Search Results (71233 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-10610 1 Osisoft 9 Pi Api, Pi Buffer Subsystem, Pi Connector and 6 more 2024-11-21 7.8 High
In OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, deletion, or modification.
CVE-2020-10609 1 Grundfos 1 Cim 500 2024-11-21 7.5 High
Grundfos CIM 500 v06.16.00 stores plaintext credentials, which may allow sensitive information to be read or allow modification to system settings by someone with access to the device.
CVE-2020-10608 1 Osisoft 9 Pi Api, Pi Buffer Subsystem, Pi Connector and 6 more 2024-11-21 7.8 High
In OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification.
CVE-2020-10607 1 Advantech 1 Webaccess 2024-11-21 8.8 High
In Advantech WebAccess, Versions 8.4.2 and prior. A stack-based buffer overflow vulnerability caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.
CVE-2020-10606 1 Osisoft 9 Pi Api, Pi Buffer Subsystem, Pi Connector and 6 more 2024-11-21 7.8 High
In OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.
CVE-2020-10605 1 Grundfos 2 Cim 500, Cim 500 Firmware 2024-11-21 7.5 High
Grundfos CIM 500 before v06.16.00 responds to unauthenticated requests for password storage files.
CVE-2020-10604 1 Osisoft 1 Pi Data Archive 2024-11-21 7.5 High
In OSIsoft PI System multiple products and versions, a remote, unauthenticated attacker could crash PI Network Manager service through specially crafted requests. This can result in blocking connections and queries to PI Data Archive.
CVE-2020-10603 1 Advantech 1 Webaccess\/nms 2024-11-21 8.8 High
WebAccess/NMS (versions prior to 3.0.2) does not properly sanitize user input and may allow an attacker to inject system commands remotely.
CVE-2020-10601 1 Visam 2 Vbase Editor, Vbase Web-remote 2024-11-21 7.8 High
VISAM VBASE Editor version 11.5.0.2 and VBASE Web-Remote Module allow weak hashing algorithm and insecure permissions which may allow a local attacker to bypass the password-protected mechanism through brute-force attacks, cracking techniques, or overwriting the password hash.
CVE-2020-10597 1 Deltaww 1 Delta Industrial Automation Dopsoft 2024-11-21 7.1 High
Delta Industrial Automation DOPSoft, Version 4.00.08.15 and prior. Multiple out-of-bounds read vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to read information and/or crash the application.
CVE-2020-10593 2 Opensuse, Torproject 3 Backports Sle, Leap, Tor 2024-11-21 7.5 High
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.
CVE-2020-10592 2 Opensuse, Torproject 3 Backports, Leap, Tor 2024-11-21 7.5 High
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.
CVE-2020-10591 1 Walmart 1 Concord 2024-11-21 7.5 High
An issue was discovered in Walmart Labs Concord before 1.44.0. CORS Access-Control-Allow-Origin headers have a potentially unsafe dependency on Origin headers, and are not configurable. This allows remote attackers to discover host information, nodes, API metadata, and references to usernames via api/v1/apikey.
CVE-2020-10590 1 Replicated 1 Replicated Classic 2024-11-21 7.5 High
Replicated Classic 2.x versions have an improperly secured API that exposes sensitive data from the Replicated Admin Console configuration. An attacker with network access to the Admin Console port (8800) on the Replicated Classic server could retrieve the TLS Keypair (Cert and Key) used to configure the Admin Console.
CVE-2020-10589 1 V2rayl Project 1 V2rayl 2024-11-21 7.8 High
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/config.json is owned by a low-privileged user but contains commands that are executed as root, after v2rayL.service is restarted via Sudo.
CVE-2020-10588 1 V2rayl Project 1 V2rayl 2024-11-21 7.8 High
v2rayL 2.1.3 allows local users to achieve root access because /etc/v2rayL/add.sh and /etc/v2rayL/remove.sh are owned by a low-privileged user but execute as root via Sudo.
CVE-2020-10587 2 Antixlinux, Mxlinux 2 Antix Linux, Mx Linux 2024-11-21 7.8 High
antiX and MX Linux allow local users to achieve root access via "persist-config --command /bin/sh" because of the Sudo configuration.
CVE-2020-10584 1 Invigo 1 Automatic Device Management 2024-11-21 7.5 High
A directory traversal on the /admin/search_by.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote attackers to read arbitrary server files accessible to the user running the application.
CVE-2020-10583 1 Invigo 1 Automatic Device Management 2024-11-21 8.8 High
The /admin/admapi.php script of Invigo Automatic Device Management (ADM) through 5.0 allows remote authenticated attackers to execute arbitrary OS commands on the server as the user running the application.
CVE-2020-10581 1 Invigo 1 Automatic Device Management 2024-11-21 7.5 High
Multiple session validity check issues in several administration functionalities of Invigo Automatic Device Management (ADM) through 5.0 allow remote attackers to read potentially sensitive data hosted by the application.