CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In May 2020 (CVSS score >= 3)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
101 CVE-2020-12874 863 Bypass 2020-05-14 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
Veritas APTARE versions prior to 10.4 included code that bypassed the normal login process when specific authentication credentials were provided to the server.
102 CVE-2020-12860 200 +Info 2020-05-18 2021-07-21
5.0
None Remote Low Not required Partial None None
COVIDSafe through v1.0.17 allows a remote attacker to access phone name and model information because a BLE device can have four roles and COVIDSafe uses all of them. This allows for re-identification of a device, and potentially identification of the owner's name.
103 CVE-2020-12859 312 2020-05-18 2020-05-20
5.0
None Remote Low Not required Partial None None
Unnecessary fields in the OpenTrace/BlueTrace protocol in COVIDSafe through v1.0.17 allow a remote attacker to identify a device model by observing cleartext payload data. This allows re-identification of devices, especially less common phone models or those in low-density situations.
104 CVE-2020-12858 665 2020-05-18 2021-07-21
5.0
None Remote Low Not required Partial None None
Non-reinitialisation of random data in the advertising payload in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to re-identify Android devices running COVIDSafe by scanning for their advertising beacons.
105 CVE-2020-12857 200 +Info 2020-05-18 2021-07-21
5.0
None Remote Low Not required Partial None None
Caching of GATT characteristic values (TempID) in COVIDSafe v1.0.15 and v1.0.16 allows a remote attacker to long-term re-identify an Android device running COVIDSafe.
106 CVE-2020-12856 2020-05-18 2020-05-20
7.5
None Remote Low Not required Partial Partial Partial
OpenTrace, as used in COVIDSafe through v1.0.17, TraceTogether, ABTraceTogether, and other applications on iOS and Android, allows remote attackers to conduct long-term re-identification attacks and possibly have unspecified other impact, because of how Bluetooth is used.
107 CVE-2020-12835 74 Exec Code 2020-05-20 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in SmartBear ReadyAPI SoapUI Pro 3.2.5. Due to unsafe use of an Java RMI based protocol in an unsafe configuration, an attacker can inject malicious serialized objects into the communication, resulting in remote code execution in the context of a client-side Network Licensing Protocol component.
108 CVE-2020-12834 276 Exec Code 2020-05-15 2020-05-21
7.5
None Remote Low Not required Partial Partial Partial
eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset).
109 CVE-2020-12832 22 Dir. Trav. 2020-05-13 2020-05-21
7.5
None Remote Low Not required Partial Partial Partial
WordPress Plugin Simple File List before 4.2.8 is prone to a vulnerability that lets attackers delete arbitrary files because the application fails to properly verify user-supplied input.
110 CVE-2020-12831 200 +Info 2020-05-13 2021-07-21
4.3
None Remote Medium Not required Partial None None
** DISPUTED ** An issue was discovered in FRRouting FRR (aka Free Range Routing) through 7.3.1. When using the split-config feature, the init script creates an empty config file with world-readable default permissions, leading to a possible information leak via tools/frr.in and tools/frrcommon.sh.in. NOTE: some parties consider this user error, not a vulnerability, because the permissions are under the control of the user before any sensitive information is present in the file.
111 CVE-2020-12828 434 2020-05-21 2020-06-02
10.0
None Remote Low Not required Complete Complete Complete
An issue was discovered in AnchorFree VPN SDK before 1.3.3.218. The VPN SDK service takes certain executable locations over a socket bound to localhost. Binding to the socket and providing a path where a malicious executable file resides leads to executing the malicious executable file with SYSTEM privileges.
112 CVE-2020-12826 190 Overflow 2020-05-12 2020-06-22
4.4
None Local Medium Not required Partial Partial Partial
A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.
113 CVE-2020-12825 674 2020-05-12 2020-09-08
5.8
None Remote Medium Not required None Partial Partial
libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption.
114 CVE-2020-12823 120 DoS Overflow 2020-05-12 2020-07-21
7.5
None Remote Low Not required Partial Partial Partial
OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.
115 CVE-2020-12801 312 2020-05-18 2021-11-04
5.0
None Remote Low Not required Partial None None
If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted. This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted. This issue affects: LibreOffice 6-3 series versions prior to 6.3.6; 6-4 series versions prior to 6.4.3.
116 CVE-2020-12798 269 2020-05-15 2020-05-21
4.6
None Local Low Not required Partial Partial Partial
Cellebrite UFED 5.0 to 7.5.0.845 implements local operating system policies that can be circumvented to obtain a command prompt via the Windows file dialog that is reachable via the Certificate-Based Authentication option of the Wireless Network Connection screen.
117 CVE-2020-12790 74 2020-05-11 2020-05-14
5.0
None Remote Low Not required Partial None None
In the SEOmatic plugin before 3.2.49 for Craft CMS, helpers/DynamicMeta.php does not properly sanitize the URL. This leads to Server-Side Template Injection and credentials disclosure via a crafted Twig template after a semicolon.
