WAFPlanet

CVE Database - 2020

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

6942
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2020-26165

HIGH
8.80 CVSS 3.1

qdPM through 9.1 allows PHP Object Injection via timeReportActions::executeExport in core/apps/qdPM/modules/timeReport/actions/actions.class.php because unserialize is used.

Insecure Deserialization
WAF: Medium

CVE-2020-35930

MEDIUM
5.40 CVSS 3.1

Seo Panel 4.8.0 allows stored XSS by an Authenticated User via the url parameter, as demonstrated by the seo/seopanel/websites.php URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2019-25011

MEDIUM
5.40 CVSS 3.1

NetBox through 2.6.2 allows an Authenticated User to conduct an XSS attack against an admin via a GFM-rendered field, as demonstrated by /dcim/sites/add/ comments.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-25799

MEDIUM
5.40 CVSS 3.1

LimeSurvey 3.21.1 is affected by cross-site scripting (XSS) in the Quota component of the Survey page. When the survey quota being viewed, e.g. by an administrative user, the JavaScript code will be executed in the browser.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-25797

MEDIUM
5.40 CVSS 3.1

LimeSurvey 3.21.1 is affected by cross-site scripting (XSS) in the Add Participants Function (First and last name parameters). When the survey participant being edited, e.g. by an administrative user, the JavaScript code will be executed in the browser.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-19945

CRITICAL
9.10 CVSS 3.1

A vulnerability has been reported to affect earlier QNAP devices running QTS 4.3.4 to 4.3.6. Caused by improper limitations of a pathname to a restricted directory, this vulnerability allows for renaming arbitrary files on the target system, if exploited. QNAP have already fixed this vulnerability in the following versions: QTS 4.3.6.0895 build 20190328 (and later) QTS 4.3.4.0899 build 20190322 (and later) This issue does not affect QTS 4.4.x or QTS 4.5.x.

Improper Input Validation Path Traversal
WAF: High

CVE-2020-35883

CRITICAL
9.10 CVSS 3.1

An issue was discovered in the mozwire crate through 2020-08-18 for Rust. A ../ directory-traversal situation allows overwriting local files that have .conf at the end of the filename.

Path Traversal
WAF: High

CVE-2020-35857

HIGH
7.50 CVSS 3.1

An issue was discovered in the trust-dns-server crate before 0.18.1 for Rust. DNS MX and SRV null targets are mishandled, causing stack consumption.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2020-35916

MEDIUM
5.50 CVSS 3.1

An issue was discovered in the image crate before 0.23.12 for Rust. A Mutable reference has immutable provenance. (In the case of LLVM, the IR may be always correct.)

Uncontrolled Resource Consumption
WAF: Medium

CVE-2020-35851

CRITICAL
9.80 CVSS 3.1

HGiga MailSherlock does not validate specific parameters properly. Attackers can use the vulnerability to launch Command inject attacks remotely and execute arbitrary commands of the system.

OS Command Injection
WAF: High

CVE-2020-35743

HIGH
7.60 CVSS 3.1

HGiga MailSherlock contains a SQL injection flaw. Attackers can inject and launch SQL commands in a URL parameter of specific cgi pages.

SQL Injection
WAF: High

CVE-2020-35742

HIGH
7.60 CVSS 3.1

HGiga MailSherlock contains a vulnerability of SQL Injection. Attackers can inject and launch SQL commands in a URL parameter.

SQL Injection
WAF: High

CVE-2020-35741

MEDIUM
6.10 CVSS 3.1

HGiga MailSherlock does not validate user parameters on multiple login pages. Attackers can use the vulnerability to inject JavaScript syntax for XSS attacks.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35740

MEDIUM
6.10 CVSS 3.1

HGiga MailSherlock does not validate specific URL parameters properly that allows attackers to inject JavaScript syntax for XSS attacks.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-25848

CRITICAL
9.80 CVSS 3.1

HGiga MailSherlock contains weak authentication flaw that attackers grant privilege remotely with default password generation mechanism.

Improper Authentication
WAF: Low

CVE-2020-25846

HIGH
7.40 CVSS 3.1

The digest generation function of NHIServiSignAdapter has not been verified for source file path, which leads to the SMB request being redirected to a malicious host, resulting in the leakage of user's credential.

Open Redirect
WAF: Medium

CVE-2020-25845

HIGH
7.40 CVSS 3.1

Multiple functions of NHIServiSignAdapter failed to verify the users’ file path, which leads to the SMB request being redirected to a malicious host, resulting in the leakage of user's credential.

