Vulnerabilities (CVE)

Total 317880 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-11822 1 Rukovoditel 1 Rukovoditel 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
In Rukovoditel 2.5.2, there is a stored XSS vulnerability on the application structure --> user access groups page. Thus, an attacker can inject malicious script to steal all users' valuable data.
CVE-2020-11821 1 Rukovoditel 1 Rukovoditel 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
In Rukovoditel 2.5.2, users' passwords and usernames are stored in a cookie with URL encoding, base64 encoding, and hashing. Thus, an attacker can easily apply brute force on them.
CVE-2020-11820 1 Rukovoditel 1 Rukovoditel 2024-11-21 7.5 HIGH 9.8 CRITICAL
Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the entities_id parameter.
CVE-2020-11819 1 Rukovoditel 1 Rukovoditel 2024-11-21 7.5 HIGH 9.8 CRITICAL
In Rukovoditel 2.5.2, an attacker may inject an arbitrary .php file location instead of a language file and thus achieve command execution.
CVE-2020-11818 1 Rukovoditel 1 Rukovoditel 2024-11-21 6.8 MEDIUM 8.8 HIGH
In Rukovoditel 2.5.2 has a form_session_token value to prevent CSRF attacks. This protection mechanism can be bypassed with another user's valid token. Thus, an attacker can change the Admin password by using a CSRF attack and escalate his/her privileges.
CVE-2020-11817 1 Rukovoditel 1 Rukovoditel 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
In Rukovoditel V2.5.2, attackers can upload an arbitrary file to the server just changing the the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs with the Maintenance Mode setting.
CVE-2020-11816 1 Rukovoditel 1 Rukovoditel 2024-11-21 7.5 HIGH 9.8 CRITICAL
Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the reports_id (POST) parameter.
CVE-2020-11815 1 Rukovoditel 1 Rukovoditel 2024-11-21 6.8 MEDIUM 9.8 CRITICAL
In Rukovoditel 2.5.2, attackers can upload arbitrary file to the server by just changing the content-type value. As a result of that, an attacker can execute a command on the server. This specific attack only occurs without the Maintenance Mode setting.
CVE-2020-11814 1 Qdpm 1 Qdpm 2024-11-21 5.8 MEDIUM 5.4 MEDIUM
A Host Header Injection vulnerability in qdPM 9.1 may allow an attacker to spoof a particular header and redirect users to malicious websites.
CVE-2020-11813 1 Rukovoditel 1 Rukovoditel 2024-11-21 3.5 LOW 5.4 MEDIUM
In Rukovoditel 2.5.2, there is a stored XSS vulnerability on the configuration page via the copyright text input. Thus, an attacker can inject a malicious script to steal all users' valuable data. This copyright text is on every page so this attack vector can be very dangerous.
CVE-2020-11812 1 Rukovoditel 1 Rukovoditel 2024-11-21 7.5 HIGH 9.8 CRITICAL
Rukovoditel 2.5.2 is affected by a SQL injection vulnerability because of improper handling of the filters[0][value] or filters[1][value] parameter.
CVE-2020-11811 1 Qdpm 1 Qdpm 2024-11-21 10.0 HIGH 9.8 CRITICAL
In qdPM 9.1, an attacker can upload a malicious .php file to the server by exploiting the Add Profile Photo capability with a crafted content-type value. After that, the attacker can execute an arbitrary command on the server using this malicious file.
CVE-2020-11810 3 Debian, Fedoraproject, Openvpn 3 Debian Linux, Fedora, Openvpn 2024-11-21 4.3 MEDIUM 3.7 LOW
An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.
CVE-2020-11807 1 Sourcefabric 1 Newscoop 2024-11-21 4.6 MEDIUM 7.8 HIGH
Because of Unrestricted Upload of a File with a Dangerous Type, Sourcefabric Newscoop 4.4.7 allows an authenticated user to execute arbitrary PHP code (and sometimes terminal commands) on a server by making an avatar update and then visiting the avatar file under the /images/ path.
CVE-2020-11806 1 Mailstore 1 Mailstore Server 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
In MailStore Outlook Add-in (and Email Archive Outlook Add-in) through 12.1.2, the login process does not validate the validity of the certificate presented by the server.
CVE-2020-11805 1 Pexip 2 Pexip Infinity, Reverse Proxy And Turn Server 2024-11-21 9.3 HIGH 9.8 CRITICAL
Pexip Reverse Proxy and TURN Server before 6.1.0 has Incorrect UDP Access Control via TURN.
CVE-2020-11804 1 Titanhq 1 Spamtitan 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Titan SpamTitan 7.07. Due to improper sanitization of the parameter quid, used in the page mailqueue.php, code injection can occur. The input for this parameter is provided directly by an authenticated user via an HTTP GET request.
CVE-2020-11803 1 Titanhq 1 Spamtitan 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Titan SpamTitan 7.07. Improper sanitization of the parameter jaction when interacting with the page mailqueue.php could lead to PHP code evaluation server-side, because the user-provided input is passed directly to the php eval() function. The user has to be authenticated on the web platform before interacting with the page.
CVE-2020-11800 3 Debian, Opensuse, Zabbix 4 Debian Linux, Backports Sle, Leap and 1 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
CVE-2020-11799 1 Z-cron 1 Z-cron 2024-11-21 7.5 HIGH 9.8 CRITICAL
Z-Cron 5.6 Build 04 allows an unprivileged attacker to elevate privileges by modifying a privileged user's task. This can also affect all users who are signed in on the system if a shell is placed in a location that other unprivileged users have access to.