CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In October 2020

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
451 CVE-2020-16889 200 +Info 2020-10-16 2021-07-21
2.1
None Local Low Not required Partial None None
An information disclosure vulnerability exists when the Windows KernelStream improperly handles objects in memory, aka 'Windows KernelStream Information Disclosure Vulnerability'.
452 CVE-2020-16887 269 2020-10-16 2021-07-21
4.6
None Local Low Not required Partial Partial Partial
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.
453 CVE-2020-16886 Bypass 2020-10-16 2020-10-21
7.2
None Local Low Not required Complete Complete Complete
A security feature bypass vulnerability exists in the PowerShellGet V2 module, aka 'PowerShellGet Module WDAC Security Feature Bypass Vulnerability'.
454 CVE-2020-16885 269 2020-10-16 2021-07-21
4.6
None Local Low Not required Partial Partial Partial
An elevation of privilege vulnerability exists when the Windows Storage VSP Driver improperly handles file operations, aka 'Windows Storage VSP Driver Elevation of Privilege Vulnerability'.
455 CVE-2020-16877 269 2020-10-16 2021-07-21
3.6
None Local Low Not required None Partial Partial
An elevation of privilege vulnerability exists when Microsoft Windows improperly handles reparse points, aka 'Windows Elevation of Privilege Vulnerability'.
456 CVE-2020-16876 269 2020-10-16 2021-07-21
4.6
None Local Low Not required Partial Partial Partial
An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations, aka 'Windows Application Compatibility Client Library Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-16920.
457 CVE-2020-16863 DoS 2020-10-16 2020-10-21
7.8
None Remote Low Not required None None Complete
A denial of service vulnerability exists in Windows Remote Desktop Service when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Service Denial of Service Vulnerability'.
458 CVE-2020-16844 Bypass 2020-10-01 2020-10-15
4.9
None Remote Medium ??? Partial Partial None
In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy.
459 CVE-2020-16270 79 Exec Code XSS 2020-10-16 2020-10-21
4.3
None Remote Medium Not required None Partial None
OLIMPOKS under 3.3.39 allows Auth/Admin ErrorMessage XSS. Remote Attacker can use discovered vulnerability to inject malicious JavaScript payload to victim’s browsers in context of vulnerable applications. Executed code can be used to steal administrator’s cookies, influence HTML content of targeted application and perform phishing-related attacks. Vulnerable application used in more than 3000 organizations in different sectors from retail to industries.
460 CVE-2020-16267 89 Sql 2020-10-06 2020-10-14
6.5
None Remote Low ??? Partial Partial Partial
Zoho ManageEngine Applications Manager version 14740 and prior allows an authenticated SQL Injection via a crafted jsp request in the RCA module.
461 CVE-2020-16263 668 2020-10-28 2020-11-03
6.4
None Remote Low Not required Partial Partial None
Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins.
462 CVE-2020-16262 732 2020-10-28 2021-07-21
7.2
None Local Low Not required Complete Complete Complete
Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation.
463 CVE-2020-16261 732 2020-10-28 2021-07-21
7.2
None Local Low Not required Complete Complete Complete
Winston 1.5.4 devices allow a U-Boot interrupt, resulting in local root access.
464 CVE-2020-16260 862 2020-10-28 2020-11-04
5.0
None Remote Low Not required None Partial None
Winston 1.5.4 devices do not enforce authorization. This is exploitable from the intranet, and can be combined with other vulnerabilities for remote exploitation.
465 CVE-2020-16259 732 2020-10-28 2021-07-21
10.0
None Remote Low Not required Complete Complete Complete
Winston 1.5.4 devices have an SSH user account with access from bastion hosts. This is undocumented in device documents and is not announced to the user.
466 CVE-2020-16258 798 2020-10-28 2020-11-04
5.6
None Local Low Not required Partial None Complete
Winston 1.5.4 devices make use of a Monit service (not managed during the normal user process) which is configured with default credentials.
467 CVE-2020-16257 77 2020-10-28 2021-07-21
10.0
None Remote Low Not required Complete Complete Complete
Winston 1.5.4 devices are vulnerable to command injection via the API.
468 CVE-2020-16256 352 CSRF 2020-10-28 2020-11-03
9.3
None Remote Medium Not required Complete Complete Complete
The API on Winston 1.5.4 devices is vulnerable to CSRF.
469 CVE-2020-16246 79 XSS 2020-10-20 2020-11-16
4.3
None Remote Medium Not required None Partial None
The affected Reason S20 Ethernet Switch is vulnerable to cross-site scripting (XSS), which may allow attackers to trick users into following a link or navigating to a page that posts a malicious JavaScript statement to the vulnerable site, causing the malicious JavaScript to be rendered by the site and executed by the victim client.
