apache — calcite
  HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses internally this method to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore. 2020-10-09 not yet calculated CVE-2020-13955
MISC atlassian — jira_server_and_data_center
  Affected versions of Jira Server & Data Center allow a remote attacker with limited (non-admin) privileges to view a Jira instance’s Support Entitlement Number (SEN) via an Information Disclosure vulnerability in the HTTP Response headers. The affected versions are before version 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before 8.12.1. 2020-10-06 not yet calculated CVE-2020-14183
MISC bosh_systems — metrics_server
  BOSH System Metrics Server releases prior to 0.1.0 exposed the UAA password as a flag to a process running on the BOSH director. It exposed the password to any user or process with access to the same VM (through ps or looking at process details). 2020-10-02 not yet calculated CVE-2020-5422
CONFIRM cisco — asr_5000_series_routers
  A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user. To exploit this vulnerability, an attacker would need to have valid administrative credentials on an affected device. 2020-10-08 not yet calculated CVE-2020-3601
CISCO cisco — asr_5000_series_routers
  A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user on the affected device. To exploit this vulnerability, an attacker would need to have valid credentials on an affected device and know the password for the cli test-commands command. 2020-10-08 not yet calculated CVE-2020-3602
CISCO cisco — email_security_appliance
  A vulnerability in the antispam protection mechanisms of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device. The vulnerability is due to insufficient input validation of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for the affected device, which could allow malicious URLs to pass through the device. 2020-10-08 not yet calculated CVE-2020-3568
CISCO

cisco — expressway_series_and_telepresence_video_communication_server

A vulnerability in the Session Initiation Protocol (SIP) of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect handling of incoming SIP traffic. An attacker could exploit this vulnerability by sending a series of SIP packets to an affected device. A successful exploit could allow the attacker to exhaust memory on an affected device, causing it to crash and leading to a DoS condition. 2020-10-08 not yet calculated CVE-2020-3596
CISCO cisco — firepower_management_center
  A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by first entering input within the web-based management interface and then persuading a user of the interface to view the crafted input within the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. 2020-10-08 not yet calculated CVE-2020-3320
CISCO cisco — identity_services_engine A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) Software could allow an authenticated, remote attacker with administrative credentials to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. To exploit this vulnerability, an attacker would need to have valid administrative credentials. 2020-10-08 not yet calculated CVE-2020-3589
CISCO cisco — identity_services_engine A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to modify parts of the configuration on an affected device. The vulnerability is due to improper enforcement of role-based access control (RBAC) within the web-based management interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to modify parts of the configuration. The modified configuration could either allow unauthorized devices onto the network or prevent authorized devices from accessing the network. To exploit this vulnerability, an attacker would need valid Read-Only Administrator credentials. 2020-10-08 not yet calculated CVE-2020-3467
CISCO cisco — industrial_network_director
  A vulnerability in the management REST API of Cisco Industrial Network Director (IND) could allow an authenticated, remote attacker to cause the CPU utilization to increase to 100 percent, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of requests sent to the REST API. An attacker could exploit this vulnerability by sending a crafted request to the REST API. A successful exploit could allow the attacker to cause a permanent DoS condition that is due to high CPU utilization. Manual intervention may be required to recover the Cisco IND. 2020-10-08 not yet calculated CVE-2020-3567
CISCO cisco — nexus_data_broker_software
  A vulnerability in the configuration restore feature of Cisco Nexus Data Broker software could allow an unauthenticated, remote attacker to perform a directory traversal attack on an affected device. The vulnerability is due to insufficient validation of configuration backup files. An attacker could exploit this vulnerability by persuading an administrator to restore a crafted configuration backup file. A successful exploit could allow the attacker to overwrite arbitrary files that are accessible through the affected software on an affected device. 2020-10-08 not yet calculated CVE-2020-3597
CISCO cisco — sd-wan_vmanage_software
  A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface. 2020-10-08 not yet calculated CVE-2020-3536
CISCO

cisco — video_surveillance_8000_series_ip_cameras

A vulnerability in the Cisco Discovery Protocol implementation for Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to execute arbitrary code on an affected device or cause the device to reload. This vulnerability is due to missing checks when an IP camera processes a Cisco Discovery Protocol packet. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to execute code on the affected IP camera or cause it to reload unexpectedly, resulting in a denial of service (DoS) condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). 2020-10-08 not yet calculated CVE-2020-3544
CISCO

cisco — video_surveillance_8000_series_ip_cameras

A vulnerability in the Cisco Discovery Protocol of Cisco Video Surveillance 8000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect processing of certain Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending certain Cisco Discovery Protocol packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DOS condition. Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). 2020-10-08 not yet calculated CVE-2020-3543
CISCO

