Vulnerability Summary for the Week of October 5, 2020

Released
Oct 12, 2020
Document ID
SB20-286

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.

Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High: vulnerabilities with a CVSS base score of 7.0–10.0
  • Medium: vulnerabilities with a CVSS base score of 4.0–6.9
  • Low: vulnerabilities with a CVSS base score of 0.0–3.9

Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis. 


The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available.

 

High Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
artica -- pandora_fmsArtica Pandora FMS before 743 allows unauthenticated attackers to conduct SQL injection attacks via the pandora_console/include/chart_generator.php session_id parameter.2020-10-027.5CVE-2020-26518
MISC
craftercms -- studioImproper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy scripting. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.2020-10-069CVE-2020-25802
CONFIRM
craftercms -- studioImproper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.2020-10-069CVE-2020-25803
MISC
foxitsoftware -- foxit_readerAn issue was discovered in Foxit Reader and PhantomPDF before 10.1. There is an Opt object use-after-free related to Field::ClearItems and Field::DeleteOptions, during AcroForm JavaScript execution.2020-10-027.5CVE-2020-26534
MISC
foxitsoftware -- foxit_readerAn issue was discovered in Foxit Reader and PhantomPDF before 10.1. When there is a multiple interpretation error for /V (in the Additional Action and Field dictionaries), a use-after-free can occur with resultant remote code execution (or an information leak).2020-10-027.5CVE-2020-26539
MISC
foxitsoftware -- foxit_readerAn issue was discovered in Foxit Reader and PhantomPDF before 10.1. In a certain Shading calculation, the number of outputs is unequal to the number of color components in a color space. This causes an out-of-bounds write.2020-10-027.5CVE-2020-26537
MISC
foxitsoftware -- foxit_readerAn issue was discovered in Foxit Reader and PhantomPDF before 10.1. If TslAlloc attempts to allocate thread local storage but obtains an unacceptable index value, V8 throws an exception that leads to a write access violation (and read access violation).2020-10-027.5CVE-2020-26535
MISC
google -- androidAn issue was discovered in TimaService on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. PendingIntent with an empty intent is mishandled, allowing an attacker to perform a privileged action via a modified intent. The Samsung ID is SVE-2020-18418 (October 2020).2020-10-067.5CVE-2020-26607
MISC
ibm -- maximo_asset_managementIBM Maximo Asset Management 7.6.0 and 7.6.1 could allow an attacker to bypass authentication and issue commands using a specially crafted HTTP command. IBM X-Force ID: 181995.2020-10-057.5CVE-2020-4493
XF
CONFIRM
mpd_project -- mpdThe L2TP implementation of MPD before 5.9 allows a remote attacker who can send specifically crafted L2TP control packet with AVP Q.931 Cause Code to execute arbitrary code or cause a denial of service (memory corruption).2020-10-067.5CVE-2020-7465
MISC
MISC
msi -- ambientlink_mslo64_firmwareThe MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).2020-10-027.2CVE-2020-17382
MISC
MISC
MISC
openmediavault -- openmediavaultopenmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.2020-10-029CVE-2020-26124
MISC
CONFIRM
pluxml -- pluxmlclass.plx.admin.php in PluXml 5.7 allows attackers to execute arbitrary PHP code by modify the configuration file in a linux environment.2020-10-027.5CVE-2020-18185
MISC
redhat -- libvirtA double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.2020-10-067.2CVE-2020-25637
MISC
safetydance_project -- safetydanceAll versions of package safetydance are vulnerable to Prototype Pollution via the set function.2020-10-027.5CVE-2020-7737
MISC
secudos -- domosconf_datetime in Secudos DOMOS 5.8 allows remote attackers to execute arbitrary commands as root via shell metacharacters in the zone field (obtained from the web interface).2020-10-028.5CVE-2020-14293
MISC
MISC
MISC
MISC
MISC
sierrawireless -- aleosUnauthenticated RPC server on ALEOS before 4.4.9, 4.9.5, and 4.14.0 allows remote code execution.2020-10-067.5CVE-2020-8782
CONFIRM
sierrawireless -- aleosLack of input sanitization in UpdateRebootMgr service of ALEOS 4.11 and later allow an escalation to root from a low-privilege process.2020-10-067.2CVE-2020-8781
CONFIRM
wavlink -- wn530h4_firmwareA remote buffer overflow vulnerability in the /cgi-bin/makeRequest.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary machine instructions as root without authentication.2020-10-0210CVE-2020-12125
MISC
MISC
wavlink -- wn530h4_firmwareMultiple authentication bypass vulnerabilities in the /cgi-bin/ endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allow an attacker to leak router settings, change configuration variables, and cause denial of service via an unauthenticated endpoint.2020-10-027.5CVE-2020-12126
MISC
MISC
wavlink -- wn530h4_firmwareCSRF vulnerabilities in the /cgi-bin/ directory of the WAVLINK WN530H4 M30H4.V5030.190403 allow an attacker to remotely access router endpoints, because these endpoints do not contain CSRF tokens. If a user is authenticated in the router portal, then this attack will work.2020-10-027.8CVE-2020-12123
MISC
MISC
wavlink -- wn530h4_firmwareA remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.2020-10-0210CVE-2020-12124
MISC
MISC
zohocorp -- manageengine_desktop_centralAn issue was discovered in the client side of Zoho ManageEngine Desktop Central 10.0.0.SP-534. An attacker-controlled server can trigger an integer overflow in InternetSendRequestEx and InternetSendRequestByBitrate that leads to a heap-based buffer overflow and Remote Code Execution with SYSTEM privileges.2020-10-029CVE-2020-24397
MISC
CONFIRM

Back to top

 

