Weekly Vulnerabilities Reports > February 10 to 16, 2020

Overview

543 new vulnerabilities reported during this period, including 47 critical vulnerabilities and 131 high severity vulnerabilities. This weekly summary report vulnerabilities in 1172 products from 207 vendors including Microsoft, Google, Adobe, Opensuse, and Redhat. Vulnerabilities are notably categorized as "Cross-site Scripting", "Improper Privilege Management", "Out-of-bounds Write", "Improper Input Validation", and "Information Exposure".

  • 396 reported vulnerabilities are remotely exploitables.
  • 23 reported vulnerabilities have public exploit available.
  • 138 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
  • 447 reported vulnerabilities are exploitable by an anonymous user.
  • Microsoft has the most reported vulnerabilities, with 104 reported vulnerabilities.
  • Adobe has the most reported critical vulnerabilities, with 14 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

47 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2020-02-14 CVE-2019-4392 Hcltech Use of Hard-coded Credentials vulnerability in Hcltech Appscan 9.0.3.13

HCL AppScan Standard Edition 9.0.3.13 and earlier uses hard-coded credentials which can be exploited by attackers to get unauthorized access to the system.

10.0
2020-02-13 CVE-2013-7287 Mobileiron Inadequate Encryption Strength vulnerability in Mobileiron Sentry and Virtual Smartphone Platform

MobileIron VSP < 5.9.1 and Sentry < 5.0 has an insecure encryption scheme.

10.0
2020-02-13 CVE-2013-7173 Belkin Classic Buffer Overflow vulnerability in Belkin N750 Firmware 1.10.16M

Belkin n750 routers have a buffer overflow.

10.0
2020-02-13 CVE-2020-3763 Adobe Unspecified vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a privilege escalation vulnerability.

10.0
2020-02-13 CVE-2020-3762 Adobe Unspecified vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a privilege escalation vulnerability.

10.0
2020-02-13 CVE-2020-3760 Adobe Injection vulnerability in Adobe Digital Editions

Adobe Digital Editions versions 4.5.10 and below have a command injection vulnerability.

10.0
2020-02-13 CVE-2020-3754 Adobe Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a buffer error vulnerability.

10.0
2020-02-13 CVE-2020-3752 Adobe Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a buffer error vulnerability.

10.0
2020-02-13 CVE-2020-3751 Adobe Use After Free vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an use after free vulnerability.

10.0
2020-02-13 CVE-2020-3750 Adobe Use After Free vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an use after free vulnerability.

10.0
2020-02-13 CVE-2020-3749 Adobe Use After Free vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an use after free vulnerability.

10.0
2020-02-13 CVE-2020-3746 Adobe Use After Free vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an use after free vulnerability.

10.0
2020-02-13 CVE-2020-3745 Adobe Use After Free vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an use after free vulnerability.

10.0
2020-02-13 CVE-2020-3743 Adobe Use After Free vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an use after free vulnerability.

10.0
2020-02-13 CVE-2020-3742 Adobe Out-of-bounds Write vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions, 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a heap overflow vulnerability.

10.0
2020-02-13 CVE-2020-3740 Adobe Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have a memory corruption vulnerability.

10.0
2020-02-13 CVE-2020-8964 Timetoolsltd Use of Hard-coded Credentials vulnerability in Timetoolsltd products

TimeTools SC7105 1.0.007, SC9205 1.0.007, SC9705 1.0.007, SR7110 1.0.007, SR9210 1.0.007, SR9750 1.0.007, SR9850 1.0.007, T100 1.0.003, T300 1.0.003, and T550 1.0.003 devices allow remote attackers to bypass authentication by placing t3axs=TiMEtOOlsj7G3xMm52wB in a t3.cgi request, aka a "hardcoded cookie."

10.0
2020-02-13 CVE-2020-8963 Timetoolsltd OS Command Injection vulnerability in Timetoolsltd products

TimeTools SC7105 1.0.007, SC9205 1.0.007, SC9705 1.0.007, SR7110 1.0.007, SR9210 1.0.007, SR9750 1.0.007, SR9850 1.0.007, T100 1.0.003, T300 1.0.003, and T550 1.0.003 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the t3.cgi srmodel or srtime parameter.

10.0
2020-02-12 CVE-2011-4908 Tiny Unrestricted Upload of File with Dangerous Type vulnerability in Tiny Tinybrowser

TinyBrowser plugin for Joomla! before 1.5.13 allows arbitrary file upload via upload.php.

10.0
2020-02-12 CVE-2013-6236 Izoncam Use of Hard-coded Credentials vulnerability in Izoncam Izon IP Firmware 2.0.2

IZON IP 2.0.2: hard-coded password vulnerability

10.0
2020-02-11 CVE-2013-3684 Imagely Unrestricted Upload of File with Dangerous Type vulnerability in Imagely Nextgen Gallery

NextGEN Gallery plugin before 1.9.13 for WordPress: ngggallery.php file upload

10.0
2020-02-11 CVE-2013-1359 Sonicwall Improper Authentication vulnerability in Sonicwall products

An Authentication Bypass Vulnerability exists in DELL SonicWALL Analyzer 7.0, Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0; Universal Management Appliance (UMA) 5.1, 6.0, and 7.0 and ViewPoint 4.1, 5.0, 5.1, and 6.0 via the skipSessionCheck parameter to the UMA interface (/appliance/), which could let a remote malicious user obtain access to the root account.

10.0
2020-02-11 CVE-2013-1360 Sonicwall Improper Authentication vulnerability in Sonicwall products

An Authentication Bypass vulnerability exists in DELL SonicWALL Global Management System (GMS) 4.1, 5.0, 5.1, 6.0, and 7.0, Analyzer 7.0, Universal Management Appliance (UMA) 5.1, 6.0, and 7.0 and ViewPoint 4.1, 5.0, and 6.0 via a crafted request to the SGMS interface, which could let a remote malicious user obtain administrative access.

10.0
2020-02-11 CVE-2019-14514 Microvirt OS Command Injection vulnerability in Microvirt Memu

An issue was discovered in Microvirt MEmu all versions prior to 7.0.2.

10.0
2020-02-11 CVE-2013-5945 Dlink SQL Injection vulnerability in Dlink products

Multiple SQL injection vulnerabilities in D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 allow remote attackers to execute arbitrary SQL commands via the password to (1) the login.authenticate function in share/lua/5.1/teamf1lualib/login.lua or (2) captivePortal.lua.

10.0
2020-02-11 CVE-2013-4267 Pydio OS Command Injection vulnerability in Pydio

Ajaxeplorer before 5.0.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) archive_name parameter to the Power FS module (plugins/action.powerfs/class.PowerFSController.php), a (2) file name to the getTrustSizeOnFileSystem function in the File System (Standard) module (plugins/access.fs/class.fsAccessWrapper.php), or the (3) revision parameter to the Subversion Repository module (plugins/meta.svn/class.SvnManager.php).

10.0
2020-02-10 CVE-2019-20451 Samsung Unrestricted Upload of File with Dangerous Type vulnerability in Samsung Prismview Player 11 and Prismview System 9

The HTTP API in Prismview System 9 11.10.17.00 and Prismview Player 11 13.09.1100 allows remote code execution by uploading RebootSystem.lnk and requesting /REBOOTSYSTEM or /RESTARTVNC.

10.0
2020-02-10 CVE-2012-6611 Polycom Use of Hard-coded Credentials vulnerability in Polycom HDX System Software

An issue was discovered in Polycom Web Management Interface G3/HDX 8000 HD with Durango 2.6.0 4740 software and embedded Polycom Linux Development Platform 2.14.g3.

10.0
2020-02-12 CVE-2020-8955 Weechat
Fedoraproject
Opensuse
Debian
Classic Buffer Overflow vulnerability in multiple products

irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).

9.8
2020-02-12 CVE-2014-0234 Redhat Insecure Default Initialization of Resource vulnerability in Redhat Openshift

The default configuration of broker.conf in Red Hat OpenShift Enterprise 2.x before 2.1 has a password of "mooo" for a Mongo account, which allows remote attackers to hijack the broker by providing this password, related to the openshift.sh script in Openshift Extras before 20130920.

9.8
2020-02-10 CVE-2020-8840 Fasterxml
Debian
Netapp
Huawei
Oracle
Deserialization of Untrusted Data vulnerability in multiple products

FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.

9.8
2020-02-10 CVE-2019-20062 Mfscripts Improper Authentication vulnerability in Mfscripts Yetishare

MFScripts YetiShare v3.5.2 through v4.5.4 might allow an attacker to reset a password by using a leaked hash (the hash never expires until used).

9.8
2020-02-13 CVE-2020-3757 Adobe
Redhat
Type Confusion vulnerability in multiple products

Adobe Flash Player versions 32.0.0.321 and earlier, 32.0.0.314 and earlier, 32.0.0.321 and earlier, and 32.0.0.255 and earlier have a type confusion vulnerability.

9.3
2020-02-12 CVE-2013-3494 Umplayer Project Untrusted Search Path vulnerability in Umplayer Project Umplayer 0.98

A Code Execution Vulnerability exists in UMPlayer 0.98 in wintab32.dll due to insufficient path restrictions when loading external libraries.

9.3
2020-02-12 CVE-2013-2097 Zpanel Project Unspecified vulnerability in Zpanel Project Zpanel 10.1.0

ZPanel through 10.1.0 has Remote Command Execution

9.3
2020-02-11 CVE-2020-0759 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Excel and Office 365 Proplus

A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.

9.3
2020-02-11 CVE-2020-0738 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products

A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'.

9.3
2020-02-11 CVE-2020-0734 Microsoft Improper Input Validation vulnerability in Microsoft products

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server, aka 'Remote Desktop Client Remote Code Execution Vulnerability'.

9.3
2020-02-10 CVE-2017-18641 Linuxcontainers Improper Authentication vulnerability in Linuxcontainers LXC 2.0.0

In LXC 2.0, many template scripts download code over cleartext HTTP, and omit a digital-signature check, before running it to bootstrap containers.

9.3
2020-02-14 CVE-2020-8858 Moxa OS Command Injection vulnerability in Moxa products

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Moxa MGate 5105-MB-EIP firmware version 4.1.

9.0
2020-02-12 CVE-2020-6192 SAP Improper Input Validation vulnerability in SAP Landscape Management 3.0

SAP Landscape Management, version 3.0, allows an attacker with admin privileges to execute malicious commands with root privileges in SAP Host Agent via SAP Landscape Management.

9.0
2020-02-12 CVE-2020-6191 SAP Improper Input Validation vulnerability in SAP Landscape Management 3.0

SAP Landscape Management, version 3.0, allows an attacker with admin privileges to execute malicious executables with root privileges in SAP Host Agent via SAP Landscape Management due to Missing Input Validation.

9.0
2020-02-12 CVE-2020-8949 Gocloud OS Command Injection vulnerability in Gocloud products

Gocloud S2A_WL 4.2.7.16471, S2A 4.2.7.17278, S2A 4.3.0.15815, S2A 4.3.0.17193, S3A K2P MTK 4.2.7.16528, S3A 4.3.0.16572, and ISP3000 4.3.0.17190 devices allows remote attackers to execute arbitrary OS commands via shell metacharacters in a ping operation, as demonstrated by the cgi-bin/webui/admin/tools/app_ping/diag_ping/; substring.

9.0
2020-02-12 CVE-2020-8947 Artica OS Command Injection vulnerability in Artica Pandora FMS 7.0

functions_netflow.php in Artica Pandora FMS 7.0 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the index.php?operation/netflow/nf_live_view ip_dst, dst_port, or src_port parameter, a different vulnerability than CVE-2019-20224.

9.0
2020-02-12 CVE-2020-8946 Netis Systems OS Command Injection vulnerability in Netis-Systems Wf2471 Firmware 1.2.30142

Netis WF2471 v1.2.30142 devices allow an authenticated attacker to execute arbitrary OS commands via shell metacharacters in the /cgi-bin-igd/sys_log_clean.cgi log_3g_type parameter.

9.0
2020-02-11 CVE-2020-0662 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products

A remote code execution vulnerability exists in the way that Windows handles objects in memory, aka 'Windows Remote Code Execution Vulnerability'.

9.0
2020-02-11 CVE-2020-8429 Kinetica Improper Input Validation vulnerability in Kinetica 7.0.9.2.20191118151947

The Admin web application in Kinetica 7.0.9.2.20191118151947 does not properly sanitise the input for the function getLogs.

9.0

131 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2020-02-13 CVE-2020-0022 Google
Huawei
Incorrect Calculation vulnerability in multiple products

In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation.

8.8
2020-02-12 CVE-2019-17519 NXP Classic Buffer Overflow vulnerability in NXP Mcuxpresso Software Development KIT 2.2.1

The Bluetooth Low Energy implementation on NXP SDK through 2.2.1 for KW41Z devices does not properly restrict the Link Layer payload length, allowing attackers in radio range to cause a buffer overflow via a crafted packet.

8.8
2020-02-12 CVE-2020-2123 Jenkins Deserialization of Untrusted Data vulnerability in Jenkins Radargun

Jenkins RadarGun Plugin 1.7 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

8.8
2020-02-12 CVE-2020-2121 Jenkins Unspecified vulnerability in Jenkins Google Kubernetes Engine

Jenkins Google Kubernetes Engine Plugin 0.8.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.

8.8
2020-02-12 CVE-2020-2120 Jenkins XXE vulnerability in Jenkins Fitnesse

Jenkins FitNesse Plugin 1.30 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks.

8.8
2020-02-12 CVE-2020-2116 Jenkins Cross-Site Request Forgery (CSRF) vulnerability in Jenkins Pipeline Github Notify Step

A cross-site request forgery vulnerability in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

8.8
2020-02-12 CVE-2020-2115 Jenkins XXE vulnerability in Jenkins Nunit

Jenkins NUnit Plugin 0.25 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks.

8.8
2020-02-12 CVE-2020-2110 Jenkins Improper Input Validation vulnerability in Jenkins Script Security

Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations.

8.8
2020-02-12 CVE-2020-2109 Jenkins Improper Input Validation vulnerability in Jenkins Pipeline: Groovy

Sandbox protection in Jenkins Pipeline: Groovy Plugin 2.78 and earlier can be circumvented through default parameter expressions in CPS-transformed methods.

8.8
2020-02-11 CVE-2020-0688 Microsoft Improper Authentication vulnerability in Microsoft Exchange Server

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.

