# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1101 |
CVE-2020-6374 |
125 |
|
|
2020-10-15 |
2021-07-21 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated Jupiter Tessallation(.jt) file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. |
1102 |
CVE-2020-6373 |
787 |
|
|
2020-10-15 |
2021-07-21 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PDF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. |
1103 |
CVE-2020-6372 |
787 |
|
|
2020-10-15 |
2021-07-21 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PDF file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. |
1104 |
CVE-2020-6371 |
200 |
|
+Info |
2020-10-15 |
2021-07-21 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
User enumeration vulnerability can be exploited to get a list of user accounts and personal user information can be exposed in SAP NetWeaver Application Server ABAP (POWL test application) versions - 710, 711, 730, 731, 740, 750, leading to Information Disclosure. |
1105 |
CVE-2020-6370 |
79 |
|
XSS |
2020-10-20 |
2020-10-22 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
SAP NetWeaver Design Time Repository (DTR), versions - 7.11, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. |
1106 |
CVE-2020-6369 |
|
|
Bypass |
2020-10-20 |
2021-06-17 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an unauthenticated attackers to bypass the authentication if the default passwords for Admin and Guest have not been changed by the administrator.This may impact the confidentiality of the service. |
1107 |
CVE-2020-6368 |
79 |
|
XSS +Info |
2020-10-15 |
2020-10-19 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
SAP Business Planning and Consolidation, versions - 750, 751, 752, 753, 754, 755, 810, 100, 200, can be abused by an attacker, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users, leading to Cross Site Scripting. |
1108 |
CVE-2020-6367 |
79 |
|
XSS |
2020-10-20 |
2020-10-22 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
There is a reflected cross site scripting vulnerability in SAP NetWeaver Composite Application Framework, versions - 7.20, 7.30, 7.31, 7.40, 7.50. An unauthenticated attacker can trick an unsuspecting authenticated user to click on a malicious link. The end users browser has no way to know that the script should not be trusted, and will execute the script, resulting in sensitive information being disclosed or modified. |
1109 |
CVE-2020-6366 |
20 |
|
|
2020-10-20 |
2020-10-22 |
5.5 |
None |
Remote |
Low |
??? |
Partial |
None |
Partial |
SAP NetWeaver (Compare Systems) versions - 7.20, 7.30, 7.40, 7.50, does not sufficiently validate uploaded XML documents. An attacker with administrative privileges can retrieve arbitrary files including files on OS level from the server and/or can execute a denial-of-service. |
1110 |
CVE-2020-6365 |
601 |
|
|
2020-10-15 |
2021-04-12 |
5.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
None |
SAP NetWeaver AS Java, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, Start Page allows an unauthenticated remote attacker to redirect users to a malicious site due to insufficient reverse tabnabbing URL validation. The attacker could execute phishing attacks to steal credentials of the victim or to redirect users to untrusted web pages containing malware or similar malicious exploits. |
1111 |
CVE-2020-6364 |
78 |
|
Exec Code |
2020-10-15 |
2021-06-17 |
10.0 |
None |
Remote |
Low |
Not required |
Complete |
Complete |
Complete |
SAP Solution Manager and SAP Focused Run (update provided in WILY_INTRO_ENTERPRISE 9.7, 10.1, 10.5, 10.7), allows an attacker to modify a cookie in a way that OS commands can be executed and potentially gain control over the host running the CA Introscope Enterprise Manager,leading to Code Injection. With this, the attacker is able to read and modify all system files and also impact system availability. |
1112 |
CVE-2020-6363 |
613 |
|
|
2020-10-15 |
2020-10-19 |
4.9 |
None |
Remote |
Medium |
??? |
Partial |
Partial |
None |
SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, exposes several web applications that maintain sessions with a user. These sessions are established after the user has authenticated with username/passphrase credentials. The user can change their own passphrase, but this does not invalidate active sessions that the user may have with SAP Commerce Cloud web applications, which gives an attacker the opportunity to reuse old session credentials, resulting in Insufficient Session Expiration. |
1113 |
CVE-2020-6362 |
863 |
|
|
2020-10-20 |
2020-10-22 |
6.8 |
None |
Remote |
Low |
??? |
None |
None |
Complete |
SAP Banking Services version 500, use an incorrect authorization object in some of its reports. Although the affected reports are protected with otherauthorization objects, exploitation of the vulnerability could lead to privilege escalation and violation in segregation of duties, which in turn could lead to Service interruptions and system unavailability for the victim and users of the component. |
1114 |
CVE-2020-6323 |
79 |
|
XSS |
2020-10-15 |
2020-10-19 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
SAP NetWeaver Enterprise Portal (Fiori Framework Page) versions - 7.50, 7.31, 7.40, does not sufficiently encode user-controlled inputs and allows an attacker on a valid session to create an XSS that will be both reflected immediately and also be persisted and returned in further access to the system, resulting in Cross Site Scripting. |
1115 |
CVE-2020-6319 |
79 |
|
XSS |
2020-10-15 |
2020-10-19 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
Partial |
None |
