Vulnerabilities (CVE)

Total 79929 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-26936 1 Cloudera 1 Data Engineering 2024-11-21 6.8 MEDIUM 8.8 HIGH
Cloudera Data Engineering (CDE) before 1.1 was vulnerable to a CSRF attack.
CVE-2020-26933 1 Trustedcomputinggroup 1 Trusted Platform Module 2024-11-21 3.6 LOW 7.2 HIGH
Trusted Computing Group (TCG) Trusted Platform Module Library Family 2.0 Library Specification Revisions 1.38 through 1.59 has Incorrect Access Control during a non-orderly TPM shut-down that uses USE_DA_USED. Improper initialization of this shut-down may result in susceptibility to a dictionary attack.
CVE-2020-26929 1 Netgear 4 R6220, R6220 Firmware, R6230 and 1 more 2024-11-21 5.2 MEDIUM 7.3 HIGH
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects R6220 before 1.1.0.100 and R6230 before 1.1.0.100.
CVE-2020-26921 1 Netgear 8 Gs110emx, Gs110emx Firmware, Gs810emx and 5 more 2024-11-21 5.8 MEDIUM 8.3 HIGH
Certain NETGEAR devices are affected by authentication bypass. This affects GS110EMX before 1.0.1.7, GS810EMX before 1.7.1.3, XS512EM before 1.0.1.3, and XS724EM before 1.0.1.3.
CVE-2020-26920 1 Netgear 6 Srk60, Srk60 Firmware, Srr60 and 3 more 2024-11-21 5.8 MEDIUM 8.8 HIGH
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects SRK60 before 2.5.3.110, SRR60 before 2.5.3.110, and SRS60 before 2.5.3.110.
CVE-2020-26912 1 Netgear 28 D6200, D6200 Firmware, D7000 and 25 more 2024-11-21 6.8 MEDIUM 7.5 HIGH
Certain NETGEAR devices are affected by CSRF. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.
CVE-2020-26911 1 Netgear 28 D6200, D6200 Firmware, D7000 and 25 more 2024-11-21 5.8 MEDIUM 8.3 HIGH
Certain NETGEAR devices are affected by lack of access control at the function level. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.
CVE-2020-26910 1 Netgear 14 Cbr40, Cbr40 Firmware, Rbk752 and 11 more 2024-11-21 5.2 MEDIUM 8.4 HIGH
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects CBR40 before 2.5.0.10, RBK752 before 3.2.15.25, RBR750 before 3.2.15.25, RBS750 before 3.2.15.25, RBK852 before 3.2.15.25, RBR850 before 3.2.15.25, and RBS850 before 3.2.15.25.
CVE-2020-26909 1 Netgear 4 D7800, D7800 Firmware, R7500v2 and 1 more 2024-11-21 8.3 HIGH 8.8 HIGH
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects D7800 before 1.0.1.58 and R7500v2 before 1.0.3.48.
CVE-2020-26896 1 Lightning Network Daemon Project 1 Lightning Network Daemon 2024-11-21 5.8 MEDIUM 8.2 HIGH
Prior to 0.11.0-beta, LND (Lightning Network Daemon) had a vulnerability in its invoice database. While claiming on-chain a received HTLC output, it didn't verify that the corresponding outgoing off-chain HTLC was already settled before releasing the preimage. In the case of a hash-and-amount collision with an invoice, the preimage for an expected payment was instead released. A malicious peer could have deliberately intercepted an HTLC intended for the victim node, probed the preimage through a colluding relayed HTLC, and stolen the intercepted HTLC. The impact is a loss of funds in certain situations, and a weakening of the victim's receiver privacy.
CVE-2020-26894 2 Faulknermedia, Microsoft 2 Wildlife Issues In The New Millennium, Windows 2024-11-21 4.6 MEDIUM 7.8 HIGH
LiveCode v9.6.1 on Windows allows local, low-privileged users to gain privileges by creating a malicious "cmd.exe" in the folder of the vulnerable LiveCode application. If the application is using LiveCode's "shell()" function, it will attempt to search for "cmd.exe" in the folder of the current application and run the malicious "cmd.exe".
CVE-2020-26893 1 Clamxav 1 Clamxav 2024-11-21 4.6 MEDIUM 7.8 HIGH
An issue was discovered in ClamXAV 3 before 3.1.1. A malicious actor could use a properly signed copy of ClamXAV 2 (running with an injected malicious dylib) to communicate with ClamXAV 3's helper tool and perform privileged operations. This occurs because of inadequate client verification in the helper tool.
CVE-2020-26890 2 Fedoraproject, Matrix 2 Fedora, Synapse 2024-11-21 5.0 MEDIUM 7.5 HIGH
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the room's state, the impact is long-lasting and is not fixed by an upgrade to a newer version, requiring the event to be manually redacted instead. Since events are replicated to servers of other room members, the impact is not constrained to the server of the event sender.
CVE-2020-26887 1 Avm 2 Fritz\!box 7490, Fritz\!box 7490 Firmware 2024-11-21 4.6 MEDIUM 7.8 HIGH
FRITZ!OS before 7.21 on FRITZ!Box devices allows a bypass of a DNS Rebinding protection mechanism.
CVE-2020-26886 1 Softaculous 1 Softaculous 2024-11-21 6.9 MEDIUM 7.8 HIGH
Softaculous before 5.5.7 is affected by a code execution vulnerability because of External Initialization of Trusted Variables or Data Stores. This leads to privilege escalation on the local host.
CVE-2020-26883 1 Lightbend 1 Play Framework 2024-11-21 5.0 MEDIUM 7.5 HIGH
In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents.
CVE-2020-26882 1 Lightbend 1 Play Framework 2024-11-21 5.0 MEDIUM 7.5 HIGH
In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input.
CVE-2020-26880 1 Sympa 1 Sympa 2024-11-21 7.2 HIGH 7.8 HIGH
Sympa through 6.2.57b.2 allows a local privilege escalation from the sympa user account to full root access by modifying the sympa.conf configuration file (which is owned by sympa) and parsing it through the setuid sympa_newaliases-wrapper executable.
CVE-2020-26878 1 Commscope 2 Ruckus Iot Module, Ruckus Vriot 2024-11-21 9.0 HIGH 8.8 HIGH
Ruckus through 1.5.1.0.21 is affected by remote command injection. An authenticated user can submit a query to the API (/service/v1/createUser endpoint), injecting arbitrary commands that will be executed as root user via web.py.
CVE-2020-26876 1 Wpcoursesplugin 1 Wp-courses 2024-11-21 5.0 MEDIUM 7.5 HIGH
The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).