Unnamed: 0
stringlengths 13
16
| mod_date
stringdate 2008-01-10 05:00:00
2019-11-21 15:15:00
| pub_date
stringdate 1999-01-01 05:00:00
2019-11-21 15:15:00
| cvss
float64 0
10
| cwe_code
int64 1
1.19k
| cwe_name
stringclasses 170
values | summary
stringlengths 23
3.93k
| access_authentication
stringclasses 3
values | access_complexity
stringclasses 3
values | access_vector
stringclasses 3
values | impact_availability
stringclasses 3
values | impact_confidentiality
stringclasses 3
values | impact_integrity
stringclasses 3
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2019-19048
|
2019-11-18 06:15:00
|
2019-11-18 06:15:00
| 7.8
| 400
|
Uncontrolled Resource Consumption
|
A memory leak in the crypto_reportstat() function in drivers/virt/vboxguest/vboxguest_utils.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering copy_form_user() failures, aka CID-e0b0cb938864.
| null | null | null | null | null | null |
CVE-2019-19047
|
2019-11-18 06:15:00
|
2019-11-18 06:15:00
| 7.8
| 400
|
Uncontrolled Resource Consumption
|
A memory leak in the mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_crdump_collect() failures, aka CID-c7ed6d0183d5.
| null | null | null | null | null | null |
CVE-2019-19046
|
2019-11-18 06:15:00
|
2019-11-18 06:15:00
| 7.8
| 400
|
Uncontrolled Resource Consumption
|
** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.
| null | null | null | null | null | null |
CVE-2019-19045
|
2019-11-18 06:15:00
|
2019-11-18 06:15:00
| 7.8
| 400
|
Uncontrolled Resource Consumption
|
A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.
| null | null | null | null | null | null |
CVE-2019-19044
|
2019-11-18 06:15:00
|
2019-11-18 06:15:00
| 7.8
| 400
|
Uncontrolled Resource Consumption
|
Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.
| null | null | null | null | null | null |
CVE-2019-19043
|
2019-11-18 06:15:00
|
2019-11-18 06:15:00
| 7.8
| 400
|
Uncontrolled Resource Consumption
|
A memory leak in the i40e_setup_macvlans() function in drivers/net/ethernet/intel/i40e/i40e_main.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering i40e_setup_channel() failures, aka CID-27d461333459.
| null | null | null | null | null | null |
CVE-2019-19041
|
2019-11-17 21:15:00
|
2019-11-17 21:15:00
| 9
| 78
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by the underlying system. It is possible to achieve this by modifying the values in the files.SUM file (which are used for integrity control) and injecting malicious code into the upgrade.sh file.
| null | null | null | null | null | null |
CVE-2019-19040
|
2019-11-17 21:15:00
|
2019-11-17 21:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
| null | null | null | null | null | null |
CVE-2019-19035
|
2019-11-17 18:15:00
|
2019-11-17 18:15:00
| 4.3
| 125
|
Out-of-bounds Read
|
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.
| null | null | null | null | null | null |
CVE-2019-19022
|
2019-11-17 18:15:00
|
2019-11-17 18:15:00
| 5
| 200
|
Information Exposure
|
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories.
| null | null | null | null | null | null |
CVE-2019-19012
|
2019-11-17 18:15:00
|
2019-11-17 18:15:00
| 7.5
| 190
|
Integer Overflow or Wraparound
|
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
| null | null | null | null | null | null |
CVE-2019-19011
|
2019-11-17 18:15:00
|
2019-11-17 18:15:00
| 5
| 476
|
NULL Pointer Dereference
|
MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette.
| null | null | null | null | null | null |
CVE-2019-19010
|
2019-11-16 01:15:00
|
2019-11-16 01:15:00
| 7.5
| 20
|
Improper Input Validation
|
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.
| null | null | null | null | null | null |
CVE-2019-16762
|
2019-11-15 23:15:00
|
2019-11-15 23:15:00
| 4.9
| 20
|
Improper Input Validation
|
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any version >= 0.21.4.
