An issue was discovered in the Upload Widget in OutSystems Platform 10 before 10.0.1019.0. An unauthenticated attacker can upload arbitrary files. In some cases, this attack may consume the available database space (Denial of Service), corrupt legitimate data if files are being processed asynchronously, or deny access to legitimate uploaded files.
Source: MITRE
Max CVSS
7.2
EPSS Score
0.09%
Published
2020-11-30
Updated
2020-12-04
Tesla Model X vehicles before 2020-11-23 do not perform certificate validation during an attempt to pair a new key fob with the body control module (BCM). This allows an attacker (who is inside a vehicle, or is otherwise able to send data over the CAN bus) to start and drive the vehicle with a spoofed key fob.
Source: MITRE
Max CVSS
4.6
EPSS Score
0.06%
Published
2020-11-30
Updated
2020-12-04
Tesla Model X vehicles before 2020-11-23 have key fobs that rely on five VIN digits for the authentication needed for a body control module (BCM) to initiate a Bluetooth wake-up action. (The full VIN is visible from outside the vehicle.)
Source: MITRE
Max CVSS
4.6
EPSS Score
0.10%
Published
2020-11-30
Updated
2020-12-04
Tesla Model X vehicles before 2020-11-23 have key fobs that accept firmware updates without signature verification. This allows attackers to construct firmware that retrieves an unlock code from a secure enclave chip.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.10%
Published
2020-11-30
Updated
2020-12-04
The EventON plugin through 3.0.5 for WordPress allows addons/?q= XSS via the search field.
Source: MITRE
Max CVSS
6.1
EPSS Score
3.95%
Published
2020-11-30
Updated
2022-08-06
A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).
Source: MITRE
Max CVSS
7.8
EPSS Score
0.18%
Published
2020-11-30
Updated
2023-02-03
The Estil Hill Lock Password Manager Safe app 2.3 for iOS has a *#06#* backdoor password. An attacker with physical access can unlock the password manager without knowing the master password set by the user.
Source: MITRE
Max CVSS
4.6
EPSS Score
0.10%
Published
2020-11-30
Updated
2021-07-21
Zeroshell 3.9.3 contains a command injection vulnerability in the /cgi-bin/kerbynet StartSessionSubmit parameter that could allow an unauthenticated attacker to execute a system command by using shell metacharacters and the %0a character.
Source: MITRE
Max CVSS
10.0
EPSS Score
95.62%
Published
2020-11-30
Updated
2020-12-03
An issue was discovered in PNGOUT 2020-01-15. When compressing a crafted PNG file, it encounters an integer overflow.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.12%
Published
2020-11-30
Updated
2021-09-08
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. A hardcoded RSA private key (specific to V1600D4L and V1600D-MINI) is contained in the firmware images.
Source: MITRE
Max CVSS
7.8
EPSS Score
0.04%
Published
2020-11-29
Updated
2020-12-01
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. A hardcoded RSA private key (specific to V1600D, V1600G1, and V1600G2) is contained in the firmware images.
Source: MITRE
Max CVSS
7.8
EPSS Score
0.05%
Published
2020-11-29
Updated
2020-12-01
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. Command injection can occur in "upload tftp syslog" and "upload tftp configuration" in the CLI via a crafted filename.
Source: MITRE
Max CVSS
10.0
EPSS Score
0.31%
Published
2020-11-29
Updated
2021-07-21
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. TELNET is offered by default but SSH is not always available. An attacker can intercept passwords sent in cleartext and conduct a man-in-the-middle attack on the management of the appliance.
Source: MITRE
Max CVSS
5.9
EPSS Score
0.13%
Published
2020-11-29
Updated
2021-07-21
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. During the process of updating the firmware, the update script starts a telnetd -l /bin/sh process that does not require authentication for TELNET access.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.04%
Published
2020-11-29
Updated
2021-07-21
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. It is possible to elevate the privilege of a CLI user (to full administrative access) by using the password !j@l#y$z%x6x7q8c9z) for the enable command.
Source: MITRE
Max CVSS
9.0
EPSS Score
0.10%
Published
2020-11-29
Updated
2021-07-21
An issue was discovered on V-SOL V1600D V2.03.69 OLT devices. The string K0LTdi@gnos312$ is compared to the password provided by the the remote attacker. If it matches, access is provided.
Source: MITRE
Max CVSS
9.8
EPSS Score
2.18%
Published
2020-11-29
Updated
2020-12-03
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. There is an !j@l#y$z%x6x7q8c9z) password for the admin account to authenticate to the TELNET service.
Source: MITRE
Max CVSS
9.8
EPSS Score
0.43%
Published
2020-11-29
Updated
2020-12-03
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. An low-privileged (non-admin) attacker can use a hardcoded password (4ef9cea10b2362f15ba4558b1d5c081f) to create an admin user.
Source: MITRE
Max CVSS
8.8
EPSS Score
0.10%
Published
2020-11-29
Updated
2020-12-03
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
Source: MITRE
Max CVSS
3.6
EPSS Score
0.06%
Published
2020-11-28
Updated
2023-11-09
An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.05%
Published
2020-11-28
Updated
2020-12-02
An issue was discovered in do_madvise in mm/madvise.c in the Linux kernel before 5.6.8. There is a race condition between coredump operations and the IORING_OP_MADVISE implementation, aka CID-bc0c4d1e176e.
Source: MITRE
Max CVSS
4.7
EPSS Score
0.07%
Published
2020-11-28
Updated
2022-10-06
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.
Source: MITRE
Max CVSS
3.3
EPSS Score
0.06%
Published
2020-11-28
Updated
2020-12-02
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
Source: MITRE
Max CVSS
7.0
EPSS Score
0.08%
Published
2020-11-28
Updated
2022-10-19
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
Source: MITRE
Max CVSS
7.0
EPSS Score
0.07%
Published
2020-11-28
Updated
2023-07-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
Source: MITRE
Max CVSS
7.0
EPSS Score
0.08%
Published
2020-11-28
Updated
2024-02-15
1271 vulnerabilities found
1 2 3 4 5 6 ...... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!