# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
4951 |
CVE-2020-36125 |
287 |
|
Bypass |
2021-05-07 |
2021-05-13 |
5.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
None |
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control where password revalidation in sensitive operations can be bypassed remotely by an authenticated attacker through requesting the endpoint directly. |
4952 |
CVE-2020-36120 |
120 |
|
DoS Overflow |
2021-04-14 |
2021-04-16 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
Buffer Overflow in the "sixel_encoder_encode_bytes" function of Libsixel v1.8.6 allows attackers to cause a Denial of Service (DoS). |
4953 |
CVE-2020-36067 |
129 |
|
DoS |
2021-01-05 |
2021-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
GJSON <=v1.6.5 allows attackers to cause a denial of service (panic: runtime error: slice bounds out of range) via a crafted GET call. |
4954 |
CVE-2020-36066 |
|
|
DoS |
2021-01-05 |
2021-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
GJSON <1.6.5 allows attackers to cause a denial of service (remote) via crafted JSON. |
4955 |
CVE-2020-36064 |
798 |
|
|
2022-01-31 |
2022-02-04 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Online Course Registration v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised. |
4956 |
CVE-2020-36051 |
22 |
|
Dir. Trav. |
2021-01-05 |
2021-01-08 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Directory traversal vulnerability in page_edit.php in MiniCMS V1.10 allows remote attackers to read arbitrary files via the state parameter. |
4957 |
CVE-2020-36049 |
400 |
|
DoS |
2021-01-08 |
2021-07-21 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
socket.io-parser before 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used. |
4958 |
CVE-2020-36048 |
400 |
|
DoS |
2021-01-08 |
2021-01-12 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
Engine.IO before 4.0.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport. |
4959 |
CVE-2020-36009 |
|
|
|
2021-06-03 |
2021-06-09 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
OBottle 2.0 in \c\g.php contains an arbitrary file download vulnerability. |
4960 |
CVE-2020-36008 |
|
|
|
2021-06-03 |
2021-06-09 |
5.5 |
None |
Remote |
Low |
??? |
None |
Partial |
Partial |
OBottle 2.0 in \c\t.php contains an arbitrary file write vulnerability. |
4961 |
CVE-2020-36006 |
|
|
|
2021-06-03 |
2021-06-08 |
5.5 |
None |
Remote |
Low |
??? |
None |
Partial |
Partial |
AppCMS 2.0.101 in /admin/info.php has an arbitrary file deletion vulnerability which allows attackers to delete arbitrary files on the site. |
4962 |
CVE-2020-36005 |
|
|
|
2021-06-03 |
2021-06-08 |
5.5 |
None |
Remote |
Low |
??? |
None |
Partial |
Partial |
AppCMS 2.0.101 in /admin/app.php has an arbitrary file deletion vulnerability which allows attackers to delete arbitrary files on the site. |
4963 |
CVE-2020-36003 |
89 |
|
Sql |
2021-02-17 |
2021-02-18 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The id parameter in detail.php of Online Book Store v1.0 is vulnerable to union-based blind SQL injection, which leads to the ability to retrieve all databases. |
4964 |
CVE-2020-36002 |
89 |
|
Sql +Info |
2021-02-17 |
2021-04-01 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Seat-Reservation-System 1.0 has a SQL injection vulnerability in index.php in the id parameter where attackers can obtain sensitive database information. |
4965 |
CVE-2020-35970 |
918 |
|
|
2021-06-03 |
2021-06-09 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An issue was discovered in YzmCMS 5.8. There is a SSRF vulnerability in the background collection management that allows arbitrary file read. |
4966 |
CVE-2020-35965 |
787 |
|
|
2021-01-04 |
2021-11-05 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform memset zero operations. |
4967 |
CVE-2020-35962 |
287 |
|
|
2021-01-03 |
2021-07-21 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
The sellTokenForLRC function in the vault protocol in the smart contract implementation for Loopring (LRC), an Ethereum token, lacks access control for fee swapping and thus allows price manipulation. |
4968 |
CVE-2020-35929 |
798 |
|
|
2021-01-19 |
2021-01-29 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
In TinyCheck before commits 9fd360d and ea53de8, the installation script of the tool contained hard-coded credentials to the backend part of the tool. This information could be used by an attacker for unauthorized access to remote data. |
4969 |
CVE-2020-35901 |
416 |
|
|
2020-12-31 |
2021-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in the actix-http crate before 2.0.0-alpha.1 for Rust. There is a use-after-free in BodyStream. |
4970 |
CVE-2020-35896 |
400 |
|
|
2020-12-31 |
2021-07-21 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in the ws crate through 2020-09-25 for Rust. The outgoing buffer is not properly limited, leading to a remote memory-consumption attack. |
4971 |
CVE-2020-35894 |
706 |
|
|
2020-12-31 |
