CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In June 2020

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
151 CVE-2020-14422 400 DoS 2020-06-18 2021-07-21
4.3
None Remote Medium Not required None None Partial
Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
152 CVE-2020-14421 88 Exec Code 2020-06-18 2020-10-16
9.0
None Remote Low ??? Complete Complete Complete
aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary commands via the Script Content box on the Add Cron Job screen.
153 CVE-2020-14416 416 2020-06-18 2021-07-21
4.7
None Local Medium Not required None None Complete
In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.
154 CVE-2020-14414 78 Exec Code CSRF 2020-06-29 2020-07-06
9.0
None Remote Low ??? Complete Complete Complete
NeDi 1.9C is vulnerable to Remote Command Execution. pwsec.php improperly escapes shell metacharacters from a POST request. An attacker can exploit this by crafting an arbitrary payload (any system commands) that contains shell metacharacters via a POST request with a pw parameter. (This can also be exploited via CSRF.)
155 CVE-2020-14413 79 XSS Bypass 2020-06-29 2020-07-06
4.3
None Remote Medium Not required None Partial None
NeDi 1.9C is vulnerable to XSS because of an incorrect implementation of sanitize() in inc/libmisc.php. This function attempts to escape the SCRIPT tag from user-controllable values, but can be easily bypassed, as demonstrated by an onerror attribute of an IMG element as a Devices-Config.php?sta= value.
156 CVE-2020-14412 78 Exec Code CSRF 2020-06-29 2020-07-06
9.0
None Remote Low ??? Complete Complete Complete
NeDi 1.9C is vulnerable to Remote Command Execution. System-Snapshot.php improperly escapes shell metacharacters from a POST request. An attacker can exploit this by crafting an arbitrary payload (any system commands) that contains shell metacharacters via a POST request with a psw parameter. (This can also be exploited via CSRF.)
157 CVE-2020-14408 79 XSS 2020-06-17 2020-06-23
4.3
None Remote Medium Not required None Partial None
An issue was discovered in Agentejo Cockpit 0.10.2. Insufficient sanitization of the to parameter in the /auth/login route allows for injection of arbitrary JavaScript code into a web page's content, creating a Reflected XSS attack vector.
158 CVE-2020-14405 770 2020-06-17 2021-12-14
4.0
None Remote Low ??? None None Partial
An issue was discovered in LibVNCServer before 0.9.13. libvncclient/rfbproto.c does not limit TextChat size.
159 CVE-2020-14404 125 2020-06-17 2021-12-14
5.5
None Remote Low ??? Partial None Partial
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rre.c allows out-of-bounds access via encodings.
160 CVE-2020-14403 125 2020-06-17 2021-12-14
5.5
None Remote Low ??? Partial None Partial
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/hextile.c allows out-of-bounds access via encodings.
161 CVE-2020-14402 125 2020-06-17 2021-12-14
5.5
None Remote Low ??? Partial None Partial
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/corre.c allows out-of-bounds access via encodings.
162 CVE-2020-14401 190 Overflow 2020-06-17 2021-12-14
6.4
None Remote Low Not required None Partial Partial
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.
163 CVE-2020-14400 2020-06-17 2020-08-29
5.0
None Remote Low Not required None None Partial
** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary.
164 CVE-2020-14399 2020-06-17 2020-08-29
5.0
None Remote Low Not required None None Partial
** DISPUTED ** An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly "no trust boundary crossed."
165 CVE-2020-14398 835 2020-06-17 2021-12-14
5.0
None Remote Low Not required None None Partial
An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c.
166 CVE-2020-14397 476 2020-06-17 2021-12-14
5.0
None Remote Low Not required None None Partial
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.
167 CVE-2020-14396 476 2020-06-17 2021-12-14
5.0
None Remote Low Not required None None Partial
An issue was discovered in LibVNCServer before 0.9.13. libvncclient/tls_openssl.c has a NULL pointer dereference.
168 CVE-2020-14295 89 Exec Code Sql 2020-06-17 2021-06-02
6.5
None Remote Low ??? Partial Partial Partial
A SQL injection issue in color.php in Cacti 1.2.12 allows an admin to inject SQL via the filter parameter. This can lead to remote command execution because the product accepts stacked queries.
169 CVE-2020-14214 862 2020-06-16 2021-07-21
5.8
None Remote Medium Not required Partial Partial None
Zammad before 3.3.1, when Domain Based Assignment is enabled, relies on a claimed e-mail address for authorization decisions. An attacker can register a new account that will have access to all tickets of an arbitrary Organization.
