Show filters
774 Total Results
Displaying 271-280 of 774
Sort by:
Attacker Value
Unknown
CVE-2020-5421
Disclosure Date: September 17, 2020 (last updated November 08, 2023)
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
0
Attacker Value
Unknown
CVE-2020-15163
Disclosure Date: September 09, 2020 (last updated February 22, 2025)
Python TUF (The Update Framework) reference implementation before version 0.12 it will incorrectly trust a previously downloaded root metadata file which failed verification at download time. This allows an attacker who is able to serve multiple new versions of root metadata (i.e. by a person-in-the-middle attack) culminating in a version which has not been correctly signed to control the trust chain for future updates. This is fixed in version 0.12 and newer.
0
Attacker Value
Unknown
CVE-2020-24616
Disclosure Date: August 25, 2020 (last updated February 22, 2025)
FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).
0
Attacker Value
Unknown
CVE-2020-12480
Disclosure Date: August 17, 2020 (last updated February 22, 2025)
In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed.
0
Attacker Value
Unknown
CVE-2020-1046
Disclosure Date: August 17, 2020 (last updated January 19, 2024)
A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system.
To exploit the vulnerability, an attacker would need to be able to upload a specially crafted file to a web application.
The security update addresses the vulnerability by correcting how .NET Framework processes input.
0
Attacker Value
Unknown
CVE-2020-1476
Disclosure Date: August 17, 2020 (last updated January 19, 2024)
An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files.
To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server.
The update addresses the vulnerability by changing how ASP.NET and .NET handle requests.
0
Attacker Value
Unknown
CVE-2020-15921
Disclosure Date: July 24, 2020 (last updated February 21, 2025)
Mida eFramework through 2.9.0 has a back door that permits a change of the administrative password and access to restricted functionalities, such as Code Execution.
0
Attacker Value
Unknown
CVE-2020-15919
Disclosure Date: July 24, 2020 (last updated February 21, 2025)
A Reflected Cross Site Scripting (XSS) vulnerability was discovered in Mida eFramework through 2.9.0.
0
Attacker Value
Unknown
CVE-2020-15922
Disclosure Date: July 24, 2020 (last updated February 21, 2025)
There is an OS Command Injection in Mida eFramework 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. Authentication is required.
0
Attacker Value
Unknown
CVE-2020-15918
Disclosure Date: July 24, 2020 (last updated February 21, 2025)
Multiple Stored Cross Site Scripting (XSS) vulnerabilities were discovered in Mida eFramework through 2.9.0.
0