8.8
2020-02-11 CVE-2013-4225 Restful WEB Services Project Code Injection vulnerability in Restful web Services Project Restful web Services

The RESTful Web Services (restws) module 7.x-1.x before 7.x-1.4 and 7.x-2.x before 7.x-2.1 for Drupal does not properly restrict access to entity write operations, which makes it easier for remote authenticated users with the "access resource node" and "create page content" permissions (or equivalents) to conduct cross-site scripting (XSS) or execute arbitrary PHP code via a crafted text field.

8.8
2020-02-11 CVE-2013-4535 Qemu
Redhat
Improper Input Validation vulnerability in multiple products

The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.

8.8
2020-02-11 CVE-2020-6416 Google
Fedoraproject
Debian
Suse
Opensuse
Redhat
Improper Input Validation vulnerability in multiple products

Insufficient data validation in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6415 Google
Fedoraproject
Debian
Suse
Opensuse
Redhat
Out-of-bounds Write vulnerability in multiple products

Inappropriate implementation in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6414 Google
Opensuse
Insufficient policy enforcement in Safe Browsing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
8.8
2020-02-11 CVE-2020-6413 Google
Opensuse
Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass HTML validators via a crafted HTML page.
8.8
2020-02-11 CVE-2020-6410 Google Unspecified vulnerability in Google Chrome

Insufficient policy enforcement in navigation in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to confuse the user via a crafted domain name.

8.8
2020-02-11 CVE-2020-6409 Google Unspecified vulnerability in Google Chrome

Inappropriate implementation in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker who convinced the user to enter a URI to bypass navigation restrictions via a crafted domain name.

8.8
2020-02-11 CVE-2020-6406 Google
Fedoraproject
Debian
Suse
Redhat
Use After Free vulnerability in multiple products

Use after free in audio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6404 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Out-of-bounds Write vulnerability in multiple products

Inappropriate implementation in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6402 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Improper Input Validation vulnerability in multiple products

Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.

8.8
2020-02-11 CVE-2020-6398 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Use of Uninitialized Resource vulnerability in multiple products

Use of uninitialized data in PDFium in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.

8.8
2020-02-11 CVE-2020-6390 Google
Fedoraproject
Debian
Suse
Opensuse
Redhat
Out-of-bounds Write vulnerability in multiple products

Out of bounds memory access in streams in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6389 Google Out-of-bounds Write vulnerability in Google Chrome

Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.

8.8
2020-02-11 CVE-2020-6388 Google Race Condition vulnerability in Google Chrome

Out of bounds access in WebAudio in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6387 Google Out-of-bounds Write vulnerability in Google Chrome

Out of bounds write in WebRTC in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted video stream.

8.8
2020-02-11 CVE-2020-6385 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Improper Check for Unusual or Exceptional Conditions vulnerability in multiple products

Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6382 Google
Fedoraproject
Debian
Suse
Opensuse
Redhat
Type Confusion vulnerability in multiple products

Type confusion in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6381 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Integer Overflow or Wraparound vulnerability in multiple products

Integer overflow in JavaScript in Google Chrome on ChromeOS and Android prior to 80.0.3987.87 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6380 Google
Fedoraproject
Incorrect Authorization vulnerability in multiple products

Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.130 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted Chrome Extension.

8.8
2020-02-11 CVE-2020-6379 Google
Fedoraproject
Use After Free vulnerability in multiple products

Use after free in V8 in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-11 CVE-2020-6378 Google
Fedoraproject
Use After Free vulnerability in multiple products

Use after free in speech in Google Chrome prior to 79.0.3945.130 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

8.8
2020-02-10 CVE-2019-20059 Mfscripts SQL Injection vulnerability in Mfscripts Yetishare

payment_manage.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.4 directly insert values from the sSortDir_0 parameter into a SQL string.

8.8
2020-02-11 CVE-2020-0655 Microsoft Improper Input Validation vulnerability in Microsoft products

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an authenticated attacker abuses clipboard redirection, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.

8.5
2020-02-11 CVE-2014-9748 Libuv
Nodejs
Race Condition vulnerability in multiple products

The uv_rwlock_t fallback implementation for Windows XP and Server 2003 in libuv before 1.7.4 does not properly prevent threads from releasing the locks of other threads, which allows attackers to cause a denial of service (deadlock) or possibly have unspecified other impact by leveraging a race condition.

8.1
2020-02-11 CVE-2020-5529 Htmlunit
Debian
Canonical
Apache
Improper Initialization vulnerability in multiple products

HtmlUnit prior to 2.37.0 contains code execution vulnerabilities.

8.1
2020-02-14 CVE-2019-20045 S3India Improper Input Validation vulnerability in S3India Husky RTU 6049-E70 Firmware 5.0

The Synergy Systems & Solutions PLC & RTU system has a vulnerability in HUSKY RTU 6049-E70 firmware versions 5.0 and prior.

7.8
2020-02-13 CVE-2013-1634 Intel Improper Initialization vulnerability in Intel 82574L Controller Firmware 20130206

A denial of service vulnerability exists in some motherboard implementations of Intel e1000e/82574L network controller devices through 2013-02-06 where the device can be brought into a non-processing state when parsing 32 hex, 33 hex, or 34 hex byte values at the 0x47f offset.

7.8
2020-02-12 CVE-2011-3336 PHP
Apple
Freebsd
Openbsd
Resource Exhaustion vulnerability in multiple products

regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.

7.8
2020-02-11 CVE-2020-0683 Microsoft Unspecified vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'.

7.8
2020-02-11 CVE-2019-13946 Siemens Resource Exhaustion vulnerability in Siemens products

Profinet-IO (PNIO) stack versions prior V06.00 do not properly limit internal resource allocation when multiple legitimate diagnostic package requests are sent to the DCE-RPC interface.

7.8
2020-02-11 CVE-2019-13926 Siemens Resource Exhaustion vulnerability in Siemens products

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1).

7.8
2020-02-11 CVE-2020-6417 Google Unspecified vulnerability in Google Chrome

Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry.

7.8
2020-02-11 CVE-2020-0767 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'.

7.6
2020-02-11 CVE-2020-0713 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'.

7.6
2020-02-11 CVE-2020-0712 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'.

7.6
2020-02-11 CVE-2020-0711 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'.

7.6
2020-02-11 CVE-2020-0710 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Chakracore and Edge

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'.

7.6
2020-02-11 CVE-2020-0681 Microsoft Improper Input Validation vulnerability in Microsoft products

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server, aka 'Remote Desktop Client Remote Code Execution Vulnerability'.

7.6
2020-02-11 CVE-2020-0674 Microsoft Use After Free vulnerability in Microsoft Internet Explorer 10/11/9

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'.

7.6
2020-02-11 CVE-2020-0673 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft Internet Explorer 10/11/9

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'.

7.6
2020-02-14 CVE-2020-8129 Script Manager Project Code Injection vulnerability in Script-Manager Project Script-Manager 0.8.6

An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code.

7.5
2020-02-14 CVE-2020-8128 Jsreport Server-Side Request Forgery (SSRF) vulnerability in Jsreport

An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code.

7.5
2020-02-14 CVE-2013-4211 Openx Code Injection vulnerability in Openx 2.8.10

A Code Execution Vulnerability exists in OpenX Ad Server 2.8.10 due to a backdoor in flowplayer-3.1.1.min.js library, which could let a remote malicious user execute arbitrary PHP code

7.5
2020-02-14 CVE-2019-20046 S3India Improper Authentication vulnerability in S3India Husky RTU 6049-E70 Firmware 5.0

The Synergy Systems & Solutions PLC & RTU system has a vulnerability in HUSKY RTU 6049-E70 firmware versions 5.0 and prior.

7.5
2020-02-14 CVE-2019-20454 Pcre
Fedoraproject
Splunk
Out-of-bounds Read vulnerability in multiple products

An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \X is JIT compiled and used to match specially crafted subjects in non-UTF mode.

7.5
2020-02-13 CVE-2013-7098 Infradead Out-of-bounds Write vulnerability in Infradead Openconnect

OpenConnect VPN client with GnuTLS before 5.02 contains a heap overflow if MTU is increased on reconnection.

7.5
2020-02-13 CVE-2013-1401 Cardozatechnologies SQL Injection vulnerability in Cardozatechnologies Wordpress Poll 34.05

Multiple security bypass vulnerabilities in the editAnswer, deleteAnswer, addAnswer, and deletePoll functions in WordPress Poll Plugin 34.5 for WordPress allow a remote attacker to add, edit, and delete an answer and delete a poll.

7.5
2020-02-13 CVE-2013-1400 Cardozatechnologies SQL Injection vulnerability in Cardozatechnologies Wordpress Poll 34.05/34.06

Multiple SQL injection vulnerabilities in CWPPoll.js in WordPress Poll Plugin 34.5 for WordPress allow attackers to execute arbitrary SQL commands via the pollid or poll_id parameter in a viewPollResults or userlogs action.

7.5
2020-02-13 CVE-2014-4170 Freereprintables Improper Privilege Management vulnerability in Freereprintables Articlefr 3.0.4

A Privilege Escalation Vulnerability exists in Free Reprintables ArticleFR 11.06.2014 due to insufficient access restrictions in the data.php script, which could let a remote malicious user obtain access or modify or delete database information.

7.5
2020-02-13 CVE-2020-8803 Salesagility Path Traversal vulnerability in Salesagility Suitecrm

SuiteCRM through 7.11.11 allows Directory Traversal to include arbitrary .php files within the webroot via add_to_prospect_list.

7.5
2020-02-13 CVE-2020-8802 Salesagility SQL Injection vulnerability in Salesagility Suitecrm

SuiteCRM through 7.11.11 has Incorrect Access Control via action_saveHTMLField Bean Manipulation.

7.5
2020-02-13 CVE-2020-8614 Askey Improper Input Validation vulnerability in Askey Ap4000W Firmware Tdcv1.01.003

An issue was discovered on Askey AP4000W TDC_V1.01.003 devices.

7.5
2020-02-13 CVE-2020-8962 Dlink Out-of-bounds Write vulnerability in Dlink Dir-842 Firmware 3.13B09

A stack-based buffer overflow was found on the D-Link DIR-842 REVC with firmware v3.13B09 HOTFIX due to the use of strcpy for LOGINPASSWORD when handling a POST request to the /MTFWU endpoint.

7.5
2020-02-13 CVE-2020-8953 Openvpn Improper Authentication vulnerability in Openvpn Access Server 2.8.0

OpenVPN Access Server 2.8.x before 2.8.1 allows LDAP authentication bypass (except when a user is enrolled in two-factor authentication).

7.5
2020-02-13 CVE-2020-7209 HP Unspecified vulnerability in HP Linuxki

LinuxKI v6.0-1 and earlier is vulnerable to an remote code execution which is resolved in release 6.0-2.

7.5
2020-02-12 CVE-2011-4906 Tiny Unrestricted Upload of File with Dangerous Type vulnerability in Tiny Tinybrowser

Tiny browser in TinyMCE 3.0 editor in Joomla! before 1.5.13 allows file upload and arbitrary PHP code execution.

7.5
2020-02-12 CVE-2013-3725 Invisioncommunity Unspecified vulnerability in Invisioncommunity Invision Power Board

Invision Power Board (IPB) through 3.x allows admin account takeover leading to code execution.

7.5
2020-02-12 CVE-2020-8945 Gpgme Project
Redhat
Fedoraproject
Use After Free vulnerability in multiple products

The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O.

7.5
2020-02-12 CVE-2020-7046 Dovecot
Fedoraproject
Infinite Loop vulnerability in multiple products

lib-smtp in submission-login and lmtp in Dovecot 2.3.9 before 2.3.9.3 mishandles truncated UTF-8 data in command parameters, as demonstrated by the unauthenticated triggering of a submission-login infinite loop.

7.5
2020-02-12 CVE-2020-8595 Istio
Redhat
Improper Authentication vulnerability in multiple products

Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 allows authentication bypass.

7.5
2020-02-12 CVE-2020-2114 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins S3 Publisher

Jenkins S3 publisher Plugin 0.11.4 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

7.5
2020-02-12 CVE-2015-5617 Enorth SQL Injection vulnerability in Enorth Webpublisher CMS

SQL injection vulnerability in pub/m_pending_news/delete_pending_news.jsp in Enorth Webpublisher CMS allows remote attackers to execute arbitrary SQL commands via the cbNewsId parameter.

7.5
2020-02-12 CVE-2013-7381 Libnotify Project Injection vulnerability in Libnotify Project Libnotify

libnotify before 1.0.4 for Node.js allows remote attackers to execute arbitrary commands via unspecified characters in a call to libnotify.notify.

7.5
2020-02-12 CVE-2013-2010 Automattic
Boldgrid
Injection vulnerability in multiple products

WordPress W3 Total Cache Plugin 0.9.2.8 has a Remote PHP Code Execution Vulnerability

7.5
2020-02-12 CVE-2013-7378 Hubot Scripts Project Injection vulnerability in Hubot Scripts Project Hubot Scripts

scripts/email.coffee in the Hubot Scripts module before 2.4.4 for Node.js allows remote attackers to execute arbitrary commands.

7.5
2020-02-12 CVE-2014-9390 GIT SCM
Mercurial
Apple
Eclipse
Libgit2
Improper Input Validation vulnerability in multiple products

Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.

7.5
2020-02-12 CVE-2014-2595 Barracuda Insufficient Session Expiration vulnerability in Barracuda web Application Firewall 7.8.1.013

Barracuda Web Application Firewall (WAF) 7.8.1.013 allows remote attackers to bypass authentication by leveraging a permanent authentication token obtained from a query string.

7.5
2020-02-12 CVE-2020-8893 Misp Unspecified vulnerability in Misp

An issue was discovered in MISP before 2.4.121.

7.5
2020-02-11 CVE-2012-1124 Phxeventmanager Project SQL Injection vulnerability in Phxeventmanager Project Phxeventmanager 2.0

SQL injection vulnerability in search.php in phxEventManager 2.0 beta 5 allows remote attackers to execute arbitrary SQL commands via the search_terms parameter.

7.5
2020-02-11 CVE-2014-9753 Atutor Improper Authentication vulnerability in Atutor

confirm.php in ATutor 2.2 and earlier allows remote attackers to bypass authentication and gain access as an existing user via the auto_login parameter.

