Vulnerabilities (CVE)

Filtered by NVD-CWE-noinfo
Total 34582 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-21014 1 Emlog 1 Emlog 2024-11-21 5.5 MEDIUM 6.5 MEDIUM
emlog v6.0.0 contains an arbitrary file deletion vulnerability in admin/plugin.php.
CVE-2020-20813 1 Openvpn 1 Openvpn 2024-11-21 N/A 7.5 HIGH
Control Channel in OpenVPN 2.4.7 and earlier allows remote attackers to cause a denial of service via crafted reset packet.
CVE-2020-20664 1 Libiec Iccp Mod Project 1 Libiec Iccp Mod 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
libiec_iccp_mod v1.5 contains a segmentation violation in the component server_example1.c.
CVE-2020-20634 1 Elementor 1 Website Builder 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
Elementor 2.9.5 and below WordPress plugin allows authenticated users to activate its safe mode feature. This can be exploited to disable all security plugins on the blog.
CVE-2020-20495 1 Bludit 1 Bludit 2024-11-21 5.8 MEDIUM 9.1 CRITICAL
bludit v3.13.0 contains an arbitrary file deletion vulnerability in the backup plugin via the `deleteBackup' parameter.
CVE-2020-20299 1 Weiphp 1 Weiphp 2024-11-21 5.0 MEDIUM 7.5 HIGH
WeiPHP 5.0 does not properly restrict access to pages, related to using POST.
CVE-2020-20269 1 Caret 1 Caret 2024-11-21 10.0 HIGH 9.8 CRITICAL
A specially crafted Markdown document could cause the execution of malicious JavaScript code in Caret Editor before 4.0.0-rc22.
CVE-2020-20178 1 Whohas Project 1 Whohas 2024-11-21 5.0 MEDIUM 7.5 HIGH
Ethereum 0xe933c0cd9784414d5f278c114904f5a84b396919#code.sol latest version is affected by a denial of service vulnerability in the affected payout function. Once the length of this array is too long, it will result in an exception. Attackers can make attacks by creating a series of account addresses.
CVE-2020-1960 1 Apache 1 Flink 2024-11-21 1.9 LOW 4.7 MEDIUM
A vulnerability in Apache Flink (1.1.0 to 1.1.5, 1.2.0 to 1.2.1, 1.3.0 to 1.3.3, 1.4.0 to 1.4.2, 1.5.0 to 1.5.6, 1.6.0 to 1.6.4, 1.7.0 to 1.7.2, 1.8.0 to 1.8.3, 1.9.0 to 1.9.2, 1.10.0) where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.
CVE-2020-1957 2 Apache, Debian 2 Shiro, Debian Linux 2024-11-21 7.5 HIGH 9.8 CRITICAL
Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
CVE-2020-1954 3 Apache, Netapp, Oracle 10 Cxf, Oncommand Workflow Automation, Snapmanager and 7 more 2024-11-21 2.9 LOW 5.3 MEDIUM
Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the ‘createMBServerConnectorFactory‘ property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX.
CVE-2020-1953 2 Apache, Oracle 3 Commons Configuration, Database Server, Healthcare Foundation 2024-11-21 7.5 HIGH 10.0 CRITICAL
Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.
CVE-2020-1932 1 Apache 1 Superset 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
An information disclosure issue was found in Apache Superset 0.34.0, 0.34.1, 0.35.0, and 0.35.1. Authenticated Apache Superset users are able to retrieve other users' information, including hashed passwords, by accessing an unused and undocumented API endpoint on Apache Superset.
CVE-2020-1889 1 Whatsapp 1 Whatsapp Desktop 2024-11-21 7.5 HIGH 10.0 CRITICAL
A security feature bypass issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed for sandbox escape in Electron and escalation of privilege if combined with a remote code execution vulnerability inside the sandboxed renderer process.
CVE-2020-1882 1 Huawei 8 Ever-l29b, Ever-l29b Firmware, Honor Magic2 and 5 more 2024-11-21 2.1 LOW 4.6 MEDIUM
Huawei mobile phones Ever-L29B versions earlier than 10.0.0.180(C185E6R3P3), earlier than 10.0.0.180(C432E6R1P7), earlier than 10.0.0.180(C636E5R2P3); HUAWEI Mate 20 RS versions earlier than 10.0.0.175(C786E70R3P8); HUAWEI Mate 20 X versions earlier than 10.0.0.176(C00E70R2P8); and Honor Magic2 versions earlier than 10.0.0.175(C00E59R2P11) have an improper authorization vulnerability. Due to improper authorization of some function, attackers can bypass the authorization to perform some operations.
CVE-2020-1881 1 Huawei 8 Nip6800, Nip6800 Firmware, Oceanstor 5310 and 5 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have have a resource management error vulnerability. An attacker needs to perform specific operations to trigger a function of the affected device. Due to improper resource management of the function, the vulnerability can be exploited to cause service abnormal on affected devices.
CVE-2020-1872 1 Huawei 2 P10 Plus, P10 Plus Firmware 2024-11-21 2.1 LOW 4.6 MEDIUM
Huawei smart phones P10 Plus with versions earlier than 9.1.0.201(C01E75R1P12T8), earlier than 9.1.0.252(C185E2R1P9T8), earlier than 9.1.0.252(C432E4R1P9T8), and earlier than 9.1.0.255(C576E6R1P8T8) have a digital balance bypass vulnerability. When re-configuring the mobile phone at the digital balance mode, an attacker can perform some operations to bypass the startup wizard, and then open some switch. As a result, the digital balance function is bypassed.
CVE-2020-1871 1 Huawei 2 Usg9500, Usg9500 Firmware 2024-11-21 6.4 MEDIUM 8.2 HIGH
USG9500 with software of V500R001C30SPC100; V500R001C30SPC200; V500R001C30SPC600; V500R001C60SPC500; V500R005C00SPC100; V500R005C00SPC200 have an improper credentials management vulnerability. The software does not properly manage certain credentials. Successful exploit could cause information disclosure or damage, and impact the confidentiality or integrity.
CVE-2020-1861 1 Huawei 2 Cloudengine 12800, Cloudengine 12800 Firmware 2024-11-21 2.1 LOW 4.4 MEDIUM
CloudEngine 12800 with versions of V200R001C00SPC600,V200R001C00SPC700,V200R002C01,V200R002C50SPC800,V200R002C50SPC800PWE,V200R003C00SPC810,V200R003C00SPC810PWE,V200R005C00SPC600,V200R005C00SPC800,V200R005C00SPC800PWE,V200R005C10,V200R005C10SPC300 have an information leakage vulnerability in some Huawei products. In some special cases, an authenticated attacker can exploit this vulnerability because the software processes data improperly. Successful exploitation may lead to information leakage.
CVE-2020-1860 1 Huawei 6 Nip6800, Nip6800 Firmware, Secospace Usg6600 and 3 more 2024-11-21 5.0 MEDIUM 7.5 HIGH
NIP6800;Secospace USG6600;USG9500 products with versions of V500R001C30; V500R001C60SPC500; V500R005C00SPC100 have an access control bypass vulnerability. Attackers that can access to the internal network can exploit this vulnerability with careful deployment. Successful exploit may cause the access control to be bypassed, and attackers can directly access the Internet.