# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2020-9465 |
89 |
|
Sql Bypass |
2020-02-28 |
2020-03-04 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
An issue was discovered in EyesOfNetwork eonweb 5.1 through 5.3 before 5.3-3. The eonweb web interface is prone to a SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the user_id field in a cookie. |
2 |
CVE-2020-9463 |
78 |
|
Exec Code |
2020-02-28 |
2020-03-03 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
Centreon 19.10 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the server_ip field in JSON data in an api/internal.php?object=centreon_configuration_remote request. |
3 |
CVE-2020-9449 |
330 |
|
|
2020-02-28 |
2020-03-04 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
An insecure random number generation vulnerability in BlaB! AX, BlaB! AX Pro, BlaB! WS (client), and BlaB! WS Pro (client) version 19.11 allows an attacker (with a guest or user session cookie) to escalate privileges by retrieving the cookie salt value and creating a valid session cookie for an arbitrary user or admin. |
4 |
CVE-2020-9442 |
281 |
|
+Priv |
2020-02-28 |
2020-03-03 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
OpenVPN Connect 3.1.0.361 on Windows has Insecure Permissions for %PROGRAMDATA%\OpenVPN Connect\drivers\tap\amd64\win10, which allows local users to gain privileges by copying a malicious drvstore.dll there. |
5 |
CVE-2020-9434 |
295 |
|
|
2020-02-27 |
2020-02-28 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values. |
6 |
CVE-2020-9433 |
295 |
|
|
2020-02-27 |
2020-02-28 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values. |
7 |
CVE-2020-9432 |
295 |
|
|
2020-02-27 |
2020-02-28 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values. |
8 |
CVE-2020-9406 |
74 |
|
|
2020-02-26 |
2021-07-21 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
IBL Online Weather before 4.3.5a allows unauthenticated eval injection via the queryBCP method of the Auxiliary Service. |
9 |
CVE-2020-9398 |
89 |
|
Sql |
2020-02-25 |
2020-03-03 |
9.3 |
None |
Remote |
Medium |
Not required |
Complete |
Complete |
Complete |
ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection. |
10 |
CVE-2020-9394 |
352 |
|
CSRF |
2020-02-25 |
2020-02-26 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. It allows CSRF. |
11 |
CVE-2020-9374 |
78 |
|
Exec Code |
2020-02-24 |
2022-01-01 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
On TP-Link TL-WR849N 0.9.1 4.16 devices, a remote command execution vulnerability in the diagnostics area can be exploited when an attacker sends specific shell metacharacters to the panel's traceroute feature. |
12 |
CVE-2020-9366 |
787 |
|
Overflow |
2020-02-24 |
2022-01-01 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
A buffer overflow was found in the way GNU Screen before 4.8.0 treated the special escape OSC 49. Specially crafted output, or a special program, could corrupt memory and crash Screen or possibly have unspecified other impact. |
13 |
CVE-2020-9363 |
436 |
|
Bypass |
2020-02-24 |
2022-04-18 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
The Sophos AV parsing engine before 2020-01-14 allows virus-detection bypass via a crafted ZIP archive. This affects Endpoint Protection, Cloud Optix, Mobile, Intercept X Endpoint, Intercept X for Server, and Secure Web Gateway. NOTE: the vendor feels that this does not apply to endpoint-protection products because the virus would be detected upon extraction. |
14 |
CVE-2020-9362 |
436 |
|
Bypass |
2020-02-24 |
2022-04-18 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
The Quick Heal AV parsing engine (November 2019) allows virus-detection bypass via a crafted GPFLAG in a ZIP archive. This affects Total Security, Home Security, Total Security Multi-Device, Internet Security, Total Security for Mac, AntiVirus Pro, AntiVirus for Server, and Total Security for Android. |
15 |
CVE-2020-9355 |
|
|
|
2020-02-23 |
2022-01-01 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
danfruehauf NetworkManager-ssh before 1.2.11 allows privilege escalation because extra options are mishandled. |
16 |
CVE-2020-9354 |
776 |
|
|
2020-02-23 |
2021-07-21 |
6.4 |
None |
Remote |
Low |
Not required |
None |
Partial |
Partial |
An issue was discovered in SmartClient 12.0. The Remote Procedure Call (RPC) saveFile provided by the console functionality on the /tools/developerConsoleOperations.jsp (or /isomorphic/IDACall) URL allows an unauthenticated attacker to overwrite files via vectors involving an XML comment and /.. path traversal. |
17 |
CVE-2020-9352 |
611 |
|
|
2020-02-23 |
2022-04-18 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
