Show filters
66 Total Results
Displaying 11-20 of 66
Sort by:
Attacker Value
Unknown

CVE-2020-8698

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2020-26086

Disclosure Date: November 04, 2020 (last updated February 22, 2025)
A vulnerability in the video endpoint API (xAPI) of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, remote attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper storage of sensitive information on an affected device. An attacker could exploit this vulnerability by accessing information that should not be accessible to users with low privileges. A successful exploit could allow the attacker to gain access to sensitive information.
Attacker Value
Unknown

CVE-2020-26084

Disclosure Date: November 04, 2020 (last updated February 22, 2025)
A vulnerability in the REST API of Cisco Edge Fog Fabric could allow an authenticated, remote attacker to access files outside of their authorization sphere on an affected device. The vulnerability is due to incorrect authorization enforcement on an affected system. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
Attacker Value
Unknown

CVE-2020-16263

Disclosure Date: October 28, 2020 (last updated February 22, 2025)
Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins.
Attacker Value
Unknown

CVE-2020-26650

Disclosure Date: October 22, 2020 (last updated February 22, 2025)
AtomXCMS 2.0 is affected by Arbitrary File Read via admin/dump.php
Attacker Value
Unknown

CVE-2020-15264

Disclosure Date: October 20, 2020 (last updated February 22, 2025)
The Boxstarter installer before version 2.13.0 configures C:\ProgramData\Boxstarter to be in the system-wide PATH environment variable. However, this directory is writable by normal, unprivileged users. To exploit the vulnerability, place a DLL in this directory that a privileged service is looking for. For example, WptsExtensions.dll When Windows starts, it'll execute the code in DllMain() with SYSTEM privileges. Any unprivileged user can execute code with SYSTEM privileges. The issue is fixed in version 3.13.0
Attacker Value
Unknown

CVE-2020-26868

Disclosure Date: October 12, 2020 (last updated February 22, 2025)
ARC Informatique PcVue prior to version 12.0.17 is vulnerable to a denial-of-service attack due to the ability of an unauthorized user to modify information used to validate messages sent by legitimate web clients. This issue also affects third-party systems based on the Web Services Toolkit.
Attacker Value
Unknown

CVE-2020-26602

Disclosure Date: October 06, 2020 (last updated February 22, 2025)
An issue was discovered in EthernetNetwork on Samsung mobile devices with O(8.1), P(9.0), Q(10.0), and R(11.0) software. PendingIntent allows sdcard access by an unprivileged process. The Samsung ID is SVE-2020-18392 (October 2020).
Attacker Value
Unknown

CVE-2020-13343

Disclosure Date: October 06, 2020 (last updated February 22, 2025)
An issue has been discovered in GitLab affecting all versions starting from 11.2. Unauthorized Users Can View Custom Project Template
Attacker Value
Unknown

CVE-2020-15215

Disclosure Date: October 06, 2020 (last updated February 22, 2025)
Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nodeIntegrationInSubFrames: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.