CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In December 2020

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1101 CVE-2020-14206 79 XSS 2020-12-08 2020-12-10
4.3
None Remote Medium Not required None Partial None
The DiveBook plugin 1.1.4 for WordPress is prone to unauthenticated XSS within the filter function (via an arbitrary parameter).
1102 CVE-2020-14205 862 2020-12-08 2020-12-10
5.0
None Remote Low Not required None Partial None
The DiveBook plugin 1.1.4 for WordPress is prone to improper access control in the Log Dive form because it fails to perform authorization checks. An attacker may leverage this issue to manipulate the integrity of dive logs.
1103 CVE-2020-13988 190 Overflow 2020-12-11 2020-12-16
5.0
None Remote Low Not required None None Partial
An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.
1104 CVE-2020-13987 125 2020-12-11 2021-03-09
5.0
None Remote Low Not required None None Partial
An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.
1105 CVE-2020-13986 835 2020-12-11 2020-12-16
5.0
None Remote Low Not required Partial None None
An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.
1106 CVE-2020-13985 190 Mem. Corr. 2020-12-11 2021-07-21
5.0
None Remote Low Not required None None Partial
An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.
1107 CVE-2020-13984 835 2020-12-11 2020-12-14
5.0
None Remote Low Not required None None Partial
An issue was discovered in Contiki through 3.0. An infinite loop exists in the uIP TCP/IP stack component when processing IPv6 extension headers in ext_hdr_options_process in net/ipv6/uip6.c.
1108 CVE-2020-13969 79 XSS 2020-12-23 2020-12-23
4.3
None Remote Medium Not required None Partial None
CRK Business Platform <= 2019.1 allows reflected XSS via erro.aspx on 'CRK', 'IDContratante', 'Erro', or 'Mod' parameter. This is path-independent.
1109 CVE-2020-13968 89 Sql 2020-12-23 2020-12-23
7.5
None Remote Low Not required Partial Partial Partial
CRK Business Platform <= 2019.1 allows can inject SQL statements against the DB on any path using the 'strSessao' parameter.
1110 CVE-2020-13956 2020-12-02 2022-05-12
5.0
None Remote Low Not required None Partial None
Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.
1111 CVE-2020-13945 2020-12-07 2022-04-19
4.0
None Remote Low ??? Partial None None
In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.
1112 CVE-2020-13931 2020-12-18 2020-12-23
6.8
None Remote Medium Not required Partial Partial Partial
If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix did not cover this edge case.
1113 CVE-2020-13654 116 2020-12-31 2021-01-05
5.0
None Remote Low Not required Partial None None
XWiki Platform before 12.8 mishandles escaping in the property displayer.
1114 CVE-2020-13584 416 Exec Code 2020-12-03 2022-04-19
6.8
None Remote Medium Not required Partial Partial Partial
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.
1115 CVE-2020-13570 416 Exec Code 2020-12-22 2022-04-28
6.8
None Remote Medium Not required Partial Partial Partial
A use-after-free vulnerability exists in the JavaScript engine of Foxit Software’s PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger the reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
1116 CVE-2020-13560 416 Exec Code 2020-12-22 2022-04-28
6.8
None Remote Medium Not required Partial Partial Partial
A use after free vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
1117 CVE-2020-13557 416 Exec Code 2020-12-22 2022-04-28
6.8
None Remote Medium Not required Partial Partial Partial
A use after free vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger reuse of previously free memory which can lead to arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
1118 CVE-2020-13556 787 Exec Code 2020-12-11 2022-06-07
7.5
None Remote Low Not required Partial Partial Partial
An out-of-bounds write vulnerability exists in the Ethernet/IP server functionality of EIP Stack Group OpENer 2.3 and development commit 8c73bf3. A specially crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.
1119 CVE-2020-13547 787 Exec Code Mem. Corr. 2020-12-22 2022-04-28
6.8
None Remote Medium Not required Partial Partial Partial
A type confusion vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger an improper use of an object, resulting in memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
1120 CVE-2020-13543 416 Exec Code 2020-12-03 2022-05-10
6.8
None Remote Medium Not required Partial Partial Partial
A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
1121 CVE-2020-13542 276 Exec Code 2020-12-03 2022-06-07
7.2
None Local Low Not required Complete Complete Complete
A local privilege elevation vulnerability exists in the file system permissions of LogicalDoc 8.5.1 installation. Depending on the vector chosen, an attacker can either replace the service binary or replace DLL files loaded by the service, both which get executed by a service thus executing arbitrary commands with System privileges.
