CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In December 2020

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
851 CVE-2020-25612 863 +Priv 2020-12-18 2021-07-21
4.0
None Remote Low ??? Partial None None
The NuPoint Messenger of Mitel MiCollab before 9.2 could allow an attacker with escalated privilege to access user files due to insufficient access control. Successful exploit could potentially allow an attacker to gain access to sensitive information.
852 CVE-2020-25611 79 XSS 2020-12-18 2021-07-21
4.3
None Remote Medium Not required None Partial None
The AWV portal of Mitel MiCollab before 9.2 could allow an attacker to gain access to conference information by sending arbitrary code due to improper input validation, aka XSS. Successful exploitation could allow an attacker to view user conference information.
853 CVE-2020-25610 863 2020-12-18 2021-07-21
5.0
None Remote Low Not required Partial None None
The AWV component of Mitel MiCollab before 9.2 could allow an attacker to gain access to a web conference due to insufficient access control for conference codes.
854 CVE-2020-25609 79 XSS 2020-12-18 2020-12-18
3.5
None Remote Medium ??? None Partial None
The NuPoint Messenger Portal of Mitel MiCollab before 9.2 could allow an authenticated attacker to execute arbitrary scripts due to insufficient input validation, aka XSS. A successful exploit could allow an attacker to view and modify user data.
855 CVE-2020-25608 89 Sql 2020-12-18 2021-07-21
6.5
None Remote Low ??? Partial Partial Partial
The SAS portal of Mitel MiCollab before 9.2 could allow an attacker to access user credentials due to improper input validation, aka SQL Injection.
856 CVE-2020-25606 79 XSS 2020-12-18 2021-07-21
4.3
None Remote Medium Not required None Partial None
The AWV component of Mitel MiCollab before 9.2 could allow an attacker to view system information by sending arbitrary code due to improper input validation, aka XSS.
857 CVE-2020-25507 732 Exec Code 2020-12-28 2021-01-04
7.2
None Local Low Not required Complete Complete Complete
An incorrect permission assignment during the installation script of TeamworkCloud 18.0 thru 19.0 allows a local unprivileged attacker to execute arbitrary code as root. During installation, the user is instructed to set the system enviroment file with world writable permissions (0777 /etc/environment). Any local unprivileged user can execute arbitrary code simply by writing to /etc/environment, which will force all users, including root, to execute arbitrary code during the next login or reboot. In addition, the entire home directory of the twcloud user at /home/twcloud is recursively given world writable permissions. This allows any local unprivileged attacker to execute arbitrary code, as twcloud. This product was previous named Cameo Enterprise Data Warehouse (CEDW).
858 CVE-2020-25499 77 Exec Code 2020-12-09 2021-07-21
9.0
None Remote Low ??? Complete Complete Complete
TOTOLINK A3002RU-V2.0.0 B20190814.1034 allows authenticated remote users to modify the system's 'Run Command'. An attacker can use this functionality to execute arbitrary OS commands on the router.
859 CVE-2020-25495 79 XSS 2020-12-18 2020-12-22
4.3
None Remote Medium Not required None Partial None
A reflected Cross-site scripting (XSS) vulnerability in Xinuo (formerly SCO) Openserver version 5 and 6 allows remote attackers to inject arbitrary web script or HTML tag via the parameter 'section'.
860 CVE-2020-25494 88 Exec Code 2020-12-18 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
Xinuos (formerly SCO) Openserver v5 and v6 allows attackers to execute arbitrary commands via shell metacharacters in outputform or toclevels parameter to cgi-bin/printbook.
861 CVE-2020-25465 476 DoS XSS 2020-12-04 2020-12-04
5.0
None Remote Low Not required None None Partial
Null Pointer Dereference. in xObjectBindingFromExpression at moddable/xs/sources/xsSyntaxical.c:3419 in Moddable SDK before OS200908 causes a denial of service (SEGV).
862 CVE-2020-25464 787 Overflow 2020-12-04 2020-12-04
5.0
None Remote Low Not required None None Partial
Heap buffer overflow at moddable/xs/sources/xsDebug.c in Moddable SDK before before 20200903. The top stack frame is only partially initialized because the stack overflowed while creating the frame. This leads to a crash in the code sending the stack frame to the debugger.
863 CVE-2020-25463 DoS 2020-12-04 2020-12-04
5.0
None Remote Low Not required None None Partial
Invalid Memory Access in fxUTF8Decode at moddable/xs/sources/xsCommon.c:916 in Moddable SDK before OS200908 causes a denial of service (SEGV).
864 CVE-2020-25462 787 Overflow XSS 2020-12-04 2020-12-04
7.5
None Remote Low Not required Partial Partial Partial
Heap buffer overflow in the fxCheckArrowFunction function at moddable/xs/sources/xsSyntaxical.c:3562 in Moddable SDK before OS200903.
865 CVE-2020-25461 DoS 2020-12-04 2020-12-04
5.0
None Remote Low Not required None None Partial
Invalid Memory Access in the fxProxyGetter function in moddable/xs/sources/xsProxy.c in Moddable SDK before OS200908 causes a denial of service (SEGV).
