WAFPlanet

CVE Database - 2020

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

6942
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2020-27515

MEDIUM
6.10 CVSS 3.1

A Cross Site Scripting (XSS) vulnerability in Savsoft Quiz v5.0 allows remote attackers to inject arbitrary web script or HTML via the Skype ID field.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-26766

HIGH
8.80 CVSS 3.1

A Cross Site Request Forgery (CSRF) vulnerability exists in the loginsystem page in PHPGurukul User Registration & Login and User Management System With Admin Panel 2.1.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-25917

HIGH
8.80 CVSS 3.1

Stratodesk NoTouch Center before 4.4.68 is affected by: Incorrect Access Control. A low privileged user on the platform, for example a user with "helpdesk" privileges, can perform privileged operations including adding a new administrator to the platform via the easyadmin/user/submitCreateTCUser.do page.

Missing Authorization
WAF: Low

CVE-2020-35715

HIGH
8.80 CVSS 3.1

Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote authenticated users to execute arbitrary commands via shell metacharacters in a filename to the upload_settings.cgi page.

OS Command Injection
WAF: High

CVE-2020-35714

HIGH
8.80 CVSS 3.1

Belkin LINKSYS RE6500 devices before 1.0.11.001 allow remote authenticated users to execute arbitrary commands via goform/systemCommand?command= in conjunction with the goform/pingstart program.

OS Command Injection
WAF: High

CVE-2020-35713

CRITICAL
9.80 CVSS 3.1

Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.

OS Command Injection
WAF: High

CVE-2020-35712

CRITICAL
9.80 CVSS 3.1

Esri ArcGIS Server before 10.8 is vulnerable to SSRF in some configurations.

Server-Side Request Forgery (SSRF)
WAF: Medium

CVE-2020-35709

MEDIUM
4.90 CVSS 3.1

bloofoxCMS 0.5.2.1 allows admins to upload arbitrary .php files (with "Content-Type: application/octet-stream") to ../media/images/ via the admin/index.php?mode=tools&page=upload URI, aka directory traversal.

Path Traversal
WAF: High

CVE-2020-35708

HIGH
7.20 CVSS 3.1

phpList 3.5.9 allows SQL injection by admins who provide a crafted fourth line of a file to the "Config - Import Administrators" page.

SQL Injection
WAF: High

CVE-2020-35707

MEDIUM
5.40 CVSS 3.1

Daybyday 2.1.0 allows stored XSS via the Company Name parameter to the New Client screen.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35706

MEDIUM
5.40 CVSS 3.1

Daybyday 2.1.0 allows stored XSS via the Title parameter to the New Project screen.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35705

MEDIUM
5.40 CVSS 3.1

Daybyday 2.1.0 allows stored XSS via the Name parameter to the New User screen.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35704

MEDIUM
5.40 CVSS 3.1

Daybyday 2.1.0 allows stored XSS via the Title parameter to the New Lead screen.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-29474

CRITICAL
9.80 CVSS 3.1

EGavilan Media EGM Address Book 1.0 contains a SQL injection vulnerability. An attacker can gain Admin Panel access using malicious SQL injection queries to perform remote arbitrary code execution.

SQL Injection
WAF: High

CVE-2020-29472

CRITICAL
9.80 CVSS 3.1

EGavilan Media Under Construction page with cPanel 1.0 contains a SQL injection vulnerability. An attacker can gain Admin Panel access using malicious SQL injection queries to perform remote arbitrary code execution.

SQL Injection
WAF: High

CVE-2020-29247

MEDIUM
4.80 CVSS 3.1

WonderCMS 3.1.3 is affected by cross-site scripting (XSS) in the Admin Panel. An attacker can inject the XSS payload in Page keywords and each time any user will visit the website, the XSS triggers, and the attacker can able to steal the cookie according to the crafted payload.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-9137

MEDIUM
6.70 CVSS 3.1

There is a privilege escalation vulnerability in some versions of CloudEngine 12800,CloudEngine 5800,CloudEngine 6800 and CloudEngine 7800. Due to insufficient input validation, a local attacker with high privilege may execute some specially crafted scripts in the affected products. Successful exploit will cause privilege escalation.

Improper Input Validation
WAF: Medium

CVE-2020-35659

MEDIUM
6.10 CVSS 3.1

The DNS query log in Pi-hole before 5.2.2 is vulnerable to stored XSS. An attacker with the ability to directly or indirectly query DNS with a malicious hostname can cause arbitrary JavaScript to execute when the Pi-hole administrator visits the Query Log or Long-term data Query Log page.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-27729

MEDIUM
6.10 CVSS 3.1

In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, an undisclosed link on the BIG-IP APM virtual server allows a malicious user to build an open redirect URI.

Open Redirect
WAF: Medium

CVE-2020-27727

MEDIUM
4.90 CVSS 3.1

On BIG-IP version 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, and 13.1.0-13.1.3.4, when an authenticated administrative user installs RPMs using the iAppsLX REST installer, the BIG-IP system does not sufficiently validate user input, allowing the user read access to the filesystem.

