Show filters
47 Total Results
Displaying 31-40 of 47
Sort by:
Attacker Value
Unknown

CVE-2020-0416

Disclosure Date: October 14, 2020 (last updated February 22, 2025)
In multiple settings screens, there are possible tapjacking attacks due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.0 Android-8.1Android ID: A-155288585
Attacker Value
Unknown

CVE-2020-26930

Disclosure Date: October 09, 2020 (last updated February 22, 2025)
NETGEAR EX7700 devices before 1.0.0.210 are affected by incorrect configuration of security settings.
Attacker Value
Unknown

CVE-2020-24365

Disclosure Date: September 24, 2020 (last updated February 22, 2025)
An issue was discovered on Gemtek WRTM-127ACN 01.01.02.141 and WRTM-127x9 01.01.02.127 devices. The Monitor Diagnostic network page allows an authenticated attacker to execute a command directly on the target machine. Commands are executed as the root user (uid 0). (Even if a login is required, most routers are left with default credentials.)
Attacker Value
Unknown

CVE-2020-0386

Disclosure Date: September 17, 2020 (last updated February 22, 2025)
In onCreate of RequestPermissionActivity.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege allowing an attacker to set Bluetooth discoverability with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155650356
Attacker Value
Unknown

CVE-2020-0394

Disclosure Date: September 17, 2020 (last updated February 22, 2025)
In onCreate of BluetoothPairingDialog.java, there is a possible tapjacking vector due to an insecure default value. This could lead to local escalation of privilege and untrusted devices accessing contact lists with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10 Android-11Android ID: A-155648639
Attacker Value
Unknown

CVE-2020-16873

Disclosure Date: September 11, 2020 (last updated February 22, 2025)
<p>A spoofing vulnerability manifests in Microsoft Xamarin.Forms due to the default settings on Android WebView version prior to 83.0.4103.106. This vulnerability could allow an attacker to execute arbitrary Javascript code on a target system.</p> <p>For the attack to be successful, the targeted user would need to browse to a malicious website or a website serving the malicious code through Xamarin.Forms.</p> <p>The security update addresses this vulnerability by preventing the malicious Javascript from running in the WebView.</p>
0
Attacker Value
Unknown

CVE-2020-7729

Disclosure Date: September 03, 2020 (last updated February 22, 2025)
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
0
Attacker Value
Unknown

CVE-2020-7685

Disclosure Date: July 28, 2020 (last updated February 21, 2025)
This affects all versions of package UmbracoForms. When using the default configuration for upload forms, it is possible to upload arbitrary file types. The package offers a way for users to mitigate the issue. The users of this package can create a custom workflow and frontend validation that blocks certain file types, depending on their security needs and policies.
Attacker Value
Unknown

CVE-2020-10279

Disclosure Date: June 24, 2020 (last updated February 21, 2025)
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecurities include a way for users to escalate their access beyond what they were granted via file creation, access race conditions, insecure home directory configurations and defaults that facilitate Denial of Service (DoS) attacks.
Attacker Value
Unknown

CVE-2020-14011

Disclosure Date: June 15, 2020 (last updated February 21, 2025)
Lansweeper 6.0.x through 7.2.x has a default installation in which the admin password is configured for the admin account, unless "Built-in admin" is manually unchecked. This allows command execution via the Add New Package and Scheduled Deployments features.