Search Results (347147 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-7905 1 Jetbrains 1 Intellij Idea 2024-11-21 7.5 High
Ports listened to by JetBrains IntelliJ IDEA before 2019.3 were exposed to the network.
CVE-2020-7904 1 Jetbrains 1 Intellij Idea 2024-11-21 7.4 High
In JetBrains IntelliJ IDEA before 2019.3, some Maven repositories were accessed via HTTP instead of HTTPS.
CVE-2020-7883 2 Microsoft, Wowsoft 2 Windows, Printchaser 2024-11-21 9.8 Critical
Printchaser v2.2021.804.1 and earlier versions contain a vulnerability, which could allow remote attacker to download and execute remote file by setting the argument, variable in the activeX module. This can be leveraged for code execution.
CVE-2020-7882 2 Hancom, Microsoft 2 Anysign4pc, Windows 2024-11-21 7.5 High
Using the parameter of getPFXFolderList function, attackers can see the information of authorization certification and delete the files. It occurs because the parameter contains path traversal characters(ie. '../../../')
CVE-2020-7881 2 Afreecatv, Microsoft 2 Afreecatv, Windows 2024-11-21 7.5 High
The vulnerability function is enabled when the streamer service related to the AfreecaTV communicated through web socket using 21201 port. A stack-based buffer overflow leading to remote code execution was discovered in strcpy() operate by "FanTicket" field. It is because of stored data without validation of length.
CVE-2020-7880 2 Douzone, Microsoft 2 Neors, Windows 2024-11-21 7.5 High
The vulnerabilty was discovered in ActiveX module related to NeoRS remote support program. This issue allows an remote attacker to download and execute remote file. It is because of improper parameter validation of StartNeoRS function in ActiveX.
CVE-2020-7879 1 Iptime 2 C200, C200 Firmware 2024-11-21 8.8 High
This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.
CVE-2020-7878 2 4nb, Microsoft 2 Videooffice, Windows 2024-11-21 9.8 Critical
An arbitrary file download and execution vulnerability was found in the VideoOffice X2.9 and earlier versions (CVE-2020-7878). This issue is due to missing support for integrity check.
CVE-2020-7877 2 Mastersoft, Microsoft 3 Zook Agent, Zook Viewer, Windows 2024-11-21 8 High
A buffer overflow issue was discovered in ZOOK solution(remote administration tool) through processing 'ConnectMe' command while parsing a crafted OUTERIP value because of missing boundary check. This vulnerability allows the attacker to execute remote arbitrary command.
CVE-2020-7875 2 Dext5, Microsoft 2 Dext5upload, Windows 2024-11-21 7.5 High
DEXT5 Upload 5.0.0.117 and earlier versions contain a vulnerability, which could allow remote attacker to download and execute remote file by setting the argument, variable in the activeX module. This can be leveraged for code execution.
CVE-2020-7874 2 Microsoft, Tobesoft 2 Windows, Nexacro 2024-11-21 8.8 High
Download of code without integrity check vulnerability in NEXACRO14 Runtime ActiveX control of tobesoft Co., Ltd allows the attacker to cause an arbitrary file download and execution. This vulnerability is due to incomplete validation of file download URL or file extension.
CVE-2020-7873 1 Ksystem 1 K-system Wellcomm 2024-11-21 8.8 High
Download of code without integrity check vulnerability in ActiveX control of Younglimwon Co., Ltd allows the attacker to cause a arbitrary file download and execution.
CVE-2020-7872 1 Hmtalk 1 Daviewindy 2024-11-21 7.8 High
DaviewIndy v8.98.7.0 and earlier versions have a Integer overflow vulnerability, triggered when the user opens a malformed format file that is mishandled by DaviewIndy. Attackers could exploit this and arbitrary code execution.
CVE-2020-7871 1 Cnesty 1 Helpcom 2024-11-21 7.5 High
A vulnerability of Helpcom could allow an unauthenticated attacker to execute arbitrary command. This vulnerability exists due to insufficient validation of the parameter. This issue affects: Cnesty Helpcom 10.0 versions prior to.
CVE-2020-7870 1 Unidocs 2 Ezpdf Editor, Ezpdf Reader 2024-11-21 6.4 Medium
A memory corruption vulnerability exists when ezPDF improperly handles the parameter. This vulnerability exists due to insufficient validation of the parameter.
CVE-2020-7869 2 Mastersoft, Microsoft 2 Zook, Windows 2024-11-21 9 Critical
An improper input validation vulnerability of ZOOK software (remote administration tool) could allow a remote attacker to create arbitrary file. The ZOOK viewer has the "Tight file CMD" function to create file. An attacker could create and execute arbitrary file in the ZOOK agent program using "Tight file CMD" without authority.
CVE-2020-7868 2 Helpu, Microsoft 2 Helpu, Windows 2024-11-21 9.6 Critical
A remote code execution vulnerability exists in helpUS(remote administration tool) due to improper validation of parameter of ShellExecutionExA function used for login.
CVE-2020-7867 1 Helpu 1 Helpuviewer 2024-11-21 8 High
An improper input validation vulnerability in Helpu solution could allow a local attacker to arbitrary file creation and execution without click file transfer menu. It is possible to file in arbitrary directory for user because the viewer program receive the file from agent with privilege of administrator.
CVE-2020-7866 1 Tobesoft 1 Xplatform 2024-11-21 8.8 High
When using XPLATFORM 9.2.2.270 or earlier versions ActiveX component, arbitrary commands can be executed due to improper input validation
CVE-2020-7865 1 Inoguard 1 Execm Coreb2b 2024-11-21 8.8 High
A vulnerability(improper input validation) in the ExECM CoreB2B solution allows an unauthenticated attacker to download and execute an arbitrary file via httpDownload function. A successful exploit could allow the attacker to hijack vulnerable system.