Medium Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
artifex -- mupdfArtifex MuPDF before 1.18.0 has a heap based buffer over-write when parsing JBIG2 files allowing attackers to cause a denial of service.2020-10-024.3CVE-2020-26519
MISC
MISC
barchart -- maven_cascade_releaseJenkins Maven Cascade Release Plugin 1.3.2 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to start cascade builds and layout builds, and reconfigure the plugin.2020-10-084CVE-2020-2294
MLIST
CONFIRM
barchart -- maven_cascade_releaseA cross-site request forgery (CSRF) vulnerability in Jenkins Maven Cascade Release Plugin 1.3.2 and earlier allows attackers to start cascade builds and layout builds, and reconfigure the plugin.2020-10-084.3CVE-2020-2295
MLIST
CONFIRM
bitdefender -- enginesA vulnerability has been discovered in the ceva_emu.cvd module that results from a lack of proper validation of user-supplied data, which can result in a pointer that is fetched from uninitialized memory. This can lead to denial-of-service. This issue affects: Bitdefender Engines version 7.84897 and prior versions.2020-10-025CVE-2020-8110
MISC
bludit -- bluditBludit v3.8.1 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /admin/ajax/upload-profile-picture.2020-10-026.4CVE-2020-18190
MISC
clickstudios -- passwordstateClickStudios Passwordstate Password Reset Portal prior to build 8501 is affected by an authentication bypass vulnerability. The ResetPassword function does not validate whether the user has successfully authenticated using security questions. An unauthenticated, remote attacker can send a crafted HTTP request to the /account/ResetPassword page to set a new password for any registered user.2020-10-055CVE-2020-26061
MISC
MISC
compass-security -- fusionauth-samlv2FusionAuth fusionauth-samlv2 0.2.3 allows remote attackers to forge messages and bypass authentication via a SAML assertion that lacks a Signature element, aka a "Signature exclusion attack".2020-10-026.4CVE-2020-12676
MISC
FULLDISC
MISC
MISC
MISC
damstratechnology -- smart_assetDamstra Smart Asset 2020.7 has SQL injection via the API/api/Asset originator parameter. This allows forcing the database and server to initiate remote connections to third party DNS servers.2020-10-026.4CVE-2020-26525
MISC
MISC
MISC
damstratechnology -- smart_assetAn issue was discovered in Damstra Smart Asset 2020.7. It is possible to enumerate valid usernames on the login page. The application sends a different server response when the username is invalid than when the username is valid ("Unable to find an APIDomain" versus "Wrong email or password").2020-10-025CVE-2020-26526
MISC
MISC
MISC
erlang -- erlang/otpErlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used.2020-10-024.3CVE-2020-25623
CONFIRM
CONFIRM
MISC
foxitsoftware -- foxit_readerAn issue was discovered in Foxit Reader and PhantomPDF before 10.1. It allows attackers to execute arbitrary code via a Trojan horse taskkill.exe in the current working directory.2020-10-024.4CVE-2020-26538
MISC
foxitsoftware -- foxit_readerAn issue was discovered in Foxit Reader and PhantomPDF before 4.1 on macOS. Because the Hardened Runtime protection mechanism is not applied to code signing, code injection (or an information leak) can occur.2020-10-025CVE-2020-26540
MISC
getfilecloud -- filecloudCodeLathe FileCloud before 20.2.0.11915 allows username enumeration.2020-10-025CVE-2020-26524
MISC
MISC
gitlab -- gitlabAn issue has been discovered in GitLab affecting all versions before 13.2.10, 13.3.7 and 13.4.2: XSS in SVG File Preview. Overall impact is limited due to the current user only being impacted.2020-10-086CVE-2020-13339
CONFIRM
MISC
MISC
google -- androidAn issue was discovered in SystemUI on Samsung mobile devices with O(8.x), P(9.0), Q(10.0), and R(11.0) software. PendingIntent allows an unprivileged process to access contact numbers. The Samsung ID is SVE-2020-18467 (October 2020).2020-10-065CVE-2020-26604
MISC
google -- androidAn issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. Sticker Center allows directory traversal for an unprivileged process to read arbitrary files. The Samsung ID is SVE-2020-18433 (October 2020).2020-10-065CVE-2020-26603
MISC
google -- androidAn issue was discovered in EthernetNetwork on Samsung mobile devices with O(8.1), P(9.0), Q(10.0), and R(11.0) software. PendingIntent allows sdcard access by an unprivileged process. The Samsung ID is SVE-2020-18392 (October 2020).2020-10-065CVE-2020-26602
MISC
google -- androidAn issue was discovered on Samsung mobile devices with Q(10.0) software. Auto Hotspot allows attackers to obtain sensitive information. The Samsung ID is SVE-2020-17288 (October 2020).2020-10-065CVE-2020-26600
MISC
google -- androidAn issue was discovered on Samsung mobile devices with Q(10.0) software. The DynamicLockscreen Terms and Conditions can be accepted without authentication. The Samsung ID is SVE-2020-17079 (October 2020).2020-10-065CVE-2020-26599
MISC
google -- androidAn issue was discovered on LG mobile devices with Android OS 8.0, 8.1, and 9.0 software. The Network Management component could allow an unauthorized actor to kill a TCP connection. The LG ID is LVE-SMP-200023 (October 2020).2020-10-065CVE-2020-26598
MISC
google -- androidAn issue was discovered on LG mobile devices with Android OS 9.0 and 10 software. The Wi-Fi subsystem has incorrect input validation, leading to a crash. The LG ID is LVE-SMP-200022 (October 2020).2020-10-065CVE-2020-26597
MISC
google -- androidAn issue was discovered on Samsung mobile devices with Q(10.0) and R(11.0) (Exynos chipsets) software. They allow attackers to obtain sensitive information by reading a log. The Samsung ID is SVE-2020-18596 (October 2020).2020-10-065CVE-2020-26605
MISC
google -- androidAn issue was discovered on Samsung mobile devices with O(8.x), P(9.0), Q(10.0), and R(11.0) software. An attacker can access certain Secure Folder content via a debugging command. The Samsung ID is SVE-2020-18673 (October 2020).2020-10-065CVE-2020-26606
MISC
google -- androidAn issue was discovered in DirEncryptService on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) software. PendingIntent with an empty intent is mishandled, allowing an attacker to perform a privileged action via a modified intent. The Samsung ID is SVE-2020-18034 (October 2020).2020-10-065CVE-2020-26601
MISC
ibm -- informix_dynamic_serverIBM Informix spatial 14.10 could allow a local user to execute commands as a privileged user due to an out of bounds write vulnerability. IBM X-Force ID: 189460.2020-10-084.6CVE-2020-4799
XF
CONFIRM
ibm -- security_access_managerIBM Security Access Manager Appliance 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 172131.2020-10-064.3CVE-2019-4725
XF
CONFIRM
intel -- driver_\&_support_assistantImproper permissions in the Intel(R) Driver & Support Assistant before version 20.7.26.7 may allow an authenticated user to potentially enable escalation of privilege via local access.2020-10-054.6CVE-2020-12302
MISC
jenkins -- audit_trailIn Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.2020-10-085CVE-2020-2288
MLIST
CONFIRM
jenkins -- personaJenkins Persona Plugin 2.4 and earlier allows users with Overall/Read permission to read arbitrary files on the Jenkins controller.2020-10-084CVE-2020-2293
MLIST
CONFIRM
jenkins -- shared_objectsA cross-site request forgery (CSRF) vulnerability in Jenkins Shared Objects Plugin 0.44 and earlier allows attackers to configure shared objects.2020-10-084.3CVE-2020-2296
MLIST
CONFIRM
linux -- linux_kernelA flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.2020-10-064.9CVE-2020-25641
SUSE
MLIST
MISC
MISC
MISC
linux -- linux_kernelThe Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.2020-10-026.9CVE-2020-26541
MISC
livehelperchat -- live_helper_chatLive Helper Chat before 3.44v allows reflected XSS via the setsettingajax PATH_INFO.2020-10-024.3CVE-2020-26135
MISC
MISC
MISC
livehelperchat -- live_helper_chatLive Helper Chat before 3.44v allows stored XSS in chat messages with an operator via BBCode.2020-10-024.3CVE-2020-26134
MISC
MISC
MISC
mapfish -- printIn mapfish-print before version 3.24, a user can use the JSONP support to do a Cross-site scripting.2020-10-024.3CVE-2020-15231
MISC
CONFIRM
mapfish -- printIn mapfish-print before version 3.24, a user can do to an XML External Entity (XXE) attack with the provided SDL style.2020-10-026.4CVE-2020-15232
MISC
CONFIRM
monocms -- monocmsMonoCMS Blog 1.0 stores hard-coded admin hashes in the log.xml file in the source files for MonoCMS Blog. Hash type is bcrypt and hashcat mode 3200 can be used to crack the hash.2020-10-065CVE-2020-25987
MISC
MISC
monocms -- monocmsMonoCMS Blog 1.0 is affected by: Arbitrary File Deletion. Any authenticated user can delete files on and off the webserver (php files can be unlinked and not deleted).2020-10-075.5CVE-2020-25985
MISC
MISC
mpd_project -- mpdThe PPP implementation of MPD before 5.9 allows a remote attacker who can send specifically crafted PPP authentication message to cause the daemon to read beyond allocated memory buffer, which would result in a denial of service condition.2020-10-065CVE-2020-7466
MISC
MISC
nvidia -- virtual_gpu_managerNVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the DirectX11 user mode driver (nvwgf2um/x.dll), in which a specially crafted shader can cause an out of bounds access, which may lead to denial of service or code execution.2020-10-024.6CVE-2020-5981
CONFIRM
nvidia -- virtual_gpu_managerNVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in multiple components in which a securely loaded system DLL will load its dependencies in an insecure fashion, which may lead to code execution or denial of service.2020-10-024.6CVE-2020-5980
CONFIRM
nvidia -- virtual_gpu_managerNVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the NVIDIA Control Panel component in which a user is presented with a dialog box for input by a high-privilege process, which may lead to escalation of privileges.2020-10-024.6CVE-2020-5979
CONFIRM
powerdns -- authoritativeAn issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.2020-10-025.1CVE-2020-24696
MISC
powerdns -- authoritativeAn issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.2020-10-024.3CVE-2020-24697
CONFIRM
powerdns -- authoritativeAn issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.2020-10-026.8CVE-2020-24698
CONFIRM
reddoxx -- maildepotREDDOXX MailDepot 2032 2.2.1242 allows authenticated users to access the mailboxes of other users.2020-10-066.5CVE-2019-19200
MISC
MISC
MISC
redhat -- wildfly_opensslA memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. It may allow the attacker to cause OOM leading to a denial of service. The highest threat from this vulnerability is to system availability.2020-10-065CVE-2020-25644
MISC
MISC
MISC
requarks -- wiki.jsIn Wiki.js before version 2.5.151, directory traversal outside of Wiki.js context is possible when a storage module with local asset cache fetching is enabled. A malicious user can potentially read any file on the file system by crafting a special URL that allows for directory traversal. This is only possible when a storage module implementing local asset cache (e.g Local File System or Git) is enabled and that no web application firewall solution (e.g. cloudflare) strips potentially malicious URLs. Commit 084dcd69d1591586ee4752101e675d5f0ac6dcdc fixes this vulnerability by sanitizing the path before it is passed on to the storage module. The sanitization step removes any directory traversal (e.g. `..` and `.`) sequences as well as invalid filesystem characters from the path. As a workaround, disable any storage module with local asset caching capabilities such as Local File System and Git.2020-10-055CVE-2020-15236
MISC
CONFIRM
secudos -- qiata_ftaAn issue was discovered in Secudos Qiata FTA 1.70.19. The comment feature allows persistent XSS that is executed when reading transfer comments or the global notice board.2020-10-024.3CVE-2020-14294
MISC
MISC
MISC
MISC
MISC
shiba_project -- shibaAll versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad().2020-10-026.5CVE-2020-7738
CONFIRM
simpl-schema_project -- simpl-schemaThis affects the package simpl-schema before 1.10.2.2020-10-075CVE-2020-7742
MISC
MISC
sysaid -- sysaid_on-premisesSysAid 20.1.11b26 allows reflected XSS via the ForgotPassword.jsp accountid parameter.2020-10-024.3CVE-2020-13168
MISC
MISC
wavlink -- wn530h4_firmwareAn information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication.2020-10-025CVE-2020-12127
MISC
MISC
wireshark -- wiresharkIn Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the TCP dissector could crash. This was addressed in epan/dissectors/packet-tcp.c by changing the handling of the invalid 0xFFFF checksum.2020-10-065CVE-2020-25862
MISC
MISC
MISC
wireshark -- wiresharkIn Wireshark 3.2.0 to 3.2.6, 3.0.0 to 3.0.13, and 2.6.0 to 2.6.20, the MIME Multipart dissector could crash. This was addressed in epan/dissectors/packet-multipart.c by correcting the deallocation of invalid MIME parts.2020-10-065CVE-2020-25863
MISC
MISC
MISC
wireshark -- wiresharkIn Wireshark 3.2.0 to 3.2.6 and 3.0.0 to 3.0.13, the BLIP protocol dissector has a NULL pointer dereference because a buffer was sized for compressed (not uncompressed) messages. This was addressed in epan/dissectors/packet-blip.c by allowing reasonable compression ratios and rejecting ZIP bombs.2020-10-065CVE-2020-25866
MISC
MISC
MISC
wpo365 -- wordpress_\+_azure_ad_\/_microsoft_office_365The wpo365-login plugin before v11.7 for WordPress allows use of a symmetric algorithm to decrypt a JWT token. This leads to authentication bypass.2020-10-025CVE-2020-26511
MISC
MISC
MISC
MISC
zohocorp -- manageengine_desktop_centralA design issue was discovered in GetInternetRequestHandle, InternetSendRequestEx and InternetSendRequestByBitrate in the client side of Zoho ManageEngine Desktop Central 10.0.552.W. By exploiting this issue, an attacker-controlled server can force the client to skip TLS certificate validation, leading to a man-in-the-middle attack against HTTPS and unauthenticated remote code execution.2020-10-026.8CVE-2020-15589
MISC
CONFIRM

