Search Results (322989 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-11832 1 Oppo 4 Find X2 Pro, Find X2 Pro Firmware, Reno3 Pro and 1 more 2024-11-21 5.5 Medium
In functions charging_limit_current_write and charging_limit_time_write in /SM8250_Q_Master/android/vendor/oppo_charger/oppo/oppo_charger.c have not checked the parameters, which causes a vulnerability.
CVE-2020-11831 1 Oppo 1 Ovoicemanager 2024-11-21 9.8 Critical
OvoiceManager has system permission to write vulnerability reports for arbitrary files, affected product is com.oppo.ovoicemanager V2.0.1.
CVE-2020-11830 1 Oppo 1 Qualityprotect 2024-11-21 9.8 Critical
QualityProtect has a vulnerability to execute arbitrary system commands, affected product is com.oppo.qualityprotect V2.0.
CVE-2020-11829 1 Oppo 1 Coloros 2024-11-21 9.8 Critical
Dynamic loading of services in the backup and restore SDK leads to elevated privileges, affected product is com.coloros.codebook V2.0.0_5493e40_200722.
CVE-2020-11828 1 Oppo 1 Coloros 2024-11-21 7.5 High
In ColorOS (oppo mobile phone operating system, based on AOSP frameworks/native code position/services/surfaceflinger surfaceflinger.CPP), RGB is defined on the stack but uninitialized, so when the screenShot function to RGB value assignment, will not initialize the value is returned to the attackers, leading to values on the stack information leakage, the vulnerability can be used to bypass attackers ALSR.
CVE-2020-11827 1 Gog 1 Galaxy 2024-11-21 7.8 High
In GOG Galaxy 1.2.67, there is a service that is vulnerable to weak file/service permissions: GalaxyClientService.exe. An attacker can put malicious code in a Trojan horse GalaxyClientService.exe. After that, the attacker can re-start this service as an unprivileged user to escalate his/her privileges and run commands on the machine with SYSTEM rights.
CVE-2020-11826 1 Appinghouse 1 Memono 2024-11-21 7.5 High
Users can lock their notes with a password in Memono version 3.8. Thus, users needs to know a password to read notes. However, these notes are stored in a database without encryption and an attacker can read the password-protected notes without having the password. Notes are stored in the ZENTITY table in the memono.sqlite database.
CVE-2020-11825 1 Dolibarr 1 Dolibarr Erp\/crm 2024-11-21 8.8 High
In Dolibarr 10.0.6, forms are protected with a CSRF token against CSRF attacks. The problem is any CSRF token in any user's session can be used in another user's session. CSRF tokens should not be valid in this situation.
CVE-2020-11823 1 Dolibarr 1 Dolibarr Erp\/crm 2024-11-21 5.4 Medium
In Dolibarr 10.0.6, if USER_LOGIN_FAILED is active, there is a stored XSS vulnerability on the admin tools --> audit page. This may lead to stealing of the admin account.
CVE-2020-11822 1 Rukovoditel 1 Rukovoditel 2024-11-21 6.1 Medium
In Rukovoditel 2.5.2, there is a stored XSS vulnerability on the application structure --> user access groups page. Thus, an attacker can inject malicious script to steal all users' valuable data.
CVE-2020-11821 1 Rukovoditel 1 Rukovoditel 2024-11-21 5.3 Medium
In Rukovoditel 2.5.2, users' passwords and usernames are stored in a cookie with URL encoding, base64 encoding, and hashing. Thus, an attacker can easily apply brute force on them.
CVE-2020-11820 1 Rukovoditel 1 Rukovoditel 2024-11-21 9.8 Critical
Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the entities_id parameter.
CVE-2020-11819 1 Rukovoditel 1 Rukovoditel 2024-11-21 9.8 Critical
In Rukovoditel 2.5.2, an attacker may inject an arbitrary .php file location instead of a language file and thus achieve command execution.
CVE-2020-11818 1 Rukovoditel 1 Rukovoditel 2024-11-21 8.8 High
In Rukovoditel 2.5.2 has a form_session_token value to prevent CSRF attacks. This protection mechanism can be bypassed with another user's valid token. Thus, an attacker can change the Admin password by using a CSRF attack and escalate his/her privileges.
CVE-2020-11817 1 Rukovoditel 1 Rukovoditel 2024-11-21 9.8 Critical
In Rukovoditel V2.5.2, attackers can upload an arbitrary file to the server just changing the the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs with the Maintenance Mode setting.
CVE-2020-11816 1 Rukovoditel 1 Rukovoditel 2024-11-21 9.8 Critical
Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the reports_id (POST) parameter.
CVE-2020-11815 1 Rukovoditel 1 Rukovoditel 2024-11-21 9.8 Critical
In Rukovoditel 2.5.2, attackers can upload arbitrary file to the server by just changing the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs without the Maintenance Mode setting.
CVE-2020-11814 1 Qdpm 1 Qdpm 2024-11-21 5.4 Medium
A Host Header Injection vulnerability in qdPM 9.1 may allow an attacker to spoof a particular header and redirect users to malicious websites.
CVE-2020-11813 1 Rukovoditel 1 Rukovoditel 2024-11-21 5.4 Medium
In Rukovoditel 2.5.2, there is a stored XSS vulnerability on the configuration page via the copyright text input. Thus, an attacker can inject a malicious script to steal all users' valuable data. This copyright text is on every page so this attack vector can be very dangerous.
CVE-2020-11812 1 Rukovoditel 1 Rukovoditel 2024-11-21 9.8 Critical
Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the filters[0][value] or filters[1][value] parameter.