WAFPlanet

CVE Database - 2020

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

6942
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2020-35778

HIGH
8.80 CVSS 3.1

Certain NETGEAR devices are affected by CSRF. This affects GS716Tv3 before 6.3.1.36 and GS724Tv4 before 6.3.1.36.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-35777

HIGH
8.40 CVSS 3.1

NETGEAR DGN2200v1 devices before v1.0.0.58 are affected by command injection.

Command Injection
WAF: High

CVE-2020-10209

HIGH
8.10 CVSS 3.1

Command Injection in the CPE WAN Management Protocol (CWMP) registration in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows man-in-the-middle attackers to execute arbitrary commands with root level privileges.

OS Command Injection
WAF: High

CVE-2020-10208

CRITICAL
9.90 CVSS 3.1

Command Injection in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows authenticated remote attackers to execute arbitrary commands with root user privileges.

OS Command Injection
WAF: High

CVE-2020-9207

HIGH
7.80 CVSS 3.1

There is an improper authentication vulnerability in some verisons of Huawei CloudEngine product. A module does not verify the input file properly. Attackers can exploit this vulnerability by crafting malicious files to bypass current verification mechanism. This can compromise normal service.

Improper Authentication
WAF: Low

CVE-2020-35774

MEDIUM
5.40 CVSS 3.1

server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35773

HIGH
8.80 CVSS 3.1

The site-offline plugin before 1.4.4 for WordPress lacks certain wp_create_nonce and wp_verify_nonce calls, aka CSRF.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-29471

MEDIUM
4.80 CVSS 3.1

OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Profile Image. An admin can upload a profile image as a malicious code using JavaScript. Whenever anyone will see the profile picture, the code will execute and XSS will trigger.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29470

MEDIUM
4.80 CVSS 3.1

OpenCart 3.0.3.6 is affected by cross-site scripting (XSS) in the Subject field of mail. This vulnerability can allow an attacker to inject the XSS payload in the Subject field of the mail and each time any user will open that mail of the website, the XSS triggers and the attacker can able to steal the cookie according to the crafted payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29475

MEDIUM
4.80 CVSS 3.1

nopCommerce Store 4.30 is affected by cross-site scripting (XSS) in the Schedule tasks name field. This vulnerability can allow an attacker to inject the XSS payload in Schedule tasks and each time any user will go to that page of the website, the XSS triggers and attacker can able to steal the cookie according to the crafted payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-25847

HIGH
8.80 CVSS 3.1

This command injection vulnerability allows attackers to execute arbitrary commands in a compromised application. QNAP have already fixed this vulnerability in the following versions of QTS and QuTS hero.

Command Injection OS Command Injection
WAF: High

CVE-2020-26287

HIGH
8.70 CVSS 3.1

HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an attacker can inject arbitrary `script` tags in HedgeDoc notes using mermaid diagrams. Our content security policy prevents loading scripts from most locations, but `www.google-analytics.com` is allowed. Using Google Tag Manger it is possible to inject arbitrary JavaScript and execute it on page load. Depending on the configuration of the instance, the attacker may not need authentication to create or edit notes. The problem is patched in HedgeDoc 1.7.1. As a workaround one can disallow `www.google-analytics.com` in the `Content-Security-Policy` header. Note that other ways to leverage the `script` tag injection might exist.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-26286

HIGH
7.50 CVSS 3.1

HedgeDoc is a collaborative platform for writing and sharing markdown. In HedgeDoc before version 1.7.1 an unauthenticated attacker can upload arbitrary files to the upload storage backend including HTML, JS and PHP files. The problem is patched in HedgeDoc 1.7.1. You should however verify that your uploaded file storage only contains files that are allowed, as uploaded files might still be served. As workaround it's possible to block the `/uploadimage` endpoint on your instance using your reverse proxy. And/or restrict MIME-types and file names served from your upload file storage.

Unrestricted File Upload
WAF: Medium

CVE-2020-13476

MEDIUM
4.80 CVSS 3.1

NCH Express Invoice 8.06 to 8.24 is vulnerable to Reflected XSS in the Quotes List module.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35730

MEDIUM
6.10 CVSS 3.1

An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35616

HIGH
7.50 CVSS 3.1

An issue was discovered in Joomla! 1.7.0 through 3.9.22. Lack of input validation while handling ACL rulesets can cause write ACL violations.

