Search Results (341651 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-7250 1 Mcafee 1 Endpoint Security 2024-11-21 8.2 High
Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.
CVE-2020-7249 1 Smc 2 D3g0804, D3g0804 Firmware 2024-11-21 4.8 Medium
SMC D3G0804W 3.5.2.5-LAT_GA devices allow XSS via the SSID field on the WiFi Network Configuration page (after a successful login to the admin account).
CVE-2020-7248 1 Openwrt 1 Openwrt 2024-11-21 7.5 High
libubox in OpenWrt before 18.06.7 and 19.x before 19.07.1 has a tagged binary data JSON serialization vulnerability that may cause a stack based buffer overflow.
CVE-2020-7246 1 Qdpm 1 Qdpm 2024-11-21 8.8 High
A remote code execution (RCE) vulnerability exists in qdPM 9.1 and earlier. An attacker can upload a malicious PHP code file via the profile photo functionality, by leveraging a path traversal vulnerability in the users['photop_preview'] delete photo feature, allowing bypass of .htaccess protection. NOTE: this issue exists because of an incomplete fix for CVE-2015-3884.
CVE-2020-7245 1 Ctfd 1 Ctfd 2024-11-21 9.8 Critical
Incorrect username validation in the registration process of CTFd v2.0.0 - v2.2.2 allows an attacker to take over an arbitrary account if the username is known and emails are enabled on the CTFd instance. To exploit the vulnerability, one must register with a username identical to the victim's username, but with white space inserted before and/or after the username. This will register the account with the same username as the victim. After initiating a password reset for the new account, CTFd will reset the victim's account password due to the username collision.
CVE-2020-7241 1 Wpseeds 1 Wp Database Backup 2024-11-21 7.5 High
The WP Database Backup plugin through 5.5 for WordPress stores downloads by default locally in the directory wp-content/uploads/db-backup/. This might allow attackers to read ZIP archives by guessing random ID numbers, guessing date strings with a 2020_{0..1}{0..2}_{0..3}{0..9} format, guessing UNIX timestamps, and making HTTPS requests with the complete guessed URL.
CVE-2020-7240 2 Meinberg, Meinbergglobal 6 Ims-lantime M1000, Lantime M300, Lantime M1000 and 3 more 2024-11-21 8.8 High
Meinberg Lantime M300 and M1000 devices allow attackers (with privileges to configure a device) to execute arbitrary OS commands by editing the /config/netconf.cmd script (aka Extended Network Configuration). Note: According to the description, the vulnerability requires a fully authenticated super-user account using a webUI function that allows super users to edit a script supposed to execute OS commands. The given weakness enumeration (CWE-78) is not applicable in this case as it refers to abusing functions/input fields not supposed to be accepting OS commands by using 'Special Elements.
CVE-2020-7239 1 Ibm 1 Chatbot With Ibm Watson 2024-11-21 6.1 Medium
The conversation-watson plugin before 0.8.21 for WordPress has a DOM-based XSS vulnerability that is executed when a chat message containing JavaScript is sent.
CVE-2020-7238 4 Debian, Fedoraproject, Netty and 1 more 20 Debian Linux, Fedora, Netty and 17 more 2024-11-21 7.5 High
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869.
CVE-2020-7237 1 Cacti 1 Cacti 2024-11-21 8.8 High
Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. OS commands are executed when a new poller cycle begins. The attacker must be authenticated, and must have access to modify the Performance Settings of the product.
CVE-2020-7236 1 Uhp 2 Uhp-100, Uhp-100 Firmware 2024-11-21 6.1 Medium
UHP UHP-100 3.4.1.15, 3.4.2.4, and 3.4.3 devices allow XSS via cw2?td= (Site Name field of the Site Setup section).
CVE-2020-7235 1 Uhp 2 Uhp-100, Uhp-100 Firmware 2024-11-21 6.1 Medium
UHP UHP-100 3.4.1.15, 3.4.2.4, and 3.4.3 devices allow XSS via cB3?ta= (profile title).
CVE-2020-7234 1 Ruckuswireless 2 R310, R310 Firmware 2024-11-21 4.8 Medium
Ruckus ZoneFlex R310 104.0.0.0.1347 devices allow Stored XSS via the SSID field on the Configuration > Radio 2.4G > Wireless X screen (after a successful login to the super account).
CVE-2020-7233 1 Kmccontrols 2 Bac-a1616bc, Bac-a1616bc Firmware 2024-11-21 9.8 Critical
KMS Controls BAC-A1616BC BACnet devices have a cleartext password of snowman in the BACKDOOR_NAME variable in the BC_Logon.swf file.
CVE-2020-7232 1 Evoko 1 Home 2024-11-21 7.5 High
Evoko Home devices 1.31 through 1.37 allow remote attackers to obtain sensitive information (such as usernames and password hashes) via a WebSocket request, as demonstrated by the sockjs/224/uf1psgff/websocket URI at a wss:// URL.
CVE-2020-7231 1 Evoko 1 Home 2024-11-21 5.3 Medium
Evoko Home 1.31 devices provide different error messages for failed login requests depending on whether the username is valid.
CVE-2020-7229 1 Simplejobscript 1 Simplejobscript 2024-11-21 9.8 Critical
An issue was discovered in Simplejobscript.com SJS before 1.65. There is unauthenticated SQL injection via the search engine. The parameter is landing_location. The function is countSearchedJobs(). The file is _lib/class.Job.php.
CVE-2020-7228 1 Codepeople 1 Calculated Fields Form 2024-11-21 5.4 Medium
The Calculated Fields Form plugin through 1.0.353 for WordPress suffers from multiple Stored XSS vulnerabilities present in the input forms. These can be exploited by an authenticated user.
CVE-2020-7227 1 Westermo 2 Mrd-315, Mrd-315 Firmware 2024-11-21 6.5 Medium
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, backup.asp, sys-power.asp, ifaces-wls.asp, ifaces-wls-pkt.asp, and ifaces-wls-pkt-adv.asp.
CVE-2020-7226 3 Oracle, Redhat, Vt 7 Communications Services Gatekeeper, Webcenter Sites, Weblogic Server and 4 more 2024-11-21 7.5 High
CiphertextHeader.java in Cryptacular 1.2.3, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data.