CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In May 2020 (CVSS score >= 3)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
201 CVE-2020-12448 22 Dir. Trav. 2020-05-07 2020-05-11
5.0
None Remote Low Not required Partial None None
GitLab EE 12.8 and later allows Exposure of Sensitive Information to an Unauthorized Actor via NuGet.
202 CVE-2020-12439 404 2020-05-05 2020-05-14
5.0
None Remote Low Not required None None Partial
Grin before 3.1.0 allows attackers to adversely affect availability of data on a Mimblewimble blockchain.
203 CVE-2020-12431 427 2020-05-21 2021-07-21
6.3
None Local Medium Not required None Complete Complete
A Windows privilege change issue was discovered in Splashtop Software Updater before 1.5.6.16. Insecure permissions on the configuration file and named pipe allow for local privilege escalation to NT AUTHORITY/SYSTEM, by forcing a permission change to any Splashtop files and directories, with resultant DLL hijacking. This product is bundled with Splashtop Streamer (before 3.3.8.0) and Splashtop Business (before 3.3.8.0).
204 CVE-2020-12427 352 CSRF 2020-05-13 2021-09-08
6.8
None Remote Medium Not required Partial Partial Partial
The Western Digital WD Discovery application before 3.8.229 for MyCloud Home on Windows and macOS is vulnerable to CSRF, with impacts such as stealing data, modifying disk contents, or exhausting disk space.
205 CVE-2020-12397 346 2020-05-22 2020-06-12
4.3
None Remote Medium Not required None Partial None
By encoding Unicode whitespace characters within the From email header, an attacker can spoof the sender email address that Thunderbird displays. This vulnerability affects Thunderbird < 68.8.0.
206 CVE-2020-12396 787 Mem. Corr. 2020-05-26 2022-04-26
7.5
None Remote Low Not required Partial Partial Partial
Mozilla developers and community members reported memory safety bugs present in Firefox 75. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 76.
207 CVE-2020-12395 787 Mem. Corr. 2020-05-26 2022-04-26
10.0
None Remote Low Not required Complete Complete Complete
Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
208 CVE-2020-12393 74 Exec Code 2020-05-26 2021-07-21
4.6
None Local Low Not required Partial Partial Partial
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
209 CVE-2020-12391 20 2020-05-26 2020-05-28
5.0
None Remote Low Not required None Partial None
Documents formed using data: URLs in an OBJECT element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin. This vulnerability affects Firefox < 76.
210 CVE-2020-12390 502 2020-05-26 2020-05-29
7.5
None Remote Low Not required Partial Partial Partial
Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks. This vulnerability affects Firefox < 76.
211 CVE-2020-12389 20 2020-05-26 2020-05-27
7.5
None Remote Low Not required Partial Partial Partial
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
212 CVE-2020-12388 20 2020-05-26 2020-05-28
7.5
None Remote Low Not required Partial Partial Partial
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
213 CVE-2020-12387 362 2020-05-26 2021-12-14
6.8
None Remote Medium Not required Partial Partial Partial
A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
214 CVE-2020-12259 79 XSS 2020-05-18 2020-05-18
3.5
None Remote Medium ??? None Partial None
rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.
215 CVE-2020-12258 384 2020-05-18 2020-05-19
6.4
None Remote Low Not required Partial Partial None
rConfig 3.9.4 is vulnerable to session fixation because session expiry and randomization are mishandled. The application can reuse a session via PHPSESSID. Also, an attacker can exploit this vulnerability in conjunction with CVE-2020-12256 or CVE-2020-12259.
216 CVE-2020-12257 352 CSRF 2020-05-18 2020-05-18
6.8
None Remote Medium Not required Partial Partial Partial
rConfig 3.9.4 is vulnerable to cross-site request forgery (CSRF) because it lacks implementation of CSRF protection such as a CSRF token. An attacker can leverage this vulnerability by creating a form (add a user, delete a user, or edit a user).
217 CVE-2020-12256 79 XSS 2020-05-18 2020-05-18
3.5
None Remote Medium ??? None Partial None
rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php.
218 CVE-2020-12255 434 Exec Code 2020-05-18 2020-05-19
6.5
None Remote Low ??? Partial Partial Partial
rConfig 3.9.4 is vulnerable to remote code execution due to improper validation in the file upload functionality. vendor.crud.php accepts a file upload by checking content-type without considering the file extension and header. Thus, an attacker can exploit this by uploading a .php file to vendor.php that contains arbitrary PHP code and changing the content-type to image/gif.
219 CVE-2020-12244 347 Bypass 2020-05-19 2022-04-26
5.0
None Remote Low Not required Partial None None
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
220 CVE-2020-12144 295 2020-05-05 2020-05-12
4.0
None Remote Low ??? None Partial None
The certificate used to identify the Silver Peak Cloud Portal to EdgeConnect devices is not validated. This makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted portal.
221 CVE-2020-12143 295 2020-05-05 2020-05-12
4.0
None Remote Low ??? None Partial None
The certificate used to identify Orchestrator to EdgeConnect devices is not validated, which makes it possible for someone to establish a TLS connection from EdgeConnect to an untrusted Orchestrator.
222 CVE-2020-12142 668 2020-05-05 2020-05-12
4.0
None Remote Low ??? Partial None None
1. IPSec UDP key material can be retrieved from machine-to-machine interfaces and human-accessible interfaces by a user with admin credentials. Such a user, with the required system knowledge, could use this material to decrypt in-flight communication. 2. The vulnerability requires administrative access and shell access to the EdgeConnect appliance. An admin user can access IPSec seed and nonce parameters using the CLI, REST APIs, and the Linux shell.
223 CVE-2020-12117 306 2020-05-01 2022-04-26
5.0
None Remote Low Not required Partial None None
Moxa Service in Moxa NPort 5150A firmware version 1.5 and earlier allows attackers to obtain sensitive configuration values via a crafted packet to UDP port 4800. NOTE: Moxa Service is an unauthenticated service that runs upon a first-time installation but can be disabled without ill effect.
224 CVE-2020-12116 200 +Info 2020-05-07 2021-07-21
5.0
None Remote Low Not required Partial None None
Zoho ManageEngine OpManager Stable build before 124196 and Released build before 125125 allows an unauthenticated attacker to read arbitrary files on the server by sending a crafted request.
225 CVE-2020-12111 78 2020-05-04 2020-05-12
9.0
None Remote Low ??? Complete Complete Complete
Certain TP-Link devices allow Command Injection. This affects NC260 1.5.2 build 200304 and NC450 1.5.3 build 200304.
226 CVE-2020-12110 798 2020-05-04 2020-05-12
5.0
None Remote Low Not required Partial None None
Certain TP-Link devices have a Hardcoded Encryption Key. This affects NC200 2.1.9 build 200225, N210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304.
227 CVE-2020-12109 78 2020-05-04 2020-09-18
9.0
None Remote Low ??? Complete Complete Complete
Certain TP-Link devices allow Command Injection. This affects NC200 2.1.9 build 200225, NC210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304.
228 CVE-2020-12108 74 2020-05-06 2021-12-02
4.3
None Remote Medium Not required None Partial None
/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
229 CVE-2020-12104 89 Exec Code Sql 2020-05-05 2020-05-07
6.5
None Remote Low ??? Partial Partial Partial
The Import feature in the wp-advanced-search plugin 3.3.6 for WordPress is vulnerable to authenticated SQL injection via an uploaded .sql file. An attacker can use this to execute SQL commands without any validation.
230 CVE-2020-12068 269 2020-05-14 2021-07-21
6.4
None Remote Low Not required Partial Partial None
An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.
231 CVE-2020-12046 347 2020-05-14 2020-05-18
3.5
None Remote Medium ??? None Partial None
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC’s firmware files’ signatures are not verified upon firmware update. This allows an attacker to replace legitimate firmware files with malicious files.
232 CVE-2020-12042 347 +Priv 2020-05-14 2020-05-18
4.0
None Remote Low ??? None Partial None
Opto 22 SoftPAC Project Version 9.6 and prior. Paths specified within the zip files used to update the SoftPAC firmware are not sanitized. As a result, an attacker with user privileges can gain arbitrary file write access with system access.
233 CVE-2020-12038 787 Mem. Corr. 2020-05-19 2021-09-23
4.3
None Remote Medium Not required None None Partial
Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer software: Version 32 and prior) is vulnerable. A memory corruption vulnerability exists in the algorithm that matches square brackets in the EDS subsystem. This may allow an attacker to craft specialized EDS files to crash the EDSParser COM object, leading to denial-of-service conditions.
234 CVE-2020-12034 89 Sql 2020-05-20 2020-05-22
4.8
None Local Network Low Not required None Partial Partial
Products that use EDS Subsystem: Version 28.0.1 and prior (FactoryTalk Linx software (Previously called RSLinx Enterprise): Versions 6.00, 6.10, and 6.11, RSLinx Classic: Version 4.11.00 and prior, RSNetWorx software: Version 28.00.00 and prior, Studio 5000 Logix Designer software: Version 32 and prior) is vulnerable.The EDS subsystem does not provide adequate input sanitation, which may allow an attacker to craft specialized EDS files to inject SQL queries and manipulate the database storing the EDS files. This can lead to denial-of-service conditions.
235 CVE-2020-12026 22 Dir. Trav. 2020-05-08 2021-09-23
6.5
None Remote Low ??? Partial Partial Partial
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control.
236 CVE-2020-12022 129 2020-05-08 2020-05-11
7.5
None Remote Low Not required Partial Partial Partial
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An improper validation vulnerability exists that could allow an attacker to inject specially crafted input into memory where it can be executed.
237 CVE-2020-12018 125 2020-05-08 2020-05-11
5.0
None Remote Low Not required Partial None None
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An out-of-bounds vulnerability exists that may allow access to unauthorized data.
238 CVE-2020-12014 89 Sql 2020-05-08 2020-05-11
5.0
None Remote Low Not required Partial None None
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized and may allow an attacker to inject SQL commands.
239 CVE-2020-12010 22 Dir. Trav. 2020-05-08 2021-09-23
5.8
None Remote Medium Not required None Partial Partial
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow an authenticated user to use a specially crafted file to delete files outside the application’s control.
240 CVE-2020-12006 22 Dir. Trav. 2020-05-08 2021-09-23
7.5
None Remote Low Not required Partial Partial Partial
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control.
241 CVE-2020-12002 787 Exec Code Overflow 2020-05-08 2021-09-23
7.5
None Remote Low Not required Partial Partial Partial
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution.
242 CVE-2020-11973 502 2020-05-14 2021-07-20
7.5
None Remote Low Not required Partial Partial Partial
Apache Camel Netty enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.
243 CVE-2020-11972 502 2020-05-14 2021-03-15
7.5
None Remote Low Not required Partial Partial Partial
Apache Camel RabbitMQ enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.
244 CVE-2020-11971 2020-05-14 2022-05-12
5.0
None Remote Low Not required Partial None None
Apache Camel's JMX is vulnerable to Rebind Flaw. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.x, 3.0.0 up to 3.1.0 is affected. Users should upgrade to 3.2.0.
245 CVE-2020-11950 78 Exec Code 2020-05-28 2020-06-02
9.0
None Remote Low ??? Complete Complete Complete
VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to upload and execute a script (with resultant execution of OS commands). For example, this affects IT9388-HT devices.
246 CVE-2020-11949 200 +Info 2020-05-28 2021-07-21
4.0
None Remote Low ??? Partial None None
testserver.cgi of the web service on VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to obtain arbitrary files from a camera's local filesystem. For example, this affects IT9388-HT devices.
247 CVE-2020-11866 416 2020-05-11 2020-06-18
6.8
None Remote Medium Not required Partial Partial Partial
libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows a use-after-free.
248 CVE-2020-11865 119 Overflow 2020-05-11 2020-06-18
6.8
None Remote Medium Not required Partial Partial Partial
libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows out-of-bounds memory access.
249 CVE-2020-11864 DoS 2020-05-11 2020-06-18
4.3
None Remote Medium Not required None None Partial
libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 2 of 2).
250 CVE-2020-11863 DoS 2020-05-11 2020-06-18
4.3
None Remote Medium Not required None None Partial
libEMF (aka ECMA-234 Metafile Library) through 1.0.11 allows denial of service (issue 1 of 2).
Total number of vulnerabilities : 941   Page : 1 2 3 4 5 (This Page)6 7 8 9 10 11 12 13 14 15 16 17 18 19
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.