Vulnerabilities (CVE)

CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-36245 1 Gramaddict 1 Gramaddict 2021-07-21 5.8 MEDIUM 8.8 HIGH
GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use of UIAutomator2 and ATX-Agent. The attacker must be able to reach TCP port 7912, e.g., by being on the same Wi-Fi network.
CVE-2020-24482 1 Intel 2 Xmm 7360, Xmm 7360 Firmware 2021-07-21 5.0 MEDIUM 7.5 HIGH
Improper buffer restrictions in firmware for Intel(R) 7360 Cell Modem before UDE version 9.4.370 may allow unauthenticated user to potentially enable denial of service via network access.
CVE-2020-11635 1 Zscaler 1 Client Connector 2021-07-21 7.2 HIGH 7.8 HIGH
The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges.
CVE-2020-35734 1 Batflat 1 Batflat 2021-07-21 6.5 MEDIUM 7.2 HIGH
** UNSUPPORTED WHEN ASSIGNED ** Sruu.pl in Batflat 1.3.6 allows an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Users tab. To exploit this, one must login to the administration panel and edit an arbitrary user's data (username, displayed name, etc.). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2020-24899 1 Nagios 1 Nagios Xi 2021-07-21 6.5 MEDIUM 8.8 HIGH
Nagios XI 5.7.2 is affected by a remote code execution (RCE) vulnerability. An authenticated user can inject additional commands into normal webapp query.
CVE-2020-22427 1 Nagios 1 Nagios Xi 2021-07-21 6.5 MEDIUM 7.2 HIGH
** DISPUTED ** NagiosXI 5.6.11 is affected by a remote code execution (RCE) vulnerability. An authenticated nagiosadmin user can inject additional commands into a request. NOTE: the vendor disputes whether the CVE and its references are actionable because all technical details are omitted, and the only option is to pay for a subscription service where technical details may be disclosed at an unspecified later time.
CVE-2020-25493 1 Oclean 1 Oclean 2021-07-21 5.0 MEDIUM 7.5 HIGH
Oclean Mobile Application 2.1.2 communicates with an external website using HTTP so it is possible to eavesdrop the network traffic. The content of HTTP payload is encrypted using XOR with a hardcoded key, which allows for the possibility to decode the traffic.
CVE-2020-35942 1 Imagely 1 Nextgen Gallery 2021-07-21 6.8 MEDIUM 8.8 HIGH
A Cross-Site Request Forgery (CSRF) issue in the NextGEN Gallery plugin before 3.5.0 for WordPress allows File Upload and Local File Inclusion via settings modification, leading to Remote Code Execution and XSS. (It is possible to bypass CSRF protection by simply not including a nonce parameter.)
CVE-2020-4795 1 Ibm 1 Security Identity Governance And Intelligence 2021-07-21 6.4 MEDIUM 8.2 HIGH
IBM Security Identity Governance and Intelligence 5.2.6 could disclose sensitive information to an unauthorized user using a specially crafted HTTP request. IBM X-Force ID: 189446.
CVE-2020-16044 1 Google 1 Chrome 2021-07-21 6.8 MEDIUM 8.8 HIGH
Use after free in WebRTC in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap corruption via a crafted SCTP packet.
CVE-2020-12122 1 Maxpcsecure 1 Max Spyware Detector 2021-07-21 4.6 MEDIUM 7.8 HIGH
In Max Secure Max Spyware Detector 1.0.0.044, the driver file (MaxProc64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x2200019. (This also extends to the various other products from Max Secure that include MaxProc64.sys.)
CVE-2020-10554 1 Psyprax 1 Psyprax 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Psyprax beforee 3.2.2. Passwords used to encrypt the data are stored in the database in an obfuscated format, which can be easily reverted. For example, the password AAAAAAAA is stored in the database as MMMMMMMM.
