Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
Total 32250 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-4005 1 Vmware 2 Cloud Foundation, Esxi 2024-11-21 7.2 HIGH 7.8 HIGH
VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG) contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, may escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability (e.g. CVE-2020-4004)
CVE-2020-4002 1 Vmware 1 Sd-wan Orchestrator 2024-11-21 6.5 MEDIUM 7.2 HIGH
The SD-WAN Orchestrator 3.3.2 prior to 3.3.2 P3, 3.4.x prior to 3.4.4, and 4.0.x prior to 4.0.1 handles system parameters in an insecure way. An authenticated SD-WAN Orchestrator user with high privileges may be able to execute arbitrary code on the underlying operating system.
CVE-2020-3998 2 Microsoft, Vmware 2 Windows, Horizon Client 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
VMware Horizon Client for Windows (5.x prior to 5.5.0) contains an information disclosure vulnerability. A malicious attacker with local privileges on the machine where Horizon Client for Windows is installed may be able to retrieve hashed credentials if the client crashes.
CVE-2020-3996 1 Vmware 1 Velero 2024-11-21 2.1 LOW 5.5 MEDIUM
Velero (prior to 1.4.3 and 1.5.2) in some instances doesn’t properly manage volume identifiers which may result in information leakage to unauthorized users.
CVE-2020-3985 1 Vmware 1 Sd-wan Orchestrator 2024-11-21 6.5 MEDIUM 8.8 HIGH
The SD-WAN Orchestrator 3.3.2 prior to 3.3.2 P3 and 3.4.x prior to 3.4.4 allows an access to set arbitrary authorization levels leading to a privilege escalation issue. An authenticated SD-WAN Orchestrator user may exploit an application weakness and call a vulnerable API to elevate their privileges.
CVE-2020-3980 2 Apple, Vmware 2 Mac Os X, Fusion 2024-11-21 3.7 LOW 6.7 MEDIUM
VMware Fusion (11.x) contains a privilege escalation vulnerability due to the way it allows configuring the system wide path. An attacker with normal user privileges may exploit this issue to trick an admin user into executing malicious code on the system where Fusion is installed.
CVE-2020-3974 2 Apple, Vmware 4 Macos, Fusion, Horizon Client and 1 more 2024-11-21 7.2 HIGH 7.8 HIGH
VMware Fusion (11.x before 11.5.5), VMware Remote Console for Mac (11.x and prior before 11.2.0 ) and Horizon Client for Mac (5.x and prior before 5.4.3) contain a privilege escalation vulnerability due to improper XPC Client validation. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMware Remote Console for Mac or Horizon Client for Mac is installed.
CVE-2020-3972 2 Apple, Vmware 2 Macos, Tools 2024-11-21 2.1 LOW 3.3 LOW
VMware Tools for macOS (11.x.x and prior before 11.1.1) contains a denial-of-service vulnerability in the Host-Guest File System (HGFS) implementation. Successful exploitation of this issue may allow attackers with non-admin privileges on guest macOS virtual machines to create a denial-of-service condition on their own VMs.
CVE-2020-3945 2 Microsoft, Vmware 2 Windows, Vrealize Operations 2024-11-21 5.0 MEDIUM 7.5 HIGH
vRealize Operations for Horizon Adapter (6.7.x prior to 6.7.1 and 6.6.x prior to 6.6.1) contains an information disclosure vulnerability due to incorrect pairing implementation between the vRealize Operations for Horizon Adapter and Horizon View. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may obtain sensitive information
CVE-2020-3943 2 Microsoft, Vmware 2 Windows, Vrealize Operations 2024-11-21 7.5 HIGH 9.8 CRITICAL
vRealize Operations for Horizon Adapter (6.7.x prior to 6.7.1 and 6.6.x prior to 6.6.1) uses a JMX RMI service which is not securely configured. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may be able to execute arbitrary code in vRealize Operations.
CVE-2020-3933 1 Secom 2 Dr.id Access Control, Dr.id Attendance System 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, allows attackers to enumerate and exam user account in the system.
CVE-2020-3932 1 Draytek 2 Vigorap 910c, Vigorap 910c Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
A vulnerable SNMP in Draytek VigorAP910C cannot be disabled, which may cause information leakage.
CVE-2020-3925 2 Changingtec, Microsoft 2 Servisign, Windows 2024-11-21 9.3 HIGH 8.3 HIGH
A Remote Code Execution(RCE) vulnerability exists in some designated applications in ServiSign security plugin, as long as the interface is captured, attackers are able to launch RCE and executes arbitrary command on target system via malicious crafted scripts.
CVE-2020-3917 1 Apple 4 Ipados, Iphone Os, Tvos and 1 more 2024-11-21 2.1 LOW 5.5 MEDIUM
This issue was addressed with a new entitlement. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2. An application may be able to use an SSH client provided by private frameworks.
CVE-2020-3916 1 Apple 3 Ipados, Iphone Os, Watchos 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An access issue was addressed with additional sandbox restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, watchOS 6.2. Setting an alternate app icon may disclose a photo without needing permission to access photos.
CVE-2020-3913 1 Apple 4 Ipados, Iphone Os, Mac Os X and 1 more 2024-11-21 6.8 MEDIUM 7.8 HIGH
A permissions issue existed. This issue was addressed with improved permission validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, watchOS 6.2. A malicious application may be able to elevate privileges.
CVE-2020-3906 1 Apple 1 Mac Os X 2024-11-21 6.8 MEDIUM 7.8 HIGH
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Catalina 10.15.4. A maliciously crafted application may be able to bypass code signing enforcement.
CVE-2020-3899 1 Apple 7 Icloud, Ipad Os, Iphone Os and 4 more 2024-11-21 9.3 HIGH 8.8 HIGH
A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A remote attacker may be able to cause arbitrary code execution.
CVE-2020-3896 1 Apple 1 Mac Os X 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra. A malicious application may be able to overwrite arbitrary files.
CVE-2020-3891 1 Apple 3 Ipad Os, Iphone Os, Watchos 2024-11-21 2.1 LOW 2.4 LOW
A logic issue was addressed with improved state management. This issue is fixed in iOS 13.4 and iPadOS 13.4, watchOS 6.2. A person with physical access to a locked iOS device may be able to respond to messages even when replies are disabled.