7.5
2020-02-11 CVE-2013-2057 Yabb Unrestricted Upload of File with Dangerous Type vulnerability in Yabb 2.5.2

YaBB through 2.5.2: 'guestlanguage' Cookie Parameter Local File Include Vulnerability

7.5
2020-02-11 CVE-2013-1607 Pdfkit Project Improper Input Validation vulnerability in Pdfkit Project Pdfkit

Ruby PDFKit gem prior to 0.5.3 has a Code Execution Vulnerability

7.5
2020-02-11 CVE-2013-0803 Polarbear CMS Project Unrestricted Upload of File with Dangerous Type vulnerability in Polarbear CMS Project Polarbear CMS 2.5

A PHP File Upload Vulnerability exists in PolarBear CMS 2.5 via upload.php, which could let a malicious user execute arbitrary code.

7.5
2020-02-11 CVE-2019-13940 Siemens Resource Exhaustion vulnerability in Siemens products

A vulnerability has been identified in SIMATIC ET 200pro IM154-8 PN/DP CPU (All versions < V3.X.17), SIMATIC ET 200pro IM154-8F PN/DP CPU (All versions < V3.X.17), SIMATIC ET 200pro IM154-8FX PN/DP CPU (All versions < V3.X.17), SIMATIC ET 200S IM151-8 PN/DP CPU (All versions < V3.X.17), SIMATIC ET 200S IM151-8F PN/DP CPU (All versions < V3.X.17), SIMATIC S7-1200 CPU family (incl.

7.5
2020-02-11 CVE-2019-13925 Siemens Resource Exhaustion vulnerability in Siemens products

A vulnerability has been identified in SCALANCE S602 (All versions >= V3.0 and < V4.1), SCALANCE S612 (All versions >= V3.0 and < V4.1), SCALANCE S623 (All versions >= V3.0 and < V4.1), SCALANCE S627-2M (All versions >= V3.0 and < V4.1).

7.5
2020-02-11 CVE-2014-2052 Owncloud XXE vulnerability in Owncloud

Zend Framework, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack.

7.5
2020-02-11 CVE-2018-14553 Libgd
Fedoraproject
Canonical
Debian
Opensuse
NULL Pointer Dereference vulnerability in multiple products

gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence.

7.5
2020-02-11 CVE-2020-3934 Secom SQL Injection vulnerability in Secom Dr.Id Access Control and Dr.Id Attendance System

TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, contains a vulnerability of Pre-auth SQL Injection, allowing attackers to inject a specific SQL command.

7.5
2020-02-10 CVE-2019-17137 Netgear Improper Authentication vulnerability in Netgear Ac1200 R6220 Firmware 1.1.0.86

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR AC1200 R6220 Firmware version 1.1.0.86 Smart WiFi Router.

7.5
2020-02-10 CVE-2019-20061 Mfscripts Cleartext Transmission of Sensitive Information vulnerability in Mfscripts Yetishare

The user-introduction email in MFScripts YetiShare v3.5.2 through v4.5.4 may leak the (system-picked) password if this email is sent in cleartext.

7.5
2020-02-10 CVE-2019-20060 Mfscripts Insecure Storage of Sensitive Information vulnerability in Mfscripts Yetishare

MFScripts YetiShare v3.5.2 through v4.5.4 places sensitive information in the Referer header.

7.5
2020-02-13 CVE-2020-0027 Google Out-of-bounds Write vulnerability in Google Android

In HidRawSensor::batch of HidRawSensor.cpp, there is a possible out of bounds write due to an unexpected switch fallthrough.

7.2
2020-02-13 CVE-2020-0026 Google Use After Free vulnerability in Google Android

In Parcel::continueWrite of Parcel.cpp, there is possible memory corruption due to a use after free.

7.2
2020-02-13 CVE-2020-0005 Google Out-of-bounds Write vulnerability in Google Android

In btm_read_remote_ext_features_complete of btm_acl.cc, there is a possible out of bounds write due to a missing bounds check.

7.2
2020-02-13 CVE-2019-18915 HP Unquoted Search Path or Element vulnerability in HP System Event Utility 1.4.32

A potential security vulnerability has been identified with certain versions of HP System Event Utility prior to version 1.4.33.

7.2
2020-02-12 CVE-2020-8950 AMD Link Following vulnerability in AMD User Experience Program 1.0.0.1

The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\AMD\PPC\upload and then creating a symbolic link in %PROGRAMDATA%\AMD\PPC\temp that points to an arbitrary folder with an arbitrary file name.

7.2
2020-02-12 CVE-2011-4338 Shaman Project Improper Authentication vulnerability in Shaman Project Shaman 1.0.9

Shaman 1.0.9: Users can add the line askforpwd=false to his shaman.conf file, without entering the root password in shaman.

7.2
2020-02-11 CVE-2020-0792 Microsoft Out-of-bounds Write vulnerability in Microsoft Windows 10 and Windows Server 2016

An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0757 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when Windows improperly handles Secure Socket Shell remote commands, aka 'Windows SSH Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0745 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0732 Microsoft Improper Privilege Management vulnerability in Microsoft Windows 10 and Windows Server 2016

An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0731 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0726 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0725 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0724 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0723 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0722 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0721 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0720 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0719 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0715 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory, aka 'Windows Graphics Component Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0709 Microsoft Improper Privilege Management vulnerability in Microsoft Windows 10 and Windows Server 2016

An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0707 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows IME improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows IME Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0704 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows Wireless Network Manager improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Wireless Network Manager Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0703 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Backup Service Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0697 Microsoft Improper Privilege Management vulnerability in Microsoft Office 365 Proplus

An elevation of privilege vulnerability exists in Microsoft Office OLicenseHeartbeat task, where an attacker who successfully exploited this vulnerability could run this task as SYSTEM.To exploit the vulnerability, an authenticated attacker would need to place a specially crafted file in a specific location, thereby allowing arbitrary file corruption.The security update addresses the vulnerability by correcting how the process validates the log file., aka 'Microsoft Office Tampering Vulnerability'.

7.2
2020-02-11 CVE-2020-0691 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0686 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0685 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when Windows improperly handles COM object creation, aka 'Windows COM Server Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0682 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0678 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0672 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0671 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0670 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2020-0668 Microsoft Incorrect Permission Assignment for Critical Resource vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'.

7.2
2020-02-11 CVE-2009-4067 Linux
Redhat
Classic Buffer Overflow vulnerability in Linux Kernel

Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.

7.2
2020-02-11 CVE-2013-0517 IBM OS Command Injection vulnerability in IBM Sterling External Authentication Server

A Command Execution Vulnerability exists in IBM Sterling External Authentication Server 2.2.0, 2.3.01, 2.4.0, and 2.4.1 via an unspecified OS command, which could let a local malicious user execute arbitrary code.

7.2
2020-02-13 CVE-2014-1617 Promotic Classic Buffer Overflow vulnerability in Promotic 8.2.13

Microsys PROMOTIC 8.2.13 contains an ActiveX Control Start Buffer Overflow vulnerability which can lead to denial of service.

7.1
2020-02-12 CVE-2013-4602 Avira Resource Exhaustion vulnerability in Avira products

A Denial of Service (infinite loop) vulnerability exists in Avira AntiVir Engine before 8.2.12.58 via an unspecified function in the PDF Scanner Engine.

7.1
2020-02-12 CVE-2019-19921 Linuxfoundation
Debian
Opensuse
Canonical
Redhat
Use of Incorrectly-Resolved Name or Reference vulnerability in multiple products

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go.

7.0

300 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2020-02-13 CVE-2020-0030 Google Use After Free vulnerability in Google Android

In binder_thread_release of binder.c, there is a possible use after free due to a race condition.

6.9
2020-02-13 CVE-2019-2200 Google Incorrect Default Permissions vulnerability in Google Android 10.0

In updatePermissions of PermissionManagerService.java, it may be possible for a malicious app to obtain a custom permission from another app due to a permission bypass.

6.9
2020-02-12 CVE-2013-3685 Spritesoftware
LG
Race Condition vulnerability in Spritesoftware Spritebackup and Spritebud

A Privilege Escalation Vulnerability exists in Sprite Software Spritebud 1.3.24 and 1.3.28 and Backup 2.5.4105 and 2.5.4108 on LG Android smartphones due to a race condition in the spritebud daemon, which could let a local malicious user obtain root privileges.

6.9
2020-02-14 CVE-2020-6068 Accusoft Out-of-bounds Write vulnerability in Accusoft Imagegear 19.5.0

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll PNG pngread parser of the Accusoft ImageGear 19.5.0 library.

6.8
2020-02-14 CVE-2019-5187 Accusoft Out-of-bounds Write vulnerability in Accusoft Imagegear 19.5.0

An exploitable out-of-bounds write vulnerability exists in the TIFreadstripdata function of the igcore19d.dll library of Accusoft ImageGear 19.5.0.

6.8
2020-02-14 CVE-2020-8857 Foxitsoftware Use After Free vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455.

6.8
2020-02-14 CVE-2020-8856 Foxitsoftware Use After Free vulnerability in Foxitsoftware Reader

This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25608.

6.8
2020-02-14 CVE-2020-8855 Foxitsoftware Use After Free vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.2947.

6.8
2020-02-14 CVE-2020-8854 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478.

6.8
2020-02-14 CVE-2020-8853 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478.

6.8
2020-02-14 CVE-2020-8851 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455.

6.8
2020-02-14 CVE-2020-8850 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455.

6.8
2020-02-14 CVE-2020-8849 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455.

6.8
2020-02-14 CVE-2020-8848 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455.

6.8
2020-02-14 CVE-2020-8847 Foxitsoftware Out-of-bounds Write vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.7.0.29455.

6.8
2020-02-14 CVE-2020-8846 Foxitsoftware Use After Free vulnerability in Foxitsoftware Reader

This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114.

6.8
2020-02-14 CVE-2020-8845 Foxitsoftware Use After Free vulnerability in Foxitsoftware Reader

This vulnerability allows remote atackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.6.0.25114.

6.8
2020-02-14 CVE-2020-8844 Foxitsoftware Integer Overflow or Wraparound vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114.

6.8
2020-02-14 CVE-2019-11215 Combodo Race Condition vulnerability in Combodo Itop

In Combodo iTop 2.2.0 through 2.6.0, if the configuration file is writable, then execution of arbitrary code can be accomplished by calling ajax.dataloader with a maliciously crafted payload.

6.8
2020-02-13 CVE-2020-3748 Adobe Use After Free vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an use after free vulnerability.

6.8
2020-02-13 CVE-2020-3739 Adobe Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have a memory corruption vulnerability.

6.8
2020-02-13 CVE-2020-3738 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3737 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3736 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3735 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have a heap overflow vulnerability.

6.8
2020-02-13 CVE-2020-3734 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have a buffer error vulnerability.

6.8
2020-02-13 CVE-2020-3733 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3732 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3731 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have a heap overflow vulnerability.

6.8
2020-02-13 CVE-2020-3730 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3729 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3728 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3727 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3726 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3725 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3724 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3723 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3722 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3721 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-3720 Adobe Out-of-bounds Write vulnerability in Adobe Framemaker

Adobe Framemaker versions 2019.0.4 and below have an out-of-bounds write vulnerability.

6.8
2020-02-13 CVE-2020-0021 Google NULL Pointer Dereference vulnerability in Google Android 10.0

In removeUnusedPackagesLPw of PackageManagerService.java, there is a possible permanent denial-of-service due to a missing package dependency test.

6.8
2020-02-12 CVE-2020-1977 Paloaltonetworks Cross-Site Request Forgery (CSRF) vulnerability in Paloaltonetworks Expedition Migration Tool

Insufficient Cross-Site Request Forgery (XSRF) protection on Expedition Migration Tool allows remote unauthenticated attackers to hijack the authentication of administrators and to perform actions on the Expedition Migration Tool.

6.8
2020-02-12 CVE-2013-5106 Python Mode Project Improper Input Validation vulnerability in Python-Mode Project Python-Mode 20121219

A Code Execution vulnerability exists in select.py when using python-mode 2012-12-19.

6.8
2020-02-12 CVE-2014-4607 Oberhumer Integer Overflow or Wraparound vulnerability in Oberhumer Liblzo2 and Lzo2

Integer overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run.

6.8
2020-02-12 CVE-2015-7508 Netsurf Browser Out-of-bounds Write vulnerability in Netsurf-Browser Libnsbmp 0.1.2

Heap-based buffer overflow in the bmp_decode_rle function in libnsbmp.c in Libnsbmp 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the last row of RLE data in a crafted BMP file.

6.8
2020-02-12 CVE-2014-4968 Boatmob Remote Code Execution vulnerability in Boatmob Boat Browser 8.0/8.0.1

The WebView class and use of the WebView.addJavascriptInterface method in the Boat Browser application 8.0 and 8.0.1 for Android allow remote attackers to execute arbitrary code via a crafted web site, a related issue to CVE-2012-6636.

6.8
2020-02-12 CVE-2020-8892 Misp Unspecified vulnerability in Misp

An issue was discovered in MISP before 2.4.121.

6.8
2020-02-11 CVE-2020-0729 Microsoft Unspecified vulnerability in Microsoft products

A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'.

6.8
2020-02-11 CVE-2020-0708 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products

A remote code execution vulnerability exists when the Windows Imaging Library improperly handles memory.To exploit this vulnerability, an attacker would first have to coerce a victim to open a specially crafted file.The security update addresses the vulnerability by correcting how the Windows Imaging Library handles memory., aka 'Windows Imaging Library Remote Code Execution Vulnerability'.

6.8
2020-02-11 CVE-2020-0692 Microsoft Improper Privilege Management vulnerability in Microsoft Exchange Server 2013/2016/2019

An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'.

6.8
2020-02-11 CVE-2020-0665 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest, aka 'Active Directory Elevation of Privilege Vulnerability'.

6.8
2020-02-11 CVE-2020-6069 Accusoft Out-of-bounds Write vulnerability in Accusoft Imagegear 19.5.0

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll JPEG jpegread precision parser of the Accusoft ImageGear 19.5.0 library.

6.8
2020-02-11 CVE-2020-6067 Accusoft Out-of-bounds Write vulnerability in Accusoft Imagegear 19.5.0

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll TIFF tifread parser of the Accusoft ImageGear 19.5.0 library.

