WAFPlanet

CVE Database - 2020

Browse known vulnerabilities with WAF coverage analysis. See which CVEs are detectable by Web Application Firewalls and their OWASP CRS rules.

6942
Matching CVEs
15562
Critical
25943
High
66770
High WAF Coverage

CVE-2020-29552

CRITICAL
9.80 CVSS 3.1

An issue was discovered in URVE Build 24.03.2020. By using the _internal/pc/vpro.php?mac=0&ip=0&operation=0&usr=0&pass=0%3bpowershell+-c+" substring, it is possible to execute a Powershell command and redirect its output to a file under the web root.

OS Command Injection
WAF: High

CVE-2020-25194

HIGH
8.80 CVSS 3.1

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has improper privilege management, which may allow an attacker with user privileges to perform requests with administrative privileges.

Improper Privilege Management
WAF: Low

CVE-2020-35657

HIGH
7.20 CVSS 3.1

Jaws through 1.8.0 allows remote authenticated administrators to execute arbitrary code via crafted use of UploadTheme to upload a theme ZIP archive containing a .php file that is able to execute OS commands. NOTE: this is unrelated to the JAWS (aka Job Access With Speech) product.

Unrestricted File Upload
WAF: Medium

CVE-2020-35656

HIGH
7.20 CVSS 3.1

Jaws through 1.8.0 allows remote authenticated administrators to execute arbitrary code via crafted use of admin.php?reqGadget=Components&reqAction=InstallGadget&comp=FileBrowser and admin.php?reqGadget=FileBrowser&reqAction=Files to upload a .php file. NOTE: this is unrelated to the JAWS (aka Job Access With Speech) product.

Unrestricted File Upload
WAF: Medium

CVE-2020-27338

HIGH
7.10 CVSS 3.1

An issue was discovered in Treck IPv6 before 6.0.1.68. Improper Input Validation in the DHCPv6 client component allows an unauthenticated remote attacker to cause an Out of Bounds Read, and possibly a Denial of Service via adjacent network access.

Improper Input Validation
WAF: Medium

CVE-2020-27337

HIGH
7.30 CVSS 3.1

An issue was discovered in Treck IPv6 before 6.0.1.68. Improper Input Validation in the IPv6 component allows an unauthenticated remote attacker to cause an Out of Bounds Write, and possibly a Denial of Service via network access.

Improper Input Validation
WAF: Medium

CVE-2020-27336

MEDIUM
5.30 CVSS 3.1

An issue was discovered in Treck IPv6 before 6.0.1.68. Improper input validation in the IPv6 component when handling a packet sent by an unauthenticated remote attacker could result in an out-of-bounds read of up to three bytes via network access.

Improper Input Validation
WAF: Medium

CVE-2020-24679

CRITICAL
9.80 CVSS 3.1

A S+ Operations and S+ Historian service is subject to a DoS by special crafted messages. An attacker might use this flaw to make it crash or even execute arbitrary code on the machine where the service is hosted.

Improper Input Validation
WAF: Medium

CVE-2020-24678

HIGH
8.80 CVSS 3.1

An authenticated user might execute malicious code under the user context and take control of the system. S+ Operations or S+ Historian database is affected by multiple vulnerabilities such as the possibility to allow remote authenticated users to gain high privileges.

Improper Privilege Management
WAF: Low

CVE-2020-24675

CRITICAL
9.80 CVSS 3.1

In S+ Operations and S+ History, it is possible that an unauthenticated user could inject values to the Operations History server (or standalone S+ History server) and ultimately write values to the controlled process.

Improper Authentication
WAF: Low

CVE-2020-24674

HIGH
8.80 CVSS 3.1

In S+ Operations and S+ Historian, not all client commands correctly check user permission as expected. Authenticated but Unauthorized remote users could execute a Denial-of-Service (DoS) attack, execute arbitrary code, or obtain more privilege than intended on the machines.

Incorrect Authorization
WAF: Low

CVE-2020-24673

CRITICAL
9.80 CVSS 3.1

In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.

SQL Injection
WAF: High

CVE-2020-14231

HIGH
8.80 CVSS 3.1

A vulnerability in the input parameter handling of HCL Client Application Access v9 could potentially be exploited by an authenticated attacker resulting in a stack buffer overflow. This could allow the attacker to crash the program or inject code into the system which would execute with the privileges of the currently logged in user.

Improper Input Validation
WAF: Medium

CVE-2020-24581

HIGH
8.00 CVSS 3.1

An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. It contains an execute_cmd.cgi feature (that is not reachable via the web user interface) that lets an authenticated user execute Operating System commands.

OS Command Injection
WAF: High

CVE-2020-24579

HIGH
8.80 CVSS 3.1

An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. An unauthenticated attacker could bypass authentication to access authenticated pages and functionality.

Improper Authentication
WAF: Low

CVE-2020-25106

HIGH
7.80 CVSS 3.1

Nanosystems SupRemo 4.1.3.2348 allows attackers to obtain LocalSystem access because File Manager can be used to rename Supremo.exe and then upload a Trojan horse with the Supremo.exe filename.