| null | null | null | null | null | null |
CVE-2019-16761
|
2019-11-15 23:15:00
|
2019-11-15 23:15:00
| 4.9
| 20
|
Improper Input Validation
|
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slp-validate@1.0.0 npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0.0 have been patched.
| null | null | null | null | null | null |
CVE-2019-6664
|
2019-11-15 21:30:00
|
2019-11-15 21:15:00
| 5
| 20
|
Improper Input Validation
|
On BIG-IP 15.0.0 and 14.1.0-14.1.0.6, under certain conditions, network protections on the management port do not follow current best practices.
| null | null | null | null | null | null |
CVE-2019-6663
|
2019-11-15 21:30:00
|
2019-11-15 21:15:00
| 4.3
| 20
|
Improper Input Validation
|
The BIG-IP 15.0.0-15.0.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.1-11.6.5.1, BIG-IQ 7.0.0, 6.0.0-6.1.0, and 5.2.0-5.4.0, iWorkflow 2.3.0, and Enterprise Manager 3.1.1 configuration utility is vulnerable to Anti DNS Pinning (DNS Rebinding) attack.
| null | null | null | null | null | null |
CVE-2019-6662
|
2019-11-15 21:30:00
|
2019-11-15 21:15:00
| 4
| 532
|
Inclusion of Sensitive Information in Log Files
|
On BIG-IP 13.1.0-13.1.1.4, sensitive information is logged into the local log files and/or remote logging targets when restjavad processes an invalid request. Users with access to the log files would be able to view that data.
| null | null | null | null | null | null |
CVE-2019-6661
|
2019-11-15 21:30:00
|
2019-11-15 21:15:00
| 5
| 400
|
Uncontrolled Resource Consumption
|
When the BIG-IP APM 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.4.1, or 11.5.1-11.6.5 system processes certain requests, the APD/APMD daemon may consume excessive resources.
| null | null | null | null | null | null |
CVE-2019-6660
|
2019-11-15 21:30:00
|
2019-11-15 21:15:00
| 5
| 400
|
Uncontrolled Resource Consumption
|
On BIG-IP 14.1.0-14.1.2, 14.0.0-14.0.1, and 13.1.0-13.1.1, undisclosed HTTP requests may consume excessive amounts of systems resources which may lead to a denial of service.
| null | null | null | null | null | null |
CVE-2019-6659
|
2019-11-15 21:30:00
|
2019-11-15 21:15:00
| 5
| 20
|
Improper Input Validation
|
On version 14.0.0-14.1.0.1, BIG-IP virtual servers with TLSv1.3 enabled may experience a denial of service due to undisclosed incoming messages.
| null | null | null | null | null | null |
CVE-2019-18372
|
2019-11-15 18:42:00
|
2019-11-15 18:15:00
| 7.2
| 269
|
Improper Privilege Management
|
Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
| null | null | null | null | null | null |
CVE-2019-12759
|
2019-11-15 18:42:00
|
2019-11-15 18:15:00
| 7.2
| 269
|
Improper Privilege Management
|
Symantec Endpoint Protection Manager (SEPM) and Symantec Mail Security for MS Exchange (SMSMSE), prior to versions 14.2 RU2 and 7.5.x respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
| null | null | null | null | null | null |
CVE-2019-12758
|
2019-11-15 18:42:00
|
2019-11-15 18:15:00
| 7.2
| 20
|
Improper Input Validation
|
Symantec Endpoint Protection, prior to 14.2 RU2, may be susceptible to an unsigned code execution vulnerability, which may allow an individual to execute code without a resident proper digital signature.