Back to top

 

Low Vulnerabilities

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
gitlab -- gitlabAn issue has been discovered in GitLab affecting versions from 12.10 to 12.10.12 that allowed for a stored XSS payload to be added as a group name.2020-10-023.5CVE-2020-13337
CONFIRM
MISC
gitlab -- gitlabAn issue has been discovered in GitLab affecting versions prior to 12.10.13, 13.0.8, 13.1.2. A stored cross-site scripting vulnerability was discovered when editing references.2020-10-023.5CVE-2020-13338
CONFIRM
MISC
jenkins -- active_choicesJenkins Active Choices Plugin 2.4 and earlier does not escape the name and description of build parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.2020-10-083.5CVE-2020-2289
MLIST
CONFIRM
jenkins -- active_choicesJenkins Active Choices Plugin 2.4 and earlier does not escape some return values of sandboxed scripts for Reactive Reference Parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.2020-10-083.5CVE-2020-2290
MLIST
CONFIRM
jenkins -- couchdb-statisticsJenkins couchdb-statistics Plugin 0.3 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.2020-10-082.1CVE-2020-2291
MLIST
CONFIRM
nvidia -- virtual_gpu_managerNVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) scheduler, in which the software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests, which may lead to denial of service.2020-10-022.1CVE-2020-5982
CONFIRM
qemu -- qemupci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.2020-10-062.1CVE-2020-25742
CONFIRM
MISC
MISC
MISC
qemu -- qemuhw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.2020-10-062.1CVE-2020-25743
CONFIRM
MISC
MISC
MISC
redhat -- ansibleA flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.2020-10-053.6CVE-2020-25636
CONFIRM
MISC
redhat -- ansibleA flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.2020-10-052.1CVE-2020-25635
CONFIRM
MISC

Back to top

 

Severity Not Yet Assigned

Primary
Vendor -- Product
DescriptionPublishedCVSS ScoreSource & Patch Info
apache -- calcite
 
HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.2020-10-09not yet calculatedCVE-2020-13955
MISC
atlassian -- jira_server_and_data_center
 
Affected versions of Jira Server & Data Center allow a remote attacker with limited (non-admin) privileges to view a Jira instance's Support Entitlement Number (SEN) via an Information Disclosure vulnerability in the HTTP Response headers. The affected versions are before version 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before 8.12.1.2020-10-06not yet calculatedCVE-2020-14183
MISC
bosh_systems -- metrics_server
 
BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details).2020-10-02not yet calculatedCVE-2020-5422
CONFIRM
cisco -- asr_5000_series_routers
 
A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user. To exploit this vulnerability, an attacker would need to have valid administrative credentials on an affected device.2020-10-08not yet calculatedCVE-2020-3601
CISCO
cisco -- asr_5000_series_routers
 
A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user on the affected device. To exploit this vulnerability, an attacker would need to have valid credentials on an affected device and know the password for the cli test-commands command.2020-10-08not yet calculatedCVE-2020-3602
CISCO
cisco -- email_security_appliance
 
A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device.2020-10-08not yet calculatedCVE-2020-3568
CISCO

cisco -- expressway_series_and_telepresence_video_communication_server

A vulnerability in the Session Initiation Protocol (SIP) of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect handling of incoming SIP traffic. An attacker could exploit this vulnerability by sending a series of SIP packets to an affected device. A successful exploit could allow the attacker to exhaust memory on an affected device, causing it to crash and leading to a DoS condition.2020-10-08not yet calculatedCVE-2020-3596
CISCO
cisco -- firepower_management_center
 
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by first entering input within the web-based management interface and then persuading a user of the interface to view the crafted input within the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.2020-10-08not yet calculatedCVE-2020-3320
CISCO
cisco -- identity_services_engineA vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need to have valid administrative credentials.2020-10-08not yet calculatedCVE-2020-3589
CISCO
cisco -- identity_services_engineA vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to modify parts of the configuration on an affected device. The vulnerability is due to improper enforcement of role-based access control (RBAC) within the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to modify parts of the configuration. The modified configuration could either allow unauthorized devices onto the network or prevent authorized devices from accessing the network. To exploit this vulnerability, an attacker would need valid Read-Only Administrator credentials.2020-10-08not yet calculatedCVE-2020-3467
CISCO
cisco -- industrial_network_director
 
A vulnerability in the management REST API of Cisco Industrial Network Director (IND) could allow an authenticated, remote attacker to cause the CPU utilization to increase to 100 percent, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of requests sent to the REST API. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to cause a permanent DoS condition that is due to high CPU utilization. Manual intervention may be required to recover the Cisco IND.2020-10-08not yet calculatedCVE-2020-3567
CISCO
cisco -- nexus_data_broker_software
 
A vulnerability in the configuration restore feature of Cisco Nexus Data Broker software could allow an unauthenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient validation of configuration backup files. An attacker could exploit this vulnerability by persuading an administrator to restore a crafted configuration backup file. A successful exploit could allow the attacker to overwrite arbitrary files that are accessible through the affected software on an affected device.2020-10-08not yet calculatedCVE-2020-3597
CISCO
cisco -- sd-wan_vmanage_software
 
