CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Security Vulnerabilities Published In November 2020

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2020-29441 434 DoS 2020-11-30 2020-12-04
6.4
None Remote Low Not required None Partial Partial
An issue was discovered in the Upload Widget in OutSystems Platform 10 before 10.0.1019.0. An unauthenticated attacker can upload arbitrary files. In some cases, this attack may consume the available database space (Denial of Service), corrupt legitimate data if files are being processed asynchronously, or deny access to legitimate uploaded files.
2 CVE-2020-29440 295 2020-11-30 2020-12-04
2.1
None Local Low Not required None Partial None
Tesla Model X vehicles before 2020-11-23 do not perform certificate validation during an attempt to pair a new key fob with the body control module (BCM). This allows an attacker (who is inside a vehicle, or is otherwise able to send data over the CAN bus) to start and drive the vehicle with a spoofed key fob.
3 CVE-2020-29439 2020-11-30 2020-12-04
2.1
None Local Low Not required Partial None None
Tesla Model X vehicles before 2020-11-23 have key fobs that rely on five VIN digits for the authentication needed for a body control module (BCM) to initiate a Bluetooth wake-up action. (The full VIN is visible from outside the vehicle.)
4 CVE-2020-29438 347 2020-11-30 2020-12-04
3.3
None Local Network Low Not required Partial None None
Tesla Model X vehicles before 2020-11-23 have key fobs that accept firmware updates without signature verification. This allows attackers to construct firmware that retrieves an unlock code from a secure enclave chip.
5 CVE-2020-29395 79 XSS 2020-11-30 2022-08-06
4.3
None Remote Medium Not required None Partial None
The EventON plugin through 3.0.5 for WordPress allows addons/?q= XSS via the search field.
6 CVE-2020-29394 787 Exec Code Overflow 2020-11-30 2023-02-03
6.8
None Remote Medium Not required Partial Partial Partial
A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).
7 CVE-2020-29392 522 2020-11-30 2021-07-21
2.1
None Local Low Not required Partial None None
The Estil Hill Lock Password Manager Safe app 2.3 for iOS has a *#06#* backdoor password. An attacker with physical access can unlock the password manager without knowing the master password set by the user.
8 CVE-2020-29390 78 Exec Code 2020-11-30 2020-12-03
10.0
None Remote Low Not required Complete Complete Complete
Zeroshell 3.9.3 contains a command injection vulnerability in the /cgi-bin/kerbynet StartSessionSubmit parameter that could allow an unauthenticated attacker to execute a system command by using shell metacharacters and the %0a character.
9 CVE-2020-29384 190 Overflow 2020-11-30 2021-09-08
4.3
None Remote Medium Not required None None Partial
An issue was discovered in PNGOUT 2020-01-15. When compressing a crafted PNG file, it encounters an integer overflow.
10 CVE-2020-29383 798 2020-11-29 2020-12-01
2.1
None Local Low Not required Partial None None
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. A hardcoded RSA private key (specific to V1600D4L and V1600D-MINI) is contained in the firmware images.
11 CVE-2020-29382 798 2020-11-29 2020-12-01
2.1
None Local Low Not required Partial None None
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. A hardcoded RSA private key (specific to V1600D, V1600G1, and V1600G2) is contained in the firmware images.
12 CVE-2020-29381 77 2020-11-29 2021-07-21
10.0
None Remote Low Not required Complete Complete Complete
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. Command injection can occur in "upload tftp syslog" and "upload tftp configuration" in the CLI via a crafted filename.
13 CVE-2020-29380 319 2020-11-29 2021-07-21
4.3
None Remote Medium Not required Partial None None
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. TELNET is offered by default but SSH is not always available. An attacker can intercept passwords sent in cleartext and conduct a man-in-the-middle attack on the management of the appliance.
14 CVE-2020-29379 287 2020-11-29 2021-07-21
2.1
None Local Low Not required None Partial None
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. During the process of updating the firmware, the update script starts a telnetd -l /bin/sh process that does not require authentication for TELNET access.
15 CVE-2020-29378 269 2020-11-29 2021-07-21
9.0
None Remote Low ??? Complete Complete Complete
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. It is possible to elevate the privilege of a CLI user (to full administrative access) by using the password [email protected]#y$z%x6x7q8c9z) for the enable command.