| null | null | null | null | null | null |
CVE-2018-18368
|
2019-11-15 18:04:00
|
2019-11-15 17:15:00
| 4.6
| 269
|
Improper Privilege Management
|
Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU1, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
| null | null | null | null | null | null |
CVE-2009-5047
|
2019-11-15 16:15:00
|
2019-11-15 16:15:00
| 7.5
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Jetty 6.x through 6.1.22 suffers from an escape sequence injection vulnerability from an attack vector by means of: 1) "Cookie Dump Servlet" and 2) Http Content-Length header. 1) A POST request to the form at "/test/cookie/" with the "Age" parameter set to a string throws a "java.lang.NumberFormatException" which reflects binary characters including ESC. These characters could be used to execute arbitrary commands or buffer dumps in the terminal. 2) The attack vector in 1) can be exploited by requesting a page using an HTTP request "Content-Length" header set to a consonant string (string including only letters).
| null | null | null | null | null | null |
CVE-2014-0023
|
2019-11-15 15:15:00
|
2019-11-15 15:15:00
| 4.6
| 668
|
Exposure of Resource to Wrong Sphere
|
OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution
| null | null | null | null | null | null |
CVE-2013-7089
|
2019-11-15 15:15:00
|
2019-11-15 15:15:00
| 5
| 200
|
Information Exposure
|
ClamAV before 0.97.7: dbg_printhex possible information leak
| null | null | null | null | null | null |
CVE-2013-7088
|
2019-11-15 15:15:00
|
2019-11-15 15:15:00
| 7.5
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
ClamAV before 0.97.7 has buffer overflow in the libclamav component
| null | null | null | null | null | null |
CVE-2013-7087
|
2019-11-15 15:15:00
|
2019-11-15 15:15:00
| 7.5
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
ClamAV before 0.97.7 has WWPack corrupt heap memory
| null | null | null | null | null | null |
CVE-2019-14345
|
2019-11-15 14:15:00
|
2019-11-15 14:15:00
| 7.5
| 269
|
Improper Privilege Management
|
TemaTres 3.0 allows remote unprivileged users to create an administrator account
| null | null | null | null | null | null |
CVE-2019-14343
|
2019-11-15 13:15:00
|
2019-11-15 13:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
TemaTres 3.0 has stored XSS via the value parameter to the vocab/admin.php?vocabulario_id=list URI.
| null | null | null | null | null | null |
CVE-2019-18986
|
2019-11-15 05:15:00
|
2019-11-15 05:15:00
| 5
| 307
|
Improper Restriction of Excessive Authentication Attempts
|
Pimcore before 6.2.2 allow attackers to brute-force (guess) valid usernames by using the 'forgot password' functionality as it returns distinct messages for invalid password and non-existing users.
| null | null | null | null | null | null |
CVE-2019-18985
|
2019-11-15 05:15:00
|
2019-11-15 05:15:00
| 5
| 307
|
Improper Restriction of Excessive Authentication Attempts
|
Pimcore before 6.2.2 lacks brute force protection for the 2FA token.
| null | null | null | null | null | null |
CVE-2019-18982
|
2019-11-15 05:15:00
|
2019-11-15 05:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
bundles/AdminBundle/Controller/Admin/EmailController.php in Pimcore before 6.3.0 allows script execution in the Email Log preview window because of the lack of a Content-Security-Policy header.
| null | null | null | null | null | null |
CVE-2019-18928
|
2019-11-15 04:15:00
|
2019-11-15 04:15:00
| 7.5
| 269
|
Improper Privilege Management
|
Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection.
| null | null | null | null | null | null |
CVE-2019-18980
|
2019-11-15 03:23:00
|
2019-11-14 22:15:00
| 5
| 287
|
Improper Authentication
|
On Signify Philips Taolight Smart Wi-Fi Wiz Connected LED Bulb 9290022656 devices, an unprotected API lets remote users control the bulb's operation. Anyone can turn the bulb on or off, or change its color or brightness remotely. There is no authentication or encryption to use the control API. The only requirement is that the attacker have network access to the bulb.
| null | null | null | null | null | null |
CVE-2019-11931
|
2019-11-15 03:23:00
|
2019-11-14 23:15:00
| 6.8
| 787
|
Out-of-bounds Write
|
A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100.
