CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities (CVSS score between 5 and 5.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
2951 CVE-2020-7976 200 +Info 2020-02-05 2020-02-06
5.0
None Remote Low Not required Partial None None
GitLab EE 12.4 and later through 12.7.2 has Incorrect Access Control.
2952 CVE-2020-7974 200 +Info 2020-02-05 2020-02-06
5.0
None Remote Low Not required Partial None None
GitLab EE 10.1 through 12.7.2 allows Information Disclosure.
2953 CVE-2020-7972 276 2020-02-05 2020-02-06
5.0
None Remote Low Not required None Partial None
GitLab EE 12.2 has Insecure Permissions (issue 2 of 2).
2954 CVE-2020-7969 200 +Info 2020-02-05 2020-02-06
5.0
None Remote Low Not required Partial None None
GitLab EE 8.0 and later through 12.7.2 allows Information Disclosure.
2955 CVE-2020-7968 287 2020-02-05 2020-02-06
5.0
None Remote Low Not required Partial None None
GitLab EE 8.0 through 12.7.2 has Incorrect Access Control.
2956 CVE-2020-7966 22 Dir. Trav. 2020-02-05 2020-02-07
5.0
None Remote Low Not required Partial None None
GitLab EE 11.11 and later through 12.7.2 allows Directory Traversal.
2957 CVE-2020-7964 200 +Info 2020-01-24 2020-01-30
5.0
None Remote Low Not required Partial None None
An issue was discovered in Mirumee Saleor 2.x before 2.9.1. Incorrect access control in the checkoutCustomerAttach mutations allows attackers to attach their checkouts to any user ID and consequently leak user data (e.g., name, address, and previous orders of any other customer).
2958 CVE-2020-7962 200 +Info 2020-11-13 2020-11-30
5.0
None Remote Low Not required Partial None None
An issue was discovered in One Identity Password Manager 5.8. An attacker could enumerate valid answers for a user. It is possible for an attacker to detect a valid answer based on the HTTP response content, and reuse this answer later for a password reset on a chosen password. The enumeration is possible because, within the HTTP response content, WRONG ID is only returned when the answer is incorrect.
2959 CVE-2020-7959 200 +Info 2020-02-17 2020-02-25
5.0
None Remote Low Not required Partial None None
LabVantage LIMS 8.3 does not properly maintain the confidentiality of database names. For example, the web application exposes the database name. An attacker might be able to enumerate database names by providing his own database name in a request, because the response will return an 'Unrecognized Database exception message if the database does not exist.
2960 CVE-2020-7957 20 DoS 2020-02-12 2020-02-20
5.0
None Remote Low Not required None None Partial
The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing > character exists. This causes a denial of service in which the recipient cannot read all of their messages.
2961 CVE-2020-7955 200 +Info 2020-01-31 2020-02-04
5.0
None Remote Low Not required Partial None None
HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.
2962 CVE-2020-7953 306 2020-02-06 2020-02-11
5.0
None Remote Low Not required Partial None None
An issue was discovered in OpServices OpMon 9.3.2. Without authentication, it is possible to read server files (e.g., /etc/passwd) due to the use of the nmap -iL (aka input file) option.
2963 CVE-2020-7943 200 +Info 2020-03-11 2020-03-24
5.0
None Remote Low Not required Partial None None
Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13
2964 CVE-2020-7940 521 2020-01-23 2020-01-24
5.0
None Remote Low Not required None Partial None
Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to set weak passwords, leading to easier cracking.
2965 CVE-2020-7936 601 2020-01-23 2020-01-24
5.8
None Remote Medium Not required Partial Partial None
An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1 allows an attacker to craft a link to a Plone Site that, when followed, and possibly after login, will redirect to an attacker's site.
2966 CVE-2020-7925 20 DoS 2020-11-23 2020-12-02
5.0
None Remote Low Not required None None Partial
Incorrect validation of user input in the role name parser may lead to use of uninitialized memory allowing an unauthenticated attacker to use a specially crafted request to cause a denial of service. This issue affects: MongoDB Inc. MongoDB Server v4.4 versions prior to 4.4.0-rc12; v4.2 versions prior to 4.2.9.
