Vulnerabilities (CVE)

Search

Total 156334 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-21606 1 Jenkins 1 Jenkins 2021-01-15 4.0 MEDIUM 4.3 MEDIUM
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.
CVE-2021-1717 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2021-01-15 5.8 MEDIUM 5.4 MEDIUM
Microsoft SharePoint Spoofing Vulnerability This CVE ID is unique from CVE-2021-1641.
CVE-2021-21603 1 Jenkins 1 Jenkins 2021-01-15 3.5 LOW 5.4 MEDIUM
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents, resulting in a cross-site scripting (XSS) vulnerability.
CVE-2021-21602 1 Jenkins 1 Jenkins 2021-01-15 4.0 MEDIUM 6.5 MEDIUM
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.
CVE-2021-1650 1 Microsoft 6 Windows 10, Windows 8.1, Windows Rt 8.1 and 3 more 2021-01-15 7.2 HIGH 7.8 HIGH
Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
CVE-2020-4604 2 Ibm, Linux 2 Security Guardium Insights, Linux Kernel 2021-01-15 2.1 LOW 4.4 MEDIUM
IBM Security Guardium Insights 2.0.2 stores user credentials in plain in clear text which can be read by a local privileged user. IBM X-Force ID: 184861.
CVE-2020-16255 2021-01-15 N/A N/A
ownCloud (Core) before 10.5 allows XSS in login page 'forgot password.'
CVE-2020-26233 1 Microsoft 1 Git Credential Manager Core 2021-01-15 3.6 LOW 7.3 HIGH
Git Credential Manager Core (GCM Core) is a secure Git credential helper built on .NET Core that runs on Windows and macOS. In Git Credential Manager Core before version 2.0.289, when recursively cloning a Git repository on Windows with submodules, Git will first clone the top-level repository and then recursively clone all submodules by starting new Git processes from the top-level working directory. If a malicious git.exe executable is present in the top-level repository then this binary will be started by Git Credential Manager Core when attempting to read configuration, and not git.exe as found on the %PATH%. This only affects GCM Core on Windows, not macOS or Linux-based distributions. GCM Core version 2.0.289 contains the fix for this vulnerability, and is available from the project's GitHub releases page. GCM Core 2.0.289 is also bundled in the latest Git for Windows release; version 2.29.2(3). As a workaround, users should avoid recursively cloning untrusted repositories with the --recurse-submodules option.
CVE-2020-26981 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 4.3 MEDIUM 5.5 MEDIUM
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). When opening a specially crafted xml file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd.
CVE-2020-26982 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing CG4 and CGM files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26983 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing PDF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26984 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of JT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26985 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of RGB and SGI files. This could result in a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26986 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of JT files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26987 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of TGA files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26988 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26989 1 Siemens 3 Jt2go, Solid Edge, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), JT2Go (V 13.1.0), Solid Edge (All Versions < SE2021MP2), Teamcenter Visualization (All Versions < V13.1.0), Teamcenter Visualization (V 13.1.0). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26990 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), JT2Go (V 13.1.0), Teamcenter Visualization (All Versions < V13.1.0), Teamcenter Visualization (V 13.1.0). Affected applications lack proper validation of user-supplied data when parsing ASM files. A crafted ASM file can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26991 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), JT2Go (V 13.1.0), Teamcenter Visualization (All Versions < V13.1.0), Teamcenter Visualization (V 13.1.0). Affected applications lack proper validation of user-supplied data when parsing ASM files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process.
CVE-2020-26995 1 Siemens 2 Jt2go, Teamcenter Visualization 2021-01-15 6.8 MEDIUM 7.8 HIGH
A vulnerability has been identified in JT2Go (All Versions < V13.1.0), Teamcenter Visualization (All Versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of SGI and RGB files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.