2021-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
An issue was discovered in the obstack crate before 0.1.4 for Rust. Unaligned references can occur. |
4972 |
CVE-2020-35893 |
193 |
|
|
2020-12-31 |
2021-07-21 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in the simple-slab crate before 0.3.3 for Rust. remove() has an off-by-one error, causing memory leakage and a drop of uninitialized memory. |
4973 |
CVE-2020-35891 |
415 |
|
|
2020-12-31 |
2021-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in the ordnung crate through 2020-09-03 for Rust. compact::Vec violates memory safety via a remove() double free. |
4974 |
CVE-2020-35890 |
125 |
|
|
2020-12-31 |
2021-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in the ordnung crate through 2020-09-03 for Rust. compact::Vec violates memory safety via out-of-bounds access for large capacity. |
4975 |
CVE-2020-35875 |
|
|
|
2020-12-31 |
2021-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in the tokio-rustls crate before 0.13.1 for Rust. Excessive memory usage may occur when data arrives quickly. |
4976 |
CVE-2020-35865 |
|
|
|
2020-12-31 |
2021-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in the os_str_bytes crate before 2.0.0 for Rust. It has false expectations about char::from_u32_unchecked behavior. |
4977 |
CVE-2020-35864 |
|
|
|
2020-12-31 |
2021-01-07 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in the flatbuffers crate through 2020-04-11 for Rust. read_scalar (and read_scalar_at) can transmute values without unsafe blocks. |
4978 |
CVE-2020-35861 |
125 |
|
|
2020-12-31 |
2021-01-06 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An issue was discovered in the bumpalo crate before 3.2.1 for Rust. The realloc feature allows the reading of unknown memory. Attackers can potentially read cryptographic keys. |
4979 |
CVE-2020-35857 |
400 |
|
|
2020-12-31 |
2021-01-06 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption. |
4980 |
CVE-2020-35849 |
863 |
|
+Priv |
2020-12-30 |
2021-07-21 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An issue was discovered in MantisBT before 2.24.4. An incorrect access check in bug_revision_view_page.php allows an unprivileged attacker to view the Summary field of private issues, as well as bugnotes revisions, gaining access to potentially confidential information via the bugnote_id parameter. |
4981 |
CVE-2020-35802 |
200 |
|
+Info |
2020-12-30 |
2021-07-21 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects CBR40 before 2.5.0.14, RBW30 before 2.6.1.4, RAX75 before 1.0.3.102, RAX80 before 1.0.3.102, RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, RBS850 before 3.2.16.6, RBK842 before 3.2.16.6, RBR840 before 3.2.16.6, RBS840 before 3.2.16.6, and RBS40V before 2.6.1.4. |
4982 |
CVE-2020-35801 |
|
|
|
2020-12-30 |
2021-03-23 |
5.5 |
None |
Remote |
Low |
??? |
None |
Partial |
Partial |
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects JGS516PE before 2.6.0.48, JGS524Ev2 before 2.6.0.48, JGS524PE before 2.6.0.48, and GS116Ev2 before 2.6.0.48. A TFTP server was found to be active by default. It allows remote authenticated users to update the switch firmware. |
4983 |
CVE-2020-35794 |
77 |
|
|
2020-12-30 |
2020-12-30 |
5.2 |
None |
Local Network |
Low |
??? |
Partial |
Partial |
Partial |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBS40V before 2.6.1.4, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25. |
4984 |
CVE-2020-35792 |
77 |
|
|
2020-12-30 |
2020-12-31 |
5.2 |
None |
Local Network |
Low |
??? |
Partial |
Partial |
Partial |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R7500v2 before 1.0.3.48, R8900 before 1.0.5.2, R9000 before 1.0.5.2, and R7800 before 1.0.2.68. |
4985 |
CVE-2020-35790 |
77 |
|
|
2020-12-30 |
2020-12-30 |
5.2 |
None |
Local Network |
Low |
??? |
Partial |
Partial |
Partial |
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.56, R7800 before 1.0.2.68, R8900 before 1.0.4.26, and R9000 before 1.0.4.26. |
4986 |
CVE-2020-35788 |
120 |
|
Overflow |
2020-12-30 |
2020-12-30 |
5.2 |
None |
Local Network |
Low |
??? |
Partial |
Partial |
Partial |
NETGEAR WAC104 devices before 1.0.4.13 are affected by a buffer overflow by an authenticated user. |
4987 |
CVE-2020-35787 |
120 |
|
Overflow |
2020-12-30 |
2020-12-31 |
5.2 |
None |
Local Network |
Low |
??? |
Partial |
Partial |
Partial |
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40. |
4988 |
CVE-2020-35785 |
287 |
|
|
2020-12-30 |
2020-12-31 |
5.8 |
None |
Local Network |
Low |
Not required |
Partial |
Partial |
Partial |
NETGEAR DGN2200v1 devices before v1.0.0.60 mishandle HTTPd authentication (aka PSV-2020-0363, PSV-2020-0364, and PSV-2020-0365). |
4989 |
CVE-2020-35783 |
|
|
|
2020-12-30 |
2021-03-23 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Certain NETGEAR devices are affected by lack of access control at the function level. This affects JGS516PE before 2.6.0.48, GS116Ev2 before 2.6.0.48, JGS524Ev2 before 2.6.0.48, and JGS524PE before 2.6.0.48. The NSDP protocol version allows unauthenticated remote attackers to obtain all the switch configuration parameters by sending the corresponding read requests. |