866 CVE-2020-25449 79 XSS 2020-12-04 2020-12-07
3.5
None Remote Medium ??? None Partial None
Cross Site Scripting (XSS) vulnerability in Arachnys Cabot 0.11.12 can be exploited via the Address column.
867 CVE-2020-25266 494 2020-12-02 2020-12-07
4.3
None Remote Medium Not required None Partial None
AppImage appimaged before 1.0.3 does not properly check whether a downloaded file is a valid appimage. For example, it will accept a crafted mp3 file that contains an appimage, and install it.
868 CVE-2020-25265 2020-12-02 2020-12-08
4.3
None Remote Medium Not required None Partial None
AppImage libappimage before 1.0.3 allows attackers to trigger an overwrite of a system-installed .desktop file by providing a .desktop file that contains Name= with path components.
869 CVE-2020-25235 522 2020-12-14 2020-12-16
5.0
None Remote Low Not required Partial None None
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The password used for authentication for the LOGO! Website and the LOGO! Access Tool is sent in a recoverable format. An attacker with access to the network traffic could derive valid logins.
870 CVE-2020-25234 321 2020-12-14 2020-12-16
3.6
None Local Low Not required Partial Partial None
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The LOGO! program files generated and used by the affected components offer the possibility to save user-defined functions (UDF) in a password protected way. This protection is implemented in the software that displays the information. An attacker could reverse engineer the UDFs directly from stored program files.
871 CVE-2020-25233 321 2020-12-14 2020-12-16
2.1
None Local Low Not required Partial None None
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The firmware update of affected devices contains the private RSA key that is used as a basis for encryption of communication with the device.
872 CVE-2020-25232 327 2020-12-14 2020-12-16
5.0
None Remote Low Not required Partial None None
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Due to the usage of an insecure random number generation function and a deprecated cryptographic function, an attacker could extract the key that is used when communicating with an affected device on port 8080/tcp.
873 CVE-2020-25231 321 2020-12-14 2020-12-16
2.1
None Local Low Not required Partial None None
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The encryption of program data for the affected devices uses a static key. An attacker could use this key to extract confidential information from protected program files.
874 CVE-2020-25230 327 2020-12-14 2020-12-16
5.0
None Remote Low Not required Partial None None
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). Due to the usage of an outdated cipher mode on port 10005/tcp, an attacker could extract the encryption key from a captured communication with the device.
875 CVE-2020-25229 798 2020-12-14 2022-04-25
5.0
None Remote Low Not required None Partial None
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The implemented encryption for communication with affected devices is prone to replay attacks due to the usage of a static key. An attacker could change the password or change the configuration on any affected device if using prepared messages that were generated for another device.
876 CVE-2020-25228 306 2020-12-14 2020-12-16
10.0
None Remote Low Not required Complete Complete Complete
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). A service available on port 10005/tcp of the affected devices could allow complete access to all services without authorization. An attacker could gain full control over an affected device, if he has access to this service. The system manual recommends to protect access to this port.
877 CVE-2020-25199 787 Exec Code Overflow 2020-12-09 2020-12-16
6.8
None Remote Medium Not required Partial Partial Partial
A heap-based buffer overflow vulnerability exists within the WECON LeviStudioU Release Build 2019-09-21 and prior when processing project files. Opening a specially crafted project file could allow an attacker to exploit and execute code under the privileges of the application.
878 CVE-2020-25198 384 2020-12-23 2020-12-23
6.8
None Remote Medium Not required Partial Partial Partial
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has incorrectly implemented protections from session fixation, which may allow an attacker to gain access to a session and hijack it by stealing the user’s cookies.
879 CVE-2020-25196 307 Bypass 2020-12-23 2020-12-23
5.0
None Remote Low Not required Partial None None
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows SSH/Telnet sessions, which may be vulnerable to brute force attacks to bypass authentication.
880 CVE-2020-25195 20 Bypass 2020-12-15 2020-12-18
7.8
None Remote Low Not required None None Complete
The length of the input fields of Host Engineering H0-ECOM100, H2-ECOM100, and H4-ECOM100 modules are verified only on the client side when receiving input from the configuration web server, which may allow an attacker to bypass the check and send input to crash the device.
881 CVE-2020-25194 269 2020-12-23 2021-09-23
6.5
None Remote Low ??? Partial Partial Partial
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has improper privilege management, which may allow an attacker with user privileges to perform requests with administrative privileges.
882 CVE-2020-25192 200 +Info 2020-12-23 2021-09-23
5.0
None Remote Low Not required Partial None None
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows sensitive information to be displayed without proper authorization.
883 CVE-2020-25191 732 2020-12-11 2020-12-14
7.8
None Remote Low Not required None None Complete
Incorrect permissions are set by default for an API entry-point of a specific service, allowing a non-authenticated user to trigger a function that could reboot the CompactRIO (Driver versions prior to 20.5) remotely.
