Vulnerabilities (CVE)

Filtered by NVD-CWE-Other
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-13846 1 Sylabs 1 Singularity 2020-09-18 5.0 MEDIUM 7.5 HIGH
Sylabs Singularity 3.5.0 through 3.5.3 fails to report an error in a Status Code.
CVE-2018-17921 1 Sagaradio 2 Saga1-l8b, Saga1-l8b Firmware 2020-09-18 5.8 MEDIUM 8.8 HIGH
SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to an attack that may allow an attacker to force-pair the device without human interaction.
CVE-2018-5406 1 Quest 2 Kace Systems Management Appliance, Kace Systems Management Appliance Firmware 2020-09-18 9.3 HIGH 8.8 HIGH
The Quest Kace K1000 Appliance, versions prior to 9.0.270, allows a remote attacker to exploit the misconfigured Cross-Origin Resource Sharing (CORS) mechanism. An unauthenticated, remote attacker could exploit this vulnerability to perform sensitive actions such as adding a new administrator account or changing the appliance’s settings. A malicious internal user could also gain administrator privileges of this appliance and use it to visit a malicious link that exploits this vulnerability. This could cause the application to perform sensitive actions such as adding a new administrator account or changing the appliance’s settings. An unauthenticated, remote attacker could add an administrator-level account or change the appliance's settings.
CVE-2020-7663 1 Websocket-extensions Project 1 Websocket-extensions 2020-09-17 5.0 MEDIUM 7.5 HIGH
websocket-extensions ruby module prior to 0.1.5 allows Denial of Service (DoS) via Regex Backtracking. The extension parser may take quadratic time when parsing a header containing an unclosed string parameter value whose content is a repeating two-byte sequence of a backslash and some other character. This could be abused by an attacker to conduct Regex Denial Of Service (ReDoS) on a single-threaded server by providing a malicious payload with the Sec-WebSocket-Extensions header.
CVE-2018-15448 1 Cisco 1 Registered Envelope Service 2020-09-16 5.0 MEDIUM 7.5 HIGH
A vulnerability in the user management functions of Cisco Registered Envelope Service could allow an unauthenticated, remote attacker to discover sensitive user information. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to an insecure configuration that allows improper indexing. An attacker could exploit this vulnerability by using a search engine to look for specific data strings. A successful exploit could allow the attacker to discover certain sensitive information about the application, including usernames.
CVE-2020-2041 1 Paloaltonetworks 1 Pan-os 2020-09-15 7.8 HIGH 7.5 HIGH
An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts all versions of PAN-OS 8.0, and PAN-OS 8.1 versions earlier than 8.1.16.
CVE-2020-3636 1 Qualcomm 20 Kamorta, Kamorta Firmware, Qcs404 and 17 more 2020-09-14 4.6 MEDIUM 7.8 HIGH
u'Out of bound writes happen when accessing usage_table header entry beyond the memory allocated for the header' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, QCS404, QCS610, Rennell, SC7180, SDX55, SM6150, SM7150, SM8250, SXR2130
CVE-2020-5779 1 Tradingtechnologies 1 Trading Technologies Messaging 2020-09-14 5.0 MEDIUM 7.5 HIGH
A flaw in Trading Technologies Messaging 7.1.28.3 (ttmd.exe) relates to invalid parameter handling when calling strcpy_s() with an invalid parameter (i.e., a long src string parameter) as a part of processing a type 4 message sent to default TCP RequestPort 10200. It's been observed that ttmd.exe terminates as a result.
CVE-2020-15687 1 Linuxfoundation 1 Acrn 2020-09-08 5.0 MEDIUM 7.5 HIGH
Missing access control restrictions in the Hypervisor component of the ACRN Project (v2.0 and v1.6.1) allow a malicious entity, with root access in the Service VM userspace, to abuse the PCIe assign/de-assign Hypercalls via crafted ioctls and payloads. This attack results in a corrupt state and Denial of Service (DoS) for previously assigned PCIe devices to the Service VM at runtime.
CVE-2018-0139 1 Cisco 1 Unified Customer Voice Portal 2020-09-04 5.0 MEDIUM 8.6 HIGH
A vulnerability in the Interactive Voice Response (IVR) management connection interface for Cisco Unified Customer Voice Portal (CVP) could allow an unauthenticated, remote attacker to cause the IVR connection to disconnect, creating a system-wide denial of service (DoS) condition. The vulnerability is due to improper handling of a TCP connection request when the IVR connection is already established. An attacker could exploit this vulnerability by initiating a crafted connection to the IP address of the targeted CVP device. An exploit could allow the attacker to disconnect the IVR to CVP connection, creating a DoS condition that prevents the CVP from accepting new, incoming calls while the IVR automatically attempts to re-establish the connection to the CVP. This vulnerability affects Cisco Unified Customer Voice Portal (CVP) Software Release 11.5(1). Cisco Bug IDs: CSCve70560.
