Vulnerabilities > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-12-01 | CVE-2020-11990 | Unspecified vulnerability in Apache Cordova 4.1.0 We have resolved a security issue in the camera plugin that could have affected certain Cordova (Android) applications. | 3.3 |
2020-11-30 | CVE-2020-11867 | Incorrect Default Permissions vulnerability in multiple products Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. | 3.3 |
2020-11-30 | CVE-2020-6317 | Information Exposure Through Log Files vulnerability in SAP Adaptive Server Enterprise 15.7/16.0 In certain situations, an attacker with regular user credentials and local access to an ASE cockpit installation can access sensitive information which appears in the installation log files. | 3.5 |
2020-11-28 | CVE-2020-29374 | Incorrect Authorization vulnerability in multiple products An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. | 3.6 |
2020-11-28 | CVE-2020-29371 | Use of Uninitialized Resource vulnerability in Linux Kernel An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. | 3.3 |
2020-11-27 | CVE-2020-27746 | Race Condition vulnerability in multiple products Slurm before 19.05.8 and 20.x before 20.02.6 exposes Sensitive Information to an Unauthorized Actor because xauth for X11 magic cookies is affected by a race condition in a read operation on the /proc filesystem. | 3.7 |
2020-11-26 | CVE-2020-29042 | Improper Restriction of Excessive Authentication Attempts vulnerability in Bigbluebutton An issue was discovered in BigBlueButton through 2.2.29. | 3.7 |
2020-11-23 | CVE-2020-26229 | Unspecified vulnerability in Typo3 TYPO3 is an open source PHP based web content management system. | 3.7 |
2020-11-23 | CVE-2020-25688 | Use of Hard-coded Credentials vulnerability in Redhat Advanced Cluster Management for Kubernetes A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. | 3.5 |
2020-11-19 | CVE-2020-6879 | Improper Input Validation vulnerability in ZTE Zxhn F670L Firmware and Zxhn Z500 Firmware Some ZTE devices have input verification vulnerabilities. | 3.5 |