Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-13112 | 4 Canonical, Debian, Libexif Project and 1 more | 4 Ubuntu Linux, Debian Linux, Libexif and 1 more | 2023-01-27 | 6.4 MEDIUM | 9.1 CRITICAL |
An issue was discovered in libexif before 0.6.22. Several buffer over-reads in EXIF MakerNote handling could lead to information disclosure and crashes. This is different from CVE-2020-0093. | |||||
CVE-2020-12823 | 4 Debian, Fedoraproject, Infradead and 1 more | 4 Debian Linux, Fedora, Openconnect and 1 more | 2023-01-27 | 7.5 HIGH | 9.8 CRITICAL |
OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c. | |||||
CVE-2018-6693 | 2 Linux, Mcafee | 3 Linux Kernel, Endpoint Security For Linux Threat Prevention, Endpoint Security Linux Threat Prevention | 2023-01-27 | 3.3 LOW | 5.3 MEDIUM |
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escalation to delete arbitrary files. | |||||
CVE-2020-12767 | 4 Canonical, Debian, Libexif Project and 1 more | 4 Ubuntu Linux, Debian Linux, Libexif and 1 more | 2023-01-27 | 2.1 LOW | 5.5 MEDIUM |
exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a divide-by-zero error. | |||||
CVE-2020-12267 | 1 Qt | 1 Qt | 2023-01-27 | 7.5 HIGH | 9.8 CRITICAL |
setMarkdown in Qt before 5.14.2 has a use-after-free related to QTextMarkdownImporter::insertBlock. | |||||
CVE-2020-1983 | 5 Canonical, Debian, Fedoraproject and 2 more | 5 Ubuntu Linux, Debian Linux, Fedora and 2 more | 2023-01-27 | 2.1 LOW | 6.5 MEDIUM |
A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service. | |||||
CVE-2020-11958 | 2 Canonical, Re2c | 2 Ubuntu Linux, Re2c | 2023-01-27 | 6.8 MEDIUM | 7.8 HIGH |
re2c 1.3 has a heap-based buffer overflow in Scanner::fill in parse/scanner.cc via a long lexeme. | |||||
CVE-2018-6692 | 1 Belkin | 2 Wemo Insight Smart Plug, Wemo Insight Smart Plug Firmware | 2023-01-27 | 10.0 HIGH | 10.0 CRITICAL |
Stack-based Buffer Overflow vulnerability in libUPnPHndlr.so in Belkin Wemo Insight Smart Plug allows remote attackers to bypass local security protection via a crafted HTTP post packet. | |||||
CVE-2018-6590 | 1 Broadcom | 1 Ca Api Developer Portal | 2023-01-27 | 4.3 MEDIUM | 6.1 MEDIUM |
CA API Developer Portal 4.x, prior to v4.2.5.3 and v4.2.7.1, has an unspecified reflected cross-site scripting vulnerability. | |||||
CVE-2018-6686 | 1 Mcafee | 1 Drive Encryption | 2023-01-27 | 4.6 MEDIUM | 6.6 MEDIUM |
Authentication Bypass vulnerability in TPM autoboot in McAfee Drive Encryption (MDE) 7.1.0 and above allows physically proximate attackers to bypass local security protection via specific set of circumstances. | |||||
CVE-2018-6677 | 1 Mcafee | 1 Mcafee Web Gateway | 2023-01-27 | 9.0 HIGH | 9.1 CRITICAL |
Directory Traversal vulnerability in the administrative user interface in McAfee Web Gateway (MWG) MWG 7.8.1.x allows authenticated administrator users to gain elevated privileges via unspecified vectors. | |||||
CVE-2020-1751 | 3 Canonical, Gnu, Redhat | 3 Ubuntu Linux, Glibc, Enterprise Linux | 2023-01-27 | 5.9 MEDIUM | 7.0 HIGH |
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability. | |||||
CVE-2020-1943 | 1 Apache | 1 Ofbiz | 2023-01-27 | 4.3 MEDIUM | 6.1 MEDIUM |
Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07. | |||||
CVE-2019-17560 | 2 Apache, Oracle | 2 Netbeans, Graalvm | 2023-01-27 | 6.4 MEDIUM | 9.1 CRITICAL |
The "Apache NetBeans" autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. “Apache NetBeans" versions up to and including 11.2 are affected by this vulnerability. | |||||
CVE-2020-8552 | 2 Fedoraproject, Kubernetes | 2 Fedora, Kubernetes | 2023-01-27 | 4.0 MEDIUM | 4.3 MEDIUM |
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests. | |||||
CVE-2018-6687 | 2 Mcafee, Microsoft | 2 Getsusp, Windows | 2023-01-27 | 4.3 MEDIUM | 5.5 MEDIUM |
Loop with Unreachable Exit Condition ('Infinite Loop') in McAfee GetSusp (GetSusp) 3.0.0.461 and earlier allows attackers to DoS a manual GetSusp scan via while scanning a specifically crafted file . GetSusp is a free standalone McAfee tool that runs on several versions of Microsoft Windows. | |||||
CVE-2018-6706 | 1 Mcafee | 1 Agent | 2023-01-27 | 5.0 MEDIUM | 7.5 HIGH |
Insecure handling of temporary files in non-Windows McAfee Agent 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows an Unprivileged User to introduce custom paths during agent installation in Linux via unspecified vectors. | |||||
CVE-2020-8551 | 2 Fedoraproject, Kubernetes | 2 Fedora, Kubernetes | 2023-01-27 | 3.3 LOW | 6.5 MEDIUM |
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250. | |||||
CVE-2018-6705 | 1 Mcafee | 1 Agent | 2023-01-27 | 4.6 MEDIUM | 7.8 HIGH |
Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions. | |||||
CVE-2018-6704 | 1 Mcafee | 1 Agent | 2023-01-27 | 4.6 MEDIUM | 7.8 HIGH |
Privilege escalation vulnerability in McAfee Agent (MA) for Linux 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows local users to perform arbitrary command execution via specific conditions. |