Search Results (323565 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-15951 1 Immuta 1 Immuta 2024-11-21 6.1 Medium
Immuta v2.8.2 accepts user-supplied project names without properly sanitizing the input, allowing attackers to inject arbitrary HTML content that is rendered as part of the application. An attacker could leverage this to redirect application users to a phishing website in an attempt to steal credentials.
CVE-2020-15950 1 Immuta 1 Immuta 2024-11-21 8.8 High
Immuta v2.8.2 is affected by improper session management: user sessions are not revoked upon logout.
CVE-2020-15949 1 Immuta 1 Immuta 2024-11-21 7.5 High
Immuta v2.8.2 is affected by one instance of insecure permissions that can lead to user account takeover.
CVE-2020-15948 1 Egain 1 Chat 2024-11-21 6.1 Medium
eGain Chat 15.5.5 allows XSS via the Name (aka full_name) field.
CVE-2020-15947 1 Loway 1 Queuemetrics 2024-11-21 8.8 High
A SQL injection vulnerability in the qm_adm/qm_export_stats_run.do endpoint of Loway QueueMetrics before 19.10.21 allows remote authenticated users to execute arbitrary SQL commands via the exportId parameter.
CVE-2020-15944 1 Gantt-chart Project 1 Gantt-chart 2024-11-21 5.4 Medium
An issue was discovered in the Gantt-Chart module before 5.5.5 for Jira. Due to missing validation of user input, it is vulnerable to a persistent XSS attack. An attacker can embed the attack vectors in the dashboard of other users. To exploit this vulnerability, an attacker has to be authenticated.
CVE-2020-15943 1 Gantt-chart Project 1 Gantt-chart 2024-11-21 8.1 High
An issue was discovered in the Gantt-Chart module before 5.5.4 for Jira. Due to a missing privilege check, it is possible to read and write to the module configuration of other users. This can also be used to deliver an XSS payload to other users' dashboards. To exploit this vulnerability, an attacker has to be authenticated.
CVE-2020-15942 1 Fortinet 1 Fortiweb 2024-11-21 4.3 Medium
An information disclosure vulnerability in Web Vulnerability Scan profile of Fortinet's FortiWeb version 6.2.x below 6.2.4 and version 6.3.x below 6.3.5 may allow a remote authenticated attacker to read the password used by the FortiWeb scanner to access the device defined in the scan profile.
CVE-2020-15941 1 Fortinet 1 Forticlient Endpoint Management Server 2024-11-21 5.4 Medium
A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages.
CVE-2020-15940 1 Fortinet 1 Forticlient Enterprise Management Server 2024-11-21 4.1 Medium
An improper neutralization of input vulnerability [CWE-79] in FortiClientEMS versions 6.4.1 and below and 6.2.9 and below may allow a remote authenticated attacker to inject malicious script/tags via the name parameter of various sections of the server.
CVE-2020-15939 1 Fortinet 1 Fortisandbox 2024-11-21 4.3 Medium
An improper access control vulnerability (CWE-284) in FortiSandbox versions 3.2.1 and below and 3.1.4 and below may allow an authenticated, unprivileged attacker to download the device configuration file via the recovery URL.
CVE-2020-15938 1 Fortinet 1 Fortios 2024-11-21 4 Medium
When traffic other than HTTP/S (eg: SSH traffic, etc...) traverses the FortiGate in version below 6.2.5 and below 6.4.2 on port 80/443, it is not redirected to the transparent proxy policy for processing, as it doesn't have a valid HTTP header.
CVE-2020-15937 1 Fortinet 1 Fortios 2024-11-21 4.7 Medium
An improper neutralization of input vulnerability in FortiGate version 6.2.x below 6.2.5 and 6.4.x below 6.4.1 may allow a remote attacker to perform a stored cross site scripting attack (XSS) via the IPS and WAF logs dashboard.
CVE-2020-15936 1 Fortinet 1 Fortios 2024-11-21 2.6 Low
A improper input validation in Fortinet FortiGate version 6.4.3 and below, version 6.2.5 and below, version 6.0.11 and below, version 5.6.13 and below allows attacker to disclose sensitive information via SNI Client Hello TLS packets.
CVE-2020-15935 1 Fortinet 1 Fortiadc 2024-11-21 4.3 Medium
A cleartext storage of sensitive information in GUI in FortiADC versions 5.4.3 and below, 6.0.0 and below may allow a remote authenticated attacker to retrieve some sensitive information such as users LDAP passwords and RADIUS shared secret by deobfuscating the passwords entry fields.
CVE-2020-15933 1 Fortinet 1 Fortimail 2024-11-21 5.3 Medium
A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.
CVE-2020-15932 1 Overwolf 1 Overwolf 2024-11-21 8.8 High
Overwolf before 0.149.2.30 mishandles Symbolic Links during updates, causing elevation of privileges.
CVE-2020-15931 1 Netwrix 1 Account Lockout Examiner 2024-11-21 7.5 High
Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a Domain Controller.
CVE-2020-15930 1 Joplin Project 1 Joplin 2024-11-21 6.1 Medium
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
CVE-2020-15929 1 Ortussolutions 1 Testbox 2024-11-21 9.8 Critical
In Ortus TestBox 2.4.0 through 4.1.0, unvalidated query string parameters passed to system/runners/HTMLRunner.cfm allow an attacker to write an arbitrary CFM file (within the application's context) containing attacker-defined CFML tags, leading to Remote Code Execution.