470 CVE-2020-16226 342 Exec Code 2020-10-05 2020-10-22
7.5
None Remote Low Not required Partial Partial Partial
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.
471 CVE-2020-16161 369 2020-10-19 2020-10-29
5.0
None Remote Low Not required None None Partial
GoPro gpmf-parser 1.5 has a division-by-zero vulnerability in GPMF_ScaledData(). Parsing malicious input can result in a crash.
472 CVE-2020-16160 369 2020-10-19 2020-10-29
5.0
None Remote Low Not required None None Partial
GoPro gpmf-parser 1.5 has a division-by-zero vulnerability in GPMF_Decompress(). Parsing malicious input can result in a crash.
473 CVE-2020-16159 125 2020-10-19 2020-10-29
6.4
None Remote Low Not required Partial None Partial
GoPro gpmf-parser 1.5 has a heap out-of-bounds read and segfault in GPMF_ScaledData(). Parsing malicious input can result in a crash or information disclosure.
474 CVE-2020-16158 787 Exec Code 2020-10-19 2020-10-22
6.8
None Remote Medium Not required Partial Partial Partial
GoPro gpmf-parser through 1.5 has a stack out-of-bounds write vulnerability in GPMF_ExpandComplexTYPE(). Parsing malicious input can result in a crash or potentially arbitrary code execution.
475 CVE-2020-16140 79 XSS 2020-10-27 2020-10-30
4.3
None Remote Medium Not required None Partial None
The search functionality of the Greenmart theme 2.4.2 for WordPress is vulnerable to XSS.
476 CVE-2020-16124 190 Overflow 2020-10-13 2020-10-22
7.5
None Remote Low Not required Partial Partial Partial
Integer Overflow or Wraparound vulnerability in the XML RPC library of OpenRobotics ros_comm communications packages allows unauthenticated network traffic to cause unexpected behavior. This issue affects: OpenRobotics ros_comm communications packages Noetic and prior versions. Fixed in https://github.com/ros/ros_comm/pull/2065.
477 CVE-2020-15931 294 2020-10-20 2021-07-21
5.0
None Remote Low Not required Partial None None
Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a Domain Controller.
478 CVE-2020-15927 89 Sql 2020-10-06 2020-10-14
6.5
None Remote Low ??? Partial Partial Partial
Zoho ManageEngine Applications Manager version 14740 and prior allows an authenticated SQL Injection via a crafted jsp request in the SAP module.
479 CVE-2020-15910 732 2020-10-19 2020-10-29
4.3
None Remote Medium Not required Partial None None
SolarWinds N-Central version 12.3 GA and lower does not set the JSESSIONID attribute to HTTPOnly. This makes it possible to influence the cookie with javascript. An attacker could send the user to a prepared webpage or by influencing JavaScript to the extract the JESSIONID. This could then be forwarded to the attacker.
480 CVE-2020-15909 384 +Priv 2020-10-19 2020-10-29
6.8
None Remote Medium Not required Partial Partial Partial
SolarWinds N-central through 2020.1 allows session hijacking and requires user interaction or physical access. The N-Central JSESSIONID cookie attribute is not checked against multiple sources such as sourceip, MFA claim, etc. as long as the victim stays logged in within N-Central. To take advantage of this, cookie could be stolen and the JSESSIONID can be captured. On its own this is not a surprising result; low security tools allow the cookie to roam from machine to machine. The JSESSION cookie can then be used on the attackers’ workstation by browsing to the victim’s NCentral server URL and replacing the JSESSIONID attribute value by the captured value. Expected behavior would be to check this against a second source and enforce at least a reauthentication or multi factor request as N-Central is a highly privileged service.
481 CVE-2020-15906 307 2020-10-22 2020-11-03
7.5
None Remote Low Not required Partial Partial Partial
tiki-login.php in Tiki before 21.2 sets the admin password to a blank value after 50 invalid login attempts.
482 CVE-2020-15897 2020-10-26 2020-11-02
5.0
None Remote Low Not required None None Partial
Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause traffic loss or incorrect forwarding of traffic via a malformed link-state PDU to the IS-IS router.
483 CVE-2020-15867 Exec Code 2020-10-16 2022-04-26
6.5
None Remote Low ??? Partial Partial Partial
The git hook feature in Gogs 0.5.5 through 0.12.2 allows for authenticated remote code execution. There can be a privilege escalation if access to this hook feature is granted to a user who does not have administrative privileges. NOTE: because this is mentioned in the documentation but not in the UI, it could be considered a "Product UI does not Warn User of Unsafe Actions" issue.
