Vulnerabilities > Low

DATE CVE VULNERABILITY TITLE RISK
2020-08-19 CVE-2020-9706 Out-of-bounds Read vulnerability in Adobe Acrobat DC
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an out-of-bounds read vulnerability.
local
low complexity
adobe CWE-125
3.3
2020-08-13 CVE-2020-13282 Improper Preservation of Permissions vulnerability in Gitlab
For GitLab before 13.0.12, 13.1.6, 13.2.3 after a group transfer occurs, members from a parent group keep their access level on the subgroup leading to improper access.
network
low complexity
gitlab CWE-281
3.5
2020-08-12 CVE-2020-6653 Information Exposure Through Log Files vulnerability in Eaton Secureconnect 1.7.3
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app.
low complexity
eaton CWE-532
3.9
2020-08-12 CVE-2020-2035 Unspecified vulnerability in Paloaltonetworks Pan-Os
When SSL/TLS Forward Proxy Decryption mode has been configured to decrypt the web transactions, the PAN-OS URL filtering feature inspects the HTTP Host and URL path headers for policy enforcement on the decrypted HTTPS web transactions but does not consider Server Name Indication (SNI) field within the TLS Client Hello handshake.
network
high complexity
paloaltonetworks
3.0
2020-08-11 CVE-2020-8912 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Amazon AWS S3 Crypto SDK 1/2
A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2.
local
high complexity
amazon CWE-327
2.5
2020-08-11 CVE-2020-16092 Reachable Assertion vulnerability in multiple products
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing.
local
low complexity
qemu debian canonical opensuse CWE-617
3.8
2020-08-05 CVE-2020-4243 Session Fixation vulnerability in IBM Security Identity Governance and Intelligence 5.2.6
IBM Security Identity Governance and Intelligence 5.2.6 Virtual Appliance could allow a remote attacker to obtain sensitive information using man in the middle techniques due to not properly invalidating session tokens.
network
high complexity
ibm CWE-384
3.7
2020-08-04 CVE-2020-16201 Out-of-bounds Read vulnerability in Deltaww Cncsoft Screeneditor 1.00.88/1.00.96/1.01.23
Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and prior.
local
low complexity
deltaww CWE-125
3.3
2020-08-04 CVE-2020-13523 Missing Authorization vulnerability in Softperfect RAM Disk 4.1
An exploitable information disclosure vulnerability exists in SoftPerfect’s RAM Disk 4.1 spvve.sys driver.
local
low complexity
softperfect CWE-862
3.3
2020-08-03 CVE-2020-16116 Path Traversal vulnerability in multiple products
In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.
3.3