6.8
2020-02-11 CVE-2020-6066 Accusoft Out-of-bounds Write vulnerability in Accusoft Imagegear 19.5.0

An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll JPEG SOFx parser of the Accusoft ImageGear 19.5.0 library.

6.8
2020-02-11 CVE-2020-6065 Accusoft Out-of-bounds Write vulnerability in Accusoft Imagegear 19.5.0

An exploitable out-of-bounds write vulnerability exists in the bmp_parsing function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0.

6.8
2020-02-11 CVE-2020-6064 Accusoft Out-of-bounds Write vulnerability in Accusoft Imagegear 19.5.0

An exploitable out-of-bounds write vulnerability exists in the uncompress_scan_line function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0.

6.8
2020-02-11 CVE-2020-6063 Accusoft Out-of-bounds Write vulnerability in Accusoft Imagegear 19.5.0

An exploitable out-of-bounds write vulnerability exists in the uncompress_scan_line function of the igcore19d.dll library of Accusoft ImageGear, version 19.5.0.

6.8
2020-02-11 CVE-2012-6721 Socialengine Cross-Site Request Forgery (CSRF) vulnerability in Socialengine 4.2.2

Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) Forum, (2) Event, and (3) Classifieds plugins in SocialEngine before 4.2.4.

6.8
2020-02-11 CVE-2013-5582 Ammyy Improper Authentication vulnerability in Ammyy Admin 3.2

Ammyy Admin 3.2 and earlier stores the client ID at a fixed memory location, which might make it easier for user-assisted remote attackers to bypass authentication by running a local program that extracts a field from the AA_v3.2.exe file.

6.8
2020-02-11 CVE-2013-3942 Daum Untrusted Search Path vulnerability in Daum Potplayer

Potplayer prior to 1.5.39659: DLL Loading Arbitrary Code Execution Vulnerability

6.8
2020-02-10 CVE-2019-13322 MI Improper Input Validation vulnerability in MI Browser

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Xiaomi Browser Prior to 10.4.0.

6.8
2020-02-10 CVE-2013-2109 Undolog Cross-Site Request Forgery (CSRF) vulnerability in Undolog WP Cleanfix 1.4

WordPress plugin wp-cleanfix has Remote Code Execution

6.8
2020-02-10 CVE-2019-19659 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus 8.2.9.1

A CSRF vulnerability exists in the Web File Manager's Edit Accounts functionality of Rumpus FTP Server 8.2.9.1.

6.8
2020-02-14 CVE-2020-8611 Progess
Progress
SQL Injection vulnerability in multiple products

In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1, multiple SQL Injection vulnerabilities have been found in the REST API that could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database via the REST API.

6.5
2020-02-13 CVE-2015-6589 Kaseya Path Traversal vulnerability in Kaseya Virtual System Administrator

Directory traversal vulnerability in Kaseya Virtual System Administrator (VSA) 7.0.0.0 before 7.0.0.33, 8..0.0.0 before 8.0.0.23, 9.0.0.0 before 9.0.0.19, and 9.1.0.0 before 9.1.0.9 allows remote authenticated users to write to and execute arbitrary files due to insufficient restrictions in file paths to json.ashx.

6.5
2020-02-13 CVE-2020-8801 Salesagility Injection vulnerability in Salesagility Suitecrm

SuiteCRM through 7.11.11 allows PHAR Deserialization.

6.5
2020-02-13 CVE-2020-8800 Salesagility Injection vulnerability in Salesagility Suitecrm

SuiteCRM through 7.11.11 allows EmailsControllerActionGetFromFields PHP Object Injection.

6.5
2020-02-13 CVE-2020-0028 Google Unspecified vulnerability in Google Android 9.0

In notifyNetworkTested and related functions of NetworkMonitor.java, there is a possible bypass of private DNS settings.

6.5
2020-02-13 CVE-2020-5239 Mailu Unspecified vulnerability in Mailu 1.5/1.6

In Mailu before version 1.7, an authenticated user can exploit a vulnerability in Mailu fetchmail script and gain full access to a Mailu instance.

6.5
2020-02-12 CVE-2020-1975 Paloaltonetworks XXE vulnerability in Paloaltonetworks Pan-Os

Missing XML validation vulnerability in the PAN-OS web interface on Palo Alto Networks PAN-OS software allows authenticated users to inject arbitrary XML that results in privilege escalation.

6.5
2020-02-12 CVE-2020-6188 SAP Missing Authorization vulnerability in SAP ERP and S/4 Hana

VAT Pro-Rata reports in SAP ERP (SAP_APPL versions 600, 602, 603, 604, 605, 606, 616 and SAP_FIN versions 617, 618, 700, 720, 730) and SAP S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user leading to Missing Authorization Check.

6.5
2020-02-12 CVE-2020-2133 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins Applatix 1.1

Jenkins Applatix Plugin 1.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

6.5
2020-02-12 CVE-2020-2132 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins Parasoft Environment Manager

Jenkins Parasoft Environment Manager Plugin 2.14 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

6.5
2020-02-12 CVE-2020-2131 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins Harvest SCM

Jenkins Harvest SCM Plugin 0.5.1 and earlier stores passwords unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

6.5
2020-02-12 CVE-2020-2130 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins Harvest SCM

Jenkins Harvest SCM Plugin 0.5.1 and earlier stores a password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.

6.5
2020-02-12 CVE-2020-2129 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins Eagle Tester

Jenkins Eagle Tester Plugin 1.0.9 and earlier stores a password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.

6.5
2020-02-12 CVE-2020-8894 Misp Unspecified vulnerability in Misp

An issue was discovered in MISP before 2.4.121.

6.5
2020-02-11 CVE-2020-0618 Microsoft Deserialization of Untrusted Data vulnerability in Microsoft SQL Server 2012/2014/2016

A remote code execution vulnerability exists in Microsoft SQL Server Reporting Services when it incorrectly handles page requests, aka 'Microsoft SQL Server Reporting Services Remote Code Execution Vulnerability'.

6.5
2020-02-11 CVE-2020-6408 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Insufficient policy enforcement in CORS in Google Chrome prior to 80.0.3987.87 allowed a local attacker to obtain potentially sensitive information via a crafted HTML page.
6.5
2020-02-11 CVE-2020-6405 Google Out-of-bounds Read vulnerability in Google Chrome

Out of bounds read in SQLite in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.

6.5
2020-02-11 CVE-2020-6401 Google
Opensuse
Improper Input Validation vulnerability in multiple products

Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.

6.5
2020-02-11 CVE-2020-6400 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Information Exposure Through Discrepancy vulnerability in multiple products

Inappropriate implementation in CORS in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

6.5
2020-02-11 CVE-2020-6399 Google
Opensuse
Improper Input Validation vulnerability in multiple products

Insufficient policy enforcement in AppCache in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

6.5
2020-02-11 CVE-2020-6397 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Inappropriate implementation in sharing in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof security UI via a crafted HTML page.
6.5
2020-02-11 CVE-2020-6395 Google Out-of-bounds Read vulnerability in Google Chrome

Out of bounds read in JavaScript in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.

6.5
2020-02-11 CVE-2020-6393 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Missing Authorization vulnerability in multiple products

Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

6.5
2020-02-10 CVE-2020-8841 Testlink SQL Injection vulnerability in Testlink 1.9.19

An issue was discovered in TestLink 1.9.19.

6.5
2020-02-10 CVE-2019-17060 NXP Classic Buffer Overflow vulnerability in NXP Mcuxpresso Software Development KIT 2.2.1

The Bluetooth Low Energy (BLE) stack implementation on the NXP KW41Z (based on the MCUXpresso SDK with Bluetooth Low Energy Driver 2.2.1 and earlier) does not properly restrict the BLE Link Layer header and executes certain memory contents upon receiving a packet with a Link Layer ID (LLID) equal to zero.

6.5
2020-02-10 CVE-2014-5086 Sphider
Sphider Plus
Sphiderpro
Injection vulnerability in multiple products

A Command Execution vulnerability exists in Sphider Pro, and Sphider Plus 3.2 due to insufficient sanitization of fwrite to conf.php, which could let a remote malicious user execute arbitrary code.

6.5
2020-02-10 CVE-2014-5085 Sphider Plus Injection vulnerability in Sphider-Plus 3.2

A Command Execution vulnerability exists in Sphider Plus 3.2 due to insufficient sanitization of fwrite to conf.php, which could let a remote malicious user execute arbitrary code.

6.5
2020-02-10 CVE-2014-5084 Sphiderpro Injection vulnerability in Sphiderpro Sphider PRO 3.2

A Command Execution vulnerability exists in Sphider Pro 3.2 due to insufficient sanitization of fwrite, which could let a remote malicious user execute arbitrary code.

6.5
2020-02-10 CVE-2014-5083 Sphider Injection vulnerability in Sphider

A Command Execution vulnerability exists in Sphider before 1.3.6 due to insufficient sanitization of fwrite to conf.php, which could let a remote malicious user execute arbitrary code.

6.5
2020-02-13 CVE-2014-4198 Bssys Improper Authentication vulnerability in Bssys RBS Bs-Client. Retail Client 2.4/2.5

A Two-Factor Authentication Bypass Vulnerability exists in BS-Client Private Client 2.4 and 2.5 via an XML request that neglects the use of ADPswID and AD parameters, which could let a malicious user access privileged function.

6.4
2020-02-12 CVE-2020-6183 SAP Missing Authorization vulnerability in SAP Host Agent 7.21

SAP Host Agent, version 7.21, allows an unprivileged user to read the shared memory or write to the shared memory by sending request to the main SAPOSCOL process and receive responses that may contain data read with user root privileges e.g.

6.4
2020-02-10 CVE-2020-7060 PHP
Tenable
Oracle
Opensuse
Debian
Out-of-bounds Read vulnerability in multiple products

When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer.

6.4
2020-02-10 CVE-2020-7059 PHP
Tenable
Oracle
Opensuse
Debian
Out-of-bounds Read vulnerability in multiple products

When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer.

6.4
2020-02-13 CVE-2020-6973 Digi Cross-site Scripting vulnerability in Digi products

Digi International ConnectPort LTS 32 MEI, Firmware Version 1.4.3 (82002228_K 08/09/2018), bios Version 1.2.

6.3
2020-02-13 CVE-2019-10785 Linuxfoundation
Debian
Cross-site Scripting vulnerability in multiple products

dojox is vulnerable to Cross-site Scripting in all versions before version 1.16.1, 1.15.2, 1.14.5, 1.13.6, 1.12.7 and 1.11.9.

6.1
2020-02-10 CVE-2019-19195 Microchip Unspecified vulnerability in Microchip Atmsamb11 Blusdk Smart 6.2

The Bluetooth Low Energy implementation on Microchip Technology BluSDK Smart through 6.2 for ATSAMB11 devices does not properly restrict link-layer data length on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet.

6.1
2020-02-10 CVE-2019-19193 TI Unspecified vulnerability in TI Ble-Stack and Cc2640R2 Software Development KIT

The Bluetooth Low Energy peripheral implementation on Texas Instruments SIMPLELINK-CC2640R2-SDK through 3.30.00.20 and BLE-STACK through 1.5.0 before Q4 2019 for CC2640R2 and CC2540/1 devices does not properly restrict the advertisement connection request packet on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet.

6.1
2020-02-10 CVE-2019-17520 TI Classic Buffer Overflow vulnerability in TI Cc2640R2 Software Development KIT

The Bluetooth Low Energy implementation on Texas Instruments SDK through 3.30.00.20 for CC2640R2 devices does not properly restrict the SM Public Key packet on reception, allowing attackers in radio range to cause a denial of service (crash) via crafted packets.

6.1
2020-02-10 CVE-2019-17518 Dialog Semiconductor Classic Buffer Overflow vulnerability in Dialog-Semiconductor Software Development KIT 1.0.14.1081

The Bluetooth Low Energy implementation on Dialog Semiconductor SDK through 1.0.14.1081 for DA1468x devices responds to link layer packets with a payload length larger than expected, allowing attackers in radio range to cause a buffer overflow via a crafted packet.

6.1
2020-02-10 CVE-2019-17517 Dialog Semiconductor Classic Buffer Overflow vulnerability in Dialog-Semiconductor Software Development KIT 1.0.14.1081

The Bluetooth Low Energy implementation on Dialog Semiconductor SDK through 5.0.4 for DA14580/1/2/3 devices does not properly restrict the L2CAP payload length, allowing attackers in radio range to cause a buffer overflow via a crafted Link Layer packet.

6.1
2020-02-10 CVE-2019-17061 Cypress Classic Buffer Overflow vulnerability in Cypress Psoc 4 BLE 3.62

The Bluetooth Low Energy (BLE) stack implementation on Cypress PSoC 4 through 3.62 devices does not properly restrict the BLE Link Layer header and executes certain memory contents upon receiving a packet with a Link Layer ID (LLID) equal to zero.

6.1
2020-02-10 CVE-2019-19661 Maxum Cross-site Scripting vulnerability in Maxum Rumpus FTP 8.2.9.1

A Cookie based reflected XSS exists in the Web File Manager of Rumpus FTP Server 8.2.9.1, related to RumpusLoginUserName and snp.

6.1
2020-02-14 CVE-2020-8612 Progess
Progress
Cross-site Scripting vulnerability in multiple products

In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1, a REST API endpoint failed to adequately sanitize malicious input, which could allow an authenticated attacker to execute arbitrary code in a victim's browser, aka XSS.

6.0
2020-02-11 CVE-2020-1711 Qemu
Redhat
Debian
Opensuse
Out-of-bounds Write vulnerability in multiple products

An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine.

6.0
2020-02-11 CVE-2020-8596 Xnau SQL Injection vulnerability in Xnau Participants Database

participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters.

6.0
2020-02-14 CVE-2019-20455 Globalpayments Improper Certificate Validation vulnerability in Globalpayments PHP SDK

Gateways/Gateway.php in Heartland & Global Payments PHP SDK before 2.0.0 does not enforce SSL certificate validations.

5.9
2020-02-11 CVE-2020-1726 Libpod Project
Redhat
Files or Directories Accessible to External Parties vulnerability in multiple products

A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only.

5.9
2020-02-16 CVE-2020-8997 Abbott Out-of-bounds Write vulnerability in Abbott Freestyle Libre Firmware

Older generation Abbott FreeStyle Libre sensors allow remote attackers within close proximity to enable write access to memory via a specific NFC unlock command.

