Vulnerability Summary for the Week of August 10, 2020

Released
Aug 17, 2020
Document ID
SB20-230

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.

Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High: vulnerabilities with a CVSS base score of 7.0–10.0
  • Medium: vulnerabilities with a CVSS base score of 4.0–6.9
  • Low: vulnerabilities with a CVSS base score of 0.0–3.9

Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. 


 

High Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
apache -- http_serverApache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE2020-08-077.5CVE-2020-11984
MLIST
MLIST
MLIST
MLIST
MLIST
MISC
MLIST
MLIST
GENTOO
CONFIRM
digitus -- da-70254_firmwareDIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.2020-08-078.3CVE-2020-15063
MISC
firejail_project -- firejailFirejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.2020-08-117.5CVE-2020-17368
SUSE
MISC
DEBIAN
DEBIAN
flatcore -- flatcoreflatCore before 1.5.7 allows upload and execution of a .php file by an admin.2020-08-099CVE-2020-17452
MISC
MISC
google -- androidThere is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-1526477512020-08-117.8CVE-2020-0254
MISC
google -- androidIn android_verity_ctr of dm-android-verity.c, there is a possible way to modify a dm-verity protected filesystem due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-157941353References: N/A2020-08-117.2CVE-2020-0259
MISC
google -- androidIn SpecializeCommon of com_android_internal_os_Zygote.cpp, there is a permissions bypass due to an incomplete cleanup. This could lead to local escalation of privilege in isolated processes with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-1567419682020-08-117.2CVE-2020-0257
MISC
google -- androidIn LoadPartitionTable of gpt.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when inserting a malicious USB device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-1528748642020-08-117.2CVE-2020-0256
MISC
google -- androidIn clearPropValue of MediaAnalyticsItem.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-8.0 Android-8.1Android ID: A-1516443032020-08-117.2CVE-2020-0243
MISC
google -- androidIn reset of NuPlayerDriver.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-1516437222020-08-117.2CVE-2020-0242
MISC
google -- androidIn NuPlayerStreamListener of NuPlayerStreamListener.cpp, there is possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-1514566672020-08-117.2CVE-2020-0241
MISC
google -- androidIn postNotification of ServiceRecord.java, there is a possible bypass of foreground process restrictions due to an uncaught exception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-1401086162020-08-117.2CVE-2020-0108
MISC
google -- androidThere is a possible memory corruption due to a use after free.Product: AndroidVersions: Android SoCAndroid ID: A-1526473652020-08-1110CVE-2020-0253
MISC
google -- androidThere is a possible memory corruption due to a use after free.Product: AndroidVersions: Android SoCAndroid ID: A-1522368032020-08-1110CVE-2020-0252
MISC
google -- androidThere is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-1526476262020-08-117.8CVE-2020-0251
MISC
google -- androidIn NewFixedDoubleArray of factory.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-1507065942020-08-119.3CVE-2020-0240
MISC
ibm -- websphere_application_serverIBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially-crafted sequence of serialized objects from untrusted sources. The vulnerability only occurs if an undocumented customization has been applied by an administrator. IBM X-Force ID: 184585.2020-08-1310CVE-2020-4589
XF
CONFIRM
json_pattern_validator_project -- json_pattern_validatorjpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array.2020-08-107.5CVE-2020-17479
MISC
MISC
MISC
MISC
lindy-international -- 42633_firmwareLindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.2020-08-078.3CVE-2020-15059
MISC
microfocus -- secure_messaging_gatewayDKIM key management page vulnerability on Micro Focus Secure Messaging Gateway (SMG). Affecting all SMG Appliance running releases prior to July 2020. The vulnerability could allow a logged in user with rights to generate DKIM key information to inject system commands into the call to the DKIM system command.2020-08-079CVE-2020-11852
MISC
mozilla -- firefoxJIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.2020-08-109.3CVE-2020-15656
SUSE
MISC
MISC
MISC
MISC
opensuse -- tumbleweedA Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.2020-08-077.2CVE-2020-8026
CONFIRM
passmark -- burnintestAn issue was discovered in PassMark BurnInTest through 9.1, OSForensics through 7.1, and PerformanceTest through 10. The driver's IOCTL request handler attempts to copy the input buffer onto the stack without checking its size and can cause a buffer overflow. This could lead to arbitrary Ring-0 code execution and escalation of privileges. This affects DirectIo32.sys and DirectIo64.sys.2020-08-077.2CVE-2020-15479
MISC
MISC
MISC
MISC
passmark -- burnintestAn issue was discovered in PassMark BurnInTest through 9.1, OSForensics through 7.1, and PerformanceTest through 10. The kernel driver exposes IOCTL functionality that allows low-privilege users to map arbitrary physical memory into the address space of the calling process. This could lead to arbitrary Ring-0 code execution and escalation of privileges. This affects DirectIo32.sys and DirectIo64.sys.2020-08-077.2CVE-2020-15480
MISC
MISC
MISC
MISC
robotemi -- robox_osAuthentication Bypass Using an Alternate Path or Channel in Robotemi Global Ltd Temi Firmware up to 20190419.165201, Launcher OS prior to 11969-13146, Robox OS prior to 117.21-119.24, and their Android phone app prior to 1.3.3-1.3.7931 allows remote attackers to listen in on any ongoing calls between temi robots and their users if they can brute-force/guess a six-digit value.2020-08-077.5CVE-2020-16169
MISC
MISC
robotemi -- temiUse of Hard-coded Credentials in Robotemi Global Ltd Temi Firmware up to 20190419.165201, Launcher OS prior to 11969-13146, Robox OS prior to 117.21-119.24, and their Android phone app prior to 1.3.3-1.3.7931 allows remote attackers to gain raised privileges on the temi and have it automatically answer the attacker's calls, granting audio, video, and motor control.2020-08-117.5CVE-2020-16170
MISC
MISC
sap -- netweaverSAP NetWeaver AS JAVA, versions - (ENGINEAPI 7.10; WSRM 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; J2EE-FRMW 7.10, 7.11), does not perform any authentication checks for a web service allowing the attacker to send several payloads and leading to complete denial of service.2020-08-127.8CVE-2020-6309
MISC
MISC
sap -- netweaver_knowledge_managementSAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows the automatic execution of script content in a stored file due to inadequate filtering with the accessing user's privileges. If the accessing user has administrative privileges, then the execution of the script content could result in complete compromise of system confidentiality, integrity and availability, leading to Stored Cross Site Scripting.2020-08-128.5CVE-2020-6284
MISC
MISC
securenvoy -- securmailSecurEnvoy SecurMail 9.3.503 allows attackers to upload executable files and achieve OS command execution via a crafted SecurEnvoyReply cookie.2020-08-079.3CVE-2020-13376
MISC
MISC
thedaylightstudio -- fuel_cmsFUEL CMS 1.4.7 allows SQL Injection via the col parameter to /pages/items, /permissions/items, or /navigation/items.2020-08-137.5CVE-2020-17463
MISC
MISC
MISC
CONFIRM
tp-link -- tl-ps310u_firmwareTP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.2020-08-078.3CVE-2020-15055
MISC
turcom -- trcwifizoneTurcom TRCwifiZone through 2020-08-10 allows authentication bypass by visiting manage/control.php and ignoring 302 Redirect responses.2020-08-117.5CVE-2020-17466
MISC
MISC
zohocorp -- manageengine_adselfservice_plusAn elevation of privilege vulnerability exists in ManageEngine ADSelfService Plus before build 6003 because it does not properly enforce user privileges associated with a Certificate dialog. This vulnerability could allow an unauthenticated attacker to escalate privileges on a Windows host. An attacker does not require any privilege on the target system in order to exploit this vulnerability. One option is the self-service option on the Windows login screen. Upon selecting this option, the thick-client software is launched, which connects to a remote ADSelfService Plus server to facilitate self-service operations. An unauthenticated attacker having physical access to the host could trigger a security alert by supplying a self-signed SSL certificate to the client. The View Certificate option from the security alert allows an attacker to export a displayed certificate to a file. This can further cascade to a dialog that can open Explorer as SYSTEM. By navigating from Explorer to \windows\system32, cmd.exe can be launched as a SYSTEM.2020-08-1110CVE-2020-11552
MISC
MISC
FULLDISC
CONFIRM
MISC
MISC

Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
accuity -- firco_continuityA stored Cross-site scripting (XSS) vulnerability in Firco Continuity 6.2.0.0 allows remote unauthenticated attackers to inject arbitrary web script or HTML through the username field of the login page.2020-08-124.3CVE-2020-16186
MISC
apache -- http_serverApache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.2020-08-074.3CVE-2020-11993
MISC
MLIST
MLIST
MLIST
GENTOO
CONFIRM
apache -- http_serverApache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.2020-08-075CVE-2020-9490
MISC
MLIST
MLIST
MLIST
GENTOO
CONFIRM
apache -- http_serverIP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.2020-08-074.3CVE-2020-11985
MISC
GENTOO
apache -- wicketBy crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M52020-08-115CVE-2020-11976
MISC
artifex -- ghostscriptA buffer overflow vulnerability in pj_common_print_page() in devices/gdevpjet.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16288
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in GetNumSameData() in contrib/lips4/gdevlips.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-17538
MISC
MISC
artifex -- ghostscriptA use-after-free vulnerability in xps_finish_image_path() in devices/vector/gdevxps.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted PDF file. This is fixed in v9.51.2020-08-136.8CVE-2020-16303
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in jetp3852_print_page() in devices/gdev3852.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted PDF file. This is fixed in v9.51.2020-08-136.8CVE-2020-16302
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in lxm5700m_print_page() in devices/gdevlxm.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted eps file. This is fixed in v9.51.2020-08-134.3CVE-2020-16309
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in p_print_image() in devices/gdevcdj.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16308
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in epsc_print_page() in devices/gdevepsc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16294
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in tiff12_print_page() in devices/gdevtfnx.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16300
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in lprn_is_black() in contrib/lips4/gdevlprn.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16287
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51.2020-08-136.8CVE-2020-16304
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in cif_print_page() in devices/gdevcif.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16289
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in FloydSteinbergDitheringC() in contrib/gdevbjca.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16297
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in okiibm_print_page1() in devices/gdevokii.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16301
MISC
MISC
artifex -- ghostscriptA null pointer dereference vulnerability in compose_group_nonknockout_nonblend_isolated_allmask_common() in base/gxblend.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16293
MISC
MISC
artifex -- ghostscriptA Division by Zero vulnerability in bj10v_print_page() in contrib/japanese/gdev10v.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16299
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in mj_color_correct() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16298
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in pcx_write_rle() in contrib/japanese/gdev10v.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16305
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in GetNumWrongData() in contrib/lips4/gdevlips.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16296
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in contrib/gdevdj9.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16291
MISC
MISC
artifex -- ghostscriptA null pointer dereference vulnerability in clj_media_size() in devices/gdevclj.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16295
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in jetp3852_print_page() in devices/gdev3852.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16290
MISC
MISC
artifex -- ghostscriptA buffer overflow vulnerability in mj_raster_cmd() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-134.3CVE-2020-16292
MISC
MISC
avaya -- ip_officeA vulnerability was discovered in the web interface component of IP Office that may potentially allow a remote, unauthenticated user with network access to gain sensitive information. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 through 11.0.4.2.2020-08-075CVE-2019-7005
CONFIRM
carson-saint -- saint_security_suiteA cross-site scripting (XSS) vulnerability in the Credential Manager component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.2020-08-104.3CVE-2020-16275
CONFIRM
carson-saint -- saint_security_suiteA cross-site scripting (XSS) vulnerability in the Permissions component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.2020-08-104.3CVE-2020-16278
CONFIRM
carson-saint -- saint_security_suiteAn SQL injection vulnerability in the Assets component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.2020-08-106.5CVE-2020-16276
CONFIRM
carson-saint -- saint_security_suiteAn SQL injection vulnerability in the Analytics component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.2020-08-106.5CVE-2020-16277
CONFIRM
combodo -- itopA function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.2020-08-105CVE-2020-12777
MISC
combodo -- itopA security misconfiguration exists in Combodo iTop, which can expose sensitive information.2020-08-105CVE-2020-12780
MISC
combodo -- itopCombodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.2020-08-106.8CVE-2020-12781
MISC
combodo -- itopCombodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.2020-08-104.3CVE-2020-12778
MISC
cs2-network -- p2pCS2 Network P2P through 3.x, as used in millions of Internet of Things devices, suffers from an information exposure flaw that exposes user session data to supernodes in the network, as demonstrated by passively eavesdropping on user video/audio streams, capturing credentials, and compromising devices.2020-08-104.3CVE-2020-9526
MISC
MISC
cs2-network -- p2pCS2 Network P2P through 3.x, as used in millions of Internet of Things devices, suffers from an authentication flaw that allows remote attackers to perform a man-in-the-middle attack, as demonstrated by eavesdropping on user video/audio streams, capturing credentials, and compromising devices.2020-08-106.8CVE-2020-9525
MISC
MISC
deltaww -- tpeditorDelta Electronics TPEditor Versions 1.97 and prior. A heap-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.2020-08-076.8CVE-2020-16223
MISC
MISC
deltaww -- tpeditorDelta Electronics TPEditor Versions 1.97 and prior. An improper input validation may be exploited by processing a specially crafted project file not validated when the data is entered by a user. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.2020-08-076.8CVE-2020-16227
MISC
MISC
deltaww -- tpeditorDelta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.2020-08-076.8CVE-2020-16219
MISC
MISC
MISC
deltaww -- tpeditorDelta Electronics TPEditor Versions 1.97 and prior. A write-what-where condition may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.2020-08-076.8CVE-2020-16225
MISC
MISC
deltaww -- tpeditorDelta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.2020-08-076.8CVE-2020-16221
MISC
MISC
digitus -- da-70254_firmwareDIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to denial-of-service the device via long input values.2020-08-076.1CVE-2020-15065
MISC
django-celery-results_project -- django-celery-resultsdjango-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.2020-08-115CVE-2020-17495
MISC
f2fs-tools_project -- f2fs-toolsAn exploitable code execution vulnerability exists in the file system checking functionality of fsck.f2fs 1.12.0. A specially crafted f2fs file can cause a logic flaw and out-of-bounds heap operations, resulting in code execution. An attacker can provide a malicious file to trigger this vulnerability.2020-08-106.8CVE-2020-6070
MISC
firejail_project -- firejailFirejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.2020-08-114.6CVE-2020-17367
SUSE
MISC
MISC
DEBIAN
frappe -- erpnextAn SQL injection vulnerability exists in the frappe.desk.reportview.get functionality of ERPNext 11.1.38. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.2020-08-106.5CVE-2020-6145
MISC
getsymphony -- symphony_cmscontent/content.blueprintsevents.php in Symphony CMS 3.0.0 allows XSS via fields['name'] to appendSubheading.2020-08-114.3CVE-2020-15071
MISC
gitlab -- gitlabIn GitLab before 13.0.12, 13.1.6 and 13.2.3 using a branch with a hexadecimal name could override an existing hash.2020-08-105.5CVE-2020-13293
CONFIRM
MISC
MISC
gitlab -- gitlabIn GitLab before 13.0.12, 13.1.6 and 13.2.3, it is possible to bypass E-mail verification which is required for OAuth Flow.2020-08-105.5CVE-2020-13292
CONFIRM
MISC
MISC
gitlab -- gitlabFor GitLab before 13.0.12, 13.1.6, 13.2.3 user controlled git configuration settings can be modified to result in Server Side Request Forgery.2020-08-134CVE-2020-13286
CONFIRM
MISC
MISC
gitlab -- gitlabFor GitLab before 13.0.12, 13.1.6, 13.2.3 a denial of service exists in the project import feature2020-08-134CVE-2020-13281
CONFIRM
MISC
MISC
gitlab -- gitlabIn GitLab before 13.0.12, 13.1.6 and 13.2.3, access grants were not revoked when a user revoked access to an application.2020-08-105.5CVE-2020-13294
CONFIRM
MISC
MISC
gitlab -- runnerFor GitLab Runner before 13.0.12, 13.1.6, 13.2.3, by replacing dockerd with a malicious server, the Shared Runner is susceptible to SSRF.2020-08-106.5CVE-2020-13295
CONFIRM
MISC
MISC
google -- androidIn postInstantAppNotif of InstantAppNotifier.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-1546274392020-08-114.9CVE-2020-0248
MISC
google -- androidIn updatePreferenceIntents of AccountTypePreferenceLoader, there is a possible confused deputy attack due to a race condition. This could lead to local escalation of privilege and launching privileged activities with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-1509466342020-08-116.9CVE-2020-0238
MISC
google -- androidIn getDocumentMetadata of DocumentsContract.java, there is a possible disclosure of location metadata from a file due to a permissions bypass. This could lead to local information disclosure from a file (eg. a photo) containing location metadata with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-1510958632020-08-114.9CVE-2020-0239
MISC
google -- androidIn Threshold::getHistogram of ImageProcessHelper.java, there is a possible crash loop due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1Android ID: A-1560874092020-08-114.9CVE-2020-0247
MISC
google -- androidIn postInstantAppNotif of InstantAppNotifier.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-1547196562020-08-114.9CVE-2020-0249
MISC
google -- androidIn requestCellInfoUpdateInternal of PhoneInterfaceManager.java, there is a missing permission check. This could lead to local information disclosure of location data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-1549349342020-08-114.9CVE-2020-0250
MISC
google -- androidIn stopZygoteLocked of AppZygote.java, there is an insufficient cleanup. This could lead to local information disclosure in the application that is started next with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-1575989562020-08-114.9CVE-2020-0258
MISC
MISC
google -- androidThere is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-1522251832020-08-116.4CVE-2020-0260
MISC
google -- asyloA buffer length validation vulnerability in Asylo versions prior to 0.6.0 allows an attacker to read data they should not have access to. The 'enc_untrusted_recvfrom' function generates a return value which is deserialized by 'MessageReader', and copied into three different 'extents'. The length of the third 'extents' is controlled by the outside world, and not verified on copy, allowing the attacker to force Asylo to copy trusted memory data into an untrusted buffer of significantly small length.. We recommend updating Asylo to version 0.6.0 or later.2020-08-124CVE-2020-8905
CONFIRM
google -- asyloAn arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later.2020-08-125.5CVE-2020-8904
CONFIRM
handysoft -- hslogin2.dllhslogin2.dll ActiveX Control in Groupware contains a vulnerability that could allow remote files to be downloaded and executed by setting the arguments to the activex method. This is due to a lack of integrity verification of the policy files referenced in the update process, and a remote attacker could induce a user to crafted web page, causing damage such as malicious code infection.2020-08-076.8CVE-2020-7810
MISC
MISC
huawei -- fusioncomputeFusionCompute 8.0.0 have local privilege escalation vulnerability. A local, authenticated attacker could perform specific operations to exploit this vulnerability. Successful exploitation may cause the attacker to obtain a higher privilege and compromise the service.2020-08-104.6CVE-2020-9078
MISC
huawei -- fusionsphere_openstackFusionSphere OpenStack 8.0.0 have a protection mechanism failure vulnerability. The product incorrectly uses a protection mechanism. An attacker has to find a way to exploit the vulnerability to conduct directed attacks against the affected product.2020-08-115.8CVE-2020-9079
MISC
huawei -- mate_20_firmwareHUAWEI Mate 20 versions Versions earlier than 10.1.0.160(C00E160R3P8);HUAWEI Mate 20 Pro versions Versions earlier than 10.1.0.270(C431E7R1P5),Versions earlier than 10.1.0.270(C635E3R1P5),Versions earlier than 10.1.0.273(C636E7R2P4);HUAWEI Mate 20 X versions Versions earlier than 10.1.0.160(C00E160R2P8);HUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11);HUAWEI P30 Pro versions Versions earlier than 10.1.0.160(C00E160R2P8);HUAWEI Mate 20 RS versions Versions earlier than 10.1.0.160(C786E160R3P8);HonorMagic2 versions Versions earlier than 10.0.0.187(C00E61R2P11);Honor20 versions Versions earlier than 10.0.0.175(C00E58R4P11);Honor20 PRO versions Versions earlier than 10.0.0.194(C00E62R8P12);HonorMagic2 versions Versions earlier than 10.0.0.187(C00E61R2P11);HonorV20 versions Versions earlier than 10.0.0.188(C00E62R2P11) have an improper authentication vulnerability. The system does not properly sign certain encrypted file, the attacker should gain the key used to encrypt the file, successful exploit could cause certain file be forged2020-08-114.6CVE-2020-9244
MISC
huawei -- mate_30_firmwareHUAWEI Mate 30 with versions earlier than 10.1.0.150(C00E136R5P3) have a denial of service vulnerability. The system does not properly limit the depth of recursion, an attacker should trick the user installing and execute a malicious application. Successful exploit could cause a denial of service condition.2020-08-104.3CVE-2020-9243
MISC
huawei -- p30_firmwareHUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11);HUAWEI P30 Pro versions Versions earlier than 10.1.0.160(C00E160R2P8) have a denial of service vulnerability. Certain system configuration can be modified because of improper authorization. The attacker could trick the user installing and executing a malicious application, successful exploit could cause a denial of service condition of PHONE function.2020-08-104.3CVE-2020-9245
MISC
ibm -- event_streamsIBM Event Streams 10.0.0 could allow an authenticated user to perform tasks to a schema due to improper authentication validation. IBM X-Force ID: 186233.2020-08-146.5CVE-2020-4662
XF
CONFIRM
ibm -- jazz_reporting_serviceIBM Jazz Reporting Service 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 182717.2020-08-104.3CVE-2020-4533
XF
CONFIRM
ibm -- jazz_reporting_serviceIBM Jazz Reporting Service 6.0.2, 6.0.6, 6.0.6.1, 7.0, and 7.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.2020-08-104.3CVE-2020-4539
XF
CONFIRM
ibm -- jazz_reporting_serviceIBM Jazz Reporting Service 7.0 and 7.0.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 183039.2020-08-104.3CVE-2020-4541
XF
CONFIRM
ibm -- maximo_asset_managementIBM Maximo Asset Management 7.6.0 and 7.6.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 167288.2020-08-134CVE-2019-4582
XF
CONFIRM
ibm -- qradar_security_information_and_event_managerIBM QRadar 7.2.0 through 7.2.9 could allow an authenticated user to disable the Wincollect service which could aid an attacker in bypassing security mechanisms in future attacks. IBM X-Force ID: 181860.2020-08-114CVE-2020-4485
XF
CONFIRM
ibm -- qradar_security_information_and_event_managerIBM QRadar 7.2.0 thorugh 7.2.9 could allow an authenticated user to overwrite or delete arbitrary files due to a flaw after WinCollect installation. IBM X-Force ID: 181861.2020-08-115.5CVE-2020-4486
XF
CONFIRM
jenkins -- email_extensionJenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure.2020-08-125CVE-2020-2232
MLIST
CONFIRM
jenkins -- flaky_test_handlerA cross-site request forgery (CSRF) vulnerability in Jenkins Flaky Test Handler Plugin 1.0.4 and earlier allows attackers to rebuild a project at a previous git revision.2020-08-124.3CVE-2020-2237
MLIST
CONFIRM
jenkins -- pipeline_maven_integrationA missing permission check in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.2020-08-124CVE-2020-2233
MLIST
CONFIRM
jenkins -- pipeline_maven_integrationA missing permission check in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows users with Overall/Read access to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.2020-08-124CVE-2020-2234
MLIST
CONFIRM
jenkins -- pipeline_maven_integrationA cross-site request forgery (CSRF) vulnerability in Jenkins Pipeline Maven Integration Plugin 3.8.2 and earlier allows attackers to connect to an attacker-specified JDBC URL using attacker-specified credentials IDs obtained through another method, potentially capturing credentials stored in Jenkins.2020-08-124.3CVE-2020-2235
MLIST
CONFIRM
jerryscript -- jerryscript** DISPUTED ** JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option.2020-08-136.8CVE-2020-24345
MISC
jetbrains -- kotlinIn JetBrains Kotlin from 1.4-M1 to 1.4-RC (as Kotlin 1.3.70 is not affected by the issue. Fixed version is 1.4.0) there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.2020-08-086.5CVE-2020-15824
MISC
MISC
jetbrains -- teamcityIn JetBrains TeamCity before 2020.1, users are able to assign more permissions than they have.2020-08-084CVE-2020-15826
MISC
MISC