170 CVE-2020-14213 862 2020-06-16 2020-06-23
5.5
None Remote Low ??? Partial Partial None
In Zammad before 3.3.1, a Customer has ticket access that should only be available to an Agent (e.g., read internal data, split, or merge).
171 CVE-2020-14212 787 Overflow 2020-06-16 2020-09-18
6.8
None Remote Medium Not required Partial Partial Partial
FFmpeg through 4.3 has a heap-based buffer overflow in avio_get_str in libavformat/aviobuf.c because dnn_backend_native.c calls ff_dnn_load_model_native and a certain index check is omitted.
172 CVE-2020-14210 79 XSS 2020-06-16 2021-02-18
4.3
None Remote Medium Not required None Partial None
Reflected Cross-Site Scripting (XSS) vulnerability in MONITORAPP WAF in which script can be executed when responding to Request URL information. It provides a function to response to Request URL information when blocking.
173 CVE-2020-14204 611 2020-06-22 2020-06-26
5.8
None Remote Medium Not required Partial Partial None
In WebFOCUS Business Intelligence 8.0 (SP6), the administration portal allows remote attackers to read arbitrary local files or forge server-side HTTP requests via a crafted HTTP request to /ibi_apps/WFServlet.cfg because XML external entity injection is possible. This is related to making changes to the application repository configuration.
174 CVE-2020-14203 352 CSRF 2020-06-22 2020-06-26
6.8
None Remote Medium Not required Partial Partial Partial
WebFOCUS Business Intelligence 8.0 (SP6) allows a Cross-Site Request Forgery (CSRF) attack against administrative users within the /ibi_apps/WFServlet(.ibfs) endpoint. The impact may be creation of an administrative user. It can also be exploited in conjunction with CVE-2016-9044.
175 CVE-2020-14202 79 XSS 2020-06-22 2020-06-26
4.3
None Remote Medium Not required None Partial None
WebFOCUS Business Intelligence 8.0 (SP6) was prone to XSS via arbitrary URL parameters.
176 CVE-2020-14199 347 2020-06-16 2020-06-23
4.3
None Remote Medium Not required None Partial None
BIP-143 in the Bitcoin protocol specification mishandles the signing of a Segwit transaction, which allows attackers to trick a user into making two signatures in certain cases, potentially leading to a huge transaction fee. NOTE: this affects all hardware wallets. It was fixed in 1.9.1 for the Trezor One and 2.3.1 for the Trezor Model T.
177 CVE-2020-14195 502 2020-06-16 2021-11-17
6.8
None Remote Medium Not required Partial Partial Partial
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
178 CVE-2020-14163 119 Overflow 2020-06-15 2021-07-21
5.0
None Remote Low Not required Partial None None
An issue was discovered in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memory in ecma_gc_set_object_visited in ecma/base/ecma-gc.c.
179 CVE-2020-14159 89 Exec Code Sql 2020-06-15 2020-06-24
6.5
None Remote Low ??? Partial Partial Partial
By using an Automate API in ConnectWise Automate before 2020.5.178, a remote authenticated user could execute commands and/or modifications within an individual Automate instance by triggering an SQL injection vulnerability in /LabTech/agent.aspx. This affects versions before 2019.12.337, 2020 before 2020.1.53, 2020.2 before 2020.2.85, 2020.3 before 2020.3.114, 2020.4 before 2020.4.143, and 2020.5 before 2020.5.178.
180 CVE-2020-14157 200 +Info 2020-06-17 2021-07-21
4.8
None Local Network Low Not required Partial Partial None
The wireless-communication feature of the ABUS Secvest FUBE50001 device does not encrypt sensitive data such as PIN codes or IDs of used proximity chip keys (RFID tokens). This makes it easier for an attacker to disarm the wireless alarm system.
181 CVE-2020-14156 276 2020-06-15 2020-06-22
6.5
None Remote Low ??? Partial Partial Partial
user_channel/passwd_mgr.cpp in OpenBMC phosphor-host-ipmid before 2020-04-03 does not ensure that /etc/ipmi-pass has strong file permissions.
182 CVE-2020-14155 190 Overflow 2020-06-15 2021-09-22
5.0
None Remote Low Not required None None Partial
libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
183 CVE-2020-14154 2020-06-15 2020-07-28
5.8
None Remote Medium Not required Partial Partial None
Mutt before 1.14.3 proceeds with a connection even if, in response to a GnuTLS certificate prompt, the user rejects an expired intermediate certificate.