5.8
2020-02-14 CVE-2020-8843 Istio Improper Input Validation vulnerability in Istio

An issue was discovered in Istio 1.3 through 1.3.6.

5.8
2020-02-14 CVE-2019-19758 Lenovo Open Redirect vulnerability in Lenovo products

A vulnerability in the web interface of Lenovo EZ Media & Backup Center, ix2 & ix2-dl version 4.1.406.34763 and prior could allow an unauthenticated, remote attacker to redirect a user to an untrusted web page.

5.8
2020-02-12 CVE-2020-5399 Cloudfoundry
Pivotal Software
Cleartext Transmission of Sensitive Information vulnerability in multiple products

Cloud Foundry CredHub, versions prior to 2.5.10, connects to a MySQL database without TLS even when configured to use TLS.

5.8
2020-02-12 CVE-2019-19194 Telink Semi Unspecified vulnerability in Telink-Semi products

The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation on Telink Semiconductor BLE SDK versions before November 2019 for TLSR8x5x through 3.4.0, TLSR823x through 1.3.0, and TLSR826x through 3.3 devices installs a zero long term key (LTK) if an out-of-order link-layer encryption request is received during Secure Connections pairing.

5.8
2020-02-11 CVE-2020-0695 Microsoft Improper Input Validation vulnerability in Microsoft Office Online Server

A spoofing vulnerability exists when Office Online Server does not validate origin in cross-origin communications correctly, aka 'Microsoft Office Online Server Spoofing Vulnerability'.

5.8
2020-02-11 CVE-2014-6447 Juniper Cross-site Scripting vulnerability in Juniper Junos

Multiple vulnerabilities exist in Juniper Junos J-Web error handling that may lead to cross site scripting (XSS) issues or crash the J-Web service (DoS).

5.8
2020-02-10 CVE-2019-19669 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus FTP 8.2.9.1

A CSRF vulnerability exists in the Upload Center Forms Component of Web File Manager in Rumpus FTP 8.2.9.1.

5.8
2020-02-10 CVE-2019-19667 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus FTP 8.2.9.1

A CSRF vulnerability exists in the Block Clients component of Web File Manager in Rumpus FTP 8.2.9.1 that could allow an attacker to whitelist or block any IP address via RAPR/BlockedClients.html.

5.8
2020-02-10 CVE-2019-19664 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus FTP 8.2.9.1

A CSRF vulnerability exists in the Web Settings of Web File Manager in Rumpus FTP 8.2.9.1.

5.8
2020-02-10 CVE-2019-19663 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus 8.2.9.1

A CSRF vulnerability exists in the Folder Sets Settings of Web File Manager in Rumpus FTP 8.2.9.1.

5.8
2020-02-14 CVE-2020-7251 Mcafee Incorrect Authorization vulnerability in Mcafee Endpoint Security

Improper access control vulnerability in Configuration Tool in McAfee Mcafee Endpoint Security (ENS) Prior to 10.6.1 February 2020 Update allows local users to disable security features via unauthorised use of the configuration tool from older versions of ENS.

5.5
2020-02-13 CVE-2018-3987 Rakuten Information Exposure vulnerability in Rakuten Viber 9.3.0.6

An exploitable information disclosure vulnerability exists in the 'Secret Chats' functionality of Rakuten Viber on Android 9.3.0.6.

5.5
2020-02-11 CVE-2020-0661 Microsoft Improper Input Validation vulnerability in Microsoft products

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'.

5.5
2020-02-16 CVE-2020-9016 Dolibarr Cross-site Scripting vulnerability in Dolibarr Erp/Crm 11.0.0

Dolibarr 11.0 allows XSS via the joinfiles, topic, or code parameter, or the HTTP Referer header.

5.4
2020-02-12 CVE-2020-2122 Jenkins Cross-site Scripting vulnerability in Jenkins Brakeman

Jenkins Brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability exploitable by users able to control the Brakeman post-build step input data.

5.4
2020-02-12 CVE-2020-2113 Jenkins Cross-site Scripting vulnerability in Jenkins GIT Parameter

Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the default value shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.

5.4
2020-02-12 CVE-2020-2112 Jenkins Cross-site Scripting vulnerability in Jenkins GIT Parameter

Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.

5.4
2020-02-12 CVE-2020-2111 Jenkins Cross-site Scripting vulnerability in Jenkins Subversion

Jenkins Subversion Plugin 2.13.0 and earlier does not escape the error message for the Project Repository Base URL field form validation, resulting in a stored cross-site scripting vulnerability.

5.4
2020-02-11 CVE-2019-13924 Siemens Protection Mechanism Failure vulnerability in Siemens products

A vulnerability has been identified in SCALANCE S602 (All versions < V4.1), SCALANCE S612 (All versions < V4.1), SCALANCE S623 (All versions < V4.1), SCALANCE S627-2M (All versions < V4.1), SCALANCE X-200 switch family (incl.

5.4
2020-02-11 CVE-2020-6412 Google
Opensuse
Improper Input Validation vulnerability in multiple products

Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.

5.4
2020-02-11 CVE-2020-6411 Google Improper Input Validation vulnerability in Google Chrome

Insufficient validation of untrusted input in Omnibox in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.

5.4
2020-02-11 CVE-2020-6394 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Insufficient policy enforcement in Blink in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass content security policy via a crafted HTML page.
5.4
2020-02-10 CVE-2019-13321 MI Incorrect Permission Assignment for Critical Resource vulnerability in MI Browser

This vulnerability allows network adjacent attackers to execute arbitrary code on affected installations of Xiaomi Browser Prior to 10.4.0.

5.4
2020-02-10 CVE-2020-1697 Redhat Cross-site Scripting vulnerability in Redhat Keycloak

It was found in all keycloak versions before 9.0.0 that links to external applications (Application Links) in the admin console are not validated properly and could allow Stored XSS attacks.

5.4
2020-02-12 CVE-2020-7957 Dovecot
Fedoraproject
Improper Input Validation vulnerability in multiple products

The IMAP and LMTP components in Dovecot 2.3.9 before 2.3.9.3 mishandle snippet generation when many characters must be read to compute the snippet and a trailing > character exists.

5.3
2020-02-12 CVE-2020-2119 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins Azure AD

Jenkins Azure AD Plugin 1.1.2 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

5.3
2020-02-14 CVE-2019-13967 Combodo Unspecified vulnerability in Combodo Itop

iTop 2.2.0 through 2.6.0 allows remote attackers to cause a denial of service (application outage) via many requests to launch a compile operation.

5.0
2020-02-14 CVE-2019-6193 Lenovo Information Exposure vulnerability in Lenovo Xclarity Administrator

An information disclosure vulnerability was reported in Lenovo XClarity Administrator (LXCA) versions prior to 2.6.6 that could allow unauthenticated access to some configuration files which may contain usernames, license keys, IP addresses, and encrypted password hashes.

5.0
2020-02-14 CVE-2019-19879 Hashicorp Unspecified vulnerability in Hashicorp Sentinel

HashiCorp Sentinel up to 0.10.1 incorrectly parsed negation in certain policy expressions.

5.0
2020-02-14 CVE-2013-5687 Aicorporation Information Exposure vulnerability in Aicorporation Risknet Acquirer 6.0

RiskNet Acquirer before hotfix 6.0 b7+ADHOC-443 ApplicationServiceBean contains a service information disclosure.

5.0
2020-02-13 CVE-2013-6362 Xerox Use of Hard-coded Credentials vulnerability in Xerox products

Xerox ColorCube and WorkCenter devices in 2013 had hardcoded FTP and shell user accounts.

5.0
2020-02-13 CVE-2013-6360 Trendnet Improper Authentication vulnerability in Trendnet Ts-S402 Firmware 2.00.11

TRENDnet TS-S402 has a backdoor to enable TELNET.

5.0
2020-02-13 CVE-2013-6277 Qnap Use of Hard-coded Credentials vulnerability in Qnap Viocard 300 Firmware Rsb3722/Rsb4631

QNAP VioCard 300 has hardcoded RSA private keys.

5.0
2020-02-13 CVE-2020-8989 Voatz Information Exposure Through Discrepancy vulnerability in Voatz 20200101

In the Voatz application 2020-01-01 for Android, the amount of data transmitted during a single voter's vote depends on the different lengths of the metadata across the available voting choices, which makes it easier for remote attackers to discover this voter's choice by sniffing the network.

5.0
2020-02-13 CVE-2015-3309 Etherpad Path Traversal vulnerability in Etherpad

Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.2 through 1.5.4 allows remote attackers to read arbitrary files with permissions of the user running the service via a ..

5.0
2020-02-13 CVE-2014-3208 Askpop3D Project Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Askpop3D Project Askpop3D 0.7.7

A Denial of Service vulnerability exists in askpop3d 0.7.7 in free (pszQuery),

5.0
2020-02-13 CVE-2012-6091 Magentocommerce Information Exposure vulnerability in Magentocommerce Magento

Zend_XmlRpc Class in Magento before 1.7.0.2 contains an information disclosure vulnerability.

5.0
2020-02-13 CVE-2012-5623 Squirrelmail Use of a Broken or Risky Cryptographic Algorithm vulnerability in Squirrelmail Change Passwd 4.0

Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords.

5.0
2020-02-13 CVE-2020-3759 Adobe Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Digital Editions

Adobe Digital Editions versions 4.5.10 and below have a buffer errors vulnerability.

5.0
2020-02-13 CVE-2020-3756 Adobe Memory Leak vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a stack exhaustion vulnerability.

5.0
2020-02-13 CVE-2020-3755 Adobe Out-of-bounds Read vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an out-of-bounds read vulnerability.

5.0
2020-02-13 CVE-2020-3753 Adobe Memory Leak vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a stack exhaustion vulnerability.

5.0
2020-02-13 CVE-2020-3747 Adobe Out-of-bounds Read vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an out-of-bounds read vulnerability.

5.0
2020-02-13 CVE-2020-3744 Adobe Out-of-bounds Read vulnerability in Adobe Acrobat DC

Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have an out-of-bounds read vulnerability.

5.0
2020-02-13 CVE-2020-3741 Adobe Resource Exhaustion vulnerability in Adobe Experience Manager 6.4/6.5

Adobe Experience Manager versions 6.5, and 6.4 have an uncontrolled resource consumption vulnerability.

5.0
2020-02-13 CVE-2019-4592 IBM Unspecified vulnerability in IBM Tivoli Monitoring 6.3.0.7.10/6.3.0.7.3

IBM Tivoli Monitoring Service 6.3.0.7.3 through 6.3.0.7.10 could allow an unauthorized user to access and modify operation aspects of the ITM monitoring server possibly leading to an effective denial of service or disabling of the monitoring server.

5.0
2020-02-13 CVE-2019-5322 Arubanetworks Unspecified vulnerability in Arubanetworks products

A remotely exploitable information disclosure vulnerability is present in Aruba Intelligent Edge Switch models 5400, 3810, 2920, 2930, 2530 with GigT port, 2530 10/100 port, or 2540.

5.0
2020-02-12 CVE-2020-6190 SAP Information Exposure vulnerability in SAP Netweaver Application Server Java

Certain vulnerable endpoints in SAP NetWeaver AS Java (Heap Dump Application), versions 7.30, 7.31, 7.40, 7.50, provide valuable information about the system like hostname, server node and installation path that could be misused by an attacker leading to Information Disclosure.

5.0
2020-02-12 CVE-2020-6189 SAP Information Exposure vulnerability in SAP Businessobjects Business Intelligence Platform 4.2

Certain settings page(s) in SAP Business Objects Business Intelligence Platform (CMC), version 4.2, generates error messages that can give enterprise private-network related information which would otherwise be restricted leading to Information Disclosure.

5.0
2020-02-12 CVE-2020-6186 SAP Missing Authentication for Critical Function vulnerability in SAP Host Agent 7.21

SAP Host Agent, version 7.21, allows an attacker to cause a slowdown in processing of username/password-based authentication requests of the SAP Host Agent, leading to Denial of Service.

5.0
2020-02-12 CVE-2020-6181 SAP Unspecified vulnerability in SAP Abap Platform and Netweaver

Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.

5.0
2020-02-12 CVE-2011-3901 Google Information Exposure vulnerability in Google Android 2.3.7

Android SQLite Journal before 4.0.1 has an information disclosure vulnerability.

5.0
2020-02-12 CVE-2013-7286 ATT Inadequate Encryption Strength vulnerability in ATT products

MobileIron VSP < 5.9.1 and Sentry < 5.0 has a weak password obfuscation algorithm

5.0
2020-02-12 CVE-2019-4741 IBM
Linux
Microsoft
Server-Side Request Forgery (SSRF) vulnerability in IBM Content Navigator 3.0.0

IBM Content Navigator 3.0CD is vulnerable to Server Side Request Forgery (SSRF).

5.0
2020-02-12 CVE-2019-4427 IBM
Microsoft
Use of a Broken or Risky Cryptographic Algorithm vulnerability in IBM Cloud CLI

IBM Cloud CLI 0.6.0 through 0.16.1 windows installers are signed using SHA1 certificate.

5.0
2020-02-12 CVE-2013-4090 Varnish Cache Project Unspecified vulnerability in Varnish Cache Project Varnish Cache

Varnish HTTP cache before 3.0.4: ACL bug

5.0
2020-02-12 CVE-2013-1924 Skill Unspecified vulnerability in Skill Commerce Skrill

Commerce Skrill (Formerly Moneybookers) has an Access bypass vulnerability in all versions prior to 7.x-1.2

5.0
2020-02-12 CVE-2020-8815 Iktm Improper Input Validation vulnerability in Iktm Bearftp

Improper connection handling in the base connection handler in IKTeam BearFTP before v0.3.1 allows a remote attacker to achieve denial of service via a Slowloris approach by sending a large volume of small packets.

5.0
2020-02-12 CVE-2014-6262 Zenoss
Debian
Use of Externally-Controlled Format String vulnerability in multiple products

Multiple format string vulnerabilities in the python module in RRDtool, as used in Zenoss Core before 4.2.5 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted third argument to the rrdtool.graph function, aka ZEN-15415, a related issue to CVE-2013-2131.

5.0
2020-02-11 CVE-2020-0746 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Information Disclosure Vulnerability'.

5.0
2020-02-11 CVE-2020-0660 Microsoft Improper Input Validation vulnerability in Microsoft products

A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability'.

