Vulnerabilities (CVE)

Total 314972 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-26181 1 Dell 2 Emc Isilon Onefs, Emc Powerscale Onefs 2024-11-21 7.2 HIGH 7.0 HIGH
Dell EMC Isilon OneFS versions 8.1 and later and Dell EMC PowerScale OneFS version 9.0.0 contain a privilege escalation vulnerability on a SmartLock Compliance mode cluster. The compadmin user connecting using ISI PRIV LOGIN SSH or ISI PRIV LOGIN CONSOLE can elevate privileges to the root user if they have ISI PRIV HARDENING privileges.
CVE-2020-26180 1 Dell 2 Emc Isilon Onefs, Emc Powerscale Onefs 2024-11-21 6.5 MEDIUM 6.3 MEDIUM
Dell EMC Isilon OneFS supported versions 8.1 and later and Dell EMC PowerScale OneFS supported version 9.0.0 contain an access issue with the remotesupport user account. A remote malicious user with low privileges may gain access to data stored on the /ifs directory through most protocols.
CVE-2020-26178 1 Tangro 1 Business Workflow 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
In tangro Business Workflow before 1.18.1, knowing an attachment ID, it is possible to download workitem attachments without being authenticated.
CVE-2020-26177 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
In tangro Business Workflow before 1.18.1, a user's profile contains some items that are greyed out and thus are not intended to be edited by regular users. However, this restriction is only applied client-side. Manipulating any of the greyed-out values in requests to /api/profile is not prohibited server-side.
CVE-2020-26176 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
An issue was discovered in tangro Business Workflow before 1.18.1. No (or broken) access control checks exist on the /api/document/<DocumentID>/attachments API endpoint. Knowing a document ID, an attacker can list all the attachments of a workitem, including their respective IDs. This allows the attacker to gather valid attachment IDs for workitems that do not belong to them.
CVE-2020-26175 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
In tangro Business Workflow before 1.18.1, an attacker can manipulate the value of PERSON in requests to /api/profile in order to change profile information of other users.
CVE-2020-26174 1 Tangro 1 Business Workflow 2024-11-21 6.5 MEDIUM 8.8 HIGH
tangro Business Workflow before 1.18.1 requests a list of allowed filetypes from the server and restricts uploads to the filetypes contained in this list. However, this restriction is enforced in the browser (client-side) and can be circumvented. This allows an attacker to upload any file as an attachment to a workitem.
CVE-2020-26173 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 3.1 LOW
An incorrect access control implementation in Tangro Business Workflow before 1.18.1 allows an attacker to download documents (PDF) by providing a valid document ID and token. No further authentication is required.
CVE-2020-26172 1 Tangro 1 Business Workflow 2024-11-21 6.4 MEDIUM 4.2 MEDIUM
Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.
CVE-2020-26171 1 Tangro 1 Business Workflow 2024-11-21 4.0 MEDIUM 4.3 MEDIUM
In tangro Business Workflow before 1.18.1, the documentId of attachment uploads to /api/document/attachments/upload can be manipulated. By doing this, users can add attachments to workitems that do not belong to them.
CVE-2020-26168 1 Hazelcast 2 Hazelcast, Jet 2024-11-21 7.5 HIGH 9.8 CRITICAL
The LDAP authentication method in LdapLoginModule in Hazelcast IMDG Enterprise 4.x before 4.0.3, and Jet Enterprise 4.x through 4.2, doesn't verify properly the password in some system-user-dn scenarios. As a result, users (clients/members) can be authenticated even if they provide invalid passwords.
CVE-2020-26166 1 Qdpm 1 Qdpm 2024-11-21 3.5 LOW 5.4 MEDIUM
The file upload functionality in qdPM 9.1 doesn't check the file description, which allows remote authenticated attackers to inject web script or HTML via the attachments info parameter, aka XSS. This can occur during creation of a ticket, project, or task.
CVE-2020-26165 1 Qdpm 1 Qdpm 2024-11-21 6.5 MEDIUM 8.8 HIGH
qdPM through 9.1 allows PHP Object Injection via timeReportActions::executeExport in core/apps/qdPM/modules/timeReport/actions/actions.class.php because unserialize is used.
CVE-2020-26164 2 Kde, Opensuse 3 Kdeconnect, Backports Sle, Leap 2024-11-21 4.9 MEDIUM 5.5 MEDIUM
In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
CVE-2020-26163 1 Bigbluebutton 1 Greenlight 2024-11-21 6.8 MEDIUM 8.8 HIGH
BigBlueButton Greenlight before 2.5.6 allows HTTP header (Host and Origin) attacks, which can result in Account Takeover if a victim follows a spoofed password-reset link.
CVE-2020-26162 1 Xerox 4 Workcentre Ec7836, Workcentre Ec7836 Firmware, Workcentre Ec7856 and 1 more 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Xerox WorkCentre EC7836 before 073.050.059.25300 and EC7856 before 073.020.059.25300 devices allow XSS via Description pages.
CVE-2020-26161 1 Octopus 1 Octopus Deploy 2024-11-21 5.8 MEDIUM 6.1 MEDIUM
In Octopus Deploy through 2020.4.2, an attacker could redirect users to an external site via a modified HTTP Host header.
CVE-2020-26160 1 Jwt-go Project 1 Jwt-go 2024-11-21 5.0 MEDIUM 7.5 HIGH
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.
CVE-2020-26158 1 Leanote 1 Leanote 2024-11-21 6.8 MEDIUM 9.6 CRITICAL
Leanote Desktop through 2.6.2 allows XSS because a note's title is mishandled when the batch feature is triggered. This leads to remote code execution because of Node integration.
CVE-2020-26157 1 Leanote 1 Leanote 2024-11-21 6.8 MEDIUM 9.6 CRITICAL
Leanote Desktop through 2.6.2 allows XSS because a note's title is mishandled during syncing. This leads to remote code execution because of Node integration.