SAP NetWeaver Application Server Java, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 allows an unauthenticated attacker to include JavaScript blocks in any web page or URL with different symbols which are otherwise not allowed. On successful exploitation an attacker can steal authentication information of the user, such as data relating to his or her current session and limitedly impact confidentiality and integrity of the application, leading to Reflected Cross Site Scripting. |
1116 |
CVE-2020-6315 |
|
|
+Info |
2020-10-20 |
2020-10-22 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
SAP 3D Visual Enterprise Viewer, version 9, allows an attacker to send certain manipulated file to the victim, which can lead to leakage of sensitive information when the victim loads the malicious file into the VE viewer, leading to Information Disclosure. |
1117 |
CVE-2020-6308 |
918 |
|
Bypass File Inclusion |
2020-10-20 |
2020-10-22 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure and gather information for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to perform malicious requests, resulting in a Server-Side Request Forgery vulnerability. |
1118 |
CVE-2020-6272 |
79 |
|
XSS |
2020-10-15 |
2020-10-19 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
SAP Commerce Cloud versions - 1808, 1811, 1905, 2005, does not sufficiently encode user inputs, which allows an authenticated and authorized content manager to inject malicious script into several web CMS components. These can be saved and later triggered, if an affected web page is visited, resulting in Cross-Site Scripting (XSS) vulnerability. |
1119 |
CVE-2020-6108 |
787 |
|
Exec Code Overflow |
2020-10-15 |
2022-05-12 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
An exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability. |
1120 |
CVE-2020-6107 |
125 |
|
|
2020-10-15 |
2022-05-12 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
An exploitable information disclosure vulnerability exists in the dev_read functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause an uninitialized read resulting in an information disclosure. An attacker can provide a malicious file to trigger this vulnerability. |
1121 |
CVE-2020-6106 |
125 |
|
|
2020-10-15 |
2022-05-12 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
An exploitable information disclosure vulnerability exists in the init_node_manager functionality of F2fs-Tools F2fs.Fsck 1.12 and 1.13. A specially crafted filesystem can be used to disclose information. An attacker can provide a malicious file to trigger this vulnerability. |
1122 |
CVE-2020-6105 |
610 |
|
Exec Code |
2020-10-15 |
2022-05-12 |
6.8 |
None |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability. |
1123 |
CVE-2020-6104 |
125 |
|
|
2020-10-15 |
2022-05-12 |
4.3 |
None |
Remote |
Medium |
Not required |
Partial |
None |
None |
An exploitable information disclosure vulnerability exists in the get_dnode_of_data functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause information disclosure resulting in a information disclosure. An attacker can provide a malicious file to trigger this vulnerability. |
1124 |
CVE-2020-6087 |
120 |
|
DoS |
2020-10-14 |
2022-04-28 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability If the ANSI Extended Symbol Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required. |
1125 |
CVE-2020-6086 |
120 |
|
DoS |
2020-10-14 |
2022-04-28 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
An exploitable denial of service vulnerability exists in the ENIP Request Path Data Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.If the Simple Segment Sub-Type is supplied, the device treats the byte following as the Data Size in words. When this value represents a size greater than what remains in the packet data, the device enters a fault state where communication with the device is lost and a physical power cycle is required. |
1126 |
CVE-2020-6085 |
120 |
|
DoS |
2020-10-19 |
2022-04-28 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability by sending an Electronic Key Segment with less than 0x18 bytes following the Key Format field. |
1127 |
CVE-2020-6084 |
|
|
DoS |
2020-10-19 |
2022-04-28 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability by sending an Electronic Key Segment with less bytes than required by the Key Format Table. |
1128 |
CVE-2020-6083 |
120 |
|
DoS |
2020-10-14 |
2022-04-28 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
An exploitable denial of service vulnerability exists in the ENIP Request Path Port Segment functionality of Allen-Bradley Flex IO 1794-AENT/B. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability. |
1129 |
CVE-2020-6023 |
|
|
|
2020-10-27 |
2020-10-27 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware. |
1130 |
CVE-2020-6022 |
|
|
|
2020-10-27 |
2020-10-27 |
3.6 |
None |
Local |
Low |
Not required |
None |
Partial |
Partial |
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware. |
1131 |
CVE-2020-5991 |
125 |
|
DoS Exec Code |
2020-10-30 |
2020-11-13 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
NVIDIA CUDA Toolkit, all versions prior to 11.1.1, contains a vulnerability in the NVJPEG library in which an out-of-bounds read or write operation may lead to code execution, denial of service, or information disclosure. |
1132 |
CVE-2020-5990 |
|
|
DoS Exec Code |
2020-10-23 |
2020-10-27 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure. |
1133 |
CVE-2020-5989 |
476 |
|
DoS |
2020-10-02 |
2020-10-13 |
2.1 |
None |
Local |
Low |
Not required |
None |
None |
Partial |
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which it can dereference a NULL pointer, which may lead to denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. |
1134 |
CVE-2020-5988 |
416 |
|
DoS |
2020-10-02 |
2021-07-21 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