5.0
2020-02-11 CVE-2020-1942 Apache Information Exposure vulnerability in Apache Nifi

In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values.

5.0
2020-02-11 CVE-2019-13941 Siemens Files or Directories Accessible to External Parties vulnerability in Siemens Ozw672 Firmware and Ozw772 Firmware

A vulnerability has been identified in OZW672 (All versions < V10.00), OZW772 (All versions < V10.00).

5.0
2020-02-11 CVE-2020-7217 Opensuse Memory Leak vulnerability in Opensuse Wicked

An ni_dhcp4_fsm_process_dhcp4_packet memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets with a different client-id.

5.0
2020-02-11 CVE-2020-3935 Secom Cleartext Storage of Sensitive Information vulnerability in Secom Dr.Id Access Control and Dr.Id Attendance System

TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, stores users’ information by cleartext in the cookie, which divulges password to attackers.

5.0
2020-02-11 CVE-2020-3933 Secom Unspecified vulnerability in Secom Dr.Id Access Control and Dr.Id Attendance System

TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, allows attackers to enumerate and exam user account in the system.

5.0
2020-02-14 CVE-2020-8992 Linux
Canonical
Opensuse
Netapp
Excessive Iteration vulnerability in multiple products

ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.

4.9
2020-02-13 CVE-2020-0020 Google Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Android 10.0

In getAttributeRange of ExifInterface.java, there is a possible failure to redact location information from media files due to an incorrect bounds check.

4.9
2020-02-12 CVE-2020-1976 Paloaltonetworks Improper Input Validation vulnerability in Paloaltonetworks Globalprotect

A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect software running on Mac OS allows authenticated local users to cause the Mac OS kernel to hang or crash.

4.9
2020-02-12 CVE-2015-7890 Samsung Classic Buffer Overflow vulnerability in Samsung Galaxy S6 Edge Firmware

Multiple buffer overflows in the esa_write function in /dev/seirenin the Exynos Seiren Audio driver, as used in Samsung S6 Edge, allow local users to cause a denial of service (memory corruption) via a large (1) buffer or (2) size parameter.

4.9
2020-02-12 CVE-2012-0810 Linux Resource Exhaustion vulnerability in Linux Kernel

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.

4.9
2020-02-11 CVE-2020-0728 Microsoft Unspecified vulnerability in Microsoft products

An information vulnerability exists when Windows Modules Installer Service improperly discloses file information, aka 'Windows Modules Installer Service Information Disclosure Vulnerability'.

4.9
2020-02-10 CVE-2012-2204 IBM Unspecified vulnerability in IBM Infosphere Guardium 8.0.0/8.2.0

InfoSphere Guardium aix_ktap module: DoS

4.9
2020-02-13 CVE-2020-0023 Google Incorrect Default Permissions vulnerability in Google Android 10.0

In setPhonebookAccessPermission of AdapterService.java, there is a possible disclosure of user contacts over bluetooth due to a missing permission check.

4.7
2020-02-13 CVE-2020-0564 Intel Incorrect Default Permissions vulnerability in Intel Raid web Console 3 4.186/7.009.011.000

Improper permissions in the installer for Intel(R) RWC3 for Windows before version 7.010.009.000 may allow an authenticated user to potentially enable escalation of privilege via local access.

4.6
2020-02-13 CVE-2020-0563 Intel Improper Privilege Management vulnerability in Intel Manycore Platform Software Stack

Improper permissions in the installer for Intel(R) MPSS before version 3.8.6 may allow an authenticated user to potentially enable escalation of privilege via local access.

4.6
2020-02-13 CVE-2020-0562 Intel Incorrect Default Permissions vulnerability in Intel Raid web Console 2

Improper permissions in the installer for Intel(R) RWC2, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.

4.6
2020-02-13 CVE-2020-0561 Intel
Opensuse
Improper Initialization vulnerability in multiple products

Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

4.6
2020-02-13 CVE-2019-14598 Intel
Netapp
Improper Authentication vulnerability in multiple products

Improper Authentication in subsystem in Intel(R) CSME versions 12.0 through 12.0.48 (IOT only: 12.0.56), versions 13.0 through 13.0.20, versions 14.0 through 14.0.10 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.

4.6
2020-02-13 CVE-2020-0560 Intel Incorrect Default Permissions vulnerability in Intel Renesas Electronics USB 3.0 Driver

Improper permissions in the installer for the Intel(R) Renesas Electronics(R) USB 3.0 Driver, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.

4.6
2020-02-12 CVE-2012-0951 Nvidia Out-of-bounds Write vulnerability in Nvidia Display Driver 295.49/295.53

A Memory Corruption Vulnerability exists in NVIDIA Graphics Drivers 29549 due to an unknown function in the file proc/driver/nvidia/registry.

4.6
2020-02-11 CVE-2020-0754 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0753 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0752 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0750 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0749 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0747 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka 'Windows Data Sharing Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0743 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0742 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0741 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0740 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory, aka 'Connected Devices Platform Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0739 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the dssvc.dll handles file creation allowing for a file overwrite or creation in a secured location, aka 'Windows Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0737 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the tapisrv.dll handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0735 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0733 Microsoft Improper Privilege Management vulnerability in Microsoft Windows Malicious Software Removal Tool

An elevation of privilege vulnerability exists when the Windows Malicious Software Removal Tool (MSRT) improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0727 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Connected User Experiences and Telemetry Service improperly handles file operations, aka 'Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0702 Microsoft Incorrect Authorization vulnerability in Microsoft Surface HUB Firmware

A security feature bypass vulnerability exists in Surface Hub when prompting for credentials, aka 'Surface Hub Security Feature Bypass Vulnerability'.

4.6
2020-02-11 CVE-2020-0701 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Client License Service (ClipSVC) handles objects in memory, aka 'Windows Client License Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0689 Microsoft Improper Input Validation vulnerability in Microsoft products

A security feature bypass vulnerability exists in secure boot, aka 'Microsoft Secure Boot Security Feature Bypass Vulnerability'.

4.6
2020-02-11 CVE-2020-0680 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0679 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory, aka 'Windows Function Discovery Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0669 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0667 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0666 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0659 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations, aka 'Windows Data Sharing Service Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-0657 Microsoft Improper Privilege Management vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'.

4.6
2020-02-11 CVE-2020-5823 Symantec Improper Privilege Management vulnerability in Symantec Endpoint Protection

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

4.6
2020-02-11 CVE-2020-5822 Symantec Improper Privilege Management vulnerability in Symantec Endpoint Protection

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

4.6
2020-02-11 CVE-2020-5821 Symantec Injection vulnerability in Symantec Endpoint Protection

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to a DLL injection vulnerability, which is a type of issue whereby an individual attempts to execute their own code in place of legitimate code as a means to perform an exploit.

4.6
2020-02-11 CVE-2020-5820 Symantec Improper Privilege Management vulnerability in Symantec Endpoint Protection

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

4.6
2020-02-11 CVE-2014-8347 Claris Improper Authentication vulnerability in Claris Filemaker PRO and Filemaker PRO Advanced

An Authentication Bypass vulnerability exists in the MatchPasswordData function in DBEngine.dll in Filemaker Pro 13.03 and Filemaker Pro Advanced 12.04, which could let a malicious user obtain elevated privileges.

4.6
2020-02-16 CVE-2019-20456 Goverlan
Microsoft
Untrusted Search Path vulnerability in Goverlan Client Agent, Reach Console and Reach Server

Goverlan Reach Console before 9.50, Goverlan Reach Server before 3.50, and Goverlan Client Agent before 9.20.50 have an Untrusted Search Path that leads to Command Injection and Local Privilege Escalation via DLL hijacking.

4.4
2020-02-13 CVE-2020-0015 Google Improper Privilege Management vulnerability in Google Android

In onCreate of CertInstaller.java, there is a possible way to overlay the Certificate Installation dialog by a malicious application.

4.4
2020-02-12 CVE-2014-3860 Xilisoft Untrusted Search Path vulnerability in Xilisoft Video Converter 7.8.1

Xilisoft Video Converter Ultimate 7.8.1 build-20140505 has a DLL Hijacking vulnerability

4.4
2020-02-16 CVE-2020-9012 Gluu Cross-site Scripting vulnerability in Gluu Server 4.0

A cross-site scripting (XSS) vulnerability in the Import People functionality in Gluu Identity Configuration 4.0 allows remote attackers to inject arbitrary web script or HTML via the filename parameter.

4.3
2020-02-14 CVE-2019-15592 Gitlab Unspecified vulnerability in Gitlab

GitLab 12.2.2 and below contains a security vulnerability that allows a guest user in a private project to see the merge request ID associated to an issue via the activity timeline.

4.3
2020-02-14 CVE-2019-13966 Combodo Cross-site Scripting vulnerability in Combodo Itop

In iTop through 2.6.0, an XSS payload can be delivered in certain fields (such as icon) of the XML file used to build the dashboard.

4.3
2020-02-14 CVE-2019-13965 Combodo Cross-site Scripting vulnerability in Combodo Itop

Because of a lack of sanitization around error messages, multiple Reflective XSS issues exist in iTop through 2.6.0 via the param_file parameter to webservices/export.php, webservices/cron.php, or env-production/itop-backup/backup.php.

4.3
2020-02-14 CVE-2020-8852 Foxitsoftware Out-of-bounds Read vulnerability in Foxitsoftware Reader

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Reader 9.7.0.29455.

4.3
2020-02-14 CVE-2019-6194 Lenovo XXE vulnerability in Lenovo Xclarity Administrator

An XML External Entity (XXE) processing vulnerability was reported in Lenovo XClarity Administrator (LXCA) versions prior to 2.6.6 that could allow information disclosure.

4.3
2020-02-14 CVE-2013-5212 Easyxdm Cross-site Scripting vulnerability in Easyxdm

Cross-site Scripting (XSS) in EasyXDM before 2.4.18 allows remote attackers to inject arbitrary web script or html via the easyxdm.swf file.

4.3
2020-02-13 CVE-2020-8988 Voatz Insufficiently Protected Credentials vulnerability in Voatz 20200101

The Voatz application 2020-01-01 for Android allows only 100 million different PINs, which makes it easier for attackers (after using root access to make a copy of the local database) to discover login credentials and voting history via an offline brute-force approach.

4.3
2020-02-13 CVE-2014-3919 Netgear Cross-site Scripting vulnerability in Netgear Cg3100 Firmware

A vulnerability exists in Netgear CG3100 devices before 3.9.2421.13.mp3 V0027 via an embed malicious script in an unspecified page, which could let a malicious user obtain sensitive information.

4.3
2020-02-13 CVE-2020-8981 Mantisbt Cross-site Scripting vulnerability in Mantisbt Source Integration

A cross-site scripting (XSS) vulnerability was discovered in the Source Integration plugin before 1.6.2 and 2.x before 2.3.1 for MantisBT.

4.3
2020-02-13 CVE-2020-7051 Codologic Cross-site Scripting vulnerability in Codologic Codoforum 2.5.1/4.8.3/4.8.4

Codologic Codoforum through 4.8.4 allows stored XSS in the login area.

4.3
2020-02-13 CVE-2020-0014 Google Improper Restriction of Rendered UI Layers or Frames vulnerability in Google Android

It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable.

4.3
2020-02-13 CVE-2019-14652 Amazon Cross-site Scripting vulnerability in Amazon AWS Javascript S3 Explorer 1.0.0

explorer.js in Amazon AWS JavaScript S3 Explorer (aka aws-js-s3-explorer) v2 alpha before 2019-08-02 allows XSS in certain circumstances.

4.3
2020-02-13 CVE-2020-7208 HP Cross-site Scripting vulnerability in HP Linuxki

LinuxKI v6.0-1 and earlier is vulnerable to an XSS which is resolved in release 6.0-2.

4.3
2020-02-12 CVE-2013-6022 Tiki Cross-site Scripting vulnerability in Tiki Tikiwiki Cms/Groupware

A Cross-Site Scripting (XSS) vulnerability exists in Tiki Wiki CMG Groupware 11.0 via the id paraZeroClipboard.swf, which could let a remote malicious user execute arbitrary code.

4.3
2020-02-12 CVE-2020-6193 SAP Cross-site Scripting vulnerability in SAP Netweaver Knowledge Management

SAP NetWeaver (Knowledge Management ICE Service), versions 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to execute malicious scripts leading to Reflected Cross-Site Scripting (XSS) vulnerability.

4.3
2020-02-12 CVE-2020-6184 SAP Cross-site Scripting vulnerability in SAP Netweaver and S/4Hana

Under certain conditions, ABAP Online Community in SAP NetWeaver (SAP_BASIS version 7.40) and SAP S/4HANA (SAP_BASIS versions 7.50, 7.51, 7.52, 7.53, 7.54), does not sufficiently encode user-controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability.

4.3
2020-02-12 CVE-2011-2499 Mambo Foundation Cross-site Scripting vulnerability in Mambo-Foundation Mambo CMS

Mambo CMS through 4.6.5 has multiple XSS.

4.3
2020-02-12 CVE-2013-2637 Otrs
Opensuse
Cross-site Scripting vulnerability in multiple products

A Cross-Site Scripting (XSS) Vulnerability exists in OTRS ITSM prior to 3.2.4, 3.1.8, and 3.0.7 and FAQ prior to 2.1.4 and 2.0.8 via changes, workorder items, and FAQ articles, which could let a remote malicious user execute arbitrary code.

4.3
2020-02-12 CVE-2011-4661 Cisco Missing Release of Resource after Effective Lifetime vulnerability in Cisco IOS

A memory leak vulnerability exists in Cisco IOS before 15.2(1)T due to a memory leak in the HTTP PROXY Server process (aka CSCtu52820), when configured with Cisco ISR Web Security with Cisco ScanSafe and User Authenticaiton NTLM configured.

4.3
2020-02-12 CVE-2013-6681 Mapway Information Exposure vulnerability in Mapway Tube MAP

Tube Map Live Underground for Android before 3.0.22 has an Information Disclosure Vulnerability

4.3
2020-02-12 CVE-2013-4395 Simplemachines Cross-site Scripting vulnerability in Simplemachines Simple Machines Forum

Simple Machines Forum (SMF) through 2.0.5 has XSS

4.3
2020-02-12 CVE-2013-1938 Zimbra Cross-site Scripting vulnerability in Zimbra 2013

Zimbra 2013 has XSS in aspell.php

4.3
2020-02-12 CVE-2020-8839 Chiyu T Cross-site Scripting vulnerability in Chiyu-T Bf-430 Firmware

Stored XSS was discovered on CHIYU BF-430 232/485 TCP/IP Converter devices before 1.16.00, as demonstrated by the /if.cgi TF_submask field.