cisco — vision_dynamic_signage_director

A vulnerability in the web-based management interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to access confidential information or make configuration changes. The vulnerability is due to missing authentication for a specific section of the web-based management interface. An attacker could exploit this vulnerability by accessing a crafted URL. A successful exploit could allow the attacker to obtain access to a section of the interface, which they could use to read confidential information or make configuration changes. 2020-10-08 not yet calculated CVE-2020-3598
CISCO cisco — webex_teams
  A vulnerability in the loading mechanism of specific DLLs in the Cisco Webex Teams client for Windows could allow an authenticated, local attacker to load a malicious library. To exploit this vulnerability, the attacker needs valid credentials on the Windows system. The vulnerability is due to incorrect handling of directory paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file in a specific location on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with the privileges of another user’s account. 2020-10-08 not yet calculated CVE-2020-3535
CISCO cloudflare — cloudflared
  `cloudflared` versions prior to 2020.8.1 contain a local privilege escalation vulnerability on Windows systems. When run on a Windows system, `cloudflared` searches for configuration files which could be abused by a malicious entity to execute commands as a privileged user. Version 2020.8.1 fixes this issue. 2020-10-02 not yet calculated CVE-2020-24356
CONFIRM cmonos.jp — cmonos.jp
  Stored cross-site scripting vulnerability in CMONOS.JP ver2.0.20191009 and earlier allows remote attackers to inject arbitrary script via unspecified vectors. 2020-10-06 not yet calculated CVE-2020-5631
MISC
MISC
MISC connectwise — automate
  The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions. 2020-10-09 not yet calculated CVE-2020-15838
MISC
CONFIRM contao — contao
  Contao before 4.4.52, 4.9.x before 4.9.6, and 4.10.x before 4.10.1 have Improper Input Validation. It is possible to inject insert tags in front end forms which will be replaced when the page is rendered. 2020-10-07 not yet calculated CVE-2020-25768
MISC
CONFIRM cuppacms — cuppacms The file manager option in CuppaCMS before 2019-11-12 allows an authenticated attacker to upload a malicious file within an image extension and through a custom request using the rename function provided by the file manager is able to modify the image extension into PHP resulting in remote arbitrary code execution. 2020-10-05 not yet calculated CVE-2020-26048
MISC cure53 — dompurify
  Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements. 2020-10-07 not yet calculated CVE-2020-26870
MISC
MISC
MISC d-link — dap-1360u_devices
  D-Link DAP-1360U before 3.0.1 devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the IP JSON value for ping (aka res_config_action=3&res_config_id=18). 2020-10-06 not yet calculated CVE-2020-26582
CONFIRM
MISC d-link — dsr-250n_devices
  An issue was discovered on D-Link DSR-250N before 3.17B devices. The CGI script upgradeStatusReboot.cgi can be accessed without authentication. Any access reboots the device, rendering it therefore unusable for several minutes. 2020-10-08 not yet calculated CVE-2020-26567
MISC
MISC
MISC damstra — smart_asset
  An issue was discovered in API/api/Version in Damstra Smart Asset 2020.7. Cross-origin resource sharing trusts random origins by accepting the arbitrary ‘Origin: example.com’ header and responding with 200 OK and a wildcard ‘Access-Control-Allow-Origin: *’ header. 2020-10-02 not yet calculated CVE-2020-26527
MISC
MISC
MISC debian — sympa.postinst
  debian/sympa.postinst for the Debian Sympa package before 6.2.40~dfsg-7 uses mode 4755 for sympa_newaliases-wrapper, whereas the intended permissions are mode 4750 (for access by the sympa group) 2020-10-10 not yet calculated CVE-2020-26932
MISC
MISC

dell — emc_openmanage_integration_for_microsoft_system_center_for_sccm_and_scvmm

Dell EMC OpenManage Integration for Microsoft System Center (OMIMSSC) for SCCM and SCVMM versions prior to 7.2.1 contain an information disclosure vulnerability. Authenticated low privileged OMIMSCC users may be able to retrieve sensitive information from the logs. 2020-10-08 not yet calculated CVE-2020-5389
MISC elecom — lan_routers ELECOM LAN routers (WRC-2533GST2 firmware versions prior to v1.14, WRC-1900GST2 firmware versions prior to v1.14, WRC-1750GST2 firmware versions prior to v1.14, and WRC-1167GST2 firmware versions prior to v1.10) allow an attacker on the same network segment to execute arbitrary OS commands with a root privilege via unspecified vectors. 2020-10-06 not yet calculated CVE-2020-5634
MISC
MISC electron — electron
  In Electron before versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 the `will-navigate` event that apps use to prevent navigations to unexpected destinations as per our security recommendations can be bypassed when a sub-frame performs a top-frame navigation across sites. The issue is patched in versions 11.0.0-beta.1, 10.0.1, 9.3.0 or 8.5.1 As a workaround sandbox all your iframes using the sandbox attribute. This will prevent them creating top-frame navigations and is good practice anyway. 2020-10-06 not yet calculated CVE-2020-15174
MISC
CONFIRM electron — electron
  Electron before versions 11.0.0-beta.6, 10.1.2, 9.3.1 or 8.5.2 is vulnerable to a context isolation bypass. Apps using both `contextIsolation` and `sandbox: true` are affected. Apps using both `contextIsolation` and `nodeIntegrationInSubFrames: true` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. 2020-10-06 not yet calculated CVE-2020-15215
CONFIRM emby — emby_server
  Emby Server before 4.5.0 allows SSRF via the Items/RemoteSearch/Image ImageURL parameter. 2020-10-10 not yet calculated CVE-2020-26948
MISC
MISC facebook — hermes
  A logic vulnerability when handling the SaveGeneratorLong instruction in Facebook Hermes prior to commit b2021df620824627f5a8c96615edbd1eb7fdddfc allows attackers to potentially read out of bounds or theoretically execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected. 2020-10-08 not yet calculated CVE-2020-1914
CONFIRM
CONFIRM