2967 CVE-2020-7918 639 2020-03-27 2020-03-31
5.5
None Remote Low ??? Partial Partial None
An insecure direct object reference in webmail in totemo totemomail 7.0.0 allows an authenticated remote user to read and modify mail folder names of other users via enumeration.
2968 CVE-2020-7914 200 +Info 2020-01-31 2020-02-05
5.0
None Remote Low Not required Partial None None
In JetBrains IntelliJ IDEA 2019.2, an XSLT debugger plugin misconfiguration allows arbitrary file read operations over the network. This issue was fixed in 2019.3.
2969 CVE-2020-7912 668 2020-01-30 2020-02-01
5.0
None Remote Low Not required Partial None None
In JetBrains YouTrack before 2019.2.59309, SMTP/Jabber settings could be accessed using backups.
2970 CVE-2020-7909 522 2020-01-30 2020-02-01
5.0
None Remote Low Not required Partial None None
In JetBrains TeamCity before 2019.1.5, some server-stored passwords could be shown via the web UI.
2971 CVE-2020-7907 200 +Info 2020-02-21 2020-02-25
5.0
None Remote Low Not required Partial None None
In the JetBrains Scala plugin before 2019.2.1, some artefact dependencies were resolved over unencrypted connections.
2972 CVE-2020-7906 347 2020-01-30 2020-02-01
5.0
None Remote Low Not required Partial None None
In JetBrains Rider versions 2019.3 EAP2 through 2019.3 EAP7, there were unsigned binaries provided by the Windows installer. This issue was fixed in release version 2019.3.
2973 CVE-2020-7905 200 +Info 2020-01-30 2020-02-01
5.0
None Remote Low Not required Partial None None
Ports listened to by JetBrains IntelliJ IDEA before 2019.3 were exposed to the network.
2974 CVE-2020-7904 295 2020-01-30 2020-02-01
5.8
None Remote Medium Not required Partial Partial None
In JetBrains IntelliJ IDEA before 2019.3, some Maven repositories were accessed via HTTP instead of HTTPS.
2975 CVE-2020-7858 22 Dir. Trav. +Info 2021-04-22 2021-04-29
5.0
None Remote Low Not required Partial None None
There is a directory traversing vulnerability in the download page url of AquaNPlayer 2.0.0.92. The IP of the download page url is localhost and an attacker can traverse directories using "dot dot" sequences(../../) to view host file on the system. This vulnerability can cause information leakage.
2976 CVE-2020-7847 434 Exec Code 2021-02-23 2021-02-27
5.2
None Local Network Low ??? Partial Partial Partial
The ipTIME NAS product allows an arbitrary file upload vulnerability in the Manage Bulletins/Upload feature, which can be leveraged to gain remote code execution. This issue affects: pTIME NAS 1.4.36.
2977 CVE-2020-7802 276 2020-04-14 2020-05-14
5.0
None Remote Low Not required Partial None None
The Synergy Systems & Solutions (SSS) HUSKY RTU 6049-E70, with firmware Versions 5.0 and prior, has an Incorrect Default Permissions (CWE-276) vulnerability. The affected product is vulnerable to insufficient default permissions, which could allow an attacker to view network configurations through SNMP communication. This is a different issue than CVE-2019-16879, CVE-2019-20045, CVE-2019-20046, CVE-2020-7800, and CVE-2020-7801.
2978 CVE-2020-7801 200 +Info 2020-04-14 2020-04-14
5.0
None Remote Low Not required Partial None None
The Synergy Systems & Solutions (SSS) HUSKY RTU 6049-E70, with firmware Versions 5.0 and prior, has an Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability. The affected product is vulnerable to information exposure over the SNMP protocol. This is a different issue than CVE-2019-16879, CVE-2019-20045, CVE-2019-20046, CVE-2020-7800, and CVE-2020-7802.
2979 CVE-2020-7793 400 DoS 2020-12-11 2020-12-16
5.0
None Remote Low Not required None None Partial
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).
2980 CVE-2020-7791 2020-12-11 2021-05-04
5.0
None Remote Low Not required None None Partial
This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.