4.3
2020-02-12 CVE-2020-2128 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins ECX Copy Data Management

Jenkins ECX Copy Data Management Plugin 1.9 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

4.3
2020-02-12 CVE-2020-2127 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins BMC Release Package and Deployment 1.0/1.1

Jenkins BMC Release Package and Deployment Plugin 1.1 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.

4.3
2020-02-12 CVE-2020-2126 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins Digitalocean

Jenkins DigitalOcean Plugin 1.1 and earlier stores a token unencrypted in the global config.xml file on the Jenkins master where it can be viewed by users with access to the master file system.

4.3
2020-02-12 CVE-2020-2125 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins Debian Package Builder

Jenkins Debian Package Builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.

4.3
2020-02-12 CVE-2020-2124 Jenkins Insufficiently Protected Credentials vulnerability in Jenkins Dynamic Extended Choice Parameter 1.0.0/1.0.1

Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.

4.3
2020-02-12 CVE-2020-2118 Jenkins Incorrect Default Permissions vulnerability in Jenkins Pipeline Github Notify Step

A missing permission check in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

4.3
2020-02-12 CVE-2020-2117 Jenkins Incorrect Default Permissions vulnerability in Jenkins Pipeline Github Notify Step

A missing permission check in Jenkins Pipeline GitHub Notify Step Plugin 1.0.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

4.3
2020-02-12 CVE-2013-1410 Perforce Cross-site Scripting vulnerability in Perforce P4Web 2011.1/2012.1

Perforce P4web 2011.1 and 2012.1 has multiple XSS vulnerabilities

4.3
2020-02-12 CVE-2019-20100 Atlassian Cross-Site Request Forgery (CSRF) vulnerability in Atlassian Jira

The Atlassian Application Links plugin is vulnerable to cross-site request forgery (CSRF).

4.3
2020-02-12 CVE-2019-20099 Atlassian Cross-Site Request Forgery (CSRF) vulnerability in Atlassian Jira Server

The VerifyPopServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF).

4.3
2020-02-12 CVE-2019-20098 Atlassian Cross-Site Request Forgery (CSRF) vulnerability in Atlassian Jira Server

The VerifySmtpServerConnection!add.jspa component in Atlassian Jira Server and Data Center before version 8.7.0 is vulnerable to cross-site request forgery (CSRF).

4.3
2020-02-12 CVE-2014-2560 Phoner Use of Password Hash With Insufficient Computational Effort vulnerability in Phoner Phonerlite

The PhonerLite phone before 2.15 provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.

4.3
2020-02-12 CVE-2009-5140 Linksys Improper Restriction of Excessive Authentication Attempts vulnerability in Linksys Spa2102 Firmware

The SIP implementation on the Linksys SPA2102 phone adapter provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.

4.3
2020-02-12 CVE-2009-5139 Google Use of Password Hash With Insufficient Computational Effort vulnerability in Google Gizmo5

The SIP implementation on the Gizmo5 software phone provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.

4.3
2020-02-12 CVE-2014-8128 Libtiff
Apple
Out-of-bounds Write vulnerability in Libtiff

LibTIFF prior to 4.0.4, as used in Apple iOS before 8.4 and OS X before 10.10.4 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted TIFF image.

4.3
2020-02-12 CVE-2020-8891 Misp Unspecified vulnerability in Misp

An issue was discovered in MISP before 2.4.121.

4.3
2020-02-12 CVE-2020-8890 Misp Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Misp

An issue was discovered in MISP before 2.4.121.

4.3
2020-02-11 CVE-2020-0706 Microsoft Information Exposure vulnerability in Microsoft Edge and Internet Explorer

An information disclosure vulnerability exists in the way that affected Microsoft browsers handle cross-origin requests, aka 'Microsoft Browser Information Disclosure Vulnerability'.

4.3
2020-02-11 CVE-2020-0696 Microsoft Unspecified vulnerability in Microsoft Office, Office 365 Proplus and Outlook

A security feature bypass vulnerability exists in Microsoft Outlook software when it improperly handles the parsing of URI formats, aka 'Microsoft Outlook Security Feature Bypass Vulnerability'.

4.3
2020-02-11 CVE-2011-4938 Muze Cross-site Scripting vulnerability in Muze Ariadne 2.7.6

Multiple cross-site scripting (XSS) vulnerabilities in Ariadne 2.7.6 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO parameter to (1) index.php and (2) loader.php.

4.3
2020-02-11 CVE-2012-6720 Socialengine Cross-site Scripting vulnerability in Socialengine 4.2.2

Multiple cross-site scripting (XSS) vulnerabilities in SocialEngine before 4.2.4 allow remote attackers to inject arbitrary web script or HTML via the (1) title parameter to music/create, (2) location parameter to events/create, or (3) search parameter to widget/index/content_id/*.

4.3
2020-02-11 CVE-2012-2517 Prestashop Cross-site Scripting vulnerability in Prestashop

Cross-site scripting (XSS) vulnerability in PrestaShop before 1.4.9 allows remote attackers to inject arbitrary web script or HTML via the index of the product[] parameter to ajax.php.

4.3
2020-02-11 CVE-2012-2452 Pragmamx Cross-site Scripting vulnerability in Pragmamx 1.0/1.12.1

Multiple cross-site scripting (XSS) vulnerabilities in pragmaMx 1.x before 1.12.2 allow remote attackers to inject arbitrary web script or HTML via the (1) name parameter to modules.php or (2) img_url to includes/wysiwyg/spaw/editor/plugins/imgpopup/img_popup.php.

4.3
2020-02-11 CVE-2013-5988 Semperplugins Cross-site Scripting vulnerability in ONE SEO Pack

A Cross-site Scripting (XSS) vulnerability exists in the All in One SEO Pack plugin before 2.0.3.1 for WordPress via the Search parameter.

4.3
2020-02-11 CVE-2013-1760 Thebuggenie Cross-site Scripting vulnerability in Thebuggenie the BUG Genie

The Bug Genie before 3.2.6 has Multiple XSS and HTML Injection Vulnerabilities

4.3
2020-02-11 CVE-2012-4519 Zenphoto Cross-site Scripting vulnerability in Zenphoto

Zenphoto before 1.4.3.4 admin-news-articles.php date parameter XSS.

4.3
2020-02-11 CVE-2020-6403 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Incorrect implementation in Omnibox in Google Chrome on iOS prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
4.3
2020-02-11 CVE-2020-6396 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Inappropriate implementation in Skia in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
4.3
2020-02-11 CVE-2020-6392 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Cross-site Scripting vulnerability in multiple products

Insufficient policy enforcement in extensions in Google Chrome prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.

4.3
2020-02-11 CVE-2020-6391 Google
Opensuse
Fedoraproject
Debian
Suse
Redhat
Cross-site Scripting vulnerability in multiple products

Insufficient validation of untrusted input in Blink in Google Chrome prior to 80.0.3987.87 allowed a local attacker to bypass content security policy via a crafted HTML page.

4.3
2020-02-10 CVE-2019-19668 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus FTP 8.2.9.1

A CSRF vulnerability exists in the File Types component of Web File Manager in Rumpus FTP 8.2.9.1 that allows an attacker to add or delete the file types that are used on the server via RAPR/TriggerServerFunction.html.

4.3
2020-02-10 CVE-2019-19670 Maxum Unspecified vulnerability in Maxum Rumpus FTP 8.2.9.1

A HTTP Response Splitting vulnerability was identified in the Web Settings Component of Web File Manager in Rumpus FTP Server 8.2.9.1.

4.3
2020-02-10 CVE-2019-19666 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus FTP 8.2.9.1

A CSRF vulnerability exists in the Event Notices Settings of Web File Manager in Rumpus FTP 8.2.9.1.

4.3
2020-02-10 CVE-2019-19662 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus FTP 8.2.9.1

A CSRF vulnerability exists in the Web File Manager's Create/Delete Accounts functionality of Rumpus FTP Server 8.2.9.1.

4.3
2020-02-10 CVE-2013-2108 Undolog Cross-Site Request Forgery (CSRF) vulnerability in Undolog Cleanfix 2.4.4

WordPress WP Cleanfix Plugin 2.4.4 has CSRF

4.3
2020-02-10 CVE-2019-19665 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus 8.2.9.1

A CSRF vulnerability exists in the FTP Settings of Web File Manager in Rumpus FTP 8.2.9.1.

4.3
2020-02-10 CVE-2019-19660 Maxum Cross-Site Request Forgery (CSRF) vulnerability in Maxum Rumpus 8.2.9.1

A CSRF vulnerability exists in the Web File Manager's Network Setting functionality of Rumpus FTP Server 8.2.9.1.

4.3
2020-02-10 CVE-2012-5828 Blackberry Information Exposure vulnerability in Blackberry Playbook Firmware

BlackBerry PlayBook before 2.1 has an Information Disclosure Vulnerability via a Web browser component error

4.3
2020-02-10 CVE-2012-6666 Vbseo Cross-site Scripting vulnerability in Vbseo 3.8.7

vBSeo before 3.6.0PL2 allows XSS via the member.php u parameter.

4.3
2020-02-10 CVE-2020-8823 Sockjs Project Cross-site Scripting vulnerability in Sockjs Project Sockjs

htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.

4.3
2020-02-16 CVE-2020-9013 Arvato Improper Input Validation vulnerability in Arvato Skillpipe 3.0

Arvato Skillpipe 3.0 allows attackers to bypass intended print restrictions by deleting <div id="watermark"> from the HTML source code.

4.0
2020-02-16 CVE-2020-8996 Aishu Path Traversal vulnerability in Aishu Anyshare Cloud 6.0.9

AnyShare Cloud 6.0.9 allows authenticated directory traversal to read files, as demonstrated by the interface/downloadwithpath/downloadfile/?filepath=/etc/passwd URI.

4.0
2020-02-14 CVE-2019-15594 Gitlab Unspecified vulnerability in Gitlab

GitLab 11.8 and later contains a security vulnerability that allows a user to obtain details of restricted pipelines via the merge request endpoint.

4.0
2020-02-14 CVE-2018-21033 Hitachi
Linux
Microsoft
Oracle
Improper Input Validation vulnerability in Hitachi products

A vulnerability in Hitachi Command Suite prior to 8.6.2-00, Hitachi Automation Director prior to 8.6.2-00 and Hitachi Infrastructure Analytics Advisor prior to 4.2.0-00 allow authenticated remote users to load an arbitrary Cascading Style Sheets (CSS) token sequence.

4.0
2020-02-14 CVE-2018-21032 Hitachi
Linux
Microsoft
Oracle
Information Exposure Through an Error Message vulnerability in Hitachi products

A vulnerability in Hitachi Command Suite prior to 8.7.1-00 and Hitachi Automation Director prior to 8.5.0-00 allow authenticated remote users to expose technical information through error messages.

4.0
2020-02-14 CVE-2020-5532 Extrun Improper Authentication vulnerability in Extrun Ilbo

ilbo App (ilbo App for Android prior to version 1.1.8 and ilbo App for iOS prior to version 1.2.01) allows an attacker on the same network segment to bypass authentication and to view the images which were recorded by the other ilbo user's device via unspecified vectors.

4.0
2020-02-13 CVE-2020-8804 Salesagility SQL Injection vulnerability in Salesagility Suitecrm

SuiteCRM through 7.11.10 allows SQL Injection via the SOAP API, the EmailUIAjax interface, or the MailMerge module.

4.0
2020-02-12 CVE-2020-6975 Digi Unrestricted Upload of File with Dangerous Type vulnerability in Digi products

Digi International ConnectPort LTS 32 MEI, Firmware Version 1.4.3 (82002228_K 08/09/2018), bios Version 1.2.

4.0
2020-02-12 CVE-2020-6187 SAP XXE vulnerability in SAP Netweaver Guided Procedures

SAP NetWeaver (Guided Procedures), versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, does not sufficiently validate an XML document input from a compromised admin, leading to Denial of Service.

4.0
2020-02-12 CVE-2020-6177 SAP Improper Input Validation vulnerability in SAP Mobile Platform 3.0

SAP Mobile Platform, version 3.0, does not sufficiently validate an XML document accepted from an untrusted source which could lead to partial denial of service.

4.0
2020-02-11 CVE-2020-0663 Microsoft Improper Privilege Management vulnerability in Microsoft Edge

An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain.In a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability, aka 'Microsoft Edge Elevation of Privilege Vulnerability'.

4.0

65 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2020-02-11 CVE-2020-0730 Microsoft Link Following vulnerability in Microsoft products

An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'.

3.6
2020-02-11 CVE-2020-5825 Symantec Improper Privilege Management vulnerability in Symantec Endpoint Protection

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to an arbitrary file write vulnerability, which is a type of issue whereby an attacker is able to overwrite existing files on the resident system without proper privileges.

3.6
2020-02-16 CVE-2020-9007 Codologic Cross-site Scripting vulnerability in Codologic Codoforum 4.8.8

Codoforum 4.8.8 allows self-XSS via the title of a new topic.

3.5
2020-02-15 CVE-2020-7050 Codologic Cross-site Scripting vulnerability in Codologic Codoforum 2.5.1/4.8.3/4.8.4

Codologic Codoforum through 4.8.4 allows a DOM-based XSS.

3.5
2020-02-14 CVE-2020-8594 Ninjaforms Cross-site Scripting vulnerability in Ninjaforms Ninja Forms 3.4.22

The Ninja Forms plugin 3.4.22 for WordPress has Multiple Stored XSS vulnerabilities via ninja_forms[recaptcha_site_key], ninja_forms[recaptcha_secret_key], ninja_forms[recaptcha_lang], or ninja_forms[date_format].

3.5
2020-02-14 CVE-2019-19757 Lenovo Cross-site Scripting vulnerability in Lenovo Xclarity Administrator

An internal product security audit of Lenovo XClarity Administrator (LXCA) discovered a Document Object Model (DOM) based cross-site scripting vulnerability in versions prior to 2.6.6 that could allow JavaScript code to be executed in the user's web browser if a specially crafted link is visited.