CVE-2018-0136 1 Cisco 9 Asr 9001, Asr 9006, Asr 9010 and 6 more 2020-09-04 7.8 HIGH 8.6 HIGH
A vulnerability in the IPv6 subsystem of Cisco IOS XR Software Release 5.3.4 for the Cisco Aggregation Services Router (ASR) 9000 Series could allow an unauthenticated, remote attacker to trigger a reload of one or more Trident-based line cards, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect handling of IPv6 packets with a fragment header extension. An attacker could exploit this vulnerability by sending IPv6 packets designed to trigger the issue either to or through the Trident-based line card. A successful exploit could allow the attacker to trigger a reload of Trident-based line cards, resulting in a DoS during the period of time the line card takes to restart. This vulnerability affects Cisco Aggregation Services Router (ASR) 9000 Series when the following conditions are met: The router is running Cisco IOS XR Software Release 5.3.4, and the router has installed Trident-based line cards that have IPv6 configured. A software maintenance upgrade (SMU) has been made available that addresses this vulnerability. The fix has also been incorporated into service pack 7 for Cisco IOS XR Software Release 5.3.4. Cisco Bug IDs: CSCvg46800.
CVE-2020-14400 3 Debian, Libvncserver Project, Opensuse 3 Debian Linux, Libvncserver, Leap 2020-08-29 5.0 MEDIUM 7.5 HIGH
** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary.
CVE-2020-14399 3 Debian, Libvncserver Project, Opensuse 3 Debian Linux, Libvncserver, Leap 2020-08-29 5.0 MEDIUM 7.5 HIGH
** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly "no trust boundary crossed."
CVE-2018-1170 2 Htc, Volkswagen 2 Customer-link Bridge, Customer-link 2020-08-28 8.3 HIGH 8.8 HIGH
This vulnerability allows adjacent attackers to inject arbitrary Controller Area Network messages on vulnerable installations of Volkswagen Customer-Link App 1.30 and HTC Customer-Link Bridge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Customer-Link App and Customer-Link Bridge. The issue results from the lack of a proper protection mechanism against unauthorized firmware updates. An attacker can leverage this vulnerability to inject CAN messages. Was ZDI-CAN-5264.
CVE-2016-4309 1 Getsymphony 1 Symphony 2020-08-27 7.6 HIGH 7.5 HIGH
Session fixation vulnerability in Symphony CMS 2.6.7, when session.use_only_cookies is disabled, allows remote attackers to hijack web sessions via the PHPSESSID parameter.
CVE-2020-9079 1 Huawei 1 Fusionsphere Openstack 2020-08-12 5.8 MEDIUM 8.8 HIGH
FusionSphere OpenStack 8.0.0 have a protection mechanism failure vulnerability. The product incorrectly uses a protection mechanism. An attacker has to find a way to exploit the vulnerability to conduct directed attacks against the affected product.
CVE-2020-3384 1 Cisco 1 Data Center Network Manager 2020-08-05 6.0 MEDIUM 8.2 HIGH
A vulnerability in specific REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system with the privileges of the logged-in user. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to inject arbitrary commands on the underlying operating system.
CVE-2010-3730 1 Google 1 Chrome 2020-08-03 6.8 MEDIUM 8.8 HIGH
Google Chrome before 6.0.472.62 does not properly use information about the origin of a document to manage properties, which allows remote attackers to have an unspecified impact via a crafted web site, related to a "property pollution" issue.
CVE-2011-2699 2 Linux, Redhat 3 Linux Kernel, Enterprise Linux, Enterprise Mrg 2020-07-29 7.8 HIGH 7.5 HIGH
The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.
CVE-2020-3369 1 Cisco 3 Sd-wan Firmware, Vedge 5000, Vedge Cloud Router 2020-07-24 7.8 HIGH 7.5 HIGH
A vulnerability in the deep packet inspection (DPI) engine of Cisco SD-WAN vEdge Routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper processing of FTP traffic. An attacker could exploit this vulnerability by sending crafted FTP packets through an affected device. A successful exploit could allow the attacker to make the device reboot continuously, causing a DoS condition.
CVE-2020-12409 1 Mozilla 1 Firefox 2020-07-13 6.8 MEDIUM 8.8 HIGH
When using certain blank characters in a URL, they where incorrectly rendered as spaces instead of an encoded URL. This vulnerability affects Firefox < 77.