Improper Privilege Management
WAF: Low

CVE-2019-11785

MEDIUM
4.30 CVSS 3.1

Improper access control in mail module (followers) in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote authenticated users to obtain access to messages posted on business records there were not given access to, and subscribe to receive future messages.

Missing Authorization
WAF: Low

CVE-2019-11784

MEDIUM
6.50 CVSS 3.1

Improper access control in mail module (notifications) in Odoo Community 14.0 and earlier and Odoo Enterprise 14.0 and earlier, allows remote authenticated users to obtain access to arbitrary messages in conversations they were not a party to.

Missing Authorization
WAF: Low

CVE-2019-11783

MEDIUM
6.50 CVSS 3.1

Improper access control in mail module (channel partners) in Odoo Community 14.0 and earlier and Odoo Enterprise 14.0 and earlier, allows remote authenticated users to subscribe to arbitrary mail channels uninvited.

Missing Authorization
WAF: Low

CVE-2019-11781

HIGH
8.80 CVSS 3.1

Improper input validation in portal component in Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier, allows remote attackers to trick victims into modifying their account via crafted links, leading to privilege escalation.

Improper Input Validation
WAF: Medium

CVE-2018-15641

MEDIUM
5.40 CVSS 3.1

Cross-site scripting (XSS) issue in web module in Odoo Community 11.0 through 14.0 and Odoo Enterprise 11.0 through 14.0, allows remote authenticated internal users to inject arbitrary web script in the browser of a victim via crafted calendar event attributes.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-15638

MEDIUM
5.40 CVSS 3.1

Cross-site scripting (XSS) issue in mail module in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via crafted channel names.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-15634

MEDIUM
6.10 CVSS 3.1

Cross-site scripting (XSS) issue in attachment management in Odoo Community 14.0 and earlier and Odoo Enterprise 14.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via a crafted link.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-15633

MEDIUM
6.10 CVSS 3.1

Cross-site scripting (XSS) issue in "document" module in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via crafted attachment filenames.

Cross-Site Scripting (XSS)
WAF: High

CVE-2018-15632

CRITICAL
9.10 CVSS 3.1

Improper input validation in database creation logic in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier, allows remote attackers to initialize an empty database on which they can connect with default credentials.

Improper Input Validation
WAF: Medium

CVE-2020-35626

HIGH
8.80 CVSS 3.1

An issue was discovered in the PushToWatch extension for MediaWiki through 1.35.1. The primary form did not implement an anti-CSRF token and therefore was completely vulnerable to CSRF attacks against onSkinAddFooterLinks in PushToWatch.php.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-35625

HIGH
8.80 CVSS 3.1

An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \MediaWiki\Shell\Shell::command within a comment.

Missing Authorization
WAF: Low

CVE-2020-35623

HIGH
7.50 CVSS 3.1

An issue was discovered in the CasAuth extension for MediaWiki through 1.35.1. Due to improper username validation, it allowed user impersonation with trivial manipulations of certain characters within a given username. An ordinary user may be able to login as a "bureaucrat user" who has a similar username, as demonstrated by usernames that differ only in (1) bidirectional override symbols or (2) blank space.

Improper Input Validation
WAF: Medium

CVE-2020-35622

MEDIUM
6.10 CVSS 3.1

An issue was discovered in the GlobalUsage extension for MediaWiki through 1.35.1. SpecialGlobalUsage.php calls WikiMap::makeForeignLink unsafely. The $page variable within the formatItem function was not being properly escaped, allowing for XSS under certain conditions.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-26284

HIGH
8.50 CVSS 3.1

Hugo is a fast and Flexible Static Site Generator built in Go. Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. In Hugo before version 0.79.1, if a malicious file with the same name (`exe` or `bat`) is found in the current working directory at the time of running `hugo`, the malicious command will be invoked instead of the system one. Windows users who run `hugo` inside untrusted Hugo sites are affected. Users should upgrade to Hugo v0.79.1. Other than avoiding untrusted Hugo sites, there is no workaround.

OS Command Injection
WAF: High

CVE-2020-35151

HIGH
8.80 CVSS 3.1

The Online Marriage Registration System 1.0 post parameter "searchdata" in the user/search.php request is vulnerable to Time Based Sql Injection.

SQL Injection
WAF: High

CVE-2020-11717

CRITICAL
9.80 CVSS 3.1

An issue was discovered in Programi 014 31.01.2020. It has multiple SQL injection vulnerabilities.

SQL Injection
WAF: High

CVE-2018-7580

HIGH
7.50 CVSS 3.1

Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The "hub" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub.

Uncontrolled Resource Consumption
WAF: Medium

CVE-2020-35606

HIGH
8.80 CVSS 3.1

Arbitrary command execution can occur in Webmin through 1.962. Any user authorized for the Package Updates module can execute arbitrary commands with root privileges via vectors involving %0A and %0C. NOTE: this issue exists because of an incomplete fix for CVE-2019-12840.

OS Command Injection
WAF: High

CVE-2020-35604

CRITICAL
9.80 CVSS 3.1

An XXE attack can occur in Kronos WebTA 5.0.4 when SAML is used.