A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface.2020-10-08not yet calculatedCVE-2020-3536
CISCO

cisco -- video_surveillance_8000_series_ip_cameras

A vulnerability in the Cisco Discovery Protocol implementation for Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to execute arbitrary code on an affected device or cause the device to reload. This vulnerability is due to missing checks when an IP camera processes a Cisco Discovery Protocol packet. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to execute code on the affected IP camera or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).2020-10-08not yet calculatedCVE-2020-3544
CISCO

cisco -- video_surveillance_8000_series_ip_cameras

A vulnerability in the Cisco Discovery Protocol of Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect processing of certain Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending certain Cisco Discovery Protocol packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DOS condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).2020-10-08not yet calculatedCVE-2020-3543
CISCO

cisco -- vision_dynamic_signage_director

A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to access confidential information or make configuration changes. The vulnerability is due to missing authentication for a specific section of the web-based management interface. An attacker could exploit this vulnerability by accessing a crafted URL. A successful exploit could allow the attacker to obtain access to a section of the interface, which they could use to read confidential information or make configuration changes.2020-10-08not yet calculatedCVE-2020-3598
CISCO
cisco -- webex_teams
 
A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account.2020-10-08not yet calculatedCVE-2020-3535
CISCO
cloudflare -- cloudflared
 
`cloudflared` versions prior to 2020.8.1 contain a local privilege escalation vulnerability on Windows systems. When run on a Windows system, `cloudflared` searches for configuration files which could be abused by a malicious entity to execute commands as a privileged user. Version 2020.8.1 fixes this issue.2020-10-02not yet calculatedCVE-2020-24356
CONFIRM
cmonos.jp -- cmonos.jp
 
Stored cross-site scripting vulnerability in CMONOS.JP ver2.0.20191009 and earlier allows remote attackers to inject arbitrary script via unspecified vectors.2020-10-06not yet calculatedCVE-2020-5631
MISC
MISC
MISC
connectwise -- automate
 
The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.2020-10-09not yet calculatedCVE-2020-15838
MISC
CONFIRM
contao -- contao
 
Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered.2020-10-07not yet calculatedCVE-2020-25768
MISC
CONFIRM
cuppacms -- cuppacmsThe file manager option in CuppaCMS before 2019-11-12 allows an authenticated attacker to upload a malicious file within an image extension and through a custom request using the rename function provided by the file manager is able to modify the image extension into PHP resulting in remote arbitrary code execution.2020-10-05not yet calculatedCVE-2020-26048
MISC
cure53 -- dompurify
 
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.2020-10-07not yet calculatedCVE-2020-26870
MISC
MISC
MISC
d-link -- dap-1360u_devices
 
D-Link DAP-1360U before 3.0.1 devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the IP JSON value for ping (aka res_config_action=3&res_config_id=18).2020-10-06not yet calculatedCVE-2020-26582
CONFIRM
MISC
d-link -- dsr-250n_devices
 
An issue was discovered on D-Link DSR-250N before 3.17B devices. The CGI script upgradeStatusReboot.cgi can be accessed without authentication. Any access reboots the device, rendering it therefore unusable for several minutes.2020-10-08not yet calculatedCVE-2020-26567
MISC
MISC
MISC
damstra -- smart_asset
 
An issue was discovered in API/api/Version in Damstra Smart Asset 2020.7. Cross-origin resource sharing trusts random origins by accepting the arbitrary 'Origin: example.com' header and responding with 200 OK and a wildcard 'Access-Control-Allow-Origin: *' header.2020-10-02not yet calculatedCVE-2020-26527
MISC
MISC
MISC
debian -- sympa.postinst
 
debian/sympa.postinst for the Debian Sympa package before 6.2.40~dfsg-7 uses mode 4755 for sympa_newaliases-wrapper, whereas the intended permissions are mode 4750 (for access by the sympa group)2020-10-10not yet calculatedCVE-2020-26932
MISC
MISC

dell -- emc_openmanage_integration_for_microsoft_system_center_for_sccm_and_scvmm

Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain an information disclosure vulnerability. Authenticated low privileged OMIMSCC users may be able to retrieve sensitive information from the logs.2020-10-08not yet calculatedCVE-2020-5389
MISC
elecom -- lan_routersELECOM LAN routers (WRC-2533GST2 firmware versions prior to v1.14, WRC-1900GST2 firmware versions prior to v1.14, WRC-1750GST2 firmware versions prior to v1.14, and WRC-1167GST2 firmware versions prior to v1.10) allow an attacker on the same network segment to execute arbitrary OS commands with a root privilege via unspecified vectors.2020-10-06not yet calculatedCVE-2020-5634
MISC
MISC
electron -- electron
 
In Electron before versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 the `will-navigate` event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub-frame performs a top-frame navigation across sites. The issue is patched in versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 As a workaround sandbox all your iframes using the sandbox attribute. This will prevent them creating top-frame navigations and is good practice anyway.2020-10-06not yet calculatedCVE-2020-15174
MISC
CONFIRM
electron -- electron
 
Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nodeIntegrationInSubFrames: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.2020-10-06not yet calculatedCVE-2020-15215
CONFIRM
emby -- emby_server
 
Emby Server before 4.5.0 allows SSRF via the Items/RemoteSearch/Image ImageURL parameter.2020-10-10not yet calculatedCVE-2020-26948
MISC
MISC
facebook -- hermes
 
A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.2020-10-08not yet calculatedCVE-2020-1914
CONFIRM
CONFIRM

faulkner_press -- wildlife_issues_in_the_new_millennium

Faulkner Wildlife Issues in the New Millennium 18.0.160 on Windows allows local, low-privileged users to gain privileges by creating a malicious "%SYSTEMDRIVE%\Course Software Material 18.0.1.9\cmd.exe" file.2020-10-08not yet calculatedCVE-2020-26894
MISC
forma.lms -- forma.lms
 
forma.lms 2.3.0.2 is affected by Cross Site Request Forgery (CSRF) in formalms/appCore/index.php?r=lms/profile/show&ap=saveinfo via a GET request to change the admin email address in order to accomplish an account takeover.2020-10-08not yet calculatedCVE-2020-26802
MISC
garfield -- petshop
 
A cross-site request forgery (CSRF) vulnerability in mod/user/act_user.php in Garfield Petshop through 2020-10-01 allows remote attackers to hijack the authentication of administrators for requests that create new administrative accounts.2020-10-09not yet calculatedCVE-2020-26522
MISC
MISC
MISC
MISC
getsimple -- getsimple_cms
 
GetSimpleCMS-3.3.15 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php2020-10-02not yet calculatedCVE-2020-18191
MISC
gitlab -- gitlabAn issue has been discovered in GitLab affecting all versions starting from 11.2. Unauthorized Users Can View Custom Project Template2020-10-06not yet calculatedCVE-2020-13343
CONFIRM
MISC
MISC
gitlab -- gitlab
 
Membership changes are not reflected in ToDo subscriptions in GitLab versions prior to 13.2.10, 13.3.7 and 13.4.2, allowing guest users to access confidential issues through API.2020-10-07not yet calculatedCVE-2020-13346
CONFIRM
MISC
MISC
gitlab -- gitlab
 
An issue has been discovered in GitLab affecting all versions starting from 10.8. Reflected XSS on Multiple Routes2020-10-06not yet calculatedCVE-2020-13345
CONFIRM
MISC
MISC
gitlab -- gitlab
 
An issue has been discovered in GitLab affecting all versions prior to 13.2.10, 13.3.7 and 13.4.2. Sessions keys are stored in plain-text in Redis which allows attacker with Redis access to authenticate as any user that has a session stored in Redis2020-10-08not yet calculatedCVE-2020-13344
CONFIRM
MISC
gitlab -- gitlab
 
An issue has been discovered in GitLab affecting versions prior to 13.2.10, 13.3.7 and 13.4.2: Lack of Rate Limiting at Re-Sending Confirmation Email2020-10-07not yet calculatedCVE-2020-13342
CONFIRM
MISC
gitlab -- gitlab
 
An issue has been discovered in GitLab affecting all versions prior to 13.2.10, 13.3.7 and 13.4.2: Stored XSS in CI Job Log2020-10-08not yet calculatedCVE-2020-13340
CONFIRM
MISC
MISC
gitlab -- gitlab
 