CVE-2020-10552 1 Psyprax 1 Psyprax 2021-07-21 5.5 MEDIUM 8.1 HIGH
An issue was discovered in Psyprax before 3.2.2. The Firebird database is accessible with the default user sysdba and password masterke after installation. This allows any user to access it and read and modify the contents, including passwords. Local database files can be accessed directly as well.
CVE-2020-14246 1 Hcltechsw 1 Onetest Performance 2021-07-21 5.0 MEDIUM 7.5 HIGH
HCL OneTest Performance V9.5, V10.0, V10.1 uses basic authentication which is relatively weak. An attacker could potentially decode the encoded credentials.
CVE-2020-29166 1 Rainbowfishsoftware 1 Pacsone Server 2021-07-21 5.0 MEDIUM 7.5 HIGH
PacsOne Server (PACS Server In One Box) below 7.1.1 is affected by file read/manipulation, which can result in remote information disclosure.
CVE-2020-14255 1 Hcltech 1 Digital Experience 2021-07-21 5.0 MEDIUM 7.5 HIGH
HCL Digital Experience 9.5 containers include vulnerabilities that could expose sensitive data to unauthorized parties via crafted requests. These affect containers only. These do not affect traditional on-premise installations.
CVE-2019-25018 1 Mit 1 Krb5-appl 2021-07-21 5.0 MEDIUM 7.5 HIGH
In the rcp client in MIT krb5-appl through 1.0.3, malicious servers could bypass intended access restrictions via the filename of . or an empty filename, similar to CVE-2018-20685 and CVE-2019-7282. The impact is modifying the permissions of the target directory on the client side. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.
CVE-2020-28494 1 Totaljs 1 Total.js 2021-07-21 7.5 HIGH 8.6 HIGH
This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.
CVE-2019-20470 1 Tk-star 2 Q90 Junior Gps Horloge, Q90 Junior Gps Horloge Firmware 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered on TK-Star Q90 Junior GPS horloge 3.1042.9.8656 devices. It performs actions based on certain SMS commands. This can be used to set up a voice communication channel from the watch to any telephone number, initiated by sending a specific SMS and using the default password, e.g., pw,<password>,call,<mobile_number> triggers an outbound call from the watch. The password is sometimes available because of CVE-2019-20471.
CVE-2020-28426 1 Kill-process-on-port Project 1 Kill-process-on-port 2021-07-21 7.5 HIGH 7.3 HIGH
All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId.
CVE-2020-15834 1 Mofinetwork 2 Mofi4500-4gxelte, Mofi4500-4gxelte Firmware 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.1.5-std devices. The wireless network password is exposed in a QR encoded picture that an unauthenticated adversary can download via the web-management interface.
CVE-2020-13856 1 Mofinetwork 2 Mofi4500-4gxelte, Mofi4500-4gxelte Firmware 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered on Mofi Network MOFI4500-4GXeLTE 4.0.8-std devices. Authentication is not required to download the support file that contains sensitive information such as cleartext credentials and password hashes.
CVE-2020-35145 1 Acronis 1 True Image 2021-07-21 4.4 MEDIUM 7.8 HIGH
Acronis True Image for Windows prior to 2021 Update 3 allowed local privilege escalation due to a DLL hijacking vulnerability in multiple components, aka an Untrusted Search Path issue.
CVE-2020-29005 1 Mediawiki 1 Mediawiki 2021-07-21 5.0 MEDIUM 7.5 HIGH
The API in the Push extension for MediaWiki through 1.35 used cleartext for ApiPush credentials, allowing for potential information disclosure.
CVE-2020-25608 1 Mitel 1 Micollab 2021-07-21 6.5 MEDIUM 7.2 HIGH
The SAS portal of Mitel MiCollab before 9.2 could allow an attacker to access user credentials due to improper input validation, aka SQL Injection.
