Search Results (9069 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-13845 1 Sylabs 1 Singularity 2024-11-21 7.5 High
Sylabs Singularity 3.0 through 3.5 has Improper Validation of an Integrity Check Value. Image integrity is not validated when an ECL policy is enforced. The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature.
CVE-2020-13786 1 Dlink 2 Dir-865l, Dir-865l Firmware 2024-11-21 8.8 High
D-Link DIR-865L Ax 1.20B01 Beta devices allow CSRF.
CVE-2020-13760 1 Joomla 1 Joomla\! 2024-11-21 8.8 High
In Joomla! before 3.9.19, missing token checks in com_postinstall lead to CSRF.
CVE-2020-13674 1 Drupal 1 Drupal 2024-11-21 6.5 Medium
The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability.
CVE-2020-13673 1 Drupal 1 Entity Embed 2024-11-21 6.1 Medium
The Entity Embed module provides a filter to allow embedding entities in content fields. In certain circumstances, the filter could allow an unprivileged user to inject HTML into a page when it is accessed by a trusted user with permission to embed entities. In some cases, this could lead to cross-site scripting.
CVE-2020-13663 1 Drupal 1 Drupal 2024-11-21 8.8 High
Cross Site Request Forgery vulnerability in Drupal Core Form API does not properly handle certain form input from cross-site requests, which can lead to other vulnerabilities.
CVE-2020-13658 1 Lansweeper 1 Lansweeper 2024-11-21 8.0 High
In Lansweeper 8.0.130.17, the web console is vulnerable to a CSRF attack that would allow a low-level Lansweeper user to elevate their privileges within the application.
CVE-2020-13643 1 Siteorigin 1 Page Builder 2024-11-21 8.8 High
An issue was discovered in the SiteOrigin Page Builder plugin before 2.10.16 for WordPress. The live editor feature did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The live_editor_panels_data $_POST variable allows for malicious JavaScript to be executed in the victim's browser.
CVE-2020-13642 1 Siteorigin 1 Page Builder 2024-11-21 8.8 High
An issue was discovered in the SiteOrigin Page Builder plugin before 2.10.16 for WordPress. The action_builder_content function did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The panels_data $_POST variable allows for malicious JavaScript to be executed in the victim's browser.
CVE-2020-13641 1 Infolific 1 Real-time Find And Replace 2024-11-21 8.8 High
An issue was discovered in the Real-Time Find and Replace plugin before 4.0.2 for WordPress. The far_options_page function did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The find and replace rules could be updated with malicious JavaScript, allowing for that be executed later in the victims browser.
CVE-2020-13620 1 Fastweb 2 Fastgate Gpon Fga2130fwb, Fastgate Gpon Fga2130fwb Firmware 2024-11-21 8.8 High
Fastweb FASTGate GPON FGA2130FWB devices through 2020-05-26 allow CSRF via the router administration web panel, leading to an attacker's ability to perform administrative actions such as modifying the configuration.
CVE-2020-13569 1 Open-emr 1 Openemr 2024-11-21 8.8 High
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability.
CVE-2020-13527 1 Lantronix 4 Sgx, Sgx Firmware, Xport Edge and 1 more 2024-11-21 4.5 Medium
An authentication bypass vulnerability exists in the Web Manager functionality of Lantronix XPort EDGE 3.0.0.0R11, 3.1.0.0R9, 3.4.0.0R12 and 4.2.0.0R7. A specially crafted HTTP request can cause increased privileges. An attacker can send an HTTP request to trigger this vulnerability.
CVE-2020-13460 1 Tufin 1 Securetrack 2024-11-21 8.8 High
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities were present in Tufin SecureTrack, affecting all versions prior to R20-2 GA.
CVE-2020-13458 1 Verbb 1 Image Resizer 2024-11-21 8.8 High
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There are CSRF issues with the log-clear controller action.
CVE-2020-13426 1 Bdtask 1 Multi-scheduler 2024-11-21 6.5 Medium
The Multi-Scheduler plugin 1.0.0 for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability in the forms it presents, allowing the possibility of deleting records (users) when an ID is known.
CVE-2020-13416 1 Aviatrix 1 Controller 2024-11-21 6.5 Medium
An issue was discovered in Aviatrix Controller before 5.4.1066. A Controller Web Interface session token parameter is not required on an API call, which opens the application up to a Cross Site Request Forgery (CSRF) vulnerability for password resets.
CVE-2020-13412 1 Aviatrix 1 Controller 2024-11-21 8.8 High
An issue was discovered in Aviatrix Controller before 5.4.1204. An API call on the web interface lacked a session token check to control access, leading to CSRF.
CVE-2020-13350 1 Gitlab 1 Gitlab 2024-11-21 3.1 Low
CSRF in runner administration page in all versions of GitLab CE/EE allows an attacker who's able to target GitLab instance administrators to pause/resume runners. Affected versions are >=13.5.0, <13.5.2,>=13.4.0, <13.4.5,<13.3.9.
CVE-2020-13259 1 Rad 2 Secflow-1v, Secflow-1v Firmware 2024-11-21 8.8 High
A vulnerability in the web-based management interface of RAD SecFlow-1v os-image SF_0290_2.3.01.26 could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web UI on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. This could be exploited in conjunction with CVE-2020-13260.