Improper group membership validation when deleting a user account in GitLab >=7.12 allows a user to delete own account without deleting/transferring their group.2020-10-07not yet calculatedCVE-2020-13335
CONFIRM
MISC
MISC
gitlab -- gitlab
 
In GitLab versions prior to 13.2.10, 13.3.7 and 13.4.2, improper authorization checks allow a non-member of a project/group to change the confidentiality attribute of issue via mutation GraphQL query2020-10-07not yet calculatedCVE-2020-13334
CONFIRM
MISC
MISC
gitlab -- gitlab
 
A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage.2020-10-06not yet calculatedCVE-2020-13333
CONFIRM
MISC
MISC
gitlab -- gitlab
 
Improper access expiration date validation in GitLab version >=8.11.0-rc6+ allows user to have access to projects with expiration.2020-10-07not yet calculatedCVE-2020-13332
CONFIRM
MISC
MISC
gitlab -- gitlab
 
A command injection vulnerability was discovered in Gitlab runner versions prior to 13.2.4, 13.3.2 and 13.4.1. When the runner is configured on a Windows system with a docker executor, which allows the attacker to run arbitrary commands on Windows host, via DOCKER_AUTH_CONFIG build variable.2020-10-07not yet calculatedCVE-2020-13347
CONFIRM
MISC
MISC
glibc -- glib2
 
manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.2020-10-06not yet calculatedCVE-1999-0199
MISC
MISC
MISC
glpi-project -- glpi
 
In GLPI before version 9.5.2, there is a SQL Injection in the API's search function. Not only is it possible to break the SQL syntax, but it is also possible to utilise a UNION SELECT query to reflect sensitive information such as the current database version, or database user. The most likely scenario for this vulnerability is with someone who has an API account to the system. The issue is patched in version 9.5.2. A proof-of-concept with technical details is available in the linked advisory.2020-10-07not yet calculatedCVE-2020-15226
CONFIRM
CONFIRM
glpi-project -- glpi
 
In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.2020-10-07not yet calculatedCVE-2020-15217
CONFIRM
CONFIRM
glpi-project -- glpi
 
In GLPI before version 9.5.2, the `install/install.php` endpoint insecurely stores user input into the database as `url_base` and `url_base_api`. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure Redirection Since authentication is not required to perform these changes,anyone could point these fields at malicious websites or form input in a way to trigger XSS. Leveraging JavaScript it's possible to steal cookies, perform actions as the user, etc. The issue is patched in version 9.5.2.2020-10-07not yet calculatedCVE-2020-15177
CONFIRM
CONFIRM
glpi-project -- glpi
 
In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.22020-10-07not yet calculatedCVE-2020-15176
CONFIRM
CONFIRM
glpi-project -- glpi
 
In GLPI before version 9.5.2, the `?pluginimage.send.php?` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in “/files/”. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.2020-10-07not yet calculatedCVE-2020-15175
MISC
CONFIRM
hapi_fhir -- hapi_fhir
 
Users of the HAPI FHIR Testpage Overlay 5.0.0 and below can use a specially crafted URL to exploit an XSS vulnerability in this module, allowing arbitrary JavaScript to be executed in the user's browser. The impact of this vulnerability is believed to be low, as this module is intended for testing and not believed to be widely used for any production purposes.2020-10-08not yet calculatedCVE-2020-24301
MISC
hcl -- appscan_enterprise"HCL AppScan Enterprise makes use of broken or risky cryptographic algorithm to store REST API user details."2020-10-06not yet calculatedCVE-2019-4325
MISC
hcl -- appscan_enterprise
 
"HCL AppScan Enterprise security rules update administration section of the web application console is missing HTTP Strict-Transport-Security Header."2020-10-06not yet calculatedCVE-2019-4326
MISC
hellojs -- hellojsThis affects the package hellojs before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1).2020-10-06not yet calculatedCVE-2020-7741
MISC
MISC
MISC
hewlett_packard_enterprise -- kvm_ip_console_switchesA remote code injection vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3.2020-10-02not yet calculatedCVE-2020-24628
MISC
hewlett_packard_enterprise -- kvm_ip_console_switchesA remote stored xss vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3.2020-10-02not yet calculatedCVE-2020-24627
MISC
hisilicon -- iptv/h.264/h.265_video_encodersAn issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device's configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution.2020-10-06not yet calculatedCVE-2020-24215
MISC
MISC
hisilicon -- iptv/h.264/h.265_video_encodersAn issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution.2020-10-06not yet calculatedCVE-2020-24217
MISC
MISC
hisilicon -- iptv/h.264/h.265_video_encodersAn issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private.2020-10-06not yet calculatedCVE-2020-24216
MISC
MISC
hisilicon -- iptv/h.264/h.265_video_encoders
 
An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device.2020-10-06not yet calculatedCVE-2020-24214
MISC
MISC
huawei -- taurus-an00bTaurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to access and modify the memory of the device by doing a series of operations. Successful exploit may cause the service abnormal.2020-10-09not yet calculatedCVE-2020-9105
MISC
ibm -- mq_appliance
 
IBM MQ Appliance (IBM DataPower Gateway 10.0.0.0 and 2018.4.1.0 through 2018.4.1.12) could allow a local user, under special conditions, to obtain highly sensitive information from log files. IBM X-Force ID: 182658.2020-10-06not yet calculatedCVE-2020-4528
XF
CONFIRM
ibm -- qradar_siem
 
IBM QRadar SIEM 7.3 and 7.4 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 176140.2020-10-08not yet calculatedCVE-2020-4280
XF
CONFIRM
ibm -- qradar_siem
 
IBM QRadar SIEM 7.3 and 7.4 when configured to use Active Directory Authentication may be susceptible to spoofing attacks. IBM X-Force ID: 165877.2020-10-08not yet calculatedCVE-2019-4545
XF
CONFIRM
impresscms -- impresscms
 
ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution.2020-10-07not yet calculatedCVE-2020-17551
MISC
MISC

intel -- core_and_celeron_4000_and_5000series_processors

Insufficient control flow management in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable denial of service via adjacent access.2020-10-05not yet calculatedCVE-2019-14558
MISC

intel -- core_and_celeron_4000_and_5000series_processors

Improper initialization in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow a privileged user to potentially enable denial of service via local access.2020-10-05not yet calculatedCVE-2019-14556
MISC

intel -- core_and_celeron_4000_and_5000series_processors

Buffer overflow in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable elevation of privilege or denial of service via adjacent access.2020-10-05not yet calculatedCVE-2019-14557
MISC
intel -- core_and_celeron_4000_series_processors
 
Insufficient control flow management in BIOS firmware 8th, 9th Generation Intel(R) Core(TM) Processors and Intel(R) Celeron(R) Processor 4000 Series may allow an authenticated user to potentially enable information disclosure via local access.2020-10-05not yet calculatedCVE-2020-8671
MISC

intel -- core_and_pentium_silver_processor_series

Improper conditions check in BIOS firmware for 8th Generation Intel(R) Core(TM) Processors and Intel(R) Pentium(R) Silver Processor Series may allow an authenticated user to potentially enable information disclosure via local access.2020-10-05not yet calculatedCVE-2020-0571
MISC
jenkins -- jenkins
 
Jenkins Nerrvana Plugin 1.02.06 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.2020-10-08not yet calculatedCVE-2020-2298
MLIST
CONFIRM
jenkins -- jenkins
 
Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration.2020-10-08not yet calculatedCVE-2020-2286
MLIST
CONFIRM
jenkins -- jenkins
 
Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.2020-10-08not yet calculatedCVE-2020-2287
MLIST
CONFIRM
jenkins -- jenkins
 
Jenkins Release Plugin 2.10.2 and earlier does not escape the release version in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Release/Release permission.2020-10-08not yet calculatedCVE-2020-2292
MLIST
CONFIRM
jenkins -- jenkins
 
Jenkins SMS Notification Plugin 1.2 and earlier stores an access token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.2020-10-08not yet calculatedCVE-2020-2297
MLIST
CONFIRM
johnson_controls -- american_dynamics_victor_web_client
 
