Search Results (344911 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-3948 1 Vmware 2 Fusion, Workstation 2024-11-21 7.8 High
Linux Guest VMs running on VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a local privilege escalation vulnerability due to improper file permissions in Cortado Thinprint. Local attackers with non-administrative access to a Linux guest VM with virtual printing enabled may exploit this issue to elevate their privileges to root on the same guest VM.
CVE-2020-3947 1 Vmware 2 Fusion, Workstation 2024-11-21 8.8 High
VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine.
CVE-2020-3946 1 Vmware 1 Installbuilder 2024-11-21 7.5 High
InstallBuilder AutoUpdate tool and regular installers enabling <checkForUpdates> built with versions earlier than 19.11 are vulnerable to Billion laughs attack (denial-of-service).
CVE-2020-3945 2 Microsoft, Vmware 2 Windows, Vrealize Operations 2024-11-21 7.5 High
vRealize Operations for Horizon Adapter (6.7.x prior to 6.7.1 and 6.6.x prior to 6.6.1) contains an information disclosure vulnerability due to incorrect pairing implementation between the vRealize Operations for Horizon Adapter and Horizon View. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may obtain sensitive information
CVE-2020-3944 2 Microsoft, Vmware 2 Windows, Vrealize Operations 2024-11-21 8.6 High
vRealize Operations for Horizon Adapter (6.7.x prior to 6.7.1 and 6.6.x prior to 6.6.1) has an improper trust store configuration leading to authentication bypass. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may be able to bypass Adapter authentication.
CVE-2020-3943 2 Microsoft, Vmware 2 Windows, Vrealize Operations 2024-11-21 9.8 Critical
vRealize Operations for Horizon Adapter (6.7.x prior to 6.7.1 and 6.6.x prior to 6.6.1) uses a JMX RMI service which is not securely configured. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may be able to execute arbitrary code in vRealize Operations.
CVE-2020-3941 2 Microsoft, Vmware 2 Windows, Tools 2024-11-21 7.0 High
The repair operation of VMware Tools for Windows 10.x.y has a race condition which may allow for privilege escalation in the Virtual Machine where Tools is installed. This vulnerability is not present in VMware Tools 11.x.y since the affected functionality is not present in VMware Tools 11.
CVE-2020-3940 1 Vmware 9 Workspace One Boxer, Workspace One Content, Workspace One Intelligent Hub and 6 more 2024-11-21 5.9 Medium
VMware Workspace ONE SDK and dependent mobile application updates address sensitive information disclosure vulnerability.
CVE-2020-3939 1 Sysjust 1 Syuan-gu-da-shin 2024-11-21 6.1 Medium
SysJust Syuan-Gu-Da-Shih, versions before 20191223, contain vulnerability of Cross-Site Scripting(XSS), personal information may be leaked to attackers via the vulnerability.
CVE-2020-3938 1 Sysjust 1 Syuan-gu-da-shin 2024-11-21 9.8 Critical
SysJust Syuan-Gu-Da-Shih, versions before 20191223, contain vulnerability of Request Forgery, allowing attackers to launch inquiries into network architecture or system files of the server via forged inquests.
CVE-2020-3937 1 Sysjust 1 Syuan-gu-da-shin 2024-11-21 8.1 High
SQL Injection in SysJust Syuan-Gu-Da-Shih, versions before 20191223, allowing attackers to perform unwanted SQL queries and access arbitrary file in the database.
CVE-2020-3936 1 Unisoon 2 Ultralog Express, Ultralog Express Firmware 2024-11-21 10 Critical
UltraLog Express device management interface does not properly filter user inputted string in some specific parameters, attackers can inject arbitrary SQL command.
CVE-2020-3935 1 Secom 2 Dr.id Access Control, Dr.id Attendance System 2024-11-21 7.5 High
TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, stores users’ information by cleartext in the cookie, which divulges password to attackers.
CVE-2020-3934 1 Secom 2 Dr.id Access Control, Dr.id Attendance System 2024-11-21 9.8 Critical
TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, contains a vulnerability of Pre-auth SQL Injection, allowing attackers to inject a specific SQL command.
CVE-2020-3933 1 Secom 2 Dr.id Access Control, Dr.id Attendance System 2024-11-21 5.3 Medium
TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, allows attackers to enumerate and exam user account in the system.
CVE-2020-3932 1 Draytek 2 Vigorap 910c, Vigorap 910c Firmware 2024-11-21 7.5 High
A vulnerable SNMP in Draytek VigorAP910C cannot be disabled, which may cause information leakage.
CVE-2020-3931 1 Geovision 12 Gv-as1010, Gv-as1010 Firmware, Gv-as210 and 9 more 2024-11-21 9.8 Critical
Buffer overflow exists in Geovision Door Access Control device family, an unauthenticated remote attacker can execute arbitrary command.
CVE-2020-3930 1 Geovision 2 Gv-gf192x, Gv-gf192x Firmware 2024-11-21 4 Medium
GeoVision Door Access Control device family improperly stores and controls access to system logs, any users can read these logs.
CVE-2020-3929 1 Usavisionsys 10 Geovision Gv-as1010, Geovision Gv-as1010 Firmware, Geovision Gv-as210 and 7 more 2024-11-21 5.9 Medium
GeoVision Door Access Control device family employs shared cryptographic private keys for SSH and HTTPS. Attackers may conduct MITM attack with the derived keys and plaintext recover of encrypted messages.
CVE-2020-3928 1 Usavisionsys 10 Geovision Gv-as1010, Geovision Gv-as1010 Firmware, Geovision Gv-as210 and 7 more 2024-11-21 6.2 Medium
GeoVision Door Access Control device family is hardcoded with a root password, which adopting an identical password in all devices.