Open Redirect
WAF: Medium

CVE-2019-7726

CRITICAL
9.80 CVSS 3.1

modules/banners/funcs/click.php in NukeViet before 4.3.04 has a SQL INSERT statement with raw header data from an HTTP request (e.g., Referer and User-Agent).

SQL Injection
WAF: High

CVE-2019-7725

CRITICAL
9.80 CVSS 3.1

includes/core/is_user.php in NukeViet before 4.3.04 deserializes the untrusted nvloginhash cookie (i.e., the code relies on PHP's serialization format when JSON can be used to eliminate the risk).

Insecure Deserialization
WAF: Medium

CVE-2018-16795

HIGH
8.80 CVSS 3.1

OpenEMR 5.0.1.3 allows Cross-Site Request Forgery (CSRF) via library/ajax and interface/super, as demonstrated by use of interface/super/manage_site_files.php to upload a .php file.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2018-14067

CRITICAL
9.80 CVSS 3.1

Green Packet WiMax DV-360 2.10.14-g1.0.6.1 devices allow Command Injection, with unauthenticated remote command execution, via a crafted payload to the HTTPS port, because lighttpd listens on all network interfaces (including the external Internet) by default. NOTE: this may overlap CVE-2017-9980.

Command Injection
WAF: High

CVE-2016-9026

CRITICAL
9.80 CVSS 3.1

Exponent CMS before 2.6.0 has improper input validation in fileController.php.

Improper Input Validation
WAF: Medium

CVE-2016-9025

CRITICAL
9.80 CVSS 3.1

Exponent CMS before 2.6.0 has improper input validation in purchaseOrderController.php.

Improper Input Validation
WAF: Medium

CVE-2016-9023

CRITICAL
9.80 CVSS 3.1

Exponent CMS before 2.6.0 has improper input validation in cron/find_help.php.

Improper Input Validation
WAF: Medium

CVE-2016-9022

CRITICAL
9.80 CVSS 3.1

Exponent CMS before 2.6.0 has improper input validation in usersController.php.

Improper Input Validation
WAF: Medium

CVE-2016-9021

CRITICAL
9.80 CVSS 3.1

Exponent CMS before 2.6.0 has improper input validation in storeController.php.

Improper Input Validation
WAF: Medium

CVE-2020-19664

HIGH
8.80 CVSS 3.1

DrayTek Vigor2960 1.5.1 allows remote command execution via shell metacharacters in a toLogin2FA action to mainfunction.cgi.

OS Command Injection
WAF: High

CVE-2020-17363

CRITICAL
9.90 CVSS 3.1

USVN (aka User-friendly SVN) before 1.0.9 allows remote code execution via shell metacharacters in the number_start or number_end parameter to LastHundredRequest (aka lasthundredrequestAction) in the Timeline module. NOTE: this may overlap CVE-2020-25069.

OS Command Injection
WAF: High

CVE-2020-26291

MEDIUM
6.50 CVSS 3.1

URI.js is a javascript URL mutation library (npm package urijs). In URI.js before version 1.19.4, the hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. For example the URL `https://expected-example.com\@observed-example.com` will incorrectly return `observed-example.com` if using an affected version. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the WHATWG URL specification, including web browsers and Node's built-in URL class. Version 1.19.4 is patched against all known payload variants. Version 1.19.3 has a partial patch but is still vulnerable to a payload variant.]

Improper Input Validation
WAF: Medium

CVE-2020-27534

MEDIUM
5.30 CVSS 3.1

util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname, constructed with an empty first argument in an ioutil.TempDir call.

Path Traversal
WAF: High

CVE-2020-26296

HIGH
8.70 CVSS 3.1

Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. Vega in an npm package. In Vega before version 5.17.3 there is an XSS vulnerability in Vega expressions. Through a specially crafted Vega expression, an attacker could execute arbitrary javascript on a victim's machine. This is fixed in version 5.17.3

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-28413

MEDIUM
6.50 CVSS 3.1

In MantisBT 2.24.3, SQL Injection can occur in the parameter "access" of the mc_project_get_users function through the API SOAP.

