Show filters
208 Total Results
Displaying 1-10 of 208
Sort by:
Attacker Value
Unknown

CVE-2020-8468

Disclosure Date: March 18, 2020 (last updated February 21, 2025)
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication.
Attacker Value
High

CVE-2020-17496

Disclosure Date: August 12, 2020 (last updated February 21, 2025)
vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759.
Attacker Value
High

CVE-2020-9757

Disclosure Date: March 04, 2020 (last updated February 21, 2025)
The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller.
Attacker Value
Unknown

CVE-2020-4027

Disclosure Date: June 18, 2020 (last updated February 21, 2025)
Affected versions of Atlassian Confluence Server and Data Center allowed remote attackers with system administration permissions to bypass velocity template injection mitigations via an injection vulnerability in custom user macros. The affected versions are before version 7.4.5, and from version 7.5.0 before 7.5.1.
Attacker Value
Unknown

CVE-2020-10208

Disclosure Date: December 30, 2020 (last updated February 22, 2025)
Command Injection in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows authenticated remote attackers to execute arbitrary commands with root user privileges.
Attacker Value
Unknown

CVE-2020-16268

Disclosure Date: December 29, 2020 (last updated February 22, 2025)
The MSI installer in 1E Client 4.1.0.267 and 5.0.0.745 allows remote authenticated users and local users to gain elevated privileges via the repair option. This applies to installations that have a TRANSFORM (MST) with the option to disable the installation of the Nomad module. An attacker may craft a .reg file in a specific location that will be able to write to any registry key as an elevated user.
Attacker Value
Unknown

CVE-2020-26282

Disclosure Date: December 24, 2020 (last updated February 22, 2025)
BrowserUp Proxy allows you to manipulate HTTP requests and responses, capture HTTP content, and export performance data as a HAR file. BrowserUp Proxy works well as a standalone proxy server, but it is especially useful when embedded in Selenium tests. A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been patched in version 2.1.2.
Attacker Value
Unknown

CVE-2020-35669

Disclosure Date: December 24, 2020 (last updated February 22, 2025)
An issue was discovered in the http package through 0.12.2 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request.
Attacker Value
Unknown

CVE-2020-2503

Disclosure Date: December 23, 2020 (last updated February 22, 2025)
If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.
Attacker Value
Unknown

CVE-2020-35608

Disclosure Date: December 22, 2020 (last updated February 22, 2025)
A code execution vulnerability exists in the normal world’s signed code execution functionality of Microsoft Azure Sphere 20.07. A specially crafted AF_PACKET socket can cause a process to create an executable memory mapping with controllable content. An attacker can execute a shellcode that uses the PACKET_MMAP functionality to trigger this vulnerability.