Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-668
Total 688 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10805 1 Sideralis 1 Valib.js 2020-03-05 5.0 MEDIUM 7.5 HIGH
valib through 2.0.0 allows Internal Property Tampering. A maliciously crafted JavaScript object can bypass several inspection functions provided by valib. Valib uses a built-in function (hasOwnProperty) from the unsafe user-input to examine an object. It is possible for a crafted payload to overwrite this function to manipulate the inspection results to bypass security checks.
CVE-2020-8121 1 Nextcloud 1 Nextcloud Server 2020-02-11 5.5 MEDIUM 8.1 HIGH
A bug in Nextcloud Server 14.0.4 could expose more data in reshared link shares than intended by the sharer.
CVE-2019-3682 1 Suse 1 Caas Platform 2020-02-06 4.6 MEDIUM 7.8 HIGH
The docker-kubic package in SUSE CaaS Platform 3.0 before 17.09.1_ce-7.6.1 provided access to an insecure API locally on the Kubernetes master node.
CVE-2020-7912 1 Jetbrains 1 Youtrack 2020-02-01 5.0 MEDIUM 5.3 MEDIUM
In JetBrains YouTrack before 2019.2.59309, SMTP/Jabber settings could be accessed using backups.
CVE-2019-4633 1 Ibm 1 Security Secret Server 2020-01-30 4.3 MEDIUM 4.3 MEDIUM
IBM Security Secret Server 10.7 could allow an attacker to obtain sensitive information due to an overly permissive CORS policy. IBM X-Force ID: 170007.
CVE-2019-10781 1 Schema-inspector Project 1 Schema-inspector 2020-01-29 7.5 HIGH 9.8 CRITICAL
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.
CVE-2019-13927 1 Siemens 32 Pxa30-w0, Pxa30-w0 Firmware, Pxa30-w1 and 29 more 2019-12-30 5.0 MEDIUM 5.3 MEDIUM
A vulnerability has been identified in Desigo PX automation controllers PXC00-E.D, PXC50-E.D, PXC100-E.D, PXC200-E.D with Desigo PX Web modules PXA40-W0, PXA40-W1, PXA40-W2 (All firmware versions < V6.00.320), Desigo PX automation controllers PXC00-U, PXC64-U, PXC128-U with Desigo PX Web modules PXA30-W0, PXA30-W1, PXA30-W2 (All firmware versions < V6.00.320), Desigo PX automation controllers PXC22.1-E.D, PXC36-E.D, PXC36.1-E.D with activated web server (All firmware versions < V6.00.320). The device contains a vulnerability that could allow an attacker to cause a denial of service condition on the device's web server by sending a specially crafted HTTP message to the web server port (tcp/80). The security vulnerability could be exploited by an attacker with network access to an affected device. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise the availability of the device's web service. While the device itself stays operational, the web server responds with HTTP status code 404 (Not found) to any further request. A reboot is required to recover the web interface. At the time of advisory publication no public exploitation of this security vulnerability was known.
CVE-2019-8779 1 Apple 2 Ipados, Iphone Os 2019-12-26 7.5 HIGH 10.0 CRITICAL
A logic issue applied the incorrect restrictions. This issue was addressed by updating the logic to apply the correct restrictions. This issue is fixed in iOS 13.1.1 and iPadOS 13.1.1. Third party app extensions may not receive the correct sandbox restrictions.
CVE-2014-2387 3 Debian, Opensuse, Pen Project 3 Debian Linux, Opensuse, Pen 2019-12-19 4.6 MEDIUM 4.4 MEDIUM
Pen 0.18.0 has Insecure Temporary File Creation vulnerabilities
CVE-2019-15689 1 Kaspersky 4 Kaspersky Internet Security, Secure Connection, Security Cloud and 1 more 2019-12-18 4.6 MEDIUM 6.7 MEDIUM
Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security products
CVE-2013-0163 1 Redhat 1 Openshift 2019-12-14 2.1 LOW 5.5 MEDIUM
OpenShift haproxy cartridge: predictable /tmp in set-proxy connection hook which could facilitate DoS
CVE-2019-19015 1 Titanhq 1 Webtitan 2019-12-06 10.0 HIGH 9.8 CRITICAL
An issue was discovered in TitanHQ WebTitan before 5.18. The proxy service (which is typically exposed to all users) allows connections to the internal PostgreSQL database of the appliance. By connecting to the database through the proxy (without password authentication), an attacker is able to fully control the appliance database. Through this, several different paths exist to gain further access, or execute code.
CVE-2019-16541 1 Jenkins 1 Jira 2019-12-03 6.5 MEDIUM 9.9 CRITICAL
Jenkins JIRA Plugin 3.0.10 and earlier does not declare the correct (folder) scope for per-folder Jira site definitions, allowing users to select and use credentials with System scope.
CVE-2014-0023 1 Redhat 1 Openshift 2019-11-20 4.6 MEDIUM 7.8 HIGH
OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution
CVE-2005-2351 2 Debian, Mutt 2 Debian Linux, Mutt 2019-11-13 2.1 LOW 5.5 MEDIUM
Mutt before 1.5.20 patch 7 allows an attacker to cause a denial of service via a series of requests to mutt temporary files.
CVE-2007-3915 1 Mandriva 1 Mondo 2019-11-08 6.4 MEDIUM 9.1 CRITICAL
Mondo 2.24 has insecure handling of temporary files.
CVE-2013-4374 1 Redhat 2 Jboss Operations Network, Rhq Mongo Db Drift Server 2019-11-08 3.6 LOW 7.1 HIGH
An insecurity temporary file vulnerability exists in RHQ Mongo DB Drift Server through 2013-09-25 when unpacking zipped files.
CVE-2009-5042 2 Debian, Python-docutils Project 2 Debian Linux, Python-docutils 2019-11-06 6.4 MEDIUM 9.1 CRITICAL
python-docutils allows insecure usage of temporary files
CVE-2013-4280 1 Redhat 3 Enterprise Virtualization, Storage, Virtual Desktop Server Manager 2019-11-06 2.1 LOW 5.5 MEDIUM
Insecure temporary file vulnerability in RedHat vsdm 4.9.6.
CVE-2019-13546 1 Philips 1 Intellispace Perinatal 2019-10-30 7.2 HIGH 6.8 MEDIUM
In IntelliSpace Perinatal, Versions K and prior, a vulnerability within the IntelliSpace Perinatal application environment could enable an unauthorized attacker with physical access to a locked application screen, or an authorized remote desktop session host application user to break-out from the containment of the application and access unauthorized resources from the Windows operating system as the limited-access Windows user. Due to potential Windows vulnerabilities, it may be possible for additional attack methods to be used to escalate privileges on the operating system.