CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In November 2020

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
401 CVE-2020-25700 89 Sql 2020-11-19 2020-12-03
4.0
None Remote Low ??? None Partial None
In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.
402 CVE-2020-25699 863 2020-11-19 2021-10-19
5.0
None Remote Low Not required None Partial None
In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
403 CVE-2020-25698 2020-11-19 2020-12-02
5.0
None Remote Low Not required None Partial None
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
404 CVE-2020-25696 183 Exec Code 2020-11-23 2020-12-15
7.6
None Remote High Not required Complete Complete Complete
A flaw was found in the psql interactive terminal of PostgreSQL in versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If an interactive psql session uses \gset when querying a compromised server, the attacker can execute arbitrary code as the operating system account running psql. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
405 CVE-2020-25695 89 Sql 2020-11-16 2020-12-07
6.5
None Remote Low ??? Partial Partial Partial
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
406 CVE-2020-25694 327 2020-11-16 2020-12-07
6.8
None Remote Medium Not required Partial Partial Partial
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
407 CVE-2020-25689 401 DoS 2020-11-02 2021-10-19
6.8
None Remote Low ??? None None Complete
A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial of service. The highest threat from this vulnerability is to system availability.
408 CVE-2020-25688 798 +Info 2020-11-23 2020-12-08
2.7
None Local Network Low ??? Partial None None
A flaw was found in rhacm versions before 2.0.5 and before 2.1.0. Two internal service APIs were incorrectly provisioned using a test certificate from the source repository. This would result in all installations using the same certificates. If an attacker could observe network traffic internal to a cluster, they could use the private key to decode API requests that should be protected by TLS sessions, potentially obtaining information they would not otherwise be able to. These certificates are not used for service authentication, so no opportunity for impersonation or active MITM attacks were made possible.
409 CVE-2020-25662 665 2020-11-05 2021-10-19
3.3
None Local Network Low Not required Partial None None
A Red Hat only CVE-2020-12352 regression issue was found in the way the Linux kernel's Bluetooth stack implementation handled the initialization of stack memory when handling certain AMP packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.
410 CVE-2020-25661 843 DoS 2020-11-05 2020-11-19
8.3
None Local Network Low Not required Complete Complete Complete
A Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel's Bluetooth implementation handled L2CAP packets with A2MP CID. This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
411 CVE-2020-25660 294 2020-11-23 2021-05-28
5.8
None Local Network Low Not required Partial Partial Partial
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packet sniffer and perform actions allowed by the Ceph service. This issue is a reintroduction of CVE-2018-1128, affecting the msgr2 protocol. The msgr 2 protocol is used for all communication except older clients that do not support the msgr2 protocol. The msgr1 protocol is not affected. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.
412 CVE-2020-25658 385 2020-11-12 2022-01-01
4.3
None Remote Medium Not required Partial None None
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
413 CVE-2020-25655 863 2020-11-09 2020-11-18
4.0
None Remote Low ??? Partial None None
An issue was discovered in ManagedClusterView API, that could allow secrets to be disclosed to users without the correct permissions. Views created for an admin user would be made available for a short time to users with only view permission. In this short time window the user with view permission could read cluster secrets that should only be disclosed to admin users.
414 CVE-2020-25654 284 Bypass 2020-11-24 2021-03-04
9.0
None Remote Low ??? Complete Complete Complete
An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
415 CVE-2020-25653 362 DoS +Info 2020-11-26 2021-10-19
5.4
None Local Medium Not required Partial None Complete
A race condition vulnerability was found in the way the spice-vdagentd daemon handled new client connections. This flaw may allow an unprivileged local guest user to become the active agent for spice-vdagentd, possibly resulting in a denial of service or information leakage from the host. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
416 CVE-2020-25652 770 DoS 2020-11-26 2021-02-19
4.9
None Local Low Not required None None Complete
A flaw was found in the spice-vdagentd daemon, where it did not properly handle client connections that can be established via the UNIX domain socket in `/run/spice-vdagentd/spice-vdagent-sock`. Any unprivileged local guest user could use this flaw to prevent legitimate agents from connecting to the spice-vdagentd daemon, resulting in a denial of service. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and prior.