faulkner_press — wildlife_issues_in_the_new_millennium

Faulkner Wildlife Issues in the New Millennium 18.0.160 on Windows allows local, low-privileged users to gain privileges by creating a malicious “%SYSTEMDRIVE%Course Software Material 18.0.1.9cmd.exe” file. 2020-10-08 not yet calculated CVE-2020-26894
MISC forma.lms — forma.lms
  forma.lms 2.3.0.2 is affected by Cross Site Request Forgery (CSRF) in formalms/appCore/index.php?r=lms/profile/show&ap=saveinfo via a GET request to change the admin email address in order to accomplish an account takeover. 2020-10-08 not yet calculated CVE-2020-26802
MISC garfield — petshop
  A cross-site request forgery (CSRF) vulnerability in mod/user/act_user.php in Garfield Petshop through 2020-10-01 allows remote attackers to hijack the authentication of administrators for requests that create new administrative accounts. 2020-10-09 not yet calculated CVE-2020-26522
MISC
MISC
MISC
MISC getsimple — getsimple_cms
  GetSimpleCMS-3.3.15 is affected by directory traversal. Remote attackers are able to delete arbitrary files via /GetSimpleCMS-3.3.15/admin/log.php 2020-10-02 not yet calculated CVE-2020-18191
MISC gitlab — gitlab An issue has been discovered in GitLab affecting all versions starting from 11.2. Unauthorized Users Can View Custom Project Template 2020-10-06 not yet calculated CVE-2020-13343
CONFIRM
MISC
MISC gitlab — gitlab
  Membership changes are not reflected in ToDo subscriptions in GitLab versions prior to 13.2.10, 13.3.7 and 13.4.2, allowing guest users to access confidential issues through API. 2020-10-07 not yet calculated CVE-2020-13346
CONFIRM
MISC
MISC gitlab — gitlab
  An issue has been discovered in GitLab affecting all versions starting from 10.8. Reflected XSS on Multiple Routes 2020-10-06 not yet calculated CVE-2020-13345
CONFIRM
MISC
MISC gitlab — gitlab
  An issue has been discovered in GitLab affecting all versions prior to 13.2.10, 13.3.7 and 13.4.2. Sessions keys are stored in plain-text in Redis which allows attacker with Redis access to authenticate as any user that has a session stored in Redis 2020-10-08 not yet calculated CVE-2020-13344
CONFIRM
MISC gitlab — gitlab
  An issue has been discovered in GitLab affecting versions prior to 13.2.10, 13.3.7 and 13.4.2: Lack of Rate Limiting at Re-Sending Confirmation Email 2020-10-07 not yet calculated CVE-2020-13342
CONFIRM
MISC gitlab — gitlab
  An issue has been discovered in GitLab affecting all versions prior to 13.2.10, 13.3.7 and 13.4.2: Stored XSS in CI Job Log 2020-10-08 not yet calculated CVE-2020-13340
CONFIRM
MISC
MISC gitlab — gitlab
  Improper group membership validation when deleting a user account in GitLab >=7.12 allows a user to delete own account without deleting/transferring their group. 2020-10-07 not yet calculated CVE-2020-13335
CONFIRM
MISC
MISC gitlab — gitlab
  In GitLab versions prior to 13.2.10, 13.3.7 and 13.4.2, improper authorization checks allow a non-member of a project/group to change the confidentiality attribute of issue via mutation GraphQL query 2020-10-07 not yet calculated CVE-2020-13334
CONFIRM
MISC
MISC gitlab — gitlab
  A potential DOS vulnerability was discovered in GitLab versions 13.1, 13.2 and 13.3. The api to update an asset as a link from a release had a regex check which caused exponential number of backtracks for certain user supplied values resulting in high CPU usage. 2020-10-06 not yet calculated CVE-2020-13333
CONFIRM
MISC
MISC gitlab — gitlab
  Improper access expiration date validation in GitLab version >=8.11.0-rc6+ allows user to have access to projects with expiration. 2020-10-07 not yet calculated CVE-2020-13332
CONFIRM
MISC
MISC gitlab — gitlab
  A command injection vulnerability was discovered in Gitlab runner versions prior to 13.2.4, 13.3.2 and 13.4.1. When the runner is configured on a Windows system with a docker executor, which allows the attacker to run arbitrary commands on Windows host, via DOCKER_AUTH_CONFIG build variable. 2020-10-07 not yet calculated CVE-2020-13347
CONFIRM
MISC
MISC glibc — glib2
  manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree’s root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999. 2020-10-06 not yet calculated CVE-1999-0199
MISC
MISC
MISC glpi-project — glpi
  In GLPI before version 9.5.2, there is a SQL Injection in the API’s search function. Not only is it possible to break the SQL syntax, but it is also possible to utilise a UNION SELECT query to reflect sensitive information such as the current database version, or database user. The most likely scenario for this vulnerability is with someone who has an API account to the system. The issue is patched in version 9.5.2. A proof-of-concept with technical details is available in the linked advisory. 2020-10-07 not yet calculated CVE-2020-15226
CONFIRM
CONFIRM glpi-project — glpi
  In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ. 2020-10-07 not yet calculated CVE-2020-15217
CONFIRM
CONFIRM glpi-project — glpi
  In GLPI before version 9.5.2, the `install/install.php` endpoint insecurely stores user input into the database as `url_base` and `url_base_api`. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure Redirection Since authentication is not required to perform these changes,anyone could point these fields at malicious websites or form input in a way to trigger XSS. Leveraging JavaScript it’s possible to steal cookies, perform actions as the user, etc. The issue is patched in version 9.5.2. 2020-10-07 not yet calculated CVE-2020-15177
CONFIRM
CONFIRM glpi-project — glpi
  In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2 2020-10-07 not yet calculated CVE-2020-15176
CONFIRM
CONFIRM glpi-project — glpi
  In GLPI before version 9.5.2, the `?pluginimage.send.php?` endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in “/files/”. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2. 2020-10-07 not yet calculated CVE-2020-15175
MISC
CONFIRM hapi_fhir — hapi_fhir
  Users of the HAPI FHIR Testpage Overlay 5.0.0 and below can use a specially crafted URL to exploit an XSS vulnerability in this module, allowing arbitrary JavaScript to be executed in the user’s browser. The impact of this vulnerability is believed to be low, as this module is intended for testing and not believed to be widely used for any production purposes. 2020-10-08 not yet calculated CVE-2020-24301
MISC hcl — appscan_enterprise “HCL AppScan Enterprise makes use of broken or risky cryptographic algorithm to store REST API user details.” 2020-10-06 not yet calculated CVE-2019-4325
MISC hcl — appscan_enterprise
  “HCL AppScan Enterprise security rules update administration section of the web application console is missing HTTP Strict-Transport-Security Header.” 2020-10-06 not yet calculated CVE-2019-4326
MISC hellojs — hellojs This affects the package hellojs before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1). 2020-10-06 not yet calculated CVE-2020-7741
MISC
MISC
MISC hewlett_packard_enterprise — kvm_ip_console_switches A remote code injection vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3. 2020-10-02 not yet calculated CVE-2020-24628
MISC hewlett_packard_enterprise — kvm_ip_console_switches A remote stored xss vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3. 2020-10-02 not yet calculated CVE-2020-24627
MISC hisilicon — iptv/h.264/h.265_video_encoders An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can use hard-coded credentials in HTTP requests to perform any administrative task on the device including retrieving the device’s configuration (with the cleartext admin password), and uploading a custom firmware update, to ultimately achieve arbitrary code execution. 2020-10-06 not yet calculated CVE-2020-24215
MISC
MISC hisilicon — iptv/h.264/h.265_video_encoders An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. The file-upload endpoint does not enforce authentication. Attackers can send an unauthenticated HTTP request to upload a custom firmware component, possibly in conjunction with command injection, to achieve arbitrary code execution. 2020-10-06 not yet calculated CVE-2020-24217
MISC
MISC hisilicon — iptv/h.264/h.265_video_encoders An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. When the administrator configures a secret URL for RTSP streaming, the stream is still available via its default name such as /0. Unauthenticated attackers can view video streams that are meant to be private. 2020-10-06 not yet calculated CVE-2020-24216
MISC
MISC hisilicon — iptv/h.264/h.265_video_encoders
  An issue was discovered in the box application on HiSilicon based IPTV/H.264/H.265 video encoders. Attackers can send a crafted unauthenticated RTSP request to cause a buffer overflow and application crash. The device will not be able to perform its main purpose of video encoding and streaming for up to a minute, until it automatically reboots. Attackers can send malicious requests once a minute, effectively disabling the device. 2020-10-06 not yet calculated CVE-2020-24214
MISC
MISC huawei — taurus-an00b Taurus-AN00B versions earlier than 10.1.0.156(C00E155R7P2) have an insufficient input validation vulnerability. Due to the input validation logic is incorrect, an attacker can exploit this vulnerability to access and modify the memory of the device by doing a series of operations. Successful exploit may cause the service abnormal. 2020-10-09 not yet calculated CVE-2020-9105
MISC ibm — mq_appliance
  IBM MQ Appliance (IBM DataPower Gateway 10.0.0.0 and 2018.4.1.0 through 2018.4.1.12) could allow a local user, under special conditions, to obtain highly sensitive information from log files. IBM X-Force ID: 182658. 2020-10-06 not yet calculated CVE-2020-4528
XF
CONFIRM ibm — qradar_siem
  IBM QRadar SIEM 7.3 and 7.4 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 176140. 2020-10-08 not yet calculated CVE-2020-4280
XF
CONFIRM ibm — qradar_siem
  IBM QRadar SIEM 7.3 and 7.4 when configured to use Active Directory Authentication may be susceptible to spoofing attacks. IBM X-Force ID: 165877. 2020-10-08 not yet calculated CVE-2019-4545
XF
CONFIRM impresscms — impresscms
  ImpressCMS 1.4.0 is affected by XSS in modules/system/admin.php which may result in arbitrary remote code execution. 2020-10-07 not yet calculated CVE-2020-17551
MISC
MISC

