2020-11-06
|
CVE-2020-25592
|
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
|
Debian_linux, Salt
|
9.8
|
|
|
2020-11-06
|
CVE-2017-18926
|
raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).
|
Debian_linux, Fedora, Raptor_rdf_syntax_library
|
7.1
|
|
|
2020-11-12
|
CVE-2020-8695
|
Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
|
Debian_linux, Fedora, Celeron_3855u_firmware, Celeron_3865u_firmware, Celeron_3955u_firmware, Celeron_3965u_firmware, Celeron_3965y_firmware, Celeron_g3900_firmware, Celeron_g3900e_firmware, Celeron_g3900t_firmware, Celeron_g3900te_firmware, Celeron_g3902e_firmware, Celeron_g3920_firmware, Celeron_g3920t_firmware, Celeron_g3930e_firmware, Celeron_g3930te_firmware, Celeron_g3940_firmware, Celeron_g4900_firmware, Celeron_g4900t_firmware, Celeron_g4920_firmware, Celeron_j4005_firmware, Celeron_j4025_firmware, Celeron_j4105_firmware, Celeron_j4125_firmware, Celeron_n4000_firmware, Celeron_n4020_firmware, Celeron_n4100_firmware, Celeron_n4120_firmware, Core_4205u_firmware, Core_5405u_firmware, Core_i3\-1000g1_firmware, Core_i3\-1000g4_firmware, Core_i3\-1005g1_firmware, Core_i3\-10100f_firmware, Core_i3\-6100_firmware, Core_i3\-6100e_firmware, Core_i3\-6100h_firmware, Core_i3\-6100t_firmware, Core_i3\-6100te_firmware, Core_i3\-6100u_firmware, Core_i3\-6102e_firmware, Core_i3\-6110u_firmware, Core_i3\-6120_firmware, Core_i3\-6120t_firmware, Core_i3\-6167u_firmware, Core_i3\-6300_firmware, Core_i3\-6300t_firmware, Core_i3\-6320_firmware, Core_i3\-6320t_firmware, Core_i3\-7007u_firmware, Core_i3\-7020u_firmware, Core_i3\-7100e_firmware, Core_i3\-7100h_firmware, Core_i3\-7100u_firmware, Core_i3\-7101e_firmware, Core_i3\-7101te_firmware, Core_i3\-7102e_firmware, Core_i3\-7110u_firmware, Core_i3\-7120_firmware, Core_i3\-7120t_firmware, Core_i3\-7130u_firmware, Core_i3\-7320t_firmware, Core_i3\-7340_firmware, Core_i3\-7367u_firmware, Core_i3\-8000_firmware, Core_i3\-8000t_firmware, Core_i3\-8020_firmware, Core_i3\-8100_firmware, Core_i3\-8100h_firmware, Core_i3\-8100t_firmware, Core_i3\-8109u_firmware, Core_i3\-8120_firmware, Core_i3\-8145u_firmware, Core_i3\-8300_firmware, Core_i3\-8300t_firmware, Core_i5\-1030g4_firmware, Core_i5\-1030g7_firmware, Core_i5\-1035g1_firmware, Core_i5\-1035g4_firmware, Core_i5\-1035g7_firmware, Core_i5\-6200u_firmware, Core_i5\-6210u_firmware, Core_i5\-6260u_firmware, Core_i5\-6267u_firmware, Core_i5\-6287u_firmware, Core_i5\-6300hq_firmware, Core_i5\-6300u_firmware, Core_i5\-6310u_firmware, Core_i5\-6350hq_firmware, Core_i5\-6360u_firmware, Core_i5\-6400_firmware, Core_i5\-6400t_firmware, Core_i5\-6440eq_firmware, Core_i5\-6440hq_firmware, Core_i5\-6442eq_firmware, Core_i5\-6500_firmware, Core_i5\-6500t_firmware, Core_i5\-6500te_firmware, Core_i5\-6600_firmware, Core_i5\-6600k_firmware, Core_i5\-6600t_firmware, Core_i5\-7200u_firmware, Core_i5\-7210u_firmware, Core_i5\-7260u_firmware, Core_i5\-7267u_firmware, Core_i5\-7287u_firmware, Core_i5\-7300hq_firmware, Core_i5\-7300u_firmware, Core_i5\-7360u_firmware, Core_i5\-7400_firmware, Core_i5\-7400t_firmware, Core_i5\-7440eq_firmware, Core_i5\-7440hq_firmware, Core_i5\-7442eq_firmware, Core_i5\-7500_firmware, Core_i5\-7500t_firmware, Core_i5\-7500u_firmware, Core_i5\-7600