A vulnerability in victor Web Client versions up to and including v5.4.1 could allow a remote unauthenticated attacker to delete arbitrary files on the system or render the system unusable by conducting a Denial of Service attack.2020-10-08not yet calculatedCVE-2020-9048
CERT
CONFIRM
json-pointer -- json-pointer
 
This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported.2020-10-05not yet calculatedCVE-2020-7709
MISC
MISC
MISC
kde -- connect
 
In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.2020-10-07not yet calculatedCVE-2020-26164
SUSE
SUSE
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
CONFIRM
MISC
CONFIRM
leostream -- connection_broker
 
** UNSUPPORTED WHEN ASSIGNED ** Leostream Connection Broker 8.2.x is affected by stored XSS. An unauthenticated attacker can inject arbitrary JavaScript code via the webquery.pl User-Agent HTTP header. It is rendered by the admins the next time they log in. The JavaScript injected can be used to force the admin to upload a malicious Perl script that will be executed as root via libMisc::browser_client. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.2020-10-06not yet calculatedCVE-2020-26574
MISC
MISC
linux -- linux_kernel
 
A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.2020-10-06not yet calculatedCVE-2020-25643
SUSE
MISC
MISC
mb_connect_line -- mymbconnect24_and_mbconnect24An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a blind SQL injection in the lancompenent component, allowing logged-in attackers to discover arbitrary information.2020-10-02not yet calculatedCVE-2020-24568
CONFIRM
mcafee -- file_and_removable_media_protection
 
Unquoted service path vulnerability in McAfee File and Removable Media Protection (FRP) prior to 5.3.0 allows local users to execute arbitrary code, with higher privileges, via execution and from a compromised folder. This issue may result in files not being encrypted when a policy is triggered.2020-10-07not yet calculatedCVE-2020-7316
MISC
mikrotik -- routeros
 
An integer underflow in the SMB server of MikroTik RouterOS before 6.45.5 allows remote unauthenticated attackers to crash the service.2020-10-07not yet calculatedCVE-2019-16160
CONFIRM
MISC
MISC
mitsubishi_electric -- multiple_products
 
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.2020-10-05not yet calculatedCVE-2020-16226
MISC
monero -- monero_gui
 
monero-wallet-gui in Monero GUI 0.17.0.1 includes the . directory in an embedded RPATH (with a preference ahead of /usr/lib), which allows local users to gain privileges via a Trojan horse library in the current working directory.2020-10-10not yet calculatedCVE-2020-26947
MISC
monocms_blog -- monocms_blog
 
A Cross Site Request Forgery (CSRF) vulnerability in MonoCMS Blog 1.0 allows attackers to change the password of a user.2020-10-06not yet calculatedCVE-2020-25986
MISC
MISC
mozilla -- firefox_and_firefox_for_android
 
When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.2020-10-08not yet calculatedCVE-2020-12400
MISC
MISC
MISC
mozilla -- firefox_and_firefox_for_android
 
During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80.2020-10-08not yet calculatedCVE-2020-12401
MISC
MISC
MISC
mozilla -- thunderbird
 
If an attacker intercepts Thunderbird's initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker. This vulnerability affects Thunderbird < 68.10.0.2020-10-08not yet calculatedCVE-2020-15646
MISC
MISC
mybatis -- mybatis
 
MyBatis before 3.5.6 mishandles deserialization of object streams.2020-10-10not yet calculatedCVE-2020-26945
MISC
MISC
nahimic -- apo_software_component_driver
 
An escalation of privilege vulnerability in Nahimic APO Software Component Driver 1.4.2, 1.5.0, 1.5.1, 1.6.1 and 1.6.2 allows an attacker to execute code with SYSTEM privileges.2020-10-08not yet calculatedCVE-2019-19115
MISC
nec_corporation -- infocage_siteshell_series
 
InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files.2020-10-06not yet calculatedCVE-2020-5632
MISC
MISC
netgear -- ex7700_devices
 
NETGEAR EX7700 devices before 1.0.0.210 are affected by incorrect configuration of security settings.2020-10-09not yet calculatedCVE-2020-26930
MISC
netgear -- gs808e_devicesNETGEAR GS808E devices before 1.7.1.0 are affected by denial of service.2020-10-09not yet calculatedCVE-2020-26925
MISC
netgear -- jgs516pe_devicesNETGEAR JGS516PE devices before 2.6.0.43 are affected by lack of access control at the function level.2020-10-09not yet calculatedCVE-2020-26919
MISC
netgear -- multiple_devicesCertain NETGEAR devices are affected by CSRF. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.2020-10-09not yet calculatedCVE-2020-26912
MISC
netgear -- multiple_devicesCertain NETGEAR devices are affected by authentication bypass. This affects GS110EMX before 1.0.1.7, GS810EMX before 1.7.1.3, XS512EM before 1.0.1.3, and XS724EM before 1.0.1.3.2020-10-09not yet calculatedCVE-2020-26921
MISC
netgear -- multiple_devicesCertain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.2020-10-09not yet calculatedCVE-2020-26926
MISC
netgear -- multiple_devicesCertain NETGEAR devices are affected by disclosure of sensitive information. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24.2020-10-09not yet calculatedCVE-2020-26931
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7800 before 1.0.1.58 and R7500v2 before 1.0.3.48.2020-10-09not yet calculatedCVE-2020-26909
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.2020-10-09not yet calculatedCVE-2020-26910
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by lack of access control at the function level. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.2020-10-09not yet calculatedCVE-2020-26911
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by authentication bypass. This affects D6200 before 1.1.00.36, D7000 before 1.0.1.74, PR2000 before 1.0.0.30, R6020 before 1.0.0.42, R6050 before 1.0.1.22, JR6150 before 1.0.1.22, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R69002 before 1.2.0.62, and WNR2020 before 1.1.0.62.2020-10-09not yet calculatedCVE-2020-26908
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBK50 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10.2020-10-09not yet calculatedCVE-2020-26915
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.63, R7800 before 1.0.2.60, R8900 before 1.0.4.26, R9000 before 1.0.4.26, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBK40 before 2.3.0.28, RBR40 before 2.3.0.28, RBS40 before 2.3.0.28, SRK60 before 2.2.2.20, SRR60 before 2.2.2.20, SRS60 before 2.2.2.20, WN3000RPv2 before 1.0.0.78, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.70, XR450 before 2.3.2.40, and XR500 before 2.3.2.40.2020-10-09not yet calculatedCVE-2020-26913
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.2020-10-09not yet calculatedCVE-2020-26914
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24.2020-10-09not yet calculatedCVE-2020-26922
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.50, and WNR2020 before 1.1.0.62.2020-10-09not yet calculatedCVE-2020-26916
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by stored XSS. This affects EX7000 before 1.0.1.78, R6250 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R7100LG before 1.0.0.50, R7300DST before 1.0.0.70, R7900 before 1.0.3.8, R8300 before 1.0.2.128, and R8500 before 1.0.2.128.2020-10-09not yet calculatedCVE-2020-26917
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by stored XSS. This affects EX7000 before 1.0.1.78, R6250 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700v3 before 1.0.2.66, R7100LG before 1.0.0.50, R7300DST before 1.0.0.70, R7900 before 1.0.3.8, R8300 before 1.0.2.128, and R8500 before 1.0.2.128.2020-10-09not yet calculatedCVE-2020-26918
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects SRK60 before 2.5.3.110, SRR60 before 2.5.3.110, and SRS60 before 2.5.3.110.2020-10-09not yet calculatedCVE-2020-26920
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.2020-10-09not yet calculatedCVE-2020-26905
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by stored XSS. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24.2020-10-09not yet calculatedCVE-2020-26923
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by authentication bypass. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6050 before 1.0.1.26, JR6150 before 1.0.1.26, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.66, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, AC2600 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.2020-10-09not yet calculatedCVE-2020-26927
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.2020-10-09not yet calculatedCVE-2020-26928
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.2020-10-09not yet calculatedCVE-2020-26907
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.2020-10-09not yet calculatedCVE-2020-26906
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.2020-10-09not yet calculatedCVE-2020-26904
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.2020-10-09not yet calculatedCVE-2020-26902
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.2020-10-09not yet calculatedCVE-2020-26901
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.2020-10-09not yet calculatedCVE-2020-26900
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.2020-10-09not yet calculatedCVE-2020-26899
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.2020-10-09not yet calculatedCVE-2020-26897
MISC
netgear -- multiple_devices
 
Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11.2020-10-09not yet calculatedCVE-2020-26903
MISC
netgear -- r6220_and_r6230_devices
 
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6220 before 1.1.0.100 and R6230 before 1.1.0.100.2020-10-09not yet calculatedCVE-2020-26929
MISC
netgear -- rax40_devicesNETGEAR RAX40 devices before 1.0.3.80 are affected by incorrect configuration of security settings.2020-10-09not yet calculatedCVE-2020-26898
MISC
netgear -- wac720_and_wac730_devices
 
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects WAC720 before 3.9.1.13 and WAC730 before 3.9.1.13.2020-10-09not yet calculatedCVE-2020-26924
MISC
next.js -- next.js
 
Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4.2020-10-08not yet calculatedCVE-2020-15242
CONFIRM
MISC
nextcloud -- nextcloud_deck
 
Improper access control in Nextcloud Deck 0.8.0 allowed an attacker to reshare boards shared with them with more permissions than they had themselves.2020-10-05not yet calculatedCVE-2020-8182
MISC
MISC
nextcloud -- nextcloud_deck
 
Missing access control in Nextcloud Deck 1.0.4 caused an insecure direct object reference allowing an attacker to view all attachments.2020-10-05not yet calculatedCVE-2020-8235
MISC
MISC
nextcloud -- nextcloud_server
 
A logic error in Nextcloud Server 19.0.0 caused a privilege escalation allowing malicious users to reshare with higher permissions than they got assigned themselves.2020-10-05not yet calculatedCVE-2020-8223
MISC
MISC
node-pdf-generator -- node-pdf-generator
 
This affects all versions of package node-pdf-generator. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.2020-10-06not yet calculatedCVE-2020-7740
MISC
MISC
node.js -- node.js** UNSUPPORTED WHEN ASSIGNED ** The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.2020-10-06not yet calculatedCVE-2020-24807
MISC
MISC
MISC
MISC
nvidia -- virtual_gpu_managerNVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which allocated memory can be freed twice, which may lead to information disclosure or denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.2020-10-02not yet calculatedCVE-2020-5988
CONFIRM
nvidia -- virtual_gpu_manager
 
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin and the host driver kernel module, in which the potential exists to write to a memory location that is outside the intended boundary of the frame buffer memory allocated to guest operating systems, which may lead to denial of service or information disclosure. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.2020-10-02not yet calculatedCVE-2020-5983
CONFIRM
nvidia -- virtual_gpu_manager
 
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data size is not validated, which may lead to tampering or denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.2020-10-02not yet calculatedCVE-2020-5986
CONFIRM
nvidia -- virtual_gpu_manager
 
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.2020-10-02not yet calculatedCVE-2020-5989
CONFIRM
nvidia -- virtual_gpu_manager
 
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which it may have the use-after-free vulnerability while freeing some resources, which may lead to denial of service, code execution, and information disclosure. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.2020-10-02not yet calculatedCVE-2020-5984
CONFIRM
nvidia -- virtual_gpu_manager
 
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which guest-supplied parameters remain writable by the guest after the plugin has validated them, which may lead to the guest being able to pass invalid parameters to plugin handlers, which may lead to denial of service or escalation of privileges. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.2020-10-02not yet calculatedCVE-2020-5987
CONFIRM
nvidia -- virtual_gpu_manager
 
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data length is not validated, which may lead to tampering or denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0.2020-10-02not yet calculatedCVE-2020-5985
CONFIRM
oneplus -- app_locker
 
OnePlus App Locker through 2020-10-06 allows physically proximate attackers to use Google Assistant to bypass an authorization check in order to send an SMS message when the SMS application is locked.2020-10-09not yet calculatedCVE-2020-13626
MISC
MISC
opensc -- opensc
 
The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.2020-10-06not yet calculatedCVE-2020-26572
MISC
MISC
opensc -- opensc
 
The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.2020-10-06not yet calculatedCVE-2020-26571
MISC
opensc -- opensc
 
The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file.2020-10-06not yet calculatedCVE-2020-26570
MISC
MISC
ory -- fosite
 
ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite before version 0.34.1, the OAuth 2.0 Client's registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using strings.ToLower while they should have been compared with a simple string match. This allows an attacker to register a client with allowed redirect URL https://example.com/callback. Then perform an OAuth2 flow and requesting redirect URL https://example.com/CALLBACK. Instead of an error (invalid redirect URL), the browser is redirected to https://example.com/CALLBACK with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example). This vulnerability has been patched in ORY Fosite v0.34.1.2020-10-02not yet calculatedCVE-2020-15234
MISC
CONFIRM
ory -- fosite
 
ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1.2020-10-02not yet calculatedCVE-2020-15233
MISC
CONFIRM
peplink -- balance
 
Peplink Balance before 8.1.0rc1 allows an unauthenticated attacker to download PHP configuration files (/filemanager/php/connector.php) from Web Admin.2020-10-07not yet calculatedCVE-2020-24246
MISC
MISC
phantomjs -- phantomjs
 
This affects all versions of package phantomjs-seo. It is possible for an attacker to craft a url that will be passed to a PhantomJS instance allowing for an SSRF attack.2020-10-06not yet calculatedCVE-2020-7739
CONFIRM
CONFIRM
php -- php
 
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.2020-10-02not yet calculatedCVE-2020-7070
MISC
MISC
MISC
MLIST
FEDORA
FEDORA
FEDORA
php -- php
 
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.2020-10-02not yet calculatedCVE-2020-7069
MISC
FEDORA
FEDORA
FEDORA
phpgurukul -- hostel-management-system
 
PHPGurukul hostel-management-system 2.1 allows XSS via Guardian Name, Guardian Relation, Guardian Contact no, Address, or City.2020-10-08not yet calculatedCVE-2020-25270
MISC
MISC
phpgurukul -- hostel-management-system-in-php
 
PHPGurukul hospital-management-system-in-php 4.0 allows XSS via admin/patient-search.php, doctor/search.php, book-appointment.php, doctor/appointment-history.php, or admin/appointment-history.php.2020-10-08not yet calculatedCVE-2020-25271
MISC
MISC
phpmyadmin -- phpmyadmin
 
An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.2020-10-10not yet calculatedCVE-2020-26935
MISC
phpmyadmin -- phpmyadmin
 
phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link.2020-10-10not yet calculatedCVE-2020-26934
MISC
preferred_providers_app -- preferred_providers_app
 
A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times.2020-10-05not yet calculatedCVE-2020-8228
SUSE
MISC
MISC
projectworlds -- car_rental_management_system
 
A Persistent Cross-Site Scripting (XSS) vulnerability in message_admin.php in Projectworlds Car Rental Management System v1.0 allows unauthenticated remote attackers to harvest an admin login session cookie and steal an admin session upon an admin login.2020-10-06not yet calculatedCVE-2020-23832
MISC
MISC
MISC
pyrocms -- pyrocms
 
PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/addons/uninstall/anomaly.module.blocks URI: an arbitrary plugin will be deleted.2020-10-08not yet calculatedCVE-2020-25263
MISC
MISC
MISC
pyrocms -- pyrocms
 
PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/pages/delete/ URI: pages will be deleted.2020-10-08not yet calculatedCVE-2020-25262
MISC
MISC
MISC
qdpm -- qdpm
 
The file upload functionality in qdPM 9.1 doesn't check the file description, which allows remote authenticated attackers to inject web script or HTML via the attachments info parameter, aka XSS. This can occur during creation of a ticket, project, or task.2020-10-05not yet calculatedCVE-2020-26166
MISC
MISC
MISC
qemu -- qemu
 
fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive.2020-10-02not yet calculatedCVE-2020-25741
CONFIRM
MISC
MISC
CONFIRM
ractf -- ractf
 
In RACTF before commit f3dc89b, unauthenticated users are able to get the value of sensitive config keys that would normally be hidden to everyone except admins. All versions after commit f3dc89b9f6ab1544a289b3efc06699b13d63e0bd(3/10/20) are patched.2020-10-05not yet calculatedCVE-2020-15235
MISC
CONFIRM
ruby -- ruby
 
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.2020-10-06not yet calculatedCVE-2020-25613
CONFIRM
MISC
CONFIRM
shrine -- shrine
 