417 CVE-2020-25651 200 DoS +Info 2020-11-26 2021-10-19
3.3
None Local Medium Not required Partial None Partial
A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vulnerability is to data confidentiality as well as system availability. This flaw affects spice-vdagent versions 0.20 and prior.
418 CVE-2020-25650 770 DoS 2020-11-25 2021-02-19
2.1
None Local Low Not required None None Partial
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service for spice-vdagentd or even other processes in the VM system. The highest threat from this vulnerability is to system availability. This flaw affects spice-vdagent versions 0.20 and previous versions.
419 CVE-2020-25640 532 2020-11-24 2020-12-23
3.5
None Remote Medium ??? Partial None None
A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.
420 CVE-2020-25624 125 2020-11-30 2020-12-10
4.4
None Local Medium Not required Partial Partial Partial
hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
421 CVE-2020-25592 20 Bypass 2020-11-06 2021-07-21
7.5
None Remote Low Not required Partial Partial Partial
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
422 CVE-2020-25557 77 2020-11-13 2021-07-21
6.5
None Remote Low ??? Partial Partial Partial
In CMSuno 1.6.2, an attacker can inject malicious PHP code as a "username" while changing his/her username & password. After that, when attacker logs in to the application, attacker's code will be run. As a result of this vulnerability, authenticated user can run command on the server.
423 CVE-2020-25538 77 2020-11-13 2021-07-21
6.5
None Remote Low ??? Partial Partial Partial
An authenticated attacker can inject malicious code into "lang" parameter in /uno/central.php file in CMSuno 1.6.2 and run this PHP code in the web page. In this way, attacker can takeover the control of the server.
424 CVE-2020-25537 434 2020-11-30 2020-12-04
10.0
None Remote Low Not required Complete Complete Complete
File upload vulnerability exists in UCMS 1.5.0, and the attacker can take advantage of this vulnerability to obtain server management permission.
425 CVE-2020-25475 89 Sql 2020-11-24 2020-11-27
7.5
None Remote Low Not required Partial Partial Partial
SimplePHPscripts News Script PHP Pro 2.3 is affected by a SQL Injection via the id parameter in an editNews action.
426 CVE-2020-25474 79 XSS 2020-11-24 2020-11-27
4.3
None Remote Medium Not required None Partial None
SimplePHPscripts News Script PHP Pro 2.3 is affected by a Cross Site Scripting (XSS) vulnerability via the editor_name parameter.
427 CVE-2020-25473 2020-11-24 2020-11-30
6.4
None Remote Low Not required Partial Partial None
SimplePHPscripts News Script PHP Pro 2.3 does not properly set the HttpOnly Flag from Session Cookies.
428 CVE-2020-25472 352 CSRF 2020-11-24 2020-11-27
4.3
None Remote Medium Not required None Partial None
SimplePHPscripts News Script PHP Pro 2.3 is affected by a Cross Site Request Forgery (CSRF) vulnerability, which allows attackers to add new users.
429 CVE-2020-25454 79 XSS 2020-11-18 2020-11-27
3.5
None Remote Medium ??? None Partial None
Cross-site Scripting (XSS) vulnerability in grocy 2.7.1 via the add recipe module, which gets executed when deleting the recipe.
430 CVE-2020-25406 434 2020-11-18 2020-12-03
7.5
None Remote Low Not required Partial Partial Partial
app\admin\controller\sys\Uploads.php in lemocms 1.8.x allows users to upload files to upload executable files.
431 CVE-2020-25400 200 +Info 2020-11-17 2021-07-21
5.0
None Remote Low Not required Partial None None
Cross domain policies in Taskcafe Project Management tool before version 0.1.0 and 0.1.1 allows remote attackers to access sensitive data such as access token.
432 CVE-2020-25399 522 XSS 2020-11-05 2021-07-21
6.8
None Remote Medium Not required Partial Partial Partial
Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack another user's session by sending a malicious file in the chat.
433 CVE-2020-25398 1236 2020-11-05 2020-11-12
6.8
None Remote Medium Not required Partial Partial Partial
CSV Injection exists in InterMind iMind Server through 3.13.65 via the csv export functionality.
434 CVE-2020-25268 74 Exec Code 2020-11-10 2021-07-21
6.5
None Remote Low ??? Partial Partial Partial
Remote Code Execution can occur via the external news feed in ILIAS 6.4 because of incorrect parameter sanitization for Magpie RSS data.
