CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In August 2020

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
301 CVE-2020-16138 20 2020-08-12 2021-07-21
7.8
None Remote Low Not required None None Complete
** UNSUPPORTED WHEN ASSIGNED ** A denial-of-service issue in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to remotely disable the device until it is power cycled. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE’s reference information.
302 CVE-2020-16137 269 2020-08-12 2021-07-21
6.8
None Remote Medium Not required Partial Partial Partial
** UNSUPPORTED WHEN ASSIGNED ** A privilege escalation issue in Cisco Unified IP Conference Station 7937G 1-4-4-0 through 1-4-5-7 allows attackers to reset the credentials for the SSH administrative console to arbitrary values. Note: We cannot prove this vulnerability exists. Out of an abundance of caution, this CVE is being assigned to better serve our customers and ensure all who are still running this product understand that the product is end of life and should be removed or upgraded. For more information on this, and how to upgrade, refer to the CVE’s reference information.
303 CVE-2020-16134 522 2020-08-04 2021-07-21
7.7
None Local Network Low ??? Complete Complete Complete
An issue was discovered on Swisscom Internet Box 2, Internet Box Standard, Internet Box Plus prior to 10.04.38, Internet Box 3 prior to 11.01.20, and Internet Box light prior to 08.06.06. Given the (user-configurable) credentials for the local Web interface or physical access to a device's plus or reset button, an attacker can create a user with elevated privileges on the Sysbus-API. This can then be used to modify local or remote SSH access, thus allowing a login session as the superuser.
304 CVE-2020-16131 79 XSS 2020-08-03 2020-08-04
4.3
None Remote Medium Not required None Partial None
Tiki before 21.2 allows XSS because [\s\/"\'] is not properly considered in lib/core/TikiFilter/PreventXss.php.
305 CVE-2020-16116 22 Dir. Trav. 2020-08-03 2022-05-20
4.3
None Remote Medium Not required None Partial None
In kerfuffle/jobs.cpp in KDE Ark before 20.08.0, a crafted archive can install files outside the extraction directory via ../ directory traversal.
306 CVE-2020-16092 617 DoS 2020-08-11 2020-10-13
2.1
None Local Low Not required None None Partial
In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
307 CVE-2020-16087 74 2020-08-13 2020-08-19
9.3
None Remote Medium Not required Complete Complete Complete
An issue was discovered in Zalo.exe in VNG Zalo Desktop 19.8.1.0. An attacker can run arbitrary commands on a remote Windows machine running the Zalo client by sending the user of the device a crafted file.
308 CVE-2020-15956 120 Overflow 2020-08-04 2020-08-06
5.0
None Remote Low Not required None None Partial
ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unauthenticated attackers to trigger a buffer overflow and application termination via a malformed payload.
309 CVE-2020-15947 89 Exec Code Sql 2020-08-13 2020-08-19
6.5
None Remote Low ??? Partial Partial Partial
A SQL injection vulnerability in the qm_adm/qm_export_stats_run.do endpoint of Loway QueueMetrics before 19.10.21 allows remote authenticated users to execute arbitrary SQL commands via the exportId parameter.
310 CVE-2020-15944 79 XSS 2020-08-04 2020-08-06
3.5
None Remote Medium ??? None Partial None
An issue was discovered in the Gantt-Chart module before 5.5.5 for Jira. Due to missing validation of user input, it is vulnerable to a persistent XSS attack. An attacker can embed the attack vectors in the dashboard of other users. To exploit this vulnerability, an attacker has to be authenticated.
311 CVE-2020-15943 862 XSS 2020-08-04 2021-07-21
5.5
None Remote Low ??? Partial Partial None
An issue was discovered in the Gantt-Chart module before 5.5.4 for Jira. Due to a missing privilege check, it is possible to read and write to the module configuration of other users. This can also be used to deliver an XSS payload to other users' dashboards. To exploit this vulnerability, an attacker has to be authenticated.
312 CVE-2020-15926 79 Exec Code XSS 2020-08-18 2020-08-20
4.3
None Remote Medium Not required None Partial None
Rocket.Chat through 3.4.2 allows XSS where an attacker can send a specially crafted message to a channel or in a direct message to the client which results in remote code execution on the client side.
313 CVE-2020-15925 89 Exec Code Sql 2020-08-13 2020-08-19
6.5
None Remote Low ??? Partial Partial Partial
A SQL injection vulnerability at a tpf URI in Loway QueueMetrics before 19.10.21 allows remote authenticated attackers to execute arbitrary SQL commands via the TPF_XPAR1 parameter.
314 CVE-2020-15907 79 XSS 2020-08-07 2020-08-12
4.3
None Remote Medium Not required None Partial None
In Mahara 19.04 before 19.04.6, 19.10 before 19.10.4, and 20.04 before 20.04.1, certain places could execute file or folder names containing JavaScript.
