL
The execute function in in the Atlassian gajira-comment GitHub Action before version 2.0.2 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue comment.
CVE-2020-14188 1 Atlassian 1 Jira Create 2020-11-18 7.5 HIGH 9.8 CRITICAL
The preprocessArgs function in the Atlassian gajira-create GitHub Action before version 2.0.1 allows remote attackers to execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue.
CVE-2020-8749 2 Intel, Netapp 2 Active Management Technology, Cloud Backup 2020-11-18 5.8 MEDIUM 8.8 HIGH
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
CVE-2020-8760 2 Intel, Netapp 2 Active Management Technology, Cloud Backup 2020-11-18 4.6 MEDIUM 7.8 HIGH
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-8757 2 Intel, Netapp 2 Active Management Technology, Cloud Backup 2020-11-18 4.6 MEDIUM 6.7 MEDIUM
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-28409 1 Dundas 1 Dundas Bi 2020-11-18 3.5 LOW 5.4 MEDIUM
The server in Dundas BI through 8.0.0.1001 allows XSS via addition of a Component (e.g., a button) when events such as click, hover, etc. occur.
CVE-2020-28408 1 Dundas 1 Dundas Bi 2020-11-18 3.5 LOW 5.4 MEDIUM
The server in Dundas BI through 8.0.0.1001 allows XSS via an HTML label when creating or editing a dashboard.
CVE-2020-8747 2 Intel, Netapp 2 Active Management Technology, Cloud Backup 2020-11-18 6.4 MEDIUM 9.1 CRITICAL
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
CVE-2020-8746 2 Intel, Netapp 2 Active Management Technology, Cloud Backup 2020-11-18 3.3 LOW 6.5 MEDIUM
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
CVE-2020-12356 2 Intel, Netapp 2 Active Management Technology, Cloud Backup 2020-11-18 2.1 LOW 4.4 MEDIUM
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.
CVE-2020-8752 2 Intel, Netapp 3 Active Management Technology, Standard Manageability, Cloud Backup 2020-11-18 7.5 HIGH 9.8 CRITICAL
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
CVE-2020-8754 2 Intel, Netapp 3 Active Management Technology, Standard Manageability, Cloud Backup 2020-11-18 5.0 MEDIUM 7.5 HIGH
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
CVE-2020-25267 1 Ilias 1 Ilias 2020-11-18 3.5 LOW 5.4 MEDIUM
An XSS issue exists in the question-pool file-upload preview feature in ILIAS 6.4.
CVE-2018-19440 1 Arm 1 Trusted Firmware-a 2020-11-18 5.0 MEDIUM 5.3 MEDIUM
ARM Trusted Firmware-A allows information disclosure.
CVE-2020-28351 1 Mitel 2 Shoretel, Shoretel Firmware 2020-11-18 4.3 MEDIUM 6.1 MEDIUM
The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page.
CVE-2020-25655 1 Redhat 1 Advanced Cluster Management For Kubernetes 2020-11-18 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions. Views created for an admin user would be made available for a short time to users with only view permission. In this short time window the user with view permission could read cluster secrets that should only be disclosed to admin users.
CVE-2020-8268 1 Json8-merge-patch Project 1 Json8-merge-patch 2020-11-18 5.0 MEDIUM 7.5 HIGH
Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor.
CVE-2020-8276 1 Brave 1 Brave 2020-11-18 2.1 LOW 5.5 MEDIUM
The implementation of Brave Desktop's privacy-preserving analytics system (P3A) between 1.1 and 1.18.35 logged the timestamp of when the user last opened an incognito window, including Tor windows. The intended behavior was to log the timestamp for incognito windows excluding Tor windows. Note that if a user has P3A enabled, the timestamp is not sent to Brave's server, but rather a value from:Used in last 24hUsed in last week but not 24hUsed in last 28 days but not weekEver used but not in last 28 daysNever usedThe privacy risk is low because a local attacker with disk access cannot tell if the timestamp corresponds to a Tor window or a non-Tor incognito window.
CVE-2020-9300 1 Netflix 1 Dispatch 2020-11-18 4.0 MEDIUM 6.5 MEDIUM
The Access Control issues include allowing a regular user to view a restricted incident, user role escalation to admin, users adding themselves as a participant in a restricted incident, and users able to view restricted incidents via the search feature. If your install has followed the secure deployment guidelines the risk of this is lowered, as this may only be exploited by an authenticated user.