None |
Partial |
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which allocated memory can be freed twice, which may lead to information disclosure or denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. |
1135 |
CVE-2020-5987 |
459 |
|
DoS |
2020-10-02 |
2020-10-13 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which guest-supplied parameters remain writable by the guest after the plugin has validated them, which may lead to the guest being able to pass invalid parameters to plugin handlers, which may lead to denial of service or escalation of privileges. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. |
1136 |
CVE-2020-5986 |
20 |
|
DoS |
2020-10-02 |
2020-10-13 |
2.1 |
None |
Local |
Low |
Not required |
None |
None |
Partial |
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data size is not validated, which may lead to tampering or denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. |
1137 |
CVE-2020-5985 |
20 |
|
DoS |
2020-10-02 |
2020-10-14 |
3.6 |
None |
Local |
Low |
Not required |
None |
Partial |
Partial |
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, in which an input data length is not validated, which may lead to tampering or denial of service. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. |
1138 |
CVE-2020-5984 |
416 |
|
DoS Exec Code |
2020-10-02 |
2020-10-14 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin in which it may have the use-after-free vulnerability while freeing some resources, which may lead to denial of service, code execution, and information disclosure. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. |
1139 |
CVE-2020-5983 |
787 |
|
DoS |
2020-10-02 |
2020-10-14 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
None |
Partial |
NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin and the host driver kernel module, in which the potential exists to write to a memory location that is outside the intended boundary of the frame buffer memory allocated to guest operating systems, which may lead to denial of service or information disclosure. This affects vGPU version 8.x (prior to 8.5), version 10.x (prior to 10.4) and version 11.0. |
1140 |
CVE-2020-5982 |
770 |
|
DoS |
2020-10-02 |
2020-10-09 |
2.1 |
None |
Local |
Low |
Not required |
None |
None |
Partial |
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) scheduler, in which the software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests, which may lead to denial of service. |
1141 |
CVE-2020-5981 |
787 |
|
DoS Exec Code |
2020-10-02 |
2020-10-09 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the DirectX11 user mode driver (nvwgf2um/x.dll), in which a specially crafted shader can cause an out of bounds access, which may lead to denial of service or code execution. |
1142 |
CVE-2020-5980 |
|
|
DoS Exec Code |
2020-10-02 |
2020-10-09 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in multiple components in which a securely loaded system DLL will load its dependencies in an insecure fashion, which may lead to code execution or denial of service. |
1143 |
CVE-2020-5979 |
|
|
|
2020-10-02 |
2020-10-09 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the NVIDIA Control Panel component in which a user is presented with a dialog box for input by a high-privilege process, which may lead to escalation of privileges. |
1144 |
CVE-2020-5978 |
|
|
DoS |
2020-10-23 |
2020-10-27 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in its services in which a folder is created by nvcontainer.exe under normal user login with LOCAL_SYSTEM privileges which may lead to a denial of service or escalation of privileges. |
1145 |
CVE-2020-5977 |
427 |
|
DoS Exec Code |
2020-10-23 |
2021-07-21 |
4.4 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
Partial |
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure. |
1146 |
CVE-2020-5938 |
326 |
|
|
2020-10-29 |
2020-11-09 |
4.0 |
None |
Remote |
Low |
??? |
Partial |
None |
None |
On BIG-IP 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, when negotiating IPSec tunnels with configured, authenticated peers, the peer may negotiate a different key length than the BIG-IP configuration would otherwise allow. |
1147 |
CVE-2020-5937 |
|
|
|
2020-10-29 |
2020-11-09 |
7.1 |
None |
Remote |
Medium |
Not required |
None |
None |
Complete |
On BIG-IP AFM 15.1.0-15.1.0.5, the Traffic Management Microkernel (TMM) may produce a core file while processing layer 4 (L4) behavioral denial-of-service (DoS) traffic. |
1148 |
CVE-2020-5936 |
400 |
|
|
2020-10-29 |
2020-11-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
On BIG-IP LTM 15.1.0-15.1.0.5, 14.1.0-14.1.2.7, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.1, the Traffic Management Microkernel (TMM) process may consume excessive resources when processing SSL traffic and client authentication are enabled on the client SSL profile. |
1149 |
CVE-2020-5935 |
|
|
|
2020-10-29 |
2020-11-09 |
4.3 |
None |
Remote |
Medium |
Not required |
None |
None |
Partial |
On BIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, FPS, GTM, Link Controller, PEM) versions 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when handling MQTT traffic through a BIG-IP virtual server associated with an MQTT profile and an iRule performing manipulations on that traffic, TMM may produce a core file. |
1150 |
CVE-2020-5934 |
|
|
|
2020-10-29 |
2020-11-09 |
3.3 |
None |
Local Network |
Low |
Not required |
None |
None |
Partial |
On BIG-IP APM 15.1.0-15.1.0.5, 14.1.0-14.1.2.3, and 13.1.0-13.1.3.3, when multiple HTTP requests from the same client to configured SAML Single Logout (SLO) URL are passing through a TCP Keep-Alive connection, traffic to TMM can be disrupted. |