An issue was discovered in SmartClient 12.0. Unauthenticated exploitation of blind XXE can occur in the downloadWSDL feature by sending a POST request to /tools/developerConsoleOperations.jsp with a valid payload in the _transaction parameter. |
18 |
CVE-2020-9341 |
352 |
|
CSRF |
2020-02-22 |
2020-02-24 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
CandidATS 2.1.0 is vulnerable to CSRF that allows for an administrator account to be added via the index.php?m=settings&a=addUser URI. |
19 |
CVE-2020-9340 |
89 |
|
Sql |
2020-02-22 |
2020-02-25 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
fauzantrif eLection 2.0 has SQL Injection via the admin/ajax/op_kandidat.php id parameter. |
20 |
CVE-2020-9318 |
89 |
|
Sql |
2020-02-20 |
2020-02-25 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
Red Gate SQL Monitor 9.0.13 through 9.2.14 allows an administrative user to perform a SQL injection attack by configuring the SNMP alert settings in the UI. This is fixed in 9.2.15. |
21 |
CVE-2020-9308 |
787 |
|
|
2020-02-20 |
2022-01-01 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
archive_read_support_format_rar5.c in libarchive before 3.4.2 attempts to unpack a RAR5 file with an invalid or corrupted header (such as a header size of zero), leading to a SIGSEGV or possibly unspecified other impact. |
22 |
CVE-2020-9273 |
416 |
|
Exec Code |
2020-02-20 |
2021-09-14 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution. |
23 |
CVE-2020-9270 |
352 |
|
CSRF |
2020-02-18 |
2020-02-19 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
ICE Hrm 26.2.0 is vulnerable to CSRF that leads to password reset via service.php. |
24 |
CVE-2020-9269 |
89 |
|
Exec Code Sql |
2020-02-18 |
2020-02-20 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
SOPlanning 1.45 is vulnerable to authenticated SQL Injection that leads to command execution via the users parameter, as demonstrated by export_ical.php. |
25 |
CVE-2020-9265 |
89 |
|
Sql |
2020-02-18 |
2020-02-27 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
None |
Partial |
phpMyChat-Plus 1.98 is vulnerable to multiple SQL injections against the deluser.php Delete User functionality, as demonstrated by pmc_username. |
26 |
CVE-2020-9043 |
269 |
|
|
2020-02-17 |
2021-07-21 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
The wpCentral plugin before 1.5.1 for WordPress allows disclosure of the connection key. |
27 |
CVE-2020-9039 |
276 |
|
|
2020-02-22 |
2022-01-01 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Couchbase Server 4.0.0, 4.1.0, 4.1.1, 4.5.0, 4.5.1, 4.6.0 through 4.6.5, 5.0.0, 5.1.1, 5.5.0 and 5.5.1 have Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).The /settings REST endpoint exposed by the projector process is an endpoint that administrators can use for various tasks such as updating configuration and collecting performance profiles. The endpoint was unauthenticated and has been updated to only allow authenticated users to access these administrative APIs. |
28 |
CVE-2020-9033 |
22 |
|
Dir. Trav. |
2020-02-17 |
2020-02-19 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to authlog.php. |
29 |
CVE-2020-9032 |
22 |
|
Dir. Trav. |
2020-02-17 |
2020-02-19 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to kernlog.php. |
30 |
CVE-2020-9031 |
22 |
|
Dir. Trav. |
2020-02-17 |
2020-02-19 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to daemonlog.php. |
31 |
CVE-2020-9030 |
22 |
|
Dir. Trav. |
2020-02-17 |
2020-02-19 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to the syslog.php. |
32 |
CVE-2020-9029 |
22 |
|
Dir. Trav. |
2020-02-17 |
2020-02-19 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to messagelog.php. |
33 |
CVE-2020-9027 |
78 |
|
|
2020-02-17 |
2020-02-19 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the TRACE field of the resource ping.cmd. The NTP-2 device is also affected. |
34 |
CVE-2020-9026 |
78 |
|
|
2020-02-17 |
2020-02-19 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the PING field of the resource ping.cmd. The NTP-2 device is also affected. |
35 |
CVE-2020-9024 |
269 |
|
|
2020-02-17 |
2021-07-21 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
Iteris Vantage Velocity Field Unit 2.3.1 and 2.4.2 devices have world-writable permissions for the /root/cleardata.pl (executed as root by crond) and /root/loadperl.sh (executed as root at boot time) scripts. |
36 |
CVE-2020-9023 |
522 |
|
|
2020-02-17 |
2021-07-21 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Iteris Vantage Velocity Field Unit 2.3.1 and 2.4.2 devices have two users that are not documented and are configured with weak passwords (User bluetooth, password bluetooth; User eclipse, password eclipse). Also, bluetooth is the root password. |
37 |
CVE-2020-9021 |