SQL Injection
WAF: High

CVE-2020-29231

MEDIUM
5.40 CVSS 3.1

EGavilanMedia User Registration and Login System With Admin Panel 1.0 is affected by cross-site scripting (XSS) in the Admin Profile Page. This vulnerability can result in the attacker injecting the XSS payload in Admin Full Name and each time admin visits the Profile page from the admin panel, the XSS triggers.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29230

MEDIUM
6.10 CVSS 3.1

EGavilanMedia User Registration and Login System With Admin Panel 1.0 is affected by cross-site scripting (XSS) in the Admin Panel - Manage User tab using the Full Name of the user. This vulnerability can result in the attacker injecting the XSS payload in the User Registration section and each time admin visits the manage user section from the admin panel, the XSS triggers and the attacker can steal the cookie according to the crafted payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29228

HIGH
7.50 CVSS 3.1

EGavilanMedia User Registration and Login System With Admin Panel 1.0 is affected by SQL injection in the User Login Page.

SQL Injection
WAF: High

CVE-2020-28736

HIGH
8.80 CVSS 3.1

Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).

XML External Entity (XXE)
WAF: High

CVE-2020-28735

HIGH
8.80 CVSS 3.1

Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role).

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2020-28734

HIGH
8.80 CVSS 3.1

Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role.

XML External Entity (XXE)
WAF: High

CVE-2020-28365

MEDIUM
6.10 CVSS 3.1

Sentrifugo 3.2 allows Stored Cross-Site Scripting (XSS) vulnerability by inserting a payload within the X-Forwarded-For HTTP header during the login process. When an administrator looks at logs, the payload is executed. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-27848

HIGH
8.80 CVSS 3.1

dotCMS before 20.10.1 allows SQL injection, as demonstrated by the /api/v1/containers orderby parameter. The PaginatorOrdered classes that are used to paginate results of a REST endpoints do not sanitize the orderBy parameter and in some cases it is vulnerable to SQL injection attacks. A user must be an authenticated manager in the dotCMS system to exploit this vulnerability.

SQL Injection
WAF: High

CVE-2020-26247

MEDIUM
4.30 CVSS 3.1

Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.

XML External Entity (XXE)
WAF: High

CVE-2020-5811

MEDIUM
6.50 CVSS 3.1

An authenticated path traversal vulnerability exists during package installation in Umbraco CMS <= 8.9.1 or current, which could result in arbitrary files being written outside of the site home and expected paths when installing an Umbraco package.

Path Traversal
WAF: High

CVE-2020-5810

MEDIUM
5.40 CVSS 3.1

A stored XSS vulnerability exists in Umbraco CMS <= 8.9.1 or current. An authenticated user authorized to upload media can upload a malicious .svg file which act as a stored XSS payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-5809

MEDIUM
5.40 CVSS 3.1

A stored XSS vulnerability exists in Umbraco CMS <= 8.9.1 or current. An authenticated user can inject arbitrary JavaScript code into iframes when editing content using the TinyMCE rich-text editor, as TinyMCE is configured to allow iframes by default in Umbraco CMS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35241

MEDIUM
4.80 CVSS 3.1

FlatPress 1.0.3 is affected by cross-site scripting (XSS) in the Blog Content component. This vulnerability can allow an attacker to inject the XSS payload in Blog content via the admin panel. Each time any user will go to that blog page, the XSS triggers and the attacker can steal the cookie according to the crafted payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35240

MEDIUM
4.80 CVSS 3.1

FluxBB 1.5.11 is affected by cross-site scripting (XSS in the Blog Content component. This vulnerability can allow an attacker to inject the XSS payload in "Blog Content" and each time any user will visit the blog, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29477

MEDIUM
4.80 CVSS 3.1

Invision Community 4.5.4 is affected by cross-site scripting (XSS) in the Field Name field. This vulnerability can allow an attacker to inject the XSS payload in Field Name and each time any user will open that, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29469

MEDIUM
5.40 CVSS 3.1

WonderCMS 3.1.3 is affected by cross-site scripting (XSS) in the Menu component. This vulnerability can allow an attacker to inject the XSS payload in the Setting - Menu and each time any user will visits the website directory, the XSS triggers and attacker can steal the cookie according to the crafted payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29233

MEDIUM
5.40 CVSS 3.1

WonderCMS 3.1.3 is affected by cross-site scripting (XSS) in the Page description component. This vulnerability can allow an attacker to inject the XSS payload in the Page description and each time any user will visits the website, the XSS triggers and attacker can steal the cookie according to the crafted payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35850

MEDIUM
6.50 CVSS 3.1

An SSRF issue was discovered in cockpit-project.org Cockpit 234. NOTE: this is unrelated to the Agentejo Cockpit product. NOTE: the vendor states "I don't think [it] is a big real-life issue.

Server-Side Request Forgery (SSRF)
WAF: Medium
Page 1 of 139 (6942 CVEs)