| null | null | null | null | null | null |
CVE-2019-2211
|
2019-11-14 21:36:00
|
2019-11-13 18:15:00
| 7.8
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
In createProjectionMapForQuery of TvProvider.java, there is possible SQL injection. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-135269669
|
NONE
|
LOW
|
NETWORK
|
NONE
|
COMPLETE
|
NONE
|
CVE-2019-2212
|
2019-11-14 21:30:00
|
2019-11-13 18:15:00
| 4.9
| 200
|
Information Exposure
|
In poisson_distribution of random, there is an out of bounds read. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139690488
|
NONE
|
LOW
|
LOCAL
|
NONE
|
COMPLETE
|
NONE
|
CVE-2019-2213
|
2019-11-14 21:24:00
|
2019-11-13 18:15:00
| 6.9
| 416
|
Use After Free
|
In binder_free_transaction of binder.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-133758011References: Upstream kernel
|
NONE
|
MEDIUM
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-18978
|
2019-11-14 21:21:00
|
2019-11-14 21:15:00
| 5
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
| null | null | null | null | null | null |
CVE-2019-18651
|
2019-11-14 21:21:00
|
2019-11-14 21:15:00
| 5.8
| 352
|
Cross-Site Request Forgery (CSRF)
|
A cross-site request forgery (CSRF) vulnerability in 3xLogic Infinias Access Control through 6.6.9586.0 allows remote attackers to execute malicious and unauthorized actions (e.g., delete application users) by sending a crafted HTML document or encoded URL to a user that the website trusts. The user needs to have an active privileged session.
| null | null | null | null | null | null |
CVE-2019-17391
|
2019-11-14 21:21:00
|
2019-11-14 21:15:00
| 2.1
| 200
|
Information Exposure
|
An issue was discovered in the Espressif ESP32 mask ROM code 2016-06-08 0 through 2. Lack of anti-glitch mitigations in the first stage bootloader of the ESP32 chip allows an attacker (with physical access to the device) to read the contents of read-protected eFuses, such as flash encryption and secure boot keys, by injecting a glitch into the power supply of the chip shortly after reset.
| null | null | null | null | null | null |
CVE-2019-15804
|
2019-11-14 21:21:00
|
2019-11-14 21:15:00
| 5
| 20
|
Improper Input Validation
|
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console.
| null | null | null | null | null | null |
CVE-2019-15803
|
2019-11-14 21:21:00
|
2019-11-14 21:15:00
| 6.4
| 20
|
Improper Input Validation
|
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the password returned by fds_sys_passDebugPasswd_ret(). The firmware contains access control checks that determine if remote users are allowed to access this functionality. The function that performs this check (fds_sys_remoteDebugEnable_ret in libfds.so) always return TRUE with no actual checks performed. The diagnostics menu allows for reading/writing arbitrary registers and various other configuration parameters which are believed to be related to the network interface chips.
| null | null | null | null | null | null |
CVE-2019-15801
|
2019-11-14 21:21:00
|
2019-11-14 21:15:00
| 5
| 522
|
Insufficiently Protected Credentials
|
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cryptographic key found elsewhere in the firmware, these passwords can be decrypted. This is related to fds_sys_passDebugPasswd_ret() and fds_sys_passRecoveryPasswd_ret() in libfds.so.0.0.
| null | null | null | null | null | null |
CVE-2019-15800
|
2019-11-14 21:21:00
|
2019-11-14 21:15:00
| 10
| 20
|
Improper Input Validation
|
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.)
| null | null | null | null | null | null |
CVE-2019-15799
|
2019-11-14 21:21:00
|
2019-11-14 21:15:00
| 9
| 269
|
Improper Privilege Management
|
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when connecting to the device via SSH (while their permissions via the web interface are in fact restricted). This allows normal users to obtain the administrative password by running the tech-support command via the CLI: this contains the encrypted passwords for all users on the device. As these passwords are encrypted using well-known and static parameters, they can be decrypted and the original passwords (including the administrator password) can be obtained.