CVE-2020-14040 2 Fedoraproject, Golang 2 Fedora, Text 2020-11-18 5.0 MEDIUM 7.5 HIGH
The x/text package before 0.3.3 for Go has a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite loop if the String function on the Decoder is called, or the Decoder is passed to golang.org/x/text/transform.String.
CVE-2020-16121 2 Canonical, Packagekit Project 2 Ubuntu Linux, Packagekit 2020-11-18 2.1 LOW 3.3 LOW
PackageKit provided detailed error messages to unprivileged callers that exposed information about file presence and mimetype of files that the user would be unable to determine on its own.
CVE-2020-7758 1 Browserless 1 Chrome 2020-11-18 5.0 MEDIUM 7.5 HIGH
This affects versions of package browserless-chrome before 1.40.2-chrome-stable. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.
CVE-2020-24990 1 Qsc 1 Q-sys Core Manager 2020-11-17 5.0 MEDIUM 7.5 HIGH
An issue was discovered in QSC Q-SYS Core Manager 8.2.1. By utilizing the TFTP service running on UDP port 69, a remote attacker can perform a directory traversal and obtain operating system files via a TFTP GET request, as demonstrated by reading /etc/passwd or /proc/version.
CVE-2020-4568 1 Ibm 1 Security Key Lifecycle Manager 2020-11-17 2.1 LOW 5.5 MEDIUM
IBM Tivoli Key Lifecycle Manager 3.0, 3.0.1, and 4.0 stores user credentials in plain in clear text which can be read by a local user. IBM X-Force ID: 184157.
CVE-2020-0418 1 Google 1 Android 2020-11-17 4.6 MEDIUM 7.8 HIGH
In getPermissionInfosForGroup of Utils.java, there is a logic error. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153879813
CVE-2020-26214 1 Alerta Project 1 Alerta 2020-11-17 7.5 HIGH 9.8 CRITICAL
In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients.
CVE-2020-14366 1 Redhat 1 Keycloak 2020-11-17 5.0 MEDIUM 7.5 HIGH
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw
CVE-2020-28364 1 Locust 1 Locust 2020-11-17 4.3 MEDIUM 6.1 MEDIUM
A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3.2, if the installation violates the usage expectations by exposing this UI to outside users.
CVE-2020-27977 1 Capasystems 1 Capainstaller 2020-11-17 4.6 MEDIUM 7.8 HIGH
CapaSystems CapaInstaller before 6.0.101 does not properly assign, modify, or check privileges for an actor who attempts to edit registry values, allowing an attacker to escalate privileges.
CVE-2020-9299 1 Netflix 1 Dispatch 2020-11-17 3.5 LOW 5.4 MEDIUM
There were XSS vulnerabilities discovered and reported in the Dispatch application, affecting name and description parameters of Incident Priority, Incident Type, Tag Type, and Incident Filter. This vulnerability can be exploited by an authenticated user.
CVE-2018-1128 3 Debian, Opensuse, Redhat 10 Debian Linux, Leap, Ceph and 7 more 2020-11-17 5.4 MEDIUM 7.5 HIGH
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
CVE-2020-27347 1 Tmux Project 1 Tmux 2020-11-17 4.6 MEDIUM 7.8 HIGH
In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
CVE-2020-8173 1 Nextcloud 1 Nextcloud 2020-11-17 3.5 LOW 2.2 LOW
A too small set of random characters being used for encryption in Nextcloud Server 18.0.4 allowed decryption in shorter time than intended.
CVE-2020-15703 1 Aptdaemon Project 1 Aptdaemon 2020-11-17 2.1 LOW 3.3 LOW
There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.
CVE-2020-5425 1 Vmware 1 Single Sign-on For Tanzu 2020-11-17 4.6 MEDIUM 7.9 HIGH
Single Sign-On for Vmware Tanzu all versions prior to 1.11.3 ,1.12.x versions prior to 1.12.4 and 1.13.x prior to 1.13.1 are vulnerable to user impersonation attack.If two users are logged in to the SSO operator dashboard at the same time, with the same username, from two different identity providers, one can acquire the token of the other and thus operate with their permissions. Note: Foundation may be vulnerable only if: 1) The system zone is set up to use a SAML identity provider 2) There are internal users that have the same username as users in the external SAML provider 3) Those duplicate-named users have the scope to access the SSO operator dashboard 4) The vulnerability doesn't appear with LDAP because of chained authentication.