intel — core_and_celeron_4000_and_5000series_processors

Insufficient control flow management in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable denial of service via adjacent access. 2020-10-05 not yet calculated CVE-2019-14558
MISC

intel — core_and_celeron_4000_and_5000series_processors

Improper initialization in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow a privileged user to potentially enable denial of service via local access. 2020-10-05 not yet calculated CVE-2019-14556
MISC

intel — core_and_celeron_4000_and_5000series_processors

Buffer overflow in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable elevation of privilege or denial of service via adjacent access. 2020-10-05 not yet calculated CVE-2019-14557
MISC intel — core_and_celeron_4000_series_processors
  Insufficient control flow management in BIOS firmware 8th, 9th Generation Intel(R) Core(TM) Processors and Intel(R) Celeron(R) Processor 4000 Series may allow an authenticated user to potentially enable information disclosure via local access. 2020-10-05 not yet calculated CVE-2020-8671
MISC

intel — core_and_pentium_silver_processor_series

Improper conditions check in BIOS firmware for 8th Generation Intel(R) Core(TM) Processors and Intel(R) Pentium(R) Silver Processor Series may allow an authenticated user to potentially enable information disclosure via local access. 2020-10-05 not yet calculated CVE-2020-0571
MISC jenkins — jenkins
  Jenkins Nerrvana Plugin 1.02.06 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. 2020-10-08 not yet calculated CVE-2020-2298
MLIST
CONFIRM jenkins — jenkins
  Jenkins Role-based Authorization Strategy Plugin 3.0 and earlier does not properly invalidate a permission cache when the configuration is changed, resulting in permissions being granted based on an outdated configuration. 2020-10-08 not yet calculated CVE-2020-2286
MLIST
CONFIRM jenkins — jenkins
  Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL. 2020-10-08 not yet calculated CVE-2020-2287
MLIST
CONFIRM jenkins — jenkins
  Jenkins Release Plugin 2.10.2 and earlier does not escape the release version in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Release/Release permission. 2020-10-08 not yet calculated CVE-2020-2292
MLIST
CONFIRM jenkins — jenkins
  Jenkins SMS Notification Plugin 1.2 and earlier stores an access token unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. 2020-10-08 not yet calculated CVE-2020-2297
MLIST
CONFIRM johnson_controls — american_dynamics_victor_web_client
  A vulnerability in victor Web Client versions up to and including v5.4.1 could allow a remote unauthenticated attacker to delete arbitrary files on the system or render the system unusable by conducting a Denial of Service attack. 2020-10-08 not yet calculated CVE-2020-9048
CERT
CONFIRM json-pointer — json-pointer
  This affects the package json-pointer before 0.6.1. Multiple reference of object using slash is supported. 2020-10-05 not yet calculated CVE-2020-7709
MISC
MISC
MISC kde — connect
  In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack. 2020-10-07 not yet calculated CVE-2020-26164
SUSE
SUSE
MISC
MISC
MISC
MISC
MISC
MISC
MISC
MISC
CONFIRM
MISC
CONFIRM leostream — connection_broker
  ** UNSUPPORTED WHEN ASSIGNED ** Leostream Connection Broker 8.2.x is affected by stored XSS. An unauthenticated attacker can inject arbitrary JavaScript code via the webquery.pl User-Agent HTTP header. It is rendered by the admins the next time they log in. The JavaScript injected can be used to force the admin to upload a malicious Perl script that will be executed as root via libMisc::browser_client. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2020-10-06 not yet calculated CVE-2020-26574
MISC
MISC linux — linux_kernel
  A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. 2020-10-06 not yet calculated CVE-2020-25643
SUSE
MISC
MISC mb_connect_line — mymbconnect24_and_mbconnect24 An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.1. There is a blind SQL injection in the lancompenent component, allowing logged-in attackers to discover arbitrary information. 2020-10-02 not yet calculated CVE-2020-24568
CONFIRM mcafee — file_and_removable_media_protection
  Unquoted service path vulnerability in McAfee File and Removable Media Protection (FRP) prior to 5.3.0 allows local users to execute arbitrary code, with higher privileges, via execution and from a compromised folder. This issue may result in files not being encrypted when a policy is triggered. 2020-10-07 not yet calculated CVE-2020-7316
MISC mikrotik — routeros
  An integer underflow in the SMB server of MikroTik RouterOS before 6.45.5 allows remote unauthenticated attackers to crash the service. 2020-10-07 not yet calculated CVE-2019-16160
CONFIRM
MISC
MISC mitsubishi_electric — multiple_products
  Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands. 2020-10-05 not yet calculated CVE-2020-16226
MISC monero — monero_gui
  monero-wallet-gui in Monero GUI 0.17.0.1 includes the . directory in an embedded RPATH (with a preference ahead of /usr/lib), which allows local users to gain privileges via a Trojan horse library in the current working directory. 2020-10-10 not yet calculated CVE-2020-26947
MISC monocms_blog — monocms_blog
  A Cross Site Request Forgery (CSRF) vulnerability in MonoCMS Blog 1.0 allows attackers to change the password of a user. 2020-10-06 not yet calculated CVE-2020-25986
MISC
MISC mozilla — firefox_and_firefox_for_android
  When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80. 2020-10-08 not yet calculated CVE-2020-12400
MISC
MISC
MISC mozilla — firefox_and_firefox_for_android
  During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox < 80 and Firefox for Android < 80. 2020-10-08 not yet calculated CVE-2020-12401
MISC
MISC
MISC mozilla — thunderbird
  If an attacker intercepts Thunderbird’s initial attempt to perform automatic account setup using the Microsoft Exchange autodiscovery mechanism, and the attacker sends a crafted response, then Thunderbird sends username and password over https to a server controlled by the attacker. This vulnerability affects Thunderbird < 68.10.0. 2020-10-08 not yet calculated CVE-2020-15646
MISC
MISC mybatis — mybatis
  MyBatis before 3.5.6 mishandles deserialization of object streams. 2020-10-10 not yet calculated CVE-2020-26945
MISC
MISC nahimic — apo_software_component_driver
  An escalation of privilege vulnerability in Nahimic APO Software Component Driver 1.4.2, 1.5.0, 1.5.1, 1.6.1 and 1.6.2 allows an attacker to execute code with SYSTEM privileges. 2020-10-08 not yet calculated CVE-2019-19115
MISC nec_corporation — infocage_siteshell_series
  InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files. 2020-10-06 not yet calculated CVE-2020-5632
