Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.8

    HIGH
    CVE-2020-8634

    Wing FTP Server v6.2.3 for Linux, macOS, and Solaris sets insecure permissions on files modified within the HTTP file management interface, resulting in files being saved with world-readable and world-writable permissions. If a sensitive system file were ... Read more

    Affected Products : wing_ftp_server
    • Published: Mar. 07, 2020
    • Modified: Nov. 21, 2024
  • 5.3

    MEDIUM
    CVE-2020-8633

    An issue was discovered in Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7. When grantors revoked a shared calendar in Outlook, the calendar stayed mounted and accessible.... Read more

    Affected Products : zimbra_collaboration_suite
    • Published: Feb. 18, 2020
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2020-8632

    In cloud-init through 19.4, rand_user_password in cloudinit/config/cc_set_passwords.py has a small default pwlen value, which makes it easier for attackers to guess passwords.... Read more

    Affected Products : debian_linux leap cloud-init
    • Published: Feb. 05, 2020
    • Modified: Nov. 21, 2024
  • 5.5

    MEDIUM
    CVE-2020-8631

    cloud-init through 19.4 relies on Mersenne Twister for a random password, which makes it easier for attackers to predict passwords, because rand_str in cloudinit/util.py calls the random.choice function.... Read more

    Affected Products : debian_linux leap cloud-init
    • Published: Feb. 05, 2020
    • Modified: Nov. 21, 2024
  • 8.1

    HIGH
    CVE-2020-8625

    BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by expl... Read more

    • Published: Feb. 17, 2021
    • Modified: Nov. 21, 2024
  • 4.3

    MEDIUM
    CVE-2020-8624

    In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change ... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2020-8623

    In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vu... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2020-8622

    In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2020-8621

    In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forw... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2020-8620

    In BIND 9.15.6 -> 9.16.5, 9.17.0 -> 9.17.3, An attacker who can establish a TCP connection with the server and send data on that connection can exploit this to trigger the assertion failure, causing the server to exit.... Read more

    • Published: Aug. 21, 2020
    • Modified: Nov. 21, 2024
  • 4.9

    MEDIUM
    CVE-2020-8619

    In ISC BIND9 versions BIND 9.11.14 -> 9.11.19, BIND 9.14.9 -> 9.14.12, BIND 9.16.0 -> 9.16.3, BIND Supported Preview Edition 9.11.14-S1 -> 9.11.19-S1: Unless a nameserver is providing authoritative service for one or more zones and at least one zone conta... Read more

    • Published: Jun. 17, 2020
    • Modified: Nov. 21, 2024
  • 4.9

    MEDIUM
    CVE-2020-8618

    An attacker who is permitted to send zone data to a server via zone transfer can exploit this to intentionally trigger the assertion failure with a specially constructed zone, denying service to clients.... Read more

    • Published: Jun. 17, 2020
    • Modified: Nov. 21, 2024
  • 7.5

    HIGH
    CVE-2020-8617

    Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the server. Since BIND, by default, configures a local session... Read more

    Affected Products : ubuntu_linux fedora debian_linux leap bind
    • Published: May. 19, 2020
    • Modified: Nov. 21, 2024
  • 8.6

    HIGH
    CVE-2020-8616

    A malicious actor who intentionally exploits this lack of effective limitation on the number of fetches performed when processing referrals can, through the use of specially crafted referrals, cause a recursing server to issue a very large number of fetch... Read more

    Affected Products : debian_linux bind
    • Published: May. 19, 2020
    • Modified: Nov. 21, 2024
  • 6.5

    MEDIUM
    CVE-2020-8615

    A CSRF vulnerability in the Tutor LMS plugin before 1.5.3 for WordPress can result in an attacker approving themselves as an instructor and performing other malicious actions (such as blocking legitimate instructors).... Read more

    Affected Products : tutor_lms
    • Published: Feb. 04, 2020
    • Modified: Nov. 21, 2024
  • 9.8

    CRITICAL
    CVE-2020-8614

    An issue was discovered on Askey AP4000W TDC_V1.01.003 devices. An attacker can perform Remote Code Execution (RCE) by sending a specially crafted network packer to the bd_svr service listening on TCP port 54188.... Read more

    Affected Products : ap4000w_firmware ap4000w
    • Published: Feb. 13, 2020
    • Modified: Nov. 21, 2024
  • 9.0

    CRITICAL
    CVE-2020-8612

    In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1, a REST API endpoint failed to adequately sanitize malicious input, which could allow an authenticated attacker to execute arbitrary code in a victim's browser, aka XSS.... Read more

    • Published: Feb. 14, 2020
    • Modified: Nov. 21, 2024
  • 8.8

    HIGH
    CVE-2020-8611

    In Progress MOVEit Transfer 2019.1 before 2019.1.4 and 2019.2 before 2019.2.1, multiple SQL Injection vulnerabilities have been found in the REST API that could allow an authenticated attacker to gain unauthorized access to MOVEit Transfer's database via ... Read more

    • Published: Feb. 14, 2020
    • Modified: Nov. 21, 2024
  • 6.8

    MEDIUM
    CVE-2020-8608

    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.... Read more

    Affected Products : debian_linux leap libslirp
    • Published: Feb. 06, 2020
    • Modified: Nov. 21, 2024
  • 7.2

    HIGH
    CVE-2020-8607

    An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel addr... Read more

    • Published: Aug. 05, 2020
    • Modified: Nov. 21, 2024
Showing 20 of 294853 Results