Vulnerabilities (CVE)

Filtered by CWE-863
Total 1438 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-12477 1 Teampass 1 Teampass 2021-07-21 5.0 MEDIUM 7.5 HIGH
The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.
CVE-2019-17191 1 Signal 1 Private Messenger 2021-07-21 5.0 MEDIUM 7.5 HIGH
The Signal Private Messenger application before 4.47.7 for Android allows a caller to force a call to be answered, without callee user interaction, via a connect message. The existence of the call is noticeable to the callee; however, the audio channel may be open before the callee can block eavesdropping.
CVE-2020-10786 1 Vestacp 1 Vesta Control Panel 2021-07-21 9.0 HIGH 8.8 HIGH
A remote command execution in Vesta Control Panel through 0.9.8-26 allows any authenticated user to execute arbitrary commands on the system via cron jobs.
CVE-2020-0087 1 Google 1 Android 2021-07-21 1.9 LOW 5.5 MEDIUM
In getProcessPss of ActivityManagerService.java, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-127989044
CVE-2020-15590 1 Privateinternetaccess 1 Private Internet Access Vpn Client 2021-07-21 5.0 MEDIUM 7.5 HIGH
A vulnerability in the Private Internet Access (PIA) VPN Client for Linux 1.5 through 2.3+ allows remote attackers to bypass an intended VPN kill switch mechanism and read sensitive information via intercepting network traffic. Since 1.5, PIA has supported a “split tunnel” OpenVPN bypass option. The PIA killswitch & associated iptables firewall is designed to protect you while using the Internet. When the kill switch is configured to block all inbound and outbound network traffic, privileged applications can continue sending & receiving network traffic if net.ipv4.ip_forward has been enabled in the system kernel parameters. For example, a Docker container running on a host with the VPN turned off, and the kill switch turned on, can continue using the internet, leaking the host IP (CWE 200). In PIA 2.4.0+, policy-based routing is enabled by default and is used to direct all forwarded packets to the VPN interface automatically.
CVE-2019-17014 1 Mozilla 1 Firefox 2021-07-21 4.3 MEDIUM 7.4 HIGH
If an image had not loaded correctly (such as when it is not actually an image), it could be dragged and dropped cross-domain, resulting in a cross-origin information leak. This vulnerability affects Firefox < 71.
CVE-2020-7955 1 Hashicorp 1 Consul 2021-07-21 5.0 MEDIUM 5.3 MEDIUM
HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.
CVE-2020-3852 1 Apple 1 Safari 2021-07-21 5.0 MEDIUM 5.3 MEDIUM
A logic issue was addressed with improved validation. This issue is fixed in Safari 13.0.5. A URL scheme may be incorrectly ignored when determining multimedia permission for a website.
CVE-2020-14214 1 Zammad 1 Zammad 2021-07-21 5.8 MEDIUM 6.5 MEDIUM
Zammad before 3.3.1, when Domain Based Assignment is enabled, relies on a claimed e-mail address for authorization decisions. An attacker can register a new account that will have access to all tickets of an arbitrary Organization.
CVE-2020-29454 1 Umbraco 1 Umbraco Cms 2021-07-21 4.0 MEDIUM 4.3 MEDIUM
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
CVE-2020-10534 1 Mediawiki 1 Mediawiki 2021-07-21 7.5 HIGH 9.8 CRITICAL
In the GlobalBlocking extension before 2020-03-10 for MediaWiki through 1.34.0, an issue related to IP range evaluation resulted in blocked users re-gaining escalated privileges. This is related to the case in which an IP address is contained in two ranges, one of which is locally disabled.
CVE-2020-0981 1 Microsoft 2 Windows 10, Windows Server 2016 2021-07-21 4.6 MEDIUM 8.8 HIGH
A security feature bypass vulnerability exists when Windows fails to properly handle token relationships.An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level, leading to a sandbox escape.The update addresses the vulnerability by correcting how Windows handles token relationships, aka 'Windows Token Security Feature Bypass Vulnerability'.
CVE-2020-24716 2 Freebsd, Openzfs 2 Freebsd, Openzfs 2021-07-21 4.6 MEDIUM 7.8 HIGH
OpenZFS before 2.0.0-rc1, when used on FreeBSD, allows execute permissions for all directories.
CVE-2020-12668 1 Hubspot 1 Jinjava 2021-07-21 6.8 MEDIUM 6.5 MEDIUM
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
CVE-2019-15729 1 Gitlab 1 Gitlab 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in GitLab Community and Enterprise Edition 8.18 through 12.2.1. An internal endpoint unintentionally disclosed information about the last pipeline that ran for a merge request.
CVE-2020-4249 1 Ibm 1 Security Identity Governance And Intelligence 2021-07-21 4.0 MEDIUM 6.5 MEDIUM
IBM Security Identity Governance and Intelligence 5.2.6 could disclose highly sensitive information to other authenticated users on the sytem due to incorrect authorization. IBM X-Force ID: 175485.
CVE-2020-6307 1 Sap 1 Basis 2021-07-21 4.0 MEDIUM 4.3 MEDIUM
Automated Note Search Tool (update provided in SAP Basis 7.0, 7.01, 7.02, 7.31, 7.4, 7.5, 7.51, 7.52, 7.53 and 7.54) does not perform sufficient authorization checks leading to the reading of sensitive information.
CVE-2021-26273 1 Ninjarmm 1 Ninjarmm 2021-07-08 4.6 MEDIUM 7.8 HIGH
The Agent in NinjaRMM 5.0.909 has Incorrect Access Control.
CVE-2021-27661 1 Johnsoncontrols 2 F4-snc, F4-snc Firmware 2021-07-07 6.5 MEDIUM 8.8 HIGH
Successful exploitation of this vulnerability could give an authenticated Facility Explorer SNC Series Supervisory Controller (F4-SNC) user an unintended level of access to the controller’s file system, allowing them to access or modify system files by sending specifically crafted web messages to the F4-SNC.
CVE-2021-36132 1 Mediawiki 1 Mediawiki 2021-07-07 6.0 MEDIUM 8.8 HIGH
An issue was discovered in the FileImporter extension in MediaWiki through 1.36. For certain relaxed configurations of the $wgFileImporterRequiredRight variable, it might not validate all appropriate user rights, thus allowing a user with insufficient rights to perform operations (specifically file uploads) that they should not be allowed to perform.