CVE-2020-28921 1 Pcanalyser 1 Pc Analyser 2021-07-21 7.2 HIGH 8.8 HIGH
An issue was discovered in Devid Espenschied PC Analyser through 4.10. The PCADRVX64.SYS kernel driver exposes IOCTL functionality that allows low-privilege users to read and write to arbitrary Model Specific Registers (MSRs). This could lead to arbitrary Ring-0 code execution and escalation of privileges.
CVE-2019-19878 1 Br-automation 1 Industrial Automation Aprol 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get access to historical data from AprolSqlServer by bypassing authentication, a different vulnerability than CVE-2019-16358.
CVE-2019-19873 1 Br-automation 1 Industrial Automation Aprol 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in B&R Industrial Automation APROL before R4.2 V7.08. An attacker can get information from the AprolSqlServer DBMS by bypassing authentication, a different vulnerability than CVE-2019-16356 and CVE-2019-9983.
CVE-2020-29043 1 Bigbluebutton 1 Bigbluebutton 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in BigBlueButton through 2.2.29. When at attacker is able to view an account_activations/edit?token= URI, the attacker can create an approved user account associated with an email address that has an arbitrary domain name.
CVE-2020-7779 1 Djvalidator Project 1 Djvalidator 2021-07-21 5.0 MEDIUM 7.5 HIGH
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, --@------------------------------------------------------------------------------------------------------------------------!.
CVE-2020-29074 3 Debian, Fedoraproject, X11vnc Project 3 Debian Linux, Fedora, X11vnc 2021-07-21 6.5 MEDIUM 8.8 HIGH
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.
CVE-2020-14190 1 Atlassian 2 Crucible, Fisheye 2021-07-21 5.0 MEDIUM 7.5 HIGH
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to achieve Regex Denial of Service via user-supplied regex in EyeQL. The affected versions are before version 4.8.4.
CVE-2020-14191 1 Atlassian 2 Crucible, Fisheye 2021-07-21 5.0 MEDIUM 7.5 HIGH
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the MessageBundleResource within Atlassian Gadgets. The affected versions are before version 4.8.4.
CVE-2020-29063 1 Cdatatec 56 72408a, 72408a Firmware, 9008a and 53 more 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. A custom encryption algorithm is used to store encrypted passwords. This algorithm will XOR the password with the hardcoded *j7a(L#yZ98sSd5HfSgGjMj8;Ss;d)(*&^#@$a2s0i3g value.
CVE-2020-4002 1 Vmware 1 Sd-wan Orchestrator 2021-07-21 6.5 MEDIUM 7.2 HIGH
The SD-WAN Orchestrator 3.3.2 prior to 3.3.2 P3, 3.4.x prior to 3.4.4, and 4.0.x prior to 4.0.1 handles system parameters in an insecure way. An authenticated SD-WAN Orchestrator user with high privileges may be able to execute arbitrary code on the underlying operating system.
CVE-2020-3985 1 Vmware 1 Sd-wan Orchestrator 2021-07-21 6.5 MEDIUM 8.8 HIGH
The SD-WAN Orchestrator 3.3.2 prior to 3.3.2 P3 and 3.4.x prior to 3.4.4 allows an access to set arbitrary authorization levels leading to a privilege escalation issue. An authenticated SD-WAN Orchestrator user may exploit an application weakness and call a vulnerable API to elevate their privileges.
CVE-2020-5674 2 Epson, Microsoft 37 Album Print, Color Calibration Utility, Colorbase and 34 more 2021-07-21 4.4 MEDIUM 7.8 HIGH
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-26890 2 Fedoraproject, Matrix 2 Fedora, Synapse 2021-07-21 5.0 MEDIUM 7.5 HIGH
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the room's state, the impact is long-lasting and is not fixed by an upgrade to a newer version, requiring the event to be manually redacted instead. Since events are replicated to servers of other room members, the impact is not constrained to the server of the event sender.
CVE-2020-28421 2 Broadcom, Microsoft 2 Unified Infrastructure Management, Windows 2021-07-21 4.6 MEDIUM 7.8 HIGH
CA Unified Infrastructure Management 20.1 and earlier contains a vulnerability in the robot (controller) component that allows local attackers to elevate privileges.
