Show filters
233 Total Results
Displaying 141-150 of 233
Sort by:
Attacker Value
Unknown
CVE-2020-10539
Disclosure Date: February 05, 2021 (last updated February 22, 2025)
An issue was discovered in Epikur before 20.1.1. The Epikur server contains the checkPasswort() function that, upon user login, checks the submitted password against the user password's MD5 hash stored in the database. It is also compared to a second MD5 hash, which is the same for every user (aka a "Backdoor Password" of 3p1kursupport). If the submitted password matches either one, access is granted.
0
Attacker Value
Unknown
CVE-2020-12787
Disclosure Date: September 14, 2020 (last updated November 28, 2024)
Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling.
0
Attacker Value
Unknown
CVE-2020-12788
Disclosure Date: September 14, 2020 (last updated February 22, 2025)
CMAC verification functionality in Microchip Atmel ATSAMA5 products is vulnerable to vulnerable to timing and power analysis attacks.
0
Attacker Value
Unknown
CVE-2020-12789
Disclosure Date: September 14, 2020 (last updated February 22, 2025)
The Secure Monitor in Microchip Atmel ATSAMA5 products use a hardcoded key to encrypt and authenticate secure applets.
0
Attacker Value
Unknown
CVE-2020-15127
Disclosure Date: August 05, 2020 (last updated February 21, 2025)
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flipping the readiness endpoint to false, which removes Envoy from the routing pool. When running Envoy (For example on the host network, pod spec hostNetwork=true), the shutdown manager's endpoint is accessible to anyone on the network that can reach the Kubernetes node that's running Envoy. There is no authentication in place that prevents a rogue actor on the network from shutting down Envoy via the shutdown manager endpoint. Successful exploitation of this issue will lead to bad actors shutting down all instances of Envoy, essentially killing the entire ingress data plane. This is fixed in version 1.7.0.
0
Attacker Value
Unknown
CVE-2020-4062
Disclosure Date: June 22, 2020 (last updated February 21, 2025)
In Conjur OSS Helm Chart before 2.0.0, a recently identified critical vulnerability resulted in the installation of the Conjur Postgres database with an open port. This allows an attacker to gain full read & write access to the Conjur Postgres database, including escalating the attacker's privileges to assume full control. A malicious actor who knows the IP address and port number of the Postgres database and has access into the Kubernetes cluster where Conjur runs can gain full read & write access to the Postgres database. This enables the attacker to write a policy that allows full access to retrieve any secret. This Helm chart is a method to install Conjur OSS into a Kubernetes environment. Hence, the systems impacted are only Conjur OSS systems that were deployed using this chart. Other deployments including Docker and the CyberArk Dynamic Access Provider (DAP) are not affected. To remediate this vulnerability, clone the latest Helm Chart and follow the upgrade instructions. If yo…
0
Attacker Value
Unknown
CVE-2020-13911
Disclosure Date: June 09, 2020 (last updated February 21, 2025)
Your Online Shop 1.8.0 allows authenticated users to trigger XSS via a Change Name or Change Surname operation.
0
Attacker Value
Unknown
CVE-2020-12134
Disclosure Date: April 24, 2020 (last updated February 21, 2025)
Nanometrics Centaur through 4.3.23 and TitanSMA through 4.2.20 mishandle access control for the syslog log.
0
Attacker Value
Unknown
CVE-2020-0943
Disclosure Date: April 15, 2020 (last updated November 27, 2024)
An authentication bypass vulnerability exists in Microsoft YourPhoneCompanion application for Android, in the way the application processes notifications generated by work profiles.This could allow an unauthenticated attacker to view notifications, aka 'Microsoft YourPhone Application for Android Authentication Bypass Vulnerability'.
0
Attacker Value
Unknown
CVE-2020-10266
Disclosure Date: April 06, 2020 (last updated February 21, 2025)
UR+ (Universal Robots+) is a platform of hardware and software component sellers, for Universal Robots robots. When installing any of these components in the robots (e.g. in the UR10), no integrity checks are performed. Moreover, the SDK for making such components can be easily obtained from Universal Robots. An attacker could exploit this flaw by crafting a custom component with the SDK, performing Person-In-The-Middle attacks (PITM) and shipping the maliciously-crafted component on demand.
0