Search Results (335257 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-16987 1 Microsoft 1 Azure Sphere 2024-11-21 7.3 High
Azure Sphere Unsigned Code Execution Vulnerability
CVE-2020-16986 1 Microsoft 1 Azure Sphere 2024-11-21 6.2 Medium
Azure Sphere Denial of Service Vulnerability
CVE-2020-16985 1 Microsoft 1 Azure Sphere 2024-11-21 6.2 Medium
Azure Sphere Information Disclosure Vulnerability
CVE-2020-16984 1 Microsoft 1 Azure Sphere 2024-11-21 7.3 High
Azure Sphere Unsigned Code Execution Vulnerability
CVE-2020-16983 1 Microsoft 1 Azure Sphere 2024-11-21 5.7 Medium
Azure Sphere Tampering Vulnerability
CVE-2020-16982 1 Microsoft 1 Azure Sphere 2024-11-21 6.1 Medium
Azure Sphere Unsigned Code Execution Vulnerability
CVE-2020-16981 1 Microsoft 1 Azure Sphere 2024-11-21 6.1 Medium
Azure Sphere Elevation of Privilege Vulnerability
CVE-2020-16979 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 5.3 Medium
Microsoft SharePoint Information Disclosure Vulnerability
CVE-2020-16970 1 Microsoft 1 Azure Sphere 2024-11-21 8.1 High
Azure Sphere Unsigned Code Execution Vulnerability
CVE-2020-16850 1 Mitsubishielectric 38 R00cpu, R00cpu Firmware, R01cpu and 35 more 2024-11-21 7.5 High
Mitsubishi MELSEC iQ-R Series PLCs with firmware 49 allow an unauthenticated attacker to halt the industrial process by sending a crafted packet over the network. This denial of service attack exposes Improper Input Validation. After halting, physical access to the PLC is required in order to restore production, and the device state is lost. This is related to R04CPU, RJ71GF11-T2, R04CPU, and RJ71GF11-T2.
CVE-2020-16849 1 Canon 56 Ir2202n, Ir2202n Firmware, Ir2204f and 53 more 2024-11-21 7.5 High
An issue was discovered on Canon MF237w 06.07 devices. An "Improper Handling of Length Parameter Inconsistency" issue in the IPv4/ICMPv4 component, when handling a packet sent by an unauthenticated network attacker, may expose Sensitive Information.
CVE-2020-16847 1 Extremenetworks 1 Extreme Management Center 2024-11-21 6.1 Medium
Extreme Analytics in Extreme Management Center before 8.5.0.169 allows unauthenticated reflected XSS via a parameter in a GET request, aka CFD-4887.
CVE-2020-16845 5 Debian, Fedoraproject, Golang and 2 more 13 Debian Linux, Fedora, Go and 10 more 2024-11-21 7.5 High
Go before 1.13.15 and 14.x before 1.14.7 can have an infinite read loop in ReadUvarint and ReadVarint in encoding/binary via invalid inputs.
CVE-2020-16844 2 Istio, Redhat 2 Istio, Service Mesh 2024-11-21 6.8 Medium
In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy.
CVE-2020-16843 1 Amazon 1 Firecracker 2024-11-21 5.9 Medium
In Firecracker 0.20.x before 0.20.1 and 0.21.x before 0.21.2, the network stack can freeze under heavy ingress traffic. This can result in a denial of service on the microVM when it is configured with a single network interface, and an availability problem for the microVM network interface on which the issue is triggered.
CVE-2020-16839 1 Crestron 6 Dm-nvx-dir-160, Dm-nvx-dir-160 Firmware, Dm-nvx-dir-80 and 3 more 2024-11-21 7.5 High
On Crestron DM-NVX-DIR, DM-NVX-DIR80, and DM-NVX-ENT devices before the DM-XIO/1-0-3-802 patch, the password can be changed by sending an unauthenticated WebSocket request.
CVE-2020-16632 1 Dedecms 1 Dedecms 2024-11-21 5.4 Medium
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
CVE-2020-16630 1 Ti 7 15.4-stack, Ble5-stack, Dynamic Multi-protocal Manager and 4 more 2024-11-21 6.8 Medium
TI’s BLE stack caches and reuses the LTK’s property for a bonded mobile. A LTK can be an unauthenticated-and-no-MITM-protection key created by Just Works or an authenticated-and-MITM-protection key created by Passkey Entry, Numeric Comparison or OOB. Assume that a victim mobile uses secure pairing to pair with a victim BLE device based on TI chips and generate an authenticated-and-MITM-protection LTK. If a fake mobile with the victim mobile’s MAC address uses Just Works and pairs with the victim device, the generated LTK still has the property of authenticated-and-MITM-protection. Therefore, the fake mobile can access attributes with the authenticated read/write permission.
CVE-2020-16629 1 Phpok 1 Phpok 2024-11-21 9.8 Critical
PhpOK 5.4.137 contains a SQL injection vulnerability that can inject an attachment data through SQL, and then call the attachment replacement function through api.php to write a PHP file to the target path.
CVE-2020-16610 1 Hoosk 1 Hoosk 2024-11-21 4.3 Medium
Hoosk Codeigniter CMS before 1.7.2 is affected by a Cross Site Request Forgery (CSRF). When an attacker induces authenticated admin user to a malicious web page, any accounts can be deleted without admin user's intention.