Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 4.3

    MEDIUM
    CVE-2020-8624

    In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change ... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2020-8623

    In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vu... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2020-8622

    In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2020-8621

    In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forw... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2020-8620

    In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 4.9

    MEDIUM
    CVE-2020-8619

    In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone conta... Read more

    • Published: Jun. 17, 2020
    • Modified: Nov. 21, 2024
  • 4.9

    MEDIUM
    CVE-2020-8618

    An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.... Read more

    • Published: Jun. 17, 2020
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2020-8617

    Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session... Read more

    Affected Products : ubuntu_linux fedora debian_linux leap bind
    • Published: May. 19, 2020
    • Modified: Nov. 21, 2024
  • 8.6

    HIGH
    CVE-2020-8616

    A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetch... Read more

    Affected Products : debian_linux bind
    • Published: May. 19, 2020
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2020-8615

    A CSRF vulnerability in the Tutor LMS plugin before 1.5.3 for WordPress can result in an attacker approving themselves as an instructor and performing other malicious actions (such as blocking legitimate instructors).... Read more

    Affected Products : tutor_lms
    • Published: Feb. 04, 2020
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2020-8614

    An issue was discovered on Askey AP4000W TDC_V1.01.003 devices. An attacker can perform Remote Code Execution (RCE) by sending a specially crafted network packer to the bd_svr service listening on TCP port 54188.... Read more

    Affected Products : ap4000w_firmware ap4000w
    • Published: Feb. 13, 2020
    • Modified: Nov. 21, 2024
  • 9.0

    CRITICAL
    CVE-2020-8612

    In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1, a REST API endpoint failed to adequately sanitize malicious input, which could allow an authenticated attacker to execute arbitrary code in a victim's browser, aka XSS.... Read more

    • Published: Feb. 14, 2020
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2020-8611

    In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1, multiple SQL Injection vulnerabilities have been found in the REST API that could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database via ... Read more

    • Published: Feb. 14, 2020
    • Modified: Nov. 21, 2024
  • 6.8

    MEDIUM
    CVE-2020-8608

    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.... Read more

    Affected Products : debian_linux leap libslirp
    • Published: Feb. 06, 2020
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2020-8607

    An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel addr... Read more

    • Published: Aug. 05, 2020
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2020-8606

    A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.... Read more

    • Published: May. 27, 2020
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2020-8605

    A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.... Read more

    • Published: May. 27, 2020
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2020-8604

    A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations.... Read more

    • Published: May. 27, 2020
    • Modified: Nov. 21, 2024
  • 6.1

    MEDIUM
    CVE-2020-8603

    A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in th... Read more

    • Published: May. 27, 2020
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2020-8602

    A vulnerability in the management consoles of Trend Micro Deep Security 10.0-12.0 and Trend Micro Vulnerability Protection 2.0 SP2 may allow an authenticated attacker with full control privileges to bypass file integrity checks, leading to remote code exe... Read more

    • Published: Aug. 27, 2020
    • Modified: Nov. 21, 2024
Showing 20 of 294848 Results