CVE-2020-6870 1 Zte 2 Netnumen U31 R10, Netnumen U31 R10 Firmware 2020-07-06 5.2 MEDIUM 8.0 HIGH
The version V12.17.20T115 of ZTE U31R20 product is impacted by a design error vulnerability. An attacker could exploit the vulnerability to log in to the FTP server to tamper with the password, and illegally download, modify, upload, or delete files, causing improper operation of the network management system and equipment. This affects: NetNumenU31R20 V12.17.20T115
CVE-2020-15082 1 Prestashop 1 Prestashop 2020-07-02 7.5 HIGH 8.8 HIGH
In PrestaShop from version 1.6.0.1 and before version 1.7.6.6, the dashboard allows rewriting all configuration variables. The problem is fixed in 1.7.6.6
CVE-2019-20871 1 Mattermost 1 Mattermost Server 2020-06-23 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Mattermost Server before 5.9.0, 5.8.1, 5.7.3, and 4.10.8. The Markdown library allows catastrophic backtracking.
CVE-2019-20831 2 Foxitsoftware, Microsoft 2 3d, Windows 2020-06-11 5.0 MEDIUM 7.5 HIGH
An issue was discovered in the 3D Plugin Beta for Foxit Reader and PhantomPDF before 9.5.0.20733. It has void data mishandling, causing a crash.
CVE-2019-14054 1 Qualcomm 32 Kamorta, Kamorta Firmware, Msm8998 and 29 more 2020-06-03 7.2 HIGH 7.8 HIGH
Improper permissions in XBL_SEC region enable user to update XBL_SEC code and data and divert the RAM dump path to normal cold boot path in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, MSM8998, QCS404, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SM8150, SXR1130, SXR2130
CVE-2020-4020 1 Atlassian 1 Companion 2020-06-02 6.5 MEDIUM 7.2 HIGH
The file downloading functionality in the Atlassian Companion App before version 1.0.0 allows remote attackers, who control a Confluence Server instance that the Companion App is connected to, execute arbitrary .exe files via a Protection Mechanism Failure.
CVE-2020-12647 1 Unisys 1 Algol Compiler 2020-06-01 7.2 HIGH 8.8 HIGH
Unisys ALGOL Compiler 58.1 before 58.1a.15, 59.1 before 59.1a.9, and 60.0 before 60.0a.5 can emit invalid code sequences under rare circumstances related to syntax. The resulting code could, for example, trigger a system fault or adversely affect confidentiality, integrity, and availability.
CVE-2020-1118 1 Microsoft 2 Windows 10, Windows Server 2019 2020-05-27 7.8 HIGH 7.5 HIGH
A denial of service vulnerability exists in the Windows implementation of Transport Layer Security (TLS) when it improperly handles certain key exchanges, aka 'Microsoft Windows Transport Layer Security Denial of Service Vulnerability'.
CVE-2020-9840 1 Apple 1 Nioextras 2020-05-14 5.0 MEDIUM 7.5 HIGH
In SwiftNIO Extras before 1.4.1, a logic issue was addressed with improved restrictions.
CVE-2020-8489 1 Abb 1 800xa Information Management 2020-05-08 4.6 MEDIUM 7.8 HIGH
Insufficient protection of the inter-process communication functions in ABB System 800xA Information Management (all published versions) enables an attacker authenticated on the local system to inject data, affecting the runtime values to be stored in the archive, or making Information Management history services unavailable.
CVE-2020-8488 1 Abb 1 800xa Batch Management 2020-05-08 4.6 MEDIUM 7.8 HIGH
Insufficient protection of the inter-process communication functions in ABB System 800xA Batch Management (all published versions) enables an attacker authenticated on the local system to inject data, affecting User Interface update during batch execution and/or compare/printing functionalities.
CVE-2020-8484 1 Abb 1 800xa 2020-05-08 4.6 MEDIUM 7.8 HIGH
Insufficient protection of the inter-process communication functions in ABB System 800xA for DCI (all published versions) enables an attacker authenticated on the local system to inject data, allowing reads and writes to the controllers or cause windows processes to crash.
CVE-2020-8487 1 Abb 1 800xa Base System 2020-05-08 4.6 MEDIUM 7.8 HIGH
Insufficient protection of the inter-process communication functions in ABB System 800xA Base (all published versions) enables an attacker authenticated on the local system to inject data, affect node redundancy handling.
CVE-2020-8486 1 Abb 1 800xa Rnrp 2020-05-07 4.6 MEDIUM 7.8 HIGH
Insufficient protection of the inter-process communication functions in ABB System 800xA RNRP (all published versions) enables an attacker authenticated on the local system to inject data, affect node redundancy handling.
CVE-2020-8485 1 Abb 1 800xa 2020-05-07 4.6 MEDIUM 7.8 HIGH
Insufficient protection of the inter-process communication functions in ABB System 800xA for MOD 300 (all published versions) enables an attacker authenticated on the local system to inject data, allowing reads and writes to the controllers or cause windows processes to crash.
