Vulnerabilities (CVE)

Total 316226 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-27904 1 Apple 1 Macos 2024-11-21 9.3 HIGH 7.8 HIGH
A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges.
CVE-2020-27903 1 Apple 1 Macos 2024-11-21 9.3 HIGH 7.8 HIGH
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Big Sur 11.0.1. An application may be able to gain elevated privileges.
CVE-2020-27902 1 Apple 2 Ipados, Iphone Os 2024-11-21 2.1 LOW 4.6 MEDIUM
An authentication issue was addressed with improved state management. This issue is fixed in iOS 14.2 and iPadOS 14.2. A person with physical access to an iOS device may be able to access stored passwords without authentication.
CVE-2020-27901 1 Apple 1 Macos 2024-11-21 4.3 MEDIUM 6.3 MEDIUM
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. A sandboxed process may be able to circumvent sandbox restrictions.
CVE-2020-27900 1 Apple 1 Macos 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
An issue existed in the handling of snapshots. The issue was resolved with improved permissions logic. This issue is fixed in macOS Big Sur 11.0.1. A malicious application may be able to preview files it does not have access to.
CVE-2020-27899 1 Apple 5 Ipad Os, Iphone Os, Macos and 2 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Big Sur 11.0.1, watchOS 7.1, tvOS 14.2. A local attacker may be able to elevate their privileges.
CVE-2020-27898 1 Apple 1 Macos 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
A denial of service issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.0.1. An attacker may be able to bypass Managed Frame Protection.
CVE-2020-27897 1 Apple 2 Mac Os X, Macos 2024-11-21 7.2 HIGH 7.8 HIGH
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges.
CVE-2020-27896 1 Apple 2 Mac Os X, Macos 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
A path handling issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.0.1. A remote attacker may be able to modify the file system.
CVE-2020-27895 1 Apple 1 Itunes 2024-11-21 4.3 MEDIUM 3.3 LOW
An information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs.
CVE-2020-27894 1 Apple 1 Macos 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
The issue was addressed with additional user controls. This issue is fixed in macOS Big Sur 11.0.1. Users may be unable to remove metadata indicating where files were downloaded from.
CVE-2020-27893 1 Apple 1 Macos 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
An issue existed in screen sharing. This issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. A user with screen sharing access may be able to view another user's screen.
CVE-2020-27892 1 Ti 2 Cc2538, Z-stack 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Zigbee protocol implementation on Texas Instruments CC2538 devices with Z-Stack 3.0.1 does not properly process a ZCL Discover Commands Received Response message or a ZCL Discover Commands Generated Response message. It crashes in zclParseInDiscCmdsRspCmd().
CVE-2020-27891 1 Ti 2 Cc2538, Z-stack 2024-11-21 5.0 MEDIUM 7.5 HIGH
The Zigbee protocol implementation on Texas Instruments CC2538 devices with Z-Stack 3.0.1 does not properly process a ZCL Read Reporting Configuration Response message. It crashes in zclHandleExternal().
CVE-2020-27890 1 Ti 2 Cc2538, Z-stack 2024-11-21 6.4 MEDIUM 8.2 HIGH
The Zigbee protocol implementation on Texas Instruments CC2538 devices with Z-Stack 3.0.1 does not properly process a ZCL Write Attributes No Response message. It crashes in zclParseInWriteCmd() and does not update the specific attribute's value.
CVE-2020-27888 1 Ui 4 Unifi Controller, Unifi Controller Firmware, Unifi Meshing Access Point and 1 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered on Ubiquiti UniFi Meshing Access Point UAP-AC-M 4.3.21.11325 and UniFi Controller 6.0.28 devices. Cached credentials are not erased from an access point returning wirelessly from a disconnected state. This may provide unintended network access.
CVE-2020-27887 1 Eyesofnetwork 1 Eyesofnetwork 2024-11-21 9.0 HIGH 8.8 HIGH
An issue was discovered in EyesOfNetwork 5.3 through 5.3-8. An authenticated web user with sufficient privileges could abuse the AutoDiscovery module to run arbitrary OS commands via the nmap_binary parameter to lilac/autodiscovery.php.
CVE-2020-27886 1 Eyesofnetwork 1 Eyesofnetwork 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in EyesOfNetwork eonweb 5.3-7 through 5.3-8. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to exploit the username_available function of the includes/functions.php file (which is called by login.php).
CVE-2020-27885 1 Wso2 1 Api Manager 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Cross-Site Scripting (XSS) vulnerability on WSO2 API Manager 3.1.0. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged-in user’s session by stealing cookies which means that a malicious hacker can change the logged-in user’s password and invalidate the session of the victim while the hacker maintains access.
CVE-2020-27874 1 Tencent 1 Wechat 2024-11-21 6.8 MEDIUM 8.8 HIGH
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11580.