Improper Input Validation
WAF: Medium

CVE-2020-35615

MEDIUM
6.30 CVSS 3.1

An issue was discovered in Joomla! 2.5.0 through 3.9.22. A missing token check in the emailexport feature of com_privacy causes a CSRF vulnerability.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-35613

CRITICAL
9.80 CVSS 3.1

An issue was discovered in Joomla! 3.0.0 through 3.9.22. Improper filter blacklist configuration leads to a SQL injection vulnerability in the backend user list.

SQL Injection
WAF: High

CVE-2020-35612

HIGH
7.50 CVSS 3.1

An issue was discovered in Joomla! 2.5.0 through 3.9.22. The folder parameter of mod_random_image lacked input validation, leading to a path traversal vulnerability.

Path Traversal
WAF: High

CVE-2020-14273

HIGH
7.50 CVSS 3.1

HCL Domino is susceptible to a Denial of Service (DoS) vulnerability due to insufficient validation of input to its public API. An unauthenticated attacker could could exploit this vulnerability to crash the Domino server.

Improper Input Validation
WAF: Medium

CVE-2020-26289

HIGH
7.50 CVSS 3.1

date-and-time is an npm package for manipulating date and time. In date-and-time before version 0.14.2, there a regular expression involved in parsing which can be exploited to to cause a denial of service. This is fixed in version 0.14.2.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2020-35627

HIGH
8.80 CVSS 3.1

Ultimate WooCommerce Gift Cards 3.0.2 is affected by a file upload vulnerability in the Custom GiftCard Template that can remotely execute arbitrary code. Once it contains the function "Custom Gift Card Template", the function of uploading a custom image is used, changing the name of the image extension to PHP and executing PHP code on the server.

Unrestricted File Upload
WAF: Medium

CVE-2020-29160

HIGH
7.50 CVSS 3.1

An issue was discovered in Zammad before 3.5.1. A REST API call allows an attacker to change Ticket Article data in a way that defeats auditing.

Missing Authorization
WAF: Low

CVE-2020-29158

MEDIUM
4.30 CVSS 3.1

An issue was discovered in Zammad before 3.5.1. An Agent with Customer permissions in a Group can bypass intended access control on internal Articles via the Ticket detail view.

Missing Authorization
WAF: Low

CVE-2020-26035

MEDIUM
5.40 CVSS 3.1

An issue was discovered in Zammad before 3.4.1. There is Stored XSS via a Tags element in a TIcket.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-26033

MEDIUM
5.40 CVSS 3.1

An issue was discovered in Zammad before 3.4.1. The Tag and Link REST API endpoints (for add and delete) lack a CSRF token check.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-26032

HIGH
7.50 CVSS 3.1

An SSRF issue was discovered in Zammad before 3.4.1. The SMS configuration interface for Massenversand is implemented in a way that renders the result of a test request to the User. An attacker can use this to request any URL via a GET request from the network interface of the server. This may lead to disclosure of information from intranet systems.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2020-26030

CRITICAL
9.80 CVSS 3.1

An issue was discovered in Zammad before 3.4.1. There is an authentication bypass in the SSO endpoint via a crafted header, when SSO is not configured. An attacker can create a valid and authenticated session that can be used to perform any actions in the name of other users.

Improper Authentication
WAF: Low

CVE-2020-26029

MEDIUM
6.50 CVSS 3.1

An issue was discovered in Zammad before 3.4.1. There are wrong authorization checks for impersonation requests via X-On-Behalf-Of. The authorization checks are performed for the actual user and not the one given in the X-On-Behalf-Of header.

Incorrect Authorization
WAF: Low

CVE-2020-26028

MEDIUM
4.90 CVSS 3.1

An issue was discovered in Zammad before 3.4.1. Admin Users without a ticket.* permission can access Tickets.

Incorrect Authorization
WAF: Low

CVE-2020-35736

HIGH
7.50 CVSS 3.1

GateOne 1.1 allows arbitrary file download without authentication via /downloads/.. directory traversal because os.path.join is misused.

Path Traversal
WAF: High

CVE-2020-29250

MEDIUM
6.10 CVSS 3.1

CXUUCMS V3 allows XSS via the first and third input fields to /public/admin.php.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29249

MEDIUM
6.10 CVSS 3.1

CXUUCMS V3 allows class="layui-input" XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29299

HIGH
7.20 CVSS 3.1

Certain Zyxel products allow command injection by an admin via an input string to chg_exp_pwd during a password-change action. This affects VPN On-premise before ZLD V4.39 week38, VPN Orchestrator before SD-OS V10.03 week32, USG before ZLD V4.39 week38, USG FLEX before ZLD V4.55 week38, ATP before ZLD V4.55 week38, and NSG before 1.33 patch 4.