_firmware, Core_i5\-7600k_firmware, Core_i5\-7600t_firmware, Core_i5\-7640x_firmware, Core_i5\-7y54_firmware, Core_i5\-7y57_firmware, Core_i5\-8200y_firmware, Core_i5\-8210y_firmware, Core_i5\-8250u_firmware, Core_i5\-8259u_firmware, Core_i5\-8265u_firmware, Core_i5\-8269u_firmware, Core_i5\-8300h_firmware, Core_i5\-8305g_firmware, Core_i5\-8310y_firmware, Core_i5\-8350u_firmware, Core_i5\-8365u_firmware, Core_i5\-8400_firmware, Core_i5\-8400b_firmware, Core_i5\-8400h_firmware, Core_i5\-8400t_firmware, Core_i5\-8420_firmware, Core_i5\-8420t_firmware, Core_i5\-8500_firmware, Core_i5\-8500b_firmware, Core_i5\-8500t_firmware, Core_i5\-8550_firmware, Core_i5\-8600_firmware, Core_i5\-8600k_firmware, Core_i5\-8600t_firmware, Core_i5\-8650_firmware, Core_i5\-8650k_firmware, Core_i5\-9300h_firmware, Core_i5\-9400_firmware, Core_i5\-9400f_firmware, Core_i5\-9400h_firmware, Core_i5\-9600k_firmware, Core_i5\-9600kf_firmware, Core_i7\-1060g7_firmware, Core_i7\-10610u_firmware, Core_i7\-1065g7_firmware, Core_i7\-10710u_firmware, Core_i7\-10750h_firmware, Core_i7\-6500u_firmware, Core_i7\-6510u_firmware, Core_i7\-6560u_firmware, Core_i7\-6567u_firmware, Core_i7\-6600u_firmware, Core_i7\-6650u_firmware, Core_i7\-6660u_firmware, Core_i7\-6700_firmware, Core_i7\-6700hq_firmware, Core_i7\-6700k_firmware, Core_i7\-6700t_firmware, Core_i7\-6700te_firmware, Core_i7\-6770hq_firmware, Core_i7\-6820eq_firmware, Core_i7\-6820hk_firmware, Core_i7\-6820hq_firmware, Core_i7\-6822eq_firmware, Core_i7\-6870hq_firmware, Core_i7\-6920hq_firmware, Core_i7\-6970hq_firmware, Core_i7\-7500u_firmware, Core_i7\-7510u_firmware, Core_i7\-7560u_firmware, Core_i7\-7567u_firmware, Core_i7\-7600u_firmware, Core_i7\-7660u_firmware, Core_i7\-7700_firmware, Core_i7\-7700hq_firmware, Core_i7\-7700k_firmware, Core_i7\-7700t_firmware, Core_i7\-7740x_firmware, Core_i7\-7820eq_firmware, Core_i7\-7820hk_firmware, Core_i7\-7820hq_firmware, Core_i7\-7920hq_firmware, Core_i7\-7y75_firmware, Core_i7\-8500y_firmware, Core_i7\-8510y_firmware, Core_i7\-8550u_firmware, Core_i7\-8559u_firmware, Core_i7\-8565u_firmware, Core_i7\-8650u_firmware, Core_i7\-8665u_firmware, Core_i7\-8670_firmware, Core_i7\-8670t_firmware, Core_i7\-8700_firmware, Core_i7\-8700b_firmware, Core_i7\-8700k_firmware, Core_i7\-8700t_firmware, Core_i7\-8705g_firmware, Core_i7\-8706g_firmware, Core_i7\-8709g_firmware, Core_i7\-8750h_firmware, Core_i7\-8809g_firmware, Core_i7\-8850h_firmware, Core_i7\-9700k_firmware, Core_i7\-9700kf_firmware, Core_i7\-9750hf_firmware, Core_i7\-9850h_firmware, Core_i8130u_firmware, Core_i8350k_firmware, Core_i9\-10900_firmware, Core_i9\-8950hk_firmware, Core_i9\-9880h_firmware, Core_i9\-9900k_firmware, Core_i9\-9900kf_firmware, Core_i9\-9980hk_firmware, Core_m3\-6y30_firmware, Core_m3\-7y30_firmware, Core_m3\-8100y_firmware, Core_m5\-6y54_firmware, Core_m5\-6y57_firmware, Core_m7\-6y75_firmware, Pentium_4405u_firmware, Pentium_4405y_firmware, Pentium_4410y_firmware, Pentium_4415u_firmware, Pentium_4415y_firmware, Pentium_g4400_firmware, Pentium_g4400t_firmware, Pentium_g4400te_firmware, Pentium_g4420_firmware, Pentium_g4420t_firmware, Pentium_g4500_firmware, Pentium_g4500t_firmware, Pentium_g4520_firmware, Pentium_g4520t_firmware, Pentium_g4540_