Show filters
508 Total Results
Displaying 271-280 of 508
Sort by:
Attacker Value
Unknown
CVE-2020-7198
Disclosure Date: November 06, 2020 (last updated November 28, 2024)
There is a remote escalation of privilege possible for a malicious user that has a OneView account in OneView and Synergy Composer. HPE has provided updates to Oneview and Synergy Composer: Update to version 5.5 of OneView, Composer, or Composer2.
0
Attacker Value
Unknown
CVE-2020-7383
Disclosure Date: October 14, 2020 (last updated February 22, 2025)
A SQL Injection issue in Rapid7 Nexpose version prior to 6.6.49 that may have allowed an authenticated user with a low permission level to access resources & make changes they should not have been able to access.
0
Attacker Value
Unknown
CVE-2020-25756
Disclosure Date: September 18, 2020 (last updated February 22, 2025)
A buffer overflow vulnerability exists in the mg_get_http_header function in Cesanta Mongoose 6.18 due to a lack of bounds checking. A crafted HTTP header can exploit this bug. NOTE: a committer has stated "this will not happen in practice.
0
Attacker Value
Unknown
CVE-2020-2269
Disclosure Date: September 16, 2020 (last updated February 22, 2025)
Jenkins chosen-views-tabbar Plugin 1.2 and earlier does not escape view names in the dropdown to select views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to configure views.
0
Attacker Value
Unknown
CVE-2020-4409
Disclosure Date: September 15, 2020 (last updated February 22, 2025)
IBM Maximo Asset Management 7.6.0 and 7.6.1 could allow a remote attacker to conduct phishing attacks, using a tabnabbing attack. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 179537.
0
Attacker Value
Unknown
CVE-2020-7382
Disclosure Date: September 03, 2020 (last updated February 22, 2025)
Rapid7 Nexpose installer version prior to 6.6.40 contains an Unquoted Search Path which may allow an attacker on the local machine to insert an arbitrary file into the executable path. This issue affects: Rapid7 Nexpose versions prior to 6.6.40.
0
Attacker Value
Unknown
CVE-2020-7381
Disclosure Date: September 03, 2020 (last updated February 22, 2025)
In Rapid7 Nexpose installer versions prior to 6.6.40, the Nexpose installer calls an executable which can be placed in the appropriate directory by an attacker with access to the local machine. This would prevent the installer from distinguishing between a valid executable called during a Security Console installation and any arbitrary code executable using the same file name.
0
Attacker Value
Unknown
CVE-2020-17474
Disclosure Date: August 14, 2020 (last updated February 21, 2025)
A token-reuse vulnerability in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to create arbitrary new users, elevate users to administrators, delete users, and download user faces from the database.
0
Attacker Value
Unknown
CVE-2020-17473
Disclosure Date: August 14, 2020 (last updated February 21, 2025)
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.
0
Attacker Value
Unknown
CVE-2020-15145
Disclosure Date: August 14, 2020 (last updated February 21, 2025)
In Composer-Setup for Windows before version 6.0.0, if the developer's computer is shared with other users, a local attacker may be able to exploit the following scenarios. 1. A local regular user may modify the existing `C:\ProgramData\ComposerSetup\bin\composer.bat` in order to get elevated command execution when composer is run by an administrator. 2. A local regular user may create a specially crafted dll in the `C:\ProgramData\ComposerSetup\bin` folder in order to get Local System privileges. See: https://itm4n.github.io/windows-server-netman-dll-hijacking. 3. If the directory of the php.exe selected by the user is not in the system path, it is added without checking that it is admin secured, as per Microsoft guidelines. See: https://msrc-blog.microsoft.com/2018/04/04/triaging-a-dll-planting-vulnerability.
0