Search Results (4397 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-18759 1 Dcce 2 Mac1100 Plc, Mac1100 Plc Firmware 2024-11-21 7.5 High
An information disclosure vulnerability exists in the EPA protocol of Dut Computer Control Engineering Co.'s PLC MAC1100.
CVE-2020-17495 1 Django-celery-results Project 1 Django-celery-results 2024-11-21 7.5 High
django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
CVE-2020-15954 2 Debian, Kde 2 Debian Linux, Kmail 2024-11-21 6.5 Medium
KDE KMail 19.12.3 (aka 5.13.3) engages in unencrypted POP3 communication during times when the UI indicates that encryption is in use.
CVE-2020-15935 1 Fortinet 1 Fortiadc 2024-11-21 4.3 Medium
A cleartext storage of sensitive information in GUI in FortiADC versions 5.4.3 and below, 6.0.0 and below may allow a remote authenticated attacker to retrieve some sensitive information such as users LDAP passwords and RADIUS shared secret by deobfuscating the passwords entry fields.
CVE-2020-15785 1 Siemens 1 Siveillance Video Client 2024-11-21 5.3 Medium
A vulnerability has been identified in Siveillance Video Client (All versions). In environments where Windows NTLM authentication is enabled the affected client application transmits usernames to the server in cleartext. This could allow an attacker in a privileged network position to obtain valid adminstrator login names and use this information to launch further attacks.
CVE-2020-15784 1 Siemens 1 Spectrum Power 4 2024-11-21 5.3 Medium
A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP8). Insecure storage of sensitive information in the configuration files could allow the retrieval of user names.
CVE-2020-15771 1 Gradle 2 Enterprise, Enterprise Cache Node 2024-11-21 7.5 High
An issue was discovered in Gradle Enterprise 2018.2 and Gradle Enterprise Build Cache Node 4.1. Cross-site transmission of cookie containing CSRF token allows remote attacker to bypass CSRF mitigation.
CVE-2020-15767 1 Gradle 1 Enterprise 2024-11-21 5.3 Medium
An issue was discovered in Gradle Enterprise before 2020.2.5. The cookie used to convey the CSRF prevention token is not annotated with the “secure” attribute, which allows an attacker with the ability to MITM plain HTTP requests to obtain it, if the user mistakenly uses a HTTP instead of HTTPS address to access the server. This cookie value could then be used to perform CSRF.
CVE-2020-15509 1 Nordicsemi 2 Android Ble Library, Dfu Library 2024-11-21 6.5 Medium
Nordic Semiconductor Android BLE Library through 2.2.1 and DFU Library through 1.10.4 for Android (as used by nRF Connect and other applications) can engage in unencrypted communication while showing the user that the communication is purportedly encrypted. The problem is in bond creation (e.g., internalCreateBond in BleManagerHandler).
CVE-2020-15485 1 Niscomed 2 M1000 Multipara Patient Monitor, M1000 Multipara Patient Monitor Firmware 2024-11-21 5.5 Medium
An issue was discovered on Nescomed Multipara Monitor M1000 devices. The onboard Flash memory stores data in cleartext, without integrity protection against tampering.
CVE-2020-15484 1 Niscomed 2 M1000 Multipara Patient Monitor, M1000 Multipara Patient Monitor Firmware 2024-11-21 7.5 High
An issue was discovered on Nescomed Multipara Monitor M1000 devices. The internal storage of the underlying Linux system stores data in cleartext, without integrity protection against tampering.
CVE-2020-15482 1 Niscomed 2 M1000 Multipara Patient Monitor, M1000 Multipara Patient Monitor Firmware 2024-11-21 7.8 High
An issue was discovered on Nescomed Multipara Monitor M1000 devices. The device enables an unencrypted TELNET service by default, with a blank password for the admin account. This allows an attacker to gain root access to the device over the local network.
CVE-2020-15384 1 Broadcom 1 Sannav 2024-11-21 5.3 Medium
Brocade SANNav before version 2.1.1 contains an information disclosure vulnerability. Successful exploitation of internal server information in the initial login response header.
CVE-2020-15346 1 Zyxel 1 Cloudcnm Secumanager 2024-11-21 5.3 Medium
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a /live/GLOBALS API with the CLOUDCNM key.
CVE-2020-15345 1 Zyxel 1 Cloudcnm Secumanager 2024-11-21 5.3 Medium
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an unauthenticated zy_get_instances_for_update API.
CVE-2020-15344 1 Zyxel 1 Cloudcnm Secumanager 2024-11-21 5.3 Medium
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an unauthenticated zy_get_user_id_and_key API.
CVE-2020-15343 1 Zyxel 1 Cloudcnm Secumanager 2024-11-21 5.3 Medium
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an unauthenticated zy_install_user_key API.
CVE-2020-15342 1 Zyxel 1 Cloudcnm Secumanager 2024-11-21 5.3 Medium
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an unauthenticated zy_install_user API.
CVE-2020-15340 1 Zyxel 1 Cloudcnm Secumanager 2024-11-21 7.5 High
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded opt/axess/AXAssets/default_axess/axess/TR69/Handlers/turbolink/sshkeys/id_rsa SSH key.
CVE-2020-15332 1 Zyxel 1 Cloudcnm Secumanager 2024-11-21 9.8 Critical
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has weak /opt/axess/etc/default/axess permissions.