jetbrains -- teamcityIn JetBrains TeamCity before 2020.1.1, project parameter values can be retrieved by a user without appropriate permissions.2020-08-084CVE-2020-15828
MISC
MISC
jetbrains -- teamcityIn JetBrains TeamCity before 2019.2.3, password parameters could be disclosed via build logs.2020-08-085CVE-2020-15829
MISC
MISC
jetbrains -- teamcityIn JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges.2020-08-086.5CVE-2020-15825
MISC
MISC
jetbrains -- teamcityJetBrains TeamCity before 2019.2.3 is vulnerable to reflected XSS in the administration UI.2020-08-084.3CVE-2020-15831
MISC
MISC
jetbrains -- teamcityJetBrains TeamCity before 2019.2.3 is vulnerable to stored XSS in the administration UI.2020-08-084.3CVE-2020-15830
MISC
MISC
jetbrains -- toolboxIn JetBrains ToolBox version 1.17 before 1.17.6856, the set of signature verifications omitted the jetbrains-toolbox.exe file.2020-08-085CVE-2020-15827
MISC
MISC
jetbrains -- upsourceIn JetBrains Upsource before 2020.1, information disclosure is possible because of an incorrect user matching algorithm.2020-08-085CVE-2019-19704
MISC
MISC
jetbrains -- youtrackIn JetBrains YouTrack before 2020.2.6881, a user without permission is able to create an article draft.2020-08-084CVE-2020-15821
MISC
MISC
jetbrains -- youtrackIn JetBrains YouTrack before 2020.1.1331, an external user could execute commands against arbitrary issues.2020-08-086.5CVE-2020-15817
MISC
MISC
jetbrains -- youtrackJetBrains YouTrack before 2020.2.8873 is vulnerable to SSRF in the Workflow component.2020-08-085CVE-2020-15823
MISC
MISC
jetbrains -- youtrackIn JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.2020-08-085CVE-2020-15820
MISC
MISC
jetbrains -- youtrackJetBrains YouTrack before 2020.2.10643 was vulnerable to SSRF that allowed scanning internal ports.2020-08-085CVE-2020-15819
MISC
MISC
jetbrains -- youtrackIn JetBrains YouTrack before 2020.2.8527, the subtasks workflow could disclose issue existence.2020-08-085CVE-2020-15818
MISC
MISC
lindy-international -- 42633_firmwareLindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to denial-of-service the device via long input values.2020-08-076.1CVE-2020-15061
MISC
mahara -- maharaIn Mahara 19.04 before 19.04.6, 19.10 before 19.10.4, and 20.04 before 20.04.1, certain places could execute file or folder names containing JavaScript.2020-08-074.3CVE-2020-15907
MISC
MISC
mibew -- messengerMibew Messenger before 3.2.7 allows XSS via a crafted user name.2020-08-104.3CVE-2020-17476
MISC
MISC
mozilla -- firefoxA unicode RTL order character in the downloaded file name can be used to change the file's name during the download UI flow to change the file extension. This vulnerability affects Firefox for iOS < 28.2020-08-104.3CVE-2020-15651
MISC
MISC
mozilla -- firefoxA rogue webpage could override the injected WKUserScript used by the logins autofill, this exploit could result in leaking a password for the current domain. This vulnerability affects Firefox for iOS < 28.2020-08-104.3CVE-2020-15661
MISC
MISC
mozilla -- firefoxThe code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.2020-08-104.3CVE-2020-15658
SUSE
MISC
MISC
MISC
MISC
mozilla -- firefoxA redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.2020-08-104.3CVE-2020-15655
SUSE
MISC
MISC
MISC
MISC
mozilla -- firefoxWhen in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.2020-08-104.3CVE-2020-15654
SUSE
MISC
MISC
MISC
MISC
mozilla -- firefoxBy observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.2020-08-104.3CVE-2020-15652
SUSE
SUSE
SUSE
MISC
MISC
MISC
MISC
MISC
MISC
mozilla -- firefoxA rogue webpage could override the injected WKUserScript used by the download feature, this exploit could result in the user downloading an unintended file. This vulnerability affects Firefox for iOS < 28.2020-08-104.3CVE-2020-15662
MISC
MISC
mozilla -- firefoxAn iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.2020-08-104.3CVE-2020-15653
SUSE
MISC
MISC
MISC
MISC
mozilla -- firefoxFirefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.2020-08-106.9CVE-2020-15657
SUSE
MISC
MISC
MISC
MISC
mozilla -- firefoxUsing object or embed tags, it was possible to frame other websites, even if they disallowed framing using the X-Frame-Options header. This vulnerability affects Thunderbird < 78 and Firefox < 78.0.2.2020-08-104.3CVE-2020-15648
MISC
MISC
MISC
mozilla -- firefoxA Content Provider in Firefox for Android allowed local files accessible by the browser to be read by a remote webpage, leading to sensitive data disclosure, including cookies for other origins. This vulnerability affects Firefox for < Android.2020-08-105CVE-2020-15647
MISC
MISC
mozilla -- firefox_esrGiven an installed malicious file picker application, an attacker was able to overwrite local files and thus overwrite Firefox settings (but not access the previous profile). *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.11.2020-08-104.3CVE-2020-15650
MISC
MISC
mozilla -- firefox_esrGiven an installed malicious file picker application, an attacker was able to steal and upload local files of their choosing, regardless of the actually files picked. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 68.11.2020-08-104.3CVE-2020-15649
MISC
MISC
mybb -- mybbMyBB before 1.8.24 allows XSS because the visual editor mishandles [align], [size], [quote], and [font] in MyCode.2020-08-094.3CVE-2020-17447
MISC
MISC
mybb -- mybbIn MyBB before version 1.8.24, the custom MyCode (BBCode) for the visual editor doesn't escape input properly when rendering HTML, resulting in a DOM-based XSS vulnerability. The weakness can be exploited by pointing a victim to a page where the visual editor is active (e.g. as a post or Private Message) and operates on a maliciously crafted MyCode message. This may occur on pages where message content is pre-filled using a GET/POST parameter, or on reply pages where a previously saved malicious message is quoted. After upgrading MyBB to 1.8.24, make sure to update the version attribute in the `codebuttons` template for non-default themes to serve the latest version of the patched `jscripts/bbcodes_sceditor.js` file.2020-08-104.3CVE-2020-15139
MISC
CONFIRM
MISC
nextcloud -- nextcloudA code injection in Nextcloud Desktop Client 2.6.4 allowed to load arbitrary code when placing a malicious OpenSSL config into a fixed directory.2020-08-104.6CVE-2020-8224
MISC
MISC
nextcloud -- nextcloudA memory leak in the OCUtil.dll library used by Nextcloud Desktop Client 2.6.4 can lead to a DoS against the host system.2020-08-104.9CVE-2020-8229
MISC
MISC
nginx -- njsnjs through 0.4.3, used in NGINX, has a use-after-free in njs_json_parse_iterator_call in njs_json.c.2020-08-136.8CVE-2020-24346
MISC
p5-crypt-perl_project -- p5-crypt-perlECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.2020-08-105CVE-2020-17478
MISC
php-fusion -- php-fusionPHP-Fusion 9.03 allows XSS on the preview page.2020-08-124.3CVE-2020-17450
MISC
prometheus -- blackbox_exporter** DISPUTED ** Prometheus Blackbox Exporter through 0.17.0 allows /probe?target= SSRF. NOTE: follow-on discussion suggests that this might plausibly be interpreted as both intended functionality and also a vulnerability.2020-08-095CVE-2020-16248
MISC
MISC
MISC
MISC
MISC
qemu -- qemuIn QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.2020-08-115CVE-2020-16092
MISC
MISC
redhat -- cloudformsRed Hat CloudForms 4.7 and 5 is affected by a role-based privilege escalation flaw. An attacker with EVM-Operator group can perform actions restricted only to EVM-Super-administrator group, leads to, exporting or importing administrator files.2020-08-116.5CVE-2020-10783
MISC
MISC
redhat -- cloudformsIn Red Hat CloudForms 4.7 and 5, the read only widgets can be edited by inspecting the forms and dropping the disabled attribute from the fields since there is no server-side validation. This business logic flaw violate the expected behavior.2020-08-116.5CVE-2020-10778
MISC
MISC
redhat -- cloudformsRed Hat CloudForms 4.7 and 5 leads to insecure direct object references (IDOR) and functional level access control bypass due to missing privilege check. Therefore, if an attacker knows the right criteria, it is possible to access some sensitive data within the CloudForms.2020-08-114CVE-2020-10779
MISC
MISC
redhat -- cloudformsRed Hat CloudForms before 5.11.7.0 was vulnerable to the User Impersonation authorization flaw which allows malicious attacker to create existent and non-existent role-based access control user, with groups and roles. With a selected group of EvmGroup-super_administrator, an attacker can perform any API request as a super administrator.2020-08-116.4CVE-2020-14325
MISC
MISC
redhat -- cloudforms_management_engineRed Hat CloudForms 4.7 and 5 is affected by CSV Injection flaw, a crafted payload stays dormant till a victim export as CSV and opens the file with Excel. Once the victim opens the file, the formula executes, triggering any number of possible events. While this is strictly not an flaw that affects the application directly, attackers could use the loosely validated parameters to trigger several attack possibilities.2020-08-116.8CVE-2020-10780
MISC
MISC
redhat -- cloudforms_management_engineA high severity vulnerability was found in all active versions of Red Hat CloudForms before 5.11.7.0. The out of band OS command injection vulnerability can be exploited by authenticated attacker while setuping conversion host through Infrastructure Migration Solution. This flaw allows attacker to execute arbitrary commands on CloudForms server.2020-08-116.5CVE-2020-14324
MISC
MISC
redhat -- cloudforms_management_engineRed Hat CloudForms 4.7 and 5 was vulnerable to Server-Side Request Forgery (SSRF) flaw. With the access to add Ansible Tower provider, an attacker could scan and attack systems from the internal network which are not normally accessible.2020-08-115.5CVE-2020-14296
MISC
MISC
redhat -- quayAn information disclosure vulnerability was found in Red Hat Quay in versions before 3.3.1. This flaw allows an attacker who can create a build trigger in a repository, to disclose the names of robot accounts and the existence of private repositories within any namespace.2020-08-115CVE-2020-14313
MISC
robotemi -- launcher_osMissing Authentication for Critical Function in Robotemi Global Ltd Temi Firmware up to 20190419.165201, Launcher OS prior to 11969-13146, Robox OS prior to 117.21-119.24, and their Android phone app prior to 1.3.3-1.3.7931 allows remote attackers to receive and answer calls intended for another temi user. Answering the call this way grants motor control of the temi in addition to audio/video.2020-08-076.4CVE-2020-16167
MISC
MISC
robotemi -- temi_firmwareOrigin Validation Error in Robotemi Global Ltd Temi Firmware up to 20190419.165201, Launcher OS prior to 11969-13146, Robox OS prior to 117.21-119.24, and their Android phone app prior to 1.3.3-1.3.7931 allows remote attackers to access the custom API server and MQTT broker used by the temi and send it custom data/requests.2020-08-074.3CVE-2020-16168
MISC
MISC
roundcube -- webmailRoundcube Webmail before 1.4.8 allows stored XSS in HTML messages during message display via a crafted SVG document.2020-08-124.3CVE-2020-16145
CONFIRM
MISC
sabnzbd -- sabnzbdSABnzbd 2.3.9 and 3.0.0Alpha2 has a command injection vulnerability in the web configuration interface that permits an authenticated user to execute arbitrary Python commands on the underlying operating system.2020-08-116.5CVE-2020-13124
MISC
CONFIRM
MISC
sap -- abap_platformSAP NetWeaver (ABAP Server) and ABAP Platform, versions - 740, 750, 751, 752, 753, 754, 755, allows a business user to access the list of users in the given system using value help, leading to Information Disclosure.2020-08-124CVE-2020-6299
MISC
MISC
sap -- abap_platformImproper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.2020-08-124CVE-2020-6310
MISC
MISC
sap -- abap_platformSAP NetWeaver (ABAP Server) and ABAP Platform, versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, allows an attacker to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.2020-08-126.5CVE-2020-6296
MISC
MISC
sap -- adaptive_server_enterpriseUnder certain conditions the SAP Adaptive Server Enterprise, version 16.0, allows an attacker to access encrypted sensitive and confidential information through publicly readable installation log files leading to a compromise of the installed Cockpit. This compromise could enable the attacker to view, modify and/or make unavailable any data associated with the Cockpit, leading to Information Disclosure.2020-08-124.6CVE-2020-6295
MISC
MISC
sap -- businessobjects_business_intelligence_platformXvfb of SAP Business Objects Business Intelligence Platform, versions - 4.2, 4.3, platform on Unix does not perform any authentication checks for functionalities that require user identity.2020-08-126.4CVE-2020-6294
MISC
MISC
sap -- generic_market_dataSAP Banking Services (Generic Market Data), versions - 400, 450, 500, allows an unauthorized user to display protected Business Partner Generic Market Data (GMD) and change related GMD key figure values, due to Missing Authorization Check.2020-08-125.5CVE-2020-6298
MISC
MISC
sap -- hcm_travel_managementSAP ERP (HCM Travel Management), versions - 600, 602, 603, 604, 605, 606, 607, 608, allows an authenticated but unauthorized attacker to read, modify and settle trips, resulting in escalation of privileges, due to Missing Authorization Check.2020-08-125.5CVE-2020-6301
MISC
MISC
sap -- netweaver_knowledge_managementSAP NetWeaver (Knowledge Management), versions - 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to upload a malicious file and also to access, modify or make unavailable existing files but the impact is limited to the files themselves and is restricted by other policies such as access control lists and other upload file size restrictions, leading to Unrestricted File Upload.2020-08-126.4CVE-2020-6293
MISC
MISC
sap -- s\/4_hana_fiori_ui_for_general_ledger_accountingSAP S/4 HANA (Fiori UI for General Ledger Accounting), versions 103, 104, does not perform necessary authorization checks for an authenticated user working with attachment service, allowing the attacker to delete attachments due to Missing Authorization Check.2020-08-124CVE-2020-6273
MISC
MISC
sophos -- xg_firewall_firmwareTwo OS command injection vulnerabilities in the User Portal of Sophos XG Firewall through 2020-08-05 potentially allow an authenticated attacker to remotely execute arbitrary code.2020-08-076.5CVE-2020-17352
MISC
MISC
suse -- linux_enterprise_high_performance_computingA Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the pcp package to unintended settings. This issue affects: SUSE Linux Enterprise Server 12-SP4 permissions versions prior to 20170707-3.24.1. SUSE Linux Enterprise Server 15-LTSS permissions versions prior to 20180125-3.27.1. SUSE Linux Enterprise Server for SAP 15 permissions versions prior to 20180125-3.27.1. openSUSE Leap 15.1 permissions versions prior to 20181116-lp151.4.24.1. openSUSE Tumbleweed permissions versions prior to 20200624.2020-08-074.6CVE-2020-8025
CONFIRM
telegram -- telegram_desktopTelegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.2020-08-116.8CVE-2020-17448
MISC
MISC
MISC
teradici -- cloud_access_connectorThe Management Interface of the Teradici Cloud Access Connector and Cloud Access Connector Legacy for releases prior to April 24, 2020 (v16 and earlier for the Cloud Access Connector) contains a stored cross-site scripting (XSS) vulnerability which allows a remote unauthenticated attacker to poison log files with malicious JavaScript via the login page which is executed when an administrator views the logs within the application.2020-08-114.3CVE-2020-13176
MISC
teradici -- cloud_access_connectorThe Management Interface of the Teradici Cloud Access Connector and Cloud Access Connector Legacy for releases prior to April 20, 2020 (v15 and earlier for Cloud Access Connector) contains a local file inclusion vulnerability which allows an unauthenticated remote attacker to leak LDAP credentials via a specially crafted HTTP request.2020-08-115CVE-2020-13175
MISC
teradici -- graphics_agentThe support bundler in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows versions prior to 20.04.1 and 20.07.0 does not use hard coded paths for certain Windows binaries, which allows an attacker to gain elevated privileges via execution of a malicious binary placed in the system path.2020-08-114.4CVE-2020-13177
MISC
teradici -- graphics_agentA function in the Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to version 20.04.1 does not properly validate the signature of an external binary, which could allow an attacker to gain elevated privileges via execution in the context of the PCoIP Agent process.2020-08-114.6CVE-2020-13178
MISC
teradici -- managament_consoleThe web server in the Teradici Managament console versions 20.04 and 20.01.1 did not properly set the X-Frame-Options HTTP header, which could allow an attacker to trick a user into clicking a malicious link via clickjacking.2020-08-114.3CVE-2020-13174
MISC
themeinprogress -- nova_litesearch.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.2020-08-124.3CVE-2020-17362
CONFIRM
tibco -- silver_fabricThe VirtualRouter component of TIBCO Software Inc.'s TIBCO Silver Fabric contains a vulnerability that theoretically allows an attacker to inject scripts via URLs. The attacker could theoretically social engineer an authenticated user into submitting the URL, thus executing the script on the affected system with the privileges of the user. Affected releases are TIBCO Software Inc.'s TIBCO Silver Fabric: versions 6.0.0 and below.2020-08-115.8CVE-2019-17339
CONFIRM
tiny -- tinymceA cross-site scripting (XSS) vulnerability in TinyMCE 5.2.1 and earlier allows remote attackers to inject arbitrary web script when configured in classic editing mode.2020-08-144.3CVE-2020-12648
MISC
tiny -- tinymceTinyMCE before 4.9.7 and 5.x before 5.1.4 allows XSS in the core parser, the paste plugin, and the visualchars plugin by using the clipboard or APIs to insert content into the editor.2020-08-104.3CVE-2020-17480
MISC
MISC
tp-link -- tl-ps310u_firmwareTP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to denial-of-service the device via long input values.2020-08-076.1CVE-2020-15057
MISC
vmware -- spring_cloud_netflixSpring Cloud Netflix, versions 2.2.x prior to 2.2.4, versions 2.1.x prior to 2.1.6, and older unsupported versions allow applications to use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. A malicious user, or attacker, can send a request to other servers that should not be exposed publicly.2020-08-074CVE-2020-5412
CONFIRM

Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
combodo -- itopCombodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.2020-08-103.5CVE-2020-12779
MISC
digitus -- da-70254_firmwareDIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.2020-08-072.3CVE-2020-15064
MISC
digitus -- da-70254_firmwareDIGITUS DA-70254 4-Port Gigabit Network Hub 2.073.000.E0008 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.2020-08-073.3CVE-2020-15062
MISC
flatcore -- flatcoreflatCore before 1.5.7 allows XSS by an admin via the acp/acp.php?tn=pages&sub=edit&editpage=1 page_linkname, page_title, page_content, or page_extracontent parameter, or the acp/acp.php?tn=system&sub=sys_pref prefs_pagename, prefs_pagetitle, or prefs_pagesubtitle parameter.2020-08-093.5CVE-2020-17451
MISC
MISC
gitlab -- gitlabFor GitLab before 13.0.12, 13.1.6, 13.2.3 a cross-site scripting vulnerability exists in the issues list via milestone title.2020-08-133.5CVE-2020-13283
CONFIRM
MISC
MISC
gitlab -- gitlabFor GitLab before 13.0.12, 13.1.6, 13.2.3 a cross-site scripting vulnerability exists in the issue reference number tooltip.2020-08-133.5CVE-2020-13285
CONFIRM
MISC
MISC
gitlab -- gitlabIn GitLab before 13.0.12, 13.1.6, and 13.2.3, a stored XSS vulnerability exists in the CI/CD Jobs page2020-08-123.5CVE-2020-13288
CONFIRM
MISC
MISC
jenkins -- jenkinsJenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability.2020-08-123.5CVE-2020-2229
MLIST
CONFIRM
jenkins -- jenkinsJenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.2020-08-123.5CVE-2020-2230
MLIST
CONFIRM
jenkins -- jenkinsJenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token.2020-08-123.5CVE-2020-2231
MLIST
CONFIRM
jenkins -- yet_another_build_visualizerJenkins Yet Another Build Visualizer Plugin 1.11 and earlier does not escape tooltip content, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Run/Update permission.2020-08-123.5CVE-2020-2236
MLIST
CONFIRM
lindy-international -- 42633_firmwareLindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.2020-08-073.3CVE-2020-15058
MISC
lindy-international -- 42633_firmwareLindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.2020-08-072.3CVE-2020-15060
MISC
mcafee -- data_loss_preventionUnprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials.2020-08-132.1CVE-2020-7307
MISC
mcafee -- data_loss_preventionCross Site scripting vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.5.3 allows authenticated remote user to trigger scripts to run in a user's browser via adding a new label.2020-08-132.3CVE-2020-7303
MISC
pactware -- pactwareIn PACTware before 4.1 SP6 and 5.x before 5.0.5.31, passwords are stored in a recoverable format, and may be retrieved by any user with access to the PACTware workstation.2020-08-112.1CVE-2020-9403
CONFIRM
php-fusion -- php-fusionPHP-Fusion 9.03 allows XSS via the error_log file.2020-08-123.5CVE-2020-17449
MISC
redhat -- cloudformsA cross-site scripting flaw was found in Report Menu feature of Red Hat CloudForms 4.7 and 5. An attacker could use this flaw to execute a stored XSS attack on an application administrator using CloudForms.2020-08-113.5CVE-2020-10777
MISC
MISC
sap -- businessobjects_business_intelligence_platformSAP Business Objects Business Intelligence Platform (Central Management Console), versions- 4.2, 4.3, allows an attacker with administrator rights can use the web application to send malicious code to a different end user (victim), as it does not sufficiently encode user-controlled inputs for RecycleBin, resulting in Stored Cross-Site Scripting (XSS) vulnerability.2020-08-123.5CVE-2020-6300
MISC
MISC
sap -- data_intelligenceUnder certain conditions the upgrade of SAP Data Hub 2.7 to SAP Data Intelligence, version - 3.0, allows an attacker to access confidential system configuration information, that should otherwise be restricted, leading to Information Disclosure.2020-08-122.1CVE-2020-6297
MISC
MISC
soplanning -- soplanningSOPlanning 1.46.01 allows persistent XSS via the Project Name, Statutes Comment, Places Comment, or Resources Comment field.2020-08-113.5CVE-2020-15597
MISC
MISC
sugarcrm -- sugarcrmSugarCRM before 10.1.0 (Q3 2020) allows SQL Injection.2020-08-123.5CVE-2020-17373
MISC
MISC
MISC
MISC
MISC
sugarcrm -- sugarcrmSugarCRM before 10.1.0 (Q3 2020) allows XSS.2020-08-123.5CVE-2020-17372
MISC
MISC
MISC
MISC
MISC
teradici -- graphics_agentBroker Protocol messages in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to 20.04.1 are not cleaned up in server memory, which may allow an attacker to read confidential information from a memory dump via forcing a crashing during the single sign-on procedure.2020-08-112.1CVE-2020-13179
MISC
tp-link -- tl-ps310u_firmwareTP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.2020-08-073.3CVE-2020-15054
MISC
tp-link -- tl-ps310u_firmwareTP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.2020-08-072.3CVE-2020-15056
MISC

Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
abbyy -- finereader
 
ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows escalation of privileges by local users via manipulations involving files and using symbolic links.2020-08-13not yet calculatedCVE-2019-20383
CONFIRM
MISC
CONFIRM
adobe -- git-server
 
The resolveRepositoryPath function doesn't properly validate user input and a malicious user may traverse to any valid Git repository outside the repoRoot. This issue may lead to unauthorized access of private Git repositories as long as the malicious user knows or brute-forces the location of the repository.2020-08-14not yet calculatedCVE-2020-9708
MISC
alps_alpine -- touchpad_driverThe ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.2020-08-12not yet calculatedCVE-2020-15596
MISC
MISC
amazon_web_services -- s3_crypto_sdk_for_golang
 
A padding oracle vulnerability exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. The SDK allows users to encrypt files with AES-CBC without computing a Message Authentication Code (MAC), which then allows an attacker who has write access to the target's S3 bucket and can observe whether or not an endpoint with access to the key can decrypt a file, they can reconstruct the plaintext with (on average) 128*length (plaintext) queries to the endpoint, by exploiting CBC's ability to manipulate the bytes of the next block and PKCS5 padding errors. It is recommended to update your SDK to V2 or later, and re-encrypt your files.2020-08-11not yet calculatedCVE-2020-8911
CONFIRM
CONFIRM
amazon_web_services -- s3_crypto_sdk_for_golang
 
A vulnerability in the in-band key negotiation exists in the AWS S3 Crypto SDK for GoLang versions prior to V2. An attacker with write access to the targeted bucket can change the encryption algorithm of an object in the bucket, which can then allow them to change AES-GCM to AES-CTR. Using this in combination with a decryption oracle can reveal the authentication key used by AES-GCM as decrypting the GMAC tag leaves the authentication key recoverable as an algebraic equation. It is recommended to update your SDK to V2 or later, and re-encrypt your files.2020-08-11not yet calculatedCVE-2020-8912
CONFIRM
CONFIRM
artica -- web_proxyArtica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform.2020-08-12not yet calculatedCVE-2020-17505
MISC
artica -- web_proxy
 
Artica Web Proxy 4.30.00000000 allows remote attacker to bypass privilege detection and gain web backend administrator privileges through SQL injection of the apikey parameter in fw.login.php.2020-08-12not yet calculatedCVE-2020-17506
MISC
MISC
artifex_software -- ghostscript
 
A division by zero vulnerability in dot24_print_page() in devices/gdevdm24.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.2020-08-13not yet calculatedCVE-2020-16310
MISC
MISC
artifex_software -- ghostscript
 
A null pointer dereference vulnerability in devices/vector/gdevtxtw.c and psi/zbfont.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted postscript file. This is fixed in v9.51.2020-08-13not yet calculatedCVE-2020-16307
MISC
MISC
artifex_software -- ghostscript
 
A null pointer dereference vulnerability in devices/gdevtsep.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted postscript file. This is fixed in v9.51.2020-08-13not yet calculatedCVE-2020-16306
MISC
MISC
artifex_software -- mujs
 
Artifex MuJS through 1.0.7 has a use-after-free in jsrun.c because of unconditional marking in jsgc.c.2020-08-13not yet calculatedCVE-2020-24343
MISC
asyncpg -- asyncpg
 
asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder.2020-08-12not yet calculatedCVE-2020-17446
CONFIRM
avaya -- aura_communication_manager_and_aura_messaging
 
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of Avaya Aura Communication Manager and Avaya Aura Messaging. This vulnerability could allow an unauthenticated remote attacker to perform Web administration actions with the privileged level of the authenticated user. Affected versions of Communication Manager are 7.0.x, 7.1.x prior to 7.1.3.5 and 8.0.x. Affected versions of Messaging are 7.0.x, 7.1 and 7.1 SP1.2020-08-11not yet calculatedCVE-2020-7029
CONFIRM
blackberry -- qnx_software_development_platform
 
An information disclosure and remote code execution vulnerability in the slinger web server of the BlackBerry QNX Software Development Platform versions 6.4.0 to 6.6.0 could allow an attacker to potentially read arbitrary files and run arbitrary executables in the context of the web server.2020-08-12not yet calculatedCVE-2020-6932
MISC
cisco -- unified_ip_conference_station_7937g
 
** UNSUPPORTED WHEN ASSIGNED ** A denial-of-service in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers restart the device remotely through sending specially crafted packets. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE’s reference information.2020-08-12not yet calculatedCVE-2020-16139
MISC
MISC
MISC
cisco -- unified_ip_conference_station_7937g
 
** UNSUPPORTED WHEN ASSIGNED ** A denial-of-service issue in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to remotely disable the device until it is power cycled. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE’s reference information.2020-08-12not yet calculatedCVE-2020-16138
MISC
MISC
MISC
cisco -- unified_ip_conference_station_7937g
 