| null | null | null | null | null | null |
CVE-2019-2214
|
2019-11-14 21:19:00
|
2019-11-13 18:15:00
| 7.2
| 269
|
Improper Privilege Management
|
In binder_transaction of binder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-136210786References: Upstream kernel
|
NONE
|
LOW
|
LOCAL
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-18793
|
2019-11-14 21:14:00
|
2019-11-13 20:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
Parallels Plesk Panel 9.5 allows XSS in target/locales/tr-TR/help/index.htm? via the "fileName" parameter.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18646
|
2019-11-14 20:57:00
|
2019-11-14 15:15:00
| 6.5
| 89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
The Untangle NG firewall 14.2.0 is vulnerable to authenticated inline-query SQL injection within the timeDataDynamicColumn parameter when logged in as an admin user.
|
SINGLE
|
LOW
|
NETWORK
|
PARTIAL
|
PARTIAL
|
PARTIAL
|
CVE-2019-14591
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 2.1
| 20
|
Improper Input Validation
|
Improper input validation in the API for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-14590
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 2.1
| 200
|
Information Exposure
|
Improper access control in the API for the Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable information disclosure via local access.
| null | null | null | null | null | null |
CVE-2019-14574
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 2.1
| 125
|
Out-of-bounds Read
|
Out of bounds read in a subsystem for Intel(R) Graphics Driver versions before 26.20.100.7209 may allow an authenticated user to potentially enable denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-11113
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 2.1
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Buffer overflow in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6618 (DCH) or 21.20.x.5077 (aka15.45.5077) may allow a privileged user to potentially enable information disclosure via local access.
| null | null | null | null | null | null |
CVE-2019-11111
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 4.6
| 476
|
NULL Pointer Dereference
|
Pointer corruption in the Unified Shader Compiler in Intel(R) Graphics Drivers before 10.18.14.5074 (aka 15.36.x.5074) may allow an authenticated user to potentially enable escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-11089
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 2.1
| 20
|
Improper Input Validation
|
Insufficient input validation in Kernel Mode module for Intel(R) Graphics Driver before version 25.20.100.6519 may allow an authenticated user to potentially enable denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-0184
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 2.1
| 200
|
Information Exposure
|
Insufficient access control in protected memory subsystem for Intel(R) TXT for 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 Families; Intel(R) Xeon(R) E-2100 and E-2200 Processor Families with Intel(R) Processor Graphics and Intel(R) TXT may allow a privileged user to potentially enable information disclosure via local access.
| null | null | null | null | null | null |
CVE-2019-0152
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 7.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Insufficient memory protection in System Management Mode (SMM) and Intel(R) TXT for certain Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-0151
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 7.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-0124
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 7.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting TXT, may allow a privileged user to potentially enable escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-0123
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 7.2
| 119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-0117
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 2.1
| 200
|
Information Exposure
|
Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 & E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.
| null | null | null | null | null | null |
CVE-2018-12207
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 4.9
| 20
|
Improper Input Validation
|
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
| null | null | null | null | null | null |
CVE-2013-4106
|
2019-11-14 20:57:00
|
2019-11-14 20:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
A Cross-site scripting (XSS) vulnerability exists in Conversation Overview Nickname in Cryptocat before 2.0.22.
| null | null | null | null | null | null |
CVE-2019-16950
|
2019-11-14 20:45:00
|
2019-11-13 19:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
An XSS issue was discovered in Enghouse Web Chat 6.1.300.31 and 6.2.284.34. The QueueName parameter of a GET request allows for insertion of user-supplied JavaScript.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18647
|
2019-11-14 20:37:00
|
2019-11-14 15:15:00
| 9
| 74
|
Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
The Untangle NG firewall 14.2.0 is vulnerable to an authenticated command injection when logged in as an admin user.