884 CVE-2020-25190 319 2020-12-23 2020-12-23
5.0
None Remote Low Not required Partial None None
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower stores and transmits the credentials of third-party services in cleartext.
885 CVE-2020-25187 787 Exec Code Overflow 2020-12-14 2020-12-15
10.0
None Remote Low Not required Complete Complete Complete
Medtronic MyCareLink Smart 25000 all versions are vulnerable when an attacker who gains auth runs a debug command, which is sent to the reader causing heap overflow in the MCL Smart Reader stack. A heap overflow allows attacker to remotely execute code on the MCL Smart Reader, could lead to control of device.
886 CVE-2020-25183 287 Bypass 2020-12-14 2020-12-15
5.8
None Local Network Low Not required Partial Partial Partial
Medtronic MyCareLink Smart 25000 all versions contain an authentication protocol vuln where the method used to auth between MCL Smart Patient Reader and MyCareLink Smart mobile app is vulnerable to bypass. This vuln allows attacker to use other mobile device or malicious app on smartphone to auth to the patient’s Smart Reader, fools the device into thinking its communicating with the actual smart phone application when executed in range of Bluetooth.
887 CVE-2020-25181 125 Exec Code Overflow 2020-12-01 2020-12-02
6.8
None Remote Medium Not required Partial Partial Partial
WECON PLC Editor Versions 1.3.8 and prior has a heap-based buffer overflow vulnerabilities have been identified that may allow arbitrary code execution.
888 CVE-2020-25179 200 +Info 2020-12-14 2021-09-23
7.5
None Remote Low Not required Partial Partial Partial
GE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.
889 CVE-2020-25177 787 Exec Code Overflow 2020-12-01 2020-12-02
6.8
None Remote Medium Not required Partial Partial Partial
WECON PLC Editor Versions 1.3.8 and prior has a stack-based buffer overflow vulnerability has been identified that may allow arbitrary code execution.
890 CVE-2020-25175 522 2020-12-14 2020-12-15
5.0
None Remote Low Not required Partial None None
GE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.
891 CVE-2020-25153 521 2020-12-23 2020-12-23
5.0
None Remote Low Not required Partial None None
The built-in web service for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower does not require users to have strong passwords.
892 CVE-2020-25112 787 Exec Code 2020-12-11 2020-12-14
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in the IPv6 stack in Contiki through 3.0. There are inconsistent checks for IPv6 header extension lengths. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.
893 CVE-2020-25111 787 Exec Code 2020-12-11 2020-12-15
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in the IPv6 stack in Contiki through 3.0. There is an insufficient check for the IPv6 header length. This leads to Denial-of-Service and potential Remote Code Execution via a crafted ICMPv6 echo packet.
894 CVE-2020-25110 125 Exec Code 2020-12-11 2020-12-15
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The length byte of a domain name in a DNS query/response is not checked, and is used for internal memory operations. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
895 CVE-2020-25109 125 Exec Code 2020-12-11 2020-12-15
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The number of DNS queries/responses (set in a DNS header) is not checked against the data present. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
896 CVE-2020-25108 787 Exec Code 2020-12-11 2020-12-15
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. The DNS response data length is not checked (it can be set to an arbitrary value from a packet). This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
897 CVE-2020-25107 125 Exec Code 2020-12-11 2020-12-15
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in the DNS implementation in Ethernut in Nut/OS 5.1. There is no check on whether a domain name has '\0' termination. This may lead to successful Denial-of-Service, and possibly Remote Code Execution.
898 CVE-2020-25106 434 2020-12-22 2021-07-21
9.3
None Remote Medium Not required Complete Complete Complete
Nanosystems SupRemo 4.1.3.2348 allows attackers to obtain LocalSystem access because File Manager can be used to rename Supremo.exe and then upload a Trojan horse with the Supremo.exe filename.
899 CVE-2020-25096 2020-12-17 2020-12-21
6.5
None Remote Low ??? Partial Partial Partial
LogRhythm Platform Manager (PM) 7.4.9 has Incorrect Access Control. Users within LogRhythm can be delegated different roles and privileges, intended to limit what data and services they can interact with. However, no access control is enforced for WebSocket-based communication to the PM application server, which will forward requests to any configured back-end server, regardless of whether the user's access rights should permit this. As a result, even the most low-privileged user can interact with any back-end component that has a LogRhythm agent installed.
900 CVE-2020-25095 352 Exec Code CSRF 2020-12-17 2020-12-21
6.8
None Remote Medium Not required Partial Partial Partial
LogRhythm Platform Manager (PM) 7.4.9 allows CSRF. The Web interface is vulnerable to Cross-site WebSocket Hijacking (CSWH). If a logged-in PM user visits a malicious site in the same browser session, that site can perform a CSRF attack to create a WebSocket from the victim client to the vulnerable PM server. Once the socket is created, the malicious site can interact with the vulnerable web server in the context of the logged-in user. This can include WebSocket payloads that result in command execution.
Total number of vulnerabilities : 1530   Page : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 (This Page)19 20 21 22 23 24 25 26 27 28 29 30 31
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.