** UNSUPPORTED WHEN ASSIGNED ** A privilege escalation issue in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to reset the credentials for the SSH administrative console to arbitrary values. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE’s reference information.2020-08-12not yet calculatedCVE-2020-16137
MISC
MISC
MISC
cms_made_simple -- cms_made_simple
 
CMS Made Simple 2.2.14 allows Authenticated Arbitrary File Upload because the File Manager does not block .ptar files, a related issue to CVE-2017-16798.2020-08-14not yet calculatedCVE-2020-17462
EXPLOIT-DB
documalis -- free_pdf_editor_and_free_pdf_scanner
 
Documalis Free PDF Editor version 5.7.2.26 and Documalis Free PDF Scanner version 5.7.2.122 do not appropriately validate the contents of JPEG images contained within a PDF. Attackers can exploit this vulnerability to trigger a buffer overflow on the stack and gain remote code execution as the user running the Documalis Free PDF Editor or Documalis Free PDF Scanner software.2020-08-12not yet calculatedCVE-2020-7374
MISC
dovecot -- dovecot
 
In Dovecot before 2.3.11.3, sending a specially formatted RPA request will crash the auth service because a length of zero is mishandled.2020-08-12not yet calculatedCVE-2020-12674
MISC
MLIST
DEBIAN
CONFIRM
dovecot -- dovecot
 
In Dovecot before 2.3.11.3, sending a specially formatted NTLM request will crash the auth service because of an out-of-bounds read.2020-08-12not yet calculatedCVE-2020-12673
MISC
MLIST
DEBIAN
CONFIRM
dovecot -- dovecot
 
In Dovecot before 2.3.11.3, uncontrolled recursion in submission, lmtp, and lda allows remote attackers to cause a denial of service (resource consumption) via a crafted e-mail message with deeply nested MIME parts.2020-08-12not yet calculatedCVE-2020-12100
MLIST
MISC
MLIST
DEBIAN
eaton -- secure_connect_mobile_app
 
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.2020-08-12not yet calculatedCVE-2020-6653
MISC
evga -- precision_x1
 
The WinRing0.sys and WinRing0x64.sys drivers 1.2.0 in EVGA Precision X1 through 1.0.6 allow local users, including low integrity processes, to read and write to arbitrary memory locations. This allows any user to gain NT AUTHORITY\SYSTEM privileges by mapping \Device\PhysicalMemory into the calling process.2020-08-11not yet calculatedCVE-2020-14979
MISC
MISC
fortinet -- fortios
 
A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.2020-08-14not yet calculatedCVE-2019-5591
CONFIRM
galileo_cms -- galileo_cms
 
There is stored cross site scripting (XSS) in Galileo CMS v0.042. Remote authenticated users could inject arbitrary web script or HTML via $page_title in /lib/Galileo/files/templates/page/show.html.ep (aka the PAGE TITLE Field).2020-08-14not yet calculatedCVE-2019-7410
CONFIRM
MISC
MISC
MISC
geutebrück -- g-cam_and_g-code
 
Using a specially crafted URL command, a remote authenticated user can execute commands as root on the G-Cam and G-Code (Firmware Versions 1.12.0.25 and prior as well as the limited Versions 1.12.13.2 and 1.12.14.5).2020-08-14not yet calculatedCVE-2020-16205
MISC
gitlab -- gitlab
 
For GitLab before 13.0.12, 13.1.6, 13.2.3 a memory exhaustion flaw exists due to excessive logging of an invite email error message.2020-08-13not yet calculatedCVE-2020-13280
CONFIRM
MISC
gitlab -- gitlab
 
For GitLab before 13.0.12, 13.1.6, 13.2.3 after a group transfer occurs, members from a parent group keep their access level on the subgroup leading to improper access.2020-08-13not yet calculatedCVE-2020-13282
CONFIRM
MISC
MISC
gitlab -- gitlab
 
In GitLab before 13.0.12, 13.1.6, and 13.2.3, improper access control was used on the Applications page.2020-08-12not yet calculatedCVE-2020-13290
CONFIRM
MISC
MISC
gitlab -- gitlab
 
In GitLab before 13.2.3, project sharing could temporarily allow too permissive access.2020-08-12not yet calculatedCVE-2020-13291
CONFIRM
MISC
gnome -- gnome-shell
 
An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible for a brief moment upon a logout. (If the password were never shown in cleartext, only the password length is revealed.)2020-08-11not yet calculatedCVE-2020-17489
MISC
google -- android
 
A local, arbitrary code execution vulnerability exists in the SplitCompat.install endpoint in Android's Play Core Library versions prior to 1.7.2. A malicious attacker could create an apk which targets a specific application, and if a victim were to install this apk, the attacker could perform a directory traversal, execute code as the targeted application and access the targeted application's data on the Android device. We recommend all users update Play Core to version 1.7.2 or later.2020-08-12not yet calculatedCVE-2020-8913
CONFIRM
google -- android
 
In C2 flame devices, there is a possible bypass of seccomp due to a missing configuration file. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-1460598412020-08-13not yet calculatedCVE-2020-0261
MISC
google -- go-tpm
 
An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth', and then can calculate 'usageAuth ^ encMigrationAuth' as the 'migrationAuth' can be guessed for all keys created with CreateWrapKey. TPM2.0 is not impacted by this. We recommend updating your library to 0.3.0 or later, or, if you cannot update, to call CreateWrapKey with a random 20-byte value for 'migrationAuth'.2020-08-11not yet calculatedCVE-2020-8918
CONFIRM
horndis -- horndis
 
All versions of HoRNDIS are affected by an integer overflow in the RNDIS packet parsing routines. A malicious USB device can trigger disclosure of unrelated kernel memory to userspace applications on the host, or can cause the kernel to crash. Kernel memory disclosure is especially likely on 32-bit kernels; 64-bit kernels are more likely to crash on attempted exploitation. It is not believed that kernel memory corruption is possible, or that unattended kernel memory disclosure without the collaboration of a userspace program running on the host is possible. The vulnerability is in `HoRNDIS::receivePacket`. `msg_len`, `data_ofs`, and `data_len` can be controlled by an attached USB device, and a negative value of `data_ofs` can bypass the check for `(data_ofs + data_len + 8) > msg_len`, and subsequently can cause a wild pointer copy in the `mbuf_copyback` call. The software is not maintained and no patches are planned. Users of multi-tenant systems with HoRNDIS installed should only connect trusted USB devices to their system.2020-08-12not yet calculatedCVE-2020-15137
CONFIRM
huawei -- fusioncomput
 
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information.2020-08-14not yet calculatedCVE-2020-9229
MISC
huawei -- fusioncomput
 
FusionCompute 8.0.0 has an information disclosure vulnerability. Due to the properly protection of certain information, attackers may exploit this vulnerability to obtain certain information.2020-08-14not yet calculatedCVE-2020-9228
MISC
inet -- wireless_daemon
 
eapol.c in iNet wireless daemon (IWD) through 1.8 allows attackers to trigger a PTK reinstallation by retransmitting EAPOL Msg4/4.2020-08-12not yet calculatedCVE-2020-17497
MISC
intel -- acceleration_stack
 
Improper access control in firmware for Intel(R) PAC with Arria(R) 10 GX FPGA before Intel Acceleration Stack version 1.2.1 may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8684
MISC
intel -- computing_improvement_program
 
Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8736
MISC
intel -- distribution_of_openvino_toolkit
 
Incorrect permissions in the Intel(R) Distribution of OpenVINO(TM) Toolkit before version 2020.2 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-12287
MISC
intel -- graphics_driversOut of bounds read in system driver for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable denial of service via local access.2020-08-13not yet calculatedCVE-2020-8682
MISC
intel -- graphics_drivers
 
Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.2020-08-13not yet calculatedCVE-2020-8679
MISC
intel -- graphics_drivers
 
Uncaught exception in the system driver for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable denial of service via local access.2020-08-13not yet calculatedCVE-2020-0512
MISC
intel -- graphics_drivers
 
Out of bounds write for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-0513
MISC
intel -- graphics_drivers
 
Out of bounds write in system driver for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8681
MISC
intel -- graphics_drivers
 
Improper buffer restrictions in system driver for some Intel(R) Graphics Drivers before version 15.33.50.5129 may allow an authenticated user to potentially enable denial of service via local access.2020-08-13not yet calculatedCVE-2020-8683
MISC
intel -- graphics_drivers
 
Race condition in some Intel(R) Graphics Drivers before version 15.40.45.5126 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8680
MISC
intel -- graphics_drivers
 
Out of bounds read in some Intel(R) Graphics Drivers before versions 15.45.31.5127 and 15.40.45.5126 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-0510
MISC
intel -- led_manager
 
Improper authentication in subsystem for Intel (R) LED Manager for NUC before version 1.2.3 may allow privileged user to potentially enable denial of service via local access.2020-08-13not yet calculatedCVE-2020-8685
MISC
intel -- mailbox
 
Improper permissions in the installer for the Intel(R) Mailbox Interface driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8743
MISC
intel -- multiple_productsBuffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8729
CONFIRM
MISC
intel -- multiple_products
 
Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8731
CONFIRM
MISC
intel -- multiple_products
 
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.2020-08-13not yet calculatedCVE-2020-8713
CONFIRM
MISC
intel -- multiple_products
 
Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.2020-08-13not yet calculatedCVE-2020-8706
CONFIRM
MISC
intel -- multiple_products
 
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.2020-08-13not yet calculatedCVE-2020-8708
CONFIRM
MISC
intel -- multiple_products
 
Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.2020-08-13not yet calculatedCVE-2020-8732
CONFIRM
MISC
intel -- multiple_products
 
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.2020-08-13not yet calculatedCVE-2020-8720
CONFIRM
MISC
intel -- multiple_products
 
Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.2020-08-13not yet calculatedCVE-2020-8709
CONFIRM
MISC
intel -- multiple_products
 
Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.2020-08-13not yet calculatedCVE-2020-8707
CONFIRM
MISC
intel -- multiple_products
 
Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8730
CONFIRM
MISC
intel -- multiple_products
 
Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.2020-08-13not yet calculatedCVE-2020-8717
CONFIRM
MISC
intel -- multiple_products
 
Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.2020-08-13not yet calculatedCVE-2020-8723
CONFIRM
MISC
intel -- multiple_products
 
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8722
CONFIRM
MISC
intel -- multiple_products
 
Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8721
CONFIRM
MISC
intel -- multiple_products
 
Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8719
CONFIRM
MISC
intel -- multiple_products
 
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8718
CONFIRM
MISC
intel -- multiple_products
 
Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8711
CONFIRM
MISC
intel -- multiple_products
 
Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.2020-08-13not yet calculatedCVE-2020-8716
CONFIRM
MISC
intel -- multiple_products
 