118 CVE-2020-12785 862 2020-05-11 2021-07-21
5.5
None Remote Low ??? Partial Partial None
cPanel before 86.0.14 allows attackers to obtain access to the current working directory via the account backup feature (SEC-540).
119 CVE-2020-12784 20 2020-05-11 2021-07-21
5.0
None Remote Low Not required None None Partial
cPanel before 86.0.14 allows remote attackers to trigger a bandwidth suspension via mail log strings (SEC-505).
120 CVE-2020-12783 125 Bypass 2020-05-11 2021-05-04
5.0
None Remote Low Not required Partial None None
Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
121 CVE-2020-12772 311 2020-05-12 2021-07-21
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in Ignite Realtime Spark 2.8.3 (and the ROAR plugin for it) on Windows. A chat message can include an IMG element with a SRC attribute referencing an external host's IP address. Upon access to this external host, the (NT)LM hashes of the user are sent with the HTTP request. This allows an attacker to collect these hashes, crack them, and potentially compromise the computer. (ROAR can be configured for automatic access. Also, access can occur if the user clicks.)
122 CVE-2020-12771 667 2020-05-09 2022-04-26
4.9
None Local Low Not required None None Complete
An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
123 CVE-2020-12770 2020-05-09 2020-07-29
4.6
None Local Low Not required Partial Partial Partial
An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.
124 CVE-2020-12769 662 2020-05-09 2022-05-03
4.9
None Local Low Not required None None Complete
An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.
125 CVE-2020-12766 89 Sql 2020-05-09 2020-05-12
7.5
None Remote Low Not required Partial Partial Partial
Gnuteca 3.8 allows action=main:search:simpleSearch SQL Injection via the exemplaryStatusId parameter.
126 CVE-2020-12765 22 Dir. Trav. 2020-05-09 2020-05-12
5.0
None Remote Low Not required Partial None None
Solis Miolo 2.0 allows index.php?module=install&action=view&item= Directory Traversal.
127 CVE-2020-12764 22 Dir. Trav. 2020-05-09 2020-05-12
5.0
None Remote Low Not required Partial None None
Gnuteca 3.8 allows file.php?folder=/&file= Directory Traversal.
128 CVE-2020-12763 787 DoS Exec Code Overflow 2020-05-13 2020-05-15
7.5
None Remote Low Not required Partial Partial Partial
TRENDnet ProView Wireless camera TV-IP512WN 1.0R 1.0.4 is vulnerable to an unauthenticated stack-based buffer overflow in handling RTSP packets. This may result in remote code execution or denial of service. The issue is in the binary rtspd (in /sbin) when parsing a long "Authorization: Basic" RTSP header.
129 CVE-2020-12762 787 Overflow 2020-05-09 2021-05-21
6.8
None Remote Medium Not required Partial Partial Partial
json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
130 CVE-2020-12761 190 Overflow 2020-05-09 2021-07-21
6.4
None Remote Low Not required Partial None Partial
modules/loaders/loader_ico.c in imlib2 1.6.0 has an integer overflow (with resultant invalid memory allocations and out-of-bounds reads) via an icon with many colors in its color map.
131 CVE-2020-12760 502 Exec Code 2020-05-11 2020-05-13
6.5
None Remote Low ??? Partial Partial Partial
An issue was discovered in OpenNMS Horizon before 26.0.1, and Meridian before 2018.1.19 and 2019 before 2019.1.7. The ActiveMQ channel configuration allowed for arbitrary deserialization of Java objects (aka ActiveMQ Minion payload deserialization), leading to remote code execution for any authenticated channel user regardless of its assigned permissions.
132 CVE-2020-12754 2020-05-11 2020-05-12
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 software. A crafted application can obtain control of device input via the window system service. The LG ID is LVE-SMP-170011 (May 2020).
133 CVE-2020-12753 787 Exec Code 2020-05-11 2022-04-26
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 software. Arbitrary code execution can occur via the bootloader because of an EL1/EL3 coldboot vulnerability involving raw_resources. The LG ID is LVE-SMP-200006 (May 2020).
134 CVE-2020-12752 522 2020-05-11 2021-07-21
5.0
None Remote Low Not required Partial None None
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (with TEEGRIS) software. Attackers can determine user credentials via a brute-force attack against the Gatekeeper trustlet. The Samsung ID is SVE-2020-16908 (May 2020).
135 CVE-2020-12751 119 Exec Code Overflow 2020-05-11 2021-07-21
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered on Samsung mobile devices with O(8.X), P(9.0), and Q(10.0) software. The Quram image codec library allows attackers to overwrite memory and execute arbitrary code via crafted JPEG data that is mishandled during decoding. The Samsung ID is SVE-2020-16943 (May 2020).
136 CVE-2020-12750 Bypass 2020-05-11 2020-05-13
5.0
None Remote Low Not required None Partial None
An issue was discovered on Samsung mobile devices with Q(10.0) software. Attackers can bypass Factory Reset Protection (FRP) via SPEN. The Samsung ID is SVE-2020-17019 (May 2020).