16 CVE-2020-29377 798 2020-11-29 2020-12-03
5.0
None Remote Low Not required Partial None None
An issue was discovered on V-SOL V1600D V2.03.69 OLT devices. The string [email protected]$ is compared to the password provided by the the remote attacker. If it matches, access is provided.
17 CVE-2020-29376 798 2020-11-29 2020-12-03
5.0
None Remote Low Not required Partial None None
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. There is an [email protected]#y$z%x6x7q8c9z) password for the admin account to authenticate to the TELNET service.
18 CVE-2020-29375 798 2020-11-29 2020-12-03
4.0
None Remote Low ??? Partial None None
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. An low-privileged (non-admin) attacker can use a hardcoded password (4ef9cea10b2362f15ba4558b1d5c081f) to create an admin user.
19 CVE-2020-29374 362 2020-11-28 2022-04-19
3.3
None Local Medium Not required Partial Partial None
An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
20 CVE-2020-29373 22 Dir. Trav. 2020-11-28 2020-12-02
2.1
None Local Low Not required Partial None None
An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
21 CVE-2020-29372 362 2020-11-28 2022-10-06
4.7
None Local Medium Not required None None Complete
An issue was discovered in do_madvise in mm/madvise.c in the Linux kernel before 5.6.8. There is a race condition between coredump operations and the IORING_OP_MADVISE implementation, aka CID-bc0c4d1e176e.
22 CVE-2020-29371 908 2020-11-28 2020-12-02
2.1
None Local Low Not required Partial None None
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.
23 CVE-2020-29370 362 2020-11-28 2022-10-19
4.4
None Local Medium Not required Partial Partial Partial
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
24 CVE-2020-29369 362 2020-11-28 2021-02-24
6.9
None Local Medium Not required Complete Complete Complete
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
25 CVE-2020-29368 362 2020-11-28 2022-04-26
6.9
None Local Medium Not required Complete Complete Complete
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
26 CVE-2020-29367 787 Overflow 2020-11-27 2020-12-03
9.3
None Remote Medium Not required Complete Complete Complete
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
27 CVE-2020-29364 79 XSS 2020-11-30 2020-12-01
3.5
None Remote Medium ??? None Partial None
In NetArt News Lister 1.0.0, the news headlines vulnerable to stored xss attacks. Attackers can inject codes in news titles.
28 CVE-2020-29145 79 XSS 2020-11-27 2020-12-04
3.5
None Remote Medium ??? None Partial None
In Ericsson BSCS iX R18 Billing & Rating iX R18, ADMX is a web base module in BSCS iX that is vulnerable to stored XSS via the name or description field to a solutionUnitServlet?SuName=UserReferenceDataSU Access Rights Group. In most test cases, session hijacking was also possible by utilizing the XSS vulnerability. This potentially allows for full account takeover, or exploiting admins' browsers by using the beef framework.
29 CVE-2020-29144 79 XSS 2020-11-27 2020-12-04
3.5
None Remote Medium ??? None Partial None
In Ericsson BSCS iX R18 Billing & Rating iX R18, MX is a web base module in BSCS iX that is vulnerable to stored XSS via an Alert Dashboard comment. In most test cases, session hijacking was also possible by utilizing the XSS vulnerability. This potentially allows for full account takeover, or exploiting admins' browsers by using the beef framework.
30 CVE-2020-29138 862 2020-11-27 2021-07-21
5.0
None Remote Low Not required Partial None None
Incorrect Access Control in the configuration backup path in SAGEMCOM [email protected] NET DOCSIS 3.0, software NET_4.109.0, allows remote unauthenticated users to download the router configuration file via the /backupsettings.conf URI, when any valid session is running.
31 CVE-2020-29137 79 XSS 2020-11-27 2020-12-01
4.3
None Remote Medium Not required None Partial None
cPanel before 90.0.17 allows self-XSS via the WHM Transfer Tool interface (SEC-577).
32 CVE-2020-29136 307 Bypass 2020-11-27 2022-04-26
4.0
None Remote Low ??? Partial None None
In cPanel before 90.0.17, 2FA can be bypassed via a brute-force approach (SEC-575).