Improper Input Validation
WAF: Medium

CVE-2020-27726

MEDIUM
6.10 CVSS 3.1

In versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4, and 12.1.0-12.1.5.2, a reflected cross-site scripting (XSS) vulnerability exists in the resource information page for authenticated users when a full webtop is configured on the BIG-IP APM system.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-27722

MEDIUM
6.50 CVSS 3.1

In BIG-IP APM versions 15.0.0-15.0.1.3, 14.1.0-14.1.3, and 13.1.0-13.1.3.4, under certain conditions, the VDI plugin does not observe plugin flow-control protocol causing excessive resource consumption.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2020-27719

MEDIUM
6.10 CVSS 3.1

On BIG-IP 16.0.0-16.0.0.1, 15.1.0-15.1.0.5, and 14.1.0-14.1.3, a cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-28188

CRITICAL
9.80 CVSS 3.1

Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter.

OS Command Injection
WAF: High

CVE-2020-28187

CRITICAL
9.80 CVSS 3.1

Multiple directory traversal vulnerabilities in TerraMaster TOS <= 4.2.06 allow remote authenticated attackers to read, edit or delete any file within the filesystem via the (1) filename parameter to /tos/index.php?editor/fileGet, Event parameter to /include/ajax/logtable.php, or opt parameter to /include/core/index.php.

Path Traversal
WAF: High

CVE-2020-28184

MEDIUM
5.40 CVSS 3.1

Cross-site scripting (XSS) vulnerability in TerraMaster TOS <= 4.2.06 allows remote authenticated users to inject arbitrary web script or HTML via the mod parameter to /module/index.php.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-27724

MEDIUM
6.50 CVSS 3.1

In BIG-IP APM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2, on systems running more than one TMM instance, authenticated VPN users may consume excessive resources by sending specially-crafted malicious traffic over the tunnel.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2020-35677

MEDIUM
4.80 CVSS 3.1

BigProf Online Invoicing System before 4.0 fails to adequately sanitize fields for HTML characters upon an administrator using admin/pageEditGroup.php to create a new group, resulting in Stored XSS. The caveat here is that an attacker would need administrative privileges in order to create the payload. One might think this completely mitigates the privilege-escalation impact as there is only one high-privileged role. However, it was discovered that the endpoint responsible for creating the group lacks CSRF protection.

Cross-Site Scripting (XSS) Cross-Site Request Forgery (CSRF)
WAF: High

CVE-2020-35676

MEDIUM
6.10 CVSS 3.1

BigProf Online Invoicing System before 3.1 fails to correctly sanitize an XSS payload when a user registers using the self-registration functionality. As such, an attacker can input a crafted payload that will execute upon the application's administrator browsing the registered users' list. Once the arbitrary Javascript is executed in the context of the admin, this will cause the attacker to gain administrative privileges, effectively leading into an application takeover. This affects app/membership_signup.php and app/admin/pageViewMembers.php.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-2504

HIGH
7.50 CVSS 3.1

If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.

Improper Input Validation Path Traversal
WAF: High

CVE-2020-2503

MEDIUM
5.40 CVSS 3.1

If exploited, this stored cross-site scripting vulnerability could allow remote attackers to inject malicious code in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35666

HIGH
8.80 CVSS 3.1

Steedos Platform through 1.21.24 allows NoSQL injection because the /api/collection/findone implementation in server/packages/steedos_base.js mishandles req.body validation, as demonstrated by MongoDB operator attacks such as an X-User-Id[$ne]=1 value.

SQL Injection
WAF: High

CVE-2020-35665

CRITICAL
9.80 CVSS 3.1

An unauthenticated command-execution vulnerability exists in TerraMaster TOS through 4.2.06 via shell metacharacters in the Event parameter in include/makecvs.php during CSV creation.

OS Command Injection
WAF: High

CVE-2020-35598

HIGH
7.50 CVSS 3.1

ACS Advanced Comment System 1.0 is affected by Directory Traversal via an advanced_component_system/index.php?ACS_path=..%2f URI. NOTE: this might be the same as CVE-2009-4623

Path Traversal
WAF: High

CVE-2020-35370

HIGH
8.80 CVSS 3.1

A RCE vulnerability exists in Raysync below 3.3.3.8. An unauthenticated unauthorized attacker sending a specifically crafted request to override the specific file in server with malicious content can login as "admin", then to modify specific shell file to achieve remote code execution(RCE) on the hosting server.

