Vulnerabilities (CVE)

Total 81955 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-5802 1 Rockwellautomation 1 Factorytalk Linx 2024-11-21 5.0 MEDIUM 7.5 HIGH
An attacker-controlled memory allocation size can be passed to the C++ new operator in RnaDaSvr.dll by sending a specially crafted ConfigureItems message to TCP port 4241. This will cause an unhandled exception, resulting in termination of RSLinxNG.exe. Observed in FactoryTalk 6.11. All versions of FactoryTalk Linx are affected.
CVE-2020-5801 1 Rockwellautomation 1 Factorytalk Linx 2024-11-21 5.0 MEDIUM 7.5 HIGH
An attacker can craft and send an OpenNamespace message to port 4241 with valid session-id that triggers an unhandled exception in CFTLDManager::HandleRequest function in RnaDaSvr.dll, resulting in process termination. Observed in FactoryTalk Linx 6.11. All versions of FactoryTalk Linx are affected.
CVE-2020-5798 1 Druva 1 Insync 2024-11-21 7.2 HIGH 7.8 HIGH
inSync Client installer for macOS versions v6.8.0 and prior could allow an attacker to gain privileges of a root user from a lower privileged user due to improper integrity checks and directory permissions.
CVE-2020-5796 1 Nagios 1 Nagios Xi 2024-11-21 7.2 HIGH 7.8 HIGH
Improper preservation of permissions in Nagios XI 5.7.4 allows a local, low-privileged, authenticated user to weaken the permissions of files, resulting in low-privileged users being able to write to and execute arbitrary PHP code with root privileges.
CVE-2020-5794 2 Microsoft, Tenable 2 Windows, Nessus Network Monitor 2024-11-21 4.6 MEDIUM 7.8 HIGH
A vulnerability in Nessus Network Monitor versions 5.11.0, 5.11.1, and 5.12.0 for Windows could allow an authenticated local attacker to execute arbitrary code by copying user-supplied files to a specially constructed path in a specifically named user directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.
CVE-2020-5793 2 Microsoft, Tenable 3 Windows, Nessus, Nessus Agent 2024-11-21 7.2 HIGH 7.8 HIGH
A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.
CVE-2020-5792 1 Nagios 1 Nagios Xi 2024-11-21 6.5 MEDIUM 7.2 HIGH
Improper neutralization of argument delimiters in a command in Nagios XI 5.7.3 allows a remote, authenticated admin user to write to arbitrary files and ultimately execute code with the privileges of the apache user.
CVE-2020-5791 1 Nagios 1 Nagios Xi 2024-11-21 9.0 HIGH 7.2 HIGH
Improper neutralization of special elements used in an OS command in Nagios XI 5.7.3 allows a remote, authenticated admin user to execute operating system commands with the privileges of the apache user.
CVE-2020-5786 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 6.8 MEDIUM 8.8 HIGH
Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.3 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.
CVE-2020-5779 1 Tradingtechnologies 1 Trading Technologies Messaging 2024-11-21 5.0 MEDIUM 7.5 HIGH
A flaw in Trading Technologies Messaging 7.1.28.3 (ttmd.exe) relates to invalid parameter handling when calling strcpy_s() with an invalid parameter (i.e., a long src string parameter) as a part of processing a type 4 message sent to default TCP RequestPort 10200. It's been observed that ttmd.exe terminates as a result.
CVE-2020-5778 1 Tradingtechnologies 1 Trading Technologies Messaging 2024-11-21 5.0 MEDIUM 7.5 HIGH
A flaw exists in Trading Technologies Messaging 7.1.28.3 (ttmd.exe) due to improper validation of user-supplied data when processing a type 8 message sent to default TCP RequestPort 10200. An unauthenticated, remote attacker can exploit this issue, via a specially crafted message, to terminate ttmd.exe.
CVE-2020-5776 1 Magmi Project 1 Magmi 2024-11-21 6.8 MEDIUM 8.8 HIGH
Currently, all versions of MAGMI are vulnerable to CSRF due to the lack of CSRF tokens. RCE (via phpcli command) is possible in the event that a CSRF is leveraged against an existing admin session for MAGMI.
CVE-2020-5774 1 Tenable 1 Nessus 2024-11-21 3.6 LOW 7.1 HIGH
Nessus versions 8.11.0 and earlier were found to maintain sessions longer than the permitted period in certain scenarios. The lack of proper session expiration could allow attackers with local access to login into an existing browser session.
CVE-2020-5773 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
Improper Access Control in Teltonika firmware TRB2_R_00.02.04.01 allows a low privileged user to perform unauthorized write operations.
CVE-2020-5772 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 7.1 HIGH 7.5 HIGH
Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious package file.
CVE-2020-5771 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 7.1 HIGH 7.5 HIGH
Improper Input Validation in Teltonika firmware TRB2_R_00.02.04.01 allows a remote, authenticated attacker to gain root privileges by uploading a malicious backup archive.
CVE-2020-5770 1 Teltonika-networks 2 Trb245, Trb245 Firmware 2024-11-21 6.8 MEDIUM 8.8 HIGH
Cross-site request forgery in Teltonika firmware TRB2_R_00.02.04.01 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link.
CVE-2020-5766 1 Srs Simple Hits Counter Project 1 Srs Simple Hits Counter 2024-11-21 5.0 MEDIUM 7.5 HIGH
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SRS Simple Hits Counter Plugin for WordPress 1.0.3 and 1.0.4 allows a remote, unauthenticated attacker to determine the value of database fields.
CVE-2020-5764 1 Mxplayer 1 Mx Player 2024-11-21 5.8 MEDIUM 8.8 HIGH
MX Player Android App versions prior to v1.24.5, are vulnerable to a directory traversal vulnerability when user is using the MX Transfer feature in "Receive" mode. An attacker can exploit this by connecting to the MX Transfer session as a "sender" and sending a MessageType of "FILE_LIST" with a "name" field containing directory traversal characters (../). This will result in the file being transferred to the victim's phone, but being saved outside of the intended "/sdcard/MXshare" directory. In some instances, an attacker can achieve remote code execution by writing ".odex" and ".vdex" files in the "oat" directory of the MX Player application.
CVE-2020-5763 1 Grandstream 12 Ht801, Ht801 Firmware, Ht802 and 9 more 2024-11-21 9.0 HIGH 8.8 HIGH
Grandstream HT800 series firmware version 1.0.17.5 and below contain a backdoor in the SSH service. An authenticated remote attacker can obtain a root shell by correctly answering a challenge prompt.