2981 CVE-2020-7790 22 Dir. Trav. 2020-12-11 2020-12-14
5.0
None Remote Low Not required Partial None None
This affects the package spatie/browsershot from 0.0.0. By specifying a URL in the file:// protocol an attacker is able to include arbitrary files in the resultant PDF.
2982 CVE-2020-7787 287 2020-12-09 2020-12-11
5.0
None Remote Low Not required None Partial None
This affects all versions of package react-adal. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of "" (empty string), then adal.js will consider the JWT token as authentic.
2983 CVE-2020-7779 917 DoS 2020-11-26 2020-12-03
5.0
None Remote Low Not required None None Partial
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, [email protected]-----------------------------------------------------------!.
2984 CVE-2020-7768 74 2020-11-11 2020-12-01
5.0
None Remote Low Not required None None Partial
The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition.
2985 CVE-2020-7767 DoS 2020-11-11 2020-11-20
5.0
None Remote Low Not required None None Partial
All versions of package express-validators are vulnerable to Regular Expression Denial of Service (ReDoS) when validating specifically-crafted invalid urls.
2986 CVE-2020-7765 2020-11-16 2020-12-01
5.0
None Remote Low Not required None Partial None
This affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
2987 CVE-2020-7764 444 DoS 2020-11-08 2020-11-16
5.0
None Remote Low Not required None None Partial
This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack.
2988 CVE-2020-7763 200 +Info 2020-11-05 2020-11-10
5.0
None Remote Low Not required Partial None None
This affects the package phantom-html-to-pdf before 0.6.1.
2989 CVE-2020-7761 DoS 2020-11-05 2020-11-13
5.0
None Remote Low Not required None None Partial
This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails.
2990 CVE-2020-7760 400 2020-10-30 2020-11-13
5.0
None Remote Low Not required None None Partial
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the regex is mainly due to the sub-pattern (s|/*.*?*/)*
2991 CVE-2020-7758 22 Dir. Trav. 2020-11-02 2020-11-18
5.0
None Remote Low Not required Partial None None
This affects versions of package browserless-chrome before 1.40.2-chrome-stable. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.
2992 CVE-2020-7755 DoS 2020-10-27 2020-11-02
5.0
None Remote Low Not required None None Partial
All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values.
2993 CVE-2020-7754 2020-10-27 2020-10-27
5.0
None Remote Low Not required None None Partial
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
2994 CVE-2020-7753 DoS 2020-10-27 2021-05-12
5.0
None Remote Low Not required None None Partial
All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
2995 CVE-2020-7746 20 2020-10-29 2020-11-04
5.0
None Remote Low Not required None None Partial
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
2996 CVE-2020-7742 2020-10-07 2020-10-07
5.0
None Remote Low Not required None None Partial
This affects the package simpl-schema before 1.10.2.
2997 CVE-2020-7733 917 DoS 2020-09-16 2020-09-22
5.0
None Remote Low Not required None None Partial
The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.
2998 CVE-2020-7711 476 2020-08-23 2020-08-27
5.0
None Remote Low Not required None None Partial
This affects all versions of package github.com/russellhaering/goxmldsig. There is a crash on nil-pointer dereference caused by sending malformed XML signatures.
2999 CVE-2020-7705 1021 2020-08-24 2020-09-02
5.8
None Remote Medium Not required Partial Partial None
This affects the package MintegralAdSDK from 0.0.0. The SDK distributed by the company contains malicious functionality that tracks any URL opened by the app and reports it back to the company, along with performing advertisement attribution fraud. Mintegral can remotely activate hooks on the UIApplication, openURL, SKStoreProductViewController, loadProductWithParameters and NSURLProtocol methods along with anti-debug and proxy detection protection. If those hooks are active MintegralAdSDK sends obfuscated data about every opened URL in an application to their servers. Note that the malicious functionality is enabled even if the SDK was not enabled to serve ads.
3000 CVE-2020-7696 200 +Info 2020-07-17 2020-07-22
5.0
None Remote Low Not required Partial None None
This affects all versions of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
Total number of vulnerabilities : 29871   Page : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 (This Page)61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.