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8714
CONFIRM
MISC
intel -- multiple_products
 
Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8712
CONFIRM
MISC
intel -- multiple_products
 
Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8710
CONFIRM
MISC
intel -- multiple_products
 
Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access.2020-08-13not yet calculatedCVE-2020-8715
CONFIRM
MISC
intel -- nuc
 
Improper input validation in the firmware for Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8742
MISC
intel -- proset/wireless_wifi_products
 
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-0559
MISC
intel -- raid_web_console_3
 
Improper input validation in the Intel(R) RAID Web Console 3 for Windows* may allow an unauthenticated user to potentially enable denial of service via network access.2020-08-13not yet calculatedCVE-2020-8688
MISC
intel -- realsense_d400_series_uwp_driver
 
Improper permissions in the installer for the Intel(R) RealSense(TM) D400 Series UWP driver for Windows* 10 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8763
MISC
intel -- rste_software_raid_driver
 
Uncontrolled search path in the installer for Intel(R) RSTe Software RAID Driver for the Intel(R) Server Board M10JNP2SB before version 4.7.0.1119 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8687
MISC
intel -- server_board_families
 
Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-12301
CONFIRM
MISC
intel -- server_board_families
 
Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-12300
CONFIRM
MISC
intel -- server_board_families
 
Improper input validation in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-12299
CONFIRM
MISC
intel -- server_board_m10jnp2sb
 
Improper buffer restrictions in the firmware for Intel(R) Server Board M10JNP2SB before version 7.210 may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8733
CONFIRM
MISC
intel -- ssd_sct
 
Improper access control in the installer for Intel(R) SSD DCT versions before 3.0.23 may allow a privileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-8759
MISC
intel -- thunderbolt_controllers
 
Reliance on untrusted inputs in a security decision in some Intel(R) Thunderbolt(TM) controllers may allow unauthenticated user to potentially enable information disclosure via physical access.2020-08-13not yet calculatedCVE-2019-14630
MISC
intel -- wireless_bluetooth_products
 
Improper input validation for some Intel(R) Wireless Bluetooth(R) products may allow an authenticated user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-0555
MISC
intel -- wireless_bluetooth_products
 
Race condition in software installer for some Intel(R) Wireless Bluetooth(R) products on Windows* 7, 8.1 and 10 may allow an unprivileged user to potentially enable escalation of privilege via local access.2020-08-13not yet calculatedCVE-2020-0554
MISC
intel -- wireless_bluetooth_products
 
Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access.2020-08-13not yet calculatedCVE-2020-0553
MISC
intel -- wireless_bluetooth_products
 
Insufficient control flow management for some Intel(R) Wireless Bluetooth(R) products may allow an unprivileged user to potentially enable denial of service via adjacent access.2020-08-13not yet calculatedCVE-2019-14620
MISC
intel -- wireless_for_open_source
 
Improper buffer restrictions in the Intel(R) Wireless for Open Source before version 1.5 may allow an unauthenticated user to potentially enable denial of service via adjacent access.2020-08-13not yet calculatedCVE-2020-8689
MISC
ise -- smart_connect_knx_valliant
 
ise smart connect KNX Vaillant 1.2.839 contain a Denial of Service.2020-08-14not yet calculatedCVE-2019-19643
MISC
jerryscript -- jerryscript
 
JerryScript through 2.3.0 has a (function({a=arguments}){const arguments}) buffer over-read.2020-08-13not yet calculatedCVE-2020-24344
MISC
loway -- queuemetrics
 
A SQL injection vulnerability at a tpf URI in Loway QueueMetrics before 19.10.21 allows remote authenticated attackers to execute arbitrary SQL commands via the TPF_XPAR1 parameter.2020-08-13not yet calculatedCVE-2020-15925
MISC
loway -- queuemetrics
 
A SQL injection vulnerability in the qm_adm/qm_export_stats_run.do endpoint of Loway QueueMetrics before 19.10.21 allows remote authenticated users to execute arbitrary SQL commands via the exportId parameter.2020-08-13not yet calculatedCVE-2020-15947
MISC
lua -- lua
 
Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.2020-08-13not yet calculatedCVE-2020-24342
MISC
MISC
mantisbt -- mantisbt
 
An XSS issue was discovered in MantisBT before 2.24.2. Improper escaping on view_all_bug_page.php allows a remote attacker to inject arbitrary HTML into the page by saving it into a text Custom Field, leading to possible code execution in the browser of any user subsequently viewing the issue (if CSP settings allow it).2020-08-12not yet calculatedCVE-2020-16266
CONFIRM
CONFIRM
mcafee -- data_loss_prevention
 
Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the ADRMS username and password via unprotected log files containing plain text2020-08-13not yet calculatedCVE-2020-7306
CONFIRM
mcafee -- data_loss_prevention_epo_extension
 
Cross site request forgery vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.5.3 allows authenticated remote attacker to embed a CRSF script via adding a new label.2020-08-13not yet calculatedCVE-2020-7304
CONFIRM
mcafee -- data_loss_prevention_epo_extension
 
Unrestricted Upload of File with Dangerous Type in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.5.3 allows authenticated attackers to upload malicious files to the DLP case management section via lack of sanity checking.2020-08-13not yet calculatedCVE-2020-7302
MISC
mcafee -- data_loss_prevention_epo_extension
 
Cross Site scripting vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.5.3 allows authenticated attackers to trigger alerts via the file upload tab in the DLP case management section.2020-08-12not yet calculatedCVE-2020-7301
CONFIRM
mcafee -- data_loss_prevention_epo_extension
 
Improper Authorization vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.5.3 allows authenticated remote attackers to change the configuration when logged in with view only privileges via carefully constructed HTTP post messages.2020-08-12not yet calculatedCVE-2020-7300
CONFIRM
mcafee -- data_loss_prevention_epo_extension
 
Privilege escalation vulnerability in McAfee Data Loss Prevention (DLP) ePO extension prior to 11.5.3 allows a low privileged remote attacker to create new rule sets via incorrect validation of user credentials.2020-08-13not yet calculatedCVE-2020-7305
CONFIRM
megvii -- koala
 
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.2020-08-14not yet calculatedCVE-2020-17475
MISC
microsoft -- composer-setup
 
In Composer-Setup for Windows before version 6.0.0, if the developer's computer is shared with other users, a local attacker may be able to exploit the following scenarios. 1. A local regular user may modify the existing `C:\ProgramData\ComposerSetup\bin\composer.bat` in order to get elevated command execution when composer is run by an administrator. 2. A local regular user may create a specially crafted dll in the `C:\ProgramData\ComposerSetup\bin` folder in order to get Local System privileges. See: https://itm4n.github.io/windows-server-netman-dll-hijacking. 3. If the directory of the php.exe selected by the user is not in the system path, it is added without checking that it is admin secured, as per Microsoft guidelines. See: https://msrc-blog.microsoft.com/2018/04/04/triaging-a-dll-planting-vulnerability.2020-08-14not yet calculatedCVE-2020-15145
MISC
CONFIRM
mozilla -- multiple_products
 
Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.2020-08-10not yet calculatedCVE-2020-15659
SUSE
SUSE
SUSE
MISC
MISC
MISC
MISC
MISC
MISC
nginx -- njs
 
njs through 0.4.3, used in NGINX, allows control-flow hijack in njs_value_property in njs_value.c. NOTE: the vendor considers the issue to be "fluff" in the NGINX use case because there is no remote attack surface.2020-08-13not yet calculatedCVE-2020-24349
MISC
nginx -- njs
 
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_lvlhsh_level_find in njs_lvlhsh.c.2020-08-13not yet calculatedCVE-2020-24347
MISC
nginx -- njs
 
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c.2020-08-13not yet calculatedCVE-2020-24348
MISC
nim -- nim
 
In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands.2020-08-14not yet calculatedCVE-2020-15692
MISC
CONFIRM
nim -- nim
 
In Nim 1.2.4, the standard library httpClient is vulnerable to a CR-LF injection in the target URL. An injection is possible if the attacker controls any part of the URL provided in a call (such as httpClient.get or httpClient.post), the User-Agent header value, or custom HTTP header names or values.2020-08-14not yet calculatedCVE-2020-15693
MISC
CONFIRM
nim -- nim
 
In Nim 1.2.4, the standard library httpClient fails to properly validate the server response. For example, httpClient.get().contentLength() does not raise any error if a malicious server provides a negative Content-Length.2020-08-14not yet calculatedCVE-2020-15694
MISC
CONFIRM
pactware -- pactware
 
In PACTware before 4.1 SP6 and 5.x before 5.0.5.31, passwords are stored in an insecure manner, and may be modified by an attacker with no knowledge of the current passwords.2020-08-11not yet calculatedCVE-2020-9404
CONFIRM
palo_alto_networks -- pan-os
 
When SSL/TLS Forward Proxy Decryption mode has been configured to decrypt the web transactions, the PAN-OS URL filtering feature inspects the HTTP Host and URL path headers for policy enforcement on the decrypted HTTPS web transactions but does not consider Server Name Indication (SNI) field within the TLS Client Hello handshake. This allows a compromised host in a protected network to evade any security policy that uses URL filtering on a firewall configured with SSL Decryption in the Forward Proxy mode. A malicious actor can then use this technique to evade detection of communication on the TLS handshake phase between a compromised host and a remote malicious server. This technique does not increase the risk of a host being compromised in the network. It does not impact the confidentiality or availability of a firewall. This is considered to have a low impact on the integrity of the firewall because the firewall fails to enforce a policy on certain traffic that should have been blocked. This issue does not impact the URL filtering policy enforcement on clear text or encrypted web transactions. This technique can be used only after a malicious actor has compromised a host in the protected network and the TLS/SSL Decryption feature is enabled for the traffic that the attacker controls. Palo Alto Networks is not aware of any malware that uses this technique to exfiltrate data. This issue is applicable to all current versions of PAN-OS.2020-08-12not yet calculatedCVE-2020-2035
CONFIRM
CONFIRM
pegasystems -- pega_platform
 
Pega Platform 8.2.1 allows LDAP injection because a username can contain a * character and can be of unlimited length. An attacker can specify four characters of a username, followed by the * character, to bypass access control.2020-08-13not yet calculatedCVE-2019-16374
MISC
MISC
phpjs -- phpjs
 
All versions of phpjs are vulnerable to Prototype Pollution via parse_str.2020-08-14not yet calculatedCVE-2020-7700
CONFIRM
phpjs -- phpjs
 
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.2020-08-14not yet calculatedCVE-2020-7701
CONFIRM
pnotes -- andrey_gruber_pnotes.net
 