MISC
MISC netgear — ex7700_devices
  NETGEAR EX7700 devices before 1.0.0.210 are affected by incorrect configuration of security settings. 2020-10-09 not yet calculated CVE-2020-26930
MISC netgear — gs808e_devices NETGEAR GS808E devices before 1.7.1.0 are affected by denial of service. 2020-10-09 not yet calculated CVE-2020-26925
MISC netgear — jgs516pe_devices NETGEAR JGS516PE devices before 2.6.0.43 are affected by lack of access control at the function level. 2020-10-09 not yet calculated CVE-2020-26919
MISC netgear — multiple_devices Certain NETGEAR devices are affected by CSRF. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62. 2020-10-09 not yet calculated CVE-2020-26912
MISC netgear — multiple_devices Certain NETGEAR devices are affected by authentication bypass. This affects GS110EMX before 1.0.1.7, GS810EMX before 1.7.1.3, XS512EM before 1.0.1.3, and XS724EM before 1.0.1.3. 2020-10-09 not yet calculated CVE-2020-26921
MISC netgear — multiple_devices Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. 2020-10-09 not yet calculated CVE-2020-26926
MISC netgear — multiple_devices Certain NETGEAR devices are affected by disclosure of sensitive information. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24. 2020-10-09 not yet calculated CVE-2020-26931
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7800 before 1.0.1.58 and R7500v2 before 1.0.3.48. 2020-10-09 not yet calculated CVE-2020-26909
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. 2020-10-09 not yet calculated CVE-2020-26910
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by lack of access control at the function level. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62. 2020-10-09 not yet calculated CVE-2020-26911
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by authentication bypass. This affects D6200 before 1.1.00.36, D7000 before 1.0.1.74, PR2000 before 1.0.0.30, R6020 before 1.0.0.42, R6050 before 1.0.1.22, JR6150 before 1.0.1.22, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6230 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R69002 before 1.2.0.62, and WNR2020 before 1.1.0.62. 2020-10-09 not yet calculated CVE-2020-26908
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before 1.0.2.68, R8900 before 1.0.4.28, R9000 before 1.0.4.28, RAX120 before 1.0.0.78, RBK50 before 2.3.5.30, RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, XR500 before 2.3.2.56, and XR700 before 1.0.1.10. 2020-10-09 not yet calculated CVE-2020-26915
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.63, R7800 before 1.0.2.60, R8900 before 1.0.4.26, R9000 before 1.0.4.26, RBK20 before 2.3.0.28, RBR20 before 2.3.0.28, RBS20 before 2.3.0.28, RBK50 before 2.3.0.32, RBR50 before 2.3.0.32, RBS50 before 2.3.0.32, RBK40 before 2.3.0.28, RBR40 before 2.3.0.28, RBS40 before 2.3.0.28, SRK60 before 2.2.2.20, SRR60 before 2.2.2.20, SRS60 before 2.2.2.20, WN3000RPv2 before 1.0.0.78, WNDR4300v2 before 1.0.0.58, WNDR4500v3 before 1.0.0.58, WNR2000v5 before 1.0.0.70, XR450 before 2.3.2.40, and XR500 before 2.3.2.40. 2020-10-09 not yet calculated CVE-2020-26913
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62. 2020-10-09 not yet calculated CVE-2020-26914
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by command injection by an authenticated user. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24. 2020-10-09 not yet calculated CVE-2020-26922
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.50, and WNR2020 before 1.1.0.62. 2020-10-09 not yet calculated CVE-2020-26916
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by stored XSS. This affects EX7000 before 1.0.1.78, R6250 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R7100LG before 1.0.0.50, R7300DST before 1.0.0.70, R7900 before 1.0.3.8, R8300 before 1.0.2.128, and R8500 before 1.0.2.128. 2020-10-09 not yet calculated CVE-2020-26917
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by stored XSS. This affects EX7000 before 1.0.1.78, R6250 before 1.0.4.34, R6400 before 1.0.1.46, R6400v2 before 1.0.2.66, R6700v3 before 1.0.2.66, R7100LG before 1.0.0.50, R7300DST before 1.0.0.70, R7900 before 1.0.3.8, R8300 before 1.0.2.128, and R8500 before 1.0.2.128. 2020-10-09 not yet calculated CVE-2020-26918
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects SRK60 before 2.5.3.110, SRR60 before 2.5.3.110, and SRS60 before 2.5.3.110. 2020-10-09 not yet calculated CVE-2020-26920
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. 2020-10-09 not yet calculated CVE-2020-26905
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by stored XSS. This affects WC7500 before 6.5.5.24, WC7600 before 6.5.5.24, WC7600v2 before 6.5.5.24, and WC9500 before 6.5.5.24. 2020-10-09 not yet calculated CVE-2020-26923
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by authentication bypass. This affects D6200 before 1.1.00.40, D7000 before 1.0.1.78, R6020 before 1.0.0.42, R6080 before 1.0.0.42, R6050 before 1.0.1.26, JR6150 before 1.0.1.26, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.66, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, AC2100 before 1.2.0.62, AC2400 before 1.2.0.62, AC2600 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62. 2020-10-09 not yet calculated CVE-2020-26927
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by authentication bypass. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. 2020-10-09 not yet calculated CVE-2020-26928
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6. 2020-10-09 not yet calculated CVE-2020-26907
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. 2020-10-09 not yet calculated CVE-2020-26906
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. 2020-10-09 not yet calculated CVE-2020-26904
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. 2020-10-09 not yet calculated CVE-2020-26902
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by disclosure of sensitive information. This affects RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. 2020-10-09 not yet calculated CVE-2020-26901
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. 2020-10-09 not yet calculated CVE-2020-26900
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by disclosure of sensitive information. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. 2020-10-09 not yet calculated CVE-2020-26899
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. 2020-10-09 not yet calculated CVE-2020-26897
MISC netgear — multiple_devices
  Certain NETGEAR devices are affected by disclosure of administrative credentials. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.10.11, RBR850 before 3.2.10.11, and RBS850 before 3.2.10.11. 2020-10-09 not yet calculated CVE-2020-26903
MISC netgear — r6220_and_r6230_devices
  Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6220 before 1.1.0.100 and R6230 before 1.1.0.100. 2020-10-09 not yet calculated CVE-2020-26929
MISC netgear — rax40_devices NETGEAR RAX40 devices before 1.0.3.80 are affected by incorrect configuration of security settings. 2020-10-09 not yet calculated CVE-2020-26898
MISC netgear — wac720_and_wac730_devices
  Certain NETGEAR devices are affected by disclosure of sensitive information. This affects WAC720 before 3.9.1.13 and WAC730 before 3.9.1.13. 2020-10-09 not yet calculated CVE-2020-26924
MISC next.js — next.js
  Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4. 2020-10-08 not yet calculated CVE-2020-15242
CONFIRM
MISC nextcloud — nextcloud_deck
  Improper access control in Nextcloud Deck 0.8.0 allowed an attacker to reshare boards shared with them with more permissions than they had themselves. 2020-10-05 not yet calculated CVE-2020-8182
MISC
MISC nextcloud — nextcloud_deck
  Missing access control in Nextcloud Deck 1.0.4 caused an insecure direct object reference allowing an attacker to view all attachments. 2020-10-05 not yet calculated CVE-2020-8235
MISC
MISC nextcloud — nextcloud_server
  A logic error in Nextcloud Server 19.0.0 caused a privilege escalation allowing malicious users to reshare with higher permissions than they got assigned themselves. 2020-10-05 not yet calculated CVE-2020-8223
MISC
MISC node-pdf-generator — node-pdf-generator
  This affects all versions of package node-pdf-generator. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack. 2020-10-06 not yet calculated CVE-2020-7740
MISC
MISC node.js — node.js ** UNSUPPORTED WHEN ASSIGNED ** The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2020-10-06 not yet calculated CVE-2020-24807
MISC
MISC
MISC
MISC nvidia — virtual_gpu_manager NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which allocated memory can be freed twice, which may lead to information disclosure or denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. 2020-10-02 not yet calculated CVE-2020-5988
CONFIRM nvidia — virtual_gpu_manager
  NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin and the host driver kernel module, in which the potential exists to write to a memory location that is outside the intended boundary of the frame buffer memory allocated to guest operating systems, which may lead to denial of service or information disclosure. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. 2020-10-02 not yet calculated CVE-2020-5983
CONFIRM nvidia — virtual_gpu_manager
  NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data size is not validated, which may lead to tampering or denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. 2020-10-02 not yet calculated CVE-2020-5986
CONFIRM nvidia — virtual_gpu_manager
  NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. 2020-10-02 not yet calculated CVE-2020-5989
CONFIRM nvidia — virtual_gpu_manager
  NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which it may have the use-after-free vulnerability while freeing some resources, which may lead to denial of service, code execution, and information disclosure. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. 2020-10-02 not yet calculated CVE-2020-5984
CONFIRM nvidia — virtual_gpu_manager
  NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which guest-supplied parameters remain writable by the guest after the plugin has validated them, which may lead to the guest being able to pass invalid parameters to plugin handlers, which may lead to denial of service or escalation of privileges. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. 2020-10-02 not yet calculated CVE-2020-5987
CONFIRM nvidia — virtual_gpu_manager
  NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data length is not validated, which may lead to tampering or denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. 2020-10-02 not yet calculated CVE-2020-5985
CONFIRM oneplus — app_locker
  OnePlus App Locker through 2020-10-06 allows physically proximate attackers to use Google Assistant to bypass an authorization check in order to send an SMS message when the SMS application is locked. 2020-10-09 not yet calculated CVE-2020-13626
MISC
MISC opensc — opensc
  The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher. 2020-10-06 not yet calculated CVE-2020-26572
MISC
MISC opensc — opensc
  The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init. 2020-10-06 not yet calculated CVE-2020-26571
MISC opensc — opensc
  The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file. 2020-10-06 not yet calculated CVE-2020-26570
MISC
MISC ory — fosite
  ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite before version 0.34.1, the OAuth 2.0 Client’s registered redirect URLs and the redirect URL provided at the OAuth2 Authorization Endpoint where compared using strings.ToLower while they should have been compared with a simple string match. This allows an attacker to register a client with allowed redirect URL https://example.com/callback. Then perform an OAuth2 flow and requesting redirect URL https://example.com/CALLBACK. Instead of an error (invalid redirect URL), the browser is redirected to https://example.com/CALLBACK with a potentially successful OAuth2 response, depending on the state of the overall OAuth2 flow (the user might still deny the request for example). This vulnerability has been patched in ORY Fosite v0.34.1. 2020-10-02 not yet calculated CVE-2020-15234
MISC
CONFIRM ory — fosite
  ORY Fosite is a security first OAuth2 & OpenID Connect framework for Go. In Fosite from version 0.30.2 and before version 0.34.1, there is an issue in which an an attacker can override the registered redirect URL by performing an OAuth flow and requesting a redirect URL that is to the loopback adapter. Attackers can provide both custom URL query parameters to their loopback redirect URL, as well as actually overriding the host of the registered redirect URL. These attacks are only applicable in scenarios where the attacker has access over the loopback interface. This vulnerability has been patched in ORY Fosite v0.34.1. 2020-10-02 not yet calculated CVE-2020-15233
MISC
CONFIRM peplink — balance
  Peplink Balance before 8.1.0rc1 allows an unauthenticated attacker to download PHP configuration files (/filemanager/php/connector.php) from Web Admin. 2020-10-07 not yet calculated CVE-2020-24246
MISC
MISC phantomjs — phantomjs
  This affects all versions of package phantomjs-seo. It is possible for an attacker to craft a url that will be passed to a PhantomJS instance allowing for an SSRF attack. 2020-10-06 not yet calculated CVE-2020-7739
CONFIRM
CONFIRM php — php
  In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information. 2020-10-02 not yet calculated CVE-2020-7070
MISC
MISC