firmware, Pentium_gold_g5400_firmware, Pentium_gold_g5400t_firmware, Pentium_gold_g5420_firmware, Pentium_gold_g5420t_firmware, Pentium_gold_g5500_firmware, Pentium_gold_g5500t_firmware, Pentium_gold_g5600_firmware, Pentium_silver_j5005_firmware, Pentium_silver_j5040_firmware, Pentium_silver_n5000_firmware, Pentium_silver_n5030_firmware, Xeon_e3\-1220_firmware, Xeon_e3\-1225_firmware, Xeon_e3\-1230_firmware, Xeon_e3\-1235l_firmware, Xeon_e3\-1240_firmware, Xeon_e3\-1240l_firmware, Xeon_e3\-1245_firmware, Xeon_e3\-1260l_firmware, Xeon_e3\-1268l_firmware, Xeon_e3\-1270_firmware, Xeon_e3\-1275_firmware, Xeon_e3\-1280_firmware, Xeon_e3\-1501l_firmware, Xeon_e3\-1501m_firmware, Xeon_e3\-1505l_firmware, Xeon_e3\-1505m_firmware, Xeon_e3\-1515m_firmware, Xeon_e3\-1535m_firmware, Xeon_e3\-1545m_firmware, Xeon_e3\-1558l_firmware, Xeon_e3\-1565l_firmware, Xeon_e3\-1575m_firmware, Xeon_e3\-1578l_firmware, Xeon_e3\-1585_firmware, Xeon_e3\-1585l_firmware, Xeon_e\-2124_firmware, Xeon_e\-2124g_firmware, Xeon_e\-2126g_firmware, Xeon_e\-2134_firmware, Xeon_e\-2136_firmware, Xeon_e\-2144g_firmware, Xeon_e\-2146g_firmware, Xeon_e\-2174g_firmware, Xeon_e\-2176g_firmware, Xeon_e\-2176m_firmware, Xeon_e\-2186g_firmware, Xeon_e\-2278g_firmware, Xeon_e\-2278ge_firmware, Xeon_e\-2278gel_firmware, Xeon_e\-2286m_firmware, Xeon_e\-2288g_firmware, Xeon_e\-2486g_firmware
|
5.5
|
|
|
2020-11-10
|
CVE-2020-28368
|
Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
|
Debian_linux, Fedora, Xen
|
4.4
|
|
|
2020-11-12
|
CVE-2020-25706
|
A cross-site scripting (XSS) vulnerability exists in templates_import.php (Cacti 1.2.13) due to Improper escaping of error message during template import preview in the xml_path field
|
Cacti, Debian_linux
|
6.1
|
|
|
2020-11-12
|
CVE-2020-8696
|
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
|
Debian_linux, Fedora, Microcode, Clustered_data_ontap, Hci_storage_node_bios, Hcl_compute_node_bios, Solidfire_bios
|
5.5
|
|
|
2020-11-12
|
CVE-2020-8698
|
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
|
Debian_linux, Fedora, Microcode, Clustered_data_ontap, Hci_compute_node_bios, Hci_storage_node_bios, Solidfire_bios, Simatic_field_pg_m5_firmware, Simatic_field_pg_m6_firmware, Simatic_ipc427e_firmware, Simatic_ipc477e_firmware, Simatic_ipc477e_pro_firmware, Simatic_ipc627e_firmware, Simatic_ipc647e_firmware, Simatic_ipc677e_firmware, Simatic_ipc847e_firmware, Simatic_itp1000_firmware
|
5.5
|
|
|
2020-11-16
|
CVE-2020-26217
|
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
|
Activemq, Debian_linux, Snapmanager, Banking_cash_management, Banking_corporate_lending_process_management, Banking_credit_facilities_process_management, Banking_platform, Banking_supply_chain_finance, Banking_trade_finance_process_management, Banking_virtual_account_management, Business_activity_monitoring, Communications_policy_management, Endeca_information_discovery_studio, Retail_xstore_point_of_service, Xstream
|
8.8
|
|
|
2020-11-19
|
CVE-2020-28941
|
An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.
|
Debian_linux, Fedora, Linux_kernel
|
5.5
|
|
|
2020-11-19
|
CVE-2020-28948
|
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked.
|
Debian_linux, Drupal, Fedora, Archive_tar
|
7.8
|
|
|