CVE-2020-27985 1 Securityonionsolutions 1 Security Onion 2021-07-21 7.2 HIGH 7.8 HIGH
Security Onion v2 prior to 2.3.10 has an incorrect sudo configuration, which allows the administrative user to obtain root access without using the sudo password by editing and executing /home/<user>/SecurityOnion/setup/so-setup.
CVE-2020-4005 1 Vmware 2 Cloud Foundation, Esxi 2021-07-21 7.2 HIGH 7.8 HIGH
VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG) contains a privilege-escalation vulnerability that exists in the way certain system calls are being managed. A malicious actor with privileges within the VMX process only, may escalate their privileges on the affected system. Successful exploitation of this issue is only possible when chained with another vulnerability (e.g. CVE-2020-4004)
CVE-2020-28054 1 Tsmmanager 1 Tsmmanager 2021-07-21 5.0 MEDIUM 7.5 HIGH
JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authorization Bypass because the Collector component is not properly validating an authenticated session with the Viewer. If the Viewer has been modified (binary patched) and the Bypass Login functionality is being used, an attacker can request every Collector's functionality as if they were a properly logged-in user: administrating connected instances, reviewing logs, editing configurations, accessing the instances' consoles, accessing hardware configurations, etc.Exploiting this vulnerability won't grant an attacker access nor control on remote ISP servers as no credentials is sent with the request.
CVE-2020-13359 1 Gitlab 1 Gitlab 2021-07-21 5.5 MEDIUM 7.6 HIGH
The Terraform API in GitLab CE/EE 12.10+ exposed the object storage signed URL on the delete operation allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls. Affected versions are >=12.10, <13.3.9,>=13.4, <13.4.5,>=13.5, <13.5.2.
CVE-2020-28572 2 Microsoft, Trendmicro 2 Windows, Apex One 2021-07-21 4.6 MEDIUM 7.8 HIGH
A vulnerability in Trend Micro Apex One could allow an unprivileged user to abuse the product installer to reinstall the agent with additional malicious code in the context of a higher privilege.
CVE-2020-28405 1 Iris 1 Star Practice Management 2021-07-21 6.5 MEDIUM 8.8 HIGH
An improper authorization vulnerability exists in Star Practice Management Web version 2019.2.0.6, allowing an unauthorized user to change the privileges of any user of the application. This can be used to grant himself the administrative role or remove all administrative accounts of the application.
CVE-2020-28402 1 Iris 1 Star Practice Management 2021-07-21 6.5 MEDIUM 8.8 HIGH
An improper authorization vulnerability exists in Star Practice Management Web version 2019.2.0.6, allowing an unauthorized user to access Launcher Configuration Panel.
CVE-2020-35754 1 Opensolution 2 Quick.cart, Quick.cms 2021-07-21 6.5 MEDIUM 7.2 HIGH
OpenSolution Quick.CMS < 6.7 and Quick.Cart < 6.7 allow an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Language tab.
CVE-2020-23356 1 Nibbleblog 1 Nibbleblog 2021-07-21 5.0 MEDIUM 7.5 HIGH
dmin/kernel/api/login.class.phpin in nibbleblog v3.7.1c allows type juggling for login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters.
CVE-2020-23355 1 Codiad 1 Codiad 2021-07-21 4.3 MEDIUM 7.5 HIGH
** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Codiad 2.8.4 /componetns/user/class.user.php:Authenticate() is vulnerable in magic hash authentication bypass. If encrypted or hash value for the passwords form certain formats of magic hash, e.g, 0e123, another hash value 0e234 something can successfully authenticate.
CVE-2020-36215 1 Hashconsing Project 1 Hashconsing 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in the hashconsing crate before 1.1.0 for Rust. Because HConsed does not have bounds on its Send trait or Sync trait, memory corruption can occur.