Archive for September, 2020

CVE-2020-25288

An issue was discovered in MantisBT before 2.24.3. When editing an Issue in a Project where a Custom Field with a crafted Regular Expression property is used, improper escaping of the corresponding form input’s pattern attribute allows HTML injection and, if CSP settings permit, execution of arbitrary JavaScript.
Source: NIST
CVE-2020-25288

CVE-2020-25781

An issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.
Source: NIST
CVE-2020-25781

CVE-2020-6654

A DLL Hijacking vulnerability in Eaton’s 9000x Programming and Configuration Software v 2.0.38 and prior allows an attacker to execute arbitrary code by replacing the required DLLs with malicious DLLs when the software try to load vci11un6.DLL and cinpl.DLL.
Source: NIST
CVE-2020-6654

CVE-2020-26159

In Oniguruma 6.9.5_rev1, an attacker able to supply a regular expression for compilation may be able to overflow a buffer by one byte in concat_opt_exact_str in src/regcomp.c .
Source: NIST
CVE-2020-26159

CVE-2020-25830

An issue was discovered in MantisBT before 2.24.3. Improper escaping of a custom field’s name allows an attacker to inject HTML and, if CSP settings permit, achieve execution of arbitrary JavaScript when attempting to update said custom field via bug_actiongroup_page.php.
Source: NIST
CVE-2020-25830

CVE-2020-13336

An issue has been discovered in GitLab affecting versions from 11.8 before 12.10.13. GitLab was vulnerable to a stored XSS by in the error tracking feature.
Source: NIST
CVE-2020-13336

CVE-2020-12869

RainbowFish PacsOne Server 6.8.4 allows XSS.
Source: NIST
CVE-2020-12869

CVE-2020-13952

In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the authenticated users’ password, and access to connection information including the plaintext password for the current connection. It would also be possible to run arbitrary methods on the database connection object for the Presto or Hive connection, allowing the user to bypass security controls internal to Superset. This vulnerability is present in every Apache Superset version < 0.37.2.
Source: NIST
CVE-2020-13952

CVE-2020-12715

RainbowFish PacsOne Server 6.8.4 has Incorrect Access Control.
Source: NIST
CVE-2020-12715

CVE-2020-12870

RainbowFish PacsOne Server 6.8.4 allows SQL injection on the username parameter in the signup page.
Source: NIST
CVE-2020-12870