Show filters
71,345 Total Results
Displaying 381-390 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Very High
CVE-2020-35665
Disclosure Date: December 23, 2020 (last updated November 28, 2024)
An unauthenticated command-execution vulnerability exists in TerraMaster TOS through 4.2.06 via shell metacharacters in the Event parameter in include/makecvs.php during CSV creation.
2
Attacker Value
Very High
CVE-2020-16846 — SaltStack Unauthenticated Shell Injection
Disclosure Date: November 06, 2020 (last updated July 27, 2024)
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
1
Attacker Value
Moderate
CVE-2020-12812
Disclosure Date: July 24, 2020 (last updated February 14, 2024)
An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.
1
Attacker Value
Unknown
CVE-2020-11951
Disclosure Date: July 14, 2020 (last updated November 28, 2024)
An issue was discovered on Rittal PDU-3C002DEC through 5.17.10 and CMCIII-PU-9333E0FB through 3.17.10 devices. There is a Backdoor root account.
3
Attacker Value
High
CVE-2020-1206 Windows SMBv3 Client/Server Information Disclosure Vulnerability
Disclosure Date: June 09, 2020 (last updated November 28, 2024)
An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Information Disclosure Vulnerability'.
1
Attacker Value
Very High
CVE-2020-3280 Cisco Unified CCX Preauth RCE
Disclosure Date: May 20, 2020 (last updated November 27, 2024)
A vulnerability in the Java Remote Management Interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a malicious serialized Java object to a specific listener on an affected system. A successful exploit could allow the attacker to execute arbitrary code as the root user on an affected device.
1
Attacker Value
Moderate
CVE-2020-11738
Disclosure Date: April 13, 2020 (last updated November 27, 2024)
The Snap Creek Duplicator plugin before 1.3.28 for WordPress (and Duplicator Pro before 3.8.7.1) allows Directory Traversal via ../ in the file parameter to duplicator_download or duplicator_init.
1
Attacker Value
High
CVE-2020-5344
Disclosure Date: March 26, 2020 (last updated November 27, 2024)
Dell EMC iDRAC7, iDRAC8 and iDRAC9 versions prior to 2.65.65.65, 2.70.70.70, 4.00.00.00 contain a stack-based buffer overflow vulnerability. An unauthenticated remote attacker may exploit this vulnerability to crash the affected process or execute arbitrary code on the system by sending specially crafted input data.
2
Attacker Value
Very High
CVE-2020-10220
Disclosure Date: March 07, 2020 (last updated November 27, 2024)
An issue was discovered in rConfig through 3.9.4. The web interface is prone to a SQL injection via the commands.inc.php searchColumn parameter.
1
Attacker Value
Very High
CVE-2020-10189
Disclosure Date: March 06, 2020 (last updated November 27, 2024)
Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets.
0