Command Injection
WAF: High

CVE-2020-29204

MEDIUM
6.10 CVSS 3.1

XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35729

CRITICAL
9.80 CVSS 3.1

KLog Server 2.4.1 allows OS command injection via shell metacharacters in the actions/authenticate.php user parameter.

OS Command Injection
WAF: High

CVE-2020-35728

HIGH
8.10 CVSS 3.1

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.oracle.wls.shaded.org.apache.xalan.lib.sql.JNDIConnectionPool (aka embedded Xalan in org.glassfish.web/javax.servlet.jsp.jstl).

Insecure Deserialization
WAF: Medium

CVE-2020-8290

HIGH
7.80 CVSS 3.1

Backblaze for Windows and Backblaze for macOS before 7.0.0.439 suffer from improper privilege management in `bztransmit` helper due to lack of permission handling and validation before creation of client update directories allowing for local escalation of privilege via rogue client update binary.

Improper Privilege Management
WAF: Low

CVE-2020-35678

MEDIUM
6.10 CVSS 3.1

Autobahn|Python before 20.12.3 allows redirect header injection.

Open Redirect
WAF: Medium

CVE-2020-35245

CRITICAL
9.80 CVSS 3.1

Flamingo (aka FlamingoIM) through 2020-09-29 has a SQL injection vulnerability in UserManager::addUser.

SQL Injection
WAF: High

CVE-2020-35244

CRITICAL
9.80 CVSS 3.1

Flamingo (aka FlamingoIM) through 2020-09-29 has a SQL injection vulnerability in UserManager::addGroup.

SQL Injection
WAF: High

CVE-2020-35243

CRITICAL
9.80 CVSS 3.1

Flamingo (aka FlamingoIM) through 2020-09-29 has a SQL injection vulnerability in UserManager::updateUserInfoInDb.

SQL Injection
WAF: High

CVE-2020-35242

CRITICAL
9.80 CVSS 3.1

Flamingo (aka FlamingoIM) through 2020-09-29 has a SQL injection vulnerability in UserManager::updateUserTeamInfoInDbAndMemory.

SQL Injection
WAF: High

CVE-2020-35362

HIGH
7.50 CVSS 3.1

DEXT5Upload 2.7.1262310 and earlier is affected by Directory Traversal in handler/dext5handler.jsp. This could allow remote files to be downloaded via a dext5CMD=downloadRequest action with traversal in the fileVirtualPath parameter (the attacker must provide the correct fileOrgName value).

Path Traversal
WAF: High

CVE-2020-35284

HIGH
7.50 CVSS 3.1

Flamingo (aka FlamingoIM) through 2020-09-29 allows ../ directory traversal because the only ostensibly unpredictable part of a file-transfer request is an MD5 computation; however, this computation occurs on the client side, and the computation details can be easily determined because the product's source code is available.

Path Traversal
WAF: High

CVE-2020-35437

MEDIUM
6.10 CVSS 3.1

Subrion CMS 4.2.1 is affected by: Cross Site Scripting (XSS) through the avatar[path] parameter in a POST request to the /_core/profile/ URI.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35349

MEDIUM
4.80 CVSS 3.1

Savsoft Quiz 5 is affected by: Cross Site Scripting (XSS) via field_title (aka a title on the custom fields page).

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35347

MEDIUM
6.50 CVSS 3.1

CXUUCMS V3 3.1 has a CSRF vulnerability that can add an administrator account via admin.php?c=adminuser&a=add.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-35346

MEDIUM
4.80 CVSS 3.1

CXUUCMS V3 3.1 is affected by a reflected XSS vulnerability that allows remote attackers to inject arbitrary web script or HTML via the imgurl parameter of admin.php?c=content&a=add.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29172

MEDIUM
6.10 CVSS 3.1

A cross-site scripting (XSS) vulnerability in the LiteSpeed Cache plugin before 3.6.1 for WordPress can be exploited via the Server IP setting.

Cross-Site Scripting (XSS)
WAF: High
Page 3 of 139 (6942 CVEs)