33 CVE-2020-29135 74 2020-11-27 2021-07-21
3.5
None Remote Medium ??? None Partial None
cPanel before 90.0.17 has multiple instances of URL parameter injection (SEC-567).
34 CVE-2020-29133 79 XSS 2020-11-27 2020-11-30
4.3
None Remote Medium Not required None Partial None
jsp/upload.jsp in Coremail XT 5.0 allows XSS via an uploaded personal signature, as demonstrated by a .jpg.html filename in the signImgFile parameter.
35 CVE-2020-29130 125 2020-11-26 2023-03-15
4.0
None Remote Low ??? Partial None None
slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
36 CVE-2020-29129 125 2020-11-26 2022-10-14
4.0
None Remote Low ??? Partial None None
ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
37 CVE-2020-29128 91 2020-11-26 2020-12-03
6.8
None Remote Medium Not required Partial Partial Partial
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
38 CVE-2020-29127 287 2020-11-30 2020-12-03
10.0
None Remote Low Not required Complete Complete Complete
An issue was discovered on Fujitsu Eternus Storage DX200 S4 devices through 2020-11-25. After logging into the portal as a root user (using any web browser), the portal can be accessed with root privileges when the URI cgi-bin/csp?cspid={XXXXXXXXXX}&csppage=cgi_PgOverview&csplang=en is visited from a different web browser.
39 CVE-2020-29074 862 2020-11-25 2021-07-21
6.5
None Remote Low ??? Partial Partial Partial
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.
40 CVE-2020-29072 79 XSS 2020-11-25 2020-12-02
4.3
None Remote Medium Not required None Partial None
A Cross-Site Script Inclusion vulnerability was found on LiquidFiles before 3.3.19. This client-side attack requires user interaction (opening a link) and successful exploitation could lead to encrypted e-mail content leakage via messages/sent?format=js and popup?format=js.
41 CVE-2020-29071 79 XSS 2020-11-25 2020-12-02
8.5
None Remote Medium ??? Complete Complete Complete
An XSS issue was found in the Shares feature of LiquidFiles before 3.3.19. The issue arises from the insecure rendering of HTML files uploaded to the platform as attachments, when the -htmlview URL is directly accessed. The impact ranges from executing commands as root on the server to retrieving sensitive information about encrypted e-mails, depending on the permissions of the target user.
42 CVE-2020-29070 79 XSS 2020-11-25 2020-11-27
3.5
None Remote Medium ??? None Partial None
osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
43 CVE-2020-29069 2020-11-25 2020-12-03
2.1
None Local Low Not required None None Partial
_get_flag_ip_localdb in server/mhn/ui/utils.py in Modern Honey Network (MHN) through 2020-11-23 allows attackers to cause a denial-of-service via an IP address that is absent from a local geolocation database, because the code tries to uppercase a return value even if that value is not a string.
44 CVE-2020-29063 326 2020-11-24 2021-07-21
5.0
None Remote Low Not required Partial None None
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. A custom encryption algorithm is used to store encrypted passwords. This algorithm will XOR the password with the hardcoded *j7a(L#yZ98sSd5HfSgGjMj8;Ss;d)(*&^#@$a2s0i3g value.
45 CVE-2020-29062 798 2020-11-24 2021-03-11
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. There is a default blank password for the guest account.
46 CVE-2020-29061 798 2020-11-24 2021-03-11
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. There is a default root126 password for the root account.
47 CVE-2020-29060 798 2020-11-24 2021-03-11
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. There is a default debug124 password for the debug account.
48 CVE-2020-29059 798 2020-11-24 2021-03-11
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. There is a default panger123 password for the suma123 account for certain old firmware.
49 CVE-2020-29058 522 2020-11-24 2021-07-21
5.0
None Remote Low Not required Partial None None
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. Attackers can discover cleartext web-server credentials via certain /opt/lighttpd/web/cgi/ requests.
50 CVE-2020-29057 DoS 2020-11-24 2021-03-11
7.8
None Remote Low Not required None None Complete
An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. It allows remote attackers to cause a denial of service (reboot) by sending random bytes to the telnet server on port 23, aka a "shawarma" attack.
Total number of vulnerabilities : 1271   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.