Search Results (327877 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-5785 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 6.1 Medium
Insufficient output sanitization in Teltonika firmware TRB2_R_00.02.04.3 allows an unauthenticated attacker to conduct reflected cross-site scripting via a crafted ‘action’ or ‘pkg_name’ parameter.
CVE-2020-5784 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 6.5 Medium
Server-Side Request Forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a low privileged user to cause the application to perform HTTP GET requests to arbitrary URLs.
CVE-2020-5783 1 Ignitenet 1 Helios Glinq 2024-11-21 5.4 Medium
In IgniteNet HeliOS GLinq v2.2.1 r2961, the login functionality does not contain any CSRF protection mechanisms.
CVE-2020-5782 1 Ignitenet 1 Helios Glinq 2024-11-21 6.5 Medium
In IgniteNet HeliOS GLinq v2.2.1 r2961, if a user logs in and sets the ‘wan_type’ parameter, the wan interface for the device will become unreachable, which results in a denial of service condition for devices dependent on this connection.
CVE-2020-5781 1 Ignitenet 1 Helios Glinq 2024-11-21 4.3 Medium
In IgniteNet HeliOS GLinq v2.2.1 r2961, the langSelection parameter is stored in the luci configuration file (/etc/config/luci) by the authenticator.htmlauth function. When modified with arbitrary javascript, this causes a denial-of-service condition for all other users.
CVE-2020-5780 1 Icegram 1 Email Subscribers \& Newsletters 2024-11-21 5.3 Medium
Missing Authentication for Critical Function in Icegram Email Subscribers & Newsletters Plugin for WordPress prior to version 4.5.6 allows a remote, unauthenticated attacker to conduct unauthenticated email forgery/spoofing.
CVE-2020-5779 1 Tradingtechnologies 1 Trading Technologies Messaging 2024-11-21 7.5 High
A flaw in Trading Technologies Messaging 7.1.28.3 (ttmd.exe) relates to invalid parameter handling when calling strcpy_s() with an invalid parameter (i.e., a long src string parameter) as a part of processing a type 4 message sent to default TCP RequestPort 10200. It's been observed that ttmd.exe terminates as a result.
CVE-2020-5778 1 Tradingtechnologies 1 Trading Technologies Messaging 2024-11-21 7.5 High
A flaw exists in Trading Technologies Messaging 7.1.28.3 (ttmd.exe) due to improper validation of user-supplied data when processing a type 8 message sent to default TCP RequestPort 10200. An unauthenticated, remote attacker can exploit this issue, via a specially crafted message, to terminate ttmd.exe.
CVE-2020-5777 1 Magmi Project 1 Magmi 2024-11-21 9.8 Critical
MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a "Too many connections" error, then use default magmi:magmi basic authentication to remotely bypass authentication.
CVE-2020-5776 1 Magmi Project 1 Magmi 2024-11-21 8.8 High
Currently, all versions of MAGMI are vulnerable to CSRF due to the lack of CSRF tokens. RCE (via phpcli command) is possible in the event that a CSRF is leveraged against an existing admin session for MAGMI.
CVE-2020-5775 1 Instructure 1 Canvas Learning Management Service 2024-11-21 5.8 Medium
Server-Side Request Forgery in Canvas LMS 2020-07-29 allows a remote, unauthenticated attacker to cause the Canvas application to perform HTTP GET requests to arbitrary domains.
CVE-2020-5774 1 Tenable 1 Nessus 2024-11-21 7.1 High
Nessus versions 8.11.0 and earlier were found to maintain sessions longer than the permitted period in certain scenarios. The lack of proper session expiration could allow attackers with local access to login into an existing browser session.
CVE-2020-5773 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 8.8 High
Improper Access Control in Teltonika firmware TRB2_R_00.02.04.01 allows a low privileged user to perform unauthorized write operations.
CVE-2020-5772 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 7.5 High
Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious package file.
CVE-2020-5771 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 7.5 High
Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious backup archive.
CVE-2020-5770 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 8.8 High
Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.01 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.
CVE-2020-5769 1 Teltonika-networks 2 Gateway Trb245, Gateway Trb245 Firmware 2024-11-21 5.4 Medium
Insufficient output sanitization in Teltonika firmware TRB2_R_00.02.02 allows a remote, authenticated attacker to conduct persistent cross-site scripting (XSS) attacks by injecting malicious client-side code into the 'URL/ Host / Connection' form in the 'DATA TO SERVER' configuration section.
CVE-2020-5768 1 Icegram 1 Email Subscribers \& Newsletters 2024-11-21 4.9 Medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Icegram Email Subscribers & Newsletters Plugin for WordPress v4.4.8 allows a remote, authenticated attacker to determine the value of database fields.
CVE-2020-5767 1 Icegram 1 Email Subscribers \& Newsletters 2024-11-21 6.5 Medium
Cross-site request forgery in Icegram Email Subscribers & Newsletters Plugin for WordPress v4.4.8 allows a remote attacker to send forged emails by tricking legitimate users into clicking a crafted link.
CVE-2020-5766 1 Srs Simple Hits Counter Project 1 Srs Simple Hits Counter 2024-11-21 7.5 High
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SRS Simple Hits Counter Plugin for WordPress 1.0.3 and 1.0.4 allows a remote, unauthenticated attacker to determine the value of database fields.