484 CVE-2020-15838 287 2020-10-09 2021-07-21
6.5
None Remote Low ??? Partial Partial Partial
The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.
485 CVE-2020-15822 918 2020-10-19 2020-10-22
7.5
None Remote Low Not required Partial Partial Partial
In JetBrains YouTrack before 2020.2.10514, SSRF is possible because URL filtering can be escaped.
486 CVE-2020-15797 269 2020-10-13 2020-10-28
7.2
None Local Low Not required Complete Complete Complete
A vulnerability has been identified in DCA Vantage Analyzer (All versions < V4.5 are affected by CVE-2020-7590. In addition, serial numbers < 40000 running software V4.4.0 are also affected by CVE-2020-15797). Improper Access Control could allow an unauthenticated attacker to escape from the restricted environment (“kiosk mode”) and access the underlying operating system. Successful exploitation requires direct physical access to the system.
487 CVE-2020-15794 209 2020-10-15 2021-11-18
4.0
None Remote Low ??? Partial None None
A vulnerability has been identified in Desigo Insight (All versions). Some error messages in the web application show the absolute path to the requested resource. This could allow an authenticated attacker to retrieve additional information about the host system.
488 CVE-2020-15793 1021 2020-10-15 2020-10-21
5.8
None Remote Medium Not required Partial Partial None
A vulnerability has been identified in Desigo Insight (All versions). The device does not properly set the X-Frame-Options HTTP Header which makes it vulnerable to Clickjacking attacks. This could allow an unauthenticated attacker to retrieve or modify data in the context of a legitimate user by tricking that user to click on a website controlled by the attacker.
489 CVE-2020-15792 89 Sql 2020-10-15 2022-06-15
4.0
None Remote Low ??? Partial None None
A vulnerability has been identified in Desigo Insight (All versions). The web service does not properly apply input validation for some query parameters in a reserved area. This could allow an authenticated attacker to retrieve data via a content-based blind SQL injection attack.
490 CVE-2020-15703 22 Dir. Trav. 2020-10-31 2020-11-17
2.1
None Local Low Not required Partial None None
There is no input validation on the Locale property in an apt transaction. An unprivileged user can supply a full path to a writable directory, which lets aptd read a file as root. Having a symlink in place results in an error message if the file exists, and no error otherwise. This way an unprivileged user can check for the existence of any files on the system as root.
491 CVE-2020-15684 Mem. Corr. 2020-10-22 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
Mozilla developers reported memory safety bugs present in Firefox 81. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 82.
492 CVE-2020-15683 787 Mem. Corr. 2020-10-22 2022-04-28
7.5
None Remote Low Not required Partial Partial Partial
Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.4, Firefox < 82, and Thunderbird < 78.4.
493 CVE-2020-15682 346 2020-10-22 2020-10-30
4.3
None Remote Medium Not required None Partial None
When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing attack. This was fixed by changing external protocol prompts to be tab-modal while also ensuring they could not be incorrectly associated with a different origin. This vulnerability affects Firefox < 82.
494 CVE-2020-15681 2020-10-22 2020-10-30
5.0
None Remote Low Not required None None Partial
When multiple WASM threads had a reference to a module, and were looking up exported functions, one WASM thread could have overwritten another's entry in a shared stub table, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 82.
495 CVE-2020-15680 2020-10-22 2020-10-30
5.0
None Remote Low Not required Partial None None
If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82.
496 CVE-2020-15678 416 2020-10-01 2020-11-02
6.8
None Remote Medium Not required Partial Partial Partial
When recursing through graphical layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free. This occurs because the function APZCTreeManager::ComputeClippedCompositionBounds did not follow iterator invalidation rules. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.
497 CVE-2020-15677 601 2020-10-01 2020-11-02
5.8
None Remote Medium Not required Partial Partial None
By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.
498 CVE-2020-15676 79 XSS 2020-10-01 2020-11-02
4.3
None Remote Medium Not required None Partial None
Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.
499 CVE-2020-15675 120 Mem. Corr. 2020-10-01 2021-07-21
6.8
None Remote Medium Not required Partial Partial Partial
When processing surfaces, the lifetime may outlive a persistent buffer leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 81.
500 CVE-2020-15674 763 Mem. Corr. 2020-10-01 2021-07-21
6.8
None Remote Medium Not required Partial Partial Partial
Mozilla developers reported memory safety bugs present in Firefox 80. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 81.
Total number of vulnerabilities : 1563   Page : 1 2 3 4 5 6 7 8 9 10 (This Page)11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.