MISC
MLIST
FEDORA
FEDORA
FEDORA php — php
  In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data. 2020-10-02 not yet calculated CVE-2020-7069
MISC
FEDORA
FEDORA
FEDORA phpgurukul — hostel-management-system
  PHPGurukul hostel-management-system 2.1 allows XSS via Guardian Name, Guardian Relation, Guardian Contact no, Address, or City. 2020-10-08 not yet calculated CVE-2020-25270
MISC
MISC phpgurukul — hostel-management-system-in-php
  PHPGurukul hospital-management-system-in-php 4.0 allows XSS via admin/patient-search.php, doctor/search.php, book-appointment.php, doctor/appointment-history.php, or admin/appointment-history.php. 2020-10-08 not yet calculated CVE-2020-25271
MISC
MISC phpmyadmin — phpmyadmin
  An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query. 2020-10-10 not yet calculated CVE-2020-26935
MISC phpmyadmin — phpmyadmin
  phpMyAdmin before 4.9.6 and 5.x before 5.0.3 allows XSS through the transformation feature via a crafted link. 2020-10-10 not yet calculated CVE-2020-26934
MISC preferred_providers_app — preferred_providers_app
  A missing rate limit in the Preferred Providers app 1.7.0 allowed an attacker to set the password an uncontrolled amount of times. 2020-10-05 not yet calculated CVE-2020-8228
SUSE
MISC
MISC projectworlds — car_rental_management_system
  A Persistent Cross-Site Scripting (XSS) vulnerability in message_admin.php in Projectworlds Car Rental Management System v1.0 allows unauthenticated remote attackers to harvest an admin login session cookie and steal an admin session upon an admin login. 2020-10-06 not yet calculated CVE-2020-23832
MISC
MISC
MISC pyrocms — pyrocms
  PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/addons/uninstall/anomaly.module.blocks URI: an arbitrary plugin will be deleted. 2020-10-08 not yet calculated CVE-2020-25263
MISC
MISC
MISC pyrocms — pyrocms
  PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/pages/delete/ URI: pages will be deleted. 2020-10-08 not yet calculated CVE-2020-25262
MISC
MISC
MISC qdpm — qdpm
  The file upload functionality in qdPM 9.1 doesn’t check the file description, which allows remote authenticated attackers to inject web script or HTML via the attachments info parameter, aka XSS. This can occur during creation of a ticket, project, or task. 2020-10-05 not yet calculated CVE-2020-26166
MISC
MISC
MISC qemu — qemu
  fdctrl_write_data in hw/block/fdc.c in QEMU 5.0.0 has a NULL pointer dereference via a NULL block pointer for the current drive. 2020-10-02 not yet calculated CVE-2020-25741
CONFIRM
MISC
MISC
CONFIRM ractf — ractf
  In RACTF before commit f3dc89b, unauthenticated users are able to get the value of sensitive config keys that would normally be hidden to everyone except admins. All versions after commit f3dc89b9f6ab1544a289b3efc06699b13d63e0bd(3/10/20) are patched. 2020-10-05 not yet calculated CVE-2020-15235
MISC
CONFIRM ruby — ruby
  An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack. 2020-10-06 not yet calculated CVE-2020-25613
CONFIRM
MISC
CONFIRM shrine — shrine
  In Shrine before version 3.3.0, when using the `derivation_endpoint` plugin, it’s possible for the attacker to use a timing attack to guess the signature of the derivation URL. The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. A possible workaround is provided in the linked advisory. 2020-10-05 not yet calculated CVE-2020-15237
MISC
CONFIRM smarter — coffee_maker
  ** UNSUPPORTED WHEN ASSIGNED ** Smarter Coffee Maker before 2nd generation allows firmware replacement without authentication or authorization. User interaction is required to press a button. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. 2020-10-07 not yet calculated CVE-2020-15501
MISC smartstore — smartstore
  Affected versions of Smartstore have a missing WebApi Authentication attribute. This vulnerability affects Smartstore shops in version 4.0.0 & 4.0.1 which have installed and activated the Web API plugin. Users of Smartstore 4.0.0 and 4.0.1 must merge their repository with 4.0.x or overwrite the file SmartStore.Web.Framework in the */bin* directory of the deployed shop with this file. As a workaround without updating uninstall the Web API plugin to close this vulnerability. 2020-10-08 not yet calculated CVE-2020-15243
CONFIRM soplanning — soplanning
  SoPlanning before 1.47 doesn’t correctly check the security key used to publicly share plannings. It allows a bypass to get access without authentication. 2020-10-07 not yet calculated CVE-2020-25867
MISC sourcecodester — online_bus_booking_system In SourceCodester Online Bus Booking System 1.0, there is XSS through the name parameter in book_now.php. 2020-10-08 not yet calculated CVE-2020-25272
MISC
MISC sourcecodester — online_bus_booking_system In SourceCodester Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection. 2020-10-08 not yet calculated CVE-2020-25273
MISC
MISC spice — spice_remote_display_system
  Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution. 2020-10-07 not yet calculated CVE-2020-14355
MISC
DEBIAN
MISC symmetricds — symmetricds
  Symmetric DS <3.12.0 uses mx4j to provide access to JMX over HTTP. mx4j, by default, has no auth and is available on all interfaces. An attacker can interact with JMX: get system info, and invoke MBean methods. It is possible to install additional MBeans from a remote host using MLet that leads to arbitrary code execution. 2020-10-05 not yet calculated CVE-2020-24231
MISC sympa — sympa
  Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable. 2020-10-07 not yet calculated CVE-2020-26880
MISC
MISC
MISC symphony_cms — symphony_cms
  Cross-site scripting (XSS) vulnerabilities in Symphony CMS 3.0.0 allow remote attackers to inject arbitrary web script or HTML to fields[‘body’] param via eventsevent.publish_article.php 2020-10-07 not yet calculated CVE-2020-25343
MISC trend_micro — antivirus_for_mac_2020 Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. 2020-10-02 not yet calculated CVE-2020-25776
N/A
N/A typo3 — fluid_engine
  TYPO3 Fluid Engine (package `typo3fluid/fluid`) before versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like `{showFullName ? fullName : defaultValue}`. Updated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) versions as well: TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.4) and TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1). 2020-10-08 not yet calculated CVE-2020-15241
MISC
CONFIRM
MISC uraytech — iptv/h.264/h.265_video_encoders An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can send crafted unauthenticated HTTP requests to exploit path traversal and pattern-matching programming flaws, and retrieve any file from the device’s file system, including the configuration file with the cleartext administrative password. 2020-10-06 not yet calculated CVE-2020-24219
