Search Results (324464 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-28574 1 Trendmicro 1 Worry-free Business Security 2024-11-21 7.5 High
A unauthenticated path traversal arbitrary remote file deletion vulnerability in Trend Micro Worry-Free Business Security 10 SP1 could allow an unauthenticated attacker to exploit the vulnerability and modify or delete arbitrary files on the product's management console.
CVE-2020-28573 1 Trendmicro 2 Apex One, Officescan 2024-11-21 5.3 Medium
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal the total agents managed by the server.
CVE-2020-28572 2 Microsoft, Trendmicro 2 Windows, Apex One 2024-11-21 7.8 High
A vulnerability in Trend Micro Apex One could allow an unprivileged user to abuse the product installer to reinstall the agent with additional malicious code in the context of a higher privilege.
CVE-2020-28503 1 Gulpjs 1 Copy-props 2024-11-21 7.3 High
The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
CVE-2020-28502 1 Xmlhttprequest Project 1 Xmlhttprequest 2024-11-21 8.1 High
This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run.
CVE-2020-28501 1 Crawlerdetect Project 1 Crawlerdetect 2024-11-21 5.3 Medium
This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators.
CVE-2020-28500 4 Lodash, Oracle, Redhat and 1 more 25 Lodash, Banking Corporate Lending Process Management, Banking Credit Facilities Process Management and 22 more 2024-11-21 5.3 Medium
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
CVE-2020-28499 1 Merge Project 1 Merge 2024-11-21 7.3 High
All versions of package merge are vulnerable to Prototype Pollution via _recursiveMerge .
CVE-2020-28498 1 Indutny 1 Elliptic 2024-11-21 6.8 Medium
The package elliptic before 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
CVE-2020-28496 1 Three Project 1 Three 2024-11-21 7.5 High
This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost+" ms")
CVE-2020-28495 1 Totaljs 1 Total.js 2024-11-21 7.3 High
This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.
CVE-2020-28494 1 Totaljs 1 Total.js 2024-11-21 8.6 High
This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.
CVE-2020-28493 3 Fedoraproject, Palletsprojects, Redhat 4 Fedora, Jinja, Enterprise Linux and 1 more 2024-11-21 5.3 Medium
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
CVE-2020-28491 4 Fasterxml, Oracle, Quarkus and 1 more 11 Jackson-dataformats-binary, Weblogic Server, Quarkus and 8 more 2024-11-21 7.5 High
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
CVE-2020-28490 1 Async-git Project 1 Async-git 2024-11-21 9.1 Critical
The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb')
CVE-2020-28487 1 Visjs 1 Vis-timeline 2024-11-21 6.8 Medium
This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
CVE-2020-28483 1 Gin-gonic 1 Gin 2024-11-21 7.1 High
This affects all versions of package github.com/gin-gonic/gin. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
CVE-2020-28482 1 Fastify 1 Fastify-csrf 2024-11-21 5.9 Medium
This affects the package fastify-csrf before 3.0.0. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true } 2. The CSRF token was available in the GET query parameter
CVE-2020-28481 1 Socket 1 Socket.io 2024-11-21 5.3 Medium
The package socket.io before 2.4.0 are vulnerable to Insecure Defaults due to CORS Misconfiguration. All domains are whitelisted by default.
CVE-2020-28480 1 Jointjs 1 Jointjs 2024-11-21 7.3 High
The package jointjs before 3.3.0 are vulnerable to Prototype Pollution via util.setByPath (https://resources.jointjs.com/docs/jointjs/v3.2/joint.htmlutil.setByPath). The path used the access the object's key and set the value is not properly sanitized, leading to a Prototype Pollution.