Total
1004 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-26194 | 1 Dell | 1 Emc Powerscale Onefs | 2021-02-12 | 4.6 MEDIUM | 7.8 HIGH |
Dell EMC PowerScale OneFS versions 8.1.2 and 8.2.2 contain an Incorrect Permission Assignment for a Critical Resource vulnerability. This may allow a non-admin user with either ISI_PRIV_LOGIN_CONSOLE or ISI_PRIV_LOGIN_SSH privileges to exploit the vulnerability, leading to compromised cryptographic operations. Note: no non-admin users or roles have these privileges by default. | |||||
CVE-2021-0334 | 1 Google | 1 Android | 2021-02-12 | 7.2 HIGH | 7.8 HIGH |
In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811 | |||||
CVE-2020-10553 | 1 Psyprax | 1 Psyprax | 2021-02-08 | 2.1 LOW | 5.5 MEDIUM |
An issue was discovered in Psyprax before 3.2.2. The file %PROGRAMDATA%\Psyprax32\PPScreen.ini contains a hash for the lockscreen (aka screensaver) of the application. If that entry is removed, the lockscreen is no longer displayed and the app is no longer locked. All local users are able to modify that file. | |||||
CVE-2021-3165 | 1 Missionlabs | 1 Smartagent | 2021-02-02 | 6.5 MEDIUM | 8.8 HIGH |
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI. | |||||
CVE-2019-4702 | 1 Ibm | 1 Security Guardium Data Encrpytion | 2021-01-15 | 5.5 MEDIUM | 8.1 HIGH |
IBM Security Guardium Data Encryption (GDE) 3.0.0.2 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. | |||||
CVE-2020-36154 | 1 Pearson | 1 Vue Testing System | 2021-01-12 | 7.2 HIGH | 7.8 HIGH |
The Application Wrapper in Pearson VUE VTS Installer 2.3.1911 has Full Control permissions for Everyone in the "%SYSTEMDRIVE%\Pearson VUE" directory, which allows local users to obtain administrative privileges via a Trojan horse application. | |||||
CVE-2020-9048 | 1 Tyco | 1 Victor Web Client | 2021-01-07 | 7.8 HIGH | 8.1 HIGH |
A vulnerability in specified versions of American Dynamics victor Web Client and Software House CCURE Web Client could allow a remote unauthenticated attacker on the network to delete arbitrary files on the system or render the system unusable by conducting a Denial of Service attack. | |||||
CVE-2020-25507 | 1 3ds | 1 Teamwork Cloud | 2021-01-04 | 7.2 HIGH | 7.8 HIGH |
An incorrect permission assignment during the installation script of TeamworkCloud 18.0 thru 19.0 allows a local unprivileged attacker to execute arbitrary code as root. During installation, the user is instructed to set the system enviroment file with world writable permissions (0777 /etc/environment). Any local unprivileged user can execute arbitrary code simply by writing to /etc/environment, which will force all users, including root, to execute arbitrary code during the next login or reboot. In addition, the entire home directory of the twcloud user at /home/twcloud is recursively given world writable permissions. This allows any local unprivileged attacker to execute arbitrary code, as twcloud. This product was previous named Cameo Enterprise Data Warehouse (CEDW). | |||||
CVE-2017-16754 | 1 Boltcms | 1 Bolt | 2021-01-04 | 5.0 MEDIUM | 5.3 MEDIUM |
Bolt before 3.3.6 does not properly restrict access to _profiler routes, related to EventListener/ProfilerListener.php and Provider/EventListenerServiceProvider.php. | |||||
CVE-2020-17533 | 1 Apache | 1 Accumulo | 2020-12-30 | 5.5 MEDIUM | 8.1 HIGH |
Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security functions are not checked in some instances, therefore allowing an authenticated user with insufficient permissions to perform the following actions: flushing a table, shutting down Accumulo or an individual tablet server, and setting or removing system-wide Accumulo configuration properties. | |||||
CVE-2018-15645 | 1 Odoo | 1 Odoo | 2020-12-23 | 4.0 MEDIUM | 6.5 MEDIUM |
Improper access control in message routing in Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier allows remote authenticated users to create arbitrary records via crafted payloads, which may allow privilege escalation. | |||||
CVE-2020-25191 | 1 Ni | 2 Compactrio, Compactrio Firmware | 2020-12-14 | 7.8 HIGH | 7.5 HIGH |
Incorrect permissions are set by default for an API entry-point of a specific service, allowing a non-authenticated user to trigger a function that could reboot the CompactRIO (Driver versions prior to 20.5) remotely. | |||||
CVE-2017-11422 | 1 Statamic | 1 Statamic | 2020-12-10 | 6.5 MEDIUM | 8.8 HIGH |
Statamic framework before 2.6.0 does not correctly check a session's permissions when the methods from a user's class are called. Problematic methods include reset password, create new account, create new role, etc. | |||||
CVE-2020-7337 | 1 Mcafee | 1 Virusscan Enterprise | 2020-12-10 | 4.6 MEDIUM | 6.7 MEDIUM |
Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks. | |||||
CVE-2020-28055 | 1 Tcl | 14 32s330, 32s330 Firmware, 40s330 and 11 more | 2020-12-08 | 7.2 HIGH | 7.8 HIGH |
A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade, and /var/TerminalManager directories within the TV file system. An attacker, such as a malicious APK or local unprivileged user could perform fake system upgrades by writing to the /data/vendor/upgrage folder. | |||||
CVE-2020-11831 | 1 Oppo | 1 Ovoicemanager | 2020-12-04 | 10.0 HIGH | 9.8 CRITICAL |
OvoiceManager has system permission to write vulnerability reports for arbitrary files, affected product is com.oppo.ovoicemanager V2.0.1. | |||||
CVE-2020-28914 | 1 Katacontainers | 1 Kata-containers | 2020-12-04 | 3.6 LOW | 7.1 HIGH |
An improper file permissions vulnerability affects Kata Containers prior to 1.11.5. When using a Kubernetes hostPath volume and mounting either a file or directory into a container as readonly, the file/directory is mounted as readOnly inside the container, but is still writable inside the guest. For a container breakout situation, a malicious guest can potentially modify or delete files/directories expected to be read-only. | |||||
CVE-2020-16990 | 1 Microsoft | 1 Azure Sphere | 2020-11-20 | 2.1 LOW | 5.5 MEDIUM |
Azure Sphere Information Disclosure Vulnerability This CVE ID is unique from CVE-2020-16985. | |||||
CVE-2019-11121 | 2 Intel, Microsoft | 2 Media Sdk, Windows | 2020-11-19 | 4.6 MEDIUM | 7.8 HIGH |
Improper file permissions in the installer for the Intel(R) Media SDK for Windows before version 2019 R1 may allow an authenticated user to potentially enable escalation of privilege via local access. | |||||
CVE-2020-15708 | 1 Canonical | 1 Ubuntu Linux | 2020-11-12 | 4.6 MEDIUM | 7.8 HIGH |
Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code. |