|
SINGLE
|
LOW
|
NETWORK
|
COMPLETE
|
COMPLETE
|
COMPLETE
|
CVE-2019-18649
|
2019-11-14 20:23:00
|
2019-11-14 15:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
When logged in as an admin user, the Title input field (under Reports) within Untangle NG firewall 14.2.0 is vulnerable to stored XSS.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18648
|
2019-11-14 20:19:00
|
2019-11-14 15:15:00
| 3.5
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
When logged in as an admin user, the Untangle NG firewall 14.2.0 is vulnerable to reflected XSS at multiple places and specific user input fields.
|
SINGLE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18883
|
2019-11-14 19:57:00
|
2019-11-13 20:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
XSS exists in Lavalite CMS 5.7 via the admin/profile name or designation field.
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-18939
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 7.5
| 20
|
Improper Input Validation
|
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request.
| null | null | null | null | null | null |
CVE-2019-18938
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 7.5
| 20
|
Improper Input Validation
|
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the E-Mail AddOn through 1.6.8.c installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the save.cgi script for payload upload and the testtcl.cgi script for its execution.
| null | null | null | null | null | null |
CVE-2019-18937
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 7.5
| 20
|
Improper Input Validation
|
eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the Script Parser AddOn through 1.8 installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi script, which executes TCL script content from an HTTP POST request.
| null | null | null | null | null | null |
CVE-2019-11139
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 2.1
| 754
|
Improper Check for Unusual or Exceptional Conditions
|
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-11135
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 2.1
| 200
|
Information Exposure
|
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
| null | null | null | null | null | null |
CVE-2019-11112
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 7.2
| 269
|
Improper Privilege Management
|
Memory corruption in Kernel Mode Driver in Intel(R) Graphics Driver before 26.20.100.6813 (DCH) or 26.20.100.6812 may allow an authenticated user to potentially enable escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-0185
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 2.1
| 200
|
Information Exposure
|
Insufficient access control in protected memory subsystem for SMM for 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor families; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 families; Intel(R) Xeon(R) E-2100 and E-2200 Processor families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.
| null | null | null | null | null | null |
CVE-2019-0155
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 7.2
| 269
|
Improper Privilege Management
|
Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-0150
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 2.1
| 863
|
Incorrect Authorization
|
Insufficient access control in firmware Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow a privileged user to potentially enable a denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-0149
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 2.1
| 20
|
Improper Input Validation
|
Insufficient input validation in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 2.8.43 may allow an authenticated user to potentially enable a denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-0148
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 2.1
| 400
|
Uncontrolled Resource Consumption
|
Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-0147
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 2.1
| 20
|
Improper Input Validation
|
Insufficient input validation in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-0146
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 2.1
| 400
|
Uncontrolled Resource Consumption
|
Resource leak in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 2.8.43 may allow an authenticated user to potentially enable a denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-0145
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 7.2
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
Buffer overflow in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable an escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-0144
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 4.9
| 755
|
Improper Handling of Exceptional Conditions
|
Unhandled exception in firmware for Intel(R) Ethernet 700 Series Controllers before version 7.0 may allow an authenticated user to potentially enable a denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-0143
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 4.9
| 755
|
Improper Handling of Exceptional Conditions
|
Unhandled exception in Kernel-mode drivers for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable a denial of service via local access.
| null | null | null | null | null | null |
CVE-2019-0142
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 7.2
| 269
|
Improper Privilege Management
|
Insufficient access control in ilp60x64.sys driver for Intel(R) Ethernet 700 Series Controllers before version 1.33.0.0 may allow a privileged user to potentially enable escalation of privilege via local access.
| null | null | null | null | null | null |
CVE-2019-0140
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 5.8
| 120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
Buffer overflow in firmware for Intel(R) Ethernet 700 Series Controllers before version 7.0 may allow an unauthenticated user to potentially enable an escalation of privilege via an adjacent access.