3.5
2020-02-14 CVE-2013-4792 Prestashop Cross-Site Request Forgery (CSRF) vulnerability in Prestashop

PrestaShop before 1.4.11 allows logout CSRF.

3.5
2020-02-14 CVE-2013-4791 Prestashop Cross-site Scripting vulnerability in Prestashop

PrestaShop before 1.4.11 allows Logistician, translators and other low level profiles/accounts to inject a persistent XSS vector on TinyMCE.

3.5
2020-02-13 CVE-2012-1903 Telligent Cross-site Scripting vulnerability in Telligent Community 5.6.583.20496

XSS in Telligent Community 5.6.583.20496 via a flash file and related to the allowScriptAccess parameter.

3.5
2020-02-13 CVE-2012-1500 Atlassian Cross-site Scripting vulnerability in Atlassian Greenhopper and Jira

Stored XSS vulnerability in UpdateFieldJson.jspa in JIRA 4.4.3 and GreenHopper before 5.9.8 allows an attacker to inject arbitrary script code.

3.5
2020-02-13 CVE-2019-18791 Lexmark Cross-site Scripting vulnerability in Lexmark products

Lexmark printer MS812 and multiple older generation Lexmark devices have a stored XSS vulnerability in the embedded web server.

3.5
2020-02-13 CVE-2020-5241 Matestack Cross-site Scripting vulnerability in Matestack Ui-Core

matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection.

3.5
2020-02-12 CVE-2020-6185 SAP Cross-site Scripting vulnerability in SAP Netweaver and S/4Hana

Under certain conditions ABAP Online Community in SAP NetWeaver (SAP_BASIS version 7.40) and SAP S/4HANA (SAP_BASIS versions 7.50, 7.51, 7.52, 7.53, 7.54), allows an authenticated attacker to store a malicious payload which results in Stored Cross Site Scripting vulnerability.

3.5
2020-02-12 CVE-2019-4431 IBM Cross-site Scripting vulnerability in IBM Rational Publishing Engine 6.0.6/6.0.6.1

IBM Rational Publishing Engine 6.0.6 and 6.0.6.1 is vulnerable to cross-site scripting.

3.5
2020-02-11 CVE-2020-0694 Microsoft Cross-site Scripting vulnerability in Microsoft Sharepoint Enterprise Server 2013/2016/2019

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'.

3.5
2020-02-11 CVE-2020-0693 Microsoft Cross-site Scripting vulnerability in Microsoft Sharepoint Enterprise Server 2013/2016/2019

A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'.

3.5
2020-02-11 CVE-2014-3827 Mybb Cross-site Scripting vulnerability in Mybb

Multiple cross-site scripting (XSS) vulnerabilities in the MyBB (aka MyBulletinBoard) before 1.8.4 allow remote authenticated users to inject arbitrary web script or HTML via the title parameter in the (1) edit or (2) add action in the user-users module or the (3) finduser action or the name parameter in an (4) edit action in the user-user module or the (5) editprofile action to modcp.php.

3.5
2020-02-11 CVE-2014-3826 Mybb Cross-site Scripting vulnerability in Mybb

Cross-site scripting (XSS) vulnerability in MyBB before 1.6.13 allows remote authenticated users to inject arbitrary web script or HTML via the name parameter in the edit action of the config-profile_fields module.

3.5
2020-02-11 CVE-2019-18210 Moodle Cross-site Scripting vulnerability in Moodle

Persistent XSS in /course/modedit.php of Moodle through 3.7.2 allows authenticated users (Teacher and above) to inject JavaScript into the session of another user (e.g., enrolled student or site administrator) via the introeditor[text] parameter.

3.5
2020-02-11 CVE-2016-5710 Netapp Improper Restriction of Rendered UI Layers or Frames vulnerability in Netapp Snap Creator Framework

NetApp Snap Creator Framework before 4.3P1 allows remote authenticated users to conduct clickjacking attacks via unspecified vectors.

3.5
2020-02-10 CVE-2020-8089 Piwigo Cross-site Scripting vulnerability in Piwigo 2.10.1

Piwigo 2.10.1 is affected by stored XSS via the Group Name Field to the group_list page.

3.5
2020-02-10 CVE-2012-6449 Cpanel Cross-site Scripting vulnerability in Cpanel and WHM

The clientconf.html and detailbw.html pages in x3 in cPanel & WHM 11.34.0 (build 8) have a XSS vulnerability.

3.5
2020-02-10 CVE-2013-1353 Orangehrm Cross-site Scripting vulnerability in Orangehrm 2.7.1

Orange HRM 2.7.1 allows XSS via the vacancy name.

3.5
2020-02-10 CVE-2020-8825 Vanillaforums Cross-site Scripting vulnerability in Vanillaforums Vanilla 2.6.3

index.php?p=/dashboard/settings/branding in Vanilla 2.6.3 allows stored XSS.

3.5
2020-02-10 CVE-2020-8822 Digi Cross-site Scripting vulnerability in Digi Transport Wr21 Firmware and Transport Wr44 Firmware

Digi TransPort WR21 5.2.2.3, WR44 5.1.6.4, and WR44v2 5.1.6.9 devices allow stored XSS in the web application.

3.5
2020-02-13 CVE-2020-0017 Google Information Exposure vulnerability in Google Android

In multiple places, it was possible for the primary user’s dictionary to be visible to and modifiable by secondary users.

3.3
2020-02-12 CVE-2019-19192 ST Improper Input Validation vulnerability in ST Bluenrg-2 and Wb55

The Bluetooth Low Energy implementation on STMicroelectronics BLE Stack through 1.3.1 for STM32WB5x devices does not properly handle consecutive Attribute Protocol (ATT) requests on reception, allowing attackers in radio range to cause an event deadlock or crash via crafted packets.

3.3
2020-02-12 CVE-2019-16336 Cypress Classic Buffer Overflow vulnerability in Cypress Cybl11573 and Cyble-416045

The Bluetooth Low Energy implementation in Cypress PSoC 4 BLE component 3.61 and earlier processes data channel frames with a payload length larger than the configured link layer maximum RX payload size, which allows attackers (in radio range) to cause a denial of service (crash) via a crafted BLE Link Layer frame.

3.3
2020-02-12 CVE-2019-19196 Telink Semi Classic Buffer Overflow vulnerability in Telink-Semi products

The Bluetooth Low Energy Secure Manager Protocol (SMP) implementation on Telink Semiconductor BLE SDK versions before November 2019 for TLSR8x5x through 3.4.0, TLSR823x through 1.3.0, and TLSR826x through 3.3 devices accepts a pairing request with a key size greater than 16 bytes, allowing an attacker in radio range to cause a buffer overflow and denial of service (crash) via crafted packets.

3.3
2020-02-10 CVE-2017-18642 Syska Information Exposure vulnerability in Syska Smartlight Rainbow LED Smart Bulb Firmware 20170806

Syska Smart Bulb devices through 2017-08-06 receive RGB parameters over cleartext Bluetooth Low Energy (BLE), leading to sniffing, reverse engineering, and replay attacks.

3.3
2020-02-10 CVE-2012-1994 HP Information Exposure vulnerability in HP Systems Insight Manager

HP Systems Insight Manager before 7.0 allows a remote user on adjacent network to access information

2.7
2020-02-14 CVE-2020-8991 Redhat Memory Leak vulnerability in Redhat Lvm2 2.02.00

vg_lookup in daemons/lvmetad/lvmetad-core.c in LVM2 2.02 mismanages memory, leading to an lvmetad memory leak, as demonstrated by running pvs.

2.3
2020-02-14 CVE-2019-6195 Lenovo Improper Privilege Management vulnerability in Lenovo Xclarity Controller 1.71Psi328N/3.01Tei392O

An authorization bypass exists in Lenovo XClarity Controller (XCC) versions prior to 3.08 CDI340V, 3.01 TEI392O, 1.71 PSI328N where a valid authenticated user with lesser privileges may be granted read-only access to higher-privileged information if 1) “LDAP Authentication Only with Local Authorization” mode is configured and used by XCC, and 2) a lesser privileged user logs into XCC within 1 minute of a higher privileged user logging out.

2.1
2020-02-14 CVE-2019-6190 Lenovo Improper Initialization vulnerability in Lenovo products

Lenovo was notified of a potential denial of service vulnerability, affecting various versions of BIOS for Lenovo Desktop, Desktop - All in One, and ThinkStation, that could cause PCRs to be cleared intermittently after resuming from sleep (S3) on systems with Intel TXT enabled.

2.1
2020-02-13 CVE-2013-6927 Triplc Local Security Bypass vulnerability in Internet TRiLOGI Server User Account Creation

Internet TRiLOGI Server (unknown versions) could allow a local user to bypass security and create a local user account.

2.1
2020-02-13 CVE-2019-4666 IBM Unspecified vulnerability in IBM Urbancode Build and Urbancode Deploy

IBM UrbanCode Deploy (UCD) 7.0.3 and IBM UrbanCode Build 6.1.5 could allow a local user to obtain sensitive information by unmasking certain secure values in documents.

2.1
2020-02-13 CVE-2020-0018 Google Information Exposure Through Log Files vulnerability in Google Android

In MotionEntry::appendDescription of InputDispatcher.cpp, there is a possible log information disclosure.

2.1
2020-02-12 CVE-2011-2343 Google Information Exposure vulnerability in Google Android

The Bluetooth stack in Android before 2.3.6 allows a physically proximate attacker to obtain contact information via an AT phonebook transfer.

2.1
2020-02-12 CVE-2019-11867 Realtek NULL Pointer Dereference vulnerability in Realtek Ndis 10.1.505.2015

Realtek NDIS driver rt640x64.sys, file version 10.1.505.2015, fails to do any size checking on an input buffer from user space, which the driver assumes has a size greater than zero bytes.

2.1
2020-02-11 CVE-2020-0756 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists in the Cryptography Next Generation (CNG) service when it fails to properly handle objects in memory.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the service handles objects in memory., aka 'Windows Key Isolation Service Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0755 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists in the Cryptography Next Generation (CNG) service when it fails to properly handle objects in memory.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the service handles objects in memory., aka 'Windows Key Isolation Service Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0751 Microsoft Improper Input Validation vulnerability in Microsoft Windows 10 and Windows Server 2016

A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system.To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests., aka 'Windows Hyper-V Denial of Service Vulnerability'.

2.1
2020-02-11 CVE-2020-0748 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products

An information disclosure vulnerability exists in the Cryptography Next Generation (CNG) service when it fails to properly handle objects in memory.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the service handles objects in memory., aka 'Windows Key Isolation Service Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0744 Microsoft Out-of-bounds Read vulnerability in Microsoft products

An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system, aka 'Windows GDI Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0736 Microsoft Information Exposure vulnerability in Microsoft Windows 7 and Windows Server 2008

An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0717 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0716 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0714 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when DirectX improperly handles objects in memory, aka 'DirectX Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0705 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when the Windows Network Driver Interface Specification (NDIS) improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Network Driver Interface Specification (NDIS) Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0698 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists when the Telephony Service improperly discloses the contents of its memory, aka 'Windows Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0677 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products

An information disclosure vulnerability exists in the Cryptography Next Generation (CNG) service when it fails to properly handle objects in memory.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the service handles objects in memory., aka 'Windows Key Isolation Service Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0676 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products

An information disclosure vulnerability exists in the Cryptography Next Generation (CNG) service when it fails to properly handle objects in memory.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the service handles objects in memory., aka 'Windows Key Isolation Service Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0675 Microsoft Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Microsoft products

An information disclosure vulnerability exists in the Cryptography Next Generation (CNG) service when it fails to properly handle objects in memory.To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.The security update addresses the vulnerability by correcting how the service handles objects in memory., aka 'Windows Key Isolation Service Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2020-0658 Microsoft Information Exposure vulnerability in Microsoft products

An information disclosure vulnerability exists in the Windows Common Log File System (CLFS) driver when it fails to properly handle objects in memory, aka 'Windows Common Log File System Driver Information Disclosure Vulnerability'.

2.1
2020-02-11 CVE-2013-2213 KDE Use of a Broken or Risky Cryptographic Algorithm vulnerability in KDE Paste Applet

The KRandom::random function in KDE Paste Applet after 4.10.5 in kdeplasma-addons uses the GNU C Library rand function's linear congruential generator, which makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the generator output.

2.1
2020-02-11 CVE-2013-2120 KDE Improper Authentication vulnerability in KDE Paste Applet

The %{password(...)} macro in pastemacroexpander.cpp in the KDE Paste Applet before 4.10.5 in kdeplasma-addons does not properly generate passwords, which allows context-dependent attackers to bypass authentication via a brute-force attack.

2.1
2020-02-11 CVE-2020-5831 Symantec Out-of-bounds Read vulnerability in Symantec Endpoint Protection Manager

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

2.1
2020-02-11 CVE-2020-5830 Symantec Out-of-bounds Read vulnerability in Symantec Endpoint Protection Manager

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

2.1
2020-02-11 CVE-2020-5829 Symantec Out-of-bounds Read vulnerability in Symantec Endpoint Protection Manager

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

2.1
2020-02-11 CVE-2020-5828 Symantec Out-of-bounds Read vulnerability in Symantec Endpoint Protection Manager

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

2.1
2020-02-11 CVE-2020-5827 Symantec Out-of-bounds Read vulnerability in Symantec Endpoint Protection Manager

Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

2.1
2020-02-11 CVE-2020-5826 Symantec Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Symantec Endpoint Protection

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.

2.1
2020-02-11 CVE-2020-5824 Symantec Unspecified vulnerability in Symantec Endpoint Protection

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to a denial of service vulnerability, which is a type of issue whereby a threat actor attempts to tie up the resources of a resident application, thereby making certain functions unavailable.

2.1
2020-02-10 CVE-2019-6744 Samsung Improper Authentication vulnerability in Samsung Knox 1.2.02.39

This vulnerability allows local attackers to disclose sensitive information on affected installations of Samsung Knox 1.2.02.39 on Samsung Galaxy S9 build G9600ZHS3ARL1 Secure Folder.

2.1
2020-02-13 CVE-2019-3998 Simplisafe Improper Authentication vulnerability in Simplisafe SS3 Firmware 1.4

Authentication bypass using an alternate path or channel in SimpliSafe SS3 firmware 1.4 allows a local, unauthenticated attacker to modify the Wi-Fi network the base station connects to.

1.9