MISC
MISC uraytech — iptv/h.264/h.265_video_encoders
  An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file. 2020-10-06 not yet calculated CVE-2020-24218
MISC
MISC vapor — vapor
  Vapor is a web framework for Swift. In Vapor before version 4.29.4, Attackers can access data at arbitrary filesystem paths on the same host as an application. Only applications using FileMiddleware are affected. This is fixed in version 4.29.4. 2020-10-02 not yet calculated CVE-2020-15230
MISC
MISC
CONFIRM whatsapp — whatsapp
  Receiving a large text message containing URLs in WhatsApp for iOS prior to v2.20.91.4 could have caused the application to freeze while processing the message. 2020-10-06 not yet calculated CVE-2020-1901
CONFIRM whatsapp — whatsapp
  A user running a quick search on a highly forwarded message on WhatsApp for Android from v2.20.108 to v2.20.140 or WhatsApp Business for Android from v2.20.35 to v2.20.49 could have been sent to the Google service over plain HTTP. 2020-10-06 not yet calculated CVE-2020-1902
CONFIRM whatsapp — whatsapp
  An issue when unzipping docx, pptx, and xlsx documents in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have resulted in an out-of-memory denial of service. This issue would have required the receiver to explicitly open the attachment if it was received from a number not in the receiver’s WhatsApp contacts. 2020-10-06 not yet calculated CVE-2020-1903
CONFIRM whatsapp — whatsapp
  Media ContentProvider URIs used for opening attachments in other apps were generated sequentially prior to WhatsApp for Android v2.20.185, which could have allowed a malicious third party app chosen to open the file to guess the URIs for previously opened attachments until the opener app is terminated. 2020-10-06 not yet calculated CVE-2020-1905
CONFIRM whatsapp — whatsapp
  A path validation issue in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have allowed for directory traversal overwriting files when sending specially crafted docx, xlx, and pptx files as attachments to messages. 2020-10-06 not yet calculated CVE-2020-1904
CONFIRM whatsapp — whatsapp
  A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header. 2020-10-06 not yet calculated CVE-2020-1907
CONFIRM whatsapp — whatsapp
  A buffer overflow in WhatsApp for Android prior to v2.20.130 and WhatsApp Business for Android prior to v2.20.46 could have allowed an out-of-bounds write when processing malformed local videos with E-AC-3 audio streams. 2020-10-06 not yet calculated CVE-2020-1906
CONFIRM wireshark — wireshark
  In Wireshark through 3.2.7, the Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop. This was addressed in epan/dissectors/packet-fbzero.c by correcting the implementation of offset advancement. 2020-10-06 not yet calculated CVE-2020-26575
MISC
MISC
MISC
MISC
MISC
MISC wordpress — wordpress
  The Dynamic OOO widget for the Elementor Pro plugin through 3.0.5 for WordPress allows remote authenticated users to execute arbitrary code because only the Editor role is needed to upload executable PHP code via the PHP Raw snippet. NOTE: this issue can be mitigated by removing the Dynamic OOO widget or by restricting availability of the Editor role. 2020-10-07 not yet calculated CVE-2020-26596
MISC
MISC wordpress — wordpress
  The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist). 2020-10-07 not yet calculated CVE-2020-26876
MISC
MISC
MISC xerox — workcentre_ec7836
  Xerox WorkCentre EC7836 before 073.050.059.25300 and EC7856 before 073.020.059.25300 devices allow XSS via Description pages. 2020-10-09 not yet calculated CVE-2020-26162
MISC
CONFIRM xmpp-http-upload — xmpp-http-upload In xmpp-http-upload before version 0.4.0, when the GET method is attacked, attackers can read files which have a `.data` suffix and which are accompanied by a JSON file with the `.meta` suffix. This can lead to Information Disclosure and in some shared-hosting scenarios also to circumvention of authentication or other limitations on the outbound (GET) traffic. For example, in a scenario where a single server has multiple instances of the application running (with separate DATA_ROOT settings), an attacker who has knowledge about the directory structure is able to read files from any other instance to which the process has read access. If instances have individual authentication (for example, HTTP authentication via a reverse proxy, source IP based filtering) or other restrictions (such as quotas), attackers may circumvent those limits in such a scenario by using the Directory Traversal to retrieve data from the other instances. If the associated XMPP server (or anyone knowing the SECRET_KEY) is malicious, they can write files outside the DATA_ROOT. The files which are written are constrained to have the `.meta` and the `.data` suffixes; the `.meta` file will contain the JSON with the Content-Type of the original request and the `.data` file will contain the payload. The issue is patched in version 0.4.0. 2020-10-06 not yet calculated CVE-2020-15239
MISC
MISC
CONFIRM
MISC zabbix — zabbix_server
  Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code. 2020-10-07 not yet calculated CVE-2020-11800
MISC
CONFIRM
CONFIRM
CONFIRM zoho — manageengine_applications_manager
  Zoho ManageEngine Applications Manager 14780 and before allows a remote unauthenticated attacker to register managed servers via AAMRequestProcessor servlet. 2020-10-08 not yet calculated CVE-2020-10816
MISC
CONFIRM zoho — manageengine_applications_manager
  Zoho ManageEngine Applications Manager version 14740 and prior allows an authenticated SQL Injection via a crafted jsp request in the SAP module. 2020-10-06 not yet calculated CVE-2020-15927
MISC
CONFIRM
CONFIRM zoho — manageenginer_applications_manager Zoho ManageEngine Applications Manager version 14740 and prior allows an authenticated SQL Injection via a crafted jsp request in the RCA module. 2020-10-06 not yet calculated CVE-2020-16267
MISC
CONFIRM
CONFIRM zte — zxone_1970_snpe
  A ZTE product is impacted by the improper access control vulnerability. Due to lack of an authentication protection mechanism in the program, attackers could use this vulnerability to gain access right through brute-force attacks. This affects: <ZXONE 19700 SNPE><ZXONE8700V1.40R2B13_SNPE> 2020-10-05 not yet calculated CVE-2020-6875
MISC

Source link

Author: Editor
Editor represents multiple online news sites, including STL.News, RSSNews.Press and more. As a media company offering website hosting, design and SEO we create the news sites in part to illustrate our "search engine friendly" web hosting and design services. In addition, we believe that our "direct source news" concept helps provide accurate information to the public without bias.