Search Results (323565 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-11933 1 Canonical 2 Snapd, Ubuntu Linux 2024-11-21 7.3 High
cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.
CVE-2020-11932 1 Canonical 1 Subiquity 2024-11-21 2.3 Low
It was discovered that the Subiquity installer for Ubuntu Server logged the LUKS full disk encryption password if one was entered.
CVE-2020-11931 2 Canonical, Pulseaudio 2 Ubuntu Linux, Pulseaudio 2024-11-21 3.3 Low
An Ubuntu-specific modification to Pulseaudio to provide security mediation for Snap-packaged applications was found to have a bypass of intended access restriction for snaps which plugs any of pulseaudio, audio-playback or audio-record via unloading the pulseaudio snap policy module. This issue affects: pulseaudio 1:8.0 versions prior to 1:8.0-0ubuntu3.12; 1:11.1 versions prior to 1:11.1-1ubuntu7.7; 1:13.0 versions prior to 1:13.0-1ubuntu1.2; 1:13.99.1 versions prior to 1:13.99.1-1ubuntu3.2;
CVE-2020-11930 1 Gtranslate 1 Translate Wordpress With Gtranslate 2024-11-21 6.1 Medium
The GTranslate plugin before 2.8.52 for WordPress has Reflected XSS via a crafted link. This requires use of the hreflang tags feature within a sub-domain or sub-directory paid option.
CVE-2020-11928 1 Davidlingren 1 Media Library Assistant 2024-11-21 9.8 Critical
In the media-library-assistant plugin before 2.82 for WordPress, Remote Code Execution can occur via the tax_query, meta_query, or date_query parameter in mla_gallery via an admin.
CVE-2020-11925 1 Luvion 2 Grand Elite 3 Connect, Grand Elite 3 Connect Firmware 2024-11-21 8.8 High
An issue was discovered in Luvion Grand Elite 3 Connect through 2020-02-25. Authentication to the device is based on a username and password. The root credentials are the same across all devices of this model.
CVE-2020-11924 1 Wizconnected 2 Colors A60, Colors A60 Firmware 2024-11-21 5.5 Medium
An issue was discovered in WiZ Colors A60 1.14.0. Wi-Fi credentials are stored in cleartext in flash memory, which presents an information-disclosure risk for a discarded or resold device.
CVE-2020-11923 1 Wizconnected 1 Wiz 2024-11-21 5.5 Medium
An issue was discovered in WiZ Colors A60 1.14.0. API credentials are locally logged.
CVE-2020-11922 1 Wizconnected 2 A60 Colors, A60 Colors Firmware 2024-11-21 4.3 Medium
An issue was discovered in WiZ Colors A60 1.14.0. The device sends unnecessary information to the cloud controller server. Although this information is sent encrypted and has low risk in isolation, it decreases the privacy of the end user. The information sent includes the local IP address being used and the SSID of the Wi-Fi network the device is connected to. (Various resources such as wigle.net can be use for mapping of SSIDs to physical locations.)
CVE-2020-11920 1 Svakom 3 Siime Eye, Siime Eye Firmware, Svakom Siime Eye 2024-11-21 9.8 Critical
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. A command injection vulnerability resides in the HOST/IP section of the NFS settings menu in the webserver running on the device. By injecting Bash commands via shell metacharacters here, the device executes arbitrary code with root privileges (all of the device's services are running as root).
CVE-2020-11915 1 Svakom 3 Siime Eye, Siime Eye Firmware, Svakom Siime Eye Firmware 2024-11-21 6.8 Medium
An issue was discovered in Svakom Siime Eye 14.1.00000001.3.330.0.0.3.14. By sending a set_params.cgi?telnetd=1&save=1&reboot=1 request to the webserver, it is possible to enable the telnet interface on the device. The telnet interface can then be used to obtain access to the device with root privileges via a reecam4debug default password. This default telnet password is the same across all Siime Eye devices. In order for the attack to be exploited, an attacker must be physically close in order to connect to the device's Wi-Fi access point.
CVE-2020-11914 1 Treck 1 Tcp\/ip 2024-11-21 4.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has an ARP Out-of-bounds Read.
CVE-2020-11913 1 Treck 1 Tcp\/ip 2024-11-21 5.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has an IPv6 Out-of-bounds Read.
CVE-2020-11912 1 Treck 1 Tcp\/ip 2024-11-21 5.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has a TCP Out-of-bounds Read.
CVE-2020-11911 1 Treck 1 Tcp\/ip 2024-11-21 5.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has Improper ICMPv4 Access Control.
CVE-2020-11908 1 Treck 1 Tcp\/ip 2024-11-21 4.3 Medium
The Treck TCP/IP stack before 4.7.1.27 mishandles '\0' termination in DHCP.
CVE-2020-11907 1 Treck 1 Tcp\/ip 2024-11-21 6.3 Medium
The Treck TCP/IP stack before 6.0.1.66 improperly handles a Length Parameter Inconsistency in TCP.
CVE-2020-11906 1 Treck 1 Tcp\/ip 2024-11-21 6.3 Medium
The Treck TCP/IP stack before 6.0.1.66 has an Ethernet Link Layer Integer Underflow.
CVE-2020-11905 1 Treck 1 Tcp\/ip 2024-11-21 6.5 Medium
The Treck TCP/IP stack before 6.0.1.66 has a DHCPv6 Out-of-bounds Read.
CVE-2020-11903 1 Treck 1 Tcp\/ip 2024-11-21 6.5 Medium
The Treck TCP/IP stack before 6.0.1.28 has a DHCP Out-of-bounds Read.