435 CVE-2020-25267 79 XSS 2020-11-10 2020-11-18
3.5
None Remote Medium ??? None Partial None
An XSS issue exists in the question-pool file-upload preview feature in ILIAS 6.4.
436 CVE-2020-25210 200 +Info 2020-11-16 2021-07-21
5.0
None Remote Low Not required Partial None None
In JetBrains YouTrack before 2020.3.7955, an attacker could access workflow rules without appropriate access grants.
437 CVE-2020-25209 200 +Info 2020-11-16 2021-07-21
5.0
None Remote Low Not required Partial None None
In JetBrains YouTrack before 2020.3.6638, improper access control for some subresources leads to information disclosure via the REST API.
438 CVE-2020-25207 Exec Code 2020-11-16 2020-11-21
10.0
None Remote Low Not required Complete Complete Complete
JetBrains ToolBox before version 1.18 is vulnerable to Remote Code Execution via a browser protocol handler.
439 CVE-2020-25201 834 DoS 2020-11-04 2021-07-21
5.0
None Remote Low Not required None None Partial
HashiCorp Consul Enterprise version 1.7.0 up to 1.8.4 includes a namespace replication bug which can be triggered to cause denial of service via infinite Raft writes. Fixed in 1.7.9 and 1.8.5.
440 CVE-2020-25189 121 Exec Code Overflow 2020-11-21 2020-12-03
7.5
None Remote Low Not required Partial Partial Partial
The affected product is vulnerable to three stack-based buffer overflows, which may allow an unauthenticated attacker to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09).
441 CVE-2020-25185 120 Exec Code Overflow 2020-11-21 2020-12-03
6.5
None Remote Low ??? Partial Partial Partial
The affected product is vulnerable to five post-authentication buffer overflows, which may allow a logged in user to remotely execute arbitrary code on the IP150 (firmware versions 5.02.09).
442 CVE-2020-25174 427 Exec Code 2020-11-06 2020-11-13
6.9
None Local Medium Not required Complete Complete Complete
A DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3.0 and earlier allows local attackers to execute code on the system as a high privileged user.
443 CVE-2020-25172 23 2020-11-06 2020-11-13
7.5
None Remote Low Not required Partial Partial Partial
A relative path traversal attack in the B. Braun OnlineSuite Version AP 3.0 and earlier allows unauthenticated attackers to upload or download arbitrary files.
444 CVE-2020-25170 1236 2020-11-06 2020-11-13
6.8
None Remote Medium Not required Partial Partial Partial
An Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export.
445 CVE-2020-25165 287 2020-11-13 2020-12-03
5.0
None Remote Low Not required None None Partial
BD Alaris PC Unit, Model 8015, Versions 9.33.1 and earlier and BD Alaris Systems Manager, Versions 4.33 and earlier The affected products are vulnerable to a network session authentication vulnerability within the authentication process between specified versions of the BD Alaris PC Unit and the BD Alaris Systems Manager. If exploited, an attacker could perform a denial-of-service attack on the BD Alaris PC Unit by modifying the configuration headers of data in transit. A denial-of-service attack could lead to a drop in the wireless capability of the BD Alaris PC Unit, resulting in manual operation of the PC Unit.
446 CVE-2020-25159 787 Exec Code Overflow 2020-11-24 2020-11-30
7.5
None Remote Low Not required Partial Partial Partial
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
447 CVE-2020-25155 319 2020-11-13 2020-11-30
5.0
None Remote Low Not required Partial None None
The affected product transmits unencrypted sensitive information, which may allow an attacker to access this information on the NIO 50 (all versions).
448 CVE-2020-25151 20 2020-11-13 2020-11-30
5.0
None Remote Low Not required None None Partial
The affected product does not properly validate input, which may allow an attacker to execute a denial-of-service attack on the NIO 50 (all versions).
449 CVE-2020-25074 22 Exec Code Dir. Trav. 2020-11-10 2020-11-24
7.5
None Remote Low Not required Partial Partial Partial
The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution.
450 CVE-2020-25014 787 Exec Code Overflow 2020-11-27 2020-12-10
7.5
None Remote Low Not required Partial Partial Partial
A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet.
Total number of vulnerabilities : 1271   Page : 1 2 3 4 5 6 7 8 9 (This Page)10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.