4990 |
CVE-2020-35756 |
306 |
|
+Info |
2021-05-03 |
2022-07-12 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a luci_service GETPASS Configuration Password Information Leak. The luci_service daemon running on port 7777 does not require authentication to return the device configuration password in cleartext when using the GETPASS command. As such, any unauthenticated person with access to port 7777 on the device will be able to leak the user's personal device configuration password by issuing the GETPASS command. |
4991 |
CVE-2020-35755 |
306 |
|
+Info |
2021-05-03 |
2022-07-12 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An issue was discovered on Libre Wireless LS9 LS1.5/p7040 devices. There is a luci_service Read_ NVRAM Direct Access Information Leak. The luci_service deamon running on port 7777 provides a sub-category of commands for which Read_ is prepended. Commands in this category are able to directly read the contents of the device configuration NVRAM. The NVRAM contains sensitive information, such as the Wi-Fi password (in cleartext), as well as connected account tokens for services such as Spotify. |
4992 |
CVE-2020-35738 |
787 |
|
Overflow |
2020-12-28 |
2021-07-21 |
5.8 |
None |
Remote |
Medium |
Not required |
None |
Partial |
Partial |
WavPack 5.3.0 has an out-of-bounds write in WavpackPackSamples in pack_utils.c because of an integer overflow in a malloc argument. NOTE: some third-parties claim that there are later "unofficial" releases through 5.3.2, which are also affected. |
4993 |
CVE-2020-35737 |
|
|
|
2020-12-30 |
2021-02-24 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
In Correspondence Management System (corms) in Newgen eGov 12.0, an attacker can modify other users' profile information by manipulating the unvalidated UserIndex parameter, aka Insecure Direct Object Reference. |
4994 |
CVE-2020-35736 |
22 |
|
Dir. Trav. |
2020-12-27 |
2020-12-29 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
GateOne 1.1 allows arbitrary file download without authentication via /downloads/.. directory traversal because os.path.join is misused. |
4995 |
CVE-2020-35733 |
295 |
|
|
2021-01-15 |
2021-03-31 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority. |
4996 |
CVE-2020-35711 |
|
|
|
2020-12-25 |
2020-12-30 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue has been discovered in the arc-swap crate before 0.4.8 (and 1.x before 1.1.0) for Rust. Use of arc_swap::access::Map with the Constant test helper (or with a user-supplied implementation of the Access trait) could sometimes lead to dangling references being returned by the map. |
4997 |
CVE-2020-35710 |
200 |
|
+Info |
2020-12-25 |
2020-12-30 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data. |
4998 |
CVE-2020-35693 |
|
|
|
2020-12-24 |
2020-12-31 |
5.4 |
None |
Local Network |
Medium |
Not required |
Partial |
Partial |
Partial |
On some Samsung phones and tablets running Android through 7.1.1, it is possible for an attacker-controlled Bluetooth Low Energy (BLE) device to pair silently with a vulnerable target device, without any user interaction, when the target device's Bluetooth is on, and it is running an app that offers a connectable BLE advertisement. An example of such an app could be a Bluetooth-based contact tracing app, such as Australia's COVIDSafe app, Singapore's TraceTogether app, or France's TousAntiCovid (formerly StopCovid). As part of the pairing process, two pieces (among others) of personally identifiable information are exchanged: the Identity Address of the Bluetooth adapter of the target device, and its associated Identity Resolving Key (IRK). Either one of these identifiers can be used to perform re-identification of the target device for long term tracking. The list of affected devices includes (but is not limited to): Galaxy Note 5, Galaxy S6 Edge, Galaxy A3, Tab A (2017), J2 Pro (2018), Galaxy Note 4, and Galaxy S5. |
4999 |
CVE-2020-35684 |
20 |
|
|
2021-08-19 |
2021-08-26 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in HCC Nichestack 3.0. The code that parses TCP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the length of the TCP payload within the TCP checksum computation function. When the IP payload size is set to be smaller than the size of the IP header, the TCP checksum computation function may read out of bounds (a low-impact write-out-of-bounds is also possible). |
5000 |
CVE-2020-35683 |
125 |
|
|
2021-08-19 |
2022-07-12 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An issue was discovered in HCC Nichestack 3.0. The code that parses ICMP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the ICMP checksum. When the IP payload size is set to be smaller than the size of the IP header, the ICMP checksum computation function may read out of bounds, causing a Denial-of-Service. |