Filtered by CWE-494
Filtered by vendor Subscriptions
Total 138 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-33879 1 Tencent 1 Gameloop 2024-11-21 8.1 High
Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP connection. A malicious attacker in an MITM position could spoof the contents of an XML document describing an update package, replacing a download URL with one pointing to an arbitrary Windows executable. Because the only integrity check would be a comparison of the downloaded file's MD5 checksum to the one contained within the XML document, the downloaded executable would then be executed on the victim's machine.
CVE-2021-30669 1 Apple 2 Mac Os X, Macos 2024-11-21 5.5 Medium
A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A malicious application may bypass Gatekeeper checks.
CVE-2021-30658 1 Apple 1 Macos 2024-11-21 5.5 Medium
This issue was addressed with improved handling of file metadata. This issue is fixed in macOS Big Sur 11.3. A malicious application may bypass Gatekeeper checks.
CVE-2021-26639 2 Linux, Wisa 2 Linux Kernel, Smart Wing Cms 2024-11-21 8.1 High
This vulnerability is caused by the lack of validation of input values for specific functions if WISA Smart Wing CMS. Remote attackers can use this vulnerability to leak all files in the server without logging in system.
CVE-2020-9759 1 Lg 1 Webos 2024-11-21 4.6 Medium
A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configuration files and executable files.
CVE-2020-9751 1 Naver 1 Cloud Explorer 2024-11-21 9.1 Critical
Naver Cloud Explorer before 2.2.2.11 allows the system to download an arbitrary file from the attacker's server and execute it during the upgrade.
CVE-2020-9474 1 Siedle 2 Sg 150-0, Sg 150-0 Firmware 2024-11-21 8.8 High
The S. Siedle & Soehne SG 150-0 Smart Gateway before 1.2.4 allows remote code execution via the backup functionality in the web frontend. By using an exploit chain, an attacker with access to the network can get root access on the gateway.
CVE-2020-8809 1 Gurux 1 Device Language Message Specification Director 2024-11-21 8.1 High
Gurux GXDLMS Director prior to 8.5.1905.1301 downloads updates to add-ins and OBIS code over an unencrypted HTTP connection. A man-in-the-middle attacker can prompt the user to download updates by modifying the contents of gurux.fi/obis/files.xml and gurux.fi/updates/updates.xml. Then, the attacker can modify the contents of downloaded files. In the case of add-ins (if the user is using those), this will lead to code execution. In case of OBIS codes (which the user is always using as they are needed to communicate with the energy meters), this can lead to code execution when combined with CVE-2020-8810.
CVE-2020-7883 2 Microsoft, Wowsoft 2 Windows, Printchaser 2024-11-21 9.8 Critical
Printchaser v2.2021.804.1 and earlier versions contain a vulnerability, which could allow remote attacker to download and execute remote file by setting the argument, variable in the activeX module. This can be leveraged for code execution.
CVE-2020-7875 2 Dext5, Microsoft 2 Dext5upload, Windows 2024-11-21 7.5 High
DEXT5 Upload 5.0.0.117 and earlier versions contain a vulnerability, which could allow remote attacker to download and execute remote file by setting the argument, variable in the activeX module. This can be leveraged for code execution.
CVE-2020-7874 2 Microsoft, Tobesoft 2 Windows, Nexacro 2024-11-21 8.8 High
Download of code without integrity check vulnerability in NEXACRO14 Runtime ActiveX control of tobesoft Co., Ltd allows the attacker to cause an arbitrary file download and execution. This vulnerability is due to incomplete validation of file download URL or file extension.
CVE-2020-7873 1 Ksystem 1 K-system Wellcomm 2024-11-21 8.8 High
Download of code without integrity check vulnerability in ActiveX control of Younglimwon Co., Ltd allows the attacker to cause a arbitrary file download and execution.
CVE-2020-7831 2 Inogard, Microsoft 2 Ebiz4u, Windows 2024-11-21 8.8 High
A vulnerability in the web-based contract management service interface Ebiz4u of INOGARD could allow an victim user to download any file. The attacker is able to use startup menu directory via directory traversal for automatic execution. The victim user need to reboot, however.
CVE-2020-7826 1 Eyesurfer 1 Bflyinstallerx.ocx 2024-11-21 8.8 High
EyeSurfer BflyInstallerX.ocx v1.0.0.16 and earlier versions contain a vulnerability that could allow remote files to be download by setting the arguments to the vulnerable method. This can be leveraged for code execution. When the vulnerable method is called, they fail to properly check the parameters that are passed to it.
CVE-2020-7817 2 Microsoft, Raonwiz 2 Windows, K Upload 2024-11-21 5.5 Medium
MyBrowserPlus downloads the files needed to run the program through the setup file (Setup.inf). At this time, there is a vulnerability in downloading arbitrary files due to insufficient integrity verification of the files.
CVE-2020-7813 1 Kaoni 1 Ezhttptrans 2024-11-21 7.8 High
Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download and execute arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution.
CVE-2020-7812 2 Kaoni, Microsoft 2 Ezhttptrans, Windows 2024-11-21 7.8 High
Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.
CVE-2020-7806 2 Microsoft, Tobesoft 2 Windows, Xplatform 2024-11-21 7.8 High
Tobesoft Xplatform 9.2.2.250 and earlier version have an arbitrary code execution vulnerability by using method supported by Xplatform ActiveX Control. It allows attacker to cause remote code execution.
CVE-2020-7505 1 Schneider-electric 2 Easergy T300, Easergy T300 Firmware 2024-11-21 7.2 High
A CWE-494 Download of Code Without Integrity Check vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow an attacker to inject data with dangerous content into the firmware and execute arbitrary code on the system.
CVE-2020-5867 2 F5, Netapp 2 Nginx Controller, Cloud Backup 2024-11-21 8.1 High
In versions prior to 3.3.0, the NGINX Controller Agent installer script 'install.sh' uses HTTP instead of HTTPS to check and install packages