1122 CVE-2020-13535 276 Exec Code 2020-12-18 2022-04-28
7.2
None Local Low Not required Complete Complete Complete
A privilege escalation vulnerability exists in Kepware LinkMaster 3.0.94.0. In its default configuration, an attacker can globally overwrite service configuration to execute arbitrary code with NT SYSTEM privileges.
1123 CVE-2020-13531 416 Exec Code Mem. Corr. 2020-12-03 2022-06-07
6.8
None Remote Medium Not required Partial Partial Partial
A use-after-free vulnerability exists in a way Pixar OpenUSD 20.08 processes reference paths textual USD files. A specially crafted file can trigger the reuse of a freed memory which can result in further memory corruption and arbitrary code execution. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file.
1124 CVE-2020-13530 672 2020-12-11 2022-06-07
5.0
None Remote Low Not required None None Partial
A denial-of-service vulnerability exists in the Ethernet/IP server functionality of the EIP Stack Group OpENer 2.3 and development commit 8c73bf3. A large number of network requests in a small span of time can cause the running program to stop. An attacker can send a sequence of requests to trigger this vulnerability.
1125 CVE-2020-13528 319 2020-12-18 2022-04-28
4.3
None Remote Medium Not required Partial None None
An information disclosure vulnerability exists in the Web Manager and telnet CLI functionality of Lantronix XPort EDGE 3.0.0.0R11, 3.1.0.0R9, 3.4.0.0R12 and 4.2.0.0R7. A specially crafted HTTP request can cause information disclosure. An attacker can sniff the network to trigger this vulnerability.
1126 CVE-2020-13527 352 Bypass 2020-12-18 2022-04-28
4.0
None Remote Low ??? None Partial None
An authentication bypass vulnerability exists in the Web Manager functionality of Lantronix XPort EDGE 3.0.0.0R11, 3.1.0.0R9, 3.4.0.0R12 and 4.2.0.0R7. A specially crafted HTTP request can cause increased privileges. An attacker can send an HTTP request to trigger this vulnerability.
1127 CVE-2020-13526 89 Sql 2020-12-10 2022-06-07
6.5
None Remote Low ??? Partial Partial Partial
SQL injection vulnerability exists in the handling of sort parameters in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. The reportTables_Ajax and clientSetupAjax pages are vulnerable to SQL injection in the sort parameter.An attacker can make an authenticated HTTP request to trigger these vulnerabilities.
1128 CVE-2020-13525 89 Sql 2020-12-03 2022-06-07
6.5
None Remote Low ??? Partial Partial Partial
The sort parameter in the download page /sysworkflow/en/neoclassic/reportTables/reportTables_Ajax is vulnerable to SQL injection in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
1129 CVE-2020-13524 787 Mem. Corr. 2020-12-03 2022-06-07
4.3
None Remote Medium Not required None None Partial
An out-of-bounds memory corruption vulnerability exists in the way Pixar OpenUSD 20.05 uses SPECS data from binary USD files. A specially crafted malformed file can trigger an out-of-bounds memory access and modification which results in memory corruption. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.
1130 CVE-2020-13520 787 Exec Code Mem. Corr. 2020-12-11 2022-06-07
6.8
None Remote Medium Not required Partial Partial Partial
An out of bounds memory corruption vulnerability exists in the way Pixar OpenUSD 20.05 reconstructs paths from binary USD files. A specially crafted malformed file can trigger an out of bounds memory modification which can result in remote code execution. To trigger this vulnerability, victim needs to access an attacker-provided malformed file.
1131 CVE-2020-13519 862 2020-12-18 2022-04-28
7.2
None Local Low Not required Complete Complete Complete
A privilege escalation vulnerability exists in the WinRing0x64 Driver IRP 0x9c402088 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. An attacker can send a malicious IRP to trigger this vulnerability.
1132 CVE-2020-13518 2020-12-18 2022-04-28
2.1
None Local Low Not required Partial None None
An information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c402084 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.
1133 CVE-2020-13517 2020-12-18 2022-04-28
2.1
None Local Low Not required Partial None None
An information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c406104 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.
1134 CVE-2020-13516 2020-12-18 2022-04-28
2.1
None Local Low Not required Partial None None
An information disclosure vulnerability exists in the WinRing0x64 Driver IRP 0x9c406144 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.