315 CVE-2020-15868 863 2020-08-12 2021-07-21
5.0
None Remote Low Not required Partial None None
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
316 CVE-2020-15865 20 Exec Code 2020-08-18 2021-07-21
10.0
None Remote Low Not required Complete Complete Complete
A Remote Code Execution vulnerability in Stimulsoft (aka Stimulsoft Reports) 2013.1.1600.0 allows an attacker to encode C# scripts as base-64 in the report XML file so that they will be compiled and executed on the server that processes this file. This can be used to fully compromise the server.
317 CVE-2020-15862 269 2020-08-20 2020-09-04
7.2
None Local Low Not required Complete Complete Complete
Net-SNMP through 5.7.3 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
318 CVE-2020-15861 59 2020-08-20 2020-09-04
7.2
None Local Low Not required Complete Complete Complete
Net-SNMP through 5.7.3 allows Escalation of Privileges because of UNIX symbolic link (symlink) following.
319 CVE-2020-15858 22 Dir. Trav. 2020-08-21 2020-09-03
3.6
None Local Low Not required Partial Partial None
Some devices of Thales DIS (formerly Gemalto, formerly Cinterion) allow Directory Traversal by physically proximate attackers. The directory path access check of the internal flash file system can be circumvented. This flash file system can store application-specific data and data needed for customer Java applications, TLS and OTAP (Java over-the-air-provisioning) functionality. The affected products and releases are: BGS5 up to and including SW RN 02.000 / ARN 01.001.06 EHSx and PDSx up to and including SW RN 04.003 / ARN 01.000.04 ELS61 up to and including SW RN 02.002 / ARN 01.000.04 ELS81 up to and including SW RN 05.002 / ARN 01.000.04 PLS62 up to and including SW RN 02.000 / ARN 01.000.04
320 CVE-2020-15831 79 XSS 2020-08-08 2020-08-10
4.3
None Remote Medium Not required None Partial None
JetBrains TeamCity before 2019.2.3 is vulnerable to reflected XSS in the administration UI.
321 CVE-2020-15830 79 XSS 2020-08-08 2020-08-10
4.3
None Remote Medium Not required None Partial None
JetBrains TeamCity before 2019.2.3 is vulnerable to stored XSS in the administration UI.
322 CVE-2020-15829 200 +Info 2020-08-08 2021-07-21
5.0
None Remote Low Not required Partial None None
In JetBrains TeamCity before 2019.2.3, password parameters could be disclosed via build logs.
323 CVE-2020-15828 200 +Info 2020-08-08 2021-07-21
4.0
None Remote Low ??? Partial None None
In JetBrains TeamCity before 2020.1.1, project parameter values can be retrieved by a user without appropriate permissions.
324 CVE-2020-15827 347 2020-08-08 2020-08-10
5.0
None Remote Low Not required None Partial None
In JetBrains ToolBox version 1.17 before 1.17.6856, the set of signature verifications omitted the jetbrains-toolbox.exe file.
325 CVE-2020-15826 863 2020-08-08 2021-07-21
4.0
None Remote Low ??? None Partial None
In JetBrains TeamCity before 2020.1, users are able to assign more permissions than they have.
326 CVE-2020-15825 269 2020-08-08 2021-07-21
6.5
None Remote Low ??? Partial Partial Partial
In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges.
327 CVE-2020-15824 269 2020-08-08 2022-03-03
6.5
None Remote Low ??? Partial Partial Partial
In JetBrains Kotlin from 1.4-M1 to 1.4-RC (as Kotlin 1.3.7x is not affected by the issue. Fixed version is 1.4.0) there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.
328 CVE-2020-15823 918 2020-08-08 2020-08-10
5.0
None Remote Low Not required Partial None None
JetBrains YouTrack before 2020.2.8873 is vulnerable to SSRF in the Workflow component.
329 CVE-2020-15821 276 2020-08-08 2020-08-10
4.0
None Remote Low ??? None Partial None
In JetBrains YouTrack before 2020.2.6881, a user without permission is able to create an article draft.
330 CVE-2020-15820 200 +Info 2020-08-08 2021-07-21
5.0
None Remote Low Not required Partial None None
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.
331 CVE-2020-15819 918 2020-08-08 2020-08-10
5.0
None Remote Low Not required Partial None None
JetBrains YouTrack before 2020.2.10643 was vulnerable to SSRF that allowed scanning internal ports.
332 CVE-2020-15818 200 +Info 2020-08-08 2021-07-21
5.0
None Remote Low Not required Partial None None
In JetBrains YouTrack before 2020.2.8527, the subtasks workflow could disclose issue existence.
333 CVE-2020-15817 94 Exec Code 2020-08-08 2021-07-21
6.5
None Remote Low ??? Partial Partial Partial
In JetBrains YouTrack before 2020.1.1331, an external user could execute commands against arbitrary issues.
334 CVE-2020-15781 79 Exec Code XSS 2020-08-14 2020-08-21
6.8
None Remote Medium Not required Partial Partial Partial
A vulnerability has been identified in SICAM WEB firmware for SICAM A8000 RTUs (All versions < V05.30). The login screen does not sufficiently sanitize input, which enables an attacker to generate specially crafted log messages. If an unsuspecting victim views the log messages via the web browser, these log messages might be interpreted and executed as code by the web application. This Cross-Site-Scripting (XSS) vulnerability might compromize the confidentiality, integrity and availability of the web application.