In Shrine before version 3.3.0, when using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. A possible workaround is provided in the linked advisory.2020-10-05not yet calculatedCVE-2020-15237
MISC
CONFIRM
smarter -- coffee_maker
 
** UNSUPPORTED WHEN ASSIGNED ** Smarter Coffee Maker before 2nd generation allows firmware replacement without authentication or authorization. User interaction is required to press a button. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.2020-10-07not yet calculatedCVE-2020-15501
MISC
smartstore -- smartstore
 
Affected versions of Smartstore have a missing WebApi Authentication attribute. This vulnerability affects Smartstore shops in version 4.0.0 & 4.0.1 which have installed and activated the Web API plugin. Users of Smartstore 4.0.0 and 4.0.1 must merge their repository with 4.0.x or overwrite the file SmartStore.Web.Framework in the */bin* directory of the deployed shop with this file. As a workaround without updating uninstall the Web API plugin to close this vulnerability.2020-10-08not yet calculatedCVE-2020-15243
CONFIRM
soplanning -- soplanning
 
SoPlanning before 1.47 doesn't correctly check the security key used to publicly share plannings. It allows a bypass to get access without authentication.2020-10-07not yet calculatedCVE-2020-25867
MISC
sourcecodester -- online_bus_booking_systemIn SourceCodester Online Bus Booking System 1.0, there is XSS through the name parameter in book_now.php.2020-10-08not yet calculatedCVE-2020-25272
MISC
MISC
sourcecodester -- online_bus_booking_systemIn SourceCodester Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.2020-10-08not yet calculatedCVE-2020-25273
MISC
MISC
spice -- spice_remote_display_system
 
Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.2020-10-07not yet calculatedCVE-2020-14355
MISC
DEBIAN
MISC
symmetricds -- symmetricds
 
Symmetric DS <3.12.0 uses mx4j to provide access to JMX over HTTP. mx4j, by default, has no auth and is available on all interfaces. An attacker can interact with JMX: get system info, and invoke MBean methods. It is possible to install additional MBeans from a remote host using MLet that leads to arbitrary code execution.2020-10-05not yet calculatedCVE-2020-24231
MISC
sympa -- sympa
 
Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.2020-10-07not yet calculatedCVE-2020-26880
MISC
MISC
MISC
symphony_cms -- symphony_cms
 
Cross-site scripting (XSS) vulnerabilities in Symphony CMS 3.0.0 allow remote attackers to inject arbitrary web script or HTML to fields['body'] param via events\event.publish_article.php2020-10-07not yet calculatedCVE-2020-25343
MISC
trend_micro -- antivirus_for_mac_2020Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.2020-10-02not yet calculatedCVE-2020-25776
N/A
N/A
typo3 -- fluid_engine
 
TYPO3 Fluid Engine (package `typo3fluid/fluid`) before versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like `{showFullName ? fullName : defaultValue}`. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) versions as well: TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.4) and TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1).2020-10-08not yet calculatedCVE-2020-15241
MISC
CONFIRM
MISC
uraytech -- iptv/h.264/h.265_video_encodersAn issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device's file system, including the configuration file with the cleartext administrative password.2020-10-06not yet calculatedCVE-2020-24219
MISC
MISC
uraytech -- iptv/h.264/h.265_video_encoders
 
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file.2020-10-06not yet calculatedCVE-2020-24218
MISC
MISC
vapor -- vapor
 
Vapor is a web framework for Swift. In Vapor before version 4.29.4, Attackers can access data at arbitrary filesystem paths on the same host as an application. Only applications using FileMiddleware are affected. This is fixed in version 4.29.4.2020-10-02not yet calculatedCVE-2020-15230
MISC
MISC
CONFIRM
whatsapp -- whatsapp
 
Receiving a large text message containing URLs in WhatsApp for iOS prior to v2.20.91.4 could have caused the application to freeze while processing the message.2020-10-06not yet calculatedCVE-2020-1901
CONFIRM
whatsapp -- whatsapp
 
A user running a quick search on a highly forwarded message on WhatsApp for Android from v2.20.108 to v2.20.140 or WhatsApp Business for Android from v2.20.35 to v2.20.49 could have been sent to the Google service over plain HTTP.2020-10-06not yet calculatedCVE-2020-1902
CONFIRM
whatsapp -- whatsapp
 
An issue when unzipping docx, pptx, and xlsx documents in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have resulted in an out-of-memory denial of service. This issue would have required the receiver to explicitly open the attachment if it was received from a number not in the receiver's WhatsApp contacts.2020-10-06not yet calculatedCVE-2020-1903
CONFIRM
whatsapp -- whatsapp
 
Media ContentProvider URIs used for opening attachments in other apps were generated sequentially prior to WhatsApp for Android v2.20.185, which could have allowed a malicious third party app chosen to open the file to guess the URIs for previously opened attachments until the opener app is terminated.2020-10-06not yet calculatedCVE-2020-1905
CONFIRM
whatsapp -- whatsapp
 
A path validation issue in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have allowed for directory traversal overwriting files when sending specially crafted docx, xlx, and pptx files as attachments to messages.2020-10-06not yet calculatedCVE-2020-1904
CONFIRM
whatsapp -- whatsapp
 
A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header.2020-10-06not yet calculatedCVE-2020-1907
CONFIRM
whatsapp -- whatsapp
 
A buffer overflow in WhatsApp for Android prior to v2.20.130 and WhatsApp Business for Android prior to v2.20.46 could have allowed an out-of-bounds write when processing malformed local videos with E-AC-3 audio streams.2020-10-06not yet calculatedCVE-2020-1906
CONFIRM
wireshark -- wireshark
 
In Wireshark through 3.2.7, the Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop. This was addressed in epan/dissectors/packet-fbzero.c by correcting the implementation of offset advancement.2020-10-06not yet calculatedCVE-2020-26575
MISC
MISC
MISC
MISC
MISC
MISC
wordpress -- wordpress
 
The Dynamic OOO widget for the Elementor Pro plugin through 3.0.5 for WordPress allows remote authenticated users to execute arbitrary code because only the Editor role is needed to upload executable PHP code via the PHP Raw snippet. NOTE: this issue can be mitigated by removing the Dynamic OOO widget or by restricting availability of the Editor role.2020-10-07not yet calculatedCVE-2020-26596
MISC
MISC
wordpress -- wordpress
 
The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).2020-10-07not yet calculatedCVE-2020-26876
MISC
MISC
MISC
xerox -- workcentre_ec7836
 
Xerox WorkCentre EC7836 before 073.050.059.25300 and EC7856 before 073.020.059.25300 devices allow XSS via Description pages.2020-10-09not yet calculatedCVE-2020-26162
MISC
CONFIRM
xmpp-http-upload -- xmpp-http-uploadIn xmpp-http-upload before version 0.4.0, when the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. The issue is patched in version 0.4.0.2020-10-06not yet calculatedCVE-2020-15239
MISC
MISC
CONFIRM
MISC
zabbix -- zabbix_server
 
Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.2020-10-07not yet calculatedCVE-2020-11800
MISC
CONFIRM
CONFIRM
CONFIRM
zoho -- manageengine_applications_manager
 
Zoho ManageEngine Applications Manager 14780 and before allows a remote unauthenticated attacker to register managed servers via AAMRequestProcessor servlet.2020-10-08not yet calculatedCVE-2020-10816
MISC
CONFIRM
zoho -- manageengine_applications_manager
 
Zoho ManageEngine Applications Manager version 14740 and prior allows an authenticated SQL Injection via a crafted jsp request in the SAP module.2020-10-06not yet calculatedCVE-2020-15927
MISC
CONFIRM
CONFIRM
zoho -- manageenginer_applications_managerZoho ManageEngine Applications Manager version 14740 and prior allows an authenticated SQL Injection via a crafted jsp request in the RCA module.2020-10-06not yet calculatedCVE-2020-16267
MISC
CONFIRM
CONFIRM
zte -- zxone_1970_snpe
 
A ZTE product is impacted by the improper access control vulnerability. Due to lack of an authentication protection mechanism in the program, attackers could use this vulnerability to gain access right through brute-force attacks. This affects: <ZXONE 19700 SNPE><ZXONE8700V1.40R2B13_SNPE>2020-10-05not yet calculatedCVE-2020-6875
MISC

Back to top

Please share your thoughts

We recently updated our anonymous product survey; we’d welcome your feedback.