Search Results (322574 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-12496 1 Endress 8 Orsg35, Orsg35 Firmware, Orsg45 and 5 more 2024-11-21 6.5 Medium
Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) and Memograph M (Neutral/Private Label) (RSG45, ORSG45) with Firmware version V2.0.0 and above is prone to exposure of sensitive information to an unauthorized actor. The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it was discovered that it also has an issue with the access-control matrix on the server-side. It was found that a user with low rights can get information from endpoints that should not be available to this user.
CVE-2020-12495 1 Endress 8 Orsg35, Orsg35 Firmware, Orsg45 and 5 more 2024-11-21 9.1 Critical
Endress+Hauser Ecograph T (Neutral/Private Label) (RSG35, ORSG35) with Firmware version prior to V2.0.0 is prone to improper privilege management. The affected device has a web-based user interface with a role-based access system. Users with different roles have different write and read privileges. The access system is based on dynamic "tokens". The vulnerability is that user sessions are not closed correctly and a user with fewer rights is assigned the higher rights when he logs on.
CVE-2020-12494 2 Beckhoff, Intel 20 Twincat, Twincat Driver, 82540em and 17 more 2024-11-21 5.3 Medium
Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.
CVE-2020-12493 1 Swarco 1 Cpu Ls4000 Firmware 2024-11-21 10 Critical
An open port used for debugging in SWARCOs CPU LS4000 Series with versions starting with G4... grants root access to the device without access control via network. A malicious user could use this vulnerability to get access to the device and disturb operations with connected devices.
CVE-2020-12488 1 Vivo 1 Jovi Smart Scene 2024-11-21 5.5 Medium
The attacker can access the sensitive information stored within the jovi Smart Scene module by entering carefully constructed commands without requesting permission.
CVE-2020-12485 1 Vivo 1 Frame Touch Module 2024-11-21 5.5 Medium
The frame touch module does not make validity judgments on parameter lengths when processing specific parameters,which caused out of the boundary when memory access.The vulnerability eventually leads to a local DOS on the device.
CVE-2020-12483 1 Vivo 1 Appstore 2024-11-21 8.2 High
The appstore before 8.12.0.0 exposes some of its components, and the attacker can cause remote download and install apps through carefully constructed parameters.
CVE-2020-12480 1 Lightbend 1 Play Framework 2024-11-21 6.5 Medium
In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed.
CVE-2020-12479 1 Teampass 1 Teampass 2024-11-21 8.8 High
TeamPass 2.1.27.36 allows any authenticated TeamPass user to trigger a PHP file include vulnerability via a crafted HTTP request with sources/users.queries.php newValue directory traversal.
CVE-2020-12478 1 Teampass 1 Teampass 2024-11-21 7.5 High
TeamPass 2.1.27.36 allows an unauthenticated attacker to retrieve files from the TeamPass web root. This may include backups or LDAP debug files.
CVE-2020-12477 1 Teampass 1 Teampass 2024-11-21 7.5 High
The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.
CVE-2020-12475 1 Tp-link 1 Omada Controller 2024-11-21 5.5 Medium
TP-Link Omada Controller Software 3.2.6 allows Directory Traversal for reading arbitrary files via com.tp_link.eap.web.portal.PortalController.getAdvertiseFile in /opt/tplink/EAPController/lib/eap-web-3.2.6.jar.
CVE-2020-12474 1 Telegram 2 Telegram, Telegram Desktop 2024-11-21 6.5 Medium
Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL.
CVE-2020-12473 1 Mono 1 Monox 2024-11-21 7.2 High
MonoX through 5.1.40.5152 allows admins to execute arbitrary programs by reconfiguring the Converter Executable setting from ffmpeg.exe to a different program.
CVE-2020-12472 1 Mono 1 Monox 2024-11-21 5.4 Medium
MonoX through 5.1.40.5152 allows stored XSS via User Status, Blog Comments, or Blog Description.
CVE-2020-12471 1 Mono 1 Monox 2024-11-21 9.8 Critical
MonoX through 5.1.40.5152 allows remote code execution via HTML5Upload.ashx or Pages/SocialNetworking/lng/en-US/PhotoGallery.aspx because of deserialization in ModuleGallery.HTML5Upload, ModuleGallery.SilverLightUploadModule, HTML5Upload, and SilverLightUploadHandler.
CVE-2020-12470 1 Mono 1 Monox 2024-11-21 7.2 High
MonoX through 5.1.40.5152 allows administrators to execute arbitrary code by modifying an ASPX template.
CVE-2020-12469 1 Intelliants 1 Subrion 2024-11-21 6.5 Medium
admin/blocks.php in Subrion CMS through 4.2.1 allows PHP Object Injection (with resultant file deletion) via serialized data in the subpages value within a block to blocks/edit.
CVE-2020-12468 1 Intelliants 1 Subrion 2024-11-21 7.8 High
Subrion CMS 4.2.1 allows CSV injection via a phrase value within a language. This is related to phrases/add/ and languages/download/.
CVE-2020-12467 1 Intelliants 1 Subrion 2024-11-21 6.5 Medium
Subrion CMS 4.2.1 allows session fixation via an alphanumeric value in a session cookie.