184 CVE-2020-14153 125 2020-06-15 2020-08-11
5.8
None Remote Medium Not required Partial None Partial
In IJG JPEG (aka libjpeg) from version 8 through 9c, jdhuff.c has an out-of-bounds array read for certain table pointers.
185 CVE-2020-14152 400 2020-06-15 2020-07-31
5.8
None Remote Medium Not required Partial None Partial
In IJG JPEG (aka libjpeg) before 9d, jpeg_mem_available() in jmemnobs.c in djpeg does not honor the max_memory_to_use setting, possibly causing excessive memory consumption.
186 CVE-2020-14150 DoS 2020-06-15 2020-08-31
2.1
None Local Low Not required None None Partial
GNU Bison before 3.5.4 allows attackers to cause a denial of service (application crash). NOTE: there is a risk only if Bison is used with untrusted input, and an observed bug happens to cause unsafe behavior with a specific compiler/architecture. The bug reports were intended to show that a crash may occur in Bison itself, not that a crash may occur in code that is generated by Bison.
187 CVE-2020-14149 476 DoS 2020-06-15 2020-06-25
5.0
None Remote Low Not required None None Partial
In uftpd before 2.12, handle_CWD in ftpcmd.c mishandled the path provided by the user, causing a NULL pointer dereference and denial of service, as demonstrated by a CWD /.. command.
188 CVE-2020-14148 125 2020-06-15 2020-07-08
5.0
None Remote Low Not required None None Partial
The Server-Server protocol implementation in ngIRCd before 26~rc2 allows an out-of-bounds access, as demonstrated by the IRC_NJOIN() function.
189 CVE-2020-14147 787 DoS Overflow Mem. Corr. Bypass 2020-06-15 2021-07-30
4.0
None Remote Low ??? None None Partial
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
190 CVE-2020-14146 79 XSS 2020-06-15 2020-06-17
3.5
None Remote Medium ??? None Partial None
KumbiaPHP through 1.1.1, in Development mode, allows XSS via the public/pages/kumbia PATH_INFO.
191 CVE-2020-14145 200 +Info 2020-06-29 2021-07-21
4.3
None Remote Medium Not required Partial None None
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
192 CVE-2020-14095 74 Exec Code Overflow 2020-06-24 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
In Xiaomi router R3600, ROM version<1.0.20, a connect service suffers from an injection vulnerability through the web interface, leading to a stack overflow or remote code execution.
193 CVE-2020-14094 74 Exec Code Overflow 2020-06-24 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
In Xiaomi router R3600, ROM version<1.0.20, the connection service can be injected through the web interface, resulting in stack overflow or remote code execution.
194 CVE-2020-14093 200 +Info 2020-06-15 2021-07-21
4.3
None Remote Medium Not required Partial None None
Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
195 CVE-2020-14081 78 2020-06-15 2020-06-17
9.0
None Remote Low ??? Complete Complete Complete
TRENDnet TEW-827DRU devices through 2.06B04 contain multiple command injections in apply.cgi via the action send_log_email with the key auth_acname (or auth_passwd), allowing an authenticated user to run arbitrary commands on the device.
196 CVE-2020-14080 787 Exec Code Overflow 2020-06-15 2020-06-17
7.5
None Remote Low Not required Partial Partial Partial
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an unauthenticated user to execute arbitrary code by POSTing to apply_sec.cgi via the action ping_test with a sufficiently long ping_ipaddr key.
197 CVE-2020-14079 787 Exec Code Overflow 2020-06-15 2020-06-17
6.5
None Remote Low ??? Partial Partial Partial
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action auto_up_fw (or auto_up_lp) with a sufficiently long update_file_name key.
198 CVE-2020-14078 787 Exec Code Overflow 2020-06-15 2020-06-17
6.5
None Remote Low ??? Partial Partial Partial
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action wifi_captive_portal_login with a sufficiently long REMOTE_ADDR key.
199 CVE-2020-14077 787 Exec Code Overflow 2020-06-15 2020-06-17
6.5
None Remote Low ??? Partial Partial Partial
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action set_sta_enrollee_pin_wifi1 (or set_sta_enrollee_pin_wifi0) with a sufficiently long wps_sta_enrollee_pin key.
200 CVE-2020-14076 787 Exec Code Overflow 2020-06-15 2020-06-17
6.5
None Remote Low ??? Partial Partial Partial
TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action st_dev_connect, st_dev_disconnect, or st_dev_rconnect with a sufficiently long wan_type key.
Total number of vulnerabilities : 1786   Page : 1 2 3 4 (This Page)5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.