Search Results (41009 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-7836 1 Voiceye Wsactivebridgees Project 1 Voiceye Wsactivebridges 2024-11-21 7.8 High
VOICEYE WSActiveBridgeES versions prior to 2.1.0.3 contains a stack-based buffer overflow vulnerability caused by improper bound checking parameter given by attack. It finally leads to a stack-based buffer overflow via access to crafted web page.
CVE-2020-7829 2 Hmtalk, Microsoft 2 Daviewindy, Windows 2024-11-21 7.8 High
DaviewIndy 8.98.4 and earlier version contain Heap-based overflow vulnerability, triggered when the user opens a malformed specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
CVE-2020-7828 2 Hmtalk, Microsoft 2 Daviewindy, Windows 2024-11-21 7.8 High
DaviewIndy 8.98.4 and earlier version contain Heap-based overflow vulnerability, triggered when the user opens a malformed specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.
CVE-2020-7816 2 Hmtalk, Microsoft 4 Daoffice, Dava\+, Daview Indy and 1 more 2024-11-21 7 High
A vulnerability in the JPEG image parsing module in DaView Indy, DaVa+, DaOffice softwares could allow an unauthenticated, remote attacker to cause an arbitrary code execution on an affected device.nThe vulnerability is due to a stack overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device.
CVE-2020-7792 1 Moutjs 1 Mout 2024-11-21 7.5 High
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.
CVE-2020-7788 3 Debian, Ini Project, Redhat 5 Debian Linux, Ini, Enterprise Linux and 2 more 2024-11-21 7.3 High
This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
CVE-2020-7774 4 Oracle, Redhat, Siemens and 1 more 7 Graalvm, Enterprise Linux, Openshift and 4 more 2024-11-21 7.3 High
The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution.
CVE-2020-7771 1 Asciitable.js Project 1 Asciitable.js 2024-11-21 7.5 High
The package asciitable.js before 1.0.3 are vulnerable to Prototype Pollution via the main function.
CVE-2020-7770 1 Json8 Project 1 Json8 2024-11-21 6.5 Medium
This affects the package json8 before 1.0.3. The function adds in the target object the property specified in the path, however it does not properly check the key being set, leading to a prototype pollution.
CVE-2020-7768 1 Grpc 1 Grpc 2024-11-21 7.5 High
The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition.
CVE-2020-7766 1 Json-ptr Project 1 Json-ptr 2024-11-21 7.3 High
This affects all versions of package json-ptr. The issue occurs in the set operation (https://flitbit.github.io/json-ptr/classes/_src_pointer_.jsonpointer.htmlset) when the force flag is set to true. The function recursively set the property in the target object, however it does not properly check the key being set, leading to a prototype pollution.
CVE-2020-7753 1 Trim Project 1 Trim 2024-11-21 7.5 High
All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim().
CVE-2020-7751 1 Chaijis 1 Pathval 2024-11-21 6 Medium
pathval before version 1.1.1 is vulnerable to prototype pollution.
CVE-2020-7748 1 Ts.ed Project 1 Ts.ed 2024-11-21 5.6 Medium
This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
CVE-2020-7746 2 Chartjs, Redhat 2 Chart.js, Jboss Enterprise Bpms Platform 2024-11-21 7.5 High
This affects the package chart.js before 2.9.4. The options parameter is not properly sanitized when it is processed. When the options are processed, the existing options (or the defaults options) are deeply merged with provided options. However, during this operation, the keys of the object being set are not checked, leading to a prototype pollution.
CVE-2020-7743 2 Mathjs, Redhat 2 Mathjs, Ansible Tower 2024-11-21 7.3 High
The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.
CVE-2020-7737 1 Safetydance Project 1 Safetydance 2024-11-21 7.3 High
All versions of package safetydance are vulnerable to Prototype Pollution via the set function.
CVE-2020-7736 1 Bmoor Project 1 Bmoor 2024-11-21 7.3 High
The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function.
CVE-2020-7729 3 Canonical, Debian, Gruntjs 3 Ubuntu Linux, Debian Linux, Grunt 2024-11-21 7.1 High
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
CVE-2020-7727 1 Gedi Project 1 Gedi 2024-11-21 9.8 Critical
All versions of package gedi are vulnerable to Prototype Pollution via the set function.