Search Results (43488 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-7868 2 Helpu, Microsoft 2 Helpu, Windows 2024-11-21 9.6 Critical
A remote code execution vulnerability exists in helpUS(remote administration tool) due to improper validation of parameter of ShellExecutionExA function used for login.
CVE-2020-7862 1 Helpu 4 Helpuftclient, Helpuftserver, Helpuserver and 1 more 2024-11-21 7 High
A vulnerability in agent program of HelpU remote control solution could allow an authenticated remote attacker to execute arbitrary commands This vulnerability is due to insufficient input santization when communicating customer process.
CVE-2020-7860 2 Linux, Unegg Project 2 Linux Kernel, Unegg 2024-11-21 7.8 High
UnEGG v0.5 and eariler versions have a Integer overflow vulnerability, triggered when the user opens a malformed specific file that is mishandled by UnEGG. Attackers could exploit this and arbitrary code execution. This issue affects: Estsoft UnEGG 0.5 versions prior to 1.0 on linux.
CVE-2020-7853 2 Microsoft, Tobesoft 2 Windows, Xplatform 2024-11-21 5.5 Medium
An outbound read/write vulnerability exists in XPLATFORM that does not check offset input ranges, allowing out-of-range data to be read. An attacker can exploit arbitrary code execution.
CVE-2020-7852 2 Hmtalk, Microsoft 2 Daviewindy, Windows 2024-11-21 7.8 High
DaviewIndy has a Heap-based overflow vulnerability, triggered when the user opens a malformed ex.j2c format file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
CVE-2020-7845 1 Jiransecurity 1 Spamsniper 2024-11-21 8.1 High
Spamsniper 5.0 ~ 5.2.7 contain a stack-based buffer overflow vulnerability caused by improper boundary checks when parsing MAIL FROM command. It leads remote attacker to execute arbitrary code via crafted packet.
CVE-2020-7837 1 Polarisoffice 1 Polaris Ml Report 2024-11-21 7.5 High
An issue was discovered in ML Report Program. There is a stack-based buffer overflow in function sub_41EAF0 at MLReportDeamon.exe. The function will call vsprintf without checking the length of strings in parameters given by attacker. And it finally leads to a stack-based buffer overflow via access to crafted web page. This issue affects: Infraware ML Report 2.19.312.0000.
CVE-2020-7836 1 Voiceye Wsactivebridgees Project 1 Voiceye Wsactivebridges 2024-11-21 7.8 High
VOICEYE WSActiveBridgeES versions prior to 2.1.0.3 contains a stack-based buffer overflow vulnerability caused by improper bound checking parameter given by attack. It finally leads to a stack-based buffer overflow via access to crafted web page.
CVE-2020-7829 2 Hmtalk, Microsoft 2 Daviewindy, Windows 2024-11-21 7.8 High
DaviewIndy 8.98.4 and earlier version contain Heap-based overflow vulnerability, triggered when the user opens a malformed specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
CVE-2020-7828 2 Hmtalk, Microsoft 2 Daviewindy, Windows 2024-11-21 7.8 High
DaviewIndy 8.98.4 and earlier version contain Heap-based overflow vulnerability, triggered when the user opens a malformed specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
CVE-2020-7816 2 Hmtalk, Microsoft 4 Daoffice, Dava\+, Daview Indy and 1 more 2024-11-21 7 High
A vulnerability in the JPEG image parsing module in DaView Indy, DaVa+, DaOffice softwares could allow an unauthenticated, remote attacker to cause an arbitrary code execution on an affected device.nThe vulnerability is due to a stack overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device.
CVE-2020-7792 1 Moutjs 1 Mout 2024-11-21 7.5 High
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.
CVE-2020-7788 3 Debian, Ini Project, Redhat 5 Debian Linux, Ini, Enterprise Linux and 2 more 2024-11-21 7.3 High
This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
CVE-2020-7774 4 Oracle, Redhat, Siemens and 1 more 7 Graalvm, Enterprise Linux, Openshift and 4 more 2024-11-21 7.3 High
The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.
CVE-2020-7771 1 Asciitable.js Project 1 Asciitable.js 2024-11-21 7.5 High
The package asciitable.js before 1.0.3 are vulnerable to Prototype Pollution via the main function.
CVE-2020-7770 1 Json8 Project 1 Json8 2024-11-21 6.5 Medium
This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution.
CVE-2020-7768 1 Grpc 1 Grpc 2024-11-21 7.5 High
The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition.
CVE-2020-7766 1 Json-ptr Project 1 Json-ptr 2024-11-21 7.3 High
This affects all versions of package json-ptr. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution.
CVE-2020-7753 1 Trim Project 1 Trim 2024-11-21 7.5 High
All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
CVE-2020-7751 1 Chaijis 1 Pathval 2024-11-21 6 Medium
pathval before version 1.1.1 is vulnerable to prototype pollution.