A File Upload Vulnerability in PNotes - Andrey Gruber PNotes.NET v3.8.1.2 allows a local attacker to execute arbitrary code via the Miscellaneous " External Programs by uploading the malicious .exe file to the external program.2020-08-14not yet calculatedCVE-2020-22721
MISC
python -- python
 
In openapi-python-client before version 0.5.3, clients generated with a maliciously crafted OpenAPI Document can generate arbitrary Python code. Subsequent execution of this malicious client is arbitrary code execution.2020-08-14not yet calculatedCVE-2020-15142
MISC
MISC
CONFIRM
MISC
python -- python
 
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. If a user generated a client using a maliciously crafted OpenAPI document, it is possible for generated files to be placed in arbitrary locations on disk.2020-08-14not yet calculatedCVE-2020-15141
MISC
MISC
CONFIRM
MISC
qt -- qt
 
An issue was discovered in Qt through 5.12.9, and 5.13.x through 5.15.x before 5.15.1. read_xbm_body in gui/image/qxbmhandler.cpp has a buffer over-read.2020-08-12not yet calculatedCVE-2020-17507
MISC
MISC
MISC
FEDORA
radare2 -- radare2
 
radare2 4.5.0 misparses signature information in PE files, causing a segmentation fault in r_x509_parse_algorithmidentifier in libr/util/x509.c. This is due to a malformed object identifier in IMAGE_DIRECTORY_ENTRY_SECURITY.2020-08-11not yet calculatedCVE-2020-17487
MISC
rapid_software -- rapid_scada
 
Rapid Software LLC Rapid SCADA 5.8.0 is affected by a local privilege escalation vulnerability in the ScadaAgentSvc.exe executable file. An attacker can obtain admin privileges by placing a malicious .exe file in the application and renaming it ScadaAgentSvc.exe, which would result in executing the binary as NT AUTHORITY\SYSTEM in a Windows operating system. For example, an attacker can plant a reverse shell from a low privileged user account and by restarting the computer, the malicious service will be started as NT AUTHORITY\SYSTEM by giving the attacker full system access to the remote PC.2020-08-14not yet calculatedCVE-2020-22722
MISC
readytalk -- avian
 
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h contains multiple boundary checks that are performed to prevent out-of-bounds memory read/write. However, two of these boundary checks contain an integer overflow that leads to a bypass of these checks, and out-of-bounds read/write. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.2020-08-12not yet calculatedCVE-2020-17360
MISC
MISC
readytalk -- avian
 
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in ReadyTalk Avian 1.2.0. The vm::arrayCopy method defined in classpath-common.h returns silently when a negative length is provided (instead of throwing an exception). This could result in data being lost during the copy, with varying consequences depending on the subsequent use of the destination buffer. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.2020-08-12not yet calculatedCVE-2020-17361
MISC
MISC
rosariosis -- rosariosis
 
Reflected Cross-Site Scripting vulnerability in Modules.php in RosarioSIS Student Information System < 6.5.1 allows remote attackers to execute arbitrary web script via embedding javascript or HTML tags in a GET request.2020-08-12not yet calculatedCVE-2020-13278
MISC
MISC
CONFIRM
securepoint -- securepoint_ssl_vpn_client
 
A local privilege escalation vulnerability in SPSSLVpnService.exe in Securepoint GmbH from Lueneburg Securepoint SSL VPN Client 2.0.28 allows a local attacker to gain privileges via a crafted malicious exe and perform unauthorized actions.2020-08-14not yet calculatedCVE-2020-22720
MISC
shenzhen_hichip_vision_technology -- multiple_devices
 
Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from cryptographic issues that allow remote attackers to access user session data, as demonstrated by eavesdropping on user video/audio streams, capturing credentials, and compromising devices. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.2020-08-10not yet calculatedCVE-2020-9528
MISC
MISC
shenzhen_hichip_vision_technology -- multiple_devices
 
Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20, after 2018-08-09 through 2020), as used by many different vendors in millions of Internet of Things devices, suffers from buffer overflow vulnerability that allows unauthenticated remote attackers to execute arbitrary code via the peer-to-peer (P2P) service. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.2020-08-10not yet calculatedCVE-2020-9527
MISC
MISC
shenzhen_hichip_vision_technology -- multiple_devices
 
Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from a privilege escalation vulnerability that allows attackers on the local network to reset the device's administrator password. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.2020-08-10not yet calculatedCVE-2020-9529
MISC
MISC
siemens -- automation_license_manager
 
A vulnerability has been identified in Automation License Manager 5 (All versions), Automation License Manager 6 (All versions < V6.0.8). The application does not properly validate the users' privileges when executing some operations, which could allow a user with low permissions to arbitrary modify files that should be protected against writing.2020-08-14not yet calculatedCVE-2020-7583
MISC
siemens -- desigo_cc_and_desigo_cc_compact
 
A vulnerability has been identified in Desigo CC (V4.x), Desigo CC (V3.x), Desigo CC Compact (V4.x), Desigo CC Compact (V3.x). Affected applications are delivered with a 3rd party component (BIRT) that contains a remote code execution vulnerability if the Advanced Reporting Engine is enabled. The vulnerability could allow a remote unauthenticated attacker to execute arbitrary commands on the server with SYSTEM privileges.2020-08-14not yet calculatedCVE-2020-10055
MISC
MISC
siemens -- sicam_a8000_rtu_devicesA vulnerability has been identified in SICAM WEB firmware for SICAM A8000 RTUs (All versions < V05.30). The login screen does not sufficiently sanitize input, which enables an attacker to generate specially crafted log messages. If an unsuspecting victim views the log messages via the web browser, these log messages might be interpreted and executed as code by the web application. This Cross-Site-Scripting (XSS) vulnerability might compromize the confidentiality, integrity and availability of the web application.2020-08-14not yet calculatedCVE-2020-15781
MISC
smartcontrol -- smartcontrol
 
An Uncontrolled Search Path Element (CWE-427) vulnerability in SmartControl version 4.3.15 and versions released before April 15, 2020 may allow an authenticated user to escalate privileges by placing a specially crafted DLL file in the search path. This issue was fixed in version 1.0.7, which was released after April 15, 2020. (Note, the version numbering system changed significantly between version 4.3.15 and version 1.0.7.)2020-08-13not yet calculatedCVE-2020-7360
MISC
sonatype -- nexus_repository_manager
 
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.2020-08-12not yet calculatedCVE-2020-15868
CONFIRM
spirent -- testcenter_and_avalanche
 
An issue was discovered on Spirent TestCenter and Avalanche appliance admin interface firmware. An attacker, who already has access to an SSH restricted shell, can achieve root access via shell metacharacters. The attacker can then, for example, read sensitive files such as appliance admin configuration source code. This affects Spirent TestCenter and Avalanche products which chassis version <= 5.08. The SSH restricted shell is available with default credentials.2020-08-13not yet calculatedCVE-2020-11733
MISC
MISC
st_engineering -- vpncrypt_m10
 
The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows command injection via a text field, which allow full control over this module's Operating System.2020-08-12not yet calculatedCVE-2020-12107
MISC
MISC
st_engineering -- vpncrypt_m10
 
The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows unauthenticated users to send HTTP POST request to several critical Administrative functions such as, changing credentials of the Administrator account or connect the product to a rogue access point.2020-08-12not yet calculatedCVE-2020-12106
MISC
MISC
textpattern -- textpattern
 
In Textpattern 4.5.7, an unprivileged author can change an article's markup setting.2020-08-14not yet calculatedCVE-2015-8032
CONFIRM
CONFIRM
textpattern -- textpattern
 
In Textpattern 4.5.7, the password-reset feature does not securely tether a hash to a user account.2020-08-14not yet calculatedCVE-2015-8033
CONFIRM
CONFIRM
tridium -- niagara_and_niagara_enterprise_securityA timeout during a TLS handshake can result in the connection failing to terminate. This can result in a Niagara thread hanging and requires a manual restart of Niagara (Versions 4.6.96.28, 4.7.109.20, 4.7.110.32, 4.8.0.110) and Niagara Enterprise Security (Versions 2.4.31, 2.4.45, 4.8.0.35) to correct.2020-08-13not yet calculatedCVE-2020-14483
MISC
trousers -- toursers
 
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.2020-08-13not yet calculatedCVE-2020-24330
MLIST
MISC
MISC
MISC
trousers -- toursers
 
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).2020-08-13not yet calculatedCVE-2020-24331
MLIST
MISC
MISC
MISC
trousers -- toursers
 
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks. The tss user can be used to create or corrupt existing files, which could possibly lead to a DoS attack.2020-08-13not yet calculatedCVE-2020-24332
MLIST
MISC
MISC
MISC
vbulletin -- vbulletin
 
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.2020-08-12not yet calculatedCVE-2020-17496
MISC
MISC
MISC
vmware -- concourse
 
Concourse, versions prior to 6.3.1 and 6.4.1, in installations which use the GitLab auth connector, is vulnerable to identity spoofing by way of configuring a GitLab account with the same full name as another user who is granted access to a Concourse team. GitLab groups do not have this vulnerability, so GitLab users may be moved into groups which are then configured in the Concourse team.2020-08-12not yet calculatedCVE-2020-5415
CONFIRM
CONFIRM
wireshark -- wireshark
 
In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.2020-08-13not yet calculatedCVE-2020-17498
MISC
MISC
MISC
wordpress -- worpress
 
A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field).2020-08-14not yet calculatedCVE-2019-6112
CONFIRM
MISC
zalo -- zalo_desktop
 
An issue was discovered in Zalo.exe in VNG Zalo Desktop 19.8.1.0. An attacker can run arbitrary commands on a remote Windows machine running the Zalo client by sending the user of the device a crafted file.2020-08-13not yet calculatedCVE-2020-16087
MISC
MISC
MISC
zkteco -- facedepot_7b_and_zkbiosecurity_server
 
A token-reuse vulnerability in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to create arbitrary new users, elevate users to administrators, delete users, and download user faces from the database.2020-08-14not yet calculatedCVE-2020-17474
MISC
zkteco -- facedepot_7b_and_zkbiosecurity_server
 
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.2020-08-14not yet calculatedCVE-2020-17473
MISC
zoom -- zoom
 
A vulnerability related to Dynamic-link Library (“DLL”) loading in the Zoom Sharing Service would allow an attacker who had local access to a machine on which the service was running with elevated privileges to elevate their system privileges as well through use of a malicious DLL. Zoom addressed this issue, which only applies to Windows users, in the 5.0.4 client release.2020-08-14not yet calculatedCVE-2020-9767
CONFIRM

Back to top

Please share your thoughts

We recently updated our anonymous product survey; we’d welcome your feedback.