Total
7947 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-10984 | 1 Gambio | 1 Gambio Gx | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
Gambio GX before 4.0.1.0 allows admin/admin.php CSRF. | |||||
CVE-2020-10892 | 2 Foxitsoftware, Microsoft | 3 Phantompdf, Reader, Windows | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the communication API. The issue lies in the handling of the CombineFiles command, which allows an arbitrary file write with attacker controlled data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9830. | |||||
CVE-2020-10890 | 2 Foxitsoftware, Microsoft | 3 Phantompdf, Reader, Windows | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the communication API. The issue lies in the handling of the ConvertToPDF command, which allows an arbitrary file write with attacker controlled data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9829. | |||||
CVE-2020-10771 | 3 Infinispan, Netapp, Redhat | 3 Infinispan-server-rest, Oncommand Insight, Data Grid | 2024-11-21 | 5.8 MEDIUM | 7.1 HIGH |
A flaw was found in Infinispan version 10, where it is possible to perform various actions that could have side effects using GET requests. This flaw allows an attacker to perform a cross-site request forgery (CSRF) attack. | |||||
CVE-2020-10734 | 1 Redhat | 4 Jboss Fuse, Keycloak, Openshift Application Runtimes and 1 more | 2024-11-21 | 2.1 LOW | 3.3 LOW |
A vulnerability was found in keycloak in the way that the OIDC logout endpoint does not have CSRF protection. Versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes are believed to be vulnerable. | |||||
CVE-2020-10671 | 1 Canon | 2 Oce Colorwave 500, Oce Colorwave 500 Firmware | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
The Canon Oce Colorwave 500 4.0.0.0 printer's web application is missing any form of CSRF protections. This is a system-wide issue. An attacker could perform administrative actions by targeting a logged-in administrative user. NOTE: this is fixed in the latest version. | |||||
CVE-2020-10568 | 1 Onthegosystems | 1 Sitepress-multilingual-cms | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
The sitepress-multilingual-cms (WPML) plugin before 4.3.7-b.2 for WordPress has CSRF due to a loose comparison. This leads to remote code execution in includes/class-wp-installer.php via a series of requests that leverage unintended comparisons of integers to strings. | |||||
CVE-2020-10540 | 1 Untis | 1 Webuntis | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
Untis WebUntis before 2020.9.6 allows CSRF for certain combinations of rights and modules. | |||||
CVE-2020-10504 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
CSRF in admin/edit-comments.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a comment, given the id, via a crafted request. | |||||
CVE-2020-10503 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
CSRF in admin/manage-comments.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to disapprove any comment, given the id, via a crafted request. | |||||
CVE-2020-10502 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
CSRF in admin/manage-comments.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to approve any comment, given the id, via a crafted request. | |||||
CVE-2020-10501 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
CSRF in admin/manage-departments.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a department, given the id, via a crafted request. | |||||
CVE-2020-10500 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
CSRF in admin/reply-ticket.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to reply to any ticket, given the id, via a crafted request. | |||||
CVE-2020-10499 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
CSRF in admin/manage-tickets.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to close any ticket, given the id, via a crafted request. | |||||
CVE-2020-10498 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
CSRF in admin/edit-category.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a category, given the id, via a crafted request. | |||||
CVE-2020-10497 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 6.5 MEDIUM |
CSRF in admin/manage-categories.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to delete a category via a crafted request. | |||||
CVE-2020-10496 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
CSRF in admin/edit-article.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit an article, given the id, via a crafted request. | |||||
CVE-2020-10495 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
CSRF in admin/edit-template.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit an article template, given the id, via a crafted request. | |||||
CVE-2020-10494 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
CSRF in admin/edit-news.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a news article, given the id, via a crafted request. | |||||
CVE-2020-10493 | 1 Chadhaajay | 1 Phpkb | 2024-11-21 | 4.3 MEDIUM | 4.3 MEDIUM |
CSRF in admin/edit-glossary.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to edit a glossary term, given the id, via a crafted request. |