CVE-2018-21094 1 Netgear 22 Wac120, Wac120 Firmware, Wac505 and 19 more 2020-05-04 7.5 HIGH 7.3 HIGH
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects WAC120 before 2.1.7, WAC505 before 5.0.5.4, WAC510 before 5.0.5.4, WNAP320 before 3.7.11.4, WNAP210v2 before 3.7.11.4, WNDAP350 before 3.7.11.4, WNDAP360 before 3.7.11.4, WNDAP660 before 3.7.11.4, WNDAP620 before 2.1.7, WND930 before 2.1.5, and WN604 before 3.3.10.
CVE-2020-12468 1 Intelliants 1 Subrion 2020-05-01 6.8 MEDIUM 7.8 HIGH
Subrion CMS 4.2.1 allows CSV injection via a phrase value within a language. This is related to phrases/add/ and languages/download/.
CVE-2020-12073 1 Cyberchimps 1 Gutenberg \& Elementor Templates Importer For Responsive 2020-04-28 6.5 MEDIUM 8.8 HIGH
The responsive-add-ons plugin before 2.2.7 for WordPress has incorrect access control for wp-admin/admin-ajax.php?action= requests.
CVE-2019-3945 1 Parrot 2 Anafi, Anafi Firmware 2020-04-07 5.0 MEDIUM 7.5 HIGH
Web server running on Parrot ANAFI can be crashed due to the SDK command "Common_CurrentDateTime" being sent to control service with larger than expected date length.
CVE-2020-7948 1 Auth0 1 Login By Auth0 2020-04-02 6.5 MEDIUM 8.8 HIGH
An issue was discovered in the Login by Auth0 plugin before 4.0.0 for WordPress. A user can perform an insecure direct object reference.
CVE-2020-6978 1 Honeywell 1 Win-pak 2020-03-27 6.4 MEDIUM 7.2 HIGH
In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable due to the usage of old jQuery libraries.
CVE-2019-19741 1 Ea 1 Origin 2020-03-05 7.2 HIGH 7.8 HIGH
Electronic Arts Origin 10.5.55.33574 is vulnerable to local privilege escalation due to arbitrary directory DACL manipulation, a different issue than CVE-2019-19247 and CVE-2019-19248. When Origin.exe connects to the named pipe OriginClientService, the privileged service verifies the client's executable file instead of its in-memory process (which can be significantly different from the executable file due to, for example, DLL injection). Data transmitted over the pipe is encrypted using a static key. Instead of hooking the pipe communication directly via WriteFileEx(), this can be bypassed by hooking the EVP_EncryptUpdate() function of libeay32.dll. The pipe takes the command CreateDirectory to create a directory and adjust the directory DACL. Calls to this function can be intercepted, the directory and the DACL can be replaced, and the manipulated DACL is written. Arbitrary DACL write is further achieved by creating a hardlink in a user-controlled directory that points to (for example) a service binary. The DACL is then written to this service binary, which results in escalation of privileges.
CVE-2013-1924 1 Skill 1 Commerce Skrill 2020-02-19 5.0 MEDIUM 7.5 HIGH
Commerce Skrill (Formerly Moneybookers) has an Access bypass vulnerability in all versions prior to 7.x-1.2
CVE-2020-0729 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2020-02-14 6.8 MEDIUM 8.8 HIGH
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.
CVE-2013-1202 1 Cisco 1 Ace Application Control Engine Module A2 2020-02-11 5.0 MEDIUM 7.5 HIGH
Cisco ACE A2(3.6) allows log retention DoS.
CVE-2013-2009 1 Automattic 1 Wp Super Cache 2020-02-10 6.8 MEDIUM 8.8 HIGH
WordPress WP Super Cache Plugin 1.2 has Remote PHP Code Execution
CVE-2013-3629 1 Ispconfig 1 Ispconfig 2020-02-10 6.5 MEDIUM 8.8 HIGH
ISPConfig 3.0.5.2 has Arbitrary PHP Code Execution
CVE-2019-10567 1 Qualcomm 96 Apq8009, Apq8009 Firmware, Apq8017 and 93 more 2020-02-10 7.2 HIGH 7.8 HIGH
There is a way to deceive the GPU kernel driver into thinking there is room in the GPU ringbuffer and overwriting existing commands could allow unintended GPU opcodes to be executed in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9150, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SC8180X, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130
CVE-2019-13521 1 Rockwellautomation 1 Arena Simulation 2020-02-03 6.8 MEDIUM 7.8 HIGH
A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simulation Software version 16.00.00 and earlier may result in the limited exposure of information related to the targeted workstation. Rockwell Automation has released version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities.