CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In October 2020

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
251 CVE-2020-25623 22 Dir. Trav. 2020-10-02 2020-10-09
4.3
None Remote Medium Not required Partial None None
Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows Directory Traversal. An attacker can send a crafted HTTP request to read arbitrary files, if httpd in the inets application is used.
252 CVE-2020-25613 444 Bypass 2020-10-06 2022-01-01
5.0
None Remote Low Not required None Partial None
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
253 CVE-2020-25516 79 XSS 2020-10-29 2020-11-03
3.5
None Remote Medium ??? None Partial None
WSO2 Enterprise Integrator 6.6.0 or earlier contains a stored cross-site scripting (XSS) vulnerability in BPMN explorer tasks.
254 CVE-2020-25483 77 Exec Code 2020-10-23 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
255 CVE-2020-25470 79 Exec Code XSS 2020-10-26 2020-10-28
4.3
None Remote Medium Not required None Partial None
AntSword 2.1.8.1 contains a cross-site scripting (XSS) vulnerability in the View Site funtion. When viewing an added site, an XSS payload can be injected in cookies view which can lead to remote code execution.
256 CVE-2020-25466 918 Exec Code 2020-10-23 2020-10-27
7.5
None Remote Low Not required Partial Partial Partial
A SSRF vulnerability exists in the downloadimage interface of CRMEB 3.0, which can remotely download arbitrary files on the server and remotely execute arbitrary code.
257 CVE-2020-25374 613 2020-10-28 2020-12-02
2.1
None Remote High ??? Partial None None
CyberArk Privileged Session Manager (PSM) 10.9.0.15 allows attackers to discover internal pathnames by reading an error popup message after two hours of idle time.
258 CVE-2020-25343 79 XSS 2020-10-07 2020-10-14
3.5
None Remote Medium ??? None Partial None
Cross-site scripting (XSS) vulnerabilities in Symphony CMS 3.0.0 allow remote attackers to inject arbitrary web script or HTML to fields['body'] param via events\event.publish_article.php
259 CVE-2020-25273 287 Sql Bypass 2020-10-08 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
In SourceCodester Online Bus Booking System 1.0, there is Authentication bypass on the Admin Login screen in admin.php via username or password SQL injection.
260 CVE-2020-25272 79 XSS 2020-10-08 2020-10-16
4.3
None Remote Medium Not required None Partial None
In SourceCodester Online Bus Booking System 1.0, there is XSS through the name parameter in book_now.php.
261 CVE-2020-25271 79 XSS 2020-10-08 2020-10-16
3.5
None Remote Medium ??? None Partial None
PHPGurukul hospital-management-system-in-php 4.0 allows XSS via admin/patient-search.php, doctor/search.php, book-appointment.php, doctor/appointment-history.php, or admin/appointment-history.php.
262 CVE-2020-25270 79 XSS 2020-10-08 2022-04-19
3.5
None Remote Medium ??? None Partial None
PHPGurukul hostel-management-system 2.1 allows XSS via Guardian Name, Guardian Relation, Guardian Contact no, Address, or City.
263 CVE-2020-25263 352 CSRF 2020-10-08 2020-10-19
5.8
None Remote Medium Not required None Partial Partial
PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/addons/uninstall/anomaly.module.blocks URI: an arbitrary plugin will be deleted.
264 CVE-2020-25262 352 CSRF 2020-10-08 2020-10-16
4.3
None Remote Medium Not required None Partial None
PyroCMS 3.7 is vulnerable to cross-site request forgery (CSRF) via the admin/pages/delete/ URI: pages will be deleted.
265 CVE-2020-25214 2020-10-16 2020-10-28
9.3
None Remote Medium Not required Complete Complete Complete
In the client in Overwolf 0.149.2.30, a channel can be accessed or influenced by an actor that is not an endpoint.
266 CVE-2020-25204 2020-10-28 2020-11-04
2.1
None Local Low Not required None Partial None
The God Kings application 0.60.1 for Android exposes a broadcast receiver to other apps called com.innogames.core.frontend.notifications.receivers.LocalNotificationBroadcastReceiver. The purpose of this broadcast receiver is to show an in-game push notification to the player. However, the application does not enforce any authorization schema on the broadcast receiver, allowing any application to send fully customizable in-game push notifications.
267 CVE-2020-25200 203 2020-10-01 2022-01-01
5.0
None Remote Low Not required Partial None None
** DISPUTED ** Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely. Note: This has been disputed by the vendor as not a vulnerability. They argue that this is an intended design.
268 CVE-2020-25188 125 Exec Code 2020-10-14 2020-10-26
6.8
None Remote Medium Not required Partial Partial Partial
An attacker who convinces a valid user to open a specially crafted project file to exploit could execute code under the privileges of the application due to an out-of-bounds read vulnerability on the LAquis SCADA (Versions prior to 4.3.1.870).
269 CVE-2020-25186 776 2020-10-22 2021-07-21
5.0
None Remote Low Not required Partial None None
An XXE vulnerability exists within LeviStudioU Release Build 2019-09-21 and prior when processing parameter entities, which may allow file disclosure.
270 CVE-2020-25157 89 Sql 2020-10-20 2020-10-22
5.0
None Remote Low Not required Partial None None
The R-SeeNet webpage (1.5.1 through 2.4.10) suffers from SQL injection, which allows a remote attacker to invoke queries on the database and retrieve sensitive information.
271 CVE-2020-25034 89 Sql 2020-10-26 2020-10-30
4.0
None Remote Low ??? Partial None None
eMPS prior to eMPS 9.0 FireEye EX 3500 devices allows remote authenticated users to conduct SQL injection attacks via the sort, sort_by, search{URL], or search[attachment] parameter to the email search feature.
272 CVE-2020-25018 2020-10-01 2020-10-09
5.0
None Remote Low Not required None None Partial
Envoy master between 2d69e30 and 3b5acb2 may fail to parse request URL that requires host canonicalization.
273 CVE-2020-25017 2020-10-01 2020-10-15
7.5
None Remote Low Not required Partial Partial Partial
Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.
274 CVE-2020-24990 22 Dir. Trav. 2020-10-28 2020-11-17
5.0
None Remote Low Not required Partial None None
An issue was discovered in QSC Q-SYS Core Manager 8.2.1. By utilizing the TFTP service running on UDP port 69, a remote attacker can perform a directory traversal and obtain operating system files via a TFTP GET request, as demonstrated by reading /etc/passwd or /proc/version.
275 CVE-2020-24861 79 XSS 2020-10-01 2020-10-08
3.5
None Remote Medium ??? None Partial None
GetSimple CMS 3.3.16 allows in parameter 'permalink' on the Settings page persistent Cross Site Scripting which is executed when you create and open a new page
276 CVE-2020-24860 79 XSS 2020-10-01 2020-10-08
3.5
None Remote Medium ??? None Partial None
CMS Made Simple 2.2.14 allows an authenticated user with access to the Content Manager to edit content and put persistent XSS payload in the affected text fields. The user can get cookies from every authenticated user who visits the website.
277 CVE-2020-24848 287 +Priv 2020-10-23 2022-04-28
7.2
None Local Low Not required Complete Complete Complete
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
278 CVE-2020-24847 352 CSRF 2020-10-23 2020-10-27
4.3
None Remote Medium Not required None Partial None
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticated attacker can change the newSSID and hostapd_wpa_passphrase.
279 CVE-2020-24807 20 Exec Code 2020-10-06 2020-10-14
6.8
None Remote Medium Not required Partial Partial Partial
** UNSUPPORTED WHEN ASSIGNED ** The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
280 CVE-2020-24765 200 +Info 2020-10-20 2021-07-21
5.0
None Remote Low Not required Partial None None
InterMind iMind Server through 3.13.65 allows remote unauthenticated attackers to read the self-diagnostic archive via a direct api/rs/monitoring/rs/api/system/dump-diagnostic-info?server=127.0.0.1 request.
281 CVE-2020-24722 294 2020-10-07 2020-10-23
2.6
None Remote High Not required None Partial None
** DISPUTED ** An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The encrypted metadata block with a TX value lacks a checksum, allowing bitflipping to amplify a contamination attack. This can cause metadata deanonymization and risk-score inflation. NOTE: the vendor's position is "We do not believe that TX power authentication would be a useful defense against relay attacks."
282 CVE-2020-24713 613 2020-10-28 2020-10-30
5.0
None Remote Low Not required Partial None None
Gophish through 0.10.1 does not invalidate the gophish cookie upon logout.
283 CVE-2020-24712 79 XSS 2020-10-28 2020-10-30
3.5
None Remote Medium ??? None Partial None
Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the IMAP Host field on the account settings page.
284 CVE-2020-24711 1021 DoS 2020-10-28 2020-10-30
4.3
None Remote Medium Not required None None Partial
The Reset button on the Account Settings page in Gophish before 0.11.0 allows attackers to cause a denial of service via a clickjacking attack
285 CVE-2020-24710 918 2020-10-28 2020-10-30
5.0
None Remote Low Not required Partial None None
Gophish before 0.11.0 allows SSRF attacks.
286 CVE-2020-24709 79 XSS 2020-10-28 2020-10-29
3.5
None Remote Medium ??? None Partial None
Cross Site Scripting (XSS) vulnerability in Gophish through 0.10.1 via a crafted landing page or email template.
287 CVE-2020-24708 79 XSS 2020-10-28 2020-10-29
3.5
None Remote Medium ??? None Partial None
Cross Site Scripting (XSS) vulnerability in Gophish before 0.11.0 via the Host field on the send profile form.
288 CVE-2020-24707 1236 2020-10-28 2020-10-30
9.3
None Remote Medium Not required Complete Complete Complete
Gophish before 0.11.0 allows the creation of CSV sheets that contain malicious content.
289 CVE-2020-24698 415 Exec Code 2020-10-02 2020-10-08
6.8
None Remote Medium Not required Partial Partial Partial
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending crafted queries with a GSS-TSIG signature.
290 CVE-2020-24697 DoS 2020-10-02 2020-10-08
4.3
None Remote Medium Not required None None Partial
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.
291 CVE-2020-24696 362 Exec Code 2020-10-02 2020-10-08
5.1
None Remote High Not required Partial Partial Partial
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.
292 CVE-2020-24652 917 Exec Code 2020-10-19 2020-10-21
10.0
None Remote Low Not required Complete Complete Complete
A addvsiinterfaceinfo expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
293 CVE-2020-24651 917 Exec Code 2020-10-19 2020-10-21
10.0
None Remote Low Not required Complete Complete Complete
A syslogtempletselectwin expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
294 CVE-2020-24650 917 Exec Code 2020-10-19 2020-10-21
10.0
None Remote Low Not required Complete Complete Complete
A legend expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
295 CVE-2020-24649 20 Exec Code 2020-10-19 2020-10-21
10.0
None Remote Low Not required Complete Complete Complete
A remote bytemessageresource transformentity" input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
296 CVE-2020-24648 502 Exec Code 2020-10-19 2020-10-21
10.0
None Remote Low Not required Complete Complete Complete
A accessmgrservlet classname deserialization of untrusted data remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
297 CVE-2020-24647 20 Exec Code 2020-10-19 2020-10-21
10.0
None Remote Low Not required Complete Complete Complete
A remote accessmgrservlet classname input validation code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
298 CVE-2020-24646 787 Exec Code Overflow 2020-10-19 2020-10-21
10.0
None Remote Low Not required Complete Complete Complete
A tftpserver stack-based buffer overflow remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
299 CVE-2020-24632 77 Exec Code 2020-10-26 2021-07-21
9.0
None Remote Low ??? Complete Complete Complete
A remote execution of arbitrary commandss vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
300 CVE-2020-24631 77 Exec Code 2020-10-26 2021-07-21
9.0
None Remote Low ??? Complete Complete Complete
A remote execution of arbitrary commands vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.
Total number of vulnerabilities : 1563   Page : 1 2 3 4 5 6 (This Page)7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.