XML External Entity (XXE)
WAF: High

CVE-2020-21378

CRITICAL
9.80 CVSS 3.1

SQL injection vulnerability in SeaCMS 10.1 (2020.02.08) via the id parameter in an edit action to admin_members_group.php.

SQL Injection
WAF: High

CVE-2020-21377

CRITICAL
9.80 CVSS 3.1

SQL injection vulnerability in yunyecms V2.0.1 via the selcart parameter.

SQL Injection
WAF: High

CVE-2020-4841

MEDIUM
5.90 CVSS 3.1

IBM Security Secret Server 10.6 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 190045.

Missing Authorization
WAF: Low

CVE-2020-4840

MEDIUM
6.10 CVSS 3.1

IBM Security Secret Server 10.6 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim. IBM X-Force ID: 190044.

Open Redirect
WAF: Medium

CVE-2020-4794

MEDIUM
5.40 CVSS 3.1

IBM Automation Workstream Services 19.0.3, 20.0.1, 20.0.2, IBM Business Automation Workflow 18.0, 19.0, and 20.0 and IBM Business Process Manager 8.6 could allow an authenticated user to obtain sensitive information or cuase a denial of service due to iimproper authorization checking. IBM X-Force ID: 189445.

Incorrect Authorization
WAF: Low

CVE-2020-4757

MEDIUM
6.40 CVSS 3.1

IBM FileNet Content Manager and IBM Content Navigator 3.0.CD is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 188600.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-27254

HIGH
7.50 CVSS 3.1

Emerson Rosemount X-STREAM Gas AnalyzerX-STREAM enhanced XEGP, XEGK, XEFD, XEXF – all revisions, The affected products are vulnerable to improper authentication for accessing log and backup data, which could allow an attacker with a specially crafted URL to obtain access to sensitive information.

Improper Authentication
WAF: Low

CVE-2020-26275

MEDIUM
6.10 CVSS 3.1

The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications like Jupyter notebook, JupyterLab, and Voila. In Jupyter Server before version 1.1.1, an open redirect vulnerability could cause the jupyter server to redirect the browser to a different malicious website. All jupyter servers running without a base_url prefix are technically affected, however, these maliciously crafted links can only be reasonably made for known jupyter server hosts. A link to your jupyter server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. This same vulnerability was patched in upstream notebook v5.7.8. This is fixed in jupyter_server 1.1.1. If upgrade is not available, a workaround can be to run your server on a url prefix: "jupyter server --ServerApp.base_url=/jupyter/".

Open Redirect
WAF: Medium

CVE-2020-3999

MEDIUM
6.50 CVSS 3.1

VMware ESXi (7.0 prior to ESXi70U1c-17325551), VMware Workstation (16.x prior to 16.0 and 15.x prior to 15.5.7), VMware Fusion (12.x prior to 12.0 and 11.x prior to 11.5.7) and VMware Cloud Foundation contain a denial of service vulnerability due to improper input validation in GuestInfo. A malicious actor with normal user privilege access to a virtual machine can crash the virtual machine's vmx process leading to a denial of service condition.

Improper Input Validation
WAF: Medium

CVE-2020-35276

CRITICAL
9.80 CVSS 3.1

EgavilanMedia ECM Address Book 1.0 is affected by SQL injection. An attacker can bypass the Admin Login panel through SQLi and get Admin access and add or remove any user.

SQL Injection
WAF: High

CVE-2020-35275

MEDIUM
5.40 CVSS 3.1

Coastercms v5.8.18 is affected by cross-site Scripting (XSS). A user can steal a cookie and make the user redirect to any malicious website because it is trigged on the main home page of the product/application.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35274

MEDIUM
4.80 CVSS 3.1

DotCMS Add Template with admin panel 20.11 is affected by cross-site Scripting (XSS) to gain remote privileges. An attacker could compromise the security of a website or web application through a stored XSS attack and stealing cookies using XSS.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35273

HIGH
8.00 CVSS 3.1

EgavilanMedia User Registration & Login System with Admin Panel 1.0 is affected by Cross Site Request Forgery (CSRF) to remotely gain privileges in the User Profile panel. An attacker can update any user's account.

Cross-Site Request Forgery (CSRF)
WAF: Low

CVE-2020-26049

MEDIUM
6.10 CVSS 3.1

Nifty-PM CPE 2.3 is affected by stored HTML injection. The impact is remote arbitrary code execution.

Cross-Site Scripting (XSS)
WAF: High

CVE-2020-35589

MEDIUM
5.40 CVSS 3.1

The limit-login-attempts-reloaded plugin before 2.17.4 for WordPress allows wp-admin/options-general.php?page=limit-login-attempts&tab= XSS. A malicious user can cause an administrator user to supply dangerous content to the vulnerable page, which is then reflected back to the user and executed by the web browser. The most common mechanism for delivering malicious content is to include it as a parameter in a URL that is posted publicly or e-mailed directly to victims.

Cross-Site Scripting (XSS)
WAF: High
Page 5 of 139 (6942 CVEs)