335 CVE-2020-15777 502 Exec Code 2020-08-25 2020-11-09
4.6
None Local Low Not required Partial Partial Partial
An issue was discovered in the Maven Extension plugin before 1.6 for Gradle Enterprise. The extension uses a socket connection to send serialized Java objects. Deserialization is not restricted to an allow-list, thus allowing an attacker to achieve code execution via a malicious deserialization gadget chain. The socket is not bound exclusively to localhost. The port this socket is assigned to is randomly selected and is not intentionally exposed to the public (either by design or documentation). This could potentially be used to achieve remote code execution and local privilege escalation.
336 CVE-2020-15702 367 Exec Code 2020-08-06 2020-09-14
4.4
None Local Medium Not required Partial Partial Partial
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges. Fixed in 2.20.1-0ubuntu2.24, 2.20.9 versions prior to 2.20.9-0ubuntu7.16 and 2.20.11 versions prior to 2.20.11-0ubuntu27.6. Was ZDI-CAN-11234.
337 CVE-2020-15701 755 DoS 2020-08-06 2020-09-14
2.1
None Local Low Not required None None Partial
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.16, 2.20.11-0ubuntu27.6.
338 CVE-2020-15694 20 2020-08-14 2021-02-08
5.0
None Remote Low Not required None Partial None
In Nim 1.2.4, the standard library httpClient fails to properly validate the server response. For example, httpClient.get().contentLength() does not raise any error if a malicious server provides a negative Content-Length.
339 CVE-2020-15693 74 2020-08-14 2021-02-08
6.4
None Remote Low Not required Partial Partial None
In Nim 1.2.4, the standard library httpClient is vulnerable to a CR-LF injection in the target URL. An injection is possible if the attacker controls any part of the URL provided in a call (such as httpClient.get or httpClient.post), the User-Agent header value, or custom HTTP header names or values.
340 CVE-2020-15692 88 Exec Code 2020-08-14 2021-02-08
10.0
None Remote Low Not required Complete Complete Complete
In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands.
341 CVE-2020-15687 DoS 2020-08-31 2020-09-08
5.0
None Remote Low Not required None None Partial
Missing access control restrictions in the Hypervisor component of the ACRN Project (v2.0 and v1.6.1) allow a malicious entity, with root access in the Service VM userspace, to abuse the PCIe assign/de-assign Hypercalls via crafted ioctls and payloads. This attack results in a corrupt state and Denial of Service (DoS) for previously assigned PCIe devices to the Service VM at runtime.
342 CVE-2020-15662 2020-08-10 2020-08-14
4.3
None Remote Medium Not required None Partial None
A rogue webpage could override the injected WKUserScript used by the download feature, this exploit could result in the user downloading an unintended file. This vulnerability affects Firefox for iOS < 28.
343 CVE-2020-15661 522 2020-08-10 2020-08-14
4.3
None Remote Medium Not required Partial None None
A rogue webpage could override the injected WKUserScript used by the logins autofill, this exploit could result in leaking a password for the current domain. This vulnerability affects Firefox for iOS < 28.
344 CVE-2020-15659 787 Mem. Corr. 2020-08-10 2020-08-21
9.3
None Remote Medium Not required Complete Complete Complete
Mozilla developers and community members reported memory safety bugs present in Firefox 78 and Firefox ESR 78.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.
345 CVE-2020-15658 754 2020-08-10 2020-08-18
4.3
None Remote Medium Not required None Partial None
The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
346 CVE-2020-15657 427 2020-08-10 2020-08-14
6.9
None Local Medium Not required Complete Complete Complete
Firefox could be made to load attacker-supplied DLL files from the installation directory. This required an attacker that is already capable of placing files in the installation directory. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
347 CVE-2020-15656 843 2020-08-10 2020-08-18
9.3
None Remote Medium Not required Complete Complete Complete
JIT optimizations involving the Javascript arguments object could confuse later optimizations. This risk was already mitigated by various precautions in the code, resulting in this bug rated at only moderate severity. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
348 CVE-2020-15655 Bypass 2020-08-10 2022-05-03
4.3
None Remote Medium Not required Partial None None
A redirected HTTP request which is observed or modified through a web extension could bypass existing CORS checks, leading to potential disclosure of cross-origin information. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
349 CVE-2020-15654 835 2020-08-10 2020-08-18
4.3
None Remote Medium Not required None Partial None
When in an endless loop, a website specifying a custom cursor using CSS could make it look like the user is interacting with the user interface, when they are not. This could lead to a perceived broken state, especially when interactions with existing browser dialogs and warnings do not work. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
350 CVE-2020-15653 Bypass 2020-08-10 2020-08-18
4.3
None Remote Medium Not required None Partial None
An iframe sandbox element with the allow-popups flag could be bypassed when using noopener links. This could have led to security issues for websites relying on sandbox configurations that allowed popups and hosted arbitrary content. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
Total number of vulnerabilities : 1155   Page : 1 2 3 4 5 6 7 (This Page)8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.