Path Traversal
WAF: High

CVE-2020-35269

HIGH
8.80 CVSS 3.1

Nagios Core application version 4.2.4 is vulnerable to Site-Wide Cross-Site Request Forgery (CSRF) in many functions, like adding – deleting for hosts or servers.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-35252

MEDIUM
6.10 CVSS 3.1

Cross Site Scripting (XSS) vulnerability via the 'Full Name' parameter in the User Registration section of User Registration & Login System with Admin Panel 1.0.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-28074

CRITICAL
9.80 CVSS 3.1

SourceCodester Online Health Care System 1.0 is affected by SQL Injection which allows a potential attacker to bypass the authentication system and become an admin.

SQL Injection
WAF: High

CVE-2020-28073

CRITICAL
9.80 CVSS 3.1

SourceCodester Library Management System 1.0 is affected by SQL Injection allowing an attacker to bypass the user authentication and impersonate any user on the system.

SQL Injection
WAF: High

CVE-2020-28071

MEDIUM
4.80 CVSS 3.1

SourceCodester Alumni Management System 1.0 is affected by cross-site Scripting (XSS) in /admin/gallery.php. After the admin authentication an attacker can upload an image in the gallery using a XSS payload in the description textarea called 'about' and reach a stored XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-28070

CRITICAL
9.80 CVSS 3.1

SourceCodester Alumni Management System 1.0 is affected by SQL injection causing arbitrary remote code execution from GET input in view_event.php via the 'id' parameter.

SQL Injection
WAF: High

CVE-2020-27397

HIGH
8.80 CVSS 3.1

Marital - Online Matrimonial Project In PHP version 1.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) on the Hosting web server via uploading a maliciously crafted PHP file.

Unrestricted File Upload
WAF: Medium

CVE-2020-13969

MEDIUM
6.10 CVSS 3.1

CRK Business Platform <= 2019.1 allows reflected XSS via erro.aspx on 'CRK', 'IDContratante', 'Erro', or 'Mod' parameter. This is path-independent.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-13968

CRITICAL
9.80 CVSS 3.1

CRK Business Platform <= 2019.1 allows can inject SQL statements against the DB on any path using the 'strSessao' parameter.

SQL Injection
WAF: High

CVE-2018-1000893

HIGH
7.50 CVSS 3.1

Bitcoin SV before 0.1.1 allows uncontrolled resource consumption when deserializing transactions.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2018-1000892

HIGH
7.50 CVSS 3.1

Bitcoin SV before 0.1.1 allows uncontrolled resource consumption when receiving sendheaders messages.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2018-1000891

HIGH
7.50 CVSS 3.1

Bitcoin SV before 0.1.1 allows uncontrolled resource consumption when receiving messages with invalid checksums.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2020-9439

MEDIUM
6.10 CVSS 3.1

Multiple cross-site scripting (XSS) vulnerabilities in Uncanny Owl Tin Canny LearnDash Reporting before 3.4.4 allows authenticated remote attackers to inject arbitrary web script or HTML via the search_key GET Parameter in TinCan_Content_List_Table.php, message GET Parameter in licensing.php, tc_filter_group parameter in reporting-admin-menu.php, tc_filter_user parameter in reporting-admin-menu.php, tc_filter_course parameter in reporting-admin-menu.php, tc_filter_lesson parameter in reporting-admin-menu.php, tc_filter_module parameter in reporting-admin-menu.php, tc_filter_action parameter in reporting-admin-menu.php, tc_filter_data_range parameter in reporting-admin-menu.php, or tc_filter_data_range_last parameter in reporting-admin-menu.php.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-6159

MEDIUM
6.10 CVSS 3.1

URLs using “javascript:” have the protocol removed when pasted into the address bar to protect users from cross-site scripting (XSS) attacks, but in certain circumstances this removal was not performed. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Opera for Android versions below 61.0.3076.56532.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35650

MEDIUM
6.10 CVSS 3.1

Multiple cross-site scripting (XSS) vulnerabilities in Uncanny Groups for LearnDash before v3.7 allow authenticated remote attackers to inject arbitrary JavaScript or HTML via the ulgm_code_redeem POST Parameter in user-code-redemption.php, the ulgm_user_first POST Parameter in user-registration-form.php, the ulgm_user_last POST Parameter in user-registration-form.php, the ulgm_user_email POST Parameter in user-registration-form.php, the ulgm_code_registration POST Parameter in user-registration-form.php, the ulgm_terms_conditions POST Parameter in user-registration-form.php, the _ulgm_total_seats POST Parameter in frontend-uo_groups_buy_courses.php, the uncanny_group_signup_user_first POST Parameter in group-registration-form.php, the uncanny_group_signup_user_last POST Parameter in group-registration-form.php, the uncanny_group_signup_user_login POST Parameter in group-registration-form.php, the uncanny_group_signup_user_email POST Parameter in group-registration-form.php, the success-invited GET Parameter in frontend-uo_groups.php, the bulk-errors GET Parameter in frontend-uo_groups.php, or the message GET Parameter in frontend-uo_groups.php.

Cross-Site Scripting (XSS)
WAF: High
Page 4 of 139 (6942 CVEs)