CVE-2020-28002 1 Sonarsource 1 Sonarqube 2020-11-17 5.0 MEDIUM 5.3 MEDIUM
In SonarQube 8.4.2.36762, an external attacker can achieve authentication bypass through SonarScanner. With an empty value for the -D sonar.login option, anonymous authentication is forced. This allows creating and overwriting public and private projects via the /api/ce/submit endpoint.
CVE-2020-28042 1 Servicestack 1 Servicestack 2020-11-17 5.0 MEDIUM 5.3 MEDIUM
ServiceStack before 5.9.2 mishandles JWT signature verification unless an application has a custom ValidateToken function that establishes a valid minimum length for a signature.
CVE-2020-28044 1 Pax 1 Prolinos 2020-11-17 7.2 HIGH 6.8 MEDIUM
An attacker with physical access to a PAX Point Of Sale device with ProlinOS through 2.4.161.8859R can boot it in management mode, enable the XCB service, and then list, read, create, and overwrite files with MAINAPP permissions.
CVE-2020-27988 1 Nagios 1 Nagios Xi 2020-11-17 3.5 LOW 5.4 MEDIUM
Nagios XI before 5.7.5 is vulnerable to XSS in Manage Users (Username field).
CVE-2020-27989 1 Nagios 1 Nagios Xi 2020-11-17 3.5 LOW 5.4 MEDIUM
Nagios XI before 5.7.5 is vulnerable to XSS in Dashboard Tools (Edit Dashboard).
CVE-2020-27990 1 Nagios 1 Nagios Xi 2020-11-17 3.5 LOW 5.4 MEDIUM
Nagios XI before 5.7.5 is vulnerable to XSS in the Deployment tool (add agent).
CVE-2020-27991 1 Nagios 1 Nagios Xi 2020-11-17 3.5 LOW 5.4 MEDIUM
Nagios XI before 5.7.5 is vulnerable to XSS in Account Information (Email field).
CVE-2020-26221 1 Touchbase.ai Project 1 Touchbase.ai 2020-11-17 4.3 MEDIUM 6.1 MEDIUM
touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting (XSS). The vulnerability allows an attacker to send malicious JavaScript code which could result in hijacking of the user's cookie/session tokens, redirecting the user to a malicious webpage and performing unintended browser action. The issue is patched in version 2.0.
CVE-2020-26220 1 Touchbase.ai Project 1 Touchbase.ai 2020-11-17 3.5 LOW 3.5 LOW
toucbase.ai before version 2.0 leaks information by not stripping exif data from images. Anyone with access to the uploaded image of other users could obtain its geolocation, device, and software version data etc (if present. The issue is fixed in version 2.0.
CVE-2020-26219 1 Touchbase.ai Project 1 Touchbase.ai 2020-11-17 5.8 MEDIUM 6.1 MEDIUM
touchbase.ai before version 2.0 is vulnerable to Open Redirect. Impacts can be many, and vary from theft of information and credentials, to the redirection to malicious websites containing attacker-controlled content, which in some cases even cause XSS attacks. So even though an open redirection might sound harmless at first, the impacts of it can be severe should it be exploitable. The issue is fixed in version 2.0.
CVE-2020-26218 1 Touchbase.ai Project 1 Touchbase.ai 2020-11-17 4.3 MEDIUM 6.1 MEDIUM
touchbase.ai before version 2.0 is vulnerable to Cross-Site Scripting. The vulnerability allows an attacker to inject HTML payloads which could result in defacement, user redirection to a malicious webpage/website etc. The issue is patched in version 2.0.
CVE-2020-26213 1 Teler Project 1 Teler 2020-11-17 5.0 MEDIUM 7.5 HIGH
In teler before version 0.0.1, if you run teler inside a Docker container and encounter `errors.Exit` function, it will cause denial-of-service (`SIGSEGV`) because it doesn't get process ID and process group ID of teler properly to kills. The issue is patched in teler 0.0.1 and 0.0.1-dev5.1.