| null | null | null | null | null | null |
CVE-2019-0139
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 4.6
| 269
|
Improper Privilege Management
|
Insufficient access control in firmware for Intel(R) Ethernet 700 Series Controllers before version 7.0 may allow a privileged user to potentially enable an escalation of privilege, denial of service, or information disclosure via local access.
| null | null | null | null | null | null |
CVE-2013-4109
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
An unspecified cross-site scripting (XSS) vulnerability exists in Cryptocat Message Handling 1.1.165.
| null | null | null | null | null | null |
CVE-2013-3073
|
2019-11-14 19:34:00
|
2019-11-14 18:15:00
| 10
| 22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
A Symlink Traversal vulnerability exists in NETGEAR Centria WNDR4700 Firmware 1.0.0.34.
| null | null | null | null | null | null |
CVE-2013-3072
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 7.5
| 287
|
Improper Authentication
|
An Authentication Bypass vulnerability exists in NETGEAR Centria WNDR4700 Firmware 1.0.0.34 in http://<router_ip>/apply.cgi?/hdd_usr_setup.htm that when visited by any user, authenticated or not, causes the router to no longer require a password to access the web administration portal.
| null | null | null | null | null | null |
CVE-2013-3070
|
2019-11-14 19:34:00
|
2019-11-14 19:15:00
| 5
| 200
|
Information Exposure
|
An Information Disclosure vulnerability exists in Netgear WNDR4700 running firmware 1.0.0.34 in the management web interface, which discloses the PSK of the wireless LAN.
| null | null | null | null | null | null |
CVE-2012-4384
|
2019-11-14 19:23:00
|
2019-11-13 16:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
letodms has multiple XSS issues: Reflected XSS in Login Page, Stored XSS in Document Owner/User name, Stored XSS in Calendar
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2014-3592
|
2019-11-14 18:25:00
|
2019-11-13 16:15:00
| 4.3
| 79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
OpenShift Origin: Improperly validated team names could allow stored XSS attacks
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2014-3655
|
2019-11-14 17:40:00
|
2019-11-13 16:15:00
| 4.3
| 352
|
Cross-Site Request Forgery (CSRF)
|
JBoss KeyCloak is vulnerable to soft token deletion via CSRF
|
NONE
|
MEDIUM
|
NETWORK
|
NONE
|
NONE
|
PARTIAL
|
CVE-2019-16110
|
2019-11-14 17:31:00
|
2019-11-14 17:15:00
| 6.8
| 20
|
Improper Input Validation
|
The network protocol of Blade Shadow though 2.13.3 allows remote attackers to take control of a Shadow instance and execute arbitrary code by only knowing the victim's IP address, because packet data can be injected into the unencrypted UDP packet stream.
| null | null | null | null | null | null |
CVE-2019-15744
|
2019-11-14 17:31:00
|
2019-11-14 17:15:00
| 2.1
| 610
|
Externally Controlled Reference to a Resource in Another Sphere
|
The Sony Xperia Xperia XZs Android device with a build fingerprint of Sony/keyaki_softbank/keyaki_softbank:7.1.1/TONE3-3.0.0-SOFTBANK-170517-0323/1:user/dev-keys contains a pre-installed app with a package name of jp.softbank.mb.tdrl app (versionCode=1413005, versionName=1.3.0) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.
| null | null | null | null | null | null |
CVE-2019-15743
|
2019-11-14 17:31:00
|
2019-11-14 17:15:00
| 2.1
| 610
|
Externally Controlled Reference to a Resource in Another Sphere
|
The Sony Xperia Touch Android device with a build fingerprint of Sony/blanc_windy/blanc_windy:7.0/LOIRE-SMART-BLANC-1.0.0-170530-0834/1:user/dev-keys contains a pre-installed app with a package name of com.sonymobile.android.maintenancetool.testmic app (versionCode=24, versionName=7.0) that allows unauthorized microphone audio recording via a confused deputy attack. This capability can be accessed by any app co-located on the device. This app allows a third-party app to use its open interface to record audio to external storage.
| null | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.