137 CVE-2020-12749 120 Overflow 2020-05-11 2020-05-13
4.6
None Local Low Not required Partial Partial Partial
An issue was discovered on Samsung mobile devices with P(9.0) (Exynos chipsets) software. The S.LSI Wi-Fi drivers have a buffer overflow. The Samsung ID is SVE-2020-16906 (May 2020).
138 CVE-2020-12748 Bypass 2020-05-11 2020-05-13
5.0
None Remote Low Not required None Partial None
An issue was discovered on Samsung mobile devices with Q(10.0) software. Attackers can bypass the locked-state protection mechanism and designate a different preferred SIM card. The Samsung ID is SVE-2020-16594 (May 2020).
139 CVE-2020-12747 787 Overflow 2020-05-11 2020-05-13
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered on Samsung mobile devices with Q(10.0) (Exynos980 9630 and Exynos990 9830 chipsets) software. The Bootloader has a heap-based buffer overflow because of the mishandling of specific commands. The Samsung IDs are SVE-2020-16981, SVE-2020-16991 (May 2020).
140 CVE-2020-12746 787 Exec Code Overflow Bypass 2020-05-11 2020-05-12
10.0
None Remote Low Not required Complete Complete Complete
An issue was discovered on Samsung mobile devices with O(8.X), P(9.0), and Q(10.0) (Exynos chipsets) software. Attackers can bypass the Secure Bootloader protection mechanism via a heap-based buffer overflow to execute arbitrary code. The Samsung ID is SVE-2020-16712 (May 2020).
141 CVE-2020-12745 863 Bypass 2020-05-11 2021-07-21
5.0
None Remote Low Not required Partial None None
An issue was discovered on Samsung mobile devices with Q(10.0) software. Attackers can bypass the locked-state protection mechanism and access clipboard content via USSD. The Samsung ID is SVE-2019-16556 (May 2020).
142 CVE-2020-12743 552 File Inclusion 2020-05-11 2020-05-15
7.5
None Remote Low Not required Partial Partial Partial
An issue was discovered in Gazie 7.32. A successful installation does not remove or block (or in any other way prevent use of) its own file /setup/install/setup.php, meaning that anyone can request it without authentication. This file allows arbitrary PHP file inclusion via a hidden_req POST parameter.
143 CVE-2020-12742 20 2020-05-13 2020-05-18
4.3
None Remote Medium Not required None Partial None
The iubenda-cookie-law-solution plugin before 2.3.5 for WordPress does not restrict URL sanitization to http protocols.
144 CVE-2020-12740 125 2020-05-08 2022-04-08
6.4
None Remote Low Not required Partial None Partial
tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
145 CVE-2020-12737 22 Dir. Trav. 2020-05-08 2020-05-13
4.0
None Remote Low ??? Partial None None
An issue was discovered in Maxum Rumpus before 8.2.12 on macOS. Authenticated users can perform a path traversal using double escaped characters, enabling read access to arbitrary files on the server.
146 CVE-2020-12735 331 2020-05-08 2020-05-12
7.5
None Remote Low Not required Partial Partial Partial
reset.php in DomainMOD 4.13.0 uses insufficient entropy for password reset requests, leading to account takeover.
147 CVE-2020-12720 89 Sql 2020-05-08 2022-04-27
7.5
None Remote Low Not required Partial Partial Partial
vBulletin before 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1 has incorrect access control.
148 CVE-2020-12719 611 2020-05-08 2020-05-14
6.5
None Remote Low ??? Partial Partial Partial
XXE during an EventPublisher update can occur in Management Console in WSO2 API Manager 3.0.0 and earlier, API Manager Analytics 2.5.0 and earlier, API Microgateway 2.2.0, Enterprise Integrator 6.4.0 and earlier, IS as Key Manager 5.9.0 and earlier, Identity Server 5.9.0 and earlier, and Identity Server Analytics 5.6.0 and earlier.
149 CVE-2020-12718 79 XSS Bypass 2020-05-08 2020-05-14
3.5
None Remote Medium ??? None Partial None
In administration/comments.php in PHP-Fusion 9.03.50, an authenticated attacker can take advantage of a stored XSS vulnerability in the Preview Comment feature. The protection mechanism can be bypassed by using HTML event handlers such as ontoggle.
150 CVE-2020-12717 20 2020-05-14 2021-07-21
3.3
None Local Network Low Not required None None Partial
The COVIDSafe (Australia) app 1.0 and 1.1 for iOS allows a remote attacker to crash the app, and consequently interfere with COVID-19 contact tracing, via a Bluetooth advertisement containing manufacturer data that is too short. This occurs because of an erroneous OpenTrace manuData.subdata call. The ABTraceTogether (Alberta), ProteGO (Poland), and TraceTogether (Singapore) apps were also affected.
Total number of vulnerabilities : 940   Page : 1 2 3 (This Page)4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.