78 |
|
|
2020-02-17 |
2020-02-20 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
Post Oak AWAM Bluetooth Field Device 7400v2.08.21.2018, 7800SD.2015.1.16, 2011.3, 7400v2.02.01.2019, and 7800SD.2012.12.5 is vulnerable to injections of operating system commands through timeconfig.py via shell metacharacters in the htmlNtpServer parameter. |
38 |
CVE-2020-9020 |
78 |
|
|
2020-02-17 |
2020-02-19 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
Iteris Vantage Velocity Field Unit 2.3.1, 2.4.2, and 3.0 devices allow the injection of OS commands into cgi-bin/timeconfig.py via shell metacharacters in the NTP Server field. |
39 |
CVE-2020-9017 |
74 |
|
|
2020-02-25 |
2021-07-21 |
6.0 |
None |
Remote |
Medium |
??? |
Partial |
Partial |
Partial |
LiteCart through 2.2.1 allows CSV injection via a customer's profile. |
40 |
CVE-2020-9015 |
|
|
Bypass |
2020-02-20 |
2020-06-16 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
** DISPUTED ** Arista DCS-7050QX-32S-R 4.20.9M, DCS-7050CX3-32S-R 4.20.11M, and DCS-7280SRAM-48C6-R 4.22.0.1F devices (and possibly other products) allow attackers to bypass intended TACACS+ shell restrictions via a | character. NOTE: the vendor reports that this is a configuration issue relating to an overly permissive regular expression in the TACACS+ server permitted commands. |
41 |
CVE-2020-9006 |
89 |
|
Exec Code Sql |
2020-02-17 |
2021-07-21 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
The Popup Builder plugin 2.2.8 through 2.6.7.6 for WordPress is vulnerable to SQL injection (in the sgImportPopups function in sg_popup_ajax.php) via PHP Deserialization on attacker-controlled data with the attachmentUrl POST variable. This allows creation of an arbitrary WordPress Administrator account, leading to possible Remote Code Execution because Administrators can run PHP code on Wordpress instances. (This issue has been fixed in the 3.x branch of popup-builder.) |
42 |
CVE-2020-9005 |
787 |
|
DoS Exec Code |
2020-02-17 |
2022-02-07 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
meshsystem.dll in Valve Dota 2 through 2020-02-17 allows remote attackers to achieve code execution or denial of service by creating a gaming server with a crafted map, and inviting a victim to this server. A GetValue call is mishandled. |
43 |
CVE-2020-8990 |
384 |
|
|
2020-02-20 |
2020-02-24 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
Western Digital My Cloud Home before 3.6.0 and ibi before 3.6.0 allow Session Fixation. |
44 |
CVE-2020-8964 |
798 |
|
Bypass |
2020-02-13 |
2020-02-25 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
TimeTools SC7105 1.0.007, SC9205 1.0.007, SC9705 1.0.007, SR7110 1.0.007, SR9210 1.0.007, SR9750 1.0.007, SR9850 1.0.007, T100 1.0.003, T300 1.0.003, and T550 1.0.003 devices allow remote attackers to bypass authentication by placing t3axs=TiMEtOOlsj7G3xMm52wB in a t3.cgi request, aka a "hardcoded cookie." |
45 |
CVE-2020-8963 |
78 |
|
Exec Code |
2020-02-13 |
2020-02-25 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
TimeTools SC7105 1.0.007, SC9205 1.0.007, SC9705 1.0.007, SR7110 1.0.007, SR9210 1.0.007, SR9750 1.0.007, SR9850 1.0.007, T100 1.0.003, T300 1.0.003, and T550 1.0.003 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the t3.cgi srmodel or srtime parameter. |
46 |
CVE-2020-8962 |
787 |
|
Overflow |
2020-02-13 |
2020-02-18 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
A stack-based buffer overflow was found on the D-Link DIR-842 REVC with firmware v3.13B09 HOTFIX due to the use of strcpy for LOGINPASSWORD when handling a POST request to the /MTFWU endpoint. |
47 |
CVE-2020-8955 |
120 |
|
DoS Overflow |
2020-02-12 |
2022-04-18 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode). |
48 |
CVE-2020-8953 |
287 |
|
Bypass |
2020-02-13 |
2020-02-18 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
OpenVPN Access Server 2.8.x before 2.8.1 allows LDAP authentication bypass (except when a user is enrolled in two-factor authentication). |
49 |
CVE-2020-8950 |
59 |
|
|
2020-02-12 |
2020-02-19 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\AMD\PPC\upload and then creating a symbolic link in %PROGRAMDATA%\AMD\PPC\temp that points to an arbitrary folder with an arbitrary file name. |
50 |
CVE-2020-8949 |
78 |
|
Exec Code |
2020-02-12 |
2020-02-25 |
9.0 |
None |
Remote |
Low |
??? |
Complete |
Complete |
Complete |
Gocloud S2A_WL 4.2.7.16471, S2A 4.2.7.17278, S2A 4.3.0.15815, S2A 4.3.0.17193, S3A K2P MTK 4.2.7.16528, S3A 4.3.0.16572, and ISP3000 4.3.0.17190 devices allows remote attackers to execute arbitrary OS commands via shell metacharacters in a ping operation, as demonstrated by the cgi-bin/webui/admin/tools/app_ping/diag_ping/; substring. |