1135 CVE-2020-13515 862 2020-12-18 2022-04-28
7.2
None Local Low Not required Complete Complete Complete
A privilege escalation vulnerability exists in the WinRing0x64 Driver IRP 0x9c40a148 functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause an adversary to obtain elevated privileges. An attacker can send a malicious IRP to trigger this vulnerability.
1136 CVE-2020-13514 862 2020-12-18 2022-04-28
7.2
None Local Low Not required Complete Complete Complete
A privilege escalation vulnerability exists in the WinRing0x64 Driver Privileged I/O Write IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. Using the IRP 0x9c40a0e0 gives a low privilege user direct access to the OUT instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.
1137 CVE-2020-13513 862 2020-12-18 2022-04-28
7.2
None Local Low Not required Complete Complete Complete
A privilege escalation vulnerability exists in the WinRing0x64 Driver Privileged I/O Write IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. Using the IRP 0x9c40a0dc gives a low privilege user direct access to the OUT instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.
1138 CVE-2020-13512 862 2020-12-18 2022-04-28
7.2
None Local Low Not required Complete Complete Complete
A privilege escalation vulnerability exists in the WinRing0x64 Driver Privileged I/O Write IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) can cause increased privileges. Using the IRP 0x9c40a0d8 gives a low privilege user direct access to the OUT instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.
1139 CVE-2020-13511 2020-12-18 2022-04-28
2.1
None Local Low Not required Partial None None
An information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) using the IRP 0x9c4060d4 gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.
1140 CVE-2020-13510 2020-12-18 2022-04-28
2.1
None Local Low Not required Partial None None
An information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) using the IRP 0x9c4060d0 gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability.
1141 CVE-2020-13509 +Info 2020-12-18 2022-04-28
2.1
None Local Low Not required Partial None None
An information disclosure vulnerability exists in the WinRing0x64 Driver Privileged I/O Read IRPs functionality of NZXT CAM 4.8.0. A specially crafted I/O request packet (IRP) Using the IRP 0x9c4060cc gives a low privilege user direct access to the IN instruction that is completely unrestrained at an elevated privilege level. An attacker can send a malicious IRP to trigger this vulnerability and this access could allow for information leakage of sensitive data.
1142 CVE-2020-13498 125 Bypass 2020-12-02 2022-04-28
4.3
None Remote Medium Not required Partial None None
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in SdfPath Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.
1143 CVE-2020-13497 125 Bypass 2020-12-02 2022-04-28
4.3
None Remote Medium Not required Partial None None
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in String Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.
1144 CVE-2020-13496 125 Bypass 2020-12-02 2022-04-28
4.3
None Remote Medium Not required Partial None None
An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in TfToken Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.
1145 CVE-2020-13494 787 Overflow Bypass 2020-12-02 2022-04-28
4.3
None Remote Medium Not required Partial None None
A heap overflow vulnerability exists in the Pixar OpenUSD 20.05 parsing of compressed string tokens in binary USD files. A specially crafted malformed file can trigger a heap overflow which can result in out of bounds memory access which could lead to information disclosure. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, victim needs to access an attacker-provided malformed file.
1146 CVE-2020-13493 787 Overflow 2020-12-02 2022-04-28
6.8
None Remote Medium Not required Partial Partial Partial
A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. A specially crafted USDC file format path jumps decompression heap overflow in a way path jumps are processed. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file.
1147 CVE-2020-13476 79 XSS 2020-12-28 2020-12-30
3.5
None Remote Medium ??? None Partial None
NCH Express Invoice 8.06 to 8.24 is vulnerable to Reflected XSS in the Quotes List module.
1148 CVE-2020-13474 269 2020-12-28 2021-07-21
4.0
None Remote Low ??? None Partial None
In NCH Express Accounts 8.24 and earlier, an authenticated low-privilege user can enter a crafted URL to access higher-privileged functionalities such as Add/Edit users.
1149 CVE-2020-13473 312 2020-12-28 2020-12-30
2.1
None Local Low Not required Partial None None
NCH Express Accounts 8.24 and earlier allows local users to discover the cleartext password by reading the configuration file.
1150 CVE-2020-13357 639 2020-12-11 2020-12-14
4.0
None Remote Low ??? Partial None None
An issue was discovered in Gitlab CE/EE versions >= 13.1 to <13.4.7, >= 13.5 to <13.5.5, and >= 13.6 to <13.6.2 allowed an unauthorized user to access the user list corresponding to a feature flag in a project.
Total number of